CESeCore, version 1.1.2

CSV information ?

Status archived
Valid from 14.06.2012
Valid until 01.09.2019
Scheme 🇫🇷 FR
Manufacturer CESeCore Consortium
Category Key Management Systems
Security level EAL4+, ALC_FLR.2

Heuristics summary ?

Certificate ID: ANSSI-CC-2012/33

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
DES

Security level
EAL 4, EAL4, EAL 1, EAL 3, EAL 5, EAL 7, ITSEC E3 Elémentaire
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_TDS, AGD_OPE, AGD_PRE, ALC_FLR.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_LCD, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Certificates
ANSSI-CC-2012/33
Evaluation facilities
OPPIDA

Standards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004

File metadata

Title ANSSI-CC-2012/33
Subject CESeCore version 1.1.2
Keywords ANSSI-CC-CER-F-07.009
Author bouly
Creation date D:20120615112546+02'00'
Modification date D:20120615112556+02'00'
Pages 14
Creator Acrobat PDFMaker 8.1 pour Word
Producer Acrobat Distiller 8.1.0 (Windows)

Security target ?

Extracted keywords

Protocols
PACE

Security level
EAL 4+, EAL4, EAL4 augmented
Claims
O.CPS, A.CPS
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ADO_DEL.2, ADO_IGS.1, ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_FSP.2, ADV_HLD.2, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, ADV_FSP.1, ADV_TDS.1, ADV_TDS.2, ADV_FSP.3, AGD_OPE.1, AGD_PRE.1, AGD_ADM.1, AGD_USR.1, ALC_FLR.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ALC_CMS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COV.1, AVA_VAN.3, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_REQ.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SEL.1, FAU_STG.1, FAU_STG.4, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SEL.1.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.4.1, FCO_NRO_CIMC.3, FCO_NRO_CIMC.4, FCO_NRO_CIMC.3.1, FCO_NRO_CIMC.3.2, FCO_NRO_CIMC.3.3, FCO_NRO_CIMC.4.1, FCO_NRO_CIMC.4.2, FCS_CKM_CIMC.5, FCS_CKM.1, FCS_CKM_CIMC.5.1, FCS_CKM.4, FDP_ACF_CIMC.2, FDP_ACF_CIMC.3, FDP_CIMC_BKP.1, FDP_CIMC_BKP.2, FDP_CIMC_CER.1, FDP_CIMC_CRL.1, FDP_CIMC_CSE.1, FDP_CIMC_OCSP.1, FDP_ETC_CIMC.5, FDP_SDI_CIMC.3, FDP_ACC.1, FDP_ACF.1, FDP_ITT.1, FDP_UCT.1, FDP_ETC_CIMC.4, FDP_CIMC_BKP.1.1, FDP_CIMC_BKP.1.2, FDP_CIMC_BKP.1.3, FDP_CIMC_BKP.1.4, FDP_CIMC_BKP.2.1, FDP_CIMC_BKP.2.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_CIMC_CSE.1.1, FDP_ITT.1.1, FDP_UCT.1.1, FDP_ACF_CIMC.2.1, FDP_ACF_CIMC.2.2, FDP_ACF_CIMC.3.1, FDP_ETC_CIMC.5.1, FDP_SDI_CIMC.3.1, FDP_SDI_CIMC.3.2, FDP_CIMC_CER.1.1, FDP_CIMC_CER.1.2, FDP_CIMC_CER.1.3, FDP_CIMC_CER.1.4, FDP_CIMC_CRL.1.1, FDP_CIMC_OCSP.1.1, FDP_IFC.1, FIA_UAU.1, FIA_UID.1, FIA_USB.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_ATD.1, FMT_MOF_CIMC.3, FMT_MOF_CIMC.5, FMT_MOF_CIMC.6, FMT_MTD_CIMC.4, FMT_MTD_CIMC.5, FMT_MTD_CIMC.7, FMT_MOF.1, FMT_MTD_CIMC.6, FMT_MOF.1.1, FMT_MTD_CIMC.4.1, FMT_MTD_CIMC.5.1, FMT_MTD_CIMC.7.1, FMT_MOF_CIMC.3.1, FMT_MOF_CIMC.3.2, FMT_MOF_CIMC.3.3, FMT_MOF_CIMC.3.4, FMT_MOF_CIMC.5.1, FMT_MOF_CIMC.5.2, FMT_MOF_CIMC.5.3, FMT_MOF_CIMC.6.1, FMT_MOF_CIMC.6.2, FMT_MOF_CIMC.6.3, FMT_SMF.1, FMT_MTD.1, FMT_MSA.3, FMT_SMR.1, FPT_CIMC_TSP.1, FPT_ITC.1, FPT_ITT.1, FPT_STM.1, FPT_CIMC_TSP.1.1, FPT_CIMC_TSP.1.2, FPT_CIMC_TSP.1.3, FPT_CIMC_TSP.1.4, FPT_STM.1.1, FPT_ITC.1.1, FPT_ITT.1.1, FPT_RVM.1, FTP_ITC.1, FTP_TRP.1

