Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32
CSV information ?
Status | active |
---|---|
Valid from | 31.03.2020 |
Valid until | 28.03.2027 |
Scheme | 🇫🇷 FR |
Manufacturer | Idemia |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.5, ALC_DVS.2, EAL5+ |
Protection profiles | |
Maintenance updates | Maintenance report : ANSSI-CC-2020/07-M02 (16.05.2022) Certification report |
Reassessment report : ANSSI-CC-2020/07-S01 (28.03.2022) Certification report Security target | |
ANSSI-CC-2020/07-M01 (23.07.2020) Certification report | |
Reassessment report: ANSSI-CC-2020/07-S01 (28.03.2022) Certification report |
Heuristics summary ?
Certificate ?
Extracted keywords
Vendor
IDEMIASecurity level
EAL5, EAL2Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5Certificates
ANSSI-CC-2020/07-S01Evaluation facilities
CEA-LETIFile metadata
Title | ANSSI-CC-2020/07 |
---|---|
Author | Géraldine Avoué |
Creation date | D:20220404173043+02'00' |
Modification date | D:20220404173044+02'00' |
Pages | 2 |
Creator | Acrobat PDFMaker 11 pour Word |
Producer | Adobe PDF Library 11.0 |
Certification report ?
Extracted keywords
Symmetric Algorithms
DESVendor
Infineon Technologies AG, Infineon, IDEMIASecurity level
EAL 5, EAL2, EAL6, EAL7, EAL 1, EAL 3, EAL 7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, AGD_ALP, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0099-2017, BSI-PP-0084-2014, ANSSI-CC-PP-0099-2017Certificates
BSI-DSZ-CC-1110-V2-2019, ANSSI-CC-2020/07, ANSSI-CC-PP-0099-2017Evaluation facilities
SERMA, CESTI, CEA - LETI, CEA-LETIStandards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
Title | ANSSI-CC-2020/07 |
---|---|
Subject | Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32 |
Keywords | ANSSI-CC-CER-F-07, v29.2 |
Author | Géraldine Avoué |
Creation date | D:20200402164050+02'00' |
Pages | 18 |
Creator | Writer |
Producer | LibreOffice 4.4 |
Frontpage
Certificate ID | ANSSI-CC-2020/07 |
---|---|
Certified item | Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32 |
Certification lab | CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France |
Developer | IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France |
References
Outgoing- BSI-DSZ-CC-1110-V2-2019 - archived - Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h H13 including the products from the second production line and optional software packages: Flash Loader, Asymmetric Crypto Library, Symmetric Cryptographic Library, Hardware Support Layer, Hash Crypto Library, Mifare Compatible Software, and CIPURSE™ Crypto Library
- ANSSI-CC-2020/57 - active - CombICAO Applet v2.1 in EAC with PACE configuration on ID-One Cosmo V9.1 (code SAAAAR : 203523)
- ANSSI-CC-2020/59 - active - CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1 (code SAAAAR : 203523)
- ANSSI-CC-2020/55 - active - CombICAO Applet v2.1 in BAC and CA configuration on ID-One Cosmo V9.1(Code SAAAAR : 203523)
- ANSSI-CC-2022/33 - active - ID-One Cosmo v9.1 embedding VITALE application version 2.1.4
- NSCIB-CC-0286907-CR - active - Idemia ID-One™ CNS V2 on Cosmo V9.1
- ANSSI-CC-2020/58 - active - CombICAO Applet v2.1 in EAC with PACE configuration for French ID on ID-One Cosmo V9.1 (code SAAAAR : 203523)
- ANSSI-CC-2020/56 - active - CombICAO Applet v2.1 in EAC configuration on ID-One Cosmo V9.1 (code SAAAAR : 203523)
- NSCIB-CC-22-0286910-CR - active - Idemia IDeal Drive DT V3.1 on Cosmo V9.1
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, Triple-DES, HMAC, CMACAsymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-HellmanHash functions
SHA-1, SHA-256, SHA-384, SHA-224, SHA-512, SHA256, SHA-2Schemes
MAC, Key Agreement, Key agreementProtocols
PACERandomness
RNGBlock cipher modes
ECB, CBCJavaCard versions
Java Card 3.0.5JavaCard API constants
TYPE_ACCESSVendor
Infineon, Infineon Technologies AG, IDEMIASecurity level
EAL5, EAL5+, EAL4, EAL5 augmented, EAL4 augmentedClaims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.CONFIG, D.SENSITIVE_DATA, D.ARRAY, D.JCS_KEYS, D.NB_REMAINTRYGLB, O.SCP, O.CARD_MANAGEMENT, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.RNG, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.RESIDENT_APPLICATION, O.SECURE_COMPARE, O.PATCH_LOADING, O.PIN-, O.APPLET, O.CODE_PKG, O.JAVAOBJECT, O.OBJ-, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, T.CONFIGURATION, T.CONF_DATA_APPLET, T.PATCH_LOADING, T.INTEG-APPLI-, T.INTEG-, T.EXE-, A.DELETION, A.APPLET, A.VERIFICATION, R.JAVA, OP.ARRAY_ACCESS, OP.ARRAY_LENGTH, OP.ARRAY_AASTORE, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.FLOW, OP.IMPORT_KEY, OP.INSTANCE_FIELD, OP.INVK_INTERFACE, OP.INVK_VIRTUAL, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.LOCAL_STACK_ACCESS, OP.OPERAND_STACK_ACCESS, OP.PUT, OP.STATIC_FIELD, OP.NATIVE_ACCESS, OP.NATIVE_INTERFACE_CALL, OP.PUTFIELD, OP.PUTSTATIC, OE.SCP, OE.CARD-, OE.VERIFICATION, OE.CODE-EVIDENCE, OE.CARD_MANAGEMENT, OE.APPLET, OE.CODE-, OSP.VERIFICATIONSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.5, ADV_TDS.4, ADV_IMP.1, ADV_TDS.3, ADV_INT.2, ADV_FSP.2, ADV_FSP.4, AGD_PRE, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_DVS, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.5, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, ATE_DPT.3, AVA_VAN.5, AVA_VAN, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_STG.2, FAU_STG.2.1, FAU_STG.2.2, FAU_STG.2.3, FAU_SAA.1, FAU_GEN.1, FAU_GEN, FCO_NRO, FCO_NRO.2, FCS_RNG, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_COP.1.1, FCS_COP, FCS_CKM, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ROL.1, FDP_ROL, FDP_SDI, FDP_SDI.2, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FDP_UCT, FDP_UCT.1, FDP_ITC.1, FDP_ACC.1, FIA_ATD, FIA_ATD.1, FIA_UID, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_UID.1, FIA_AFL, FIA_AFL.1, FIA_UAU, FIA_UAU.1, FIA_UAU.4, FIA_UAU.7, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FMT_SMR, FMT_SMF, FMT_SMR.2, FMT_MOF, FMT_MOF.1, FMT_MTD.2, FPR_UNO.1, FPR_UNO.1.1, FPR_UNO, FPT_FLS.1, FPT_FLS.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_FLS, FPT_RCV, FPT_RCV.3, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_TDC, FPT_PHP, FPT_PHP.3, FPT_RCV.4, FPT_TST, FRU_FLT, FRU_FLT.1, FTP_ITC, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-CC-PP-0084-2014Certificates
