IDeal Citiz v2.17-i on Infineon M7892 B11 Java Card Open Platform
CSV information
Status | archived |
---|---|
Valid from | 02.07.2018 |
Valid until | 20.06.2025 |
Scheme | 🇫🇷 FR |
Manufacturer | Idemia |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | ALC_DVS.2, EAL5+, AVA_VAN.5 |
Protection profiles | |
Maintenance updates | Reassessment report: ANSSI-CC-2018/27-S01 (29.01.2021) Certification report |
Heuristics summary
Certificate
Extracted keywords
Vendor
Infineon, IDEMIASecurity level
EAL5Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5Protection profiles
ANSSI-CC-PP-2010/03-M01Certificates
ANSSI-CC-2018/27-S01, ANSSI-CC-PP-2010/03-M01Evaluation facilities
CEA-LETIFile metadata
Creation date | D:20210208120921+01'00' |
---|---|
Modification date | D:20210208120921+01'00' |
Pages | 2 |
Creator | PScript5.dll Version 5.2.2 |
Producer | Acrobat Distiller 11.0 (Windows) |
Certification report
Extracted keywords
Symmetric Algorithms
DESHash functions
SHA-2Protocols
PACELibraries
v1.02.013CPLC
IC Fabricator, IC TypeVendor
Infineon, IDEMIASecurity level
EAL 5, EAL2, EAL6, EAL7, EAL 1, EAL 3, EAL 7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_PRE, AGD_OPE, ALC_DVS.2, ALC_FLR.1, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
BSI-PP-0035-2007, ANSSI-CC-PP-2010/03-M01Certificates
BSI-DSZ-CC-0782-V4-2018, ANSSI-CC-2018/27, ANSSI-CC-PP-2010/03-M01, ANSSI-CC-2017/59Evaluation facilities
CESTI, CEA - LETI, CEA-LETIStandards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
Title | ANSSI-CC-2018/27 |
---|---|
Subject | IDeal Citiz v2.17-i on Infineon M7892 B11 |
Keywords | ANSSI-CC-CER-F-07.026 |
Author | cdu |
Creation date | D:20180706171040+02'00' |
Modification date | D:20180706171043+02'00' |
Pages | 16 |
Creator | Acrobat PDFMaker 11 pour Word |
Producer | Adobe PDF Library 11.0 |
Frontpage
Certificate ID | ANSSI-CC-2018/27 |
---|---|
Certified item | IDeal Citiz v2.17-i on Infineon M7892 B11 |
Certification lab | CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France |
Developer | IDEMIA (ex SAFRAN I&S) 18 Chaussée Jules César, 95520 Osny, France INFINEON Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire IDEMIA 420 rue d’Estienne d’Orves, 92700 Colombes, France |
References
Outgoing- ANSSI-CC-2017/59 - archived - IDeal Citiz v2.15-i on Infineon M7892 B11 Java Card Open Platform
- BSI-DSZ-CC-0782-V4-2018 - archived - Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013 or v2.07.003, EC v1.02.013 or v2.07.003, SHA-2 v1.01, SCL v2.02.012, Base v1.02.013 or v2.07.003, and Toolbox v1.02.013 or v2.07.003 libraries and with specific IC dedicated software (firmware)
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, TDEA, 3DES, TDES, HMAC, CMAC, CBC-MACAsymmetric Algorithms
RSA-CRT, ECDH, ECDSA, ECC, Diffie-HellmanHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-2Schemes
MACProtocols
PACERandomness
PRNG, RNG, RNDLibraries
v1.02.013Block cipher modes
ECB, CBCJavaCard versions
Java Card 3.0.1, GlobalPlatform 2.1.1JavaCard API constants
ALG_EC_SVDP_DH, ALG_EC_SVDP_DH_KDF, ALG_EC_SVDP_DH_PLAIN, ALG_EC_SVDP_DHC, ALG_EC_SVDP_DHC_KDF, ALG_EC_SVDP_DHC_PLAIN, TYPE_ACCESSVendor
Infineon, Infineon Technologies AG, IDEMIASecurity level
EAL5, EAL6, EAL6+, EAL5 augmented, EAL6 augmentedClaims
D.COMMAND, D.GP_CODE, D.SD_KEYS, D.ISD_KEYS, D.BIO, D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, O.REMOTE, O.SCP, O.BIO-MNGT, O.RND, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.CARD-MANAGEMENT, O.CARD-, O.PIN-, O.APPLET, O.CARD_LC, O.CODE_PKG, O.JAVAOBJECT, O.BIO-, T.EXE-, T.APP_DATA_INTEGRITY, T.UNAUTH_CARD_MNGT, T.LIFE_CYCLE, T.UNAUTH_ACCESS, T.RND, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, T.INTEG-APPLI-, T.CONFID-APPLI-, T.INTEG-, A.DELETION, A.PRODUCTION, A.APPLET, A.VERIFICATION, R.JAVA, OP.ARRAY_ACCESS, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUT, OP.SET_CARD_STATE, OE.CARD-, OE.CARD-MANAGEMENT, OE.SCP, OE.APPLET, OE.VERIFICATION, OE.CODE-EVIDENCE, OE.SECURITY-DOMAINS, OE.QUOTAS, OE.SHARE-CONTROL, OE.KEY_GENERATION, OE.PRODUCTION, OE.CODE-, OSP.SECURITY_DOMAINS, OSP.QUOTAS, OSP.KEY_GENERATION, OSP.SHARE-CONTROL, OSP.VERIFICATIONSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.5, ADV_TDS.4, ADV_IMP.1, ADV_TDS.3, ADV_INT.2, ADV_FSP.2, ADV_FSP.4, AGD_PRE, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.5, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, ATE_DPT.3, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS.1, FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FCO_NRO, FCO_NRO.2, FCS_CKM, FCS_COP, FCS_RNG.1, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.2.1, FCS_CKM.3, FCS_CKM.3.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_COP.1.1, FDP_ACC, FDP_ACF, FDP_SDC.1, FDP_SDI.2, FDP_ITT.1, FDP_IFC.1, FDP_ACC.1, FDP_ACF.1, FDP_ACC.2, FDP_IFC, FDP_IFF, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ROL, FDP_ROL.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_IFF.1.2, FDP_UIT, FDP_UIT.1, FDP_ITC.1, FIA_ATD, FIA_ATD.1, FIA_UID, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_UID.1, FMT_MSA, FMT_LIM.1, FMT_LIM.2, FMT_MSA.1, FMT_MSA.3, FMT_MSA.2, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FMT_SMR, FMT_SMF, FPR_UNO.1, FPR_UNO.1.1, FPT_RCV, FPT_FLS, FPT_PHP, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FPT_FLS.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_RCV.3, FPT_RCV.4, FRU_FLT.2, FTP_ITC, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-PP-0035, ANSSI-CC-PP-2010/03-M01Certificates
BSI-DSZ-CC-0782-V4-2018, ANSSI-CC-PP-2010/03-M01Side-channel analysis
