Applet ID.me v1.12 sur la plateforme IDeal Citiz v2.1

CSV information ?

Status archived
Valid from 11.10.2016
Valid until 11.10.2021
Scheme 🇫🇷 FR
Manufacturer Safran Morpho
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_DVS.2, AVA_VAN.5, EAL5+

Heuristics summary ?

Certificate ID: ANSSI-CC-2016/64

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
DES
Hash functions
SHA-2
Libraries
v1.02.013

CPLC
IC Fabricator, IC Type
Vendor
Infineon, Morpho

Security level
EAL 5, EAL4, EAL5, EAL7, EAL 1, EAL 3, EAL 7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Protection profiles
ANSSI-CC-PP-2010/03-M01, PP-SSCD-Part2, PP-SSCD-Part3, PP-SSCD-Part4, PP-SSCD-, PP-SSCD-Part6, PP-SSCD-Part5
Certificates
BSI-DSZ-CC-0782-V2-2015, ANSSI-CC-2016/64, ANSSI-CC-2015/45, ANSSI-CC-2015/45-S01
Evaluation facilities
CESTI, CEA - LETI

Standards
CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004

File metadata

Title ANSSI-CC-2016_64fr
Pages 16
Creator PDFCreator Version 1.2.1
Producer GPL Ghostscript 9.02

Frontpage

Certificate ID ANSSI-CC-2016/64
Certified item Applet ID.me v1.12 sur la plateforme IDeal Citiz v2.1
Certification lab CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
Developer MORPHO 18 Chaussée Jules César, 95520 Osny, France INFINEON Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Safran Identity & Security (anciennement MORPHO) 18 Chaussée Jules César, 95520 Osny, France

References

Outgoing
  • ANSSI-CC-2015/45 - archived - IDeal Citiz v2.1 Open platform
  • BSI-DSZ-CC-0782-V2-2015 - archived - Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware)
Incoming
  • ANSSI-CC-2016/80 - archived - Applet MICAO v1.1.3 sur la plateforme IdealCitiz v2.1, en configuration SAC/EAC
  • ANSSI-CC-2016/81 - archived - Applet MICAO v1.1.3 sur la plateforme IdealCitiz v2.1, en configuration BAC

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDES, 3DES, CMAC
Asymmetric Algorithms
RSA-PSS, RSA-OAEP, ECDH, ECDSA, ECC, DH
Hash functions
SHA-1, SHA-224, SHA-384, SHA-512, SHA-256, SHA-2
Schemes
MAC
Protocols
PACE
Randomness
RNG
Libraries
v1.02.013
Block cipher modes
CBC

Vendor
Infineon, Morpho

Security level
EAL 5+, EAL5+, EAL5, EAL 5, EAL4+, EAL5 augmented, EAL 5 augmented
Claims
D.SCD, D.SVD, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.KEY-MNGT, O.PIN-MNGT, O.BIO-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.SCP, O.CARD-MANAGEMENT, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, T.APP_DATA_INTEGRITY, T.UNAUTH_CARD_MNGT, T.LIFE_CYCLE, T.UNAUTH_ACCESS, A.CSP, A.CGA, A.SCA, A.APPLET, A.VERIFICATION, A.PRODUCTION, OE.HI_VAD, OE.HID_VAD, OE.APPLET, OE.VERIFICATION, OE.CODE-EVIDENCE, OE.SECURITY-DOMAINS, OE.QUOTAS, OE.SHARE-CONTROL, OE.KEY_GENERATION, OE.PRODUCTION, OSP.VERIFICATION, OSP.SECURITY_DOMAINS, OSP.QUOTAS, OSP.KEY_GENERATION, OSP.SHARE-CONTROL
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.5, ADV_TDS.4, ADV_IMP.1, ADV_TDS.3, ADV_INT.2, ADV_FSP.2, ADV_FSP.4, AGD_PRE, AGD_OPE, AGD_USR, AGD_ADM, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.5, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, ATE_DPT.3, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_GEN, FCO_NRO, FCS_RND, FCS_RND.1, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM, FCS_COP, FCS_RND.1.1, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_UIT, FDP_DAU, FDP_ACC, FDP_ACF, FDP_RIP.1, FDP_SDI, FDP_ITC, FDP_UCT, FDP_IFC, FDP_IFF, FDP_RIP, FDP_ROL, FDP_SDI.2, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1.1, FDP_ITC.1, FDP_UCT.1, FDP_DAU.2, FDP_UIT.1, FDP_ITC.2, FDP_IFC.1, FIA_API, FIA_API.1, FIA_UAU.1, FIA_UID.1, FIA_AFL.1, FIA_ATD, FIA_UID, FIA_USB, FIA_API.1.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_AFL.1.1, FIA_AFL.1.2, FMT_SMR.1, FMT_SMF.1, FMT_MOF.1, FMT_MSA, FMT_MSA.2, FMT_MSA.3, FMT_MSA.4, FMT_MTD, FMT_SMF, FMT_SMR, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1.1, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4.1, FMT_MTD.1, FPR_UNO.1, FPT_EMS, FPT_EMS.1, FPT_FLS.1, FPT_PHP.1, FPT_PHP.3, FPT_TST.1, FPT_FLS, FPT_TDC.1, FPT_RCV, FPT_PHP, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1.1, FPT_TST, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-PP-0035, BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012, BSI-CC-PP-0071-2012, BSI-CC-PP-0072-2012, BSI-CC-PP-0076-2013, ANSSI-CC-PP-, PP-SSCD2, PP-SSCD3, PP-SSCD4, PP-SSCD5, PP-SSCD6, PP-SSCD
Certification process
out of scope, Figure 1: TOE physical scope Beside the TOE, the product can include other Java Card applications (out of scope of the TOE). IdealCitiz Operating System enforces separation of the data between the applets and

