This page was not yet optimized for use on mobile devices.
MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip(MultiApp v4.0.1 with Filter Set 1.0) (ANSSI-CC-2020/42-R01)
CSV information ?
Status | active |
---|---|
Valid from | 08.01.2025 |
Valid until | 08.01.2030 |
Scheme | 🇫🇷 FR |
Manufacturer | THALES DIS FRANCE SA |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | ALC_DVS.2, EAL5+, AVA_VAN.5 |
Protection profiles |
Heuristics summary ?
Certificate ID: ANSSI-CC-2020/42-R01
Certificate ?
Extracted keywords
Security level
EAL5, EAL2Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5Certificates
ANSSI-CC-2020/42-R01Evaluation facilities
SERMAFile metadata
Creation date | D:20250110094558+01'00' |
---|---|
Modification date | D:20250110094717+01'00' |
Pages | 2 |
Creator | Acrobat PDFMaker 23 pour Word |
Producer | Adobe PDF Library 23.1.175 |
Certification report ?
Extracted keywords
Symmetric Algorithms
DESVendor
Gemalto, MicrosoftSecurity level
EAL5, EAL2, EAL7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, AVA_VAN.5, AVA_VANProtection profiles
BSI-PP-0084-2014, ANSSI-CC-PP-2010/03-M01Certificates
BSI-DSZ-CC-0891-V7-2024, ANSSI-CC-2020/42-R01, ANSSI-CC-PP-2010/03-M01Evaluation facilities
SERMA, CESTIStandards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
Creation date | D:20250110094638+01'00' |
---|---|
Modification date | D:20250110094716+01'00' |
Pages | 15 |
Creator | Acrobat PDFMaker 23 pour Word |
Producer | Adobe PDF Library 23.1.175 |
References
Outgoing- BSI-DSZ-CC-0891-V7-2024 - active - M7892 Design Step G12, with specific IC dedicated firmware
- ANSSI-CC-2020/49-R01 - active - Digital Identity on MultiApp v4.0.1 platform with Filter Set 1.0 - PACE, EAC(version 1.0)
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, TDEA, 3DES, TDES, Triple-DES, HMAC, KMAC, CMACAsymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DHHash functions
SHA1, SHA-224, SHA-256, SHA-512, SHA-384Schemes
MAC, Key Agreement, Key agreementProtocols
PACERandomness
PRNG, RNG, RNDBlock cipher modes
ECB, CBCJavaCard versions
Java Card 2.2.2, Java Card 3.0.4JavaCard API constants
ALG_AES_CMAC_128, TYPE_ACCESSCPLC
IC Fabricator, IC TypeIC data groups
EF.DG1, EF.DG16, EF.DG3, EF.DG4, EF.SODVendor
Infineon, Gemalto, ThalesSecurity level
EAL5+, EAL6, EAL6+, EAL5, EAL 6+, EAL6 augmented, EAL5 augmentedClaims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.SCP, O.CARD-MANAGEMENT, O.RND, O.KEY_MNGT, O.CARD_MANAGEMENT, O.APPLET, O.CODE_PKG, O.JAVAOBJECT, O.CODE_PCKG, O.GLOBAL_ARRAYS_CO, O.GLOBAL_ARRAYS_INT, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, T.WRONG_SERVICE_DEPLOYEMENT_STATE, T.CONFID_INTEG_SERVICE_DEPLOYEMENT, A.APPLET, A.DELETION, A.VERIFICATION, R.JAVA, OT.X, OP.ARRAY_ACCESS, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUT, OE.VERIFICATION, OE.APPLET, OE.CODE-EVIDENCE, OSP.VERIFICATION, OSP.RND, OSP.ATOMIC_ACTIVATION, OSP.TOE_IDENTIFICATIONSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_TDS.1, ADV_TDS.4, ADV_IMP.1, ADV_TDS.3, ADV_INT.2, ADV_FSP.5, ADV_FSP.1, ADV_FSP.2, ADV_FSP.4, ADV_ARC, ADV_FSP, ADV_IMP, ADV_TDS, AGD_PRE, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_DVS.1, ALC_LCD.1, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_IND.2, ATE_DPT.1, ATE_DPT.3, AVA_VAN.5Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FCO_NRO, FCO_NRO.2, FCS_RND, FCS_CKM, FCS_COP.1, FCS_COP, FCS_RND.1, FCS_CKM.1, FCS_RND.1.1, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.2.1, FCS_CKM.3, FCS_CKM.3.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1.1, FDP_ACF, FDP_ACC, FDP_ACC.2, FDP_ACF.1, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ROL, FDP_ROL.1, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FDP_ACC.1, FDP_ITC.1, FDP_RIP.1.1, FIA_AFL, FIA_SOS.2, FIA_ATD, FIA_ATD.1, FIA_UID, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_UAU, FIA_UAI.1, FIA_UAU.1, FIA_UID.1, FIA_UAU.4, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMR, FMT_SMR.1, FMT_SMF, FMT_SMF.1, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPR_UNO.1, FPR_UNO.1.1, FPR_UNO, FPT_EMS, FPT_TST, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS, FPT_FLS.