Leak-Inherent, physical probing, Physical Probing, DPA, physical tampering, malfunction, MalfunctionCertification process
out of scope, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT areStandards
AIS31, ISO/IEC9796, ISO/IEC 14443, ICAO, SCP02, SCP03, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003Technical reports
BSI TR-03110-1, BSI TR-03110-2, BSI TR-03110-3, BSI TR-03110-4File metadata
Creation date | D:20180615091614+02'00' |
---|---|
Modification date | D:20180706172859+02'00' |
Pages | 121 |
Creator | Microsoft® Word 2016 |
Producer | Microsoft® Word 2016 |
References
Outgoing- BSI-DSZ-CC-0782-V4-2018 - archived - Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013 or v2.07.003, EC v1.02.013 or v2.07.003, SHA-2 v1.01, SCL v2.02.012, Base v1.02.013 or v2.07.003, and Toolbox v1.02.013 or v2.07.003 libraries and with specific IC dedicated software (firmware)
- ANSSI-CC-2018/44-S01 - archived - IDEAL CITIZ V2.17-I on Infineon M7892 B11 embedding ID.me 1.6-i application
Heuristics
Extracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ALC_LCD.1, ALC_TAT.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, AVA_VAN.5Similar certificates
Name | Certificate ID | |
---|---|---|
IDeal Citiz v2.17-i on Infineon M7893 B11 Java Card Open Platform | ANSSI-CC-2019/04 | Compare |
IDeal Citiz v2.15-i on Infineon M7892 B11 Java Card Open Platform | ANSSI-CC-2017/59 | Compare |
IDeal Citiz v2.16-i on M7892 B11 - Java Card Open Platform | ANSSI-CC-2017/74 | Compare |
References
Updates
-
04.08.2025 The certificate became unavailable,
either the certification report or the security target was unavailable during
processing.
Certificate removed
A Common Criteria certificate for a product named IDeal Citiz v2.17-i on Infineon M7892 B11 Java Card Open Platform is not available. This means that its entry was removed from the Common Criteria portal (or that it was replaced by a new entry).
-
14.07.2025 The certificate data changed.
Certificate changed
The Status was updated.
- The new value is
archived
.
The Valid until date was updated.
- The new value is
2025-06-20
.
- The new value is
-
10.02.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
05.02.2025 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The st property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The cert property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data.
The computed heuristics were updated.
- The following values were inserted:
{'protection_profiles': {'_type': 'Set', 'elements': ['94167fd161e87d71']}, 'eal': 'EAL5+'}
. - The prev_certificates property was set to
None
. - The next_certificates property was set to
None
. - The scheme_data property was set to
{'product': 'IDeal Citiz v2.17-i on Infineon M7892 B11 Java Card Open Platform', 'url': 'https://cyber.gouv.fr/produits-certifies/ideal-citiz-v217-i-infineon-m7892-b11-java-card-open-platform', 'description': 'Le produit certifié est la carte à puce « IDeal Citiz v2.17-i on Infineon M7892 B11 », de référence OFFICIEL_IDealCitiz_SLE78CLFX4000PM_2_1_3, développée par IDEMIA sur un microcontrôleur de la société INFINEON TECHNOLOGIES. Ce produit est une plateforme ouverte JavaCard conforme à la spécification émise par Global Platform, contact et/ou sans contact, destinée à accueillir les applets de l’utili', 'sponsor': 'IDEMIA', 'developer': 'IDEMIA, INFINEON Technologies AG', 'cert_id': 'ANSSI-CC-2018/27', 'level': 'EAL5+', 'expiration_date': '2026-01-29', 'enhanced': {'cert_id': 'ANSSI-CC-2018/27', 'certification_date': '2018-07-02', 'expiration_date': '2026-01-29', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'IDEMIA, INFINEON Technologies AG', 'sponsor': 'IDEMIA', 'evaluation_facility': 'CEA - LETI', 'level': 'EAL5+', 'protection_profile': 'ANSSI-CC-PP-2010/03-M01', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2018/07/anssi-cible-cc-2018_27.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2018/07/anssi-cc-2018_27fr.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2018/07/certificat-anssi-cc-2018_27-s01.pdf'}}
.
- The report property was updated, with the
-
03.02.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
27.01.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'IDeal Citiz v2.17-i on Infineon M7892 B11 Java Card Open Platform', 'url': 'https://cyber.gouv.fr/produits-certifies/ideal-citiz-v217-i-infineon-m7892-b11-java-card-open-platform', 'description': 'Le produit certifié est la carte à puce « IDeal Citiz v2.17-i on Infineon M7892 B11 », de référence OFFICIEL_IDealCitiz_SLE78CLFX4000PM_2_1_3, développée par IDEMIA sur un microcontrôleur de la société INFINEON TECHNOLOGIES. Ce produit est une plateforme ouverte JavaCard conforme à la spécification émise par Global Platform, contact et/ou sans contact, destinée à accueillir les applets de l’utili', 'sponsor': 'IDEMIA', 'developer': 'IDEMIA, INFINEON Technologies AG', 'cert_id': 'ANSSI-CC-2018/27', 'level': 'EAL5+', 'expiration_date': '2026-01-29', 'enhanced': {'cert_id': 'ANSSI-CC-2018/27', 'certification_date': '2018-07-02', 'expiration_date': '2026-01-29', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'IDEMIA, INFINEON Technologies AG', 'sponsor': 'IDEMIA', 'evaluation_facility': 'CEA - LETI', 'level': 'EAL5+', 'protection_profile': 'ANSSI-CC-PP-2010/03-M01', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2018/07/anssi-cible-cc-2018_27.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2018/07/anssi-cc-2018_27fr.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2018/07/certificat-anssi-cc-2018_27-s01.pdf'}}
.
