Connected eSE 5.3.4 v1.2 Platform (Revision 1.0) (ANSSI-CC-2025/04)

CSV information ?

Status active
Valid from 12.02.2025
Valid until 12.02.2030
Scheme 🇫🇷 FR
Manufacturer THALES DIS FRANCE SA
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, EAL4+, ALC_DVS.2, ALC_FLR.1

Heuristics summary ?

Certificate ID: ANSSI-CC-2025/04

Certificate ?

Extracted keywords

Vendor
Thales

Security level
EAL4, EAL2
Security Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.1, AVA_VAN.5
Certificates
ANSSI-CC-2025/04, 2020-37-INF-3429- v1
Evaluation facilities
Serma Safety & Security

File metadata

Creation date D:20250213155808+01'00'
Modification date D:20250213155922+01'00'
Pages 2
Creator Acrobat PDFMaker 23 pour Word
Producer Adobe PDF Library 23.1.175

Certification report ?

Extracted keywords

Symmetric Algorithms
DES

Vendor
Thales

Security level
EAL4, EAL2, EAL7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.1, ALC_FLR, AVA_VAN.5, AVA_VAN
Certificates
ANSSI-CC-2025/04, NSCIB-CC-2300182-01, 2020-37-INF-3429- v1
Evaluation facilities
SERMA, CESTI

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Creation date D:20250213155846+01'00'
Modification date D:20250213155921+01'00'
Pages 16
Creator Acrobat PDFMaker 23 pour Word
Producer Adobe PDF Library 23.1.175

References

Outgoing

Security target ?

Extracted keywords

Symmetric Algorithms
AES, AES128, DES, TDES, 3DES, HMAC, KMAC, CMAC, CBC-MAC
Asymmetric Algorithms
RSA 1024, ECDH, ECDSA, ECC, DH, Diffie-Hellman
Hash functions
SHA-1, SHA1, SHA-256, SHA-384, SHA-512, SHA224, SHA256, SHA384, SHA512, SHA-224, SHA3-224, SHA3-256, SHA3-384, SHA3-512
Schemes
MAC, Key Exchange, Key Agreement, Key agreement
Protocols
TLS, PACE, PGP
Randomness
RNG, RND
Block cipher modes
ECB, CBC, CTR, GCM, CCM
TLS cipher suites
TLS_PSK_WITH_AES_128_CBC_S, TLS_PSK_WITH_NULL_SHA, TLS_PSK_WITH_NULL_SHA256

JavaCard versions
Java Card 3.1.0, Global Platform 2.3.1
JavaCard API constants
ALG_DES_CBC_NOPAD, ALG_DES_CBC_ISO9797_M1, ALG_DES_CBC_ISO9797_M2, ALG_DES_CBC_PKCS5, ALG_DES_ECB_NOPAD, ALG_DES_ECB_ISO9797_M1, ALG_DES_ECB_ISO9797_M2, ALG_DES_ECB_PKCS5, ALG_DES_MAC4_ISO9797_1_M1_ALG3, ALG_DES_MAC4_ISO9797_1_M2_ALG3, ALG_DES_MAC4_ISO9797_M1, ALG_DES_MAC4_ISO9797_M2, ALG_DES_MAC4_PKCS5, ALG_DES_MAC4_NOPAD, ALG_DES_MAC8_ISO9797_1_M1_ALG3, ALG_DES_MAC8_ISO9797_1_M2_ALG3, ALG_DES_MAC8_ISO9797_M1, ALG_DES_MAC8_ISO9797_M2, ALG_DES_MAC8_PKCS5, ALG_DES_MAC8_NOPAD, ALG_RSA_SHA_224_PKCS1, ALG_RSA_SHA_224_PKCS1_PSS, ALG_RSA_SHA_256_PKCS1, ALG_RSA_SHA_256_PKCS1_PSS, ALG_RSA_SHA_384_PKCS1, ALG_RSA_SHA_384_PKCS1_PSS, ALG_RSA_SHA_512_PKCS1, ALG_RSA_SHA_512_PKCS1_PSS, ALG_RSA_SHA_ISO9796, ALG_RSA_SHA_ISO9796_MR, ALG_RSA_SHA_PKCS1, ALG_RSA_SHA_PKCS1_PSS, ALG_RSA_SHA_RFC2409, ALG_RSA_NOPAD, ALG_RSA_PKCS1_OAEP, ALG_RSA_PKCS1, ALG_ECDSA_SHA, ALG_ECDSA_SHA_224, ALG_ECDSA_SHA_256, ALG_ECDSA_SHA_384, ALG_ECDSA_SHA_512, ALG_AES_BLOCK_128_CBC_NOPAD, ALG_AES_CBC_ISO9797_M1, ALG_AES_CBC_ISO9797_M2, ALG_AES_CBC_PKCS5, ALG_AES_BLOCK_128_ECB_NOPAD, ALG_AES_ECB_ISO9797_M1, ALG_AES_ECB_ISO9797_M2, ALG_AES_ECB_PKCS5, ALG_AES_CTR, ALG_AES_CCM, ALG_AES_GCM, ALG_AES_MAC_128_NOPAD, ALG_AES_CMAC_128, ALG_AES_MAC_192_NOPAD, ALG_AES_MAC_256_NOPAD, ALG_HMAC_SHA1, ALG_HMAC_SHA_256, ALG_HMAC_SHA_384, ALG_HMAC_SHA_512, ALG_EC_FP, ALG_EC_SVDP_DH_KDF, ALG_EC_SVDP_DH_PLAIN_XY, ALG_EC_SVDP_DHC_KDF, ALG_EC_SVDP_DH_PLAIN, ALG_EC_SVDP_DHC_PLAIN, ALG_SHA_224, ALG_SHA_256, ALG_SHA_384, ALG_SHA_512, ALG_SHA3_224, ALG_SHA3_256, ALG_SHA3_384, ALG_SHA3_512, ALG_ISO3309_CRC16, ALG_ISO3309_CRC32, SIG_CIPHER_DES_MAC4, SIG_CIPHER_DES_MAC8, SIG_CIPHER_AES_MAC128, SIG_CIPHER_AES_CMAC128, SIG_CIPHER_RSA, SIG_CIPHER_ECDSA, SIG_CIPHER_ECDSA_PLAIN, SIG_CIPHER_HMAC, CIPHER_AES_CCM, CIPHER_AES_GCM, PAD_PKCS1_OAEP, PAD_PKCS1_OAEP_SHA256, PAD_PKCS1_OAEP_SHA3_256, PAD_PKCS1_OAEP_SHA3_512, PAD_PKCS1_OAEP_SHA512, TYPE_ACCESS, TYPE_EC_FP_PRIVATE, TYPE_EC_FP_PRIVATE_TRANSIENT_RESET, TYPE_HMAC_TRANSIENT_RESET, TYPE_HMAC, LENGTH_EC_FP_160, LENGTH_EC_FP_192, LENGTH_EC_FP_224, LENGTH_EC_FP_256, LENGTH_EC_FP_384, LENGTH_EC_FP_521, LENGTH_HMAC_SHA_1_BLOCK_64, LENGTH_HMAC_SHA_256_BLOCK_64, LENGTH_HMAC_SHA_384_BLOCK_64, LENGTH_HMAC_SHA_384_BLOCK_128, LENGTH_HMAC_SHA_512_BLOCK_64, LENGTH_HMAC_SHA_512_BLOCK_128, LENGTH_RSA_1024, LENGTH_RSA_1536, LENGTH_RSA_2048, LENGTH_SHA, LENGTH_AES_128, LENGTH_SHA_224, LENGTH_SHA_384, LENGTH_SHA3_224, LENGTH_SHA3_384, BRAINPOOLP192R1, BRAINPOOLP224R1, BRAINPOOLP256R1, BRAINPOOLP320R1, BRAINPOOLP384R1, BRAINPOOLP512R1, BRAINPOOLP256T1, BRAINPOOLP320T1, BRAINPOOLP384T1, BRAINPOOLP512T1, SECP192R1, SECP256R1, SECP521R1, SECP384R1
Trusted Execution Environments
SE
Vendor
STMicroelectronics, Thales

Security level
EAL4+, EAL4, EAL6+, EAL4 augmented
Claims
D.ISD_KEYS, D.APP_KEYS, D.APSD_KEYS, D.CASD_KEYS, D.GP_REGISTRY, D.GP_CODE, D.TOE_IDENTIFIER, D.CLFDB-DK, D.GS-PARAMETERS, D.CVM_PIN, D.CVM_MGMT_STATE, D.TOKEN-, D.RECEIPT-, D.CONFIRMATION-, D.DAP_BLOCK, D.APSD_DAP_KEYS, D.CASD_DAP_KEYS, D.CCCM_KEYS, D.CTL_REGISTRY, D.CTL_PRO, D.OLD_ELF, D.NEW_ELF, D.ELF_AID, D.ELF_SESSION_ST, D.ELF_APP_INS, D.ELF_RG_DATA, D.OS-, D.OS-UPDATE_DEC-, D.OS-UPDATE-CODE-, D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.RECEIPT-GENERATION-KEY, D.CONFIRMATION-DATA, D.TOKEN-VERIFICATION-KEY, D.OS-UPDATE_ADDITIONALCODE, D.OS-UPDATE_SGNVER-KEY, D.OS, D.OS-UPDATE-CODE-ID, D.OS-UPDATE_DEC-KEY, O.KEY-MNGT, O.CARD-, O.DOMAIN-RIGHTS, O.APPLI-AUTH, O.SECURITY-, O.COMM-AUTH, O.COMM-INTEGRITY, O.COMM-, O.NO-KEY-REUSE, O.PRIVILEGES-, O.LC-MANAGEMENT, O.CLFDB-DECIPHER, O.GLOBAL-CVM, O.CVM-BLOCK, O.CVM-MGMT, O.RECEIPT, O.TOKEN, O.CCCM, O.CTL_REGISTRY, O.CTL_SC, O.CRS_PRIVILEGES, O.CRS_COUNTERS, O.ELF_AUTHORISED, O.ELF_INTEGRITY, O.ELF_APP_DATA, O.ELF_SESSION, O.ELF_DELE_IRR, O.ELF_DATA_PRO, O.SECURE_LOAD_AC, O.SECURE_AC_ACTIV, O.TOE_IDENTIFICATI, O.CONFID-OS-, O.SID, O.FIREWALL, O.GLOBAL_ARRAY, O.ARRAY_VIEWS_, O.ARRAY_VIEWS_I, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.RNG, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.SCP, O.SENSITIVE_ARR, O.SENSITIVE_RES, O.MTC-CTR-MNGT, O.CRT-MNGT, O.CARD-MANAGEMENT, O.COMM-CONFIDENTIALITY, O.PRIVILEGES-MANAGEMENT, O.SECURE_LOAD_ACODE, O.SECURE_AC_ACTIVATION, O.TOE_IDENTIFICATION, O.CONFID-OS-UPDATE, O.GLOBAL_ARRAYS_CONFID, O.ARRAY_VIEWS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.ARRAY_VIEWS_INTEG, O.MTC-CTR-, O.SENSITIVE_ARRAYS_INTEG, O.SENSITIVE_RESULTS_INTEG, O.SECURITY-DOMAINS, O.RND, O.TOE-, O.PIN-, O.APPLET, O.CODE_CAP_FILE, O.JAVAOBJECT, O.JAVAOB, O.JAVAO, O.CODE_, O.JAVAOBJE, O.CODE_PKG, T.UNAUTHORISED-, T.LIFE-CYCLE, T.COM-EXPLOIT, T.BRUTE-FORCE-SCP, T.CLFDB-DISC, T.CVM-IMPERSONATE, T.CVM-UPDATE, T.BRUTE-FORCE-CVM, T.RECEIPT, T.TOKEN, T.CTL-REGISTRY-, T.COUNTERS-FREEZE, T.CTL-AUTH-FORGE, T.CRS-BYPASS, T.ELF-UNAUTHORISED, T.ELF-VERSION, T.ELF-DATA-ACCESS, T.ELF-DATA-INTEGRITY, T.ELF-SESSION, T.ELF-ILL-COMMAND, T.ELF-RES-DATA, T.UNAUTHORISED-TOE-, T.FAKE-SGNVER-KEY, T.WRONG-UPDATE-, T.INTEG-OS-UPDATE-, T.CONFID-OS-UPDATE-, T.CONFID-APPLI-, T.CONFID-JCS-, T.INTEG-APPLI-, T.INTEG-JCS-, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.UNAUTHORISED-CARD-MGMT, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, T.RND, T.CONFID-APPLI-DATA, T.INTEG-APPLI-DATA, T.CTL-REGISTRY-OVERWRITE, T.UNAUTHORISED-TOE-CODE-, T.WRONG-UPDATE-STATE, T.INTEG-OS-UPDATE-LOAD, T.CONFID-OS-UPDATE-LOAD, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-JCS-CODE, T.UNAUTHORISED-TOE-CODE-UPDATE, A.ISSUER, A.ADMIN, A.APPS-PROVIDER, A.VERIFICATION-, A.KEY-ESCROW, A.PERSONALISER, A.CONTROLLING-, A.PRODUCTION, A.SCP-SUPP, A.KEYS-PROT, A.OS-UPDATE-, A.SECURE_ACODE_, A.CAP_FILE, A.VERIFICA, A.VERIFICATION-AUTHORITY, A.CONTROLLING-AUTHORITY, A.OS-UPDATE-EVIDENCE, A.SECURE_ACODE_MANAGEMENT, A.VERIFICATION, R.JAVA, OP.ARRAY_ACCESS, OP.ARRAY_LENGTH, OP.ARRAY_T_ALOAD, OP.ARRAY_T_ASTORE, OP.ARRAY_AASTORE, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_CAP_FILE, OP.DELETE_CAP_FILE_APPLET, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUTFIELD, OP.PUTSTATIC, OP.PUT, OE.SCP, OE.OS-UPDATE-ENCRYPTION, OE.ISSUER, OE.ADMIN, OE.APPS-PROVIDER, OE.VERIFICATION-, OE.KEY-ESCROW, OE.PERSONALISER, OE.CONTROLLING-, OE.SCP-SUPP, OE.KEYS-PROT, OE.PRODUCTION, OE.APPLICATIONS, OE.AID-MANAGEMENT, OE.LOADING, OE.SERVERS, OE.AP-KEYS, OE.ISD-KEYS, OE.KEY-GENERATION, OE.CA-KEYS, OE.KEY-CHANGE, OE.CLFDB-ENC-PR, OE.TOKEN-GEN, OE.RECEIPT-VER, OE.DAP_BLOCK_GEN, OE.OS-UPDATE-EVIDENCE, OE.OS-UPDATE-, OE.SECURE_ACODE_MANA, OE.CAP_FILE, OE.VERIFICATION, OE.CODE-, OE.CODE-EVIDENCE, OE.VERIFICATION-AUTHORITY, OE.CONTROLLING-AUTHORITY, OE.SECURE_ACODE_MANAGEMENT, OSP.AID-MANAGEMENT, OSP.LOADING, OSP.SERVERS, OSP.APSD-KEYS, OSP.ISD-KEYS, OSP.KEY-GENERATION, OSP.CASD-KEYS, OSP.KEY-CHANGE, OSP.SECURITY-DOMAINS, OSP.APPLICATIONS, OSP.CLFDB-ENC-PR, OSP.TOKEN-GEN, OSP.RECEIPT-VER, OSP.DAP_BLOCK_GEN, OSP.CCCM, OSP.ELF_DELE_OP, OSP.ATOMIC_ACTIVATION, OSP.TOE_IDENTIFICATION, OSP.ADDITIONAL_CODE_SIG, OSP.ADDITIONAL_CODE_EN, OSP.VERIFICATION, OSP.ADDITIONAL_CODE_SIGNING, OSP.ADDITIONAL_CODE_ENCRYPTION
Security Assurance Requirements (SAR)
ADV_ARC, ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ADV_FSP.2, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_FLR.1, ALC_FLR.2, ALC_TAT.1, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN, FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FAU_SAS.1, FAU_SAR, FAU_SAS, FCO_NRO, FCO_NRO.2, FCO_NRR, FCO_NRR.1, FCS_RNG.1, FCS_CKM.5, FCS_RNG, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.5.1, FCS_COP, FCS_CKM.4.1, FDP_IFC, FDP_IFC.2, FDP_IFF, FDP_IFF.1, FDP_ITC, FDP_ITC.2, FDP_UIT, FDP_UIT.1, FDP_ROL, FDP_ROL.1, FDP_UCT, FDP_UCT.1, FDP_ACC, FDP_ACC.1, FDP_ACF, FDP_ACF.1, FDP_ACC.2, FDP_IFC.1, FDP_RIP, FDP_RIP.1, FDP_SDI, FDP_SDI.2, FDP_SDI.2.2, FDP_ITC.1, FDP_SDC.1, FDP_ITT.1, FIA_UID, FIA_UID.1, FIA_UAU, FIA_UAU.1, FIA_UAU.4, FIA_AFL, FIA_AFL.1, FIA_ATD, FIA_ATD.1, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_API.1, FMT_MTD, FMT_MTD.1, FMT_MSA, FMT_MSA.1, FMT_SMR, FMT_MSA.3, FMT_SMR.1, FMT_SMF, FMT_SMF.1, FMT_MTD.3, FMT_MSA.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_LIM, FPR_UNO, FPR_UNO.1, FPR_UNO.1.1, FPT_RCV, FPT_RCV.3, FPT_FLS, FPT_FLS.1, FPT_TDC, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_RCV.4, FPT_STM, FPT_STM.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2, FTP_TRP, FTP_TRP.1, FTP_ITC, FTP_ITC.1
Protection profiles
BSI-CC-PP-0099-V2-2020, BSI-CC-PP-0084-2014
Certificates
CC-1, CC-2, CC-3, NSCIB-CC-2300182-01

