MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip

CSV information ?

Status active
Valid from 17.11.2020
Valid until 17.11.2025
Scheme 🇫🇷 FR
Manufacturer Thales
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, ALC_DVS.2, EAL5+

Heuristics summary ?

Certificate ID: ANSSI-CC-2020/42

Certificate ?

Extracted keywords

Security level
EAL5, EAL2
Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5
Certificates
ANSSI-CC-2020/42
Evaluation facilities
SERMA

File metadata

Creation date D:20201123113304+01'00'
Modification date D:20201123113304+01'00'
Pages 2
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 11.0 (Windows)

Certification report ?

Extracted keywords

Symmetric Algorithms
DES
Hash functions
SHA-2
Protocols
PACE

JavaCard versions
Java Card 3.0.4
Vendor
Infineon, Gemalto, Microsoft

Security level
EAL 5, EAL2, EAL6, EAL7, EAL 1, EAL 3, EAL 7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR.1, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Protection profiles
BSI-PP-0084-2014, ANSSI-CC-PP-
Certificates
BSI-DSZ-CC-0891-, BSI-DSZ-CC-0891-V4-2019, ANSSI-CC-2020/42, ANSSI-CC-2017/76, ANSSI-CC-2017/76-S01
Evaluation facilities
SERMA

Standards
AIS 31, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Creation date D:20201123113236+01'00'
Modification date D:20201123113236+01'00'
Pages 23
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 11.0 (Windows)

References

Outgoing
  • BSI-DSZ-CC-0891-V4-2019 - active - Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware and optional software
  • ANSSI-CC-2017/76 - active - Plateforme JavaCard MultiApp V4.0.1 - PACE en configuration ouverte masquĂ©e sur le composant M7892 G12
Incoming
  • ANSSI-CC-2020/49 - active - Digital Identity on MultiApp v4.0.1 platform with Filter Set 1.0 – PACE, EAC (version 1.0)
  • ANSSI-CC-2020/45 - active - eTravel v2.2 EAC/SAC on MultiApp v4.0.1 platform with Filter Set 1.0 version 1.0
  • ANSSI-CC-2020/43 - active - eTravel v2.2 BAC on MultiApp platform v4.0.1 with Filter Set 1.0 Version 1.0
  • ANSSI-CC-2020/44 - active - eTravel v2.2 EAC/BAC on MultiApp v4.0.1 platform with Filter Set 1.0 version 1.0

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDEA, 3DES, TDES, Triple-DES, HMAC, KMAC, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DH
Hash functions
SHA1, SHA-1, SHA-224, SHA-256, SHA-512, SHA224, SHA-384
Schemes
MAC, Key Agreement, Key agreement
Protocols
PACE
Randomness
PRNG, RNG, RND
Block cipher modes
ECB, CBC

JavaCard versions
Java Card 2.2.2, Java Card 3.0.4
JavaCard API constants
ALG_AES_CMAC_128, TYPE_ACCESS
CPLC
IC Fabricator, IC Type
IC data groups
EF.DG1, EF.DG16, EF.DG3, EF.DG4, EF.SOD
Vendor
Infineon, Gemalto, Thales

Security level
EAL5+, EAL6, EAL6+, EAL5, EAL 6+, EAL6 augmented, EAL5 augmented
Claims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.SCP, O.CARD-MANAGEMENT, O.RND, O.KEY_MNGT, O.CARD_MANAGEMENT, O.APPLET, O.CODE_PKG, O.JAVAOBJECT, O.CODE_PCKG, O.GLOBAL_ARRAYS_CO, O.GLOBAL_ARRAYS_INT, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, T.WRONG_SERVICE_DEPLOYEMENT_STATE, T.CONFID_INTEG_SERVICE_DEPLOYEMENT, A.APPLET, A.DELETION, A.VERIFICATION, R.JAVA, OT.X, OP.ARRAY_ACCESS, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUT, OE.VERIFICATION, OE.APPLET, OE.CODE-EVIDENCE, OSP.VERIFICATION, OSP.RND, OSP.ATOMIC_ACTIVATION, OSP.TOE_IDENTIFICATION
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_TDS.1, ADV_TDS.4, ADV_IMP.1, ADV_TDS.3, ADV_INT.2, ADV_FSP.5, ADV_FSP.1, ADV_FSP.2, ADV_FSP.4, ADV_ARC, ADV_FSP, ADV_IMP, ADV_TDS, AGD_PRE, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_DVS.1, ALC_LCD.1, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_IND.2, ATE_DPT.1, ATE_DPT.3, AVA_VAN.5
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FCO_NRO, FCO_NRO.2, FCS_RND, FCS_CKM, FCS_COP, FCS_RND.1, FCS_CKM.1, FCS_RND.1.1, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.2.1, FCS_CKM.3, FCS_CKM.3.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_COP.1.1, FDP_ACF, FDP_ACC, FDP_ACC.2, FDP_ACF.1, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ROL, FDP_ROL.1, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FDP_ACC.1, FDP_ITC.1, FDP_RIP.1.1, FIA_AFL, FIA_SOS.2, FIA_ATD, FIA_ATD.1, FIA_UID, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_UAU, FIA_UAI.1, FIA_UAU.1, FIA_UID.1, FIA_UAU.4, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMR, FMT_SMR.1, FMT_SMF, FMT_SMF.1, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPR_UNO.1, FPR_UNO.1.1, FPR_UNO, FPT_EMS, FPT_TST, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS, FPT_FLS.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_RCV, FPT_RCV.3, FPT_TST.1, FPT_PHP, FPT_PHP.3, FPT_RCV.4, FPT_ITT, FPT_ITT.1, FPT_FLS.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3.1, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP, FTP_TRP.1
Protection profiles
BSI-CC-PP-0084-, BSI-CC-PP- 0068-V2-2011-MA-01, BSI-CC-PP- 0056-V2-2012, BSI-PP- 0055-2009
Certificates
BSI-DSZ-CC-0891-V4-2019, ANSSI-PP-2010/03-M01, CC-1, CC-2, CC-3
Evaluation facilities
Serma Safety & Security