Side-channel analysis
physical probing, side channel, DPA, SPA, timing attacks, physical tampering, malfunction, DFA, fault injection, Fault injection
Certification process
out of scope, Figure 1: TOE physical scope Beside the TOE, the product can include other Java Card applications (out of scope of the TOE). IdealCitiz Operating System enforces separation of the data between the applets and

Standards
PKCS1, PKCS#1, AIS31, ISO/IEC 7816-4, ISO/IEC 9797-1, ISO/IEC 15408:2005, ICAO, CCMB-2012-09-004, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003

File metadata

Title 2016_2000019402 Security Target Lite IDeal Citiz v2.1 ID me
Author IOTR
Creation date D:20160809141740+02'00'
Modification date D:20160809141740+02'00'
Pages 107
Creator PDFCreator Version 1.6.2
Producer GPL Ghostscript 9.05

Heuristics ?

Certificate ID: ANSSI-CC-2016/64

Extracted SARs

ASE_ECD.1, AVA_VAN.5, ALC_DEL.1, ALC_TAT.2, AGD_PRE.1, ATE_DPT.3, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ATE_FUN.1, ASE_REQ.2, ASE_CCL.1, ALC_CMS.5, ASE_OBJ.2, ATE_COV.2, ADV_ARC.1, ALC_DVS.2, ASE_SPD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, ALC_CMC.4, ASE_INT.1, ASE_TSS.1

References ?

