Plateforme ID-One Cosmo V9.2 masquée sur le composant IFX SLC52

CSV information ?

Status active
Valid from 09.04.2020
Valid until 28.03.2027
Scheme 🇫🇷 FR
Manufacturer Idemia
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, ALC_DVS.2, EAL5+
Protection profiles
Maintenance updates Reassessment report: ANSSI-CC-2020/08-S01 (28.03.2022) Certification report
ANSSI-CC-2020/08-M02 (28.01.2021) Certification report
ANSSI-CC-2020/08-M01 (30.07.2020) Certification report
ANSSI-CC-2020/08-M03 (04.06.2021) Certification report

Heuristics summary ?

Certificate ID: ANSSI-CC-2020/08

Certificate ?

Extracted keywords

Vendor
IDEMIA

Security level
EAL5, EAL2
Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5
Certificates
ANSSI-CC-2020/08-S01
Evaluation facilities
CEA-LETI

File metadata

Title ANSSI-CC-2020/08
Author Géraldine Avoué
Creation date D:20220404173831+02'00'
Modification date D:20220404173831+02'00'
Pages 2
Creator Acrobat PDFMaker 11 pour Word
Producer Adobe PDF Library 11.0

Certification report ?

Extracted keywords

Symmetric Algorithms
DES

Vendor
Infineon Technologies AG, Infineon, IDEMIA

Security level
EAL 5, EAL2, EAL6, EAL7, EAL 1, EAL 3, EAL 7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, AGD_ALP, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Protection profiles
BSI-CC-PP-0099-2017, BSI-PP-0084-2014, ANSSI-CC-PP-0099-2017
Certificates
BSI-DSZ-CC-1110-V2-2019, ANSSI-CC-2020/08, ANSSI-CC-PP-0099-2017
Evaluation facilities
SERMA, CESTI, CEA - LETI, CEA-LETI

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title ANSSI-CC-2020/08
Subject Plateforme ID-One Cosmo V9.2 masquée sur le composant IFX SLC52
Keywords ANSSI-CC-CER-F-07, v29.2
Author Géraldine Avoué
Creation date D:20200409151819+02'00'
Pages 18
Creator Writer
Producer LibreOffice 4.4

Frontpage

Certificate ID ANSSI-CC-2020/08
Certified item Plateforme ID-One Cosmo V9.2 masquée sur le composant IFX SLC52
Certification lab CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France
Developer IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France

References

Outgoing
  • BSI-DSZ-CC-1110-V2-2019 - archived - Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h H13 including the products from the second production line and optional software packages: Flash Loader, Asymmetric Crypto Library, Symmetric Cryptographic Library, Hardware Support Layer, Hash Crypto Library, Mifare Compatible Software, and CIPURSE™ Crypto Library
Incoming
  • ANSSI-CC-2020/61 - active - CombICAO Applet v2.1 in EAC configuration on ID-One Cosmo V9.2 (code SAAAAR : 203523)
  • ANSSI-CC-2020/62 - active - CombICAO Applet v2.1 in EAC with PACE configuration on ID-One Cosmo V9.2 (code SAAAAR : 203523)
  • ANSSI-CC-2020/63 - active - CombICAO Applet v2.1 in EAC with PACE configuration for French ID on ID-One Cosmo V9.2 (code SAAAAR : 203523)
  • ANSSI-CC-2020/64 - active - CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2 (code SAAAAR : 203523)
  • ANSSI-CC-2020/60 - active - CombICAO Applet v2.1 in BAC and CA configuration on ID-One Cosmo V9.2 (code SAAAAR : 203523)

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDES, Triple-DES, HMAC, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman
Hash functions
SHA-1, SHA-256, SHA-384, SHA-224, SHA-512, SHA256, SHA-2
Schemes
MAC, Key Agreement, Key agreement
Protocols
PACE
Randomness
RNG
Block cipher modes
ECB, CBC

JavaCard versions
Java Card 3.0.5
JavaCard API constants
TYPE_ACCESS
Vendor
Infineon, Infineon Technologies AG, IDEMIA

Security level
EAL5, EAL5+, EAL4, EAL5 augmented, EAL4 augmented
Claims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.CONFIG, D.SENSITIVE_DATA, D.ARRAY, D.JCS_KEYS, D.NB_REMAINTRYGLB, O.SCP, O.CARD_MANAGEMENT, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.RNG, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.RESIDENT_APPLICATION, O.SECURE_COMPARE, O.PATCH_LOADING, O.PIN-, O.APPLET, O.CODE_PKG, O.JAVAOBJECT, O.OBJ-, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, T.CONFIGURATION, T.CONF_DATA_APPLET, T.PATCH_LOADING, T.INTEG-APPLI-, T.INTEG-, T.EXE-, A.DELETION, A.APPLET, A.VERIFICATION, R.JAVA, OP.NATIVE_INTERFACE_CALL, OP.ARRAY_ACCESS, OP.ARRAY_LENGTH, OP.ARRAY_AASTORE, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.FLOW, OP.IMPORT_KEY, OP.INSTANCE_FIELD, OP.INVK_INTERFACE, OP.INVK_VIRTUAL, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.LOCAL_STACK_ACCESS, OP.OPERAND_STACK_ACCESS, OP.PUT, OP.STATIC_FIELD, OP.NATIVE_ACCESS, OP.PUTFIELD, OP.PUTSTATIC, OP.NATIVE, OE.SCP, OE.CARD-, OE.APPLET, OE.VERIFICATION, OE.CODE-EVIDENCE, OE.CARD_MANAGEMENT, OE.CODE-, OSP.VERIFICATION
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.5, ADV_TDS.4, ADV_IMP.1, ADV_TDS.3, ADV_INT.2, ADV_FSP.2, ADV_FSP.4, AGD_PRE, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_DVS, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.5, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, ATE_DPT.3, AVA_VAN.5, AVA_VAN, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_STG.2, FAU_STG.2.1, FAU_STG.2.2, FAU_STG.2.3, FAU_SAA.1, FAU_GEN.1, FAU_GEN, FCO_NRO, FCO_NRO.2, FCS_RNG, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_COP.1.1, FCS_COP, FCS_CKM, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ROL.1, FDP_ROL, FDP_SDI, FDP_SDI.2, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FDP_UCT, FDP_UCT.1, FDP_ITC.1, FDP_ACC.1, FIA_ATD, FIA_ATD.1, FIA_UID, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_UID.1, FIA_AFL, FIA_AFL.1, FIA_UAU, FIA_UAU.1, FIA_UAU.4, FIA_UAU.7, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FMT_SMR, FMT_SMF, FMT_SMR.2, FMT_MOF, FMT_MOF.1, FMT_MTD.2, FPR_UNO.1, FPR_UNO.1.1, FPR_UNO, FPT_FLS.1, FPT_FLS.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_FLS, FPT_RCV, FPT_RCV.3, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_TDC, FPT_PHP, FPT_PHP.3, FPT_RCV.4, FPT_TST, FRU_FLT, FRU_FLT.1, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP-0084-2014
Certificates
BSI-DSZ-CC-1110-V2-2019
Evaluation facilities
CEA-LETI