Standards
FIPS 140-1, FIPS 140-15, FIPS6, PKCS#11, PKCS#8, RFC 2560, RFC 5280, RFC 5019, RFC 2650, X.509
Technical reports
BSI TR-03110

File metadata

Title Security Target for CESeCore v1.1.2
Author Pedro Borges
Creation date D:20120413223648+01'00'
Pages 65
Creator Writer
Producer OpenOffice.org 3.3

Heuristics ?

Certificate ID: ANSSI-CC-2012/33

Extracted SARs

ADV_LLD.1, ASE_CCL.1, ALC_DEL.1, ALC_CMC.4, AVA_MSU.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ASE_TSS.1, ADV_TDS.3, ADV_ARC.1, ADV_HLD.2, AVA_VAN.3, ASE_SPD.1, ASE_REQ.2, ALC_CMS.4, ADV_IMP.1, ALC_TAT.1, ATE_COV.2, AGD_OPE.1, AVA_SOF.1, ALC_DVS.1, ALC_FLR.2, ADV_RCR.1, ASE_ECD.1, AGD_USR.1, ADV_SPM.1, ADV_FSP.4, ASE_INT.1, AGD_ADM.1, AGD_PRE.1, ALC_LCD.1, ASE_OBJ.2, AVA_VLA.2

Scheme data ?

Product CESeCore version 1.1.2
Url https://cyber.gouv.fr/produits-certifies/cesecore-version-112
Description Le produit certifié est la librairie open source « CESeCore version 1.1.2 » développée par le consortium CESeCore. Ce produit est composé de modules logiciels JEE (Java Enterprise Edition) offrant des fonctions de sécurité nécessaires à la création d'applications basées sur une PKI1. La librairie CESeCore n'est pas une application en elle-même car elle doit être intégrée dans une app
Sponsor CESeCore Consortium
Developer CESeCore Consortium
Cert Id ANSSI-CC-2012/33
Level EAL4+
Enhanced
Cert Id ANSSI-CC-2012/33
Certification Date 14.06.2012
Category Produits pour ordinateur personnel et serveur
Cc Version Critères Communs version 3.1r3
Developer CESeCore Consortium
Sponsor CESeCore Consortium
Evaluation Facility Oppida
Level EAL4+
Protection Profile
Mutual Recognition SOG-IS CCRA
Augmented ALC_FLR.2
Target Link https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2012-33en.pdf
Report Link https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2012-33fr.pdf

References ?

No references are available for this certificate.

Updates ?

