MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip(MultiApp v4.0.1 with Filter Set 1.0) (ANSSI-CC-2020/42-R01)

CSV information ?

Status active
Valid from 08.01.2025
Valid until 08.01.2030
Scheme 🇫🇷 FR
Manufacturer THALES DIS FRANCE SA
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_DVS.2, EAL5+, AVA_VAN.5
Protection profiles

Heuristics summary ?

Certificate ID: ANSSI-CC-2020/42-R01

Certificate ?

Extracted keywords

Security level
EAL5, EAL2
Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5
Certificates
ANSSI-CC-2020/42-R01
Evaluation facilities
SERMA

File metadata

Creation date D:20250110094558+01'00'
Modification date D:20250110094717+01'00'
Pages 2
Creator Acrobat PDFMaker 23 pour Word
Producer Adobe PDF Library 23.1.175

Certification report ?

Extracted keywords

Symmetric Algorithms
DES

Vendor
Gemalto, Microsoft

Security level
EAL5, EAL2, EAL7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, AVA_VAN.5, AVA_VAN
Protection profiles
BSI-PP-0084-2014, ANSSI-CC-PP-2010/03-M01
Certificates
BSI-DSZ-CC-0891-V7-2024, ANSSI-CC-2020/42-R01, ANSSI-CC-PP-2010/03-M01
Evaluation facilities
SERMA, CESTI

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Creation date D:20250110094638+01'00'
Modification date D:20250110094716+01'00'
Pages 15
Creator Acrobat PDFMaker 23 pour Word
Producer Adobe PDF Library 23.1.175

References

Outgoing Incoming
  • ANSSI-CC-2020/49-R01 - active - Digital Identity on MultiApp v4.0.1 platform with Filter Set 1.0 - PACE, EAC(version 1.0)

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDEA, 3DES, TDES, Triple-DES, HMAC, KMAC, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DH
Hash functions
SHA1, SHA-224, SHA-256, SHA-512, SHA-384
Schemes
MAC, Key Agreement, Key agreement
Protocols
PACE
Randomness
PRNG, RNG, RND
Block cipher modes
ECB, CBC

JavaCard versions
Java Card 2.2.2, Java Card 3.0.4
JavaCard API constants
ALG_AES_CMAC_128, TYPE_ACCESS
CPLC
IC Fabricator, IC Type
IC data groups
EF.DG1, EF.DG16, EF.DG3, EF.DG4, EF.SOD
Vendor
Infineon, Gemalto, Thales

Security level
EAL5+, EAL6, EAL6+, EAL5, EAL 6+, EAL6 augmented, EAL5 augmented
Claims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.SCP, O.CARD-MANAGEMENT, O.RND, O.KEY_MNGT, O.CARD_MANAGEMENT, O.APPLET, O.CODE_PKG, O.JAVAOBJECT, O.CODE_PCKG, O.GLOBAL_ARRAYS_CO, O.GLOBAL_ARRAYS_INT, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, T.WRONG_SERVICE_DEPLOYEMENT_STATE, T.CONFID_INTEG_SERVICE_DEPLOYEMENT, A.APPLET, A.DELETION, A.VERIFICATION, R.JAVA, OT.X, OP.ARRAY_ACCESS, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUT, OE.VERIFICATION, OE.APPLET, OE.CODE-EVIDENCE, OSP.VERIFICATION, OSP.RND, OSP.ATOMIC_ACTIVATION, OSP.TOE_IDENTIFICATION
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_TDS.1, ADV_TDS.4, ADV_IMP.1, ADV_TDS.3, ADV_INT.2, ADV_FSP.5, ADV_FSP.1, ADV_FSP.2, ADV_FSP.4, ADV_ARC, ADV_FSP, ADV_IMP, ADV_TDS, AGD_PRE, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_DVS.1, ALC_LCD.1, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_IND.2, ATE_DPT.1, ATE_DPT.3, AVA_VAN.5
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FCO_NRO, FCO_NRO.2, FCS_RND, FCS_CKM, FCS_COP.1, FCS_COP, FCS_RND.1, FCS_CKM.1, FCS_RND.1.1, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.2.1, FCS_CKM.3, FCS_CKM.3.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1.1, FDP_ACF, FDP_ACC, FDP_ACC.2, FDP_ACF.1, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ROL, FDP_ROL.1, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FDP_ACC.1, FDP_ITC.1, FDP_RIP.1.1, FIA_AFL, FIA_SOS.2, FIA_ATD, FIA_ATD.1, FIA_UID, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_UAU, FIA_UAI.1, FIA_UAU.1, FIA_UID.1, FIA_UAU.4, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMR, FMT_SMR.1, FMT_SMF, FMT_SMF.1, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPR_UNO.1, FPR_UNO.1.1, FPR_UNO, FPT_EMS, FPT_TST, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS, FPT_FLS.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_RCV, FPT_RCV.3, FPT_TST.1, FPT_PHP, FPT_PHP.3, FPT_RCV.4, FPT_ITT, FPT_ITT.1, FPT_FLS.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3.1, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP, FTP_TRP.1
Protection profiles
BSI-CC-PP-0084-, BSI-CC-PP- 0068-V2-2011-MA-01, BSI-CC-PP-0056-V2-2012, BSI-PP-0055-
Certificates
BSI-DSZ-CC-0891-V7-2024, ANSSI-PP-2010/03-M01, CC-1, CC-2, CC-3
Evaluation facilities
Serma Safety & Security

Side-channel analysis
physical probing, DPA, SPA, timing attacks, physical tampering, Physical Tampering, malfunction, Malfunction, fault induction
Certification process
out of scope, The commands terminal authenticate (TA) and Chip Authenticate (CA) are out of scope of this TOE and are managed at application level, The PACE module to provide PACE secure channel. Note: The Biometry feature of the Javacard API is out of scope of the TOE Applications stored in Flash mask in code area in MultiApp V4.0.1, are outside the TOE, is an extension of PACE, (The commands terminal authenticate (TA) and Chip Authenticate (CA) are out of scope of this TOE and are managed at application level). GAP provides mutual authentication, secure, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are

Standards
FIPS180-2, FIPS197, FIPS 46-3, FIPS 197, SP 800-67, PKCS#3, PKCS#1, PKCS#5, AIS31, ICAO, SCP03, SCP01, SCP02, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title MultiApp v4.0.1 Javacard Platform with Filter Set 1.0
Subject Security Target
Keywords Security Target, CC
Author OHAYON Franck
Creation date D:20241127180125+01'00'
Modification date D:20241127180125+01'00'
Pages 122
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

References

Outgoing

Heuristics ?