- The scheme_data property was set to
-
06.01.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
16.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'IDeal Citiz v2.17-i on Infineon M7892 B11 Java Card Open Platform', 'url': 'https://cyber.gouv.fr/produits-certifies/ideal-citiz-v217-i-infineon-m7892-b11-java-card-open-platform', 'description': 'Le produit certifié est la carte à puce « IDeal Citiz v2.17-i on Infineon M7892 B11 », de référence OFFICIEL_IDealCitiz_SLE78CLFX4000PM_2_1_3, développée par IDEMIA sur un microcontrôleur de la société INFINEON TECHNOLOGIES. Ce produit est une plateforme ouverte JavaCard conforme à la spécification émise par Global Platform, contact et/ou sans contact, destinée à accueillir les applets de l’utili', 'sponsor': 'IDEMIA', 'developer': 'IDEMIA, INFINEON Technologies AG', 'cert_id': 'ANSSI-CC-2018/27', 'level': 'EAL5+', 'expiration_date': '2026-01-29', 'enhanced': {'cert_id': 'ANSSI-CC-2018/27', 'certification_date': '2018-07-02', 'expiration_date': '2026-01-29', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'IDEMIA, INFINEON Technologies AG', 'sponsor': 'IDEMIA', 'evaluation_facility': 'CEA - LETI', 'level': 'EAL5+', 'protection_profile': 'ANSSI-CC-PP-2010/03-M01', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2018/07/anssi-cible-cc-2018_27.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2018/07/anssi-cc-2018_27fr.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2018/07/certificat-anssi-cc-2018_27-s01.pdf'}}
.
- The scheme_data property was set to
-
09.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'FR': {'__insert__': {'ANSSI-CC-PP-2010/03-M01': 2}}}}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'__insert__': {'FR': {'ANSSI-CC-PP-2010/03-M01': 1}}}}
data. - The cert_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'FR': {'__insert__': {'ANSSI-CC-PP-2010/03-M01': 1}}}}}
data.
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'description': 'Le produit certifié est la carte à puce « IDeal Citiz v2.17-i on Infineon M7892 B11 », de référence OFFICIEL_IDealCitiz_SLE78CLFX4000PM_2_1_3, développée par IDEMIA sur un microcontrôleur de la société INFINEON TECHNOLOGIES. Ce produit est une plateforme ouverte JavaCard conforme à la spécification émise par Global Platform, contact et/ou sans contact, destinée à accueillir les applets de l’utili', 'cert_id': 'ANSSI-CC-2018/27', 'expiration_date': '2026-01-29', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2018/27', 'certification_date': '2018-07-02', 'expiration_date': '2026-01-29', 'mutual_recognition': 'SOG-IS CCRA'}}}
data.
- The report_keywords property was updated, with the
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card Protection Profile - Open Configuration', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0099b_pdf.pdf', 'pp_ids': None}]}
.
- The new value is
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'IDeal Citiz v2.17-i on Infineon M7892 B11 Java Card Open Platform', 'url': 'https://cyber.gouv.fr/produits-certifies/ideal-citiz-v217-i-infineon-m7892-b11-java-card-open-platform', 'description': 'Le produit certifié est la carte à puce « IDeal Citiz v2.17-i on Infineon M7892 B11 », de référence OFFICIEL_IDealCitiz_SLE78CLFX4000PM_2_1_3, développée par IDEMIA sur un microcontrôleur de la société INFINEON TECHNOLOGIES.\nCe produit est une plateforme ouverte JavaCard conforme à la spécification émise par Global Platform, contact et/ou sans contact, destinée à accueillir les applets de l’utili', 'sponsor': 'IDEMIA', 'developer': 'IDEMIA, INFINEON Technologies AG', 'cert_id': '2018/27', 'level': 'EAL5+', 'expiration_date': '29 Janvier 2026', 'enhanced': {'cert_id': '2018/27', 'certification_date': '02/07/2018', 'expiration_date': '29/01/2026', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'IDEMIA, INFINEON Technologies AG', 'sponsor': 'IDEMIA', 'evaluation_facility': 'CEA - LETI', 'level': 'EAL5+', 'protection_profile': 'ANSSI-CC-PP-2010/03-M01', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2018/07/anssi-cible-cc-2018_27.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2018/07/anssi-cc-2018_27fr.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2018/07/certificat-anssi-cc-2018_27-s01.pdf'}}
.
- The scheme_data property was set to
-
02.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '43177d83e1e2d69039f18723dfd767156fe4fa770735fa14dc016beb566d8ade', 'txt_hash': '52c1de31f141411c165286d4cd0aa4dd86c0365d9e0aa5f18b91363f8267a62c'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'a4afd3dbc05b9912014f85f7165d0e7d7a534a25a30e800054a2f903efb542cc', 'txt_hash': 'dc28ce3c929ee5dc32bec37def51233954464693aa1fb3998f33a95281ebc4d1'}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 2151434, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 121, '/CreationDate': "D:20180615091614+02'00'", '/Creator': 'Microsoft® Word 2016', '/ModDate': "D:20180706172859+02'00'", '/Producer': 'Microsoft® Word 2016', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 290157, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Author': '', '/CreationDate': "D:20210208120921+01'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20210208120921+01'00'", '/Producer': 