  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'description': 'Le produit certifié est la librairie open source « CESeCore version 1.1.2 » développée par le consortium CESeCore. Ce produit est composé de modules logiciels JEE (Java Enterprise Edition) offrant des fonctions de sécurité nécessaires à la création d'applications basées sur une PKI1. La librairie CESeCore n'est pas une application en elle-même car elle doit être intégrée dans une app', 'cert_id': 'ANSSI-CC-2012/33', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2012/33', 'certification_date': '2012-06-14', 'mutual_recognition': 'SOG-IS CCRA'}}} data.
  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'CESeCore version 1.1.2', 'url': 'https://cyber.gouv.fr/produits-certifies/cesecore-version-112', 'description': 'Le produit certifié est la librairie open source « CESeCore version 1.1.2 » développée par le consortium CESeCore.\n\nCe produit est composé de modules logiciels JEE (Java Enterprise Edition) offrant des fonctions de sécurité nécessaires à la création d'applications basées sur une PKI1.\n\nLa librairie CESeCore n'est pas une application en elle-même car elle doit être intégrée dans une app', 'sponsor': 'CESeCore Consortium', 'developer': 'CESeCore Consortium', 'cert_id': '2012/33', 'level': 'EAL4+', 'enhanced': {'cert_id': '2012/33', 'certification_date': '14/06/2012', 'category': 'Produits pour ordinateur personnel et serveur', 'cc_version': 'Critères Communs version 3.1r3', 'developer': 'CESeCore Consortium', 'sponsor': 'CESeCore Consortium', 'evaluation_facility': 'Oppida', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_FLR.2', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2012-33en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2012-33fr.pdf'}}.
  • 02.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '64f982ec2cf14b221c7738a7aac84377e726ce39d572603b2074ab2d674f6a0e', 'txt_hash': 'c76f85a1f79f8b40e64251c52615da028e6fe7a4c2faae89b6182b1d2909b625'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '44fc7c211eeb4995d1ffb3f80edb51946750d8b5c4d8d6880e7fe9c995a1df4c', 'txt_hash': '0ffca9b832b692df98db44a96ec76352b48983a91c5c6d3d39674bf93c703731'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 206546, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 14, '/CreationDate': "D:20120615112546+02'00'", '/Subject': 'CESeCore version 1.1.2', '/Author': 'bouly', '/Creator': 'Acrobat PDFMaker 8.1 pour Word', '/Keywords': 'ANSSI-CC-CER-F-07.009', '/Producer': 'Acrobat Distiller 8.1.0 (Windows)', '/ModDate': "D:20120615112556+02'00'", '/Company': 'SGDSN/ANSSI', '/Comments': 'CESeCore Consortium', '/SourceModified': 'D:20120615092536', '/Title': 'ANSSI-CC-2012/33', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ssi.gouv.fr/', 'http://ejbca.org/adminguide.html#Code%20signing', 'https://wiki.cesecore.eu/mediawiki/index.php/Glassfish#securing_the_installation', 'https://www.cesecore.eu/mediawiki/index.php/Main_Page', 'https://wiki.cesecore.eu/mediawiki/inndex.php/JBoss#securing', 'mailto:[email protected]']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 515975, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 65, '/Title': 'Security Target for CESeCore v1.1.2', '/Author': 'Pedro Borges', '/Creator': 'Writer', '/Producer': 'OpenOffice.org 3.3', '/CreationDate': "D:20120413223648+01'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://tools.ietf.org/pdf/rfc5019.pdf', 'http://checklists.nist.gov/', 'http://tools.ietf.org/pdf/rfc5280.pdf', 'http://tools.ietf.org/pdf/rfc2560.pdf', 'http://www.itu.int/rec/T-REC-X.509-200508-I/en']}}.