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '00e7cba9ae2856edb16b5adbeb9c9f67b92719c6591fdc217b707c941829bc4d', 'txt_hash': '92828eb651367bb2fed5ccebad4258fe5b092b675cafd5551816f5cf050bed84'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '50eadc5c44fa2b96ae7c9b651a3618cde8d30fef1496724b9f071d36342a524a', 'txt_hash': 'b090e567c7301fe9abb0da858c22893afe6ba92d36618e542b90af021477c27d'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 247324, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 16, '/Producer': 'GPL Ghostscript 9.02', '/CreationDate': '', '/ModDate': '', '/Title': 'ANSSI-CC-2016_64fr', '/Creator': 'PDFCreator Version 1.2.1', '/Author': '', '/Keywords': '', '/Subject': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1016477, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 107, '/Producer': 'GPL Ghostscript 9.05', '/CreationDate': "D:20160809141740+02'00'", '/ModDate': "D:20160809141740+02'00'", '/Title': '2016_2000019402 Security Target Lite IDeal Citiz v2.1 ID me', '/Creator': 'PDFCreator Version 1.6.2', '/Author': 'IOTR', '/Keywords': '', '/Subject': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'FR': {'match_rules': ['RĂ©fĂ©rence du rapport de certification(.+)Nom du produit(.+)RĂ©fĂ©rence/version du produit(.*)ConformitĂ© Ă  un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)DĂ©veloppeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2016/64', 'cert_item': 'Applet ID.me v1.12 sur la plateforme IDeal Citiz v2.1', 'cert_item_version': 'Applet version 1.12, plateforme version 2.1', 'ref_protection_profiles': 'Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.0.1 ; Part 3: Device with key import, v1.0.2 ; Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1 ; Part 5: Extension for device with key generation and trusted communication with signature creation application, v1.0.1 ; Part 6: Extension for device with key import and trusted communication with signature creation application, v1.0.4', 'cc_version': 'Critères Communs version 3.1 rĂ©vision 4', 'cc_security_level': 'EAL 5 augmentĂ© ALC_DVS.2, AVA_VAN.5', 'developer': 'MORPHO 18 ChaussĂ©e Jules CĂ©sar, 95520 Osny, France INFINEON Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Safran Identity & Security (anciennement MORPHO) 18 ChaussĂ©e Jules CĂ©sar, 95520 Osny, France', 'cert_lab': 'CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0782-V2-2015': 1}, 'FR': {'ANSSI-CC-2016/64': 17, 'ANSSI-CC-2015/45': 4, 'ANSSI-CC-2015/45-S01': 2}}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2010/03-M01': 1}, 'other': {'PP-SSCD-Part2': 2, 'PP-SSCD-Part3': 2, 'PP-SSCD-Part4': 2, 'PP-SSCD-': 1, 'PP-SSCD-Part6': 2, 'PP-SSCD-Part5': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 3, 'EAL4': 2, 'EAL5': 1, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E6 ElevĂ©': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_DVS.2': 3, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 7, 'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon': 1}, 'Morpho': {'Morpho': 13}}, 'eval_facility': {'CESTI': {'CESTI': 3}, 'CEA-LETI': {'CEA - LETI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-2': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 3}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {'ICFab': {'IC Fabricator': 1}, 'ICType': {'IC Type': 1}}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1, 'BSI-CC-PP-0059-2009-MA-01': 1, 'BSI-CC-PP-0075-2012': 1, 'BSI-CC-PP-0071-2012': 1, 'BSI-CC-PP-0072-2012': 1, 'BSI-CC-PP-0076-2013': 1}, 'ANSSI': {'ANSSI-CC-PP-': 1}, 'other': {'PP-SSCD2': 23, 'PP-SSCD3': 17, 'PP-SSCD4': 16, 'PP-SSCD5': 22, 'PP-SSCD6': 15, 'PP-SSCD': 1}}, 'cc_security_level': {'EAL': {'EAL 5+': 2, 'EAL5+': 4, 'EAL5': 5, 'EAL 5': 1, 'EAL4+': 1, 'EAL5 augmented': 5, 'EAL 5 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.5': 8, 'ADV_TDS.4': 8, 'ADV_IMP.1': 8, 'ADV_TDS.3': 3, 'ADV_INT.2': 1, 'ADV_FSP.2': 2, 'ADV_FSP.4': 1}, 'AGD': {'AGD_PRE': 3, 'AGD_OPE': 3, 'AGD_USR': 1, 'AGD_ADM': 1, 'AGD_OPE.1': 5, 'AGD_PRE.1': 5}, 'ALC': {'ALC_DVS.2': 8, 'ALC_TAT.1': 2, 'ALC_TAT.2': 3, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 3, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 6, 'ATE_COV.1': 2, 'ATE_DPT.1': 1, 'ATE_DPT.3': 1}, 'AVA': {'AVA_VAN.5': 8}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 1, 'FAU_GEN': 1}, 'FCO': {'FCO_NRO': 1}, 'FCS': {'FCS_RND': 5, 'FCS_RND.1': 9, 'FCS_CKM.1': 18, 'FCS_CKM.4': 12, 'FCS_COP.1': 10, 'FCS_CKM.2': 2, 'FCS_CKM.3': 1, 'FCS_CKM': 2, 'FCS_COP': 1, 'FCS_RND.1.1': 2, 'FCS_CKM.1.