Certificate ID: ANSSI-CC-2020/42-R01

Extracted SARs

ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.2, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5

Similar certificates

Name Certificate ID
MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip ANSSI-CC-2020/42 Compare
Digital Identity on MultiApp v4.0.1 platform with Filter Set 1.0 - PACE, EAC(version 1.0) ANSSI-CC-2020/49-R01 Compare
eTravel v2.2 BAC on MultiApp platform v4.0.1 with Filter Set 1.0 Version 1.0 ANSSI-CC-2020/43 Compare
Digital Identity on MultiApp v4.0.1 platform with Filter Set 1.0 – PACE, EAC (version 1.0) ANSSI-CC-2020/49 Compare
eTravel v2.2 EAC/BAC on MultiApp v4.0.1 platform with Filter Set 1.0 version 1.0 ANSSI-CC-2020/44 Compare
eTravel v2.2 EAC/SAC on MultiApp v4.0.1 platform with Filter Set 1.0 version 1.0 ANSSI-CC-2020/45 Compare
IAS ECC v2, version 1.3, in configuration #1 on ID-One Cosmo v8.2 open platform on NXP P6022M VB (Identification de l’application : F0 02 02 13) (ANSSI-CC-2020/50-R01) ANSSI-CC-2020/50-R01 Compare
IAS ECC v2, version 1.3, in configuration #4 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’application : F0 02 02 13 (ANSSI-CC-2020/53-R01) ANSSI-CC-2020/53-R01 Compare
IAS ECC v2, version 1.3, in configuration #2 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’application : F0 02 02 13 (ANSSI-CC-2020/51-R01) ANSSI-CC-2020/51-R01 Compare
IAS ECC v2, version 1.3, in configuration #3 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’application : F0 02 02 13 (ANSSI-CC-2020/52-R01) ANSSI-CC-2020/52-R01 Compare
BELPIC V1.8 applet on MultiApp V4.1 (Révision 1.0) (ANSSI-CC-2019/31-R01) ANSSI-CC-2019/31-R01 Compare
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH(Version 4.1.0.2) ( ANSSI-CC-2023/30 ) ANSSI-CC-2023/30 Compare
eTravel Essential for Japan 1.0, with SAC (PACE) and AA, embedded in the Infineon SLC52GDA Integrated Circuit(version 0103h) ( ANSSI-CC-2020/87-R01) ANSSI-CC-2020/87-R01 Compare
eTravel Essential for Japan 1.0, with SAC (BAC+PACE) and AA, embedded in the Infineon SLC52GDA Integrated Circuit (version 0103h) (ANSSI-CC-2020/88-R01) ANSSI-CC-2020/88-R01 Compare
Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h (Version 4.2.0, Java Card version 3.0.5, GP version 2.3) ANSSI-CC-2020/65v2 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/54) ANSSI-CC-2023/54 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration (Version 4.0.1.52) (ANSSI-CC-2023/11-R01) ANSSI-CC-2023/11-R01 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/56) ANSSI-CC-2023/56 Compare
eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated(version 2.3.0.1) ( ANSSI-CC-2023/55 ) ANSSI-CC-2023/55 Compare
Produit IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 Version 5.2.1.A.C et 5.2.1.A.O ( ANSSI-CC-2023/42 ) ANSSI-CC-2023/42 Compare
ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52) (ANSSI-CC-2023/12-R01) ANSSI-CC-2023/12-R01 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO BAC configuration (Version 4.0.1.52) ( ANSSI-CC-2023/10-R01 ) ANSSI-CC-2023/10-R01 Compare
eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1 ANSSI-CC-2018/57v2 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1 ANSSI-CC-2018/56v2 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1 ANSSI-CC-2018/58v2 Compare
MultiApp V5.1 Java Card Virtual Machine Version 5.1 (ANSSI-CC-2023/45) ANSSI-CC-2023/45 Compare
IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A (ANSSI-CC-2023/57 ) ANSSI-CC-2023/57 Compare
MultiApp ID Java Card Platform - MultiApp ID v1.0 and patch v3.1 embedded on the secure Microcontroller SLE66CX680PE-A13 ANSSI-CC-2008/01 Compare
eTravel 3.1 BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/34 ) ANSSI-CC-2023/34 Compare
eTravel 3.1 EAC on SAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/36 ) ANSSI-CC-2023/36 Compare
eTravel 3.1 EAC on BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/35 ) ANSSI-CC-2023/35 Compare
ST31P450 (A06) (ANSSI-CC-2020/04-R01) ANSSI-CC-2020/04-R01 Compare
ST33G1M2 (D02) (ANSSI-CC-2020/78-R01) ANSSI-CC-2020/78-R01 Compare
ST33J2M0 (C03) ( ANSSI-CC-2020/29-R01) ANSSI-CC-2020/29-R01 Compare
PPCA application v1.0.1.3 on MultiApp v4.0.1 Platform ANSSI-CC-2018/21 Compare
ST33G1M2A and ST33G1M2M (D02) (ANSSI-CC-2020/79-R01) ANSSI-CC-2020/79-R01 Compare
ST33G1M2A and ST33G1M2M including optional cryptographic library NesLib (C03) (ANSSI-CC-2020/23-R01) ANSSI-CC-2020/23-R01 Compare
ST33G1M2A1 including optional cryptographic library NesLib and optional library SFM (C04)(ANSSI-CC-2020/24-R01) ANSSI-CC-2020/24-R01 Compare
Cryptographic library NESLIB 6.7.4 on ST31N600 A02 (version 6.7.4) ( ANSSI-CC-2022/42-R01) ANSSI-CC-2022/42-R01 Compare
Plateforme ID-One Cosmo v8.2 masquée sur le composant NXP P60D145 Codes SAAAAR : 091121, 094223 et 094742 (ANSSI-CC-2020/26-R01) ANSSI-CC-2020/26-R01 Compare
Plateforme Java Card MultiApp V5.0 version 5.0 ANSSI-CC-2021/42 Compare
Plateforme JavaCard MultiApp V4.0.1 - PACE en configuration ouverte masquée sur le composant M7892 G12 ANSSI-CC-2017/76 Compare
TESS v5.1 Platform (Revision 1.0) (ANSSI-CC-2024/28) ANSSI-CC-2024/28 Compare
BELPIC V1.8 applet on MultiApp V4.1 Platform Révision 1.0 ANSSI-CC-2019/31 Compare
TESS v5.0 Platform (revision 1.0) (ANSSI-CC-2024/12) ANSSI-CC-2024/12 Compare
Connected eSE 5.3.4 Platform v1.1 (Revision 1.0) (ANSSI-CC-2024/33) ANSSI-CC-2024/33 Compare
Card Usimera Protect: SLE88CFX4000P microcontroller embedding SIM, USIM and OTA applications on Java card open platform (version 2.1). ANSSI-CC-2007/08 Compare
IAS Classic v5.0 with MOC Server v3.0 on MultiApp v4.2 Version 5.0.0.A.C, version 3.0.1A ANSSI-CC-2020/70 Compare
Gemalto Carte à puce Multiapp ID IAS ECC : applet de signature v4.2.7.A chargée sur la plate-forme Java Card Multiapp v1.0 avec correctif v1.2 masquée sur microcontrôleur NXP P5CD144 VOB ANSSI-CC-2009/56 Compare
Carte à puce Multiapp ID IAS ECC wafer process : applet de signature v4.2.7.A chargée sur la plate-forme Java Card Multiapp v1.0 avec correctif v1.2 masquée sur microcontrôleur NXP P5CD144 VOB ANSSI-CC-2010/52 Compare
Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h ANSSI-CC-2020/65 Compare
Showing 5 out of 51.