Side-channel analysis
physical probing, DPA, SPA, timing attack, physical tampering, malfunction, fault injection
Certification process
out of scope, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are

Standards
FIPS PUB 46-3, FIPS PUB 81, FIPS PUB 180-3, FIPS PUB 197, FIPS 198, FIPS 140-2, NIST SP 800-90, PKCS#1, AIS31, ISO/IEC 9796-1, ISO/IEC 9797-1, ISO/IEC 7816, ISO/IEC 14443, ISO/IEC 9797, SCP02, SCP03

File metadata

Title Title
Author [email protected]
Creation date D:20200319152951+01'00'
Modification date D:20200319152951+01'00'
Pages 158
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

References

Outgoing
  • BSI-DSZ-CC-1110-V2-2019 - archived - Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h H13 including the products from the second production line and optional software packages: Flash Loader, Asymmetric Crypto Library, Symmetric Cryptographic Library, Hardware Support Layer, Hash Crypto Library, Mifare Compatible Software, and CIPURSE™ Crypto Library
Incoming
  • ANSSI-CC-2020/61 - active - CombICAO Applet v2.1 in EAC configuration on ID-One Cosmo V9.2 (code SAAAAR : 203523)
  • ANSSI-CC-2020/62 - active - CombICAO Applet v2.1 in EAC with PACE configuration on ID-One Cosmo V9.2 (code SAAAAR : 203523)
  • ANSSI-CC-2020/63 - active - CombICAO Applet v2.1 in EAC with PACE configuration for French ID on ID-One Cosmo V9.2 (code SAAAAR : 203523)
  • ANSSI-CC-2020/64 - active - CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2 (code SAAAAR : 203523)
  • ANSSI-CC-2020/60 - active - CombICAO Applet v2.1 in BAC and CA configuration on ID-One Cosmo V9.2 (code SAAAAR : 203523)

Heuristics ?

Certificate ID: ANSSI-CC-2020/08

Extracted SARs

ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, AVA_VAN.5

Similar certificates

Name Certificate ID
Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32 ANSSI-CC-2020/07 Compare
IAS ECC V2 en configuration #2 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N – Large R2 masquée sur le composant NXP P6022M VB ANSSI-CC-2018/16 Compare
Plateforme ID-One Cosmo v8.2 masquée sur le composant NXP P60D145 ANSSI-CC-2020/26 Compare
Plateforme ID-One Cosmo v8.2 masquée sur le composant NXP P60D145 Identification du matériel 091121 ANSSI-CC-2019/28 Compare
Plateforme ID-One Cosmo v8.2 masquée sur le composant NXP P60D145 Codes SAAAAR : 091121, 094223 et 094742 (ANSSI-CC-2020/26-R01) ANSSI-CC-2020/26-R01 Compare
IAS ECC V2 en configuration #1 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N – Large R2 masquée sur le composant NXP P6022M VB ANSSI-CC-2018/15 Compare
IAS ECC V2 en configuration #4 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N – Large R2 masquée sur le composant NXP P6022M VB ANSSI-CC-2018/18 Compare
IAS ECC V2 en configuration #3 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N – Large R2 masquée sur le composant NXP P6022M VB ANSSI-CC-2018/17 Compare
Plateforme ID-One Cosmo v8.1-N- Large masquée sur le composant NXP P6022M VB ANSSI-CC-2017/49 Compare
Plateforme ID-One Cosmo v8.1-N-Standard LDS masquée sur le composant NXP P6021M VB ANSSI-CC-2017/47 Compare
Plateforme ID-One Cosmo v8.1-N-Standard IAS masquée sur le composant NXP P6021M VB ANSSI-CC-2017/48 Compare
Carte IAS ECC v1.0.1 sur ID-One Cosmo v7.0.1-a : applet (version 3124) masquée sur ID-One Cosmo V7.0.1-a (composant Inside Secure) en configuration Standard et Basic avec correctif 075243 ANSSI-CC-2012/10 Compare
Showing 5 out of 12.

Scheme data ?

Product Plateforme ID-One Cosmo V9.2 masquée sur le composant IFX SLC52
Url https://cyber.gouv.fr/produits-certifies/plateforme-id-one-cosmo-v92-masquee-sur-le-composant-ifx-slc52
Description Le produit évalué est la « Plateforme ID-One Cosmo V9.2 masquée sur le composant IFX SLC52, Identification du matériel 093772 ». Elle est développée par IDEMIA et embarquée sur le microcontrôleur développé et fabriqué par INFINEON TECHNOLOGIES AG. Ce produit est une plateforme ouverte Java Card conforme à la spécification émise par Global Platform, contact et/ou sans contact, destinée à accueil
Sponsor IDEMIA, INFINEON TECHNOLOGIES AG
Developer IDEMIA, INFINEON TECHNOLOGIES AG
Cert Id ANSSI-CC-2020/08
Level EAL5+
Expiration Date 28.03.2027
Enhanced
Cert Id ANSSI-CC-2020/08
Certification Date 09.04.2020
Expiration Date 28.03.2027
Category Cartes à puce
Cc Version Critères Communs version 3.1r5
Developer IDEMIA, INFINEON TECHNOLOGIES AG
Sponsor IDEMIA, INFINEON TECHNOLOGIES AG
Evaluation Facility CEA - LETI
Level EAL5+
Protection Profile Java Card Protection Profile Open Configuration, version 3.0.5 (BSI-CC-PP-0099-2017)
Mutual Recognition SOG-IS CCRA
Augmented ALC_DVS.2, AVA_VAN.5
Report Link https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cc-2020_08fr.pdf
Target Link https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cible-cc-2020_08-m03en.pdf
Cert Link https://cyber.gouv.fr/sites/default/files/2020/04/certificat-cc-2020_08-s01.pdf

References ?

Updates ?