'Acrobat Distiller 11.0 (Windows)', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0782-V4-2018': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1}, 'ANSSI': {'ANSSI-CC-PP-2010/03-M01': 1}}, 'cc_security_level': {'EAL': {'EAL5': 9, 'EAL6': 1, 'EAL6+': 1, 'EAL5 augmented': 7, 'EAL6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 5, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.5': 8, 'ADV_TDS.4': 8, 'ADV_IMP.1': 8, 'ADV_TDS.3': 3, 'ADV_INT.2': 1, 'ADV_FSP.2': 2, 'ADV_FSP.4': 1}, 'AGD': {'AGD_PRE': 16, 'AGD_OPE': 4, 'AGD_OPE.1': 9, 'AGD_PRE.1': 5}, 'ALC': {'ALC_DVS.2': 11, 'ALC_TAT.1': 2, 'ALC_TAT.2': 3, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 3, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 6, 'ATE_COV.1': 2, 'ATE_DPT.1': 1, 'ATE_DPT.3': 1}, 'AVA': {'AVA_VAN.5': 16}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 1, 'FAU_ARP.1': 16, 'FAU_ARP.1.1': 1, 'FAU_SAA.1': 3}, 'FCO': {'FCO_NRO': 8, 'FCO_NRO.2': 3}, 'FCS': {'FCS_CKM': 26, 'FCS_COP': 15, 'FCS_RNG.1': 1, 'FCS_CKM.1': 27, 'FCS_CKM.1.1': 1, 'FCS_CKM.2': 12, 'FCS_CKM.2.1': 1, 'FCS_CKM.3': 10, 'FCS_CKM.3.1': 1, 'FCS_CKM.4': 26, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 16, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ACC': 41, 'FDP_ACF': 38, 'FDP_SDC.1': 1, 'FDP_SDI.2': 15, 'FDP_ITT.1': 1, 'FDP_IFC.1': 13, 'FDP_ACC.1': 14, 'FDP_ACF.1': 17, 'FDP_ACC.2': 5, 'FDP_IFC': 29, 'FDP_IFF': 24, 'FDP_IFF.1': 13, 'FDP_RIP': 132, 'FDP_RIP.1': 10, 'FDP_ROL': 16, 'FDP_ROL.1': 2, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITC': 14, 'FDP_ITC.2': 15, 'FDP_IFC.2': 2, 'FDP_IFF.1.2': 1, 'FDP_UIT': 8, 'FDP_UIT.1': 2, 'FDP_ITC.1': 10}, 'FIA': {'FIA_ATD': 11, 'FIA_ATD.1': 2, 'FIA_UID': 19, 'FIA_UID.2': 1, 'FIA_USB': 10, 'FIA_USB.1': 3, 'FIA_UID.1': 9}, 'FMT': {'FMT_MSA': 125, 'FMT_LIM.1': 1, 'FMT_LIM.2': 1, 'FMT_MSA.1': 12, 'FMT_MSA.3': 16, 'FMT_MSA.2': 1, 'FMT_SMF.1': 22, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 34, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD': 24, 'FMT_MTD.1': 2, 'FMT_MTD.3': 1, 'FMT_SMR': 39, 'FMT_SMF': 29}, 'FPR': {'FPR_UNO.1': 14, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_RCV': 37, 'FPT_FLS': 53, 'FPT_PHP': 11, 'FPT_FLS.1': 18, 'FPT_PHP.3': 2, 'FPT_ITT.1': 1, 'FPT_FLS.1.1': 1, 'FPT_TDC.1': 10, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_RCV.3': 8, 'FPT_RCV.4': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC': 19, 'FTP_ITC.1': 8, 'FTP_TRP.1': 2}}, 'cc_claims': {'D': {'D.COMMAND': 2, 'D.GP_CODE': 2, 'D.SD_KEYS': 2, 'D.ISD_KEYS': 4, 'D.BIO': 4, 'D.APP_CODE': 7, 'D.APP_C_DATA': 5, 'D.APP_I_DATA': 6, 'D.PIN': 4, 'D.API_DATA': 4, 'D.CRYPTO': 4, 'D.JCS_CODE': 3, 'D.JCS_DATA': 5, 'D.SEC_DATA': 7}, 'O': {'O.REMOTE': 1, 'O.SCP': 59, 'O.BIO-MNGT': 21, 'O.RND': 1, 'O.SID': 33, 'O.FIREWALL': 43, 'O.GLOBAL_ARRAYS_CONFID': 13, 'O.GLOBAL_ARRAYS_INTEG': 10, 'O.NATIVE': 14, 'O.OPERATE': 35, 'O.REALLOCATION': 17, 'O.RESOURCES': 23, 'O.ALARM': 22, 'O.CIPHER': 19, 'O.KEY-MNGT': 28, 'O.PIN-MNGT': 17, 'O.TRANSACTION': 18, 'O.OBJ-DELETION': 9, 'O.DELETION': 14, 'O.LOAD': 17, 'O.INSTALL': 15, 'O.CARD-MANAGEMENT': 35, 'O.CARD-': 4, 'O.PIN-': 5, 'O.APPLET': 16, 'O.CARD_LC': 4, 'O.CODE_PKG': 14, 'O.JAVAOBJECT': 31, 'O.BIO-': 1}, 'T': {'T.EXE-': 2, 'T.APP_DATA_INTEGRITY': 5, 'T.UNAUTH_CARD_MNGT': 5, 'T.LIFE_CYCLE': 5, 'T.UNAUTH_ACCESS': 5, 'T.RND': 1, 'T.CONFID-APPLI-DATA': 17, 'T.CONFID-JCS-CODE': 6, 'T.CONFID-JCS-DATA': 11, 'T.INTEG-APPLI-CODE': 11, 'T.INTEG-APPLI-DATA': 21, 'T.INTEG-JCS-CODE': 6, 'T.INTEG-JCS-DATA': 11, 'T.SID': 18, 'T.EXE-CODE': 8, 'T.NATIVE': 6, 'T.RESOURCES': 8, 'T.DELETION': 5, 'T.INSTALL': 6, 'T.OBJ-DELETION': 4, 'T.PHYSICAL': 4, 'T.INTEG-APPLI-': 6, 'T.CONFID-APPLI-': 1, 'T.INTEG-': 2}, 'A': {'A.DELETION': 1, 'A.PRODUCTION': 5, 'A.APPLET': 5, 'A.VERIFICATION': 5}, 'R': {'R.JAVA': 9}, 'OP': {'OP.ARRAY_ACCESS': 4, 'OP.CREATE': 6, 'OP.DELETE_APPLET': 4, 'OP.DELETE_PCKG': 3, 'OP.DELETE_PCKG_APPLET': 3, 'OP.INSTANCE_FIELD': 4, 'OP.INVK_VIRTUAL': 6, 'OP.INVK_INTERFACE': 7, 'OP.JAVA': 5, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.PUT': 4, 'OP.SET_CARD_STATE': 2}, 'OE': {'OE.CARD-': 1, 'OE.CARD-MANAGEMENT': 1, 'OE.SCP': 3, 'OE.APPLET': 10, 'OE.VERIFICATION': 38, 'OE.CODE-EVIDENCE': 16, 'OE.SECURITY-DOMAINS': 7, 'OE.QUOTAS': 5, 'OE.SHARE-CONTROL': 9, 'OE.KEY_GENERATION': 6, 'OE.PRODUCTION': 6, 'OE.CODE-': 3}, 'OSP': {'OSP.SECURITY_DOMAINS': 6, 'OSP.QUOTAS': 6, 'OSP.KEY_GENERATION': 5, 'OSP.SHARE-CONTROL': 5, 'OSP.VERIFICATION': 5}}, 'vendor': {'Infineon': {'Infineon': 150, 'Infineon Technologies AG': 2}, 'Idemia': {'IDEMIA': 41}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 14}}, 'DES': {'DES': {'DES': 5}, '3DES': {'TDEA': 1, '3DES': 4, 'TDES': 5}}, 'constructions': {'MAC': {'HMAC': 2, 'CMAC': 4, 'CBC-MAC': 2}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 2}, 'ECC': {'ECDH': {'ECDH': 7}, 'ECDSA': {'ECDSA': 5}, 'ECC': {'ECC': 4}}, 'FF': {'DH': {'Diffie-Hellman': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 2}, 'SHA2': {'SHA-224': 2, 'SHA-256': 2, 'SHA-384': 2, 'SHA-512': 2, 