Side-channel analysis
physical probing, DPA, SPA, timing attacks, physical tampering, Physical Tampering, malfunction, Malfunction, fault induction
Certification process
out of scope, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are

Standards
FIPS180-2, FIPS197, FIPS 46-3, FIPS 197, SP 800-67, PKCS#3, PKCS#1, PKCS#5, AIS31, ICAO, SCP03, SCP01, SCP02, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title eTravel v1.0 Security Target MAĂŹA3
Subject Security Target
Keywords Security Target, CC
Author Antoine de Lavernette
Creation date D:20201002150308+02'00'
Modification date D:20201002150308+02'00'
Pages 121
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

References

Outgoing
  • BSI-DSZ-CC-0891-V4-2019 - active - Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware and optional software

Heuristics ?

Certificate ID: ANSSI-CC-2020/42

Extracted SARs

ATE_COV.2, AGD_OPE.1, ADV_ARC.1, ALC_DEL.1, ADV_FSP.5, AGD_PRE.1, ALC_CMC.4, ALC_LCD.1, ALC_DVS.2, ATE_DPT.3, ALC_FLR.1, ADV_INT.2, ADV_IMP.1, AVA_VAN.5, ATE_FUN.1, ATE_IND.2, ALC_TAT.2, ADV_TDS.4

Scheme data ?

Product MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip
Url https://cyber.gouv.fr/produits-certifies/multiapp-v401-filter-set-10-java-card-open-platform-m7892-g12-chip
Description Le produit évalué est « MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip » développé par les sociétés THALES DIS et INFINEON TECHNOLOGIES AG. Le produit est délivré en deux configurations issues du composant SLE78xx (microcontrôleur M7892 G12 FLASH) : avec une capacité RF de 56 pF (SLE78CLFX4007PHM, IC type 7879) ; avec une capacité RF de 27 pF (SLE78CLFX400VPH
Sponsor THALES DIS
Developer THALES DIS
Cert Id ANSSI-CC-2020/42
Level EAL5+
Expiration Date 17.11.2025
Enhanced
Cert Id ANSSI-CC-2020/42
Certification Date 17.11.2020
Expiration Date 17.11.2025
Category Cartes Ă  puce
Cc Version Critères Communs version 3.1r5
Developer THALES DIS
Sponsor THALES DIS
Evaluation Facility SERMA SAFETY & SECURITY
Level EAL5+
Protection Profile Java Card Platform Protection Profile – Open configuration, version 3.0
Mutual Recognition CCRA SOG-IS
Augmented ALC_DVS.2, AVA_VAN.5
Report Link https://cyber.gouv.fr/sites/default/files/2020/11/anssi-cc-2020_42fr.pdf
Target Link https://cyber.gouv.fr/sites/default/files/2020/11/anssi-cible-cc-2020_42en.pdf

References ?

Updates ?

  • 09.11.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The st_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'FR': {'ANSSI-PP-2010/03-M01': 1}}}} data.