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, side channel, DPA, physical tampering, malfunction, Malfunction, JIL
Certification process
out of scope, GemActivate). The platform implements the following modes, but they are out of scope of the TOE: ▪ mEAC v1, of software patches (GemActivate). The platform implements the following modes, but they are out of scope of the TOE: ▪ mEAC v1. ▪ Integrated mapping (DH and ECDH). ▪ Generic mapping (DH) ▪ PACE and mEAC, protection of the confidentiality and integrity of user data, and for entity authentication. CSP is out of scope of the TOE. CSP provides service, including: Connected eSE 5.3.4 v1.2 Platform Security Target, v1.2 Platform Security Target Lite © Copyright Thales DIS France SAS - 2024 Page: 62 / 171 point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are

Standards
FIPS PUB 180-4, FIPS PUB 186-4, FIPS 197, FIPS PUB 197, FIPS 198, FIPS 180, FIPS 197126, FIPS PUB 46-3, FIPS PUB 81, FIPS PUB 186-4184, FIPS 180-4, FIPS 202, PKCS#1, PKCS #1, PKCS#5157, PKCS#5161, PKCS#5, AIS20, AIS31, RFC2104, RFC 5758, RFC3610165, RFC2409174, RFC2409, RFC 5246, RFC 5869, ISO/IEC 10116, ISO/IEC 14888-2, ISO/IEC 18032, ISO/IEC 18033-3, ISO/IEC 9797-1, ISO/IEC 9797-2, ISO/IEC 9796-2, ISO/IEC 3309206, ISO/IEC 18032:2020, ICAO, X.509, SCP11, SCP02, SCP80, SCP81, SCP03, SCP10, SCP22, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Creation date D:20241031112531+01'00'
Modification date D:20241031112531+01'00'
Pages 171
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

References

Outgoing

Heuristics ?