    • The report_frontpage property was set to {'FR': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2012/33': 15}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 2, 'EAL4': 4, 'EAL 1': 1, 'EAL 3': 1, 'EAL 5': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E3 Elémentaire': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 2, 'AGD_PRE': 2}, 'ALC': {'ALC_FLR.2': 1, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'OPPIDA': {'OPPIDA': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4+': 1, 'EAL4': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 1, 'ACM_CAP.4': 1, 'ACM_SCP.2': 1}, 'ADO': {'ADO_DEL.2': 1, 'ADO_IGS.1': 1}, 'ADV': {'ADV_ARC.1': 5, 'ADV_FSP.4': 25, 'ADV_IMP.1': 6, 'ADV_TDS.3': 18, 'ADV_FSP.2': 11, 'ADV_HLD.2': 1, 'ADV_LLD.1': 1, 'ADV_RCR.1': 1, 'ADV_SPM.1': 1, 'ADV_FSP.1': 6, 'ADV_TDS.1': 10, 'ADV_TDS.2': 2, 'ADV_FSP.3': 2}, 'AGD': {'AGD_OPE.1': 5, 'AGD_PRE.1': 6, 'AGD_ADM.1': 1, 'AGD_USR.1': 1}, 'ALC': {'ALC_FLR.2': 5, 'ALC_CMC.4': 4, 'ALC_CMS.4': 4, 'ALC_DEL.1': 3, 'ALC_DVS.1': 3, 'ALC_LCD.1': 3, 'ALC_TAT.1': 5, 'ALC_CMS.1': 1}, 'ATE': {'ATE_COV.2': 6, 'ATE_DPT.1': 4, 'ATE_FUN.1': 7, 'ATE_IND.2': 2, 'ATE_COV.1': 4}, 'AVA': {'AVA_VAN.3': 3, 'AVA_MSU.2': 1, 'AVA_SOF.1': 1, 'AVA_VLA.2': 1}, 'ASE': {'ASE_CCL.1': 3, 'ASE_ECD.1': 6, 'ASE_INT.1': 5, 'ASE_OBJ.2': 4, 'ASE_REQ.2': 5, 'ASE_SPD.1': 5, 'ASE_TSS.1': 3, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 9, 'FAU_GEN.2': 4, 'FAU_SEL.1': 5, 'FAU_STG.1': 5, 'FAU_STG.4': 4, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SEL.1.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.4.1': 1}, 'FCO': {'FCO_NRO_CIMC.3': 6, 'FCO_NRO_CIMC.4': 5, 'FCO_NRO_CIMC.3.1': 1, 'FCO_NRO_CIMC.3.2': 1, 'FCO_NRO_CIMC.3.3': 1, 'FCO_NRO_CIMC.4.1': 1, 'FCO_NRO_CIMC.4.2': 1}, 'FCS': {'FCS_CKM_CIMC.5': 5, 'FCS_CKM.1': 2, 'FCS_CKM_CIMC.5.1': 1, 'FCS_CKM.4': 1}, 'FDP': {'FDP_ACF_CIMC.2': 5, 'FDP_ACF_CIMC.3': 5, 'FDP_CIMC_BKP.1': 6, 'FDP_CIMC_BKP.2': 5, 'FDP_CIMC_CER.1': 6, 'FDP_CIMC_CRL.1': 5, 'FDP_CIMC_CSE.1': 5, 'FDP_CIMC_OCSP.1': 5, 'FDP_ETC_CIMC.5': 5, 'FDP_SDI_CIMC.3': 5, 'FDP_ACC.1': 9, 'FDP_ACF.1': 7, 'FDP_ITT.1': 5, 'FDP_UCT.1': 5, 'FDP_ETC_CIMC.4': 1, 'FDP_CIMC_BKP.1.1': 1, 'FDP_CIMC_BKP.1.2': 1, 'FDP_CIMC_BKP.1.3': 1, 'FDP_CIMC_BKP.1.4': 1, 'FDP_CIMC_BKP.2.1': 1, 'FDP_CIMC_BKP.2.2': 1, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_CIMC_CSE.1.1': 1, 'FDP_ITT.1.1': 2, 'FDP_UCT.1.1': 1, 'FDP_ACF_CIMC.2.1': 1, 'FDP_ACF_CIMC.2.2': 1, 'FDP_ACF_CIMC.3.1': 1, 'FDP_ETC_CIMC.5.1': 1, 'FDP_SDI_CIMC.3.1': 1, 'FDP_SDI_CIMC.3.2': 1, 'FDP_CIMC_CER.1.1': 1, 'FDP_CIMC_CER.1.2': 1, 'FDP_CIMC_CER.1.3': 1, 'FDP_CIMC_CER.1.4': 1, 'FDP_CIMC_CRL.1.1': 1, 'FDP_CIMC_OCSP.1.1': 1, 'FDP_IFC.1': 2}, 'FIA': {'FIA_UAU.1': 5, 'FIA_UID.1': 8, 'FIA_USB.1': 5, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_ATD.1': 1}, 'FMT': {'FMT_MOF_CIMC.3': 8, 'FMT_MOF_CIMC.5': 9, 'FMT_MOF_CIMC.6': 9, 'FMT_MTD_CIMC.4': 6, 'FMT_MTD_CIMC.5': 6, 'FMT_MTD_CIMC.7': 5, 'FMT_MOF.1': 10, 'FMT_MTD_CIMC.6': 3, 'FMT_MOF.1.1': 1, 'FMT_MTD_CIMC.4.1': 1, 'FMT_MTD_CIMC.5.1': 1, 'FMT_MTD_CIMC.7.1': 1, 'FMT_MOF_CIMC.3.1': 1, 'FMT_MOF_CIMC.3.2': 1, 'FMT_MOF_CIMC.3.3': 1, 