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 2}, 'FDP': {'FDP_UIT': 8, 'FDP_DAU': 7, 'FDP_ACC': 49, 'FDP_ACF': 39, 'FDP_RIP.1': 9, 'FDP_SDI': 18, 'FDP_ITC': 7, 'FDP_UCT': 9, 'FDP_IFC': 2, 'FDP_IFF': 2, 'FDP_RIP': 8, 'FDP_ROL': 1, 'FDP_SDI.2': 5, 'FDP_ACC.1': 15, 'FDP_ACF.1': 20, 'FDP_RIP.1.1': 1, 'FDP_ITC.1': 5, 'FDP_UCT.1': 1, 'FDP_DAU.2': 2, 'FDP_UIT.1': 2, 'FDP_ITC.2': 2, 'FDP_IFC.1': 7}, 'FIA': {'FIA_API': 5, 'FIA_API.1': 8, 'FIA_UAU.1': 18, 'FIA_UID.1': 18, 'FIA_AFL.1': 5, 'FIA_ATD': 1, 'FIA_UID': 2, 'FIA_USB': 1, 'FIA_API.1.1': 2, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1}, 'FMT': {'FMT_SMR.1': 23, 'FMT_SMF.1': 21, 'FMT_MOF.1': 8, 'FMT_MSA': 29, 'FMT_MSA.2': 10, 'FMT_MSA.3': 20, 'FMT_MSA.4': 12, 'FMT_MTD': 18, 'FMT_SMF': 2, 'FMT_SMR': 3, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_MOF.1.1': 1, 'FMT_MSA.1': 4, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.4.1': 1, 'FMT_MTD.1': 2}, 'FPR': {'FPR_UNO.1': 1}, 'FPT': {'FPT_EMS': 5, 'FPT_EMS.1': 11, 'FPT_FLS.1': 10, 'FPT_PHP.1': 6, 'FPT_PHP.3': 10, 'FPT_TST.1': 12, 'FPT_FLS': 3, 'FPT_TDC.1': 1, 'FPT_RCV': 3, 'FPT_PHP': 1, 'FPT_EMS.1.1': 4, 'FPT_EMS.1.2': 3, 'FPT_FLS.1.1': 1, 'FPT_TST': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC': 39, 'FTP_ITC.1': 14, 'FTP_TRP.1': 2}}, 'cc_claims': {'D': {'D.SCD': 1, 'D.SVD': 1}, 'O': {'O.SID': 1, 'O.FIREWALL': 1, 'O.GLOBAL_ARRAYS_CONFID': 1, 'O.GLOBAL_ARRAYS_INTEG': 1, 'O.NATIVE': 1, 'O.OPERATE': 1, 'O.REALLOCATION': 1, 'O.RESOURCES': 1, 'O.ALARM': 1, 'O.CIPHER': 1, 'O.KEY-MNGT': 1, 'O.PIN-MNGT': 1, 'O.BIO-MNGT': 1, 'O.TRANSACTION': 1, 'O.OBJ-DELETION': 1, 'O.DELETION': 1, 'O.LOAD': 1, 'O.INSTALL': 1, 'O.SCP': 3, 'O.CARD-MANAGEMENT': 1}, 'T': {'T.CONFID-APPLI-DATA': 1, 'T.CONFID-JCS-CODE': 1, 'T.CONFID-JCS-DATA': 1, 'T.INTEG-APPLI-CODE': 2, 'T.INTEG-APPLI-DATA': 2, 'T.INTEG-JCS-CODE': 1, 'T.INTEG-JCS-DATA': 1, 'T.SID': 2, 'T.EXE-CODE': 2, 'T.NATIVE': 1, 'T.RESOURCES': 1, 'T.DELETION': 1, 'T.INSTALL': 1, 'T.OBJ-DELETION': 1, 'T.PHYSICAL': 1, 'T.APP_DATA_INTEGRITY': 1, 'T.UNAUTH_CARD_MNGT': 1, 'T.LIFE_CYCLE': 1, 'T.UNAUTH_ACCESS': 1}, 'A': {'A.CSP': 9, 'A.CGA': 6, 'A.SCA': 5, 'A.APPLET': 1, 'A.VERIFICATION': 1, 'A.PRODUCTION': 1}, 'OE': {'OE.HI_VAD': 2, 'OE.HID_VAD': 5, 'OE.APPLET': 1, 'OE.VERIFICATION': 1, 'OE.CODE-EVIDENCE': 1, 'OE.SECURITY-DOMAINS': 1, 'OE.QUOTAS': 1, 'OE.SHARE-CONTROL': 1, 'OE.KEY_GENERATION': 1, 'OE.PRODUCTION': 1}, 'OSP': {'OSP.VERIFICATION': 1, 'OSP.SECURITY_DOMAINS': 1, 'OSP.QUOTAS': 1, 'OSP.KEY_GENERATION': 1, 'OSP.SHARE-CONTROL': 1}}, 'vendor': {'Infineon': {'Infineon': 10}, 'Morpho': {'Morpho': 4}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 8}}, 'DES': {'DES': {'DES': 1}, '3DES': {'TDES': 2, '3DES': 6}}, 'constructions': {'MAC': {'CMAC': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA-PSS': 1, 'RSA-OAEP': 1}, 'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 4}, 'ECC': {'ECC': 10}}, 'FF': {'DH': {'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}, 'SHA2': {'SHA-224': 4, 'SHA-384': 3, 'SHA-512': 4, 'SHA-256': 3, 'SHA-2': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 6}}, 'crypto_protocol': {'PACE': {'PACE': 25}}, 'randomness': {'RNG': {'RNG': 4}}, 'cipher_mode': {'CBC': {'CBC': 4}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 6}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 2, 'side channel': 1, 'DPA': 3, 'SPA': 3, 'timing attacks': 2}, 'FI': {'physical tampering': 5, 'malfunction': 1, 'DFA': 1, 'fault injection': 2, 'Fault injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS1': 5, 'PKCS#1': 2}, 'BSI': {'AIS31': 2}, 'ISO': {'ISO/IEC 7816-4': 1, 'ISO/IEC 9797-1': 1, 'ISO/IEC 15408:2005': 2}, 'ICAO': {'ICAO': 6}, 'CC': {'CCMB-2012-09-004': 2, 'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'Figure 1: TOE physical scope Beside the TOE, the product can include other Java Card applications (out of scope of the TOE). IdealCitiz Operating System enforces separation of the data between the applets and': 1}}}.