BSI-DSZ-CC-1110-V2-2019Evaluation facilities
CEA-LETISide-channel analysis
physical probing, DPA, SPA, timing attack, physical tampering, malfunction, fault injectionCertification process
out of scope, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT areStandards
FIPS PUB 46-3, FIPS PUB 81, FIPS PUB 180-3, FIPS PUB 197, FIPS 198, FIPS 140-2, NIST SP 800-90, PKCS#1, AIS31, ISO/IEC 9796-1, ISO/IEC 9797-1, ISO/IEC 7816, ISO/IEC 14443, ISO/IEC 9797, SCP02, SCP03File metadata
Title | Title |
---|---|
Author | [email protected] |
Creation date | D:20200228163658+01'00' |
Modification date | D:20200228163658+01'00' |
Pages | 150 |
Creator | Microsoft® Word 2016 |
Producer | Microsoft® Word 2016 |
References
Outgoing- BSI-DSZ-CC-1110-V2-2019 - archived - Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h H13 including the products from the second production line and optional software packages: Flash Loader, Asymmetric Crypto Library, Symmetric Cryptographic Library, Hardware Support Layer, Hash Crypto Library, Mifare Compatible Software, and CIPURSE™ Crypto Library
- ANSSI-CC-2020/57 - active - CombICAO Applet v2.1 in EAC with PACE configuration on ID-One Cosmo V9.1 (code SAAAAR : 203523)
- ANSSI-CC-2020/59 - active - CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1 (code SAAAAR : 203523)
- ANSSI-CC-2020/55 - active - CombICAO Applet v2.1 in BAC and CA configuration on ID-One Cosmo V9.1(Code SAAAAR : 203523)
- ANSSI-CC-2022/33 - active - ID-One Cosmo v9.1 embedding VITALE application version 2.1.4
- ANSSI-CC-2020/58 - active - CombICAO Applet v2.1 in EAC with PACE configuration for French ID on ID-One Cosmo V9.1 (code SAAAAR : 203523)
- ANSSI-CC-2020/56 - active - CombICAO Applet v2.1 in EAC configuration on ID-One Cosmo V9.1 (code SAAAAR : 203523)
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, AVA_VAN.5Similar certificates
Scheme data ?
Product | Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32 | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/plateforme-id-one-cosmo-v91-masquee-sur-le-composant-ifx-slc32 | |
Description | Le produit évalué est la « Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32, Identification du matériel 092914 ». Elle est développée par IDEMIA et embarquée sur le microcontrôleur développé et fabriqué par INFINEON TECHNOLOGIES AG. Ce produit est une plateforme ouverte Java Card conforme à la spécification émise par Global Platform, contact et/ou sans contact, destinée à accueil | |
Sponsor | IDEMIA, INFINEON TECHNOLOGIES AG | |
Developer | IDEMIA, INFINEON TECHNOLOGIES AG | |
Cert Id | ANSSI-CC-2020/07 | |
Level | EAL5+ | |
Expiration Date | 28.03.2027 | |
Enhanced | ||
Cert Id | ANSSI-CC-2020/07 | |
Certification Date | 31.03.2020 | |
Expiration Date | 28.03.2027 | |
Category | Cartes à puce | |
Cc Version | Critères Communs version 3.1r5 | |
Developer | IDEMIA, INFINEON TECHNOLOGIES AG | |
Sponsor | IDEMIA, INFINEON TECHNOLOGIES AG | |
Evaluation Facility | CEA - LETI | |
Level | EAL5+ | |
Protection Profile | Java Card Protection Profile Open Configuration, version 3.0.5 (BSI-CC-PP-0099-2017) | |
Mutual Recognition | SOG-IS CCRA | |
Augmented | ALC_DVS.2, AVA_VAN.5 | |
Target Link | https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cible-cc-2020_07-m02en.pdf | |
Report Link | https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cc-2020_07-fr.pdf | |
Cert Link | https://cyber.gouv.fr/sites/default/files/2020/04/certificat-cc-2020_07-s01.pdf |
References ?
Updates ?
-
16.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32', 'url': 'https://cyber.gouv.fr/produits-certifies/plateforme-id-one-cosmo-v91-masquee-sur-le-composant-ifx-slc32', 'description': 'Le produit évalué est la « Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32, Identification du matériel 092914 ». Elle est développée par IDEMIA et embarquée sur le microcontrôleur développé et fabriqué par INFINEON TECHNOLOGIES AG. Ce produit est une plateforme ouverte Java Card conforme à la spécification émise par Global Platform, contact et/ou sans contact, destinée à accueil', 'sponsor': 'IDEMIA, INFINEON TECHNOLOGIES AG', 'developer': 'IDEMIA, INFINEON TECHNOLOGIES AG', 'cert_id': 'ANSSI-CC-2020/07', 'level': 'EAL5+', 'expiration_date': '2027-03-28', 'enhanced': {'cert_id': 'ANSSI-CC-2020/07', 'certification_date': '2020-03-31', 'expiration_date': '2027-03-28', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'IDEMIA, INFINEON TECHNOLOGIES AG', 'sponsor': 'IDEMIA, INFINEON TECHNOLOGIES AG', 'evaluation_facility': 'CEA - LETI', 'level': 'EAL5+', 'protection_profile': 'Java Card Protection Profile Open Configuration, version 3.0.5 (BSI-CC-PP-0099-2017)', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cible-cc-2020_07-m02en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cc-2020_07-fr.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/certificat-cc-2020_07-s01.pdf'}}
.
- The scheme_data property was set to
-
09.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'FR': {'__insert__': {'ANSSI-CC-PP-0099-2017': 1}}}}}
data.