  • 16.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Plateforme ID-One Cosmo V9.2 masquée sur le composant IFX SLC52', 'url': 'https://cyber.gouv.fr/produits-certifies/plateforme-id-one-cosmo-v92-masquee-sur-le-composant-ifx-slc52', 'description': 'Le produit évalué est la « Plateforme ID-One Cosmo V9.2 masquée sur le composant IFX SLC52, Identification du matériel 093772 ». Elle est développée par IDEMIA et embarquée sur le microcontrôleur développé et fabriqué par INFINEON TECHNOLOGIES AG. Ce produit est une plateforme ouverte Java Card conforme à la spécification émise par Global Platform, contact et/ou sans contact, destinée à accueil', 'sponsor': 'IDEMIA, INFINEON TECHNOLOGIES AG', 'developer': 'IDEMIA, INFINEON TECHNOLOGIES AG', 'cert_id': 'ANSSI-CC-2020/08', 'level': 'EAL5+', 'expiration_date': '2027-03-28', 'enhanced': {'cert_id': 'ANSSI-CC-2020/08', 'certification_date': '2020-04-09', 'expiration_date': '2027-03-28', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'IDEMIA, INFINEON TECHNOLOGIES AG', 'sponsor': 'IDEMIA, INFINEON TECHNOLOGIES AG', 'evaluation_facility': 'CEA - LETI', 'level': 'EAL5+', 'protection_profile': 'Java Card Protection Profile Open Configuration, version 3.0.5 (BSI-CC-PP-0099-2017)', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cc-2020_08fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cible-cc-2020_08-m03en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/certificat-cc-2020_08-s01.pdf'}}.
  • 09.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'FR': {'__insert__': {'ANSSI-CC-PP-0099-2017': 1}}}}} data.