Scheme data ?

Product MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip (MultiApp v4.0.1 with Filter Set 1.0)
Url https://cyber.gouv.fr/produits-certifies/multiapp-v401-filter-set-10-java-card-open-platform-m7892-g12-chip-multiapp-v401
Description Le produit évalué est « MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip, MultiApp v4.0.1 with Filter Set 1.0 » développé par THALES DIS FRANCE SAS.
Sponsor THALES DIS FRANCE SAS
Developer THALES DIS FRANCE SAS
Cert Id ANSSI-CC-2020/42-R01
Level EAL5+
Expiration Date 08.01.2030
Enhanced
Cert Id ANSSI-CC-2020/42-R01
Certification Date 08.01.2025
Expiration Date 08.01.2030
Category Cartes à puce
Cc Version Critères Communs version 3.1r5
Developer THALES DIS FRANCE SAS
Sponsor THALES DIS FRANCE SAS
Evaluation Facility SERMA SAFETY & SECURITY
Level EAL5+
Protection Profile Java Card Platform Protection Profile – Open configuration, version 3.0
Mutual Recognition CCRA SOG-IS
Augmented ALC_DVS.2, AVA_VAN.5
Report Link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2020_42-R01fr.pdf
Target Link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2020_42-R01en.pdf
Cert Link https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2020_42-R01.pdf

References ?

Updates ?

  • 05.02.2025 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.
    • The st property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.
    • The cert property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.

    The computed heuristics were updated.