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'description': 'Le produit Ă©valuĂ© est « MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip » dĂ©veloppĂ© par les sociĂ©tĂ©s THALES DIS et INFINEON TECHNOLOGIES AG. Le produit est dĂ©livrĂ© en deux configurations issues du composant SLE78xx (microcontrĂ´leur M7892 G12 FLASH) : avec une capacitĂ© RF de 56 pF (SLE78CLFX4007PHM, IC type 7879) ; avec une capacitĂ© RF de 27 pF (SLE78CLFX400VPH', 'cert_id': 'ANSSI-CC-2020/42', 'expiration_date': '2025-11-17', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2020/42', 'certification_date': '2020-11-17', 'expiration_date': '2025-11-17', 'mutual_recognition': 'CCRA SOG-IS'}}} data.
  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Protection Profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card Protection Profile - Open Configuration', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0099b_pdf.pdf', 'pp_ids': None}]}.
  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip', 'url': 'https://cyber.gouv.fr/produits-certifies/multiapp-v401-filter-set-10-java-card-open-platform-m7892-g12-chip', 'description': 'Le produit Ă©valuĂ© est « MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip » dĂ©veloppĂ© par les sociĂ©tĂ©s THALES DIS et INFINEON TECHNOLOGIES AG. Le produit est dĂ©livrĂ© en deux configurations issues du composant SLE78xx (microcontrĂ´leur M7892 G12 FLASH) :\n\n\n\tavec une capacitĂ© RF de 56 pF (SLE78CLFX4007PHM, IC type 7879) ;\n\tavec une capacitĂ© RF de 27 pF (SLE78CLFX400VPH', 'sponsor': 'THALES DIS', 'developer': 'THALES DIS', 'cert_id': '2020/42', 'level': 'EAL5+', 'expiration_date': '17 Novembre 2025', 'enhanced': {'cert_id': '2020/42', 'certification_date': '17/11/2020', 'expiration_date': '17/11/2025', 'category': 'Cartes Ă  puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'THALES DIS', 'sponsor': 'THALES DIS', 'evaluation_facility': 'SERMA SAFETY & SECURITY', 'level': 'EAL5+', 'protection_profile': 'Java Card Platform Protection Profile – Open configuration, version 3.0', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/11/anssi-cc-2020_42fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/11/anssi-cible-cc-2020_42en.pdf'}}.
  • 02.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'a824303b4038d8918cbb1535b6784d2e4fba1a11664f5950fa12eaf6241e0dd3', 'txt_hash': '07d111ac9ff2a4e7b2f76d2f764548759cb53fd3b4896c785d1d969ba7dad81e'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'a3fda5d9fae51b33e01e012d73523aaa60065f574bb99fb530f6af8c23ccc944', 'txt_hash': '7555e7feaa1adfc37b71ad9a6002206fd7d9dab675f79babeaf3776b16e01bb7'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 3105886, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 121, '/Title': 'eTravel v1.0 Security Target MAĂŹA3', '/Author': 'Antoine de Lavernette', '/Subject': 'Security Target', '/Keywords': 'Security Target, CC', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20201002150308+02'00'", '/ModDate': "D:20201002150308+02'00'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 267425, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Author': '', '/CreationDate': "D:20201123113304+01'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20201123113304+01'00'", '/Producer': 'Acrobat Distiller 11.0 (Windows)', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0891-V4-2019': 1}, 'NL': {'CC-1': 2, 'CC-2': 3, 'CC-3': 3}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-': 1, 'BSI-CC-PP- 0068-V2-2011-MA-01': 1, 'BSI-CC-PP- 0056-V2-2012': 1, 'BSI-PP- 0055-2009': 1}}, 'cc_security_level': {'EAL': {'EAL5+': 2, 'EAL6': 1, 'EAL6+': 1, 'EAL5': 6, 'EAL 6+': 1, 'EAL6 augmented': 1, 'EAL5 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 9, 'ADV_TDS.1': 2, 'ADV_TDS.4': 7, 'ADV_IMP.1': 7, 'ADV_TDS.3': 4, 'ADV_INT.2': 1, 'ADV_FSP.5': 4, 'ADV_FSP.1': 1, 'ADV_FSP.2': 2, 'ADV_FSP.4': 2, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_PRE': 1, 'AGD_OPE': 1, 'AGD_OPE.1': 7, 'AGD_PRE.1': 6}, 'ALC': {'ALC_DVS.2': 7, 'ALC_TAT.1': 2, 'ALC_TAT.2': 3, 'ALC_CMC.4': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 3, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.2': 2, 'ATE_FUN.1': 6, 'ATE_COV.1': 2, 'ATE_IND.2': 1, 'ATE_DPT.1': 2, 'ATE_DPT.3': 1}, 'AVA': {'AVA_VAN.5': 7}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 13, 'FAU_ARP.1.1': 1, 'FAU_SAA.1': 2}, 'FCO': {'FCO_NRO': 5, 'FCO_NRO.2': 3}, 'FCS': {'FCS_RND': 14, 'FCS_CKM': 43, 'FCS_COP': 28, 'FCS_RND.1': 10, 'FCS_CKM.1': 27, 'FCS_RND.1.1': 3, 'FCS_CKM.1.1': 3, 'FCS_CKM.2': 10, 'FCS_CKM.2.1': 1, 'FCS_CKM.3': 5, 'FCS_CKM.3.1': 1, 'FCS_CKM.4': 25, 'FCS_CKM.4.1': 2, 'FCS_COP.1': 24, 'FCS_COP.1.1': 4}, 'FDP': {'FDP_ACF': 35, 'FDP_ACC': 41, 'FDP_ACC.2': 6, 'FDP_ACF.1': 21, 'FDP_IFC': 20, 'FDP_IFC.1': 12, 'FDP_IFF': 13, 'FDP_IFF.1': 12, 'FDP_RIP': 77, 'FDP_RIP.1': 10, 'FDP_ROL': 12, 'FDP_ROL.1': 2, 'FDP_SDI.2': 6, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITC': 10, 'FDP_ITC.2': 17, 'FDP_IFC.2': 2, 'FDP_UIT': 5, 'FDP_UIT.1': 2, 'FDP_ACC.1': 16, 'FDP_ITC.1': 12, 'FDP_RIP.1.1': 1}, 'FIA': {'FIA_AFL': 21, 'FIA_SOS.2': 1, 'FIA_ATD': 11, 'FIA_ATD.1': 3, 'FIA_UID': 32, 'FIA_UID.2': 1, 'FIA_USB': 6, 'FIA_USB.1': 3, 'FIA_UAU': 53, 'FIA_UAI.1': 1, 'FIA_UAU.1': 5, 'FIA_UID.1': 19, 'FIA_UAU.4': 1, 'FIA_AFL.1.1': 2, 'FIA_AFL.1.2': 2, 'FIA_UID.1.1': 2, 'FIA_UID.1.2': 2, 'FIA_UAU.1.1': 2, 'FIA_UAU.1.2': 2, 'FIA_UAU.4.