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'description': 'Le produit évalué est la « Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32, Identification du matériel 092914 ». Elle est développée par IDEMIA et embarquée sur le microcontrôleur développé et fabriqué par INFINEON TECHNOLOGIES AG. Ce produit est une plateforme ouverte Java Card conforme à la spécification émise par Global Platform, contact et/ou sans contact, destinée à accueil', 'cert_id': 'ANSSI-CC-2020/07', 'expiration_date': '2027-03-28', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2020/07', 'certification_date': '2020-03-31', 'expiration_date': '2027-03-28', 'mutual_recognition': 'SOG-IS CCRA'}}}
data.
- The report_keywords property was updated, with the
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 2.6', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PDCP_V1.3']}}]}
.
- The new value is
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32', 'url': 'https://cyber.gouv.fr/produits-certifies/plateforme-id-one-cosmo-v91-masquee-sur-le-composant-ifx-slc32', 'description': 'Le produit évalué est la « Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32, Identification du matériel 092914 ». Elle est développée par IDEMIA et embarquée sur le microcontrôleur développé et fabriqué par INFINEON TECHNOLOGIES AG.\n\nCe produit est une plateforme ouverte Java Card conforme à la spécification émise par Global Platform, contact et/ou sans contact, destinée à accueil', 'sponsor': 'IDEMIA, INFINEON TECHNOLOGIES AG', 'developer': 'IDEMIA, INFINEON TECHNOLOGIES AG', 'cert_id': '2020/07', 'level': 'EAL5+', 'expiration_date': '28 Mars 2027', 'enhanced': {'cert_id': '2020/07', 'certification_date': '31/03/2020', 'expiration_date': '28/03/2027', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'IDEMIA, INFINEON TECHNOLOGIES AG', 'sponsor': 'IDEMIA, INFINEON TECHNOLOGIES AG', 'evaluation_facility': 'CEA - LETI', 'level': 'EAL5+', 'protection_profile': 'Java Card Protection Profile Open Configuration, version 3.0.5 (BSI-CC-PP-0099-2017)', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cible-cc-2020_07-m02en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cc-2020_07-fr.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/certificat-cc-2020_07-s01.pdf'}}
.
- The scheme_data property was set to
-
02.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f2253108b3d5baad833abb27ec6ea00f236000f43a23281fe43ae078f32d8a43', 'txt_hash': 'd0b34b74aa182a8c12e6ba252de1dce3ea72887b1b753cc410246239f5d3d0d7'}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 2862110, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 150, '/Title': 'Title', '/Author': '[email protected]', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20200228163658+01'00'", '/ModDate': "D:20200228163658+01'00'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1110-V2-2019': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL5': 9, 'EAL5+': 2, 'EAL4': 1, 'EAL5 augmented': 5, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.5': 8, 'ADV_TDS.4': 8, 'ADV_IMP.1': 9, 'ADV_TDS.3': 4, 'ADV_INT.2': 1, 'ADV_FSP.2': 2, 'ADV_FSP.4': 2}, 'AGD': {'AGD_PRE': 7, 'AGD_OPE': 2, 'AGD_OPE.1': 8, 'AGD_PRE.1': 6}, 'ALC': {'ALC_DVS.2': 13, 'ALC_DVS': 1, 'ALC_TAT.1': 2, 'ALC_TAT.2': 3, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 3, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 6, 'ATE_COV.1': 2, 'ATE_DPT.1': 2, 'ATE_DPT.3': 1}, 'AVA': {'AVA_VAN.5': 15, 'AVA_VAN': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 20, 'FAU_ARP.1.1': 1, 'FAU_STG.2': 9, 'FAU_STG.2.1': 1, 'FAU_STG.2.2': 1, 'FAU_STG.2.3': 1, 'FAU_SAA.1': 3, 'FAU_GEN.1': 2, 'FAU_GEN': 1}, 'FCO': {'FCO_NRO': 16, 'FCO_NRO.2': 8}, 'FCS': {'FCS_RNG': 3, 'FCS_RNG.1': 10, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM.1': 20, 'FCS_CKM.1.1': 1, 'FCS_CKM.4': 19, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 16, 'FCS_COP.1.1': 1, 'FCS_COP': 27, 'FCS_CKM': 22}, 'FDP': {'FDP_ACC': 72, 'FDP_ACC.2': 13, 'FDP_ACF': 59, 'FDP_ACF.1': 34, 'FDP_IFC': 28, 'FDP_IFC.1': 21, 'FDP_IFF': 22, 'FDP_IFF.1': 16, 'FDP_RIP': 131, 'FDP_RIP.1': 11, 'FDP_ROL.1': 6, 'FDP_ROL': 16, 'FDP_SDI': 11, 'FDP_SDI.2': 2, 'FDP_ITC': 26, 'FDP_ITC.2': 14, 'FDP_IFC.2': 2, 'FDP_UIT': 17, 'FDP_UIT.1': 4, 'FDP_UCT': 10, 'FDP_UCT.1': 1, 'FDP_ITC.1': 8, 'FDP_ACC.1': 24}, 'FIA': {'FIA_ATD': 10, 'FIA_ATD.1': 2, 'FIA_UID': 31, 'FIA_UID.2': 1, 'FIA_USB': 9, 'FIA_USB.1': 3, 'FIA_UID.1': 16, 'FIA_AFL': 35, 'FIA_AFL.1': 8, 'FIA_UAU': 56, 'FIA_UAU.1': 12, 'FIA_UAU.4': 2, 'FIA_UAU.7': 2}, 'FMT': {'FMT_MSA': 191, 'FMT_MSA.1': 20, 'FMT_MSA.2': 5, 'FMT_MSA.3': 27, 'FMT_SMF.1': 30, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 56, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD': 39, 'FMT_MTD.1': 4, 'FMT_MTD.3': 1, 'FMT_SMR': 61, 'FMT_SMF': 62, 'FMT_SMR.2': 6, 'FMT_MOF': 7, 'FMT_MOF.1': 1, 'FMT_MTD.2': 2}, 'FPR': {'FPR_UNO.1': 13, 'FPR_UNO.1.1': 1, 'FPR_UNO': 16}, 'FPT': {'FPT_FLS.1': 18, 'FPT_FLS.1.1': 2, 'FPT_TDC.1': 11, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_FLS': 45, 'FPT_RCV': 26, 'FPT_RCV.3': 7, 