    • The following values were inserted: {'protection_profiles': {'_type': 'Set', 'elements': ['94167fd161e87d71']}, 'eal': 'EAL5+'}.
    • The prev_certificates property was set to None.
    • The next_certificates property was set to None.
    • The scheme_data property was set to {'product': 'MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip (MultiApp v4.0.1 with Filter Set 1.0)', 'url': 'https://cyber.gouv.fr/produits-certifies/multiapp-v401-filter-set-10-java-card-open-platform-m7892-g12-chip-multiapp-v401', 'description': 'Le produit évalué est « MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip, MultiApp v4.0.1 with Filter Set 1.0 » développé par THALES DIS FRANCE SAS.', 'sponsor': 'THALES DIS FRANCE SAS', 'developer': 'THALES DIS FRANCE SAS', 'cert_id': 'ANSSI-CC-2020/42-R01', 'level': 'EAL5+', 'expiration_date': '2030-01-08', 'enhanced': {'cert_id': 'ANSSI-CC-2020/42-R01', 'certification_date': '2025-01-08', 'expiration_date': '2030-01-08', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'THALES DIS FRANCE SAS', 'sponsor': 'THALES DIS FRANCE SAS', 'evaluation_facility': 'SERMA SAFETY & SECURITY', 'level': 'EAL5+', 'protection_profile': 'Java Card Platform Protection Profile – Open configuration, version 3.0', 'mutual_recognition': 'CCRA SOG-IS', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2020_42-R01fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2020_42-R01en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2020_42-R01.pdf'}}.
  • 03.02.2025 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e7707eebe301c926f4dcfeb7c76a430569b0c738cd3db86c9b588cd8928871cd', 'txt_hash': '10be943e428f309489a3580deea676176521dd08af6b3e62da5e7366049922e2'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'c57bdf1ff342f5a2e34e297ab5763540520b9c11e3b6fc86c3a5fac69f06d20b', 'txt_hash': '95f9d00426d5f658e43d35f85095d2458d7d2e4d2e33b596123e73f742d950e2'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '721fe399a0bba91268e61766ab91b0266fe8d2c020a9532d591e2ebc3f2bb763', 'txt_hash': '1ad1b0f03e32c52a58626203e075f5db8a6ad1d03a798981b2cb2268399ecb23'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 411309, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 15, '/CreationDate': "D:20250110094638+01'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20250110094716+01'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ssi.gouv.fr/', 'mailto:[email protected]', 'http://www.commoncriteriaportal.org/', 'http://www.sogis.eu/']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 2361844, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 122, '/Title': 'MultiApp v4.0.1 Javacard Platform with Filter Set 1.0', '/Author': 'OHAYON Franck', '/Subject': 'Security Target', '/Keywords': 'Security Target, CC', '/Creator': 'Microsoft® Word for Microsoft 365', '/CreationDate': "D:20241127180125+01'00'", '/ModDate': "D:20241127180125+01'00'", '/Producer': 'Microsoft® Word for Microsoft 365', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 170045, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/CreationDate': "D:20250110094558+01'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20250110094717+01'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'FR': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0891-V7-2024': 2}, 'FR': {'ANSSI-CC-2020/42-R01': 2, 'ANSSI-CC-PP-2010/03-M01': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0084-2014': 1}, 'ANSSI': {'ANSSI-CC-PP-2010/03-M01': 1}}, 'cc_security_level': {'EAL': {'EAL5': 1, 'EAL2': 2, 'EAL7': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'AGD': {'AGD_OPE': 4, 'AGD_PRE': 2}, 'ALC': {'ALC_DVS.2': 1, 'ALC_FLR': 1}, 'AVA': {'AVA_VAN.5': 1, 'AVA_VAN': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Gemalto': {'Gemalto': 1}, 'Microsoft': {'Microsoft': 1}}, 'eval_facility': {'Serma': {'SERMA': 1}, 'CESTI': {'CESTI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0891-V7-2024': 1}, 'FR': {'ANSSI-PP-2010/03-M01': 1}, 'NL': {'CC-1': 2, 'CC-2': 3, 'CC-3': 3}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-': 1, 'BSI-CC-PP- 0068-V2-2011-MA-01': 1, 'BSI-CC-PP-0056-V2-2012': 1, 'BSI-PP-0055-': 1}}, 'cc_security_level': {'EAL': {'EAL5+': 2, 'EAL6': 1, 'EAL6+': 1, 'EAL5': 6, 'EAL 6+': 1, 'EAL6 augmented': 1, 'EAL5 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 9, 'ADV_TDS.1': 2, 'ADV_TDS.4': 7, 'ADV_IMP.1': 7, 'ADV_TDS.3': 4, 'ADV_INT.2': 1, 'ADV_FSP.5': 4, 'ADV_FSP.1': 1, 'ADV_FSP.2': 2, 'ADV_FSP.4': 2, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_PRE': 1, 'AGD_OPE': 1, 'AGD_OPE.1': 7, 'AGD_PRE.1': 6}, 'ALC': {'ALC_DVS.2': 7, 'ALC_TAT.1': 2, 'ALC_TAT.2': 3, 'ALC_CMC.4': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 3, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.2': 2, 'ATE_FUN.1': 6, 'ATE_COV.1': 2, 'ATE_IND.2': 1, 'ATE_DPT.1': 2, 'ATE_DPT.3': 1}, 'AVA': {'AVA_VAN.5': 7}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 13, 'FAU_ARP.1.1': 1, 'FAU_SAA.1': 2}, 'FCO': {'FCO_NRO': 5, 'FCO_NRO.2': 3}, 'FCS': {'FCS_RND': 14, 'FCS_CKM': 45, 'FCS_COP.1': 27, 'FCS_COP': 28, 'FCS_RND.1': 10, 'FCS_CKM.1': 28, 'FCS_RND.1.1': 3, 'FCS_CKM.1.1': 3, 'FCS_CKM.2': 10, 'FCS_CKM.2.1': 1, 'FCS_CKM.3': 5, 'FCS_CKM.3.1': 1, 'FCS_CKM.4': 26, 'FCS_CKM.4.1': 2, 'FCS_COP.1.1': 5}, 'FDP': {'FDP_ACF': 37, 'FDP_ACC': 41, 'FDP_ACC.2': 6, 'FDP_ACF.1': 21, 'FDP_IFC': 20, 'FDP_IFC.1': 12, 'FDP_IFF': 13, 'FDP_IFF.1': 12, 'FDP_RIP': 77, 'FDP_RIP.1': 10, 'FDP_ROL': 12, 'FDP_ROL.1': 2, 'FDP_SDI.2': 6, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITC': 10, 'FDP_ITC.2': 18, 'FDP_IFC.2': 2, 'FDP_UIT': 5, 'FDP_UIT.1': 2, 'FDP_ACC.1': 18, 'FDP_ITC.1': 13, 'FDP_RIP.1.1': 1}, 'FIA': {'FIA_AFL': 21, 'FIA_SOS.2': 1, 'FIA_ATD': 12, 'FIA_ATD.1': 3, 'FIA_UID': 31, 'FIA_UID.2': 1, 'FIA_USB': 6, 'FIA_USB.1': 3, 'FIA_UAU': 53, 'FIA_UAI.1': 1, 'FIA_UAU.1': 5, 'FIA_UID.1': 19, 'FIA_UAU.4': 1, 'FIA_AFL.1.1': 2, 'FIA_AFL.1.2': 2, 'FIA_UID.1.1': 2, 'FIA_UID.1.2': 2, 'FIA_UAU.1.1': 2, 'FIA_UAU.1.2': 2, 'FIA_UAU.4.