    • The report_filename property was set to ANSSI-CC-2016_64fr.pdf.
    • The st_filename property was set to ANSSI_cible2016_64en.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['CEA'].
    • The cert_id property was set to ANSSI-CC-2016/64.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2016/81', 'ANSSI-CC-2016/80']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2016/81', 'ANSSI-CC-2017/66', 'ANSSI-CC-2017/65', 'ANSSI-CC-2016/80']}, 'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2015/45', 'BSI-DSZ-CC-0782-V2-2015']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012', 'ANSSI-CC-2015/45', 'BSI-DSZ-CC-0782-V2-2015']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016_64fr.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2016_64en.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2016/81']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2016/81', 'ANSSI-CC-2017/65']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012']}}} data.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Applet ID.me v1.12 sur la plateforme IDeal Citiz v2.1 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "d00eee0668caeb9d",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2016/64",
    "cert_lab": [
      "CEA"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.12",
        "2.1"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2016/80",
          "ANSSI-CC-2016/81"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0782-V2-2015",
          "ANSSI-CC-2015/45"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2016/80",
          "ANSSI-CC-2016/81",
          "ANSSI-CC-2017/65",
          "ANSSI-CC-2017/66"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0782-V2-2015",
          "BSI-DSZ-CC-0782-2012",
          "ANSSI-CC-2015/45"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Safran Morpho",
  "manufacturer_web": "https://morpho.com",
  "name": "Applet ID.me v1.12 sur la plateforme IDeal Citiz v2.1",
  "not_valid_after": "2021-10-11",
  "not_valid_before": "2016-10-11",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "ANSSI-CC-2016_64fr.pdf",
    "report_frontpage": {
      "FR": {
        "cc_security_level": "EAL 5 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
        "cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 4",
        "cert_id": "ANSSI-CC-2016/64",
        "cert_item": "Applet ID.me v1.12 sur la plateforme IDeal Citiz v2.1",
        "cert_item_version": "Applet version 1.12, plateforme version 2.1",
        "cert_lab": "CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France",
        "developer": "MORPHO 18 Chauss\u00e9e Jules C\u00e9sar, 95520 Osny, France INFINEON Technologies AG AIM CC SM PS \u2013 Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Safran Identity \u0026 Security (anciennement MORPHO) 18 Chauss\u00e9e Jules C\u00e9sar, 95520 Osny, France",
        "match_rules": [
          "R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
        ],
        "ref_protection_profiles": "Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.0.1 ; Part 3: Device with key import, v1.0.2 ; Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1 ; Part 5: Extension for device with key generation and trusted communication with signature creation application, v1.0.1 ; Part 6: Extension for device with key import and trusted communication with signature creation application, v1.0.4"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0782-V2-2015": 1
        },
        "FR": {
          "ANSSI-CC-2015/45": 4,
          "ANSSI-CC-2015/45-S01": 2,
          "ANSSI-CC-2016/64": 17