'FMT_MOF_CIMC.3.4': 1, 'FMT_MOF_CIMC.5.1': 1, 'FMT_MOF_CIMC.5.2': 1, 'FMT_MOF_CIMC.5.3': 1, 'FMT_MOF_CIMC.6.1': 1, 'FMT_MOF_CIMC.6.2': 1, 'FMT_MOF_CIMC.6.3': 1, 'FMT_SMF.1': 2, 'FMT_MTD.1': 1, 'FMT_MSA.3': 1, 'FMT_SMR.1': 4}, 'FPT': {'FPT_CIMC_TSP.1': 6, 'FPT_ITC.1': 4, 'FPT_ITT.1': 5, 'FPT_STM.1': 6, 'FPT_CIMC_TSP.1.1': 1, 'FPT_CIMC_TSP.1.2': 1, 'FPT_CIMC_TSP.1.3': 1, 'FPT_CIMC_TSP.1.4': 1, 'FPT_STM.1.1': 1, 'FPT_ITC.1.1': 1, 'FPT_ITT.1.1': 2, 'FPT_RVM.1': 1}, 'FTP': {'FTP_ITC.1': 1, 'FTP_TRP.1': 1}}, 'cc_claims': {'O': {'O.CPS': 1}, 'A': {'A.CPS': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'PACE': {'PACE': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI TR-03110': 3}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-1': 26, 'FIPS 140-15': 1, 'FIPS6': 1}, 'PKCS': {'PKCS#11': 4, 'PKCS#8': 1}, 'RFC': {'RFC 2560': 7, 'RFC 5280': 5, 'RFC 5019': 1, 'RFC 2650': 1}, 'X509': {'X.509': 15}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to ANSSI-CC-2012_33.pdf.
    • The st_filename property was set to 2012-33 SecurityTarget.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ANSSI-CC-2012/33.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}]} values added.
  • 19.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'CESeCore version 1.1.2', 'url': 'https://cyber.gouv.fr/produits-certifies/cesecore-version-112', 'description': 'Le produit certifié est la librairie open source « CESeCore version 1.1.2 » développée par le consortium CESeCore.\n\nCe produit est composé de modules logiciels JEE (Java Enterprise Edition) offrant des fonctions de sécurité nécessaires à la création d'applications basées sur une PKI1.\n\nLa librairie CESeCore n'est pas une application en elle-même car elle doit être intégrée dans une app', 'sponsor': 'CESeCore Consortium', 'developer': 'CESeCore Consortium', 'cert_id': '2012/33', 'level': 'EAL4+', 'enhanced': {'cert_id': '2012/33', 'certification_date': '14/06/2012', 'category': 'Produits pour ordinateur personnel et serveur', 'cc_version': 'Critères Communs version 3.1r3', 'developer': 'CESeCore Consortium', 'sponsor': 'CESeCore Consortium', 'evaluation_facility': 'Oppida', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_FLR.2', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2012-33en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2012-33fr.pdf'}}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2012_33.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2012-33%20SecurityTarget.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}]} values discarded.
  • 31.07.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name CESeCore, version 1.1.2 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Key Management Systems",
  "cert_link": null,
  "dgst": "147aaed107adccf4",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2012/33",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.1.2"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "ANSSI-CC-2012/33",
      "description": "Le produit certifi\u00e9 est la librairie open source \u00ab CESeCore version 1.1.2 \u00bb d\u00e9velopp\u00e9e par le consortium CESeCore. Ce produit est compos\u00e9 de modules logiciels JEE (Java Enterprise Edition) offrant des fonctions de s\u00e9curit\u00e9 n\u00e9cessaires \u00e0 la cr\u00e9ation d\u0026#39;applications bas\u00e9es sur une PKI1. La librairie CESeCore n\u0026#39;est pas une application en elle-m\u00eame car elle doit \u00eatre int\u00e9gr\u00e9e dans une app",