'FPT_TST.1': 11, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_TDC': 9, 'FPT_PHP': 7, 'FPT_PHP.3': 1, 'FPT_RCV.4': 1, 'FPT_TST': 1}, 'FRU': {'FRU_FLT': 7, 'FRU_FLT.1': 1}, 'FTP': {'FTP_ITC': 16, 'FTP_ITC.1': 7, 'FTP_TRP.1': 4}}, 'cc_claims': {'D': {'D.APP_CODE': 6, 'D.APP_C_DATA': 3, 'D.APP_I_DATA': 4, 'D.PIN': 7, 'D.API_DATA': 3, 'D.CRYPTO': 5, 'D.JCS_CODE': 3, 'D.JCS_DATA': 5, 'D.SEC_DATA': 7, 'D.CONFIG': 4, 'D.SENSITIVE_DATA': 5, 'D.ARRAY': 3, 'D.JCS_KEYS': 7, 'D.NB_REMAINTRYGLB': 1}, 'O': {'O.SCP': 60, 'O.CARD_MANAGEMENT': 66, 'O.SID': 34, 'O.FIREWALL': 64, 'O.GLOBAL_ARRAYS_CONFID': 14, 'O.GLOBAL_ARRAYS_INTEG': 10, 'O.NATIVE': 14, 'O.OPERATE': 39, 'O.REALLOCATION': 18, 'O.RESOURCES': 23, 'O.ALARM': 23, 'O.CIPHER': 16, 'O.RNG': 11, 'O.KEY-MNGT': 26, 'O.PIN-MNGT': 26, 'O.TRANSACTION': 19, 'O.OBJ-DELETION': 8, 'O.DELETION': 14, 'O.LOAD': 20, 'O.INSTALL': 17, 'O.RESIDENT_APPLICATION': 24, 'O.SECURE_COMPARE': 8, 'O.PATCH_LOADING': 25, 'O.PIN-': 2, 'O.APPLET': 16, 'O.CODE_PKG': 22, 'O.JAVAOBJECT': 55, 'O.OBJ-': 1}, 'T': {'T.CONFID-APPLI-DATA': 18, 'T.CONFID-JCS-CODE': 6, 'T.CONFID-JCS-DATA': 11, 'T.INTEG-APPLI-CODE': 11, 'T.INTEG-APPLI-DATA': 21, 'T.INTEG-JCS-CODE': 6, 'T.INTEG-JCS-DATA': 12, 'T.SID': 18, 'T.EXE-CODE': 8, 'T.NATIVE': 6, 'T.RESOURCES': 8, 'T.DELETION': 6, 'T.INSTALL': 6, 'T.OBJ-DELETION': 4, 'T.PHYSICAL': 4, 'T.CONFIGURATION': 4, 'T.CONF_DATA_APPLET': 4, 'T.PATCH_LOADING': 4, 'T.INTEG-APPLI-': 5, 'T.INTEG-': 2, 'T.EXE-': 1}, 'A': {'A.DELETION': 3, 'A.APPLET': 5, 'A.VERIFICATION': 5}, 'R': {'R.JAVA': 10}, 'OP': {'OP.ARRAY_ACCESS': 9, 'OP.ARRAY_LENGTH': 3, 'OP.ARRAY_AASTORE': 3, 'OP.CREATE': 7, 'OP.DELETE_APPLET': 4, 'OP.DELETE_PCKG': 3, 'OP.DELETE_PCKG_APPLET': 3, 'OP.FLOW': 3, 'OP.IMPORT_KEY': 2, 'OP.INSTANCE_FIELD': 5, 'OP.INVK_INTERFACE': 7, 'OP.INVK_VIRTUAL': 6, 'OP.JAVA': 5, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.LOCAL_STACK_ACCESS': 3, 'OP.OPERAND_STACK_ACCESS': 3, 'OP.PUT': 6, 'OP.STATIC_FIELD': 3, 'OP.NATIVE_ACCESS': 1, 'OP.NATIVE_INTERFACE_CALL': 1, 'OP.PUTFIELD': 1, 'OP.PUTSTATIC': 1}, 'OE': {'OE.SCP': 9, 'OE.CARD-': 1, 'OE.VERIFICATION': 38, 'OE.CODE-EVIDENCE': 18, 'OE.CARD_MANAGEMENT': 3, 'OE.APPLET': 8, 'OE.CODE-': 3}, 'OSP': {'OSP.VERIFICATION': 6}}, 'vendor': {'Infineon': {'Infineon': 8, 'Infineon Technologies AG': 1}, 'Idemia': {'IDEMIA': 175}}, 'eval_facility': {'CEA-LETI': {'CEA-LETI': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 22}}, 'DES': {'DES': {'DES': 12}, '3DES': {'TDES': 12, 'Triple-DES': 2}}, 'constructions': {'MAC': {'HMAC': 3, 'CMAC': 4}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 3}, 'ECDSA': {'ECDSA': 4}, 'ECC': {'ECC': 4}}, 'FF': {'DH': {'Diffie-Hellman': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}, 'SHA2': {'SHA-256': 5, 'SHA-384': 4, 'SHA-224': 4, 'SHA-512': 3, 'SHA256': 1, 'SHA-2': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 4}, 'KA': {'Key Agreement': 2, 'Key agreement': 1}}, 'crypto_protocol': {'PACE': {'PACE': 1}}, 'randomness': {'RNG': {'RNG': 24}}, 'cipher_mode': {'ECB': {'ECB': 5}, 'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 4, 'DPA': 2, 'SPA': 1, 'timing attack': 1}, 'FI': {'physical tampering': 2, 'malfunction': 2, 'fault injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 3, 'FIPS PUB 81': 8, 'FIPS PUB 180-3': 2, 'FIPS PUB 197': 6, 'FIPS 198': 1, 'FIPS 140-2': 1}, 'NIST': {'NIST SP 800-90': 1}, 'PKCS': {'PKCS#1': 2}, 'BSI': {'AIS31': 1}, 'ISO': {'ISO/IEC 9796-1': 2, 'ISO/IEC 9797-1': 1, 'ISO/IEC 7816': 2, 'ISO/IEC 14443': 2, 'ISO/IEC 9797': 12}, 'SCP': {'SCP02': 4, 'SCP03': 4}}, 'javacard_version': {'JavaCard': {'Java Card 3.0.5': 7}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 5}}, 'javacard_packages': {'javacard': {'javacard.sac.sac': 1, 'javacard.security': 3, 'javacard.framework': 4}, 'javacardx': {'javacardx.crypto': 2, 'javacardx.security': 1, 'javacardx.framework.util': 1}, 'com': {'com.oberthurcs.javacard': 2, 'com.oberthurcs.javacard.sac.sac': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are': 1}}}
. - The st_filename property was set to
anssi-cible-cc-2020_07en.pdf
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/57', 'ANSSI-CC-2020/56', 'ANSSI-CC-2020/58', 'ANSSI-CC-2020/55', 'ANSSI-CC-2020/59', 'ANSSI-CC-2022/33']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/57', 'ANSSI-CC-2020/56', 'ANSSI-CC-2020/58', 'ANSSI-CC-2020/55', 'ANSSI-CC-2020/59', 'ANSSI-CC-2022/33']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019']}}
data. - The report_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-0286910-CR2']}, '__add__': {'_type': 'Set', 'elements': ['NSCIB-CC-22-0286910-CR']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-0286910-CR2']}, '__add__': {'_type': 'Set', 'elements': ['NSCIB-CC-22-0286910-CR']}}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0945-V3-2018', 'BSI-DSZ-CC-0945-V2-2018', 'BSI-DSZ-CC-0945-2017', 'BSI-DSZ-CC-1110-V2-2019', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-1110-2019', 'BSI-DSZ-CC-0891-2015', 'BSI-DSZ-CC-0891-V2-2016']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]}
values added.