'SHA-2': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 4}}, 'crypto_protocol': {'PACE': {'PACE': 16}}, 'randomness': {'PRNG': {'PRNG': 2}, 'RNG': {'RNG': 1, 'RND': 2}}, 'cipher_mode': {'ECB': {'ECB': 5}, 'CBC': {'CBC': 7}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 10}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2, 'physical probing': 4, 'Physical Probing': 2, 'DPA': 1}, 'FI': {'physical tampering': 1, 'malfunction': 2, 'Malfunction': 3}}, 'technical_report_id': {'BSI': {'BSI TR-03110-1': 1, 'BSI TR-03110-2': 1, 'BSI TR-03110-3': 1, 'BSI TR-03110-4': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS31': 1}, 'ISO': {'ISO/IEC9796': 6, 'ISO/IEC 14443': 2}, 'ICAO': {'ICAO': 1}, 'SCP': {'SCP02': 4, 'SCP03': 4}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {'JavaCard': {'Java Card 3.0.1': 3}, 'GlobalPlatform': {'GlobalPlatform 2.1.1': 3}}, 'javacard_api_const': {'ALG': {'EC': {'ALG_EC_SVDP_DH': 1, 'ALG_EC_SVDP_DH_KDF': 1, 'ALG_EC_SVDP_DH_PLAIN': 1, 'ALG_EC_SVDP_DHC': 1, 'ALG_EC_SVDP_DHC_KDF': 1, 'ALG_EC_SVDP_DHC_PLAIN': 1}}, 'misc': {'TYPE_ACCESS': 5}}, 'javacard_packages': {'javacard': {'javacard.security': 6, 'javacard.framework': 2}, 'javacardx': {'javacardx.biometry': 4, 'javacardx.crypto': 1, 'javacardx.security': 1, 'javacardx.external': 1, 'javacardx.framework': 1}, 'com': {'com.morpho.sac': 1, 'com.morpho.sm': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are': 1}}}
. - The cert_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2018/27-S01': 2}}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2010/03-M01': 1}}, 'cc_security_level': {'EAL': {'EAL5': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon': 1}, 'Idemia': {'IDEMIA': 2}}, 'eval_facility': {'CEA-LETI': {'CEA-LETI': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
anssi-cible-cc-2018_27.pdf
. - The cert_filename property was set to
certificat-anssi-cc-2018_27-s01.pdf
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['NSCIB-CC-195748-CR', 'NSCIB-CC-196231-CR', 'ANSSI-CC-2018/44-S01']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['NSCIB-CC-195748-CR', 'NSCIB-CC-196231-CR', 'ANSSI-CC-2018/44-S01']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-V4-2018']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-V4-2018']}}
data. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['NSCIB-CC-195748-CR', 'NSCIB-CC-196231-CR', 'ANSSI-CC-2019/04']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['NSCIB-CC-195748-CR', 'NSCIB-CC-196231-CR', 'ANSSI-CC-2019/04']}, 'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/59', 'BSI-DSZ-CC-0782-V4-2018']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/59', 'BSI-DSZ-CC-0782-V3-2017', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0782-V4-2018', 'BSI-DSZ-CC-0782-V2-2015', 'ANSSI-CC-2016/66']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}
values added.
- The st property was updated, with the
-
19.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'bbd31691d55909f77b5b3e90bccd748900b6e218eb7275189321cdd1a765c43d', 'txt_hash': '4db669bb77510b6aef57f68bc61cfb836b33da5efef55451c4ea88ea72bc2121'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 248890, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 16, '/Author': 'cdu', '/Category': 'OFFICIEL_IDealCitiz_SLE78CLFX4000PM_2_1_3', '/Comments': 'IDEMIA', '/Company': 'SGDSN/ANSSI', '/CreationDate': "D:20180706171040+02'00'", '/Creator': 'Acrobat PDFMaker 11 pour Word', '/Keywords': 'ANSSI-CC-CER-F-07.026', '/ModDate': "D:20180706171043+02'00'", '/Producer': 'Adobe PDF Library 11.0', '/SourceModified': 'D:20180706151034', '/Subject': 'IDeal Citiz v2.17-i on Infineon M7892 B11', '/Title': 'ANSSI-CC-2018/27', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ssi.gouv.fr/', 'mailto:[email protected]']}}
. - The report_frontpage property was set to
{'FR': {'match_rules': ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2018/27', 'cert_item': 'IDeal Citiz v2.17-i on Infineon M7892 B11', 'cert_item_version': 'OFFICIEL_IDealCitiz_SLE78CLFX4000PM_2_1_3', 'ref_protection_profiles': 'Java Card Protection Profile – Open Configuration Version 3.0, ANSSI-CC-PP-2010/03-M01', 'cc_version': 'Critères Communs version 3.1 révision 5', 'cc_security_level': 'EAL 5 augmenté ALC_DVS.2, AVA_VAN.5', 'developer': 'IDEMIA (ex SAFRAN I&S) 18 Chaussée Jules César, 95520 Osny, France INFINEON Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire IDEMIA 420 rue d’Estienne d’Orves, 92700 Colombes, France', 'cert_lab': 'CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0782-V4-2018': 1}, 'FR': {'ANSSI-CC-2018/27': 17, 'ANSSI-CC-2017/59': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035-2007': 1}, 'ANSSI': {'ANSSI-CC-PP-2010/03-M01': 2}}, 'cc_security_level': {'EAL': {'EAL 5': 3, 'EAL2': 2, 'EAL6': 1, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_PRE': 5, 'AGD_OPE': 2}, 'ALC': {'ALC_DVS.2': 2, 'ALC_FLR.1': 1, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 4, 'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon': 23}, 'Idemia': {'IDEMIA': 12}}, 'eval_facility': {'CESTI': {'CESTI': 2}, 'CEA-LETI': {'CEA - LETI': 1, 'CEA-LETI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-2': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {'PACE': {'PACE': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 8}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {'ICFab': {'IC Fabricator': 1}, 'ICType': {'IC Type': 1}}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
