This page was not yet optimized for use on mobile
devices.
LEO V2
CSV information
| Status | archived |
|---|---|
| Valid from | 19.07.2012 |
| Valid until | 01.09.2019 |
| Scheme | đ«đ· FR |
| Manufacturer | Ingenico Healthcare/e-ID |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | ALC_FLR.3, ADV_IMP.1, AVA_VAN.3, ADV_TDS.3, ALC_TAT.1, EAL3+, ADV_FSP.4 |
| Protection profiles |
Heuristics summary
Certificate ID: ANSSI-CC-2012/37
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Symmetric Algorithms
DESSecurity level
EAL3, EAL4, EAL 1, EAL 3, EAL 5, EAL 7, EAL 3+, ITSEC E3 ElémentaireSecurity Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_FLR.3, ALC_TAT.1, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_LCD, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
ANSSI-CC-PP-2012/01Certificates
ANSSI-CC-2012/37, ANSSI-CC-2011-31, ANSSI-CC-PP-2012/01Evaluation facilities
SERMAStandards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
| Creation date | D:20120720163953+02'00' |
|---|---|
| Modification date | D:20120727112114+02'00' |
| Pages | 13 |
| Creator | PDFCreator Version 0.9.0 |
| Producer | AFPL Ghostscript 8.53 |
Frontpage
| Certificate ID | ANSSI-CC-2012/37 |
|---|---|
| Certified item | LEO V2 |
| Certification lab | SERMA Technologies 30 avenue Gustave Eiffel, 33608 Pessac France |
| Developer | Ingenico Healthcare/e-ID 25 quai Gallieni, 92158 Suresnes Cedex France Commanditaire Ingenico Healthcare/e-ID 25 quai Gallieni, 92158 Suresnes Cedex France |
References
Incoming- ANSSI-CC-2016/53 - archived - LEO V3, Référence PPD002-vwx-Axy, Version du Firmware PA01.02
Security target
Extracted keywords
Vendor
MicrosoftSecurity level
EAL3+, EAL3, EAL3 augmentedClaims
O.REVEAL, O.HARD_EVIDENT, O.SIGNAL, T.PIN_DISCLOSE, T.PIN_MODIFY, T.DIS, T.PIN_DISCLOSEE, A.USER, A.USER_UNOBSERVED, A.USER_KEYPAD, A.USER_DIS, A.USER_PIN, A.USER_USAGE, OP.P_ENTRY, OP.D_CONTROL, OP.P_VERIFY, OE.MANUAL, OE.PRIVATE, OSP.USERSecurity Assurance Requirements (SAR)
ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ADV_ARC.1, AGD_OPE.1, AGD_PRE.1, ALC_TAT.1, ALC_FLR.3, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FDP_IFC.1, FDP_IFC.1.1, FDP_IFF.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_RIP, FDP_RIP.2.1, FDP_RIP.2, FDP_PHP.1.1, FDP_PHP.1.2, FMT_MSA.3, FPT_PHP, FPT_PHP.1.1, FPT_PHP.1.2, FTA_TAB, FTA_TAB.1.1Side-channel analysis
physical tamperingCertification process
out of scope, not provided and out of scope of this TOE, Workstation. The PC may be a Microsoft Windows, Mac or Linux OS powered. The security of the PC is out of scope of the TOE. As a Personal Identification Number (also known and referred as âPINâ) is required for, entry functionality can be activated from a software application loaded in the PC (not provided and out of scope of this TOE), and used in conjunction with a secure smartcard (not provided and out of scope ofStandards
ISO/IEC 7816File metadata
| Creation date | D:20120711194000+02'00' |
|---|---|
| Modification date | D:20120727112128+02'00' |
| Pages | 18 |
| Creator | MicrosoftÂź Word 2010 |
| Producer | MicrosoftÂź Word 2010 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
ANSSI-CC-2012/37Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_FLR.3, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "33537b8a859fdc32",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2012/37",
"cert_lab": [
"SERMA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL3+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"86afa36bc4e78466"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2016/53"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2016/53"
]
},
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Ingenico Healthcare/e-ID",
"manufacturer_web": "https://www.ingenico.com",
"name": "LEO V2",
"not_valid_after": "2019-09-01",
"not_valid_before": "2012-07-19",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "ANSSI-CC_2012-37fr.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL3 Augment\u00e9 ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_FLR.3, ALC_TAT.1 et AVA.VAN.3",
"cc_version": "CC version 3.1 r\u00e9vision 3",
"cert_id": "ANSSI-CC-2012/37",
"cert_item": "LEO V2",
"cert_item_version": "R\u00e9f\u00e9rence PPD001-003-AXY, Version PK08.12",
"cert_lab": "SERMA Technologies 30 avenue Gustave Eiffel, 33608 Pessac France",