- The st property was updated, with the
-
19.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '3996e239c72d181094b76bd38b58cf629382f9603eea456b4382b56461d6e63f', 'txt_hash': '15a1e2ed5352aa2d710ffe8a000b76f1733640fb99253f023c444a900d80693e'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'fe335c8ba5b824602982cd473fdf60cc90f6d5ad4f86878d9bab9b705677db07', 'txt_hash': '1db1bd2d3c13b3f08ad2bc162a6c15f0fd66a74aa777129acde4c4de206cdaba'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 281614, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 18, '/Title': 'ANSSI-CC-2020/07', '/Author': 'Géraldine Avoué', '/Subject': 'Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32', '/Keywords': 'ANSSI-CC-CER-F-07, v29.2', '/Creator': 'Writer', '/Producer': 'LibreOffice 4.4', '/CreationDate': "D:20200402164050+02'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'http://www.ssi.gouv.fr/']}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 100060, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Author': 'Géraldine Avoué', '/Category': '-S01', '/Comments': 'ANSSI-CC-CER-F-14_v14.6', '/Company': 'SGDSN', '/CreationDate': "D:20220404173043+02'00'", '/Creator': 'Acrobat PDFMaker 11 pour Word', '/ModDate': "D:20220404173044+02'00'", '/Producer': 'Adobe PDF Library 11.0', '/SourceModified': 'D:20220404153033', '/Title': 'ANSSI-CC-2020/07', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'FR': {'match_rules': ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2020/07', 'cert_item': 'Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32', 'cert_item_version': 'Identification du matériel : 092914', 'ref_protection_profiles': 'Java Card Protection Profile Open Configuration, version 3.0.5 certifié BSI-CC-PP-0099-2017 le 21 décembre 2017', 'cc_version': 'Critères Communs version 3.1 révision 5', 'cc_security_level': 'EAL 5 augmenté ALC_DVS.2, AVA_VAN.5', 'developer': 'IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France', 'cert_lab': 'CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1110-V2-2019': 2}, 'FR': {'ANSSI-CC-2020/07': 19}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0099-2017': 1, 'BSI-PP-0084-2014': 1}, 'ANSSI': {'ANSSI-CC-PP-0099-2017': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 3, 'EAL2': 2, 'EAL6': 1, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 4, 'AGD_PRE': 5, 'AGD_ALP': 3}, 'ALC': {'ALC_DVS.2': 2, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 4, 'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies AG': 1, 'Infineon': 2}, 'Idemia': {'IDEMIA': 37}}, 'eval_facility': {'Serma': {'SERMA': 11}, 'CESTI': {'CESTI': 1}, 'CEA-LETI': {'CEA - LETI': 1, 'CEA-LETI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The cert_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2020/07-S01': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL5': 1, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Idemia': {'IDEMIA': 2}}, 'eval_facility': {'CEA-LETI': {'CEA-LETI': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
anssi-cc-2020_07-fr.pdf
. - The cert_filename property was set to
certificat-cc-2020_07-s01.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['CEA']
. - The cert_id property was set to
ANSSI-CC-2020/07
. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/57', 'ANSSI-CC-2020/56', 'ANSSI-CC-2020/58', 'ANSSI-CC-2020/55', 'NSCIB-CC-0286907-CR', 'ANSSI-CC-2020/59', 'ANSSI-CC-2022/33', 'NSCIB-CC-0286910-CR2']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/57', 'ANSSI-CC-2020/56', 'ANSSI-CC-2020/58', 'ANSSI-CC-2020/55', 'NSCIB-CC-0286907-CR', 'ANSSI-CC-2020/59', 'ANSSI-CC-2022/33', 'NSCIB-CC-0286910-CR2']}}
data.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_07-fr.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_07en.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The st_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}
data. - The report_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The cert property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The cert_metadata property was set to
None
. - The cert_keywords property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2022/33', 'ANSSI-CC-2020/55']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2022/33', 'ANSSI-CC-2020/55']}}}
data. - The report_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/55']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/55']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012']}}}
data. - The scheme_data property was set to
{'product': 'Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32', 'url': 'https://cyber.gouv.fr/produits-certifies/plateforme-id-one-cosmo-v91-masquee-sur-le-composant-ifx-slc32', 'description': 'Le produit évalué est la « Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32, Identification du matériel 092914 ». Elle est développée par IDEMIA et embarquée sur le microcontrôleur développé et fabriqué par INFINEON TECHNOLOGIES AG.\n\nCe produit est une plateforme ouverte Java Card conforme à la spécification émise par Global Platform, contact et/ou sans contact, destinée à accueil', 'sponsor': 'IDEMIA, INFINEON TECHNOLOGIES AG', 'developer': 'IDEMIA, INFINEON TECHNOLOGIES AG', 'cert_id': '2020/07', 'level': 'EAL5+', 'expiration_date': '28 Mars 2027', 'enhanced': {'cert_id': '2020/07', 'certification_date': '31/03/2020', 'expiration_date': '28/03/2027', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'IDEMIA, INFINEON TECHNOLOGIES AG', 'sponsor': 'IDEMIA, INFINEON TECHNOLOGIES AG', 'evaluation_facility': 'CEA - LETI', 'level': 'EAL5+', 'protection_profile': 'Java Card Protection Profile Open Configuration, version 3.0.5 (BSI-CC-PP-0099-2017)', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cible-cc-2020_07-m02en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cc-2020_07-fr.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/certificat-cc-2020_07-s01.pdf'}}
.