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6.1': 1}, 'FMT': {'FMT_LIM': 18, 'FMT_LIM.1': 15, 'FMT_LIM.2': 14, 'FMT_LIM.1.1': 3, 'FMT_LIM.2.1': 3, 'FMT_MSA': 76, 'FMT_MSA.1': 12, 'FMT_MSA.2': 1, 'FMT_MSA.3': 18, 'FMT_SMR': 69, 'FMT_SMR.1': 30, 'FMT_SMF': 56, 'FMT_SMF.1': 18, 'FMT_MTD': 31, 'FMT_MTD.1': 9, 'FMT_MTD.3': 1, 'FMT_SMF.1.1': 2, 'FMT_SMR.1.1': 2, 'FMT_SMR.1.2': 2}, 'FPR': {'FPR_UNO.1': 8, 'FPR_UNO.1.1': 1, 'FPR_UNO': 5}, 'FPT': {'FPT_EMS': 4, 'FPT_TST': 7, 'FPT_EMS.1': 12, 'FPT_EMS.1.1': 3, 'FPT_EMS.1.2': 3, 'FPT_FLS': 42, 'FPT_FLS.1': 14, 'FPT_TDC.1': 7, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_RCV': 12, 'FPT_RCV.3': 4, 'FPT_TST.1': 12, 'FPT_PHP': 5, 'FPT_PHP.3': 12, 'FPT_RCV.4': 2, 'FPT_ITT': 5, 'FPT_ITT.1': 1, 'FPT_FLS.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_PHP.3.1': 1}, 'FTP': {'FTP_ITC': 14, 'FTP_ITC.1': 5, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP': 5, 'FTP_TRP.1': 5}}, 'cc_claims': {'D': {'D.APP_CODE': 6, 'D.APP_C_DATA': 3, 'D.APP_I_DATA': 4, 'D.PIN': 4, 'D.API_DATA': 3, 'D.CRYPTO': 5, 'D.JCS_CODE': 3, 'D.JCS_DATA': 5, 'D.SEC_DATA': 7}, 'O': {'O.SID': 12, 'O.FIREWALL': 11, 'O.GLOBAL_ARRAYS_CONFID': 5, 'O.GLOBAL_ARRAYS_INTEG': 4, 'O.NATIVE': 10, 'O.OPERATE': 14, 'O.REALLOCATION': 4, 'O.RESOURCES': 8, 'O.ALARM': 14, 'O.CIPHER': 10, 'O.KEY-MNGT': 5, 'O.PIN-MNGT': 5, 'O.TRANSACTION': 5, 'O.OBJ-DELETION': 3, 'O.DELETION': 7, 'O.LOAD': 5, 'O.INSTALL': 10, 'O.SCP': 27, 'O.CARD-MANAGEMENT': 3, 'O.RND': 8, 'O.KEY_MNGT': 4, 'O.CARD_MANAGEMENT': 18, 'O.APPLET': 28, 'O.CODE_PKG': 7, 'O.JAVAOBJECT': 56, 'O.CODE_PCKG': 16, 'O.GLOBAL_ARRAYS_CO': 3, 'O.GLOBAL_ARRAYS_INT': 3}, 'T': {'T.CONFID-APPLI-DATA': 3, 'T.CONFID-JCS-CODE': 3, 'T.CONFID-JCS-DATA': 3, 'T.INTEG-APPLI-CODE': 6, 'T.INTEG-APPLI-DATA': 6, 'T.INTEG-JCS-CODE': 3, 'T.INTEG-JCS-DATA': 3, 'T.SID': 6, 'T.EXE-CODE': 6, 'T.NATIVE': 3, 'T.RESOURCES': 3, 'T.DELETION': 3, 'T.INSTALL': 3, 'T.OBJ-DELETION': 3, 'T.PHYSICAL': 3, 'T.WRONG_SERVICE_DEPLOYEMENT_STATE': 3, 'T.CONFID_INTEG_SERVICE_DEPLOYEMENT': 3}, 'A': {'A.APPLET': 4, 'A.DELETION': 4, 'A.VERIFICATION': 3}, 'R': {'R.JAVA': 9}, 'OT': {'OT.X': 1}, 'OP': {'OP.ARRAY_ACCESS': 6, 'OP.CREATE': 10, 'OP.DELETE_APPLET': 6, 'OP.DELETE_PCKG': 4, 'OP.DELETE_PCKG_APPLET': 4, 'OP.INSTANCE_FIELD': 6, 'OP.INVK_VIRTUAL': 8, 'OP.INVK_INTERFACE': 10, 'OP.JAVA': 8, 'OP.THROW': 7, 'OP.TYPE_ACCESS': 7, 'OP.PUT': 7}, 'OE': {'OE.VERIFICATION': 24, 'OE.APPLET': 4, 'OE.CODE-EVIDENCE': 9}, 'OSP': {'OSP.VERIFICATION': 3, 'OSP.RND': 3, 'OSP.ATOMIC_ACTIVATION': 3, 'OSP.TOE_IDENTIFICATION': 3}}, 'vendor': {'Infineon': {'Infineon': 12}, 'Gemalto': {'Gemalto': 19}, 'Thales': {'Thales': 11}}, 'eval_facility': {'Serma': {'Serma Safety & Security': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 31}}, 'DES': {'DES': {'DES': 20}, '3DES': {'TDEA': 1, '3DES': 2, 'TDES': 14, 'Triple-DES': 3}}, 'constructions': {'MAC': {'HMAC': 3, 'KMAC': 2, 'CMAC': 3}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 8}, 'ECDSA': {'ECDSA': 4}, 'ECC': {'ECC': 9}}, 'FF': {'DH': {'Diffie-Hellman': 5, 'DH': 10}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 1, 'SHA-1': 6}, 'SHA2': {'SHA-224': 5, 'SHA-256': 6, 'SHA-512': 6, 'SHA224': 2, 'SHA-384': 4}}}, 'crypto_scheme': {'MAC': {'MAC': 14}, 'KA': {'Key Agreement': 3, 'Key agreement': 2}}, 'crypto_protocol': {'PACE': {'PACE': 156}}, 'randomness': {'PRNG': {'PRNG': 1}, 'RNG': {'RNG': 12, 'RND': 11}}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 5, 'DPA': 2, 'SPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 1, 'Physical Tampering': 3, 'malfunction': 8, 'Malfunction': 3, 'fault induction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {'ICFab': {'IC Fabricator': 2}, 'ICType': {'IC Type': 2}}, 'ic_data_group': {'EF': {'EF.DG1': 6, 'EF.DG16': 6, 'EF.DG3': 1, 'EF.DG4': 1, 'EF.SOD': 1}}, 'standard_id': {'FIPS': {'FIPS180-2': 1, 'FIPS197': 5, 'FIPS 46-3': 1, 'FIPS 197': 1}, 'NIST': {'SP 800-67': 1}, 'PKCS': {'PKCS#3': 1, 'PKCS#1': 7, 'PKCS#5': 5}, 'BSI': {'AIS31': 4}, 'ICAO': {'ICAO': 3}, 'SCP': {'SCP03': 7, 'SCP01': 4, 'SCP02': 4}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.2': 3, 'Java Card 3.0.4': 8}}, 'javacard_api_const': {'ALG': {'AES': {'ALG_AES_CMAC_128': 1}}, 'misc': {'TYPE_ACCESS': 7}}, 'javacard_packages': {'javacard': {'javacard.framework': 2}}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2020/42': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL5': 1, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Serma': {'SERMA': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to anssi-cible-cc-2020_42en.pdf.