ANSSI-CC-2018_27fr.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['CEA']
. - The cert_id property was set to
ANSSI-CC-2018/27
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2018_27fr.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_27.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The report_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None}
data. - The report_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-195748-CR', 'ANSSI-CC-2019/04']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-195748-CR', 'ANSSI-CC-2019/04']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012']}}}
data. - The scheme_data property was set to
{'product': 'IDeal Citiz v2.17-i on Infineon M7892 B11 Java Card Open Platform', 'url': 'https://cyber.gouv.fr/produits-certifies/ideal-citiz-v217-i-infineon-m7892-b11-java-card-open-platform', 'description': 'Le produit certifié est la carte à puce « IDeal Citiz v2.17-i on Infineon M7892 B11 », de référence OFFICIEL_IDealCitiz_SLE78CLFX4000PM_2_1_3, développée par IDEMIA sur un microcontrôleur de la société INFINEON TECHNOLOGIES.\nCe produit est une plateforme ouverte JavaCard conforme à la spécification émise par Global Platform, contact et/ou sans contact, destinée à accueillir les applets de l’utili', 'sponsor': 'IDEMIA', 'developer': 'IDEMIA, INFINEON Technologies AG', 'cert_id': '2018/27', 'level': 'EAL5+', 'expiration_date': '29 Janvier 2026', 'enhanced': {'cert_id': '2018/27', 'certification_date': '02/07/2018', 'expiration_date': '29/01/2026', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'IDEMIA, INFINEON Technologies AG', 'sponsor': 'IDEMIA', 'evaluation_facility': 'CEA - LETI', 'level': 'EAL5+', 'protection_profile': 'ANSSI-CC-PP-2010/03-M01', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2018/07/anssi-cible-cc-2018_27.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2018/07/anssi-cc-2018_27fr.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2018/07/certificat-anssi-cc-2018_27-s01.pdf'}}
.
- The st_references property was updated, with the
-
31.07.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name IDeal Citiz v2.17-i on Infineon M7892 B11 Java Card Open Platform was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2018_27-s01.pdf",
"dgst": "5db4108e9dc1e528",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2018/27",
"cert_lab": [
"CEA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL5+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2.17"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"94167fd161e87d71"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"NSCIB-CC-196231-CR",
"ANSSI-CC-2019/04",
"NSCIB-CC-195748-CR"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0782-V4-2018",
"ANSSI-CC-2017/59"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2019/04",
"NSCIB-CC-196231-CR",
"NSCIB-CC-195748-CR"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0782-V2-2015",
"BSI-DSZ-CC-0782-V3-2017",
"BSI-DSZ-CC-0782-2012",
"BSI-DSZ-CC-0782-V4-2018",
"ANSSI-CC-2017/59",
"ANSSI-CC-2016/66"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2018/44-S01",
"NSCIB-CC-196231-CR",
"NSCIB-CC-195748-CR"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0782-V4-2018"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2018/44-S01",
"NSCIB-CC-196231-CR",
"NSCIB-CC-195748-CR"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0782-V4-2018"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2021-01-29",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2018_27-S01.pdf",
"maintenance_st_link": null,
"maintenance_title": "Reassessment report: ANSSI-CC-2018/27-S01"
}
]
},
"manufacturer": "Idemia",
"manufacturer_web": "https://www.idemia.com",
"name": "IDeal Citiz v2.17-i on Infineon M7892 B11 Java Card Open Platform",
"not_valid_after": "2025-06-20",
"not_valid_before": "2018-07-02",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "certificat-anssi-cc-2018_27-s01.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2018/27-S01": 2,
"ANSSI-CC-PP-2010/03-M01": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2010/03-M01": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL5": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CEA-LETI": {
"CEA-LETI": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 2
},
"Infineon": {
"Infineon": 1
}
},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "",
"/CreationDate": "D:20210208120921+01\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20210208120921+01\u002700\u0027",
"/Producer": "Acrobat Distiller 11.0 (Windows)",
"/Title": "",
"pdf_file_size_bytes": 290157,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"report_filename": "ANSSI-CC-2018_27fr.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 5 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
"cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 5",
"cert_id": "ANSSI-CC-2018/27",
"cert_item": "IDeal Citiz v2.17-i on Infineon M7892 B11",
"cert_item_version": "OFFICIEL_IDealCitiz_SLE78CLFX4000PM_2_1_3",
"cert_lab": "CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France",
"developer": "IDEMIA (ex SAFRAN I\u0026S) 18 Chauss\u00e9e Jules C\u00e9sar, 95520 Osny, France INFINEON Technologies AG AIM CC SM PS \u2013 Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire IDEMIA 420 rue d\u2019Estienne d\u2019Orves, 92700 Colombes, France",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "Java Card Protection Profile \u2013 Open Configuration Version 3.0, ANSSI-CC-PP-2010/03-M01"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0782-V4-2018": 1
},
"FR": {
"ANSSI-CC-2017/59": 2,
"ANSSI-CC-2018/27": 17,
"ANSSI-CC-PP-2010/03-M01": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2010/03-M01": 2
},
"BSI": {
"BSI-PP-0035-2007": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 2,
"AGD_PRE": 5
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_FLR": 2,
"ALC_FLR.1": 1,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 5": 3,
"EAL 7": 1,
"EAL2": 2,
"EAL6": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {
"ICFab": {
"IC Fabricator": 1
},
"ICType": {
"IC Type": 1
}
},
"crypto_engine": {},
"crypto_library": {
"Infineon": {
"v1.02.013": 8
}
},
"crypto_protocol": {
"PACE": {
"PACE": 1
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CEA-LETI": {
"CEA - LETI": 1,
"CEA-LETI": 1
},
"CESTI": {
"CESTI": 2
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-2": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 12
},
"Infineon": {
"Infineon": 23
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "cdu",
"/Category": "OFFICIEL_IDealCitiz_SLE78CLFX4000PM_2_1_3",
"/Comments": "IDEMIA",
"/Company": "SGDSN/ANSSI",
"/CreationDate": "D:20180706171040+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 11 pour Word",
"/Keywords": "ANSSI-CC-CER-F-07.026",
"/ModDate": "D:20180706171043+02\u002700\u0027",
"/Producer": "Adobe PDF Library 11.0",
"/SourceModified": "D:20180706151034",
"/Subject": "IDeal Citiz v2.17-i on Infineon M7892 B11",
"/Title": "ANSSI-CC-2018/27",
"pdf_file_size_bytes": 248890,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ssi.gouv.fr/",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 16
},
"st_filename": "anssi-cible-cc-2018_27.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 4
},
"ECDH": {
"ECDH": 7
},
"ECDSA": {
"ECDSA": 5
}
},
"FF": {
"DH": {
"Diffie-Hellman": 2
}
},
"RSA": {
"RSA-CRT": 2
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0782-V4-2018": 2
},
"FR": {
"ANSSI-CC-PP-2010/03-M01": 1
}
},
"cc_claims": {
"A": {
"A.APPLET": 5,
"A.DELETION": 1,
"A.PRODUCTION": 5,
"A.VERIFICATION": 5
},
"D": {
"D.API_DATA": 4,
"D.APP_CODE": 7,
"D.APP_C_DATA": 5,
"D.APP_I_DATA": 6,
"D.BIO": 4,
"D.COMMAND": 2,
"D.CRYPTO": 4,
"D.GP_CODE": 2,
"D.ISD_KEYS": 4,
"D.JCS_CODE": 3,
"D.JCS_DATA": 5,
"D.PIN": 4,
"D.SD_KEYS": 2,
"D.SEC_DATA": 7
},
"O": {
"O.ALARM": 22,
"O.APPLET": 16,
"O.BIO-": 1,
"O.BIO-MNGT": 21,
"O.CARD-": 4,
"O.CARD-MANAGEMENT": 35,
"O.CARD_LC": 4,
"O.CIPHER": 19,
"O.CODE_PKG": 14,
"O.DELETION": 14,
"O.FIREWALL": 43,
"O.GLOBAL_ARRAYS_CONFID": 13,
"O.GLOBAL_ARRAYS_INTEG": 10,
"O.INSTALL": 15,
"O.JAVAOBJECT": 31,
"O.KEY-MNGT": 28,
"O.LOAD": 17,
"O.NATIVE": 14,
"O.OBJ-DELETION": 9,
"O.OPERATE": 35,
"O.PIN-": 5,
"O.PIN-MNGT": 17,
"O.REALLOCATION": 17,
"O.REMOTE": 1,
"O.RESOURCES": 23,
"O.RND": 1,
"O.SCP": 59,
"O.SID": 33,
"O.TRANSACTION": 18
},
"OE": {
"OE.APPLET": 10,
"OE.CARD-": 1,
"OE.CARD-MANAGEMENT": 1,
"OE.CODE-": 3,
"OE.CODE-EVIDENCE": 16,
"OE.KEY_GENERATION": 6,
"OE.PRODUCTION": 6,
"OE.QUOTAS": 5,
"OE.SCP": 3,
"OE.SECURITY-DOMAINS": 7,
"OE.SHARE-CONTROL": 9,
"OE.VERIFICATION": 38
},
"OP": {
"OP.ARRAY_ACCESS": 4,
"OP.CREATE": 6,
"OP.DELETE_APPLET": 4,
"OP.DELETE_PCKG": 3,
"OP.DELETE_PCKG_APPLET": 3,
"OP.INSTANCE_FIELD": 4,
"OP.INVK_INTERFACE": 7,
"OP.INVK_VIRTUAL": 6,
"OP.JAVA": 5,
"OP.PUT": 4,
"OP.SET_CARD_STATE": 2,
"OP.THROW": 5,
"OP.TYPE_ACCESS": 5
},
"OSP": {
"OSP.KEY_GENERATION": 5,
"OSP.QUOTAS": 6,
"OSP.SECURITY_DOMAINS": 6,
"OSP.SHARE-CONTROL": 5,
"OSP.VERIFICATION": 5
},
"R": {
"R.JAVA": 9
},
"T": {
"T.APP_DATA_INTEGRITY": 5,
"T.CONFID-APPLI-": 1,
"T.CONFID-APPLI-DATA": 17,
"T.CONFID-JCS-CODE": 6,
"T.CONFID-JCS-DATA": 11,
"T.DELETION": 5,
"T.EXE-": 2,
"T.EXE-CODE": 8,
"T.INSTALL": 6,
"T.INTEG-": 2,
"T.INTEG-APPLI-": 6,
"T.INTEG-APPLI-CODE": 11,
"T.INTEG-APPLI-DATA": 21,
"T.INTEG-JCS-CODE": 6,
"T.INTEG-JCS-DATA": 11,
"T.LIFE_CYCLE": 5,
"T.NATIVE": 6,
"T.OBJ-DELETION": 4,
"T.PHYSICAL": 4,
"T.RESOURCES": 8,
"T.RND": 1,
"T.SID": 18,
"T.UNAUTH_ACCESS": 5,
"T.UNAUTH_CARD_MNGT": 5
}
},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2010/03-M01": 1
},
"BSI": {
"BSI-PP-0035": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 5,
"ADV_FSP.1": 3,
"ADV_FSP.2": 2,
"ADV_FSP.4": 1,
"ADV_FSP.5": 8,
"ADV_IMP.1": 8,
"ADV_INT.2": 1,
"ADV_TDS.1": 2,
"ADV_TDS.3": 3,
"ADV_TDS.4": 8
},
"AGD": {
"AGD_OPE": 4,
"AGD_OPE.1": 9,
"AGD_PRE": 16,
"AGD_PRE.1": 5
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.1": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 2,