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-2010/03-M01": 1
        },
        "other": {
          "PP-SSCD-": 1,
          "PP-SSCD-Part2": 2,
          "PP-SSCD-Part3": 2,
          "PP-SSCD-Part4": 2,
          "PP-SSCD-Part5": 1,
          "PP-SSCD-Part6": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_FSP": 1,
          "ADV_IMP": 1,
          "ADV_INT": 1,
          "ADV_SPM": 1,
          "ADV_TDS": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_PRE": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1,
          "ALC_DEL": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 3,
          "ALC_FLR": 2,
          "ALC_TAT": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.5": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 1,
          "EAL 5": 3,
          "EAL 7": 1,
          "EAL4": 2,
          "EAL5": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {
        "ICFab": {
          "IC Fabricator": 1
        },
        "ICType": {
          "IC Type": 1
        }
      },
      "crypto_engine": {},
      "crypto_library": {
        "Infineon": {
          "v1.02.013": 3
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA - LETI": 1
        },
        "CESTI": {
          "CESTI": 3
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-2": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2012-09-001": 1,
          "CCMB-2012-09-002": 1,
          "CCMB-2012-09-003": 1,
          "CCMB-2012-09-004": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 1
        },
        "Morpho": {
          "Morpho": 13
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "",
      "/CreationDate": "",
      "/Creator": "PDFCreator Version 1.2.1",
      "/Keywords": "",
      "/ModDate": "",
      "/Producer": "GPL Ghostscript 9.02",
      "/Subject": "",
      "/Title": "ANSSI-CC-2016_64fr",
      "pdf_file_size_bytes": 247324,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 16
    },
    "st_filename": "ANSSI_cible2016_64en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 10
          },
          "ECDH": {
            "ECDH": 1
          },
          "ECDSA": {
            "ECDSA": 4
          }
        },
        "FF": {
          "DH": {
            "DH": 1
          }
        },
        "RSA": {
          "RSA-OAEP": 1,
          "RSA-PSS": 1
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.APPLET": 1,
          "A.CGA": 6,
          "A.CSP": 9,
          "A.PRODUCTION": 1,
          "A.SCA": 5,
          "A.VERIFICATION": 1
        },
        "D": {
          "D.SCD": 1,
          "D.SVD": 1
        },
        "O": {
          "O.ALARM": 1,
          "O.BIO-MNGT": 1,
          "O.CARD-MANAGEMENT": 1,
          "O.CIPHER": 1,
          "O.DELETION": 1,
          "O.FIREWALL": 1,
          "O.GLOBAL_ARRAYS_CONFID": 1,
          "O.GLOBAL_ARRAYS_INTEG": 1,
          "O.INSTALL": 1,
          "O.KEY-MNGT": 1,
          "O.LOAD": 1,
          "O.NATIVE": 1,
          "O.OBJ-DELETION": 1,
          "O.OPERATE": 1,
          "O.PIN-MNGT": 1,
          "O.REALLOCATION": 1,
          "O.RESOURCES": 1,
          "O.SCP": 3,
          "O.SID": 1,
          "O.TRANSACTION": 1
        },
        "OE": {
          "OE.APPLET": 1,
          "OE.CODE-EVIDENCE": 1,
          "OE.HID_VAD": 5,
          "OE.HI_VAD": 2,
          "OE.KEY_GENERATION": 1,
          "OE.PRODUCTION": 1,
          "OE.QUOTAS": 1,
          "OE.SECURITY-DOMAINS": 1,
          "OE.SHARE-CONTROL": 1,
          "OE.VERIFICATION": 1
        },
        "OSP": {
          "OSP.KEY_GENERATION": 1,
          "OSP.QUOTAS": 1,
          "OSP.SECURITY_DOMAINS": 1,
          "OSP.SHARE-CONTROL": 1,
          "OSP.VERIFICATION": 1
        },
        "T": {
          "T.APP_DATA_INTEGRITY": 1,
          "T.CONFID-APPLI-DATA": 1,
          "T.CONFID-JCS-CODE": 1,
          "T.CONFID-JCS-DATA": 1,
          "T.DELETION": 1,
          "T.EXE-CODE": 2,
          "T.INSTALL": 1,
          "T.INTEG-APPLI-CODE": 2,
          "T.INTEG-APPLI-DATA": 2,
          "T.INTEG-JCS-CODE": 1,