- The cert property was updated, with the
-
31.07.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2020_07-s01.pdf",
"dgst": "61985466e51db7a4",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2020/07",
"cert_lab": [
"CEA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"9.1"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2020/59",
"ANSSI-CC-2020/55",
"NSCIB-CC-0286907-CR",
"ANSSI-CC-2020/57",
"ANSSI-CC-2022/33",
"NSCIB-CC-22-0286910-CR",
"ANSSI-CC-2020/56",
"ANSSI-CC-2020/58"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1110-V2-2019"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2020/59",
"ANSSI-CC-2020/55",
"NSCIB-CC-0286907-CR",
"ANSSI-CC-2020/57",
"ANSSI-CC-2022/33",
"NSCIB-CC-22-0286910-CR",
"ANSSI-CC-2020/56",
"ANSSI-CC-2020/58"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0891-2015",
"BSI-DSZ-CC-0945-2017",
"BSI-DSZ-CC-1110-2019",
"BSI-DSZ-CC-0891-V2-2016",
"BSI-DSZ-CC-0782-2012",
"BSI-DSZ-CC-0945-V3-2018",
"BSI-DSZ-CC-1110-V2-2019",
"BSI-DSZ-CC-0945-V2-2018"
]
}
},
"scheme_data": {
"cert_id": "ANSSI-CC-2020/07",
"description": "Le produit \u00e9valu\u00e9 est la \u00ab Plateforme ID-One Cosmo V9.1 masqu\u00e9e sur le composant IFX SLC32, Identification du mat\u00e9riel 092914 \u00bb. Elle est d\u00e9velopp\u00e9e par IDEMIA et embarqu\u00e9e sur le microcontr\u00f4leur d\u00e9velopp\u00e9 et fabriqu\u00e9 par INFINEON TECHNOLOGIES AG. Ce produit est une plateforme ouverte Java Card conforme \u00e0 la sp\u00e9cification \u00e9mise par Global Platform, contact et/ou sans contact, destin\u00e9e \u00e0 accueil",
"developer": "IDEMIA, INFINEON TECHNOLOGIES AG",
"enhanced": {
"augmented": "ALC_DVS.2, AVA_VAN.5",
"category": "Cartes \u00e0 puce",
"cc_version": "Crit\u00e8res Communs version 3.1r5",
"cert_id": "ANSSI-CC-2020/07",
"cert_link": "https://cyber.gouv.fr/sites/default/files/2020/04/certificat-cc-2020_07-s01.pdf",
"certification_date": "2020-03-31",
"developer": "IDEMIA, INFINEON TECHNOLOGIES AG",
"evaluation_facility": "CEA - LETI",
"expiration_date": "2027-03-28",
"level": "EAL5+",
"mutual_recognition": "SOG-IS CCRA",
"protection_profile": "Java Card Protection Profile Open Configuration, version 3.0.5 (BSI-CC-PP-0099-2017)",
"report_link": "https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cc-2020_07-fr.pdf",
"sponsor": "IDEMIA, INFINEON TECHNOLOGIES AG",
"target_link": "https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cible-cc-2020_07-m02en.pdf"
},
"expiration_date": "2027-03-28",
"level": "EAL5+",
"product": "Plateforme ID-One Cosmo V9.1 masqu\u00e9e sur le composant IFX SLC32",
"sponsor": "IDEMIA, INFINEON TECHNOLOGIES AG",
"url": "https://cyber.gouv.fr/produits-certifies/plateforme-id-one-cosmo-v91-masquee-sur-le-composant-ifx-slc32"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2020/59",
"ANSSI-CC-2020/55",
"ANSSI-CC-2020/57",
"ANSSI-CC-2022/33",
"ANSSI-CC-2020/56",
"ANSSI-CC-2020/58"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1110-V2-2019"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2020/59",
"ANSSI-CC-2020/55",
"ANSSI-CC-2020/57",
"ANSSI-CC-2022/33",
"ANSSI-CC-2020/56",
"ANSSI-CC-2020/58"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1110-V2-2019"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2022-03-28",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_07-s01fr1.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2020_07-s01.pdf",
"maintenance_title": "Reassessment report : ANSSI-CC-2020/07-S01"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2022-05-16",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_07-m02.pdf",
"maintenance_st_link": null,
"maintenance_title": "Maintenance report : ANSSI-CC-2020/07-M02"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2022-03-28",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_07-s01fr.pdf",
"maintenance_st_link": null,
"maintenance_title": "Reassessment report: ANSSI-CC-2020/07-S01"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2020-07-23",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_07-m01.pdf",
"maintenance_st_link": null,
"maintenance_title": "ANSSI-CC-2020/07-M01"
}
]
},
"manufacturer": "Idemia",
"manufacturer_web": "https://www.idemia.com",
"name": "Plateforme ID-One Cosmo V9.1 masqu\u00e9e sur le composant IFX SLC32",
"not_valid_after": "2027-03-28",
"not_valid_before": "2020-03-31",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "certificat-cc-2020_07-s01.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2020/07-S01": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL5": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CEA-LETI": {
"CEA-LETI": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 2
}
},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "G\u00e9raldine Avou\u00e9",
"/Category": "-S01",
"/Comments": "ANSSI-CC-CER-F-14_v14.6",
"/Company": "SGDSN",
"/CreationDate": "D:20220404173043+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 11 pour Word",
"/ModDate": "D:20220404173044+02\u002700\u0027",
"/Producer": "Adobe PDF Library 11.0",
"/SourceModified": "D:20220404153033",
"/Title": "ANSSI-CC-2020/07",