Certificate ID: ANSSI-CC-2025/04

Extracted SARs

ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, AVA_VAN.5

Similar certificates

Name Certificate ID
Connected eSE 5.3.4 Platform v1.1 (Revision 1.0) (ANSSI-CC-2024/33) ANSSI-CC-2024/33 Compare
ChipDoc v3.2 on JCOP 4 P71 in ICAO EAC(1&2) with PACE configuration (Version 3.2.0.52) (ANSSI-CC-2025/02) ANSSI-CC-2025/02 Compare
ChipDoc v3.2 on JCOP 4 P71 in SSCD configuration (Version 3.2.0.52) (ANSSI-CC-2025/03) ANSSI-CC-2025/03 Compare
ChipDoc v3.2 on JCOP 4 P71 in ICAO BAC configuration (Version 3.2.0.52)(ANSSI-CC-2025/01) ANSSI-CC-2025/01 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/54) ANSSI-CC-2023/54 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/56) ANSSI-CC-2023/56 Compare
eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated(version 2.3.0.1) ( ANSSI-CC-2023/55 ) ANSSI-CC-2023/55 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration (Version 4.0.1.52) (ANSSI-CC-2023/11-R01) ANSSI-CC-2023/11-R01 Compare
eTravel v2.2 BAC on MultiApp v4.0.1 platform with Filter Set 1.0 (version 1.0) (ANSSI-CC-2020/43-R01) ANSSI-CC-2020/43-R01 Compare
eTravel v2.2 EAC/SAC on MultiApp v4.0.1 platform with Filter Set 1.0 (version 1.0) (ANSSI-CC-2020/45-R01) ANSSI-CC-2020/45-R01 Compare
eTravel v2.2 EAC/BAC on MultiApp v4.0.1 platform with Filter Set 1.0 (version 1.0) (ANSSI-CC-2020/44-R01) ANSSI-CC-2020/44-R01 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration Version 4.1.1.52 ( ANSSI-CC-2023/68) ANSSI-CC-2023/68 Compare
NPCT6xx TPM 2.0 Hardware version FB5C85D and FB5C85E, Firmware version 1.3.0.1, 1.3.1.0 and 1.3.2.8 ANSSI-CC-2017/55 Compare
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6 BSI-DSZ-CC-0772-2014 Compare
Produit IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 Version 5.2.1.A.C et 5.2.1.A.O ( ANSSI-CC-2023/42 ) ANSSI-CC-2023/42 Compare
IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A (ANSSI-CC-2023/57 ) ANSSI-CC-2023/57 Compare
SAMSUNG S3FV9QM / S3FV9QK référence : S3FV9QM/S3FV9QK rev3_TRCv1.0_PKALibv1.4-GUIv1.38a_DTRNGlibv2.0/3.0-Iv1.2_BLv2.1/2.2-GUI1.2_BLv2.6-GUIv1.2.7_DOC-UMv1.11-SANv1.5-CDSv3.2 ANSSI-CC-2017/16 Compare
S3NSEN4/S3NSEN3 with Bootloader & system API v1.1, DTRNG FRO M libraries v2.2, v3.3 & PTG.1 DTRNG FRO M library v1.4 (Revision 1) ANSSI-CC-2021/30 Compare
S3NSEN4/S3NSEN3 with Bootloader & system API v1.1, DTRNG FRO M libraries v2.2, v3.3 & PTG.1 DTRNG FROM library v1.4 (Revision 1) ANSSI-CC-2021/30-R01 Compare
MISTRAL VS9 (Software v9.2.3.5 / Hardware IP9001 & IP9010) (ANSSI-CC-2025/06) ANSSI-CC-2025/06 Compare
NXP JCOP6.x on SN200.C04 Secure Element, versions JCOP6.0 R1.13.0 "SN200", JCOP6.1 R1.04.0 "SN200", JCOP6.1 R1.04.0 "SN210", JCOP6.4 R1.06.0 "SN200", JCOP6.4 R1.06.0 "SN210", JCOP6.5 R1.04.0 "SN200", JCOP6.5 R1.04.0 "SN210", JCOP6.6 R1.06.0 "SN200", JCOP6.6 R1.06.0 "SN210" NSCIB-CC-2300044-02-CR Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.2.2) (ANSSI-CC-2024/10) ANSSI-CC-2024/10 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.2.2) (ANSSI-CC-2024/11) ANSSI-CC-2024/11 Compare
eTravel 3.1 BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/34 ) ANSSI-CC-2023/34 Compare
eTravel 3.1 EAC on SAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/36 ) ANSSI-CC-2023/36 Compare
eTravel 3.1 EAC on BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/35 ) ANSSI-CC-2023/35 Compare
Ricoh imagio MP C3302 SP/C3302 SPF/C2802 SP/C2802 SPF all of above with Facsimile Function Version: - Software: System/Copy 1.05.4, Network Support 11.77, Fax 02.00.00, RemoteFax 02.00.00, NetworkDocBox 1.04, Web Support 1.07, Web Uapl 1.03, animation 1.00, Scanner 01.09, Printer 1.05.1, RPCS 3.12.23, RPCS Font 1.03, Data Erase Onb 1.01x, GWFCU3.5-4(WW) 01.00.04, Engine 0.16:04, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware: Ic Key 01020700, Ic Ctlr 03 JISEC-CC-CRP-C0352 Compare
Ricoh imagio MP C5002 SP/C5002 SPF/C4002 SP/C4002 SPF all of above with Facsimile Function Version: - Software: System/Copy 1.05.4, Network Support 11.77, Fax 02.00.00, RemoteFax 02.00.00, NetworkDocBox 1.04, Web Support 1.07, Web Uapl 1.03, animation 1.00, Scanner 01.09, Printer 1.05.1, RPCS 3.12.23, RPCS Font 1.03, Data Erase Onb 1.01x, GWFCU3.5-4(WW) 01.00.04, Engine 0.16:04, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware: Ic Key 01020700, Ic Ctlr 03 JISEC-CC-CRP-C0356 Compare
Ricoh imagio MP C5002A SP/C4002A SP all of above with Facsimile Function Version: - Software: System/Copy 1.05.4, Network Support 11.77, Fax 02.00.00, RemoteFax 02.00.00, NetworkDocBox 1.04, Web Support 1.07, Web Uapl 1.03, animation 1.00, Scanner 01.09, Printer 1.05.1, RPCS 3.12.23, RPCS Font 1.03, Data Erase Onb 1.01x, GWFCU3.5-4(WW) 01.00.04, Engine 0.16:02, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware: Ic Key 01020700, Ic Ctlr 03 JISEC-CC-CRP-C0354 Compare
MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip(MultiApp v4.0.1 with Filter Set 1.0) (ANSSI-CC-2020/42-R01) ANSSI-CC-2020/42-R01 Compare
Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h (Version 4.2.0, Java Card version 3.0.5, GP version 2.3) ANSSI-CC-2020/65v2 Compare
TESS v5.1 Platform (Revision 1.0) (ANSSI-CC-2024/28) ANSSI-CC-2024/28 Compare
TESS v5.0 Platform (revision 1.0) (ANSSI-CC-2024/12) ANSSI-CC-2024/12 Compare
secunet konnektor 2.0.0 und 2.0.1, Version 5.50.1:2.0.0 und 5.50.1:2.0.1 BSI-DSZ-CC-1044-V7-2023 Compare
IAS ECC v2, version 1.3, in configuration #4 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’application : F0 02 02 13 (ANSSI-CC-2020/53-R01) ANSSI-CC-2020/53-R01 Compare
ChipDoc v3.1 on JCOP 4 P71 in ICAO EAC(1&2) with PACE configuration (Version 3.1.6.52) (ANSSI-CC-2021/19-R01) ANSSI-CC-2021/19-R01 Compare
Digital Identity on MultiApp v4.0.1 platform with Filter Set 1.0 - PACE, EAC(version 1.0) (ANSSI-CC-2020/49-R01) ANSSI-CC-2020/49-R01 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.2.2) (ANSSI-CC-2024/09) ANSSI-CC-2024/09 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in SSCD configuration Version 4.1.1.52 (ANSSI-CC-2023/69) ANSSI-CC-2023/69 Compare
Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1 CCEVS-VR-VID-10443-2012 Compare
ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52) (ANSSI-CC-2023/12-R01) ANSSI-CC-2023/12-R01 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO BAC configuration Version 4.1.1.52 ( ANSSI-CC-2023/67) ANSSI-CC-2023/67 Compare
Microcontrôleur sécurisé ST33H768 révision C,Firmware révision 5, incluant optionnellement la bibliothèque cryptographique Neslib versions 4.1 et 4.1.1 et la bibliothèque MIFARE4Mobile version 2.1.0 ANSSI-CC-2017/01 Compare
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH(Version 4.1.0.2) ( ANSSI-CC-2023/30 ) ANSSI-CC-2023/30 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO BAC configuration (Version 4.0.1.52) ( ANSSI-CC-2023/10-R01 ) ANSSI-CC-2023/10-R01 Compare
PPCA application v1.0.1.3 on MultiApp v4.0.1 Platform ANSSI-CC-2018/21 Compare
Cryptek Inc. DiamondTEK (DiamondCentral (NSC Application S/W version 2.4.0.5, NSD-Prime F/W version 2.4.0.3) and NSD (DiamondLink, DiamondPak, DiamondVPN, DiamondSAT, DiamondUTC) F/W version 2.4.0.3) 04, CP 106), Diamond VPN (also sold as CV100); DiamondSAT CCEVS-VR-0054-2006 Compare
IAS ECC v2, version 1.3, in configuration #2 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’application : F0 02 02 13 (ANSSI-CC-2020/51-R01) ANSSI-CC-2020/51-R01 Compare
IAS ECC v2, version 1.3, in configuration #3 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’application : F0 02 02 13 (ANSSI-CC-2020/52-R01) ANSSI-CC-2020/52-R01 Compare
IAS ECC v2, version 1.3, in configuration #1 on ID-One Cosmo v8.2 open platform on NXP P6022M VB (Identification de l’application : F0 02 02 13) (ANSSI-CC-2020/50-R01) ANSSI-CC-2020/50-R01 Compare
secunet konnektor 2.1.0, Version 4.1.3:2.1.0 BSI-DSZ-CC-1174-2021 Compare
secunet Konnektor 2.1.0, Version 3.5.0:2.1.0 BSI-DSZ-CC-1157-2020 Compare
secunet konnektor 2.1.0, Version 4.1.3:2.1.0 BSI-DSZ-CC-1128-V3-2021 Compare
secunet konnektor 2.1.0, Version 3.5.0:2.1.0 BSI-DSZ-CC-1128-V2-2020 Compare
Ricoh Aficio MP C3002/C3002G/C3502/C3502G, Savin MP C3002/C3002G/C3502/C3502G, Lanier MP C3002/C3002G/C3502/C3502G, nashuatec MP C3002/C3502, Rex-Rotary MP C3002/C3502, Gestetner MP C3002/C3502, infotec MP C3002/C3502 all of above with Facsimile Function Version: - Software: System/Copy 1.05.4, Network Support 11.77, Fax 02.00.00, RemoteFax 02.00.00, NetworkDocBox 1.04, Web Support 1.07, Web Uapl 1.03, animation 1.00, Scanner 01.09, Printer 1.05.1, PCL 1.07, PCL Font 1.06, Data Erase Onb 1.01x, GWFCU3.5-4(WW) 01.00.04, Engine 0.16:04, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware: Ic Key 01020700, Ic Ctlr 03 JISEC-CC-CRP-C0353 Compare
Ricoh Aficio MP C4502/C4502G/C5502/C5502G, Savin MP C4502/C4502G/C5502/C5502G, Lanier MP C4502/C4502G/C5502/C5502G, nashuatec MP C4502/C5502, Rex-Rotary MP C4502/C5502, Gestetner MP C4502/C5502, infotec MP C4502/C5502 all of above with Facsimile Function Version: - Software: System/Copy 1.05.4, Network Support 11.77, Fax 02.00.00, RemoteFax 02.00.00, NetworkDocBox 1.04, Web Support 1.07, Web Uapl 1.03, animation 1.00, Scanner 01.09, Printer 1.05.1, PCL 1.07, PCL Font 1.06, Data Erase Onb 1.01x, GWFCU3.5-4(WW) 01.00.04, Engine 0.16:04, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware: Ic Key 01020700, Ic Ctlr 03 JISEC-CC-CRP-C0357 Compare
JPKI applet v1.0 on Connected eSE 5.3.4 ST54L NSCIB-CC-2300130-01-CR Compare
Application Mobile PayPass 1.0.13vA.2.4 (S1133159, release B) sur plateforme UpTeq NFC3.2.2_Generic v1.0 sur composant ST33G1M2-F ANSSI-CC-2016/31 Compare
eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1 ANSSI-CC-2018/57v2 Compare
Ricoh Aficio MP C4502A/C5502A, Savin MP C4502A/C5502A, Lanier MP C4502A/C5502A, nashuatec MP C4502A/C5502A, Rex-Rotary MP C4502A/C5502A, Gestetner MP C4502A/C5502A, infotec MP C4502A/C5502A all of above with Facsimile Function Version: - Software: System/Copy 1.05.4, Network Support 11.77, Fax 02.00.00, RemoteFax 02.00.00, NetworkDocBox 1.04, Web Support 1.07, Web Uapl 1.03, animation 1.00, Scanner 01.09, Printer 1.05.1, PCL 1.07, PCL Font 1.06, Data Erase Onb 1.01x, GWFCU3.5-4(WW) 01.00.04, Engine 0.16:02, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware: Ic Key 01020700, Ic Ctlr 03 JISEC-CC-CRP-C0355 Compare
NXP JCOP 7.x with eUICC extension on SN300 B1.1 Secure Element, version JCOP 7.0 R1.64.0.2, JCOP 7.0 R2.04.0.2, JCOP 7.1 R1.04.0.2, JCOP 7.2 R1.09.0.2 NSCIB-CC-2200029-03-CR Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1 ANSSI-CC-2018/56v2 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1 ANSSI-CC-2018/58v2 Compare
eTravel v2.2 BAC on MultiApp platform v4.0.1 with Filter Set 1.0 Version 1.0 ANSSI-CC-2020/43 Compare
eTravel v2.2 EAC/SAC on MultiApp v4.0.1 platform with Filter Set 1.0 version 1.0 ANSSI-CC-2020/45 Compare
eTravel v2.2 EAC/BAC on MultiApp v4.0.1 platform with Filter Set 1.0 version 1.0 ANSSI-CC-2020/44 Compare
secunet konnektor 2.0.0, Version 4.1.3:2.0.0 BSI-DSZ-CC-1044-V4-2021 Compare
secunet konnektor 2.1.0, Version 5.0.5:2.1.0 BSI-DSZ-CC-1190-2022 Compare
secunet konnektor 2.1.0, Version 5.0.5:2.1.0 BSI-DSZ-CC-1128-V4-2022 Compare
Xerox WorkCentre 7346 Version: Controller+PS ROM Ver. 1.223.4, IOT ROM Ver 3.2.0, IIT ROM Ver 20.4.3, ADF ROM Ver 11.6.5 JISEC-CC-CRP-C0169 Compare
secunet konnektor 2.0.0, Version 4.1.3:2.0.0 (PTV4 - EBK) BSI-DSZ-CC-1163-2021 Compare
Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA (Version du patch : 1.3) ANSSI-CC-2016/04 Compare
Oberthur B0' application v1.0.1 and GemClub v1.3 loaded on Javacard/VOP GemXpresso platform 211 V2 ANSSI-CC-2001/03 Compare
Oberthur B0' application v1.0.1 and GemClub v1.3 loaded on Javacard/VOP GemXpresso platform 211 V2 ANSSI-CC-2001/03 Compare
secunet konnektor 2.1.0, Version 5.1.2:2.1.0 BSI-DSZ-CC-1202-2022 Compare
Microcontrôleur sécurisé ST33G1M2A1 révision H, Firmware révision 1.3.2, incluant optionnellement la bibliothèquecryptographique Neslib 6.0.3 et la bibliothèque SFM 1.0.7 ANSSI-CC-2017/73 Compare
secunet konnektor 2.1.0, Version 5.1.2:2.1.0 BSI-DSZ-CC-1128-V5-2022 Compare
BELPIC V1.8 applet on MultiApp V4.1 (Révision 1.0) (ANSSI-CC-2019/31-R01) ANSSI-CC-2019/31-R01 Compare
SecureSwitch® Fiber Optic Switch Models 1:1, 2:1, 3:1, 4:1, 5:1, 6:1, 7:1, 8:1 Rev A 383-4-410 Compare
ChipDoc v3 on JCOP 4 P71 in SSCD configuration (Version 3.0.0.52) (ANSSI-CC-2020/73-R01) ANSSI-CC-2020/73-R01 Compare
Microcontrôleur sécurisé ST33G1M2 révision F, Firmware révisions 9 et A, incluant optionnellement la bibliothèque cryptographique Neslib versions 4.1 et 4.1.1 et la bibliothèque MIFARE4Mobile version 2.1.0 ANSSI-CC-2015/61 Compare
ChipDoc v3.1 on JCOP 4 P71 in SSCD configuration (Version 3.1.6.52) (ANSSI-CC-2021/20-R01) ANSSI-CC-2021/20-R01 Compare
ChipDoc v3 on JCOP 4 P71 in ICAO EAC with PACE configuration (Version 3.0.0.52) (ANSSI-CC-2020/72-R01) ANSSI-CC-2020/72-R01 Compare
ChipDoc v3.1 on JCOP 4 P71 in ICAO BAC configuration (Version 3.1.6.52) (ANSSI-CC-2021/18-R01) ANSSI-CC-2021/18-R01 Compare
IDeal Citiz v2.3-n embedding ID.me 1.6-n application (ID.me 1.6-n / 2.1.6.0.0) ANSSI-CC-2019/32 Compare
SafeSign IC PKI applet on JCOP 4 P71 eIDAS QSCD 3.0.1.12, 3.0.1.13 and 3.0.1.14 NSCIB-CC-2400004-01-CR Compare
eTravel 2.5.A BAC on MultiApp V5.0.A (version 2.5.A.0.0) ANSSI-CC-2022/11 Compare
eTravel 2.5 EAC on SAC on MultiApp V5.0 (2.5.0.0) ANSSI-CC-2021/45 Compare
eTravel 2.5 BAC on MultiApp V5.0 (version 2.5.0.0) ANSSI-CC-2021/43 Compare
Market Central SecureSwitch® Fiber Optic Switch Models: A, B, C, D, 1:1, 2:1, 3:1, 4:1, 5:1, 6:1, 7:1 and 8:1 383-4-506 Compare
TPM 2.0 Hardware version FB5C85D, Firmware version 1.3.0.1 ANSSI-CC-2016/15 Compare
eTravel Essential 1.3-2.0 - BAC and AA activated (Version 1.0) ANSSI-CC-2021/60 Compare
Ricoh imagio MP 5002/4002 all of above with Printer/Scanner/Facsimile Functions Version: - Software: System/Copy 1.00.2, Network Support 11.75, Fax 01.01.00, RemoteFax 01.01.00, NetworkDocBox 1.00.1, Web Support 1.03, Web Uapl 1.02, animation 1.00, Scanner 01.04, Printer 1.00.1, RPCS 3.12.18, RPCS Font 1.03, Data Erase Onb 1.03m, GWFCU3.5-2(WW) 01.00.01, Engine 1.00:03, OpePanel 1.02, LANG0 1.02, LANG1 1.02 - Hardware: Ic Key 01020714, Ic Hdd 01 JISEC-CC-CRP-C0346 Compare
eTravel 2.5.A EAC on SAC on MultiApp V5.0.A(version 2.5.A.0.0) ANSSI-CC-2022/56 Compare
eTravel 2.5.A EAC on BAC on MultiApp V5.0.A (version 2.5.A.0.0) ANSSI-CC-2022/55 Compare
eTravel 2.5.A EAC on BAC on MultiApp V5.0.A (version 2.5.A.0.0) ANSSI-CC-2022/12 Compare
eTravel 2.5.A EAC on SAC on MultiApp V5.0.A (version 2.5.A.0.0) ANSSI-CC-2022/13 Compare
eTravel Essential 1.3-2.0 – BAC, EAC and AA activated (Version 1.0) ANSSI-CC-2021/64 Compare
eTravel Essential 1.3-2.0 – PACE, EAC and AA activated (Version 1.0) ANSSI-CC-2021/63 Compare
EMC® Ionix™ for IT Operations Intelligence (SMARTS®) - SAM 8.1.1, IP 8.1.1, NPM 3.1, SIA 2.3.1.1, EISM 3.0, SAM Adapters 1.3 383-4-187 Compare
IAS Classic v5.0 with MOC Server v3.0 on MultiApp v4.2 Version 5.0.0.A.C, version 3.0.1A ANSSI-CC-2020/70 Compare
Utimaco CryptoServer CP5 Se12 5.1.0.0, CryptoServer CP5 Se52 5.1.0.0, CryptoServer CP5 Se500 5.1.0.0, CryptoServer CP5 Se1500 5.1.0.0. NSCIB-CC-222073-CR Compare
Trusted Platform Modules ST33KTPM2XSPI & ST33KTPM2X (TPM Firmware 9.257) ( ANSSI-CC-2024/04) ANSSI-CC-2024/04 Compare
secunet konnektor 2.0.0, Version 5.1.2:2.0.0 BSI-DSZ-CC-1201-2022 Compare
Tenable Security Center 3.2 (SC3) with 3D Tool 1.2 (3DT), Log Correlation Engine 2.0.2 (LCE), Passive Vulnerability Scanner 3.0 (PVS), and Nessus Scanner 3.0.4 (Nessus) CCEVS-VR-VID-10273-2010 Compare
Stationäres eHealth Kartenterminal ORGA 6141 online 3.9.0:2.0.0/ 3.9.0:1.2.0 BSI-DSZ-CC-0519-V5-2024 Compare
secunet konnektor 2.0.0, Version 5.1.2:2.0.0 BSI-DSZ-CC-1044-V6-2022 Compare
McAfee Threat Intelligence Exchange 2.0.0 and Data Exchange Layer 3.0.0 with ePolicy Orchestrator 5.3.2 383-4-396 Compare
Utimaco CryptoServer CP5 Se12 5.1.0.0, CryptoServer CP5 Se52 5.1.0.0, CryptoServer CP5 Se500 5.1.0.0, CryptoServer CP5 Se1500 5.1.0.0 NSCIB-CC-2300142-01-CR Compare
Showing 5 out of 109.