          "T.INTEG-JCS-DATA": 1,
          "T.LIFE_CYCLE": 1,
          "T.NATIVE": 1,
          "T.OBJ-DELETION": 1,
          "T.PHYSICAL": 1,
          "T.RESOURCES": 1,
          "T.SID": 2,
          "T.UNAUTH_ACCESS": 1,
          "T.UNAUTH_CARD_MNGT": 1
        }
      },
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-": 1
        },
        "BSI": {
          "BSI-CC-PP-0059-2009-MA-01": 1,
          "BSI-CC-PP-0071-2012": 1,
          "BSI-CC-PP-0072-2012": 1,
          "BSI-CC-PP-0075-2012": 1,
          "BSI-CC-PP-0076-2013": 1,
          "BSI-PP-0035": 1
        },
        "other": {
          "PP-SSCD": 1,
          "PP-SSCD2": 23,
          "PP-SSCD3": 17,
          "PP-SSCD4": 16,
          "PP-SSCD5": 22,
          "PP-SSCD6": 15
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 6,
          "ADV_FSP.1": 3,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 8,
          "ADV_IMP.1": 8,
          "ADV_INT.2": 1,
          "ADV_TDS.1": 2,
          "ADV_TDS.3": 3,
          "ADV_TDS.4": 8
        },
        "AGD": {
          "AGD_ADM": 1,
          "AGD_OPE": 3,
          "AGD_OPE.1": 5,
          "AGD_PRE": 3,
          "AGD_PRE.1": 5,
          "AGD_USR": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.5": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 8,
          "ALC_LCD.1": 3,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 3
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 5,
          "ASE_OBJ.2": 3,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 3,
          "ATE_DPT.1": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 6
        },
        "AVA": {
          "AVA_VAN.5": 8
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL 5 augmented": 1,
          "EAL 5+": 2,
          "EAL4+": 1,
          "EAL5": 5,
          "EAL5 augmented": 5,
          "EAL5+": 4
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 1,
          "FAU_GEN": 1
        },
        "FCO": {
          "FCO_NRO": 1
        },
        "FCS": {
          "FCS_CKM": 2,
          "FCS_CKM.1": 18,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 2,
          "FCS_CKM.3": 1,
          "FCS_CKM.4": 12,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 1,
          "FCS_COP.1": 10,
          "FCS_COP.1.1": 2,
          "FCS_RND": 5,
          "FCS_RND.1": 9,
          "FCS_RND.1.1": 2
        },
        "FDP": {
          "FDP_ACC": 49,
          "FDP_ACC.1": 15,
          "FDP_ACF": 39,
          "FDP_ACF.1": 20,
          "FDP_DAU": 7,
          "FDP_DAU.2": 2,
          "FDP_IFC": 2,
          "FDP_IFC.1": 7,
          "FDP_IFF": 2,
          "FDP_ITC": 7,
          "FDP_ITC.1": 5,
          "FDP_ITC.2": 2,
          "FDP_RIP": 8,
          "FDP_RIP.1": 9,
          "FDP_RIP.1.1": 1,
          "FDP_ROL": 1,
          "FDP_SDI": 18,
          "FDP_SDI.2": 5,
          "FDP_UCT": 9,
          "FDP_UCT.1": 1,
          "FDP_UIT": 8,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_AFL.1": 5,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_API": 5,
          "FIA_API.1": 8,
          "FIA_API.1.1": 2,
          "FIA_ATD": 1,
          "FIA_UAU.1": 18,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UID": 2,
          "FIA_UID.1": 18,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB": 1
        },
        "FMT": {
          "FMT_MOF.1": 8,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 29,
          "FMT_MSA.1": 4,
          "FMT_MSA.2": 10,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 20,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MSA.4": 12,
          "FMT_MSA.4.1": 1,
          "FMT_MTD": 18,
          "FMT_MTD.1": 2,
          "FMT_SMF": 2,
          "FMT_SMF.1": 21,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 3,
          "FMT_SMR.1": 23,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO.1": 1
        },
        "FPT": {
          "FPT_EMS": 5,
          "FPT_EMS.1": 11,
          "FPT_EMS.1.1": 4,
          "FPT_EMS.1.2": 3,
          "FPT_FLS": 3,
          "FPT_FLS.1": 10,
          "FPT_FLS.1.1": 1,