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'description': 'Le produit évalué est la « Plateforme ID-One Cosmo V9.2 masquée sur le composant IFX SLC52, Identification du matériel 093772 ». Elle est développée par IDEMIA et embarquée sur le microcontrôleur développé et fabriqué par INFINEON TECHNOLOGIES AG. Ce produit est une plateforme ouverte Java Card conforme à la spécification émise par Global Platform, contact et/ou sans contact, destinée à accueil', 'cert_id': 'ANSSI-CC-2020/08', 'expiration_date': '2027-03-28', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2020/08', 'certification_date': '2020-04-09', 'expiration_date': '2027-03-28', 'mutual_recognition': 'SOG-IS CCRA'}}} data.
  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Protection Profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 2.6', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PDCP_V1.3']}}]}.
  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Plateforme ID-One Cosmo V9.2 masquée sur le composant IFX SLC52', 'url': 'https://cyber.gouv.fr/produits-certifies/plateforme-id-one-cosmo-v92-masquee-sur-le-composant-ifx-slc52', 'description': 'Le produit évalué est la « Plateforme ID-One Cosmo V9.2 masquée sur le composant IFX SLC52, Identification du matériel 093772 ». Elle est développée par IDEMIA et embarquée sur le microcontrôleur développé et fabriqué par INFINEON TECHNOLOGIES AG.\n\nCe produit est une plateforme ouverte Java Card conforme à la spécification émise par Global Platform, contact et/ou sans contact, destinée à accueil', 'sponsor': 'IDEMIA, INFINEON TECHNOLOGIES AG', 'developer': 'IDEMIA, INFINEON TECHNOLOGIES AG', 'cert_id': '2020/08', 'level': 'EAL5+', 'expiration_date': '28 Mars 2027', 'enhanced': {'cert_id': '2020/08', 'certification_date': '09/04/2020', 'expiration_date': '28/03/2027', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'IDEMIA, INFINEON TECHNOLOGIES AG', 'sponsor': 'IDEMIA, INFINEON TECHNOLOGIES AG', 'evaluation_facility': 'CEA - LETI', 'level': 'EAL5+', 'protection_profile': 'Java Card Protection Profile Open Configuration, version 3.0.5 (BSI-CC-PP-0099-2017)', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cc-2020_08fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cible-cc-2020_08-m03en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/certificat-cc-2020_08-s01.pdf'}}.
  • 02.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'a403f4e878e064db1508bf855a4819ca19e989b5e1d0c4530c274125b8e5b3b8', 'txt_hash': '0fe07f559c2ca772734f258e08d995f798fc296ff19e0f74ee333921976de19f'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '5c8f30d0b1f3c365e5e58c2fb759f3bd05e0782d1e7ff5681f54b661b6163ce3', 'txt_hash': '8a3af30176c13dad9154a6f0dbc6a1ec0944b1963b13b5b44f3d18a44cae5282'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 2801052, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 158, '/Title': 'Title', '/Author': '[email protected]', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20200319152951+01'00'", '/ModDate': "D:20200319152951+01'00'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 100160, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Author': 'Géraldine Avoué', '/Category': '-S01', '/Comments': 'ANSSI-CC-CER-F-14_v14.6', '/Company': 'SGDSN', '/CreationDate': "D:20220404173831+02'00'", '/Creator': 'Acrobat PDFMaker 11 pour Word', '/ModDate': "D:20220404173831+02'00'", '/Producer': 'Adobe PDF Library 11.0', '/SourceModified': 'D:20220404153821', '/Title': 'ANSSI-CC-2020/08', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1110-V2-2019': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL5': 9, 'EAL5+': 2, 'EAL4': 1, 'EAL5 augmented': 5, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.5': 8, 'ADV_TDS.4': 8, 'ADV_IMP.1': 9, 'ADV_TDS.3': 4, 'ADV_INT.2': 1, 'ADV_FSP.2': 2, 'ADV_FSP.4': 2}, 'AGD': {'AGD_PRE': 7, 'AGD_OPE': 2, 'AGD_OPE.1': 8, 'AGD_PRE.1': 6}, 'ALC': {'ALC_DVS.2': 13, 'ALC_DVS': 1, 'ALC_TAT.1': 2, 'ALC_TAT.2': 3, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 3, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 6, 'ATE_COV.1': 2, 'ATE_DPT.1': 2, 'ATE_DPT.3': 1}, 'AVA': {'AVA_VAN.5': 15, 'AVA_VAN': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 20, 'FAU_ARP.1.1': 1, 'FAU_STG.2': 9, 'FAU_STG.2.1': 1, 'FAU_STG.2.2': 1, 'FAU_STG.2.3': 1, 'FAU_SAA.1': 3, 'FAU_GEN.1': 2, 'FAU_GEN': 1}, 'FCO': {'FCO_NRO': 16, 'FCO_NRO.2': 8}, 'FCS': {'FCS_RNG': 3, 'FCS_RNG.1': 10, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM.1': 20, 'FCS_CKM.1.1': 1, 'FCS_CKM.4': 19, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 15, 'FCS_COP.1.1': 1, 'FCS_COP': 27, 'FCS_CKM': 22}, 'FDP': {'FDP_ACC': 83, 'FDP_ACC.2': 15, 'FDP_ACF': 69, 'FDP_ACF.1': 39, 'FDP_IFC': 28, 'FDP_IFC.1': 22, 'FDP_IFF': 22, 'FDP_IFF.1': 16, 'FDP_RIP': 131, 'FDP_RIP.1': 11, 'FDP_ROL.1': 6, 'FDP_ROL': 16, 'FDP_SDI': 11, 'FDP_SDI.2': 2, 'FDP_ITC': 26, 'FDP_ITC.2': 14, 'FDP_IFC.2': 2, 'FDP_UIT': 17, 'FDP_UIT.1': 4, 'FDP_UCT': 10, 'FDP_UCT.1': 1, 'FDP_ITC.1': 8, 'FDP_ACC.1': 26}, 'FIA': {'FIA_ATD': 10, 'FIA_ATD.1': 2, 'FIA_UID': 31, 'FIA_UID.2': 1, 'FIA_USB': 9, 'FIA_USB.1': 3, 'FIA_UID.1': 16, 'FIA_AFL': 35, 'FIA_AFL.1': 8, 'FIA_UAU': 56, 'FIA_UAU.1': 12, 'FIA_UAU.4': 2, 'FIA_UAU.7': 2}, 'FMT': {'FMT_MSA': 207, 'FMT_MSA.1': 22, 'FMT_MSA.2': 5, 'FMT_MSA.3': 30, 'FMT_SMF.1': 32, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 60, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD': 39, 'FMT_MTD.1': 4, 'FMT_MTD.3': 1, 'FMT_SMR': 61, 'FMT_SMF': 69, 'FMT_SMR.2': 6, 'FMT_MOF': 7, 'FMT_MOF.1': 1, 'FMT_MTD.2': 2}, 'FPR': {'FPR_UNO.1': 13, 'FPR_UNO.1.1': 1, 'FPR_UNO': 16}, 'FPT': {'FPT_FLS.1': 18, 'FPT_FLS.1.1': 2, 'FPT_TDC.1': 11, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_FLS': 45, 'FPT_RCV': 26, 'FPT_RCV.3': 7, 'FPT_TST.1': 11, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_TDC': 9, 'FPT_PHP': 7, 'FPT_PHP.3': 1, 'FPT_RCV.4': 1, 'FPT_TST': 1}, 'FRU': {'FRU_FLT': 7, 'FRU_FLT.1': 1}, 'FTP': {'FTP_ITC': 16, 'FTP_ITC.1': 7, 'FTP_TRP.1': 4}}, 'cc_claims': {'D': {'D.APP_CODE': 6, 'D.APP_C_DATA': 3, 'D.APP_I_DATA': 4, 'D.PIN': 7, 'D.API_DATA': 3, 'D.CRYPTO': 5, 'D.JCS_CODE': 3, 'D.JCS_DATA': 5, 'D.SEC_DATA': 7, 'D.CONFIG': 4, 'D.SENSITIVE_DATA': 5, 'D.ARRAY': 3, 'D.JCS_KEYS': 7, 'D.NB_REMAINTRYGLB': 1}, 'O': {'O.SCP': 60, 'O.CARD_MANAGEMENT': 66, 'O.SID': 34, 'O.FIREWALL': 64, 'O.GLOBAL_ARRAYS_CONFID': 14, 'O.GLOBAL_ARRAYS_INTEG': 10, 'O.NATIVE': 16, 'O.OPERATE': 39, 'O.REALLOCATION': 18, 'O.RESOURCES': 23, 'O.ALARM': 23, 'O.CIPHER': 16, 'O.RNG': 11, 'O.KEY-MNGT': 26, 'O.PIN-MNGT': 26, 'O.TRANSACTION': 19, 'O.OBJ-DELETION': 8, 'O.DELETION': 14, 'O.LOAD': 20, 'O.INSTALL': 17, 'O.RESIDENT_APPLICATION': 24, 'O.SECURE_COMPARE': 8, 'O.PATCH_LOADING': 25, 'O.PIN-': 2, 'O.APPLET': 16, 'O.CODE_PKG': 22, 'O.JAVAOBJECT': 55, 'O.OBJ-': 1}, 'T': {'T.CONFID-APPLI-DATA': 18, 'T.CONFID-JCS-CODE': 7, 'T.CONFID-JCS-DATA': 11, 'T.INTEG-APPLI-CODE': 12, 'T.INTEG-APPLI-DATA': 21, 'T.INTEG-JCS-CODE': 7, 'T.INTEG-JCS-DATA': 12, 'T.SID': 18, 'T.EXE-CODE': 