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_RCV, FPT_RCV.3, FPT_TST.1, FPT_PHP, FPT_PHP.3, FPT_RCV.4, FPT_ITT, FPT_ITT.1, FPT_FLS.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3.1, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP, FTP_TRP.1Protection profiles
BSI-CC-PP-0084-, BSI-CC-PP- 0068-V2-2011-MA-01, BSI-CC-PP-0056-V2-2012, BSI-PP-0055-Certificates
BSI-DSZ-CC-0891-V7-2024, ANSSI-PP-2010/03-M01, CC-1, CC-2, CC-3Evaluation facilities
Serma Safety & SecuritySide-channel analysis
physical probing, DPA, SPA, timing attacks, physical tampering, Physical Tampering, malfunction, Malfunction, fault inductionCertification process
out of scope, The commands terminal authenticate (TA) and Chip Authenticate (CA) are out of scope of this TOE and are managed at application level, The PACE module to provide PACE secure channel. Note: The Biometry feature of the Javacard API is out of scope of the TOE Applications stored in Flash mask in code area in MultiApp V4.0.1, are outside the TOE, is an extension of PACE, (The commands terminal authenticate (TA) and Chip Authenticate (CA) are out of scope of this TOE and are managed at application level). GAP provides mutual authentication, secure, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT areStandards
FIPS180-2, FIPS197, FIPS 46-3, FIPS 197, SP 800-67, PKCS#3, PKCS#1, PKCS#5, AIS31, ICAO, SCP03, SCP01, SCP02, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
Title | MultiApp v4.0.1 Javacard Platform with Filter Set 1.0 |
---|---|
Subject | Security Target |
Keywords | Security Target, CC |
Author | OHAYON Franck |
Creation date | D:20241127180125+01'00' |
Modification date | D:20241127180125+01'00' |
Pages | 122 |
Creator | Microsoft® Word for Microsoft 365 |
Producer | Microsoft® Word for Microsoft 365 |
References
Outgoing- BSI-DSZ-CC-0891-V7-2024 - active - M7892 Design Step G12, with specific IC dedicated firmware
Heuristics ?
Certificate ID: ANSSI-CC-2020/42-R01
Extracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.2, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Similar certificates
Showing 5 out of 51.
Scheme data ?
Product | MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip (MultiApp v4.0.1 with Filter Set 1.0) | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/multiapp-v401-filter-set-10-java-card-open-platform-m7892-g12-chip-multiapp-v401 | |
Description | Le produit évalué est « MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip, MultiApp v4.0.1 with Filter Set 1.0 » développé par THALES DIS FRANCE SAS. | |
Sponsor | THALES DIS FRANCE SAS | |
Developer | THALES DIS FRANCE SAS | |
Cert Id | ANSSI-CC-2020/42-R01 | |
Level | EAL5+ | |
Expiration Date | 08.01.2030 | |
Enhanced | ||
Cert Id | ANSSI-CC-2020/42-R01 | |
Certification Date | 08.01.2025 | |
Expiration Date | 08.01.2030 | |
Category | Cartes à puce | |
Cc Version | Critères Communs version 3.1r5 | |
Developer | THALES DIS FRANCE SAS | |
Sponsor | THALES DIS FRANCE SAS | |
Evaluation Facility | SERMA SAFETY & SECURITY | |
Level | EAL5+ | |
Protection Profile | Java Card Platform Protection Profile – Open configuration, version 3.0 | |
Mutual Recognition | CCRA SOG-IS | |
Augmented | ALC_DVS.2, AVA_VAN.5 | |
Report Link | https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2020_42-R01fr.pdf | |
Target Link | https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2020_42-R01en.pdf | |
Cert Link | https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2020_42-R01.pdf |
References ?