          "FPT_PHP": 1,
          "FPT_PHP.1": 6,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 10,
          "FPT_PHP.3.1": 1,
          "FPT_RCV": 3,
          "FPT_TDC.1": 1,
          "FPT_TST": 1,
          "FPT_TST.1": 12,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 39,
          "FTP_ITC.1": 14,
          "FTP_TRP.1": 2
        }
      },
      "certification_process": {
        "OutOfScope": {
          "Figure 1: TOE physical scope Beside the TOE, the product can include other Java Card applications (out of scope of the TOE). IdealCitiz Operating System enforces separation of the data between the applets and": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Infineon": {
          "v1.02.013": 6
        }
      },
      "crypto_protocol": {
        "PACE": {
          "PACE": 25
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 6
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 4
          },
          "SHA2": {
            "SHA-2": 2,
            "SHA-224": 4,
            "SHA-256": 3,
            "SHA-384": 3,
            "SHA-512": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 4
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1,
          "Fault injection": 1,
          "fault injection": 2,
          "malfunction": 1,
          "physical tampering": 5
        },
        "SCA": {
          "DPA": 3,
          "SPA": 3,
          "physical probing": 2,
          "side channel": 1,
          "timing attacks": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 2
        },
        "CC": {
          "CCMB-2012-09-001": 1,
          "CCMB-2012-09-002": 1,
          "CCMB-2012-09-003": 1,
          "CCMB-2012-09-004": 2
        },
        "ICAO": {
          "ICAO": 6
        },
        "ISO": {
          "ISO/IEC 15408:2005": 2,
          "ISO/IEC 7816-4": 1,
          "ISO/IEC 9797-1": 1
        },
        "PKCS": {
          "PKCS#1": 2,
          "PKCS1": 5
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 8
          }
        },
        "DES": {
          "3DES": {
            "3DES": 6,
            "TDES": 2
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 10
        },
        "Morpho": {
          "Morpho": 4
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "IOTR",
      "/CreationDate": "D:20160809141740+02\u002700\u0027",
      "/Creator": "PDFCreator Version 1.6.2",
      "/Keywords": "",
      "/ModDate": "D:20160809141740+02\u002700\u0027",
      "/Producer": "GPL Ghostscript 9.05",
      "/Subject": "",
      "/Title": "2016_2000019402 Security Target Lite  IDeal Citiz v2.1 ID me",
      "pdf_file_size_bytes": 1016477,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 107
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf",
        "pp_name": "Protection profiles for secure signature creation device \u2014 Part 5: Extension for device with key gene..."
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf",
        "pp_name": "Protection profiles for secure signature creation device - Part 6: Extension for device with key impo..."
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf",
        "pp_name": "Protection profiles for secure signature creation device - Part 3: Device with key import"
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf",
        "pp_name": "Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version..."
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016_64fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL5+",
      "AVA_VAN.5",
      "ALC_DVS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2016_64en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "00e7cba9ae2856edb16b5adbeb9c9f67b92719c6591fdc217b707c941829bc4d",
      "txt_hash": "92828eb651367bb2fed5ccebad4258fe5b092b675cafd5551816f5cf050bed84"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "50eadc5c44fa2b96ae7c9b651a3618cde8d30fef1496724b9f071d36342a524a",
      "txt_hash": "b090e567c7301fe9abb0da858c22893afe6ba92d36618e542b90af021477c27d"
    }
  },
  "status": "archived"
}