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6.1': 1}, 'FMT': {'FMT_LIM': 18, 'FMT_LIM.1': 15, 'FMT_LIM.2': 14, 'FMT_LIM.1.1': 3, 'FMT_LIM.2.1': 3, 'FMT_MSA': 78, 'FMT_MSA.1': 12, 'FMT_MSA.2': 1, 'FMT_MSA.3': 18, 'FMT_SMR': 71, 'FMT_SMR.1': 30, 'FMT_SMF': 56, 'FMT_SMF.1': 20, 'FMT_MTD': 31, 'FMT_MTD.1': 9, 'FMT_MTD.3': 1, 'FMT_SMF.1.1': 2, 'FMT_SMR.1.1': 2, 'FMT_SMR.1.2': 2}, 'FPR': {'FPR_UNO.1': 8, 'FPR_UNO.1.1': 1, 'FPR_UNO': 5}, 'FPT': {'FPT_EMS': 4, 'FPT_TST': 7, 'FPT_EMS.1': 12, 'FPT_EMS.1.1': 3, 'FPT_EMS.1.2': 3, 'FPT_FLS': 43, 'FPT_FLS.1': 14, 'FPT_TDC.1': 7, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_RCV': 12, 'FPT_RCV.3': 4, 'FPT_TST.1': 12, 'FPT_PHP': 5, 'FPT_PHP.3': 12, 'FPT_RCV.4': 2, 'FPT_ITT': 5, 'FPT_ITT.1': 1, 'FPT_FLS.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_PHP.3.1': 1}, 'FTP': {'FTP_ITC': 14, 'FTP_ITC.1': 5, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP': 7, 'FTP_TRP.1': 5}}, 'cc_claims': {'D': {'D.APP_CODE': 6, 'D.APP_C_DATA': 3, 'D.APP_I_DATA': 4, 'D.PIN': 4, 'D.API_DATA': 3, 'D.CRYPTO': 5, 'D.JCS_CODE': 3, 'D.JCS_DATA': 5, 'D.SEC_DATA': 7}, 'O': {'O.SID': 12, 'O.FIREWALL': 11, 'O.GLOBAL_ARRAYS_CONFID': 5, 'O.GLOBAL_ARRAYS_INTEG': 4, 'O.NATIVE': 10, 'O.OPERATE': 14, 'O.REALLOCATION': 4, 'O.RESOURCES': 8, 'O.ALARM': 14, 'O.CIPHER': 10, 'O.KEY-MNGT': 5, 'O.PIN-MNGT': 5, 'O.TRANSACTION': 5, 'O.OBJ-DELETION': 3, 'O.DELETION': 7, 'O.LOAD': 5, 'O.INSTALL': 10, 'O.SCP': 27, 'O.CARD-MANAGEMENT': 3, 'O.RND': 8, 'O.KEY_MNGT': 4, 'O.CARD_MANAGEMENT': 18, 'O.APPLET': 28, 'O.CODE_PKG': 7, 'O.JAVAOBJECT': 56, 'O.CODE_PCKG': 16, 'O.GLOBAL_ARRAYS_CO': 3, 'O.GLOBAL_ARRAYS_INT': 3}, 'T': {'T.CONFID-APPLI-DATA': 3, 'T.CONFID-JCS-CODE': 3, 'T.CONFID-JCS-DATA': 3, 'T.INTEG-APPLI-CODE': 6, 'T.INTEG-APPLI-DATA': 6, 'T.INTEG-JCS-CODE': 3, 'T.INTEG-JCS-DATA': 3, 'T.SID': 6, 'T.EXE-CODE': 6, 'T.NATIVE': 3, 'T.RESOURCES': 3, 'T.DELETION': 3, 'T.INSTALL': 3, 'T.OBJ-DELETION': 3, 'T.PHYSICAL': 3, 'T.WRONG_SERVICE_DEPLOYEMENT_STATE': 3, 'T.CONFID_INTEG_SERVICE_DEPLOYEMENT': 3}, 'A': {'A.APPLET': 4, 'A.DELETION': 4, 'A.VERIFICATION': 3}, 'R': {'R.JAVA': 9}, 'OT': {'OT.X': 1}, 'OP': {'OP.ARRAY_ACCESS': 6, 'OP.CREATE': 10, 'OP.DELETE_APPLET': 6, 'OP.DELETE_PCKG': 4, 'OP.DELETE_PCKG_APPLET': 4, 'OP.INSTANCE_FIELD': 6, 'OP.INVK_VIRTUAL': 8, 'OP.INVK_INTERFACE': 10, 'OP.JAVA': 8, 'OP.THROW': 7, 'OP.TYPE_ACCESS': 7, 'OP.PUT': 7}, 'OE': {'OE.VERIFICATION': 24, 'OE.APPLET': 4, 'OE.CODE-EVIDENCE': 9}, 'OSP': {'OSP.VERIFICATION': 3, 'OSP.RND': 3, 'OSP.ATOMIC_ACTIVATION': 3, 'OSP.TOE_IDENTIFICATION': 3}}, 'vendor': {'Infineon': {'Infineon': 12}, 'Gemalto': {'Gemalto': 2}, 'Thales': {'Thales': 10}}, 'eval_facility': {'Serma': {'Serma Safety & Security': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 31}}, 'DES': {'DES': {'DES': 20}, '3DES': {'TDEA': 1, '3DES': 2, 'TDES': 14, 'Triple-DES': 3}}, 'constructions': {'MAC': {'HMAC': 3, 'KMAC': 2, 'CMAC': 3}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 8}, 'ECDSA': {'ECDSA': 4}, 'ECC': {'ECC': 10}}, 'FF': {'DH': {'Diffie-Hellman': 5, 'DH': 11}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 1}, 'SHA2': {'SHA-224': 1, 'SHA-256': 6, 'SHA-512': 6, 'SHA-384': 4}}}, 'crypto_scheme': {'MAC': {'MAC': 14}, 'KA': {'Key Agreement': 3, 'Key agreement': 2}}, 'crypto_protocol': {'PACE': {'PACE': 156}}, 'randomness': {'PRNG': {'PRNG': 1}, 'RNG': {'RNG': 12, 'RND': 11}}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 5, 'DPA': 2, 'SPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 1, 'Physical Tampering': 3, 'malfunction': 8, 'Malfunction': 3, 'fault induction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {'ICFab': {'IC Fabricator': 2}, 'ICType': {'IC Type': 2}}, 'ic_data_group': {'EF': {'EF.DG1': 6, 'EF.DG16': 6, 'EF.DG3': 1, 'EF.DG4': 1, 'EF.SOD': 1}}, 'standard_id': {'FIPS': {'FIPS180-2': 1, 'FIPS197': 5, 'FIPS 46-3': 1, 'FIPS 197': 1}, 'NIST': {'SP 800-67': 1}, 'PKCS': {'PKCS#3': 1, 'PKCS#1': 7, 'PKCS#5': 5}, 'BSI': {'AIS31': 4}, 'ICAO': {'ICAO': 3}, 'SCP': {'SCP03': 7, 'SCP01': 4, 'SCP02': 4}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.2': 3, 'Java Card 3.0.4': 8}}, 'javacard_api_const': {'ALG': {'AES': {'ALG_AES_CMAC_128': 1}}, 'misc': {'TYPE_ACCESS': 7}}, 'javacard_packages': {'javacard': {'javacard.framework': 2}}, 'certification_process': {'OutOfScope': {'out of scope': 3, 'The commands terminal authenticate (TA) and Chip Authenticate (CA) are out of scope of this TOE and are managed at application level': 1, 'The PACE module to provide PACE secure channel. Note: The Biometry feature of the Javacard API is out of scope of the TOE Applications stored in Flash mask in code area in MultiApp V4.0.1, are outside the TOE': 1, 'is an extension of PACE, (The commands terminal authenticate (TA) and Chip Authenticate (CA) are out of scope of this TOE and are managed at application level). GAP provides mutual authentication, secure': 1, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2020/42-R01': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL5': 1, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Serma': {'SERMA': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to ANSSI-CC-2020_42-R01fr.pdf.
    • The st_filename property was set to ANSSI-cible-CC-2020_42-R01en.pdf.
    • The cert_filename property was set to certificat-CC-2020_42-R01.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ANSSI-CC-2020/42-R01.
    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V7-2024']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V7-2024']}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/49-R01']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/49-R01']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V7-2024']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-2015', 'BSI-DSZ-CC-0891-V3-2018', 'BSI-DSZ-CC-0891-V2-2016', 'BSI-DSZ-CC-0891-V4-2019', 'BSI-DSZ-CC-0891-V6-2021', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0891-V7-2024']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}]} values added.