References ?

Updates ?

  • 03.03.2025 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e8e0d6a32cb00a81ceec3b7faa5e79edfd8a79a6b141f118aa62d009838f2266', 'txt_hash': '437dc0a8767059f61a2e30ddb6f240c62089f2ebfb8470650ed81c4850c1785c'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '5b67c154f7da0aaf487dfca5d460deeca0392ad1d4230a08f1ca40806e2f6b9d', 'txt_hash': '19b92ec941cea4d6da6dc1c7fc181ef0ddcc9694f3e6e5dbad7b06a6b42ec373'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '2bb32f3f339c9d50ac17a3a7b85f32f7453914fe79baac9582cd89d8943c6774', 'txt_hash': 'c23e75fd2a2a6b847f53a18de667f495aa8abdc770cb06836cf573037289f4b1'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 361570, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 16, '/CreationDate': "D:20250213155846+01'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20250213155921+01'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.commoncriteriaportal.org/', 'http://www.sogis.eu/', 'mailto:[email protected]', 'http://www.ssi.gouv.fr/']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 2293709, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 171, '/Creator': 'Microsoft® Word for Microsoft 365', '/CreationDate': "D:20241031112531+01'00'", '/ModDate': "D:20241031112531+01'00'", '/Producer': 'Microsoft® Word for Microsoft 365', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 169332, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/CreationDate': "D:20250213155808+01'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20250213155922+01'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'FR': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2025/04': 3}, 'NL': {'NSCIB-CC-2300182-01': 1}, 'ES': {'2020-37-INF-3429- v1': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 1, 'EAL2': 2, 'EAL7': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1, 'ALC_FLR.1': 2, 'ALC_FLR': 1}, 'AVA': {'AVA_VAN.5': 1, 'AVA_VAN': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Thales': {'Thales': 7}}, 'eval_facility': {'Serma': {'SERMA': 1}, 'CESTI': {'CESTI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'NL': {'CC-1': 2, 'CC-2': 3, 'CC-3': 3, 'NSCIB-CC-2300182-01': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0099-V2-2020': 1, 'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL4+': 2, 'EAL4': 4, 'EAL6+': 1, 'EAL4 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_ARC.1': 5, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.4': 9, 'ADV_TDS.3': 5, 'ADV_IMP.1': 4, 'ADV_FSP.2': 2, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 9, 'AGD_PRE.1': 3}, 'ALC': {'ALC_DVS.2': 4, 'ALC_FLR.1': 4, 'ALC_FLR.2': 1, 'ALC_TAT.1': 3, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 3, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 5, 'ATE_COV.1': 2, 'ATE_DPT.1': 2}, 'AVA': {'AVA_VAN.5': 4}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 4, 'ASE_REQ.1': 2, 'ASE_REQ.2': 1, 'ASE_OBJ.2': 2, 'ASE_SPD.1': 3, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1, 'FAU_ARP.1': 15, 'FAU_ARP.1.1': 2, 'FAU_SAA.1': 3, 'FAU_SAS.1': 1, 'FAU_SAR': 2, 'FAU_SAS': 1}, 'FCO': {'FCO_NRO': 28, 'FCO_NRO.2': 9, 'FCO_NRR': 5, 'FCO_NRR.1': 3}, 'FCS': {'FCS_RNG.1': 11, 'FCS_CKM.5': 7, 'FCS_RNG': 1, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM': 72, 'FCS_CKM.1': 31, 'FCS_CKM.2': 9, 'FCS_COP.1': 31, 'FCS_CKM.4': 65, 'FCS_CKM.5.1': 1, 'FCS_COP': 160, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_IFC': 67, 'FDP_IFC.2': 6, 'FDP_IFF': 53, 'FDP_IFF.1': 27, 'FDP_ITC': 32, 'FDP_ITC.2': 33, 'FDP_UIT': 9, 'FDP_UIT.1': 2, 'FDP_ROL': 32, 'FDP_ROL.1': 11, 'FDP_UCT': 6, 'FDP_UCT.1': 1, 'FDP_ACC': 66, 'FDP_ACC.1': 27, 'FDP_ACF': 58, 'FDP_ACF.1': 38, 'FDP_ACC.2': 5, 'FDP_IFC.1': 23, 'FDP_RIP': 127, 'FDP_RIP.1': 9, 'FDP_SDI': 25, 'FDP_SDI.2': 10, 'FDP_SDI.2.2': 1, 'FDP_ITC.1': 23, 'FDP_SDC.1': 1, 'FDP_ITT.1': 1}, 'FIA': {'FIA_UID': 34, 'FIA_UID.1': 14, 'FIA_UAU': 27, 'FIA_UAU.1': 4, 'FIA_UAU.4': 1, 'FIA_AFL': 11, 'FIA_AFL.1': 8, 'FIA_ATD': 13, 'FIA_ATD.1': 3, 'FIA_UID.2': 1, 'FIA_USB': 7, 'FIA_USB.1': 3, 'FIA_API.1': 1}, 'FMT': {'FMT_MTD': 38, 'FMT_MTD.1': 5, 'FMT_MSA': 189, 'FMT_MSA.1': 19, 'FMT_SMR': 82, 'FMT_MSA.3': 30, 'FMT_SMR.1': 43, 'FMT_SMF': 78, 'FMT_SMF.1': 28, 'FMT_MTD.3': 2, 'FMT_MSA.2': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_LIM': 6}, 'FPR': {'FPR_UNO': 12, 'FPR_UNO.1': 14, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_RCV': 24, 'FPT_RCV.3': 10, 'FPT_FLS': 58, 'FPT_FLS.1': 7, 'FPT_TDC': 9, 'FPT_TDC.1': 9, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_RCV.4': 1, 'FPT_STM': 3, 'FPT_STM.1': 5, 'FPT_PHP.3': 1, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_TRP': 10, 'FTP_TRP.1': 11, 'FTP_ITC': 34, 'FTP_ITC.1': 13}}, 'cc_claims': {'D': {'D.ISD_KEYS': 3, 'D.APP_KEYS': 9, 'D.APSD_KEYS': 3, 'D.CASD_KEYS': 1, 'D.GP_REGISTRY': 6, 'D.GP_CODE': 1, 'D.TOE_IDENTIFIER': 1, 'D.CLFDB-DK': 1, 'D.GS-PARAMETERS': 1, 'D.CVM_PIN': 3, 'D.CVM_MGMT_STATE': 3, 'D.TOKEN-': 1, 'D.RECEIPT-': 1, 'D.CONFIRMATION-': 1, 'D.DAP_BLOCK': 1, 'D.APSD_DAP_KEYS': 1, 'D.CASD_DAP_KEYS': 1, 'D.CCCM_KEYS': 1, 'D.CTL_REGISTRY': 5, 'D.CTL_PRO': 5, 'D.OLD_ELF': 3, 'D.NEW_ELF': 3, 'D.ELF_AID': 3, 'D.ELF_SESSION_ST': 2, 'D.ELF_APP_INS': 3, 'D.ELF_RG_DATA': 1, 'D.OS-': 3, 'D.OS-UPDATE_DEC-': 1, 'D.OS-UPDATE-CODE-': 1, 'D.APP_CODE': 7, 'D.APP_C_DATA': 5, 'D.APP_I_DATA': 9, 'D.PIN': 6, 'D.API_DATA': 3, 'D.CRYPTO': 4, 'D.JCS_CODE': 6, 'D.JCS_DATA': 10, 'D.SEC_DATA': 8, 'D.RECEIPT-GENERATION-KEY': 1, 'D.CONFIRMATION-DATA': 1, 'D.TOKEN-VERIFICATION-KEY': 1, 'D.OS-UPDATE_ADDITIONALCODE': 3, 'D.OS-UPDATE_SGNVER-KEY': 1, 'D.OS': 1, 'D.OS-UPDATE-CODE-ID': 1, 'D.OS-UPDATE_DEC-KEY': 1}, 'O': {'O.KEY-MNGT': 9, 'O.CARD-': 11, 'O.DOMAIN-RIGHTS': 9, 'O.APPLI-AUTH': 5, 'O.SECURITY-': 2, 'O.COMM-AUTH': 10, 'O.COMM-INTEGRITY': 10, 'O.COMM-': 1, 'O.NO-KEY-REUSE': 5, 'O.PRIVILEGES-': 1, 'O.LC-MANAGEMENT': 6, 'O.CLFDB-DECIPHER': 5, 'O.GLOBAL-CVM': 5, 'O.CVM-BLOCK': 9, 'O.CVM-MGMT': 9, 'O.RECEIPT': 5, 'O.TOKEN': 5, 'O.CCCM': 9, 'O.CTL_REGISTRY': 5, 'O.CTL_SC': 5, 'O.CRS_PRIVILEGES': 5, 'O.CRS_COUNTERS': 5, 'O.ELF_AUTHORISED': 5, 'O.ELF_INTEGRITY': 5, 'O.ELF_APP_DATA': 7, 'O.ELF_SESSION': 7, 'O.ELF_DELE_IRR': 5, 'O.ELF_DATA_PRO': 5, 'O.SECURE_LOAD_AC': 1, 'O.SECURE_AC_ACTIV': 1, 'O.TOE_IDENTIFICATI': 1, 'O.CONFID-OS-': 1, 'O.SID': 15, 'O.FIREWALL': 19, 'O.GLOBAL_ARRAY': 2, 'O.ARRAY_VIEWS_': 1, 'O.ARRAY_VIEWS_I': 1, 'O.NATIVE': 11, 'O.OPERATE': 23, 'O.REALLOCATION': 7, 'O.RESOURCES': 7, 'O.ALARM': 16, 'O.CIPHER': 9, 'O.RNG': 8, 'O.PIN-MNGT': 7, 'O.TRANSACTION': 7, 'O.OBJ-DELETION': 5, 'O.DELETION': 5, 'O.LOAD': 11, 'O.INSTALL': 11, 'O.SCP': 45, 'O.SENSITIVE_ARR': 1, 'O.SENSITIVE_RES': 1, 'O.MTC-CTR-MNGT': 4, 'O.CRT-MNGT': 5, 'O.CARD-MANAGEMENT': 22, 'O.COMM-CONFIDENTIALITY': 7, 'O.PRIVILEGES-MANAGEMENT': 4, 'O.SECURE_LOAD_ACODE': 10, 'O.SECURE_AC_ACTIVATION': 6, 'O.TOE_IDENTIFICATION': 6, 'O.CONFID-OS-UPDATE': 6, 'O.GLOBAL_ARRAYS_CONFID': 6, 'O.ARRAY_VIEWS_CONFID': 4, 'O.GLOBAL_ARRAYS_INTEG': 6, 'O.ARRAY_VIEWS_INTEG': 4, 'O.MTC-CTR-': 1, 'O.SENSITIVE_ARRAYS_INTEG': 4, 'O.SENSITIVE_RESULTS_INTEG': 4, 'O.SECURITY-DOMAINS': 3, 'O.RND': 1, 'O.TOE-': 1, 'O.PIN-': 1, 'O.APPLET': 16, 'O.CODE_CAP_FILE': 12, 'O.JAVAOBJECT': 42, 'O.JAVAOB': 4, 'O.JAVAO': 1, 'O.CODE_': 1, 'O.JAVAOBJE': 1, 'O.CODE_PKG': 1}, 'T': {'T.UNAUTHORISED-': 1, 'T.LIFE-CYCLE': 4, 'T.COM-EXPLOIT': 4, 'T.BRUTE-FORCE-SCP': 3, 'T.CLFDB-DISC': 3, 'T.CVM-IMPERSONATE': 3, 'T.CVM-UPDATE': 3, 'T.BRUTE-FORCE-CVM': 3, 'T.RECEIPT': 3, 'T.TOKEN': 3, 'T.CTL-REGISTRY-': 1, 'T.COUNTERS-FREEZE': 3, 'T.CTL-AUTH-FORGE': 3, 'T.CRS-BYPASS': 3, 'T.ELF-UNAUTHORISED': 3, 'T.ELF-VERSION': 3, 'T.ELF-DATA-ACCESS': 3, 'T.ELF-DATA-INTEGRITY': 3, 'T.ELF-SESSION': 3, 'T.ELF-ILL-COMMAND': 3, 'T.ELF-RES-DATA': 3, 'T.UNAUTHORISED-TOE-': 1, 'T.FAKE-SGNVER-KEY': 3, 'T.WRONG-UPDATE-': 1, 'T.INTEG-OS-UPDATE-': 1, 'T.CONFID-OS-UPDATE-': 1, 'T.CONFID-APPLI-': 1, 'T.CONFID-JCS-': 2, 'T.INTEG-APPLI-': 4, 'T.INTEG-JCS-': 1, 'T.INTEG-JCS-DATA': 3, 'T.SID': 8, 'T.EXE-CODE': 7, 'T.NATIVE': 3, 'T.RESOURCES': 3, 'T.DELETION': 4, 'T.UNAUTHORISED-CARD-MGMT': 4, 'T.INSTALL': 4, 'T.OBJ-DELETION': 3, 'T.PHYSICAL': 9, 'T.RND': 1, 'T.CONFID-APPLI-DATA': 3, 'T.INTEG-APPLI-DATA': 5, 'T.CTL-REGISTRY-OVERWRITE': 2, 'T.UNAUTHORISED-TOE-CODE-': 1, 'T.WRONG-UPDATE-STATE': 2, 'T.INTEG-OS-UPDATE-LOAD': 2, 'T.CONFID-OS-UPDATE-LOAD': 2, 'T.CONFID-JCS-CODE': 2, 'T.CONFID-JCS-DATA': 2, 'T.INTEG-APPLI-CODE': 4, 'T.INTEG-JCS-CODE': 2, 'T.UNAUTHORISED-TOE-CODE-UPDATE': 1}, 'A': {'A.ISSUER': 3, 'A.ADMIN': 3, 'A.APPS-PROVIDER': 3, 'A.VERIFICATION-': 1, 'A.KEY-ESCROW': 3, 'A.PERSONALISER': 3, 'A.CONTROLLING-': 1, 'A.PRODUCTION': 4, 'A.SCP-SUPP': 3, 'A.KEYS-PROT': 3, 'A.OS-UPDATE-': 1, 'A.SECURE_ACODE_': 1, 'A.CAP_FILE': 4, 'A.VERIFICA': 1, 'A.VERIFICATION-AUTHORITY': 2, 'A.CONTROLLING-AUTHORITY': 2, 'A.OS-UPDATE-EVIDENCE': 2, 'A.SECURE_ACODE_MANAGEMENT': 2, 'A.VERIFICATION': 2}, 'R': {'R.JAVA': 12}, 'OP': {'OP.ARRAY_ACCESS': 4, 'OP.ARRAY_LENGTH': 4, 'OP.ARRAY_T_ALOAD': 3, 'OP.ARRAY_T_ASTORE': 3, 'OP.ARRAY_AASTORE': 3, 'OP.CREATE': 7, 'OP.DELETE_APPLET': 4, 'OP.DELETE_CAP_FILE': 3, 'OP.DELETE_CAP_FILE_APPLET': 3, 'OP.INSTANCE_FIELD': 3, 'OP.INVK_VIRTUAL': 6, 'OP.INVK_INTERFACE': 7, 'OP.JAVA': 5, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.PUTFIELD': 1, 'OP.PUTSTATIC': 1, 'OP.PUT': 5}, 'OE': {'OE.SCP': 3, 'OE.OS-UPDATE-ENCRYPTION': 4, 'OE.ISSUER': 3, 'OE.ADMIN': 3, 'OE.APPS-PROVIDER': 3, 'OE.VERIFICATION-': 1, 'OE.KEY-ESCROW': 3, 'OE.PERSONALISER': 3, 'OE.CONTROLLING-': 1, 'OE.SCP-SUPP': 3, 'OE.KEYS-PROT': 3, 'OE.PRODUCTION': 4, 'OE.APPLICATIONS': 3, 'OE.AID-MANAGEMENT': 3, 'OE.LOADING': 3, 'OE.SERVERS': 3, 'OE.AP-KEYS': 3, 'OE.ISD-KEYS': 3, 'OE.KEY-GENERATION': 3, 'OE.CA-KEYS': 3, 'OE.KEY-CHANGE': 3, 'OE.CLFDB-ENC-PR': 3, 'OE.TOKEN-GEN': 3, 'OE.RECEIPT-VER': 3, 'OE.DAP_BLOCK_GEN': 3, 'OE.OS-UPDATE-EVIDENCE': 3, 'OE.OS-UPDATE-': 1, 'OE.SECURE_ACODE_MANA': 1, 'OE.CAP_FILE': 6, 'OE.VERIFICATION': 35, 'OE.CODE-': 5, 'OE.CODE-EVIDENCE': 12, 'OE.VERIFICATION-AUTHORITY': 2, 'OE.CONTROLLING-AUTHORITY': 2, 'OE.SECURE_ACODE_MANAGEMENT': 2}, 'OSP': {'OSP.AID-MANAGEMENT': 3, 'OSP.LOADING': 3, 'OSP.SERVERS': 3, 'OSP.APSD-KEYS': 3, 'OSP.ISD-KEYS': 3, 'OSP.KEY-GENERATION': 3, 'OSP.CASD-KEYS': 3, 'OSP.KEY-CHANGE': 3, 'OSP.SECURITY-DOMAINS': 3, 'OSP.APPLICATIONS': 3, 'OSP.CLFDB-ENC-PR': 3, 'OSP.TOKEN-GEN': 3, 'OSP.RECEIPT-VER': 3, 'OSP.DAP_BLOCK_GEN': 3, 'OSP.CCCM': 3, 'OSP.ELF_DELE_OP': 3, 'OSP.ATOMIC_ACTIVATION': 3, 'OSP.TOE_IDENTIFICATION': 3, 'OSP.ADDITIONAL_CODE_SIG': 1, 'OSP.ADDITIONAL_CODE_EN': 1, 'OSP.VERIFICATION': 3, 'OSP.ADDITIONAL_CODE_SIGNING': 2, 'OSP.ADDITIONAL_CODE_ENCRYPTION': 2}}, 'vendor': {'STMicroelectronics': {'STMicroelectronics': 20}, 'Thales': {'Thales': 208}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 40, 'AES128': 2}}, 'DES': {'DES': {'DES': 5}, '3DES': {'TDES': 49, '3DES': 11}}, 'constructions': {'MAC': {'HMAC': 15, 'KMAC': 3, 'CMAC': 4, 'CBC-MAC': 2}}}, 'asymmetric_crypto': {'RSA': {'RSA 1024': 19}, 'ECC': {'ECDH': {'ECDH': 4}, 'ECDSA': {'ECDSA': 9}, 'ECC': {'ECC': 11}}, 'FF': {'DH': {'DH': 4, 'Diffie-Hellman': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4, 'SHA1': 7}, 'SHA2': {'SHA-256': 5, 'SHA-384': 5, 'SHA-512': 4, 'SHA224': 3, 'SHA256': 4, 'SHA384': 4, 'SHA512': 4, 'SHA-224': 1}, 'SHA3': {'SHA3-224': 1, 'SHA3-256': 1, 'SHA3-384': 1, 'SHA3-512': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 18}, 'KEX': {'Key Exchange': 1}, 'KA': {'Key Agreement': 8, 'Key agreement': 5}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 1}}, 'PACE': {'PACE': 1}, 'PGP': {'PGP': 1}}, 'randomness': {'RNG': {'RNG': 10, 'RND': 2}}, 'cipher_mode': {'ECB': {'ECB': 8}, 'CBC': {'CBC': 32}, 'CTR': {'CTR': 1}, 'GCM': {'GCM': 3}, 'CCM': {'CCM': 13}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_PSK_WITH_AES_128_CBC_S': 1, 'TLS_PSK_WITH_NULL_SHA': 1, 'TLS_PSK_WITH_NULL_SHA256': 1}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 3, 'Physical Probing': 2, 'physical probing': 3, 'side channel': 1, 'DPA': 1}, 'FI': {'physical tampering': 1, 'malfunction': 4, 'Malfunction': 5}, 'other': {'JIL': 8}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 16}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 180-4': 1, 'FIPS PUB 186-4': 2, 'FIPS 197': 4, 'FIPS PUB 197': 3, 'FIPS 198': 2, 'FIPS 180': 1, 'FIPS 197126': 1, 'FIPS PUB 46-3': 2, 'FIPS PUB 81': 2, 'FIPS PUB 186-4184': 1, 'FIPS 180-4': 5, 'FIPS 202': 4}, 'PKCS': {'PKCS#1': 9, 'PKCS #1': 1, 'PKCS#5157': 1, 'PKCS#5161': 1, 'PKCS#5': 1}, 'BSI': {'AIS20': 2, 'AIS31': 6}, 'RFC': {'RFC2104': 2, 'RFC 5758': 2, 'RFC3610165': 1, 'RFC2409174': 1, 'RFC2409': 1, 'RFC 5246': 2, 'RFC 5869': 2}, 'ISO': {'ISO/IEC 10116': 4, 'ISO/IEC 14888-2': 2, 'ISO/IEC 18032': 4, 'ISO/IEC 18033-3': 2, 'ISO/IEC 9797-1': 7, 'ISO/IEC 9797-2': 2, 'ISO/IEC 9796-2': 1, 'ISO/IEC 3309206': 2, 'ISO/IEC 18032:2020': 1}, 'ICAO': {'ICAO': 4}, 'X509': {'X.509': 4}, 'SCP': {'SCP11': 13, 'SCP02': 16, 'SCP80': 12, 'SCP81': 11, 'SCP03': 13, 'SCP10': 2, 'SCP22': 2}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {'JavaCard': {'Java Card 3.1.0': 4}, 'GlobalPlatform': {'Global Platform 2.3.1': 1}}, 'javacard_api_const': {'ALG': {'DES': {'ALG_DES_CBC_NOPAD': 2, 'ALG_DES_CBC_ISO9797_M1': 2, 'ALG_DES_CBC_ISO9797_M2': 2, 'ALG_DES_CBC_PKCS5': 2, 'ALG_DES_ECB_NOPAD': 2, 'ALG_DES_ECB_ISO9797_M1': 2, 'ALG_DES_ECB_ISO9797_M2': 2, 'ALG_DES_ECB_PKCS5': 2, 'ALG_DES_MAC4_ISO9797_1_M1_ALG3': 2, 'ALG_DES_MAC4_ISO9797_1_M2_ALG3': 2, 'ALG_DES_MAC4_ISO9797_M1': 2, 'ALG_DES_MAC4_ISO9797_M2': 2, 'ALG_DES_MAC4_PKCS5': 2, 'ALG_DES_MAC4_NOPAD': 2, 'ALG_DES_MAC8_ISO9797_1_M1_ALG3': 2, 'ALG_DES_MAC8_ISO9797_1_M2_ALG3': 2, 'ALG_DES_MAC8_ISO9797_M1': 2, 'ALG_DES_MAC8_ISO9797_M2': 2, 'ALG_DES_MAC8_PKCS5': 2, 'ALG_DES_MAC8_NOPAD': 2}, 'RSA': {'ALG_RSA_SHA_224_PKCS1': 2, 'ALG_RSA_SHA_224_PKCS1_PSS': 2, 'ALG_RSA_SHA_256_PKCS1': 2, 'ALG_RSA_SHA_256_PKCS1_PSS': 2, 'ALG_RSA_SHA_384_PKCS1': 2, 'ALG_RSA_SHA_384_PKCS1_PSS': 2, 'ALG_RSA_SHA_512_PKCS1': 2, 'ALG_RSA_SHA_512_PKCS1_PSS': 2, 'ALG_RSA_SHA_ISO9796': 2, 'ALG_RSA_SHA_ISO9796_MR': 2, 'ALG_RSA_SHA_PKCS1': 2, 'ALG_RSA_SHA_PKCS1_PSS': 2, 'ALG_RSA_SHA_RFC2409': 2, 'ALG_RSA_NOPAD': 2, 'ALG_RSA_PKCS1_OAEP': 2, 'ALG_RSA_PKCS1': 1}, 'ECDSA': {'ALG_ECDSA_SHA': 2, 'ALG_ECDSA_SHA_224': 2, 'ALG_ECDSA_SHA_256': 2, 'ALG_ECDSA_SHA_384': 2, 'ALG_ECDSA_SHA_512': 2}, 'AES': {'ALG_AES_BLOCK_128_CBC_NOPAD': 2, 'ALG_AES_CBC_ISO9797_M1': 2, 'ALG_AES_CBC_ISO9797_M2': 2, 'ALG_AES_CBC_PKCS5': 2, 'ALG_AES_BLOCK_128_ECB_NOPAD': 2, 'ALG_AES_ECB_ISO9797_M1': 2, 'ALG_AES_ECB_ISO9797_M2': 2, 'ALG_AES_ECB_PKCS5': 2, 'ALG_AES_CTR': 2, 'ALG_AES_CCM': 2, 'ALG_AES_GCM': 2, 'ALG_AES_MAC_128_NOPAD': 2, 'ALG_AES_CMAC_128': 4, 'ALG_AES_MAC_192_NOPAD': 1, 'ALG_AES_MAC_256_NOPAD': 1}, 'HMAC': {'ALG_HMAC_SHA1': 8, 'ALG_HMAC_SHA_256': 8, 'ALG_HMAC_SHA_384': 2, 'ALG_HMAC_SHA_512': 2}, 'EC': {'ALG_EC_FP': 6, 'ALG_EC_SVDP_DH_KDF': 2, 'ALG_EC_SVDP_DH_PLAIN_XY': 2, 'ALG_EC_SVDP_DHC_KDF': 2, 'ALG_EC_SVDP_DH_PLAIN': 1, 'ALG_EC_SVDP_DHC_PLAIN': 1}, 'SHA': {'ALG_SHA_224': 4, 'ALG_SHA_256': 6, 'ALG_SHA_384': 4, 'ALG_SHA_512': 4}, 'SHA3': {'ALG_SHA3_224': 4, 'ALG_SHA3_256': 4, 'ALG_SHA3_384': 4, 'ALG_SHA3_512': 4}, 'ISO3309': {'ALG_ISO3309_CRC16': 2, 'ALG_ISO3309_CRC32': 2}}, 'misc': {'SIG_CIPHER_DES_MAC4': 2, 'SIG_CIPHER_DES_MAC8': 2, 'SIG_CIPHER_AES_MAC128': 2, 'SIG_CIPHER_AES_CMAC128': 2, 'SIG_CIPHER_RSA': 2, 'SIG_CIPHER_ECDSA': 2, 'SIG_CIPHER_ECDSA_PLAIN': 2, 'SIG_CIPHER_HMAC': 2, 'CIPHER_AES_CCM': 2, 'CIPHER_AES_GCM': 2, 'PAD_PKCS1_OAEP': 1, 'PAD_PKCS1_OAEP_SHA256': 1, 'PAD_PKCS1_OAEP_SHA3_256': 1, 'PAD_PKCS1_OAEP_SHA3_512': 1, 'PAD_PKCS1_OAEP_SHA512': 1, 'TYPE_ACCESS': 5, 'TYPE_EC_FP_PRIVATE': 6, 'TYPE_EC_FP_PRIVATE_TRANSIENT_RESET': 1, 'TYPE_HMAC_TRANSIENT_RESET': 1, 'TYPE_HMAC': 6, 'LENGTH_EC_FP_160': 3, 'LENGTH_EC_FP_192': 2, 'LENGTH_EC_FP_224': 3, 'LENGTH_EC_FP_256': 2, 'LENGTH_EC_FP_384': 3, 'LENGTH_EC_FP_521': 2, 'LENGTH_HMAC_SHA_1_BLOCK_64': 1, 'LENGTH_HMAC_SHA_256_BLOCK_64': 1, 'LENGTH_HMAC_SHA_384_BLOCK_64': 1, 'LENGTH_HMAC_SHA_384_BLOCK_128': 1, 'LENGTH_HMAC_SHA_512_BLOCK_64': 1, 'LENGTH_HMAC_SHA_512_BLOCK_128': 1, 'LENGTH_RSA_1024': 1, 'LENGTH_RSA_1536': 1, 'LENGTH_RSA_2048': 1, 'LENGTH_SHA': 8, 'LENGTH_AES_128': 2, 'LENGTH_SHA_224': 2, 'LENGTH_SHA_384': 2, 'LENGTH_SHA3_224': 2, 'LENGTH_SHA3_384': 2}, 'curves': {'BRAINPOOLP192R1': 1, 'BRAINPOOLP224R1': 1, 'BRAINPOOLP256R1': 2, 'BRAINPOOLP320R1': 2, 'BRAINPOOLP384R1': 2, 'BRAINPOOLP512R1': 2, 'BRAINPOOLP256T1': 1, 'BRAINPOOLP320T1': 1, 'BRAINPOOLP384T1': 1, 'BRAINPOOLP512T1': 1, 'SECP192R1': 1, 'SECP256R1': 2, 'SECP521R1': 2, 'SECP384R1': 1}}, 'javacard_packages': {'javacard': {'javacard.framework': 5, 'javacard.security': 8}, 'javacardx': {'javacardx.security': 3, 'javacardx.security.util': 2, 'javacardx.security.cert': 1, 'javacardx.crypto': 1, 'javacardx.framework.time': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 3, 'GemActivate). The platform implements the following modes, but they are out of scope of the TOE: â–ª mEAC v1': 1, 'of software patches (GemActivate). The platform implements the following modes, but they are out of scope of the TOE: â–ª mEAC v1. â–ª Integrated mapping (DH and ECDH). â–ª Generic mapping (DH) â–ª PACE and mEAC': 1, 'protection of the confidentiality and integrity of user data, and for entity authentication. CSP is out of scope of the TOE. CSP provides service, including: Connected eSE 5.3.4 v1.2 Platform Security Target': 1, 'v1.2 Platform Security Target Lite © Copyright Thales DIS France SAS - 2024 Page: 62 / 171 point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2025/04': 2}, 'ES': {'2020-37-INF-3429- v1': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 1, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1, 'ALC_FLR.1': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Thales': {'Thales': 2}}, 'eval_facility': {'Serma': {'Serma Safety & Security': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to ANSSI-CC-2025_04fr.pdf.
    • The st_filename property was set to Cible-ANSSI-CC-2025_04en.pdf.
    • The cert_filename property was set to Certificat-ANSSI-CC-2025_04fr.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ANSSI-CC-2025/04.
    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['NSCIB-CC-2300182-01-CR']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['NSCIB-CC-2300182-01-CR']}} data.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['NSCIB-CC-2300182-01-CR']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['NSCIB-CC-2300182-01-CR']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}]} values added.