    • The cert_filename property was set to certificat-2020_42.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V4-2019']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V3-2018', 'BSI-DSZ-CC-0891-V4-2019', 'BSI-DSZ-CC-0891-V2-2016']}} data.
    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012', 'ANSSI-CC-2017/54', 'ANSSI-CC-2017/07', 'BSI-DSZ-CC-0891-V3-2018', 'BSI-DSZ-CC-0891-V2-2016', 'BSI-DSZ-CC-0891-2015']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}]} values added.
  • 19.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V4-2019', 'ANSSI-CC-2017/76']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V4-2019', 'ANSSI-CC-2017/76']}} data.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_42fr.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_42en.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/49', 'ANSSI-CC-2020/45']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/49', 'ANSSI-CC-2020/45']}}, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The cert_metadata property was set to None.
    • The cert_keywords property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/49', 'ANSSI-CC-2020/45']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/49', 'ANSSI-CC-2020/45']}}, 'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V4-2019']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V3-2018', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0891-V4-2019']}}} data.
    • The scheme_data property was set to {'product': 'MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip', 'url': 'https://cyber.gouv.fr/produits-certifies/multiapp-v401-filter-set-10-java-card-open-platform-m7892-g12-chip', 'description': 'Le produit Ă©valuĂ© est « MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip » dĂ©veloppĂ© par les sociĂ©tĂ©s THALES DIS et INFINEON TECHNOLOGIES AG. Le produit est dĂ©livrĂ© en deux configurations issues du composant SLE78xx (microcontrĂ´leur M7892 G12 FLASH) :\n\n\n\tavec une capacitĂ© RF de 56 pF (SLE78CLFX4007PHM, IC type 7879) ;\n\tavec une capacitĂ© RF de 27 pF (SLE78CLFX400VPH', 'sponsor': 'THALES DIS', 'developer': 'THALES DIS', 'cert_id': '2020/42', 'level': 'EAL5+', 'expiration_date': '17 Novembre 2025', 'enhanced': {'cert_id': '2020/42', 'certification_date': '17/11/2020', 'expiration_date': '17/11/2025', 'category': 'Cartes Ă  puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'THALES DIS', 'sponsor': 'THALES DIS', 'evaluation_facility': 'SERMA SAFETY & SECURITY', 'level': 'EAL5+', 'protection_profile': 'Java Card Platform Protection Profile – Open configuration, version 3.0', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/11/anssi-cc-2020_42fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/11/anssi-cible-cc-2020_42en.pdf'}}.
  • 31.07.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2020_42.pdf",
  "dgst": "7ffbf604dadbad0a",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2020/42",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "4.0.1",
        "1.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2020/49",
          "ANSSI-CC-2020/43",
          "ANSSI-CC-2020/44",
          "ANSSI-CC-2020/45"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2017/76",
          "BSI-DSZ-CC-0891-V4-2019"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2020/49",
          "ANSSI-CC-2020/43",
          "ANSSI-CC-2020/44",
          "ANSSI-CC-2020/45"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0891-V2-2016",
          "BSI-DSZ-CC-0891-2015",
          "BSI-DSZ-CC-0891-V4-2019",
          "ANSSI-CC-2017/54",
          "BSI-DSZ-CC-0782-2012",
          "ANSSI-CC-2017/07",
          "BSI-DSZ-CC-0891-V3-2018",
          "ANSSI-CC-2017/76"
        ]
      }
    },
    "scheme_data": {
      "cert_id": "ANSSI-CC-2020/42",
      "description": "Le produit \u00e9valu\u00e9 est \u00ab MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip \u00bb d\u00e9velopp\u00e9 par les soci\u00e9t\u00e9s THALES DIS et INFINEON TECHNOLOGIES AG. Le produit est d\u00e9livr\u00e9 en deux configurations issues du composant SLE78xx (microcontr\u00f4leur M7892 G12 FLASH) : avec une capacit\u00e9 RF de 56 pF (SLE78CLFX4007PHM, IC type 7879) ; avec une capacit\u00e9 RF de 27 pF (SLE78CLFX400VPH",
      "developer": "THALES DIS",
      "enhanced": {
        "augmented": "ALC_DVS.2, AVA_VAN.5",
        "category": "Cartes \u00e0 puce",
        "cc_version": "Crit\u00e8res Communs version 3.1r5",
        "cert_id": "ANSSI-CC-2020/42",
        "certification_date": "2020-11-17",
        "developer": "THALES DIS",
        "evaluation_facility": "SERMA SAFETY \u0026 SECURITY",
        "expiration_date": "2025-11-17",
        "level": "EAL5+",
        "mutual_recognition": "CCRA SOG-IS",
        "protection_profile": "Java Card Platform Protection Profile \u2013 Open configuration, version 3.0",
        "report_link": "https://cyber.gouv.fr/sites/default/files/2020/11/anssi-cc-2020_42fr.pdf",
        "sponsor": "THALES DIS",
        "target_link": "https://cyber.gouv.fr/sites/default/files/2020/11/anssi-cible-cc-2020_42en.pdf"
      },