      "developer": "CESeCore Consortium",
      "enhanced": {
        "augmented": "ALC_FLR.2",
        "category": "Produits pour ordinateur personnel et serveur",
        "cc_version": "Crit\u00e8res Communs version 3.1r3",
        "cert_id": "ANSSI-CC-2012/33",
        "certification_date": "2012-06-14",
        "developer": "CESeCore Consortium",
        "evaluation_facility": "Oppida",
        "level": "EAL4+",
        "mutual_recognition": "SOG-IS CCRA",
        "protection_profile": "",
        "report_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2012-33fr.pdf",
        "sponsor": "CESeCore Consortium",
        "target_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2012-33en.pdf"
      },
      "level": "EAL4+",
      "product": "CESeCore version 1.1.2",
      "sponsor": "CESeCore Consortium",
      "url": "https://cyber.gouv.fr/produits-certifies/cesecore-version-112"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "CESeCore Consortium",
  "manufacturer_web": "https://www.cesecore.eu/",
  "name": "CESeCore, version 1.1.2",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2012-06-14",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "ANSSI-CC-2012_33.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2012/33": 15
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_FSP": 1,
          "ADV_IMP": 1,
          "ADV_TDS": 1
        },
        "AGD": {
          "AGD_OPE": 2,
          "AGD_PRE": 2
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1,
          "ALC_DEL": 1,
          "ALC_DVS": 1,
          "ALC_FLR": 2,
          "ALC_FLR.2": 1,
          "ALC_LCD": 1,
          "ALC_TAT": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 1,
          "EAL 4": 2,
          "EAL 5": 1,
          "EAL 7": 1,
          "EAL4": 4
        },
        "ITSEC": {
          "ITSEC E3 El\u00e9mentaire": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "OPPIDA": {
          "OPPIDA": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2009-07-001": 1,
          "CCMB-2009-07-002": 1,
          "CCMB-2009-07-003": 1,
          "CCMB-2009-07-004": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "bouly",
      "/Comments": "CESeCore Consortium",
      "/Company": "SGDSN/ANSSI",
      "/CreationDate": "D:20120615112546+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 8.1 pour Word",
      "/Keywords": "ANSSI-CC-CER-F-07.009",
      "/ModDate": "D:20120615112556+02\u002700\u0027",
      "/Producer": "Acrobat Distiller 8.1.0 (Windows)",
      "/SourceModified": "D:20120615092536",
      "/Subject": "CESeCore version 1.1.2",
      "/Title": "ANSSI-CC-2012/33",
      "pdf_file_size_bytes": 206546,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://wiki.cesecore.eu/mediawiki/inndex.php/JBoss#securing",
          "http://ejbca.org/adminguide.html#Code%20signing",
          "https://www.cesecore.eu/mediawiki/index.php/Main_Page",
          "mailto:[email protected]",
          "http://www.ssi.gouv.fr/",
          "https://wiki.cesecore.eu/mediawiki/index.php/Glassfish#securing_the_installation"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 14
    },
    "st_filename": "2012-33 SecurityTarget.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.CPS": 1
        },
        "O": {