    • The scheme_data property was set to None.
  • 27.01.2025 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip(MultiApp v4.0.1 with Filter Set 1.0) (ANSSI-CC-2020/42-R01) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2020_42-R01.pdf",
  "dgst": "da1854c6923c5a64",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2020/42-R01",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL5+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "4.0.1",
        "1.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "94167fd161e87d71"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2020/49-R01"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0891-V7-2024"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2020/49-R01"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0891-V3-2018",
          "BSI-DSZ-CC-0891-V7-2024",
          "BSI-DSZ-CC-0891-2015",
          "BSI-DSZ-CC-0891-V4-2019",
          "BSI-DSZ-CC-0782-2012",
          "BSI-DSZ-CC-0891-V2-2016",
          "BSI-DSZ-CC-0891-V6-2021"
        ]
      }
    },
    "scheme_data": {
      "cert_id": "ANSSI-CC-2020/42-R01",
      "description": "Le produit \u00e9valu\u00e9 est \u00ab MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip, MultiApp v4.0.1 with Filter Set 1.0 \u00bb d\u00e9velopp\u00e9 par THALES DIS FRANCE SAS.",
      "developer": "THALES DIS FRANCE SAS",
      "enhanced": {
        "augmented": "ALC_DVS.2, AVA_VAN.5",
        "category": "Cartes \u00e0 puce",
        "cc_version": "Crit\u00e8res Communs version 3.1r5",
        "cert_id": "ANSSI-CC-2020/42-R01",
        "cert_link": "https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2020_42-R01.pdf",
        "certification_date": "2025-01-08",
        "developer": "THALES DIS FRANCE SAS",
        "evaluation_facility": "SERMA SAFETY \u0026 SECURITY",
        "expiration_date": "2030-01-08",
        "level": "EAL5+",
        "mutual_recognition": "CCRA SOG-IS",
        "protection_profile": "Java Card Platform Protection Profile \u2013 Open configuration, version 3.0",
        "report_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2020_42-R01fr.pdf",
        "sponsor": "THALES DIS FRANCE SAS",
        "target_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2020_42-R01en.pdf"
      },
      "expiration_date": "2030-01-08",
      "level": "EAL5+",
      "product": "MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip (MultiApp v4.0.1 with Filter Set 1.0)",
      "sponsor": "THALES DIS FRANCE SAS",
      "url": "https://cyber.gouv.fr/produits-certifies/multiapp-v401-filter-set-10-java-card-open-platform-m7892-g12-chip-multiapp-v401"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0891-V7-2024"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0891-V7-2024"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "THALES DIS FRANCE SA",
  "manufacturer_web": "https://www.thalesgroup.com/en/europe/france",
  "name": "MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip(MultiApp v4.0.1 with Filter Set 1.0) (ANSSI-CC-2020/42-R01)",
  "not_valid_after": "2030-01-08",
  "not_valid_before": "2025-01-08",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "certificat-CC-2020_42-R01.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2020/42-R01": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL5": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "SERMA": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20250110094558+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 pour Word",
      "/Keywords": "",
      "/ModDate": "D:20250110094717+01\u002700\u0027",
      "/Producer": "Adobe PDF Library 23.1.175",
      "pdf_file_size_bytes": 170045,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "ANSSI-CC-2020_42-R01fr.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0891-V7-2024": 2
        },
        "FR": {
          "ANSSI-CC-2020/42-R01": 2,
          "ANSSI-CC-PP-2010/03-M01": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-2010/03-M01": 1
        },
        "BSI": {
          "BSI-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "AGD": {
          "AGD_OPE": 4,
          "AGD_PRE": 2
        },
        "ALC": {
          "ALC_DVS.2": 1,
          "ALC_FLR": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 2,
          "EAL5": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CESTI": {
          "CESTI": 1
        },
        "Serma": {
          "SERMA": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 1
        },
        "Microsoft": {
          "Microsoft": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20250110094638+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 pour Word",
      "/Keywords": "",
      "/ModDate": "D:20250110094716+01\u002700\u0027",
      "/Producer": "Adobe PDF Library 23.1.175",
      "pdf_file_size_bytes": 411309,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "http://www.sogis.eu/",
          "http://www.ssi.gouv.fr/",
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 15
    },
    "st_filename": "ANSSI-cible-CC-2020_42-R01en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 10
          },
          "ECDH": {
            "ECDH": 8
          },
          "ECDSA": {
            "ECDSA": 4
          }
        },
        "FF": {
          "DH": {
            "DH": 11,
            "Diffie-Hellman": 5
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0891-V7-2024": 1
        },
        "FR": {
          "ANSSI-PP-2010/03-M01": 1
        },
        "NL": {
          "CC-1": 2,
          "CC-2": 3,
          "CC-3": 3