      "expiration_date": "2025-11-17",
      "level": "EAL5+",
      "product": "MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip",
      "sponsor": "THALES DIS",
      "url": "https://cyber.gouv.fr/produits-certifies/multiapp-v401-filter-set-10-java-card-open-platform-m7892-g12-chip"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0891-V4-2019"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0891-V2-2016",
          "BSI-DSZ-CC-0891-V4-2019",
          "BSI-DSZ-CC-0891-V3-2018"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Thales",
  "manufacturer_web": null,
  "name": "MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip",
  "not_valid_after": "2025-11-17",
  "not_valid_before": "2020-11-17",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "certificat-2020_42.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2020/42": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL5": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "SERMA": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "",
      "/CreationDate": "D:20201123113304+01\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20201123113304+01\u002700\u0027",
      "/Producer": "Acrobat Distiller 11.0 (Windows)",
      "/Title": "",
      "pdf_file_size_bytes": 267425,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "anssi-cc-2020_42fr.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0891-": 1,
          "BSI-DSZ-CC-0891-V4-2019": 2
        },
        "FR": {
          "ANSSI-CC-2017/76": 2,
          "ANSSI-CC-2017/76-S01": 1,
          "ANSSI-CC-2020/42": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-": 1
        },
        "BSI": {
          "BSI-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_FSP": 1,
          "ADV_IMP": 1,
          "ADV_INT": 1,
          "ADV_SPM": 1,
          "ADV_TDS": 1
        },
        "AGD": {
          "AGD_OPE": 4,
          "AGD_PRE": 3
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1,
          "ALC_DEL": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 2,
          "ALC_FLR": 2,
          "ALC_FLR.1": 1,
          "ALC_TAT": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.5": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 1,
          "EAL 5": 3,
          "EAL 7": 1,
          "EAL2": 2,
          "EAL6": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 3
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "SERMA": 18
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-2": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {
        "com": {
          "com.gemalto.javacardx.pace": 1
        },
        "javacardx": {
          "javacardx.pace": 1
        }
      },
      "javacard_version": {
        "JavaCard": {
          "Java Card 3.0.4": 3
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 31": 1
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 10
        },
        "Infineon": {
          "Infineon": 1
        },
        "Microsoft": {
          "Microsoft": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "",
      "/CreationDate": "D:20201123113236+01\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20201123113236+01\u002700\u0027",
      "/Producer": "Acrobat Distiller 11.0 (Windows)",
      "/Title": "",
      "pdf_file_size_bytes": 240219,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 23
    },
    "st_filename": "anssi-cible-cc-2020_42en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 9
          },
          "ECDH": {
            "ECDH": 8
          },
          "ECDSA": {
            "ECDSA": 4
          }
        },
        "FF": {
          "DH": {
            "DH": 10,
            "Diffie-Hellman": 5
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0891-V4-2019": 1
        },
        "FR": {
          "ANSSI-PP-2010/03-M01": 1
        },
        "NL": {
          "CC-1": 2,
          "CC-2": 3,
          "CC-3": 3
        }
      },
      "cc_claims": {
        "A": {
          "A.APPLET": 4,
          "A.DELETION": 4,
          "A.VERIFICATION": 3
        },
        "D": {
          "D.API_DATA": 3,
          "D.APP_CODE": 6,
          "D.APP_C_DATA": 3,
          "D.APP_I_DATA": 4,
          "D.CRYPTO": 5,
          "D.JCS_CODE": 3,
          "D.JCS_DATA": 5,
          "D.PIN": 4,
          "D.SEC_DATA": 7
        },
        "O": {
          "O.ALARM": 14,
          "O.APPLET": 28,
          "O.CARD-MANAGEMENT": 3,
          "O.CARD_MANAGEMENT": 18,
          "O.CIPHER": 10,
          "O.CODE_PCKG": 16,
          "O.CODE_PKG": 7,
          "O.DELETION": 7,
          "O.FIREWALL": 11,
          "O.GLOBAL_ARRAYS_CO": 3,
          "O.GLOBAL_ARRAYS_CONFID": 5,
          "O.GLOBAL_ARRAYS_INT": 3,
          "O.GLOBAL_ARRAYS_INTEG": 4,
          "O.INSTALL": 10,
          "O.JAVAOBJECT": 56,
          "O.KEY-MNGT": 5,
          "O.KEY_MNGT": 4,
          "O.LOAD": 5,
          "O.NATIVE": 10,
          "O.OBJ-DELETION": 3,
          "O.OPERATE": 14,
          "O.PIN-MNGT": 5,
          "O.REALLOCATION": 4,