          "O.CPS": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_AUT.1": 1,
          "ACM_CAP.4": 1,
          "ACM_SCP.2": 1
        },
        "ADO": {
          "ADO_DEL.2": 1,
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_ARC.1": 5,
          "ADV_FSP.1": 6,
          "ADV_FSP.2": 11,
          "ADV_FSP.3": 2,
          "ADV_FSP.4": 25,
          "ADV_HLD.2": 1,
          "ADV_IMP.1": 6,
          "ADV_LLD.1": 1,
          "ADV_RCR.1": 1,
          "ADV_SPM.1": 1,
          "ADV_TDS.1": 10,
          "ADV_TDS.2": 2,
          "ADV_TDS.3": 18
        },
        "AGD": {
          "AGD_ADM.1": 1,
          "AGD_OPE.1": 5,
          "AGD_PRE.1": 6,
          "AGD_USR.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 4,
          "ALC_CMS.1": 1,
          "ALC_CMS.4": 4,
          "ALC_DEL.1": 3,
          "ALC_DVS.1": 3,
          "ALC_FLR.2": 5,
          "ALC_LCD.1": 3,
          "ALC_TAT.1": 5
        },
        "ASE": {
          "ASE_CCL.1": 3,
          "ASE_ECD.1": 6,
          "ASE_INT.1": 5,
          "ASE_OBJ.2": 4,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 5,
          "ASE_SPD.1": 5,
          "ASE_TSS.1": 3
        },
        "ATE": {
          "ATE_COV.1": 4,
          "ATE_COV.2": 6,
          "ATE_DPT.1": 4,
          "ATE_FUN.1": 7,
          "ATE_IND.2": 2
        },
        "AVA": {
          "AVA_MSU.2": 1,
          "AVA_SOF.1": 1,
          "AVA_VAN.3": 3,
          "AVA_VLA.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4+": 1,
          "EAL4": 2,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 9,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 4,
          "FAU_GEN.2.1": 1,
          "FAU_SEL.1": 5,
          "FAU_SEL.1.1": 1,
          "FAU_STG.1": 5,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG.4": 4,
          "FAU_STG.4.1": 1
        },
        "FCO": {
          "FCO_NRO_CIMC.3": 6,
          "FCO_NRO_CIMC.3.1": 1,
          "FCO_NRO_CIMC.3.2": 1,
          "FCO_NRO_CIMC.3.3": 1,
          "FCO_NRO_CIMC.4": 5,
          "FCO_NRO_CIMC.4.1": 1,
          "FCO_NRO_CIMC.4.2": 1
        },
        "FCS": {
          "FCS_CKM.1": 2,
          "FCS_CKM.4": 1,
          "FCS_CKM_CIMC.5": 5,
          "FCS_CKM_CIMC.5.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 9,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 7,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_ACF_CIMC.2": 5,
          "FDP_ACF_CIMC.2.1": 1,
          "FDP_ACF_CIMC.2.2": 1,
          "FDP_ACF_CIMC.3": 5,
          "FDP_ACF_CIMC.3.1": 1,
          "FDP_CIMC_BKP.1": 6,
          "FDP_CIMC_BKP.1.1": 1,
          "FDP_CIMC_BKP.1.2": 1,
          "FDP_CIMC_BKP.1.3": 1,
          "FDP_CIMC_BKP.1.4": 1,
          "FDP_CIMC_BKP.2": 5,
          "FDP_CIMC_BKP.2.1": 1,
          "FDP_CIMC_BKP.2.2": 1,
          "FDP_CIMC_CER.1": 6,
          "FDP_CIMC_CER.1.1": 1,
          "FDP_CIMC_CER.1.2": 1,
          "FDP_CIMC_CER.1.3": 1,
          "FDP_CIMC_CER.1.4": 1,
          "FDP_CIMC_CRL.1": 5,
          "FDP_CIMC_CRL.1.1": 1,
          "FDP_CIMC_CSE.1": 5,
          "FDP_CIMC_CSE.1.1": 1,
          "FDP_CIMC_OCSP.1": 5,
          "FDP_CIMC_OCSP.1.1": 1,
          "FDP_ETC_CIMC.4": 1,
          "FDP_ETC_CIMC.5": 5,
          "FDP_ETC_CIMC.5.1": 1,
          "FDP_IFC.1": 2,
          "FDP_ITT.1": 5,
          "FDP_ITT.1.1": 2,
          "FDP_SDI_CIMC.3": 5,
          "FDP_SDI_CIMC.3.1": 1,