        }
      },
      "cc_claims": {
        "A": {
          "A.APPLET": 4,
          "A.DELETION": 4,
          "A.VERIFICATION": 3
        },
        "D": {
          "D.API_DATA": 3,
          "D.APP_CODE": 6,
          "D.APP_C_DATA": 3,
          "D.APP_I_DATA": 4,
          "D.CRYPTO": 5,
          "D.JCS_CODE": 3,
          "D.JCS_DATA": 5,
          "D.PIN": 4,
          "D.SEC_DATA": 7
        },
        "O": {
          "O.ALARM": 14,
          "O.APPLET": 28,
          "O.CARD-MANAGEMENT": 3,
          "O.CARD_MANAGEMENT": 18,
          "O.CIPHER": 10,
          "O.CODE_PCKG": 16,
          "O.CODE_PKG": 7,
          "O.DELETION": 7,
          "O.FIREWALL": 11,
          "O.GLOBAL_ARRAYS_CO": 3,
          "O.GLOBAL_ARRAYS_CONFID": 5,
          "O.GLOBAL_ARRAYS_INT": 3,
          "O.GLOBAL_ARRAYS_INTEG": 4,
          "O.INSTALL": 10,
          "O.JAVAOBJECT": 56,
          "O.KEY-MNGT": 5,
          "O.KEY_MNGT": 4,
          "O.LOAD": 5,
          "O.NATIVE": 10,
          "O.OBJ-DELETION": 3,
          "O.OPERATE": 14,
          "O.PIN-MNGT": 5,
          "O.REALLOCATION": 4,
          "O.RESOURCES": 8,
          "O.RND": 8,
          "O.SCP": 27,
          "O.SID": 12,
          "O.TRANSACTION": 5
        },
        "OE": {
          "OE.APPLET": 4,
          "OE.CODE-EVIDENCE": 9,
          "OE.VERIFICATION": 24
        },
        "OP": {
          "OP.ARRAY_ACCESS": 6,
          "OP.CREATE": 10,
          "OP.DELETE_APPLET": 6,
          "OP.DELETE_PCKG": 4,
          "OP.DELETE_PCKG_APPLET": 4,
          "OP.INSTANCE_FIELD": 6,
          "OP.INVK_INTERFACE": 10,
          "OP.INVK_VIRTUAL": 8,
          "OP.JAVA": 8,
          "OP.PUT": 7,
          "OP.THROW": 7,
          "OP.TYPE_ACCESS": 7
        },
        "OSP": {
          "OSP.ATOMIC_ACTIVATION": 3,
          "OSP.RND": 3,
          "OSP.TOE_IDENTIFICATION": 3,
          "OSP.VERIFICATION": 3
        },
        "OT": {
          "OT.X": 1
        },
        "R": {
          "R.JAVA": 9
        },
        "T": {
          "T.CONFID-APPLI-DATA": 3,
          "T.CONFID-JCS-CODE": 3,
          "T.CONFID-JCS-DATA": 3,
          "T.CONFID_INTEG_SERVICE_DEPLOYEMENT": 3,
          "T.DELETION": 3,
          "T.EXE-CODE": 6,
          "T.INSTALL": 3,
          "T.INTEG-APPLI-CODE": 6,
          "T.INTEG-APPLI-DATA": 6,
          "T.INTEG-JCS-CODE": 3,
          "T.INTEG-JCS-DATA": 3,
          "T.NATIVE": 3,
          "T.OBJ-DELETION": 3,
          "T.PHYSICAL": 3,
          "T.RESOURCES": 3,
          "T.SID": 6,
          "T.WRONG_SERVICE_DEPLOYEMENT_STATE": 3
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0068-V2-2011-MA-01": 1,
          "BSI-CC-PP-0056-V2-2012": 1,
          "BSI-CC-PP-0084-": 1,
          "BSI-PP-0055-": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 9,
          "ADV_FSP": 1,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 2,
          "ADV_FSP.5": 4,
          "ADV_IMP": 1,
          "ADV_IMP.1": 7,
          "ADV_INT.2": 1,
          "ADV_TDS": 1,
          "ADV_TDS.1": 2,
          "ADV_TDS.3": 4,
          "ADV_TDS.4": 7
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 7,
          "AGD_PRE": 1,
          "AGD_PRE.1": 6
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 2,
          "ALC_DVS.2": 7,
          "ALC_LCD.1": 3,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 3
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 2,
          "ATE_DPT.1": 2,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 6,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 6+": 1,
          "EAL5": 6,
          "EAL5 augmented": 2,
          "EAL5+": 2,
          "EAL6": 1,
          "EAL6 augmented": 1,
          "EAL6+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 13,
          "FAU_ARP.1.1": 1,
          "FAU_SAA.1": 2
        },
        "FCO": {
          "FCO_NRO": 5,
          "FCO_NRO.2": 3
        },
        "FCS": {
          "FCS_CKM": 45,
          "FCS_CKM.1": 28,
          "FCS_CKM.1.1": 3,
          "FCS_CKM.2": 10,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.3": 5,
          "FCS_CKM.3.1": 1,
          "FCS_CKM.4": 26,
          "FCS_CKM.4.1": 2,
          "FCS_COP": 28,
          "FCS_COP.1": 27,
          "FCS_COP.1.1": 5,
          "FCS_RND": 14,
          "FCS_RND.1": 10,
          "FCS_RND.1.1": 3
        },
        "FDP": {
          "FDP_ACC": 41,
          "FDP_ACC.1": 18,
          "FDP_ACC.2": 6,
          "FDP_ACF": 37,
          "FDP_ACF.1": 21,
          "FDP_IFC": 20,
          "FDP_IFC.1": 12,
          "FDP_IFC.2": 2,
          "FDP_IFF": 13,
          "FDP_IFF.1": 12,
          "FDP_ITC": 10,
          "FDP_ITC.1": 13,
          "FDP_ITC.2": 18,
          "FDP_RIP": 77,
          "FDP_RIP.1": 10,
          "FDP_RIP.1.1": 1,
          "FDP_ROL": 12,
          "FDP_ROL.1": 2,
          "FDP_SDI.2": 6,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1,
          "FDP_UIT": 5,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_AFL": 21,
          "FIA_AFL.1.1": 2,
          "FIA_AFL.1.2": 2,
          "FIA_ATD": 12,
          "FIA_ATD.1": 3,
          "FIA_SOS.2": 1,
          "FIA_UAI.1": 1,
          "FIA_UAU": 53,
          "FIA_UAU.1": 5,
          "FIA_UAU.1.1": 2,
          "FIA_UAU.1.2": 2,
          "FIA_UAU.4": 1,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6.1": 1,
          "FIA_UID": 31,
          "FIA_UID.1": 19,
          "FIA_UID.1.1": 2,
          "FIA_UID.1.2": 2,
          "FIA_UID.2": 1,
          "FIA_USB": 6,
          "FIA_USB.1": 3
        },
        "FMT": {
          "FMT_LIM": 18,
          "FMT_LIM.1": 15,
          "FMT_LIM.1.1": 3,
          "FMT_LIM.2": 14,
          "FMT_LIM.2.1": 3,
          "FMT_MSA": 78,
          "FMT_MSA.1": 12,
          "FMT_MSA.2": 1,
          "FMT_MSA.3": 18,
          "FMT_MTD": 31,
          "FMT_MTD.1": 9,
          "FMT_MTD.3": 1,