  • 24.02.2025 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Connected eSE 5.3.4 v1.2 Platform (Revision 1.0) (ANSSI-CC-2025/04) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2025_04fr.pdf",
  "dgst": "d0c4cec3c348cb26",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2025/04",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "5.3.4",
        "1.2",
        "1.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2300182-01-CR"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2300182-01-CR"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2300182-01-CR"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2300182-01-CR"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "THALES DIS FRANCE SA",
  "manufacturer_web": "https://www.thalesgroup.com/en/europe/france",
  "name": "Connected eSE 5.3.4 v1.2 Platform (Revision 1.0) (ANSSI-CC-2025/04)",
  "not_valid_after": "2030-02-12",
  "not_valid_before": "2025-02-12",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "Certificat-ANSSI-CC-2025_04fr.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "ES": {
          "2020-37-INF-3429- v1": 1
        },
        "FR": {
          "ANSSI-CC-2025/04": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1,
          "ALC_FLR.1": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL4": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "Serma Safety \u0026 Security": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Thales": {
          "Thales": 2
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20250213155808+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 pour Word",
      "/Keywords": "",
      "/ModDate": "D:20250213155922+01\u002700\u0027",
      "/Producer": "Adobe PDF Library 23.1.175",
      "pdf_file_size_bytes": 169332,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "ANSSI-CC-2025_04fr.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "ES": {
          "2020-37-INF-3429- v1": 2
        },
        "FR": {
          "ANSSI-CC-2025/04": 3
        },
        "NL": {
          "NSCIB-CC-2300182-01": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1,
          "ALC_FLR": 1,
          "ALC_FLR.1": 2
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 2,
          "EAL4": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CESTI": {
          "CESTI": 1
        },
        "Serma": {
          "SERMA": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Thales": {
          "Thales": 7
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20250213155846+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 pour Word",
      "/Keywords": "",
      "/ModDate": "D:20250213155921+01\u002700\u0027",
      "/Producer": "Adobe PDF Library 23.1.175",
      "pdf_file_size_bytes": 361570,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.ssi.gouv.fr/",
          "mailto:[email protected]",
          "http://www.commoncriteriaportal.org/",
          "http://www.sogis.eu/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 16
    },
    "st_filename": "Cible-ANSSI-CC-2025_04en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 11
          },
          "ECDH": {
            "ECDH": 4
          },
          "ECDSA": {
            "ECDSA": 9
          }
        },
        "FF": {
          "DH": {
            "DH": 4,
            "Diffie-Hellman": 4
          }
        },
        "RSA": {
          "RSA 1024": 19
        }
      },
      "cc_cert_id": {
        "NL": {
          "CC-1": 2,
          "CC-2": 3,
          "CC-3": 3,
          "NSCIB-CC-2300182-01": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.ADMIN": 3,
          "A.APPS-PROVIDER": 3,
          "A.CAP_FILE": 4,
          "A.CONTROLLING-": 1,
          "A.CONTROLLING-AUTHORITY": 2,
          "A.ISSUER": 3,
          "A.KEY-ESCROW": 3,
          "A.KEYS-PROT": 3,
          "A.OS-UPDATE-": 1,
          "A.OS-UPDATE-EVIDENCE": 2,
          "A.PERSONALISER": 3,
          "A.PRODUCTION": 4,
          "A.SCP-SUPP": 3,
          "A.SECURE_ACODE_": 1,
          "A.SECURE_ACODE_MANAGEMENT": 2,
          "A.VERIFICA": 1,
          "A.VERIFICATION": 2,
          "A.VERIFICATION-": 1,
          "A.VERIFICATION-AUTHORITY": 2
        },
        "D": {
          "D.API_DATA": 3,
          "D.APP_CODE": 7,
          "D.APP_C_DATA": 5,
          "D.APP_I_DATA": 9,
          "D.APP_KEYS": 9,
          "D.APSD_DAP_KEYS": 1,
          "D.APSD_KEYS": 3,
          "D.CASD_DAP_KEYS": 1,
          "D.CASD_KEYS": 1,
          "D.CCCM_KEYS": 1,
          "D.CLFDB-DK": 1,
          "D.CONFIRMATION-": 1,
          "D.CONFIRMATION-DATA": 1,
          "D.CRYPTO": 4,
          "D.CTL_PRO": 5,
          "D.CTL_REGISTRY": 5,
          "D.CVM_MGMT_STATE": 3,
          "D.CVM_PIN": 3,
          "D.DAP_BLOCK": 1,
          "D.ELF_AID": 3,
          "D.ELF_APP_INS": 3,
          "D.ELF_RG_DATA": 1,
          "D.ELF_SESSION_ST": 2,
          "D.GP_CODE": 1,
          "D.GP_REGISTRY": 6,
          "D.GS-PARAMETERS": 1,
          "D.ISD_KEYS": 3,
          "D.JCS_CODE": 6,
          "D.JCS_DATA": 10,
          "D.NEW_ELF": 3,
          "D.OLD_ELF": 3,
          "D.OS": 1,
          "D.OS-": 3,
          "D.OS-UPDATE-CODE-": 1,
          "D.OS-UPDATE-CODE-ID": 1,
          "D.OS-UPDATE_ADDITIONALCODE": 3,
          "D.OS-UPDATE_DEC-": 1,
          "D.OS-UPDATE_DEC-KEY": 1,
          "D.OS-UPDATE_SGNVER-KEY": 1,
          "D.PIN": 6,
          "D.RECEIPT-": 1,
          "D.RECEIPT-GENERATION-KEY": 1,
          "D.SEC_DATA": 8,
          "D.TOE_IDENTIFIER": 1,
          "D.TOKEN-": 1,
          "D.TOKEN-VERIFICATION-KEY": 1
        },
        "O": {
          "O.ALARM": 16,
          "O.APPLET": 16,
          "O.APPLI-AUTH": 5,
          "O.ARRAY_VIEWS_": 1,
          "O.ARRAY_VIEWS_CONFID": 4,
          "O.ARRAY_VIEWS_I": 1,
          "O.ARRAY_VIEWS_INTEG": 4,
          "O.CARD-": 11,
          "O.CARD-MANAGEMENT": 22,
          "O.CCCM": 9,
          "O.CIPHER": 9,
          "O.CLFDB-DECIPHER": 5,
          "O.CODE_": 1,
          "O.CODE_CAP_FILE": 12,
          "O.CODE_PKG": 1,
          "O.COMM-": 1,
          "O.COMM-AUTH": 10,
          "O.COMM-CONFIDENTIALITY": 7,
          "O.COMM-INTEGRITY": 10,
          "O.CONFID-OS-": 1,
          "O.CONFID-OS-UPDATE": 6,
          "O.CRS_COUNTERS": 5,
          "O.CRS_PRIVILEGES": 5,
          "O.CRT-MNGT": 5,
          "O.CTL_REGISTRY": 5,
          "O.CTL_SC": 5,
          "O.CVM-BLOCK": 9,
          "O.CVM-MGMT": 9,
          "O.DELETION": 5,
          "O.DOMAIN-RIGHTS": 9,
          "O.ELF_APP_DATA": 7,
          "O.ELF_AUTHORISED": 5,
          "O.ELF_DATA_PRO": 5,
          "O.ELF_DELE_IRR": 5,
          "O.ELF_INTEGRITY": 5,
          "O.ELF_SESSION": 7,
          "O.FIREWALL": 19,
          "O.GLOBAL-CVM": 5,
          "O.GLOBAL_ARRAY": 2,
          "O.GLOBAL_ARRAYS_CONFID": 6,
          "O.GLOBAL_ARRAYS_INTEG": 6,
          "O.INSTALL": 11,
          "O.JAVAO": 1,
          "O.JAVAOB": 4,
          "O.JAVAOBJE": 1,
          "O.JAVAOBJECT": 42,
          "O.KEY-MNGT": 9,
          "O.LC-MANAGEMENT": 6,
          "O.LOAD": 11,
          "O.MTC-CTR-": 1,
          "O.MTC-CTR-MNGT": 4,
          "O.NATIVE": 11,
          "O.NO-KEY-REUSE": 5,
          "O.OBJ-DELETION": 5,
          "O.OPERATE": 23,
          "O.PIN-": 1,
          "O.PIN-MNGT": 7,
          "O.PRIVILEGES-": 1,
          "O.PRIVILEGES-MANAGEMENT": 4,
          "O.REALLOCATION": 7,
          "O.RECEIPT": 5,
          "O.RESOURCES": 7,
          "O.RND": 1,
          "O.RNG": 8,
          "O.SCP": 45,
          "O.SECURE_AC_ACTIV": 1,
          "O.SECURE_AC_ACTIVATION": 6,
          "O.SECURE_LOAD_AC": 1,
          "O.SECURE_LOAD_ACODE": 10,
          "O.SECURITY-": 2,
          "O.SECURITY-DOMAINS": 3,
          "O.SENSITIVE_ARR": 1,
          "O.SENSITIVE_ARRAYS_INTEG": 4,
          "O.SENSITIVE_RES": 1,
          "O.SENSITIVE_RESULTS_INTEG": 4,
          "O.SID": 15,
          "O.TOE-": 1,
          "O.TOE_IDENTIFICATI": 1,
          "O.TOE_IDENTIFICATION": 6,
          "O.TOKEN": 5,
          "O.TRANSACTION": 7
        },
        "OE": {
          "OE.ADMIN": 3,
          "OE.AID-MANAGEMENT": 3,
          "OE.AP-KEYS": 3,
          "OE.APPLICATIONS": 3,
          "OE.APPS-PROVIDER": 3,
          "OE.CA-KEYS": 3,
          "OE.CAP_FILE": 6,
          "OE.CLFDB-ENC-PR": 3,
          "OE.CODE-": 5,
          "OE.CODE-EVIDENCE": 12,
          "OE.CONTROLLING-": 1,
          "OE.CONTROLLING-AUTHORITY": 2,
          "OE.DAP_BLOCK_GEN": 3,
          "OE.ISD-KEYS": 3,
          "OE.ISSUER": 3,
          "OE.KEY-CHANGE": 3,
          "OE.KEY-ESCROW": 3,
          "OE.KEY-GENERATION": 3,
          "OE.KEYS-PROT": 3,
          "OE.LOADING": 3,
          "OE.OS-UPDATE-": 1,
          "OE.OS-UPDATE-ENCRYPTION": 4,
          "OE.OS-UPDATE-EVIDENCE": 3,
          "OE.PERSONALISER": 3,
          "OE.PRODUCTION": 4,
          "OE.RECEIPT-VER": 3,
          "OE.SCP": 3,
          "OE.SCP-SUPP": 3,
          "OE.SECURE_ACODE_MANA": 1,
          "OE.SECURE_ACODE_MANAGEMENT": 2,
          "OE.SERVERS": 3,