8, 'T.NATIVE': 7, 'T.RESOURCES': 8, 'T.DELETION': 6, 'T.INSTALL': 6, 'T.OBJ-DELETION': 4, 'T.PHYSICAL': 4, 'T.CONFIGURATION': 4, 'T.CONF_DATA_APPLET': 4, 'T.PATCH_LOADING': 4, 'T.INTEG-APPLI-': 5, 'T.INTEG-': 2, 'T.EXE-': 1}, 'A': {'A.DELETION': 3, 'A.APPLET': 4, 'A.VERIFICATION': 5}, 'R': {'R.JAVA': 10}, 'OP': {'OP.NATIVE_INTERFACE_CALL': 4, 'OP.ARRAY_ACCESS': 9, 'OP.ARRAY_LENGTH': 3, 'OP.ARRAY_AASTORE': 3, 'OP.CREATE': 7, 'OP.DELETE_APPLET': 4, 'OP.DELETE_PCKG': 3, 'OP.DELETE_PCKG_APPLET': 3, 'OP.FLOW': 3, 'OP.IMPORT_KEY': 2, 'OP.INSTANCE_FIELD': 5, 'OP.INVK_INTERFACE': 7, 'OP.INVK_VIRTUAL': 6, 'OP.JAVA': 5, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.LOCAL_STACK_ACCESS': 3, 'OP.OPERAND_STACK_ACCESS': 3, 'OP.PUT': 6, 'OP.STATIC_FIELD': 3, 'OP.NATIVE_ACCESS': 5, 'OP.PUTFIELD': 1, 'OP.PUTSTATIC': 1, 'OP.NATIVE': 1}, 'OE': {'OE.SCP': 9, 'OE.CARD-': 1, 'OE.APPLET': 9, 'OE.VERIFICATION': 38, 'OE.CODE-EVIDENCE': 20, 'OE.CARD_MANAGEMENT': 3, 'OE.CODE-': 1}, 'OSP': {'OSP.VERIFICATION': 6}}, 'vendor': {'Infineon': {'Infineon': 8, 'Infineon Technologies AG': 1}, 'Idemia': {'IDEMIA': 26}}, 'eval_facility': {'CEA-LETI': {'CEA-LETI': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 22}}, 'DES': {'DES': {'DES': 12}, '3DES': {'TDES': 12, 'Triple-DES': 2}}, 'constructions': {'MAC': {'HMAC': 3, 'CMAC': 4}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 3}, 'ECDSA': {'ECDSA': 4}, 'ECC': {'ECC': 4}}, 'FF': {'DH': {'Diffie-Hellman': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}, 'SHA2': {'SHA-256': 5, 'SHA-384': 4, 'SHA-224': 4, 'SHA-512': 3, 'SHA256': 1, 'SHA-2': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 4}, 'KA': {'Key Agreement': 2, 'Key agreement': 1}}, 'crypto_protocol': {'PACE': {'PACE': 1}}, 'randomness': {'RNG': {'RNG': 24}}, 'cipher_mode': {'ECB': {'ECB': 5}, 'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 4, 'DPA': 2, 'SPA': 1, 'timing attack': 1}, 'FI': {'physical tampering': 2, 'malfunction': 2, 'fault injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 3, 'FIPS PUB 81': 8, 'FIPS PUB 180-3': 2, 'FIPS PUB 197': 6, 'FIPS 198': 1, 'FIPS 140-2': 1}, 'NIST': {'NIST SP 800-90': 1}, 'PKCS': {'PKCS#1': 2}, 'BSI': {'AIS31': 1}, 'ISO': {'ISO/IEC 9796-1': 2, 'ISO/IEC 9797-1': 1, 'ISO/IEC 7816': 2, 'ISO/IEC 14443': 2, 'ISO/IEC 9797': 12}, 'SCP': {'SCP02': 4, 'SCP03': 4}}, 'javacard_version': {'JavaCard': {'Java Card 3.0.5': 7}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 5}}, 'javacard_packages': {'javacard': {'javacard.sac.sac': 1, 'javacard.security': 3, 'javacard.framework': 4}, 'javacardx': {'javacardx.crypto': 2, 'javacardx.security': 1, 'javacardx.framework.util': 1}, 'com': {'com.oberthurcs.javacard': 2, 'com.oberthurcs.javacard.sac.sac': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2020/08-S01': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL5': 1, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Idemia': {'IDEMIA': 2}}, 'eval_facility': {'CEA-LETI': {'CEA-LETI': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to anssi-cible-cc-2020_08en.pdf.
    • The cert_filename property was set to certificat-cc-2020_08-s01.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/61', 'ANSSI-CC-2020/60', 'ANSSI-CC-2020/64', 'ANSSI-CC-2020/62', 'ANSSI-CC-2020/63']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/61', 'ANSSI-CC-2020/60', 'ANSSI-CC-2020/64', 'ANSSI-CC-2020/62', 'ANSSI-CC-2020/63']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019']}} data.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0945-V3-2018', 'BSI-DSZ-CC-0945-V2-2018', 'BSI-DSZ-CC-0945-2017', 'BSI-DSZ-CC-1110-V2-2019', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-1110-2019', 'BSI-DSZ-CC-0891-2015', 'BSI-DSZ-CC-0891-V2-2016']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]} values added.
  • 19.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '24e271ddd6279749fa2efffdc332fa0d80f171d25feea51243c31d85f8de2e93', 'txt_hash': 'd52196a8edc2eee52b0d265d195f0b0d9d647ea4753fdc966da778a53785e18e'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 279179, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 18, '/Title': 'ANSSI-CC-2020/08', '/Author': 'Géraldine Avoué', '/Subject': 'Plateforme ID-One Cosmo V9.2 masquée sur le composant IFX SLC52', '/Keywords': 'ANSSI-CC-CER-F-07, v29.2', '/Creator': 'Writer', '/Producer': 'LibreOffice 4.4', '/CreationDate': "D:20200409151819+02'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['file:///h']}}.
    • The report_frontpage property was set to {'FR': {'match_rules': ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2020/08', 'cert_item': 'Plateforme ID-One Cosmo V9.2 masquée sur le composant IFX SLC52', 'cert_item_version': 'Identification du matériel : 093772', 'ref_protection_profiles': 'Java Card Protection Profile Open Configuration, version 3.0.5 certifié BSI-CC-PP-0099-2017 le 21 décembre 2017', 'cc_version': 'Critères Communs version 3.1 révision 5', 'cc_security_level': 'EAL 5 augmenté ALC_DVS.2, AVA_VAN.5', 'developer': 'IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France', 'cert_lab': 'CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1110-V2-2019': 2}, 'FR': {'ANSSI-CC-2020/08': 19}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0099-2017': 1, 'BSI-PP-0084-2014': 1}, 'ANSSI': {'ANSSI-CC-PP-0099-2017': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 2, 'EAL2': 2, 'EAL6': 1, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 4, 'AGD_PRE': 5, 'AGD_ALP': 3}, 'ALC': {'ALC_DVS.2': 2, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 4, 'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies AG': 1, 'Infineon': 2}, 'Idemia': {'IDEMIA': 38}}, 'eval_facility': {'Serma': {'SERMA': 11}, 'CESTI': {'CESTI': 1}, 'CEA-LETI': {'CEA - LETI': 1, 'CEA-LETI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to anssi-cc-2020_08fr.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['CEA'].
    • The cert_id property was set to ANSSI-CC-2020/08.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/61', 'ANSSI-CC-2020/60', 'ANSSI-CC-2020/64', 'ANSSI-CC-2020/62', 'ANSSI-CC-2020/63']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/61', 'ANSSI-CC-2020/60', 'ANSSI-CC-2020/64', 'ANSSI-CC-2020/62', 'ANSSI-CC-2020/63']}} data.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_08fr.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_08en.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/64', 'ANSSI-CC-2020/62', 'ANSSI-CC-2020/61']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/61-S01']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/64', 'ANSSI-CC-2020/62', 'ANSSI-CC-2020/61']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/61-S01']}}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/62', 'ANSSI-CC-2020/61']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/62', 'ANSSI-CC-2020/61']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012']}}} data.