"developer": "Ingenico Healthcare/e-ID 25 quai Gallieni, 92158 Suresnes Cedex France Commanditaire Ingenico Healthcare/e-ID 25 quai Gallieni, 92158 Suresnes Cedex France",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.+)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeur (.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "PP LSCIHM], version v1.6 Lecteur s\u00e9curis\u00e9 de carte avec interface homme machine"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2011-31": 1,
"ANSSI-CC-2012/37": 14,
"ANSSI-CC-PP-2012/01": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2012/01": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_FSP.4": 2,
"ADV_IMP": 1,
"ADV_IMP.1": 2,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1,
"ADV_TDS.3": 2
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_FLR": 2,
"ALC_FLR.3": 2,
"ALC_LCD": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 2
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 3+": 1,
"EAL 5": 1,
"EAL 7": 1,
"EAL3": 2,
"EAL4": 2
},
"ITSEC": {
"ITSEC E3 El\u00e9mentaire": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"SERMA": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1,
"CCMB-2009-07-004": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20120720163953+02\u002700\u0027",
"/Creator": "PDFCreator Version 0.9.0",
"/Keywords": "",
"/ModDate": "D:20120727112114+02\u002700\u0027",
"/Producer": "AFPL Ghostscript 8.53",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 124103,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 13
},
"st_filename": "ANSSI-CC-cible_2012-37en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.USER": 5,
"A.USER_DIS": 2,
"A.USER_KEYPAD": 1,
"A.USER_PIN": 2,
"A.USER_UNOBSERVED": 2,
"A.USER_USAGE": 1
},
"O": {
"O.HARD_EVIDENT": 7,
"O.REVEAL": 5,
"O.SIGNAL": 3
},
"OE": {
"OE.MANUAL": 3,
"OE.PRIVATE": 2
},
"OP": {
"OP.D_CONTROL": 1,
"OP.P_ENTRY": 2,
"OP.P_VERIFY": 1
},
"OSP": {
"OSP.USER": 2
},
"T": {
"T.DIS": 1,
"T.PIN_DISCLOSE": 1,
"T.PIN_DISCLOSEE": 1,
"T.PIN_MODIFY": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 2,
"ADV_IMP.1": 2,
"ADV_TDS.3": 2
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.3": 1,
"ALC_CMS.3": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR.3": 3,
"ALC_LCD.1": 1,
"ALC_TAT.1": 2
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL3": 2,
"EAL3 augmented": 1,
"EAL3+": 19
}
},
"cc_sfr": {
"FDP": {
"FDP_IFC.1": 2,
"FDP_IFC.1.1": 3,
"FDP_IFF.1": 2,
"FDP_IFF.1.1": 3,
"FDP_IFF.1.2": 2,
"FDP_IFF.1.3": 1,
"FDP_IFF.1.4": 3,
"FDP_IFF.1.5": 3,
"FDP_PHP.1.1": 2,
"FDP_PHP.1.2": 2,
"FDP_RIP": 1,
"FDP_RIP.2": 1,
"FDP_RIP.2.1": 3
},
"FMT": {
"FMT_MSA.3": 1
},
"FPT": {
"FPT_PHP": 1,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1
},
"FTA": {
"FTA_TAB": 1,
"FTA_TAB.1.1": 3
}
},
"certification_process": {
"OutOfScope": {
"Workstation. The PC may be a Microsoft Windows, Mac or Linux OS powered. The security of the PC is out of scope of the TOE. As a Personal Identification Number (also known and referred as \u2018PIN\u2019) is required for": 1,
"entry functionality can be activated from a software application loaded in the PC (not provided and out of scope of this TOE), and used in conjunction with a secure smartcard (not provided and out of scope of": 1,
"not provided and out of scope of this TOE": 2,
"out of scope": 3
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"physical tampering": 2
}
},
"standard_id": {
"ISO": {
"ISO/IEC 7816": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 2
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20120711194000+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20120727112128+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 743933,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.xiring.com/XIRING-support_leo_by_XIRING.asp",
"http://www.pcscworkgroup.com/specifications/files/pcsc10_v2.02.06.pdf"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 18
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2012-01en.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2012-37fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ADV_TDS.3",
"AVA_VAN.3",
"ADV_IMP.1",
"ALC_TAT.1",
"EAL3+",
"ALC_FLR.3",
"ADV_FSP.4"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2012-37en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "2caa2771006f631249343ffee1225a92cd22d8f56484db478e0841fb01eba197",
"txt_hash": "8ba15402fac0bad714145714ad1d03f7f268098291af99a955531a7e4d202ee2"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "8897379a3633b6315ac49196fc03151ba91c2d9fb31897b8bd7ff02609f0f81a",
"txt_hash": "3a0e5fce8dc911aca650f4291ef7400dbe2860c146498fe43ac671380635133b"
}
},
"status": "archived"
}