          "FMT_SMF": 56,
          "FMT_SMF.1": 20,
          "FMT_SMF.1.1": 2,
          "FMT_SMR": 71,
          "FMT_SMR.1": 30,
          "FMT_SMR.1.1": 2,
          "FMT_SMR.1.2": 2
        },
        "FPR": {
          "FPR_UNO": 5,
          "FPR_UNO.1": 8,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_EMS": 4,
          "FPT_EMS.1": 12,
          "FPT_EMS.1.1": 3,
          "FPT_EMS.1.2": 3,
          "FPT_FLS": 43,
          "FPT_FLS.1": 14,
          "FPT_FLS.1.1": 1,
          "FPT_ITT": 5,
          "FPT_ITT.1": 1,
          "FPT_PHP": 5,
          "FPT_PHP.3": 12,
          "FPT_PHP.3.1": 1,
          "FPT_RCV": 12,
          "FPT_RCV.3": 4,
          "FPT_RCV.4": 2,
          "FPT_TDC.1": 7,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 1,
          "FPT_TST": 7,
          "FPT_TST.1": 12,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 14,
          "FTP_ITC.1": 5,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP": 7,
          "FTP_TRP.1": 5
        }
      },
      "certification_process": {
        "OutOfScope": {
          "The PACE module to provide PACE secure channel. Note: The Biometry feature of the Javacard API is out of scope of the TOE Applications stored in Flash mask in code area in MultiApp V4.0.1, are outside the TOE": 1,
          "The commands terminal authenticate (TA) and Chip Authenticate (CA) are out of scope of this TOE and are managed at application level": 1,
          "a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are": 1,
          "is an extension of PACE, (The commands terminal authenticate (TA) and Chip Authenticate (CA) are out of scope of this TOE and are managed at application level). GAP provides mutual authentication, secure": 1,
          "out of scope": 3
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "ECB": {
          "ECB": 1
        }
      },
      "cplc_data": {
        "ICFab": {
          "IC Fabricator": 2
        },
        "ICType": {
          "IC Type": 2
        }
      },
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 156
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 3,
          "Key agreement": 2
        },
        "MAC": {
          "MAC": 14
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "Serma Safety \u0026 Security": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA1": 1
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 6,
            "SHA-384": 4,
            "SHA-512": 6
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.DG1": 6,
          "EF.DG16": 6,
          "EF.DG3": 1,
          "EF.DG4": 1,
          "EF.SOD": 1
        }
      },
      "javacard_api_const": {
        "ALG": {
          "AES": {
            "ALG_AES_CMAC_128": 1
          }
        },
        "misc": {
          "TYPE_ACCESS": 7
        }
      },
      "javacard_packages": {
        "javacard": {
          "javacard.framework": 2
        }
      },
      "javacard_version": {
        "JavaCard": {
          "Java Card 2.2.2": 3,
          "Java Card 3.0.4": 8
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 1
        },
        "RNG": {
          "RND": 11,
          "RNG": 12
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 3,
          "Physical Tampering": 3,
          "fault induction": 2,
          "malfunction": 8,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 2,
          "SPA": 1,
          "physical probing": 5,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 4
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS 197": 1,
          "FIPS 46-3": 1,
          "FIPS180-2": 1,
          "FIPS197": 5
        },
        "ICAO": {
          "ICAO": 3
        },
        "NIST": {
          "SP 800-67": 1
        },
        "PKCS": {
          "PKCS#1": 7,
          "PKCS#3": 1,
          "PKCS#5": 5
        },
        "SCP": {
          "SCP01": 4,
          "SCP02": 4,
          "SCP03": 7
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 31
          }
        },
        "DES": {
          "3DES": {
            "3DES": 2,
            "TDEA": 1,
            "TDES": 14,
            "Triple-DES": 3
          },
          "DES": {
            "DES": 20
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 3,
            "HMAC": 3,
            "KMAC": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 2
        },
        "Infineon": {
          "Infineon": 12
        },
        "Thales": {
          "Thales": 10
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "OHAYON Franck",
      "/CreationDate": "D:20241127180125+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/Keywords": "Security Target, CC",
      "/ModDate": "D:20241127180125+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "/Subject": "Security Target",
      "/Title": "MultiApp v4.0.1 Javacard Platform with Filter Set 1.0",
      "pdf_file_size_bytes": 2361844,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 122
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099b_pdf.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2020_42-R01fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL5+",
      "AVA_VAN.5",
      "ALC_DVS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2020_42-R01en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "721fe399a0bba91268e61766ab91b0266fe8d2c020a9532d591e2ebc3f2bb763",
      "txt_hash": "1ad1b0f03e32c52a58626203e075f5db8a6ad1d03a798981b2cb2268399ecb23"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e7707eebe301c926f4dcfeb7c76a430569b0c738cd3db86c9b588cd8928871cd",
      "txt_hash": "10be943e428f309489a3580deea676176521dd08af6b3e62da5e7366049922e2"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "c57bdf1ff342f5a2e34e297ab5763540520b9c11e3b6fc86c3a5fac69f06d20b",
      "txt_hash": "95f9d00426d5f658e43d35f85095d2458d7d2e4d2e33b596123e73f742d950e2"
    }
  },
  "status": "active"
}