    • The scheme_data property was set to {'product': 'Plateforme ID-One Cosmo V9.2 masquée sur le composant IFX SLC52', 'url': 'https://cyber.gouv.fr/produits-certifies/plateforme-id-one-cosmo-v92-masquee-sur-le-composant-ifx-slc52', 'description': 'Le produit évalué est la « Plateforme ID-One Cosmo V9.2 masquée sur le composant IFX SLC52, Identification du matériel 093772 ». Elle est développée par IDEMIA et embarquée sur le microcontrôleur développé et fabriqué par INFINEON TECHNOLOGIES AG.\n\nCe produit est une plateforme ouverte Java Card conforme à la spécification émise par Global Platform, contact et/ou sans contact, destinée à accueil', 'sponsor': 'IDEMIA, INFINEON TECHNOLOGIES AG', 'developer': 'IDEMIA, INFINEON TECHNOLOGIES AG', 'cert_id': '2020/08', 'level': 'EAL5+', 'expiration_date': '28 Mars 2027', 'enhanced': {'cert_id': '2020/08', 'certification_date': '09/04/2020', 'expiration_date': '28/03/2027', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'IDEMIA, INFINEON TECHNOLOGIES AG', 'sponsor': 'IDEMIA, INFINEON TECHNOLOGIES AG', 'evaluation_facility': 'CEA - LETI', 'level': 'EAL5+', 'protection_profile': 'Java Card Protection Profile Open Configuration, version 3.0.5 (BSI-CC-PP-0099-2017)', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cc-2020_08fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cible-cc-2020_08-m03en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/certificat-cc-2020_08-s01.pdf'}}.
  • 31.07.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Plateforme ID-One Cosmo V9.2 masquée sur le composant IFX SLC52 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2020_08-s01.pdf",
  "dgst": "0a62fff3a0f81bf2",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2020/08",
    "cert_lab": [
      "CEA"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "9.2"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2020/60",
          "ANSSI-CC-2020/61",
          "ANSSI-CC-2020/64",
          "ANSSI-CC-2020/63",
          "ANSSI-CC-2020/62"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1110-V2-2019"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2020/60",
          "ANSSI-CC-2020/61",
          "ANSSI-CC-2020/64",
          "ANSSI-CC-2020/63",
          "ANSSI-CC-2020/62"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0891-2015",
          "BSI-DSZ-CC-0945-2017",
          "BSI-DSZ-CC-1110-2019",
          "BSI-DSZ-CC-0891-V2-2016",
          "BSI-DSZ-CC-0782-2012",
          "BSI-DSZ-CC-0945-V3-2018",
          "BSI-DSZ-CC-1110-V2-2019",
          "BSI-DSZ-CC-0945-V2-2018"
        ]
      }
    },
    "scheme_data": {
      "cert_id": "ANSSI-CC-2020/08",
      "description": "Le produit \u00e9valu\u00e9 est la \u00ab Plateforme ID-One Cosmo V9.2 masqu\u00e9e sur le composant IFX SLC52, Identification du mat\u00e9riel 093772 \u00bb. Elle est d\u00e9velopp\u00e9e par IDEMIA et embarqu\u00e9e sur le microcontr\u00f4leur d\u00e9velopp\u00e9 et fabriqu\u00e9 par INFINEON TECHNOLOGIES AG. Ce produit est une plateforme ouverte Java Card conforme \u00e0 la sp\u00e9cification \u00e9mise par Global Platform, contact et/ou sans contact, destin\u00e9e \u00e0 accueil",
      "developer": "IDEMIA, INFINEON TECHNOLOGIES AG",
      "enhanced": {
        "augmented": "ALC_DVS.2, AVA_VAN.5",
        "category": "Cartes \u00e0 puce",
        "cc_version": "Crit\u00e8res Communs version 3.1r5",
        "cert_id": "ANSSI-CC-2020/08",
        "cert_link": "https://cyber.gouv.fr/sites/default/files/2020/04/certificat-cc-2020_08-s01.pdf",
        "certification_date": "2020-04-09",
        "developer": "IDEMIA, INFINEON TECHNOLOGIES AG",
        "evaluation_facility": "CEA - LETI",
        "expiration_date": "2027-03-28",
        "level": "EAL5+",
        "mutual_recognition": "SOG-IS CCRA",
        "protection_profile": "Java Card Protection Profile Open Configuration, version 3.0.5 (BSI-CC-PP-0099-2017)",
        "report_link": "https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cc-2020_08fr.pdf",
        "sponsor": "IDEMIA, INFINEON TECHNOLOGIES AG",
        "target_link": "https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cible-cc-2020_08-m03en.pdf"
      },
      "expiration_date": "2027-03-28",
      "level": "EAL5+",
      "product": "Plateforme ID-One Cosmo V9.2 masqu\u00e9e sur le composant IFX SLC52",
      "sponsor": "IDEMIA, INFINEON TECHNOLOGIES AG",
      "url": "https://cyber.gouv.fr/produits-certifies/plateforme-id-one-cosmo-v92-masquee-sur-le-composant-ifx-slc52"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2020/60",
          "ANSSI-CC-2020/61",
          "ANSSI-CC-2020/64",
          "ANSSI-CC-2020/63",
          "ANSSI-CC-2020/62"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1110-V2-2019"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2020/60",
          "ANSSI-CC-2020/61",
          "ANSSI-CC-2020/64",
          "ANSSI-CC-2020/63",
          "ANSSI-CC-2020/62"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1110-V2-2019"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2022-03-28",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_08-s01fr.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "Reassessment report: ANSSI-CC-2020/08-S01"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2021-01-28",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_08-m02.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "ANSSI-CC-2020/08-M02"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2020-07-30",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_08-m01.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "ANSSI-CC-2020/08-M01"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2021-06-04",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_08-m03.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "ANSSI-CC-2020/08-M03"
      }
    ]
  },
  "manufacturer": "Idemia",
  "manufacturer_web": "https://www.idemia.com",
  "name": "Plateforme ID-One Cosmo V9.2 masqu\u00e9e sur le composant IFX SLC52",
  "not_valid_after": "2027-03-28",
  "not_valid_before": "2020-04-09",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "certificat-cc-2020_08-s01.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2020/08-S01": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL5": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA-LETI": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 2
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "G\u00e9raldine Avou\u00e9",
      "/Category": "-S01",
      "/Comments": "ANSSI-CC-CER-F-14_v14.6",
      "/Company": "SGDSN",
      "/CreationDate": "D:20220404173831+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 11 pour Word",
      "/ModDate": "D:20220404173831+02\u002700\u0027",
      "/Producer": "Adobe PDF Library 11.0",
      "/SourceModified": "D:20220404153821",
      "/Title": "ANSSI-CC-2020/08",
      "pdf_file_size_bytes": 100160,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "anssi-cc-2020_08fr.pdf",
    "report_frontpage": {
      "FR": {
        "cc_security_level": "EAL 5 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