"pdf_file_size_bytes": 100060,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"report_filename": "anssi-cc-2020_07-fr.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 5 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
"cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 5",
"cert_id": "ANSSI-CC-2020/07",
"cert_item": "Plateforme ID-One Cosmo V9.1 masqu\u00e9e sur le composant IFX SLC32",
"cert_item_version": "Identification du mat\u00e9riel : 092914",
"cert_lab": "CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France",
"developer": "IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France Infineon Technologies AG AIM CC SM PS \u2013 Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "Java Card Protection Profile Open Configuration, version 3.0.5 certifi\u00e9 BSI-CC-PP-0099-2017 le 21 d\u00e9cembre 2017"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1110-V2-2019": 2
},
"FR": {
"ANSSI-CC-2020/07": 19,
"ANSSI-CC-PP-0099-2017": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-0099-2017": 1
},
"BSI": {
"BSI-CC-PP-0099-2017": 1,
"BSI-PP-0084-2014": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_ALP": 3,
"AGD_OPE": 4,
"AGD_PRE": 5
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 5": 3,
"EAL 7": 1,
"EAL2": 2,
"EAL6": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CEA-LETI": {
"CEA - LETI": 1,
"CEA-LETI": 1
},
"CESTI": {
"CESTI": 1
},
"Serma": {
"SERMA": 11
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 37
},
"Infineon": {
"Infineon": 2,
"Infineon Technologies AG": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "G\u00e9raldine Avou\u00e9",
"/CreationDate": "D:20200402164050+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "ANSSI-CC-CER-F-07, v29.2",
"/Producer": "LibreOffice 4.4",
"/Subject": "Plateforme ID-One Cosmo V9.1 masqu\u00e9e sur le composant IFX SLC32",
"/Title": "ANSSI-CC-2020/07",
"pdf_file_size_bytes": 281614,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]",
"http://www.ssi.gouv.fr/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 18
},
"st_filename": "anssi-cible-cc-2020_07en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 4
},
"ECDH": {
"ECDH": 3
},
"ECDSA": {
"ECDSA": 4
}
},
"FF": {
"DH": {
"Diffie-Hellman": 4
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1110-V2-2019": 2
}
},
"cc_claims": {
"A": {
"A.APPLET": 5,
"A.DELETION": 3,
"A.VERIFICATION": 5
},
"D": {
"D.API_DATA": 3,
"D.APP_CODE": 6,
"D.APP_C_DATA": 3,
"D.APP_I_DATA": 4,
"D.ARRAY": 3,
"D.CONFIG": 4,
"D.CRYPTO": 5,
"D.JCS_CODE": 3,
"D.JCS_DATA": 5,
"D.JCS_KEYS": 7,
"D.NB_REMAINTRYGLB": 1,
"D.PIN": 7,
"D.SEC_DATA": 7,
"D.SENSITIVE_DATA": 5
},
"O": {
"O.ALARM": 23,
"O.APPLET": 16,
"O.CARD_MANAGEMENT": 66,
"O.CIPHER": 16,
"O.CODE_PKG": 22,
"O.DELETION": 14,
"O.FIREWALL": 64,
"O.GLOBAL_ARRAYS_CONFID": 14,
"O.GLOBAL_ARRAYS_INTEG": 10,
"O.INSTALL": 17,
"O.JAVAOBJECT": 55,
"O.KEY-MNGT": 26,
"O.LOAD": 20,
"O.NATIVE": 14,
"O.OBJ-": 1,
"O.OBJ-DELETION": 8,
"O.OPERATE": 39,
"O.PATCH_LOADING": 25,
"O.PIN-": 2,
"O.PIN-MNGT": 26,
"O.REALLOCATION": 18,
"O.RESIDENT_APPLICATION": 24,
"O.RESOURCES": 23,
"O.RNG": 11,
"O.SCP": 60,
"O.SECURE_COMPARE": 8,
"O.SID": 34,
"O.TRANSACTION": 19
},
"OE": {
"OE.APPLET": 8,
"OE.CARD-": 1,
"OE.CARD_MANAGEMENT": 3,
"OE.CODE-": 3,
"OE.CODE-EVIDENCE": 18,
"OE.SCP": 9,
"OE.VERIFICATION": 38
},
"OP": {
"OP.ARRAY_AASTORE": 3,
"OP.ARRAY_ACCESS": 9,
"OP.ARRAY_LENGTH": 3,
"OP.CREATE": 7,
"OP.DELETE_APPLET": 4,
"OP.DELETE_PCKG": 3,
"OP.DELETE_PCKG_APPLET": 3,
"OP.FLOW": 3,
"OP.IMPORT_KEY": 2,
"OP.INSTANCE_FIELD": 5,
"OP.INVK_INTERFACE": 7,
"OP.INVK_VIRTUAL": 6,
"OP.JAVA": 5,
"OP.LOCAL_STACK_ACCESS": 3,
"OP.NATIVE_ACCESS": 1,
"OP.NATIVE_INTERFACE_CALL": 1,
"OP.OPERAND_STACK_ACCESS": 3,
"OP.PUT": 6,
"OP.PUTFIELD": 1,
"OP.PUTSTATIC": 1,
"OP.STATIC_FIELD": 3,
"OP.THROW": 5,
"OP.TYPE_ACCESS": 5
},
"OSP": {
"OSP.VERIFICATION": 6
},
"R": {
"R.JAVA": 10
},
"T": {
"T.CONFID-APPLI-DATA": 18,
"T.CONFID-JCS-CODE": 6,
"T.CONFID-JCS-DATA": 11,
"T.CONFIGURATION": 4,
"T.CONF_DATA_APPLET": 4,
"T.DELETION": 6,
"T.EXE-": 1,
"T.EXE-CODE": 8,
"T.INSTALL": 6,
"T.INTEG-": 2,
"T.INTEG-APPLI-": 5,
"T.INTEG-APPLI-CODE": 11,
"T.INTEG-APPLI-DATA": 21,
"T.INTEG-JCS-CODE": 6,
"T.INTEG-JCS-DATA": 12,
"T.NATIVE": 6,
"T.OBJ-DELETION": 4,
"T.PATCH_LOADING": 4,
"T.PHYSICAL": 4,
"T.RESOURCES": 8,
"T.SID": 18
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 6,
"ADV_FSP.1": 3,
"ADV_FSP.2": 2,
"ADV_FSP.4": 2,
"ADV_FSP.5": 8,
"ADV_IMP.1": 9,
"ADV_INT.2": 1,
"ADV_TDS.1": 2,
"ADV_TDS.3": 4,
"ADV_TDS.4": 8
},
"AGD": {
"AGD_OPE": 2,
"AGD_OPE.1": 8,
"AGD_PRE": 7,
"AGD_PRE.1": 6
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.1": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.1": 2,
"ALC_DVS.2": 13,
"ALC_LCD.1": 3,
"ALC_TAT.1": 2,
"ALC_TAT.2": 3
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 5,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 3,
"ATE_DPT.1": 2,
"ATE_DPT.3": 1,
"ATE_FUN.1": 6
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 15
}
},
"cc_security_level": {
"EAL": {
"EAL4": 1,
"EAL4 augmented": 1,
"EAL5": 9,
"EAL5 augmented": 5,