"ALC_DVS.2": 11,
"ALC_LCD.1": 3,
"ALC_TAT.1": 2,
"ALC_TAT.2": 3
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 5,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 3,
"ATE_DPT.1": 1,
"ATE_DPT.3": 1,
"ATE_FUN.1": 6
},
"AVA": {
"AVA_VAN.5": 16
}
},
"cc_security_level": {
"EAL": {
"EAL5": 9,
"EAL5 augmented": 7,
"EAL6": 1,
"EAL6 augmented": 1,
"EAL6+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 16,
"FAU_ARP.1.1": 1,
"FAU_SAA.1": 3,
"FAU_SAS.1": 1
},
"FCO": {
"FCO_NRO": 8,
"FCO_NRO.2": 3
},
"FCS": {
"FCS_CKM": 26,
"FCS_CKM.1": 27,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 12,
"FCS_CKM.2.1": 1,
"FCS_CKM.3": 10,
"FCS_CKM.3.1": 1,
"FCS_CKM.4": 26,
"FCS_CKM.4.1": 1,
"FCS_COP": 15,
"FCS_COP.1": 16,
"FCS_COP.1.1": 1,
"FCS_RNG.1": 1
},
"FDP": {
"FDP_ACC": 41,
"FDP_ACC.1": 14,
"FDP_ACC.2": 5,
"FDP_ACF": 38,
"FDP_ACF.1": 17,
"FDP_IFC": 29,
"FDP_IFC.1": 13,
"FDP_IFC.2": 2,
"FDP_IFF": 24,
"FDP_IFF.1": 13,
"FDP_IFF.1.2": 1,
"FDP_ITC": 14,
"FDP_ITC.1": 10,
"FDP_ITC.2": 15,
"FDP_ITT.1": 1,
"FDP_RIP": 132,
"FDP_RIP.1": 10,
"FDP_ROL": 16,
"FDP_ROL.1": 2,
"FDP_SDC.1": 1,
"FDP_SDI.2": 15,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UIT": 8,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_ATD": 11,
"FIA_ATD.1": 2,
"FIA_UID": 19,
"FIA_UID.1": 9,
"FIA_UID.2": 1,
"FIA_USB": 10,
"FIA_USB.1": 3
},
"FMT": {
"FMT_LIM.1": 1,
"FMT_LIM.2": 1,
"FMT_MSA": 125,
"FMT_MSA.1": 12,
"FMT_MSA.2": 1,
"FMT_MSA.3": 16,
"FMT_MTD": 24,
"FMT_MTD.1": 2,
"FMT_MTD.3": 1,
"FMT_SMF": 29,
"FMT_SMF.1": 22,
"FMT_SMF.1.1": 1,
"FMT_SMR": 39,
"FMT_SMR.1": 34,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 14,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_FLS": 53,
"FPT_FLS.1": 18,
"FPT_FLS.1.1": 1,
"FPT_ITT.1": 1,
"FPT_PHP": 11,
"FPT_PHP.3": 2,
"FPT_RCV": 37,
"FPT_RCV.3": 8,
"FPT_RCV.4": 1,
"FPT_TDC.1": 10,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1
},
"FRU": {
"FRU_FLT.2": 1
},
"FTP": {
"FTP_ITC": 19,
"FTP_ITC.1": 8,
"FTP_TRP.1": 2
}
},
"certification_process": {
"OutOfScope": {
"a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 7
},
"ECB": {
"ECB": 5
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Infineon": {
"v1.02.013": 10
}
},
"crypto_protocol": {
"PACE": {
"PACE": 16
}
},
"crypto_scheme": {
"MAC": {
"MAC": 4
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 2
},
"SHA2": {
"SHA-2": 2,
"SHA-224": 2,
"SHA-256": 2,
"SHA-384": 2,
"SHA-512": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"ALG": {
"EC": {
"ALG_EC_SVDP_DH": 1,
"ALG_EC_SVDP_DHC": 1,
"ALG_EC_SVDP_DHC_KDF": 1,
"ALG_EC_SVDP_DHC_PLAIN": 1,
"ALG_EC_SVDP_DH_KDF": 1,
"ALG_EC_SVDP_DH_PLAIN": 1
}
},
"misc": {
"TYPE_ACCESS": 5
}
},
"javacard_packages": {
"com": {
"com.morpho.sac": 1,
"com.morpho.sm": 1
},
"javacard": {
"javacard.framework": 2,
"javacard.security": 6
},
"javacardx": {
"javacardx.biometry": 4,
"javacardx.crypto": 1,
"javacardx.external": 1,
"javacardx.framework": 1,
"javacardx.security": 1
}
},
"javacard_version": {
"GlobalPlatform": {
"GlobalPlatform 2.1.1": 3
},
"JavaCard": {
"Java Card 3.0.1": 3
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"PRNG": 2
},
"RNG": {
"RND": 2,
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 3,
"malfunction": 2,
"physical tampering": 1
},
"SCA": {
"DPA": 1,
"Leak-Inherent": 2,
"Physical Probing": 2,
"physical probing": 4
}
},
"standard_id": {
"BSI": {
"AIS31": 1
},
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
},
"ICAO": {
"ICAO": 1
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC9796": 6
},
"SCP": {
"SCP02": 4,
"SCP03": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 14
}
},
"DES": {
"3DES": {
"3DES": 4,
"TDEA": 1,
"TDES": 5
},
"DES": {
"DES": 5
}
},
"constructions": {
"MAC": {
"CBC-MAC": 2,
"CMAC": 4,
"HMAC": 2
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-03110-1": 1,
"BSI TR-03110-2": 1,
"BSI TR-03110-3": 1,
"BSI TR-03110-4": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 41
},
"Infineon": {
"Infineon": 150,
"Infineon Technologies AG": 2
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20180615091614+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/ModDate": "D:20180706172859+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"/Title": "",
"pdf_file_size_bytes": 2151434,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 121
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2018_27fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"EAL5+",
"ALC_DVS.2",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_27.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "a4afd3dbc05b9912014f85f7165d0e7d7a534a25a30e800054a2f903efb542cc",
"txt_hash": "dc28ce3c929ee5dc32bec37def51233954464693aa1fb3998f33a95281ebc4d1"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "bbd31691d55909f77b5b3e90bccd748900b6e218eb7275189321cdd1a765c43d",
"txt_hash": "4db669bb77510b6aef57f68bc61cfb836b33da5efef55451c4ea88ea72bc2121"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "43177d83e1e2d69039f18723dfd767156fe4fa770735fa14dc016beb566d8ade",
"txt_hash": "52c1de31f141411c165286d4cd0aa4dd86c0365d9e0aa5f18b91363f8267a62c"
}
},
"status": "archived"
}