        "cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 5",
        "cert_id": "ANSSI-CC-2020/08",
        "cert_item": "Plateforme ID-One Cosmo V9.2 masqu\u00e9e sur le composant IFX SLC52",
        "cert_item_version": "Identification du mat\u00e9riel : 093772",
        "cert_lab": "CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France",
        "developer": "IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France Infineon Technologies AG AIM CC SM PS \u2013 Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France",
        "match_rules": [
          "R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
        ],
        "ref_protection_profiles": "Java Card Protection Profile Open Configuration, version 3.0.5 certifi\u00e9 BSI-CC-PP-0099-2017 le 21 d\u00e9cembre 2017"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1110-V2-2019": 2
        },
        "FR": {
          "ANSSI-CC-2020/08": 19,
          "ANSSI-CC-PP-0099-2017": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-0099-2017": 1
        },
        "BSI": {
          "BSI-CC-PP-0099-2017": 1,
          "BSI-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_FSP": 1,
          "ADV_IMP": 1,
          "ADV_INT": 1,
          "ADV_SPM": 1,
          "ADV_TDS": 1
        },
        "AGD": {
          "AGD_ALP": 3,
          "AGD_OPE": 4,
          "AGD_PRE": 5
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1,
          "ALC_DEL": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 2,
          "ALC_FLR": 2,
          "ALC_TAT": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.5": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 1,
          "EAL 5": 2,
          "EAL 7": 1,
          "EAL2": 2,
          "EAL6": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA - LETI": 1,
          "CEA-LETI": 1
        },
        "CESTI": {
          "CESTI": 1
        },
        "Serma": {
          "SERMA": 11
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 38
        },
        "Infineon": {
          "Infineon": 2,
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "G\u00e9raldine Avou\u00e9",
      "/CreationDate": "D:20200409151819+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "ANSSI-CC-CER-F-07, v29.2",
      "/Producer": "LibreOffice 4.4",
      "/Subject": "Plateforme ID-One Cosmo V9.2 masqu\u00e9e sur le composant IFX SLC52",
      "/Title": "ANSSI-CC-2020/08",
      "pdf_file_size_bytes": 279179,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "file:///h"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 18
    },
    "st_filename": "anssi-cible-cc-2020_08en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 4
          },
          "ECDH": {
            "ECDH": 3
          },
          "ECDSA": {
            "ECDSA": 4
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 4
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1110-V2-2019": 2
        }
      },
      "cc_claims": {
        "A": {
          "A.APPLET": 4,
          "A.DELETION": 3,
          "A.VERIFICATION": 5
        },
        "D": {
          "D.API_DATA": 3,
          "D.APP_CODE": 6,
          "D.APP_C_DATA": 3,
          "D.APP_I_DATA": 4,
          "D.ARRAY": 3,
          "D.CONFIG": 4,
          "D.CRYPTO": 5,
          "D.JCS_CODE": 3,
          "D.JCS_DATA": 5,
          "D.JCS_KEYS": 7,
          "D.NB_REMAINTRYGLB": 1,
          "D.PIN": 7,
          "D.SEC_DATA": 7,
          "D.SENSITIVE_DATA": 5
        },
        "O": {
          "O.ALARM": 23,
          "O.APPLET": 16,
          "O.CARD_MANAGEMENT": 66,
          "O.CIPHER": 16,
          "O.CODE_PKG": 22,
          "O.DELETION": 14,
          "O.FIREWALL": 64,
          "O.GLOBAL_ARRAYS_CONFID": 14,
          "O.GLOBAL_ARRAYS_INTEG": 10,
          "O.INSTALL": 17,
          "O.JAVAOBJECT": 55,
          "O.KEY-MNGT": 26,
          "O.LOAD": 20,
          "O.NATIVE": 16,
          "O.OBJ-": 1,
          "O.OBJ-DELETION": 8,
          "O.OPERATE": 39,
          "O.PATCH_LOADING": 25,
          "O.PIN-": 2,
          "O.PIN-MNGT": 26,
          "O.REALLOCATION": 18,
          "O.RESIDENT_APPLICATION": 24,
          "O.RESOURCES": 23,
          "O.RNG": 11,
          "O.SCP": 60,
          "O.SECURE_COMPARE": 8,
          "O.SID": 34,
          "O.TRANSACTION": 19
        },
        "OE": {
          "OE.APPLET": 9,
          "OE.CARD-": 1,
          "OE.CARD_MANAGEMENT": 3,
          "OE.CODE-": 1,
          "OE.CODE-EVIDENCE": 20,
          "OE.SCP": 9,
          "OE.VERIFICATION": 38
        },
        "OP": {
          "OP.ARRAY_AASTORE": 3,
          "OP.ARRAY_ACCESS": 9,
          "OP.ARRAY_LENGTH": 3,
          "OP.CREATE": 7,
          "OP.DELETE_APPLET": 4,
          "OP.DELETE_PCKG": 3,
          "OP.DELETE_PCKG_APPLET": 3,
          "OP.FLOW": 3,
          "OP.IMPORT_KEY": 2,
          "OP.INSTANCE_FIELD": 5,
          "OP.INVK_INTERFACE": 7,
          "OP.INVK_VIRTUAL": 6,
          "OP.JAVA": 5,
          "OP.LOCAL_STACK_ACCESS": 3,
          "OP.NATIVE": 1,
          "OP.NATIVE_ACCESS": 5,
          "OP.NATIVE_INTERFACE_CALL": 4,
          "OP.OPERAND_STACK_ACCESS": 3,
          "OP.PUT": 6,
          "OP.PUTFIELD": 1,
          "OP.PUTSTATIC": 1,
          "OP.STATIC_FIELD": 3,
          "OP.THROW": 5,
          "OP.TYPE_ACCESS": 5
        },
        "OSP": {
          "OSP.VERIFICATION": 6
        },
        "R": {
          "R.JAVA": 10
        },
        "T": {
          "T.CONFID-APPLI-DATA": 18,
          "T.CONFID-JCS-CODE": 7,
          "T.CONFID-JCS-DATA": 11,
          "T.CONFIGURATION": 4,
          "T.CONF_DATA_APPLET": 4,
          "T.DELETION": 6,
          "T.EXE-": 1,
          "T.EXE-CODE": 8,
          "T.INSTALL": 6,
          "T.INTEG-": 2,
          "T.INTEG-APPLI-": 5,
          "T.INTEG-APPLI-CODE": 12,
          "T.INTEG-APPLI-DATA": 21,
          "T.INTEG-JCS-CODE": 7,
          "T.INTEG-JCS-DATA": 12,
          "T.NATIVE": 7,
          "T.OBJ-DELETION": 4,
          "T.PATCH_LOADING": 4,
          "T.PHYSICAL": 4,
          "T.RESOURCES": 8,
          "T.SID": 18
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 6,
          "ADV_FSP.1": 3,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 2,
          "ADV_FSP.5": 8,
          "ADV_IMP.1": 9,
          "ADV_INT.2": 1,
          "ADV_TDS.1": 2,
          "ADV_TDS.3": 4,
          "ADV_TDS.4": 8
        },
        "AGD": {
          "AGD_OPE": 2,
          "AGD_OPE.1": 8,
          "AGD_PRE": 7,
          "AGD_PRE.1": 6
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.5": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS": 1,
          "ALC_DVS.1": 2,
          "ALC_DVS.2": 13,
          "ALC_LCD.1": 3,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 3
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 5,
          "ASE_OBJ.2": 3,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 3,
          "ATE_DPT.1": 2,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 6
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 15