          "OE.TOKEN-GEN": 3,
          "OE.VERIFICATION": 35,
          "OE.VERIFICATION-": 1,
          "OE.VERIFICATION-AUTHORITY": 2
        },
        "OP": {
          "OP.ARRAY_AASTORE": 3,
          "OP.ARRAY_ACCESS": 4,
          "OP.ARRAY_LENGTH": 4,
          "OP.ARRAY_T_ALOAD": 3,
          "OP.ARRAY_T_ASTORE": 3,
          "OP.CREATE": 7,
          "OP.DELETE_APPLET": 4,
          "OP.DELETE_CAP_FILE": 3,
          "OP.DELETE_CAP_FILE_APPLET": 3,
          "OP.INSTANCE_FIELD": 3,
          "OP.INVK_INTERFACE": 7,
          "OP.INVK_VIRTUAL": 6,
          "OP.JAVA": 5,
          "OP.PUT": 5,
          "OP.PUTFIELD": 1,
          "OP.PUTSTATIC": 1,
          "OP.THROW": 5,
          "OP.TYPE_ACCESS": 5
        },
        "OSP": {
          "OSP.ADDITIONAL_CODE_EN": 1,
          "OSP.ADDITIONAL_CODE_ENCRYPTION": 2,
          "OSP.ADDITIONAL_CODE_SIG": 1,
          "OSP.ADDITIONAL_CODE_SIGNING": 2,
          "OSP.AID-MANAGEMENT": 3,
          "OSP.APPLICATIONS": 3,
          "OSP.APSD-KEYS": 3,
          "OSP.ATOMIC_ACTIVATION": 3,
          "OSP.CASD-KEYS": 3,
          "OSP.CCCM": 3,
          "OSP.CLFDB-ENC-PR": 3,
          "OSP.DAP_BLOCK_GEN": 3,
          "OSP.ELF_DELE_OP": 3,
          "OSP.ISD-KEYS": 3,
          "OSP.KEY-CHANGE": 3,
          "OSP.KEY-GENERATION": 3,
          "OSP.LOADING": 3,
          "OSP.RECEIPT-VER": 3,
          "OSP.SECURITY-DOMAINS": 3,
          "OSP.SERVERS": 3,
          "OSP.TOE_IDENTIFICATION": 3,
          "OSP.TOKEN-GEN": 3,
          "OSP.VERIFICATION": 3
        },
        "R": {
          "R.JAVA": 12
        },
        "T": {
          "T.BRUTE-FORCE-CVM": 3,
          "T.BRUTE-FORCE-SCP": 3,
          "T.CLFDB-DISC": 3,
          "T.COM-EXPLOIT": 4,
          "T.CONFID-APPLI-": 1,
          "T.CONFID-APPLI-DATA": 3,
          "T.CONFID-JCS-": 2,
          "T.CONFID-JCS-CODE": 2,
          "T.CONFID-JCS-DATA": 2,
          "T.CONFID-OS-UPDATE-": 1,
          "T.CONFID-OS-UPDATE-LOAD": 2,
          "T.COUNTERS-FREEZE": 3,
          "T.CRS-BYPASS": 3,
          "T.CTL-AUTH-FORGE": 3,
          "T.CTL-REGISTRY-": 1,
          "T.CTL-REGISTRY-OVERWRITE": 2,
          "T.CVM-IMPERSONATE": 3,
          "T.CVM-UPDATE": 3,
          "T.DELETION": 4,
          "T.ELF-DATA-ACCESS": 3,
          "T.ELF-DATA-INTEGRITY": 3,
          "T.ELF-ILL-COMMAND": 3,
          "T.ELF-RES-DATA": 3,
          "T.ELF-SESSION": 3,
          "T.ELF-UNAUTHORISED": 3,
          "T.ELF-VERSION": 3,
          "T.EXE-CODE": 7,
          "T.FAKE-SGNVER-KEY": 3,
          "T.INSTALL": 4,
          "T.INTEG-APPLI-": 4,
          "T.INTEG-APPLI-CODE": 4,
          "T.INTEG-APPLI-DATA": 5,
          "T.INTEG-JCS-": 1,
          "T.INTEG-JCS-CODE": 2,
          "T.INTEG-JCS-DATA": 3,
          "T.INTEG-OS-UPDATE-": 1,
          "T.INTEG-OS-UPDATE-LOAD": 2,
          "T.LIFE-CYCLE": 4,
          "T.NATIVE": 3,
          "T.OBJ-DELETION": 3,
          "T.PHYSICAL": 9,
          "T.RECEIPT": 3,
          "T.RESOURCES": 3,
          "T.RND": 1,
          "T.SID": 8,
          "T.TOKEN": 3,
          "T.UNAUTHORISED-": 1,
          "T.UNAUTHORISED-CARD-MGMT": 4,
          "T.UNAUTHORISED-TOE-": 1,
          "T.UNAUTHORISED-TOE-CODE-": 1,
          "T.UNAUTHORISED-TOE-CODE-UPDATE": 1,
          "T.WRONG-UPDATE-": 1,
          "T.WRONG-UPDATE-STATE": 2
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 1,
          "BSI-CC-PP-0099-V2-2020": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 5,
          "ADV_FSP.1": 3,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 9,
          "ADV_IMP.1": 4,
          "ADV_TDS.1": 2,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 5
        },
        "AGD": {
          "AGD_OPE.1": 9,
          "AGD_PRE.1": 3
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 4,
          "ALC_FLR.1": 4,
          "ALC_FLR.2": 1,
          "ALC_LCD.1": 3,
          "ALC_TAT.1": 3
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 4,
          "ASE_OBJ.2": 2,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 3,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 3,
          "ATE_DPT.1": 2,
          "ATE_FUN.1": 5
        },
        "AVA": {
          "AVA_VAN.5": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 4,
          "EAL4 augmented": 2,
          "EAL4+": 2,
          "EAL6+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 15,
          "FAU_ARP.1.1": 2,
          "FAU_GEN": 1,
          "FAU_SAA.1": 3,
          "FAU_SAR": 2,
          "FAU_SAS": 1,
          "FAU_SAS.1": 1
        },
        "FCO": {
          "FCO_NRO": 28,
          "FCO_NRO.2": 9,
          "FCO_NRR": 5,
          "FCO_NRR.1": 3
        },
        "FCS": {
          "FCS_CKM": 72,
          "FCS_CKM.1": 31,
          "FCS_CKM.2": 9,
          "FCS_CKM.4": 65,
          "FCS_CKM.4.1": 1,
          "FCS_CKM.5": 7,
          "FCS_CKM.5.1": 1,
          "FCS_COP": 160,
          "FCS_COP.1": 31,
          "FCS_RNG": 1,
          "FCS_RNG.1": 11,
          "FCS_RNG.1.1": 2,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC": 66,
          "FDP_ACC.1": 27,
          "FDP_ACC.2": 5,
          "FDP_ACF": 58,
          "FDP_ACF.1": 38,
          "FDP_IFC": 67,
          "FDP_IFC.1": 23,
          "FDP_IFC.2": 6,
          "FDP_IFF": 53,
          "FDP_IFF.1": 27,
          "FDP_ITC": 32,
          "FDP_ITC.1": 23,
          "FDP_ITC.2": 33,
          "FDP_ITT.1": 1,
          "FDP_RIP": 127,
          "FDP_RIP.1": 9,
          "FDP_ROL": 32,
          "FDP_ROL.1": 11,
          "FDP_SDC.1": 1,
          "FDP_SDI": 25,
          "FDP_SDI.2": 10,
          "FDP_SDI.2.2": 1,
          "FDP_UCT": 6,
          "FDP_UCT.1": 1,
          "FDP_UIT": 9,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_AFL": 11,
          "FIA_AFL.1": 8,
          "FIA_API.1": 1,
          "FIA_ATD": 13,
          "FIA_ATD.1": 3,
          "FIA_UAU": 27,
          "FIA_UAU.1": 4,
          "FIA_UAU.4": 1,
          "FIA_UID": 34,
          "FIA_UID.1": 14,
          "FIA_UID.2": 1,
          "FIA_USB": 7,
          "FIA_USB.1": 3
        },
        "FMT": {
          "FMT_LIM": 6,
          "FMT_MSA": 189,
          "FMT_MSA.1": 19,
          "FMT_MSA.2": 2,
          "FMT_MSA.3": 30,
          "FMT_MTD": 38,
          "FMT_MTD.1": 5,
          "FMT_MTD.3": 2,
          "FMT_SMF": 78,
          "FMT_SMF.1": 28,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 82,
          "FMT_SMR.1": 43,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO": 12,
          "FPR_UNO.1": 14,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_FLS": 58,
          "FPT_FLS.1": 7,
          "FPT_ITT.1": 1,
          "FPT_PHP.3": 1,
          "FPT_RCV": 24,
          "FPT_RCV.3": 10,
          "FPT_RCV.4": 1,
          "FPT_STM": 3,
          "FPT_STM.1": 5,
          "FPT_TDC": 9,
          "FPT_TDC.1": 9,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 1
        },
        "FRU": {
          "FRU_FLT.2": 1
        },
        "FTP": {
          "FTP_ITC": 34,
          "FTP_ITC.1": 13,
          "FTP_TRP": 10,
          "FTP_TRP.1": 11
        }
      },
      "certification_process": {
        "OutOfScope": {
          "GemActivate). The platform implements the following modes, but they are out of scope of the TOE: \u25aa mEAC v1": 1,
          "of software patches (GemActivate). The platform implements the following modes, but they are out of scope of the TOE: \u25aa mEAC v1. \u25aa Integrated mapping (DH and ECDH). \u25aa Generic mapping (DH) \u25aa PACE and mEAC": 1,
          "out of scope": 3,
          "protection of the confidentiality and integrity of user data, and for entity authentication. CSP is out of scope of the TOE. CSP provides service, including: Connected eSE 5.3.4 v1.2 Platform Security Target": 1,
          "v1.2 Platform Security Target Lite \u00a9 Copyright Thales DIS France SAS - 2024 Page: 62 / 171 point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 32
        },
        "CCM": {
          "CCM": 13
        },
        "CTR": {
          "CTR": 1
        },
        "ECB": {
          "ECB": 8
        },
        "GCM": {
          "GCM": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 1
        },
        "PGP": {
          "PGP": 1
        },
        "TLS": {
          "TLS": {
            "TLS": 1
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 8,
          "Key agreement": 5
        },
        "KEX": {
          "Key Exchange": 1
        },
        "MAC": {
          "MAC": 18
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 4,
            "SHA1": 7
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 5,
            "SHA-384": 5,
            "SHA-512": 4,
            "SHA224": 3,
            "SHA256": 4,
            "SHA384": 4,
            "SHA512": 4
          },
          "SHA3": {
            "SHA3-224": 1,
            "SHA3-256": 1,
            "SHA3-384": 1,
            "SHA3-512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "ALG": {
          "AES": {
            "ALG_AES_BLOCK_128_CBC_NOPAD": 2,
            "ALG_AES_BLOCK_128_ECB_NOPAD": 2,
            "ALG_AES_CBC_ISO9797_M1": 2,
            "ALG_AES_CBC_ISO9797_M2": 2,
            "ALG_AES_CBC_PKCS5": 2,