          "O.RESOURCES": 8,
          "O.RND": 8,
          "O.SCP": 27,
          "O.SID": 12,
          "O.TRANSACTION": 5
        },
        "OE": {
          "OE.APPLET": 4,
          "OE.CODE-EVIDENCE": 9,
          "OE.VERIFICATION": 24
        },
        "OP": {
          "OP.ARRAY_ACCESS": 6,
          "OP.CREATE": 10,
          "OP.DELETE_APPLET": 6,
          "OP.DELETE_PCKG": 4,
          "OP.DELETE_PCKG_APPLET": 4,
          "OP.INSTANCE_FIELD": 6,
          "OP.INVK_INTERFACE": 10,
          "OP.INVK_VIRTUAL": 8,
          "OP.JAVA": 8,
          "OP.PUT": 7,
          "OP.THROW": 7,
          "OP.TYPE_ACCESS": 7
        },
        "OSP": {
          "OSP.ATOMIC_ACTIVATION": 3,
          "OSP.RND": 3,
          "OSP.TOE_IDENTIFICATION": 3,
          "OSP.VERIFICATION": 3
        },
        "OT": {
          "OT.X": 1
        },
        "R": {
          "R.JAVA": 9
        },
        "T": {
          "T.CONFID-APPLI-DATA": 3,
          "T.CONFID-JCS-CODE": 3,
          "T.CONFID-JCS-DATA": 3,
          "T.CONFID_INTEG_SERVICE_DEPLOYEMENT": 3,
          "T.DELETION": 3,
          "T.EXE-CODE": 6,
          "T.INSTALL": 3,
          "T.INTEG-APPLI-CODE": 6,
          "T.INTEG-APPLI-DATA": 6,
          "T.INTEG-JCS-CODE": 3,
          "T.INTEG-JCS-DATA": 3,
          "T.NATIVE": 3,
          "T.OBJ-DELETION": 3,
          "T.PHYSICAL": 3,
          "T.RESOURCES": 3,
          "T.SID": 6,
          "T.WRONG_SERVICE_DEPLOYEMENT_STATE": 3
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0056-V2-2012": 1,
          "BSI-CC-PP- 0068-V2-2011-MA-01": 1,
          "BSI-CC-PP-0084-": 1,
          "BSI-PP- 0055-2009": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 9,
          "ADV_FSP": 1,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 2,
          "ADV_FSP.5": 4,
          "ADV_IMP": 1,
          "ADV_IMP.1": 7,
          "ADV_INT.2": 1,
          "ADV_TDS": 1,
          "ADV_TDS.1": 2,
          "ADV_TDS.3": 4,
          "ADV_TDS.4": 7
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 7,
          "AGD_PRE": 1,
          "AGD_PRE.1": 6
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 2,
          "ALC_DVS.2": 7,
          "ALC_LCD.1": 3,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 3
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 2,
          "ATE_DPT.1": 2,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 6,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 6+": 1,
          "EAL5": 6,
          "EAL5 augmented": 2,
          "EAL5+": 2,
          "EAL6": 1,
          "EAL6 augmented": 1,
          "EAL6+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 13,
          "FAU_ARP.1.1": 1,
          "FAU_SAA.1": 2
        },
        "FCO": {
          "FCO_NRO": 5,
          "FCO_NRO.2": 3
        },
        "FCS": {
          "FCS_CKM": 43,
          "FCS_CKM.1": 27,
          "FCS_CKM.1.1": 3,
          "FCS_CKM.2": 10,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.3": 5,
          "FCS_CKM.3.1": 1,
          "FCS_CKM.4": 25,
          "FCS_CKM.4.1": 2,
          "FCS_COP": 28,
          "FCS_COP.1": 24,
          "FCS_COP.1.1": 4,
          "FCS_RND": 14,
          "FCS_RND.1": 10,
          "FCS_RND.1.1": 3
        },
        "FDP": {
          "FDP_ACC": 41,
          "FDP_ACC.1": 16,
          "FDP_ACC.2": 6,
          "FDP_ACF": 35,
          "FDP_ACF.1": 21,
          "FDP_IFC": 20,
          "FDP_IFC.1": 12,
          "FDP_IFC.2": 2,
          "FDP_IFF": 13,
          "FDP_IFF.1": 12,
          "FDP_ITC": 10,
          "FDP_ITC.1": 12,
          "FDP_ITC.2": 17,
          "FDP_RIP": 77,
          "FDP_RIP.1": 10,
          "FDP_RIP.1.1": 1,
          "FDP_ROL": 12,
          "FDP_ROL.1": 2,
          "FDP_SDI.2": 6,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1,
          "FDP_UIT": 5,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_AFL": 21,
          "FIA_AFL.1.1": 2,
          "FIA_AFL.1.2": 2,
          "FIA_ATD": 11,
          "FIA_ATD.1": 3,
          "FIA_SOS.2": 1,
          "FIA_UAI.1": 1,
          "FIA_UAU": 53,
          "FIA_UAU.1": 5,
          "FIA_UAU.1.1": 2,
          "FIA_UAU.1.2": 2,
          "FIA_UAU.4": 1,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6.1": 1,
          "FIA_UID": 32,
          "FIA_UID.1": 19,
          "FIA_UID.1.1": 2,
          "FIA_UID.1.2": 2,
          "FIA_UID.2": 1,
          "FIA_USB": 6,
          "FIA_USB.1": 3
        },
        "FMT": {
          "FMT_LIM": 18,
          "FMT_LIM.1": 15,
          "FMT_LIM.1.1": 3,
          "FMT_LIM.2": 14,
          "FMT_LIM.2.1": 3,
          "FMT_MSA": 76,
          "FMT_MSA.1": 12,
          "FMT_MSA.2": 1,
          "FMT_MSA.3": 18,
          "FMT_MTD": 31,
          "FMT_MTD.1": 9,
          "FMT_MTD.3": 1,
          "FMT_SMF": 56,
          "FMT_SMF.1": 18,
          "FMT_SMF.1.1": 2,
          "FMT_SMR": 69,
          "FMT_SMR.1": 30,
          "FMT_SMR.1.1": 2,
          "FMT_SMR.1.2": 2
        },
        "FPR": {
          "FPR_UNO": 5,