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 1,
          "EAL4 augmented": 1,
          "EAL5": 9,
          "EAL5 augmented": 5,
          "EAL5+": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 20,
          "FAU_ARP.1.1": 1,
          "FAU_GEN": 1,
          "FAU_GEN.1": 2,
          "FAU_SAA.1": 3,
          "FAU_STG.2": 9,
          "FAU_STG.2.1": 1,
          "FAU_STG.2.2": 1,
          "FAU_STG.2.3": 1
        },
        "FCO": {
          "FCO_NRO": 16,
          "FCO_NRO.2": 8
        },
        "FCS": {
          "FCS_CKM": 22,
          "FCS_CKM.1": 20,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.4": 19,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 27,
          "FCS_COP.1": 15,
          "FCS_COP.1.1": 1,
          "FCS_RNG": 3,
          "FCS_RNG.1": 10,
          "FCS_RNG.1.1": 2,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC": 83,
          "FDP_ACC.1": 26,
          "FDP_ACC.2": 15,
          "FDP_ACF": 69,
          "FDP_ACF.1": 39,
          "FDP_IFC": 28,
          "FDP_IFC.1": 22,
          "FDP_IFC.2": 2,
          "FDP_IFF": 22,
          "FDP_IFF.1": 16,
          "FDP_ITC": 26,
          "FDP_ITC.1": 8,
          "FDP_ITC.2": 14,
          "FDP_RIP": 131,
          "FDP_RIP.1": 11,
          "FDP_ROL": 16,
          "FDP_ROL.1": 6,
          "FDP_SDI": 11,
          "FDP_SDI.2": 2,
          "FDP_UCT": 10,
          "FDP_UCT.1": 1,
          "FDP_UIT": 17,
          "FDP_UIT.1": 4
        },
        "FIA": {
          "FIA_AFL": 35,
          "FIA_AFL.1": 8,
          "FIA_ATD": 10,
          "FIA_ATD.1": 2,
          "FIA_UAU": 56,
          "FIA_UAU.1": 12,
          "FIA_UAU.4": 2,
          "FIA_UAU.7": 2,
          "FIA_UID": 31,
          "FIA_UID.1": 16,
          "FIA_UID.2": 1,
          "FIA_USB": 9,
          "FIA_USB.1": 3
        },
        "FMT": {
          "FMT_MOF": 7,
          "FMT_MOF.1": 1,
          "FMT_MSA": 207,
          "FMT_MSA.1": 22,
          "FMT_MSA.2": 5,
          "FMT_MSA.3": 30,
          "FMT_MTD": 39,
          "FMT_MTD.1": 4,
          "FMT_MTD.2": 2,
          "FMT_MTD.3": 1,
          "FMT_SMF": 69,
          "FMT_SMF.1": 32,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 61,
          "FMT_SMR.1": 60,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1,
          "FMT_SMR.2": 6
        },
        "FPR": {
          "FPR_UNO": 16,
          "FPR_UNO.1": 13,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_FLS": 45,
          "FPT_FLS.1": 18,
          "FPT_FLS.1.1": 2,
          "FPT_PHP": 7,
          "FPT_PHP.3": 1,
          "FPT_RCV": 26,
          "FPT_RCV.3": 7,
          "FPT_RCV.4": 1,
          "FPT_TDC": 9,
          "FPT_TDC.1": 11,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 1,
          "FPT_TST": 1,
          "FPT_TST.1": 11,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FRU": {
          "FRU_FLT": 7,
          "FRU_FLT.1": 1
        },
        "FTP": {
          "FTP_ITC": 16,
          "FTP_ITC.1": 7,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {
        "OutOfScope": {
          "a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "ECB": {
          "ECB": 5
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 1
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 2,
          "Key agreement": 1
        },
        "MAC": {
          "MAC": 4
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA-LETI": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 4
          },
          "SHA2": {
            "SHA-2": 1,
            "SHA-224": 4,
            "SHA-256": 5,
            "SHA-384": 4,
            "SHA-512": 3,
            "SHA256": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "misc": {
          "TYPE_ACCESS": 5
        }
      },
      "javacard_packages": {
        "com": {
          "com.oberthurcs.javacard": 2,
          "com.oberthurcs.javacard.sac.sac": 1
        },
        "javacard": {
          "javacard.framework": 4,
          "javacard.sac.sac": 1,
          "javacard.security": 3
        },
        "javacardx": {
          "javacardx.crypto": 2,
          "javacardx.framework.util": 1,
          "javacardx.security": 1
        }
      },
      "javacard_version": {
        "JavaCard": {
          "Java Card 3.0.5": 7
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 24
        }
      },
      "side_channel_analysis": {
        "FI": {
          "fault injection": 1,
          "malfunction": 2,
          "physical tampering": 2
        },
        "SCA": {
          "DPA": 2,
          "SPA": 1,
          "physical probing": 4,
          "timing attack": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 1
        },
        "FIPS": {
          "FIPS 140-2": 1,
          "FIPS 198": 1,
          "FIPS PUB 180-3": 2,
          "FIPS PUB 197": 6,
          "FIPS PUB 46-3": 3,
          "FIPS PUB 81": 8
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 7816": 2,
          "ISO/IEC 9796-1": 2,
          "ISO/IEC 9797": 12,
          "ISO/IEC 9797-1": 1
        },
        "NIST": {
          "NIST SP 800-90": 1
        },
        "PKCS": {
          "PKCS#1": 2
        },
        "SCP": {
          "SCP02": 4,
          "SCP03": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 22
          }
        },
        "DES": {
          "3DES": {
            "TDES": 12,
            "Triple-DES": 2
          },
          "DES": {
            "DES": 12
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 4,
            "HMAC": 3
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 26
        },
        "Infineon": {
          "Infineon": 8,
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "[email protected]",
      "/CreationDate": "D:20200319152951+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20200319152951+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Title": "Title",
      "pdf_file_size_bytes": 2801052,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 158
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "PDCP_V1.3"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf",
        "pp_name": "Java Card\u2122 System Protection Profile Open Configuration, Version 2.6"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_08fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_DVS.2",
      "AVA_VAN.5",
      "EAL5+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_08en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "5c8f30d0b1f3c365e5e58c2fb759f3bd05e0782d1e7ff5681f54b661b6163ce3",
      "txt_hash": "8a3af30176c13dad9154a6f0dbc6a1ec0944b1963b13b5b44f3d18a44cae5282"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "24e271ddd6279749fa2efffdc332fa0d80f171d25feea51243c31d85f8de2e93",
      "txt_hash": "d52196a8edc2eee52b0d265d195f0b0d9d647ea4753fdc966da778a53785e18e"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "a403f4e878e064db1508bf855a4819ca19e989b5e1d0c4530c274125b8e5b3b8",
      "txt_hash": "0fe07f559c2ca772734f258e08d995f798fc296ff19e0f74ee333921976de19f"
    }
  },
  "status": "active"
}