            "ALG_AES_CCM": 2,
            "ALG_AES_CMAC_128": 4,
            "ALG_AES_CTR": 2,
            "ALG_AES_ECB_ISO9797_M1": 2,
            "ALG_AES_ECB_ISO9797_M2": 2,
            "ALG_AES_ECB_PKCS5": 2,
            "ALG_AES_GCM": 2,
            "ALG_AES_MAC_128_NOPAD": 2,
            "ALG_AES_MAC_192_NOPAD": 1,
            "ALG_AES_MAC_256_NOPAD": 1
          },
          "DES": {
            "ALG_DES_CBC_ISO9797_M1": 2,
            "ALG_DES_CBC_ISO9797_M2": 2,
            "ALG_DES_CBC_NOPAD": 2,
            "ALG_DES_CBC_PKCS5": 2,
            "ALG_DES_ECB_ISO9797_M1": 2,
            "ALG_DES_ECB_ISO9797_M2": 2,
            "ALG_DES_ECB_NOPAD": 2,
            "ALG_DES_ECB_PKCS5": 2,
            "ALG_DES_MAC4_ISO9797_1_M1_ALG3": 2,
            "ALG_DES_MAC4_ISO9797_1_M2_ALG3": 2,
            "ALG_DES_MAC4_ISO9797_M1": 2,
            "ALG_DES_MAC4_ISO9797_M2": 2,
            "ALG_DES_MAC4_NOPAD": 2,
            "ALG_DES_MAC4_PKCS5": 2,
            "ALG_DES_MAC8_ISO9797_1_M1_ALG3": 2,
            "ALG_DES_MAC8_ISO9797_1_M2_ALG3": 2,
            "ALG_DES_MAC8_ISO9797_M1": 2,
            "ALG_DES_MAC8_ISO9797_M2": 2,
            "ALG_DES_MAC8_NOPAD": 2,
            "ALG_DES_MAC8_PKCS5": 2
          },
          "EC": {
            "ALG_EC_FP": 6,
            "ALG_EC_SVDP_DHC_KDF": 2,
            "ALG_EC_SVDP_DHC_PLAIN": 1,
            "ALG_EC_SVDP_DH_KDF": 2,
            "ALG_EC_SVDP_DH_PLAIN": 1,
            "ALG_EC_SVDP_DH_PLAIN_XY": 2
          },
          "ECDSA": {
            "ALG_ECDSA_SHA": 2,
            "ALG_ECDSA_SHA_224": 2,
            "ALG_ECDSA_SHA_256": 2,
            "ALG_ECDSA_SHA_384": 2,
            "ALG_ECDSA_SHA_512": 2
          },
          "HMAC": {
            "ALG_HMAC_SHA1": 8,
            "ALG_HMAC_SHA_256": 8,
            "ALG_HMAC_SHA_384": 2,
            "ALG_HMAC_SHA_512": 2
          },
          "ISO3309": {
            "ALG_ISO3309_CRC16": 2,
            "ALG_ISO3309_CRC32": 2
          },
          "RSA": {
            "ALG_RSA_NOPAD": 2,
            "ALG_RSA_PKCS1": 1,
            "ALG_RSA_PKCS1_OAEP": 2,
            "ALG_RSA_SHA_224_PKCS1": 2,
            "ALG_RSA_SHA_224_PKCS1_PSS": 2,
            "ALG_RSA_SHA_256_PKCS1": 2,
            "ALG_RSA_SHA_256_PKCS1_PSS": 2,
            "ALG_RSA_SHA_384_PKCS1": 2,
            "ALG_RSA_SHA_384_PKCS1_PSS": 2,
            "ALG_RSA_SHA_512_PKCS1": 2,
            "ALG_RSA_SHA_512_PKCS1_PSS": 2,
            "ALG_RSA_SHA_ISO9796": 2,
            "ALG_RSA_SHA_ISO9796_MR": 2,
            "ALG_RSA_SHA_PKCS1": 2,
            "ALG_RSA_SHA_PKCS1_PSS": 2,
            "ALG_RSA_SHA_RFC2409": 2
          },
          "SHA": {
            "ALG_SHA_224": 4,
            "ALG_SHA_256": 6,
            "ALG_SHA_384": 4,
            "ALG_SHA_512": 4
          },
          "SHA3": {
            "ALG_SHA3_224": 4,
            "ALG_SHA3_256": 4,
            "ALG_SHA3_384": 4,
            "ALG_SHA3_512": 4
          }
        },
        "curves": {
          "BRAINPOOLP192R1": 1,
          "BRAINPOOLP224R1": 1,
          "BRAINPOOLP256R1": 2,
          "BRAINPOOLP256T1": 1,
          "BRAINPOOLP320R1": 2,
          "BRAINPOOLP320T1": 1,
          "BRAINPOOLP384R1": 2,
          "BRAINPOOLP384T1": 1,
          "BRAINPOOLP512R1": 2,
          "BRAINPOOLP512T1": 1,
          "SECP192R1": 1,
          "SECP256R1": 2,
          "SECP384R1": 1,
          "SECP521R1": 2
        },
        "misc": {
          "CIPHER_AES_CCM": 2,
          "CIPHER_AES_GCM": 2,
          "LENGTH_AES_128": 2,
          "LENGTH_EC_FP_160": 3,
          "LENGTH_EC_FP_192": 2,
          "LENGTH_EC_FP_224": 3,
          "LENGTH_EC_FP_256": 2,
          "LENGTH_EC_FP_384": 3,
          "LENGTH_EC_FP_521": 2,
          "LENGTH_HMAC_SHA_1_BLOCK_64": 1,
          "LENGTH_HMAC_SHA_256_BLOCK_64": 1,
          "LENGTH_HMAC_SHA_384_BLOCK_128": 1,
          "LENGTH_HMAC_SHA_384_BLOCK_64": 1,
          "LENGTH_HMAC_SHA_512_BLOCK_128": 1,
          "LENGTH_HMAC_SHA_512_BLOCK_64": 1,
          "LENGTH_RSA_1024": 1,
          "LENGTH_RSA_1536": 1,
          "LENGTH_RSA_2048": 1,
          "LENGTH_SHA": 8,
          "LENGTH_SHA3_224": 2,
          "LENGTH_SHA3_384": 2,
          "LENGTH_SHA_224": 2,
          "LENGTH_SHA_384": 2,
          "PAD_PKCS1_OAEP": 1,
          "PAD_PKCS1_OAEP_SHA256": 1,
          "PAD_PKCS1_OAEP_SHA3_256": 1,
          "PAD_PKCS1_OAEP_SHA3_512": 1,
          "PAD_PKCS1_OAEP_SHA512": 1,
          "SIG_CIPHER_AES_CMAC128": 2,
          "SIG_CIPHER_AES_MAC128": 2,
          "SIG_CIPHER_DES_MAC4": 2,
          "SIG_CIPHER_DES_MAC8": 2,
          "SIG_CIPHER_ECDSA": 2,
          "SIG_CIPHER_ECDSA_PLAIN": 2,
          "SIG_CIPHER_HMAC": 2,
          "SIG_CIPHER_RSA": 2,
          "TYPE_ACCESS": 5,
          "TYPE_EC_FP_PRIVATE": 6,
          "TYPE_EC_FP_PRIVATE_TRANSIENT_RESET": 1,
          "TYPE_HMAC": 6,
          "TYPE_HMAC_TRANSIENT_RESET": 1
        }
      },
      "javacard_packages": {
        "javacard": {
          "javacard.framework": 5,
          "javacard.security": 8
        },
        "javacardx": {
          "javacardx.crypto": 1,
          "javacardx.framework.time": 1,
          "javacardx.security": 3,
          "javacardx.security.cert": 1,
          "javacardx.security.util": 2
        }
      },
      "javacard_version": {
        "GlobalPlatform": {
          "Global Platform 2.3.1": 1
        },
        "JavaCard": {
          "Java Card 3.1.0": 4
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 2,
          "RNG": 10
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 5,
          "malfunction": 4,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 1,
          "Leak-Inherent": 3,
          "Physical Probing": 2,
          "physical probing": 3,
          "side channel": 1
        },
        "other": {
          "JIL": 8
        }
      },
      "standard_id": {
        "BSI": {
          "AIS20": 2,
          "AIS31": 6
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        },
        "FIPS": {
          "FIPS 180": 1,
          "FIPS 180-4": 5,
          "FIPS 197": 4,
          "FIPS 197126": 1,
          "FIPS 198": 2,
          "FIPS 202": 4,
          "FIPS PUB 180-4": 1,
          "FIPS PUB 186-4": 2,
          "FIPS PUB 186-4184": 1,
          "FIPS PUB 197": 3,
          "FIPS PUB 46-3": 2,
          "FIPS PUB 81": 2
        },
        "ICAO": {
          "ICAO": 4
        },
        "ISO": {
          "ISO/IEC 10116": 4,
          "ISO/IEC 14888-2": 2,
          "ISO/IEC 18032": 4,
          "ISO/IEC 18032:2020": 1,
          "ISO/IEC 18033-3": 2,
          "ISO/IEC 3309206": 2,
          "ISO/IEC 9796-2": 1,
          "ISO/IEC 9797-1": 7,
          "ISO/IEC 9797-2": 2
        },
        "PKCS": {
          "PKCS #1": 1,
          "PKCS#1": 9,
          "PKCS#5": 1,
          "PKCS#5157": 1,
          "PKCS#5161": 1
        },
        "RFC": {
          "RFC 5246": 2,
          "RFC 5758": 2,
          "RFC 5869": 2,
          "RFC2104": 2,
          "RFC2409": 1,
          "RFC2409174": 1,
          "RFC3610165": 1
        },
        "SCP": {
          "SCP02": 16,
          "SCP03": 13,
          "SCP10": 2,
          "SCP11": 13,
          "SCP22": 2,
          "SCP80": 12,
          "SCP81": 11
        },
        "X509": {
          "X.509": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 40,
            "AES128": 2
          }
        },
        "DES": {
          "3DES": {
            "3DES": 11,
            "TDES": 49
          },
          "DES": {
            "DES": 5
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 2,
            "CMAC": 4,
            "HMAC": 15,
            "KMAC": 3
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 16
        }
      },
      "tls_cipher_suite": {
        "TLS": {
          "TLS_PSK_WITH_AES_128_CBC_S": 1,
          "TLS_PSK_WITH_NULL_SHA": 1,
          "TLS_PSK_WITH_NULL_SHA256": 1
        }
      },
      "vendor": {
        "STMicroelectronics": {
          "STMicroelectronics": 20
        },
        "Thales": {
          "Thales": 208
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20241031112531+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20241031112531+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 2293709,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 171
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2025_04fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.1",
      "EAL4+",
      "ALC_DVS.2",
      "AVA_VAN.5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible-ANSSI-CC-2025_04en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "2bb32f3f339c9d50ac17a3a7b85f32f7453914fe79baac9582cd89d8943c6774",
      "txt_hash": "c23e75fd2a2a6b847f53a18de667f495aa8abdc770cb06836cf573037289f4b1"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e8e0d6a32cb00a81ceec3b7faa5e79edfd8a79a6b141f118aa62d009838f2266",
      "txt_hash": "437dc0a8767059f61a2e30ddb6f240c62089f2ebfb8470650ed81c4850c1785c"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "5b67c154f7da0aaf487dfca5d460deeca0392ad1d4230a08f1ca40806e2f6b9d",
      "txt_hash": "19b92ec941cea4d6da6dc1c7fc181ef0ddcc9694f3e6e5dbad7b06a6b42ec373"
    }
  },
  "status": "active"
}