          "FDP_SDI_CIMC.3.2": 1,
          "FDP_UCT.1": 5,
          "FDP_UCT.1.1": 1
        },
        "FIA": {
          "FIA_ATD.1": 1,
          "FIA_UAU.1": 5,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UID.1": 8,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB.1": 5,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MOF.1": 10,
          "FMT_MOF.1.1": 1,
          "FMT_MOF_CIMC.3": 8,
          "FMT_MOF_CIMC.3.1": 1,
          "FMT_MOF_CIMC.3.2": 1,
          "FMT_MOF_CIMC.3.3": 1,
          "FMT_MOF_CIMC.3.4": 1,
          "FMT_MOF_CIMC.5": 9,
          "FMT_MOF_CIMC.5.1": 1,
          "FMT_MOF_CIMC.5.2": 1,
          "FMT_MOF_CIMC.5.3": 1,
          "FMT_MOF_CIMC.6": 9,
          "FMT_MOF_CIMC.6.1": 1,
          "FMT_MOF_CIMC.6.2": 1,
          "FMT_MOF_CIMC.6.3": 1,
          "FMT_MSA.3": 1,
          "FMT_MTD.1": 1,
          "FMT_MTD_CIMC.4": 6,
          "FMT_MTD_CIMC.4.1": 1,
          "FMT_MTD_CIMC.5": 6,
          "FMT_MTD_CIMC.5.1": 1,
          "FMT_MTD_CIMC.6": 3,
          "FMT_MTD_CIMC.7": 5,
          "FMT_MTD_CIMC.7.1": 1,
          "FMT_SMF.1": 2,
          "FMT_SMR.1": 4
        },
        "FPT": {
          "FPT_CIMC_TSP.1": 6,
          "FPT_CIMC_TSP.1.1": 1,
          "FPT_CIMC_TSP.1.2": 1,
          "FPT_CIMC_TSP.1.3": 1,
          "FPT_CIMC_TSP.1.4": 1,
          "FPT_ITC.1": 4,
          "FPT_ITC.1.1": 1,
          "FPT_ITT.1": 5,
          "FPT_ITT.1.1": 2,
          "FPT_RVM.1": 1,
          "FPT_STM.1": 6,
          "FPT_STM.1.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 1,
          "FTP_TRP.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 1
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-1": 26,
          "FIPS 140-15": 1,
          "FIPS6": 1
        },
        "PKCS": {
          "PKCS#11": 4,
          "PKCS#8": 1
        },
        "RFC": {
          "RFC 2560": 7,
          "RFC 2650": 1,
          "RFC 5019": 1,
          "RFC 5280": 5
        },
        "X509": {
          "X.509": 15
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {
        "BSI": {
          "BSI TR-03110": 3
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Pedro Borges",
      "/CreationDate": "D:20120413223648+01\u002700\u0027",
      "/Creator": "Writer",
      "/Producer": "OpenOffice.org 3.3",
      "/Title": "Security Target for CESeCore v1.1.2",
      "pdf_file_size_bytes": 515975,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://checklists.nist.gov/",
          "http://tools.ietf.org/pdf/rfc5019.pdf",
          "http://www.itu.int/rec/T-REC-X.509-200508-I/en",
          "http://tools.ietf.org/pdf/rfc5280.pdf",
          "http://tools.ietf.org/pdf/rfc2560.pdf"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 65
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2012_33.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.2",
      "EAL4+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2012-33%20SecurityTarget.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "64f982ec2cf14b221c7738a7aac84377e726ce39d572603b2074ab2d674f6a0e",
      "txt_hash": "c76f85a1f79f8b40e64251c52615da028e6fe7a4c2faae89b6182b1d2909b625"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "44fc7c211eeb4995d1ffb3f80edb51946750d8b5c4d8d6880e7fe9c995a1df4c",
      "txt_hash": "0ffca9b832b692df98db44a96ec76352b48983a91c5c6d3d39674bf93c703731"
    }
  },
  "status": "archived"
}