"EAL5+": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 20,
"FAU_ARP.1.1": 1,
"FAU_GEN": 1,
"FAU_GEN.1": 2,
"FAU_SAA.1": 3,
"FAU_STG.2": 9,
"FAU_STG.2.1": 1,
"FAU_STG.2.2": 1,
"FAU_STG.2.3": 1
},
"FCO": {
"FCO_NRO": 16,
"FCO_NRO.2": 8
},
"FCS": {
"FCS_CKM": 22,
"FCS_CKM.1": 20,
"FCS_CKM.1.1": 1,
"FCS_CKM.4": 19,
"FCS_CKM.4.1": 1,
"FCS_COP": 27,
"FCS_COP.1": 16,
"FCS_COP.1.1": 1,
"FCS_RNG": 3,
"FCS_RNG.1": 10,
"FCS_RNG.1.1": 2,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC": 72,
"FDP_ACC.1": 24,
"FDP_ACC.2": 13,
"FDP_ACF": 59,
"FDP_ACF.1": 34,
"FDP_IFC": 28,
"FDP_IFC.1": 21,
"FDP_IFC.2": 2,
"FDP_IFF": 22,
"FDP_IFF.1": 16,
"FDP_ITC": 26,
"FDP_ITC.1": 8,
"FDP_ITC.2": 14,
"FDP_RIP": 131,
"FDP_RIP.1": 11,
"FDP_ROL": 16,
"FDP_ROL.1": 6,
"FDP_SDI": 11,
"FDP_SDI.2": 2,
"FDP_UCT": 10,
"FDP_UCT.1": 1,
"FDP_UIT": 17,
"FDP_UIT.1": 4
},
"FIA": {
"FIA_AFL": 35,
"FIA_AFL.1": 8,
"FIA_ATD": 10,
"FIA_ATD.1": 2,
"FIA_UAU": 56,
"FIA_UAU.1": 12,
"FIA_UAU.4": 2,
"FIA_UAU.7": 2,
"FIA_UID": 31,
"FIA_UID.1": 16,
"FIA_UID.2": 1,
"FIA_USB": 9,
"FIA_USB.1": 3
},
"FMT": {
"FMT_MOF": 7,
"FMT_MOF.1": 1,
"FMT_MSA": 191,
"FMT_MSA.1": 20,
"FMT_MSA.2": 5,
"FMT_MSA.3": 27,
"FMT_MTD": 39,
"FMT_MTD.1": 4,
"FMT_MTD.2": 2,
"FMT_MTD.3": 1,
"FMT_SMF": 62,
"FMT_SMF.1": 30,
"FMT_SMF.1.1": 1,
"FMT_SMR": 61,
"FMT_SMR.1": 56,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1,
"FMT_SMR.2": 6
},
"FPR": {
"FPR_UNO": 16,
"FPR_UNO.1": 13,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_FLS": 45,
"FPT_FLS.1": 18,
"FPT_FLS.1.1": 2,
"FPT_PHP": 7,
"FPT_PHP.3": 1,
"FPT_RCV": 26,
"FPT_RCV.3": 7,
"FPT_RCV.4": 1,
"FPT_TDC": 9,
"FPT_TDC.1": 11,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST": 1,
"FPT_TST.1": 11,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FRU": {
"FRU_FLT": 7,
"FRU_FLT.1": 1
},
"FTP": {
"FTP_ITC": 16,
"FTP_ITC.1": 7,
"FTP_TRP.1": 4
}
},
"certification_process": {
"OutOfScope": {
"a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 3
},
"ECB": {
"ECB": 5
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 1
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 2,
"Key agreement": 1
},
"MAC": {
"MAC": 4
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CEA-LETI": {
"CEA-LETI": 1
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 4
},
"SHA2": {
"SHA-2": 1,
"SHA-224": 4,
"SHA-256": 5,
"SHA-384": 4,
"SHA-512": 3,
"SHA256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"misc": {
"TYPE_ACCESS": 5
}
},
"javacard_packages": {
"com": {
"com.oberthurcs.javacard": 2,
"com.oberthurcs.javacard.sac.sac": 1
},
"javacard": {
"javacard.framework": 4,
"javacard.sac.sac": 1,
"javacard.security": 3
},
"javacardx": {
"javacardx.crypto": 2,
"javacardx.framework.util": 1,
"javacardx.security": 1
}
},
"javacard_version": {
"JavaCard": {
"Java Card 3.0.5": 7
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 24
}
},
"side_channel_analysis": {
"FI": {
"fault injection": 1,
"malfunction": 2,
"physical tampering": 2
},
"SCA": {
"DPA": 2,
"SPA": 1,
"physical probing": 4,
"timing attack": 1
}
},
"standard_id": {
"BSI": {
"AIS31": 1
},
"FIPS": {
"FIPS 140-2": 1,
"FIPS 198": 1,
"FIPS PUB 180-3": 2,
"FIPS PUB 197": 6,
"FIPS PUB 46-3": 3,
"FIPS PUB 81": 8
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 7816": 2,
"ISO/IEC 9796-1": 2,
"ISO/IEC 9797": 12,
"ISO/IEC 9797-1": 1
},
"NIST": {
"NIST SP 800-90": 1
},
"PKCS": {
"PKCS#1": 2
},
"SCP": {
"SCP02": 4,
"SCP03": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 22
}
},
"DES": {
"3DES": {
"TDES": 12,
"Triple-DES": 2
},
"DES": {
"DES": 12
}
},
"constructions": {
"MAC": {
"CMAC": 4,
"HMAC": 3
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 175
},
"Infineon": {
"Infineon": 8,
"Infineon Technologies AG": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "[email protected]",
"/CreationDate": "D:20200228163658+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/ModDate": "D:20200228163658+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"/Title": "Title",
"pdf_file_size_bytes": 2862110,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 150
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL4+",
"pp_ids": {
"_type": "Set",
"elements": [
"PDCP_V1.3"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf",
"pp_name": "Java Card\u2122 System Protection Profile Open Configuration, Version 2.6"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_07-fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"AVA_VAN.5",
"EAL5+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_07en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "fe335c8ba5b824602982cd473fdf60cc90f6d5ad4f86878d9bab9b705677db07",
"txt_hash": "1db1bd2d3c13b3f08ad2bc162a6c15f0fd66a74aa777129acde4c4de206cdaba"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "3996e239c72d181094b76bd38b58cf629382f9603eea456b4382b56461d6e63f",
"txt_hash": "15a1e2ed5352aa2d710ffe8a000b76f1733640fb99253f023c444a900d80693e"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f2253108b3d5baad833abb27ec6ea00f236000f43a23281fe43ae078f32d8a43",
"txt_hash": "d0b34b74aa182a8c12e6ba252de1dce3ea72887b1b753cc410246239f5d3d0d7"
}
},
"status": "active"
}