          "FPR_UNO.1": 8,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_EMS": 4,
          "FPT_EMS.1": 12,
          "FPT_EMS.1.1": 3,
          "FPT_EMS.1.2": 3,
          "FPT_FLS": 42,
          "FPT_FLS.1": 14,
          "FPT_FLS.1.1": 1,
          "FPT_ITT": 5,
          "FPT_ITT.1": 1,
          "FPT_PHP": 5,
          "FPT_PHP.3": 12,
          "FPT_PHP.3.1": 1,
          "FPT_RCV": 12,
          "FPT_RCV.3": 4,
          "FPT_RCV.4": 2,
          "FPT_TDC.1": 7,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 1,
          "FPT_TST": 7,
          "FPT_TST.1": 12,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 14,
          "FTP_ITC.1": 5,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP": 5,
          "FTP_TRP.1": 5
        }
      },
      "certification_process": {
        "OutOfScope": {
          "a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "ECB": {
          "ECB": 1
        }
      },
      "cplc_data": {
        "ICFab": {
          "IC Fabricator": 2
        },
        "ICType": {
          "IC Type": 2
        }
      },
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 156
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 3,
          "Key agreement": 2
        },
        "MAC": {
          "MAC": 14
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "Serma Safety \u0026 Security": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 6,
            "SHA1": 1
          },
          "SHA2": {
            "SHA-224": 5,
            "SHA-256": 6,
            "SHA-384": 4,
            "SHA-512": 6,
            "SHA224": 2
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.DG1": 6,
          "EF.DG16": 6,
          "EF.DG3": 1,
          "EF.DG4": 1,
          "EF.SOD": 1
        }
      },
      "javacard_api_const": {
        "ALG": {
          "AES": {
            "ALG_AES_CMAC_128": 1
          }
        },
        "misc": {
          "TYPE_ACCESS": 7
        }
      },
      "javacard_packages": {
        "javacard": {
          "javacard.framework": 2
        }
      },
      "javacard_version": {
        "JavaCard": {
          "Java Card 2.2.2": 3,
          "Java Card 3.0.4": 8
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 1
        },
        "RNG": {
          "RND": 11,
          "RNG": 12
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 3,
          "Physical Tampering": 3,
          "fault induction": 2,
          "malfunction": 8,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 2,
          "SPA": 1,
          "physical probing": 5,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 4
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS 197": 1,
          "FIPS 46-3": 1,
          "FIPS180-2": 1,
          "FIPS197": 5
        },
        "ICAO": {
          "ICAO": 3
        },
        "NIST": {
          "SP 800-67": 1
        },
        "PKCS": {
          "PKCS#1": 7,
          "PKCS#3": 1,
          "PKCS#5": 5
        },
        "SCP": {
          "SCP01": 4,
          "SCP02": 4,
          "SCP03": 7
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 31
          }
        },
        "DES": {
          "3DES": {
            "3DES": 2,
            "TDEA": 1,
            "TDES": 14,
            "Triple-DES": 3
          },
          "DES": {
            "DES": 20
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 3,
            "HMAC": 3,
            "KMAC": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 19
        },
        "Infineon": {
          "Infineon": 12
        },
        "Thales": {
          "Thales": 11
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Antoine de Lavernette",
      "/CreationDate": "D:20201002150308+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/Keywords": "Security Target, CC",
      "/ModDate": "D:20201002150308+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Subject": "Security Target",
      "/Title": "eTravel v1.0 Security Target MA\u00cfA3",
      "pdf_file_size_bytes": 3105886,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 121
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0099b_pdf.pdf",
        "pp_name": "Java Card Protection Profile - Open Configuration"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_42fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL5+",
      "ALC_DVS.2",
      "AVA_VAN.5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_42en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "a3fda5d9fae51b33e01e012d73523aaa60065f574bb99fb530f6af8c23ccc944",
      "txt_hash": "7555e7feaa1adfc37b71ad9a6002206fd7d9dab675f79babeaf3776b16e01bb7"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "6cb86783dc79f46604263a49b991be85b3ef8c5ad1d71164304033a5d9e5c41e",
      "txt_hash": "f647dfdb6f8c9fa575da187a08285563c7300fbd7a1d922d5e44aa9cfa3adbdf"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "a824303b4038d8918cbb1535b6784d2e4fba1a11664f5950fa12eaf6241e0dd3",
      "txt_hash": "07d111ac9ff2a4e7b2f76d2f764548759cb53fd3b4896c785d1d969ba7dad81e"
    }
  },
  "status": "active"
}