Updates ?
-
05.02.2025 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The st property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The cert property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data.
The computed heuristics were updated.
- The following values were inserted:
{'protection_profiles': {'_type': 'Set', 'elements': ['94167fd161e87d71']}, 'eal': 'EAL5+'}
. - The prev_certificates property was set to
None
. - The next_certificates property was set to
None
. - The scheme_data property was set to
{'product': 'MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip (MultiApp v4.0.1 with Filter Set 1.0)', 'url': 'https://cyber.gouv.fr/produits-certifies/multiapp-v401-filter-set-10-java-card-open-platform-m7892-g12-chip-multiapp-v401', 'description': 'Le produit évalué est « MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip, MultiApp v4.0.1 with Filter Set 1.0 » développé par THALES DIS FRANCE SAS.', 'sponsor': 'THALES DIS FRANCE SAS', 'developer': 'THALES DIS FRANCE SAS', 'cert_id': 'ANSSI-CC-2020/42-R01', 'level': 'EAL5+', 'expiration_date': '2030-01-08', 'enhanced': {'cert_id': 'ANSSI-CC-2020/42-R01', 'certification_date': '2025-01-08', 'expiration_date': '2030-01-08', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'THALES DIS FRANCE SAS', 'sponsor': 'THALES DIS FRANCE SAS', 'evaluation_facility': 'SERMA SAFETY & SECURITY', 'level': 'EAL5+', 'protection_profile': 'Java Card Platform Protection Profile – Open configuration, version 3.0', 'mutual_recognition': 'CCRA SOG-IS', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2020_42-R01fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2020_42-R01en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2020_42-R01.pdf'}}
.
- The report property was updated, with the
-
03.02.2025 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e7707eebe301c926f4dcfeb7c76a430569b0c738cd3db86c9b588cd8928871cd', 'txt_hash': '10be943e428f309489a3580deea676176521dd08af6b3e62da5e7366049922e2'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'c57bdf1ff342f5a2e34e297ab5763540520b9c11e3b6fc86c3a5fac69f06d20b', 'txt_hash': '95f9d00426d5f658e43d35f85095d2458d7d2e4d2e33b596123e73f742d950e2'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '721fe399a0bba91268e61766ab91b0266fe8d2c020a9532d591e2ebc3f2bb763', 'txt_hash': '1ad1b0f03e32c52a58626203e075f5db8a6ad1d03a798981b2cb2268399ecb23'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 411309, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 15, '/CreationDate': "D:20250110094638+01'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20250110094716+01'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ssi.gouv.fr/', 'mailto:[email protected]', 'http://www.commoncriteriaportal.org/', 'http://www.sogis.eu/']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 2361844, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 122, '/Title': 'MultiApp v4.0.1 Javacard Platform with Filter Set 1.0', '/Author': 'OHAYON Franck', '/Subject': 'Security Target', '/Keywords': 'Security Target, CC', '/Creator': 'Microsoft® Word for Microsoft 365', '/CreationDate': "D:20241127180125+01'00'", '/ModDate': "D:20241127180125+01'00'", '/Producer': 'Microsoft® Word for Microsoft 365', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 170045, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/CreationDate': "D:20250110094558+01'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20250110094717+01'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'FR': {}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0891-V7-2024': 2}, 'FR': {'ANSSI-CC-2020/42-R01': 2, 'ANSSI-CC-PP-2010/03-M01': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0084-2014': 1}, 'ANSSI': {'ANSSI-CC-PP-2010/03-M01': 1}}, 'cc_security_level': {'EAL': {'EAL5': 1, 'EAL2': 2, 'EAL7': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'AGD': {'AGD_OPE': 4, 'AGD_PRE': 2}, 'ALC': {'ALC_DVS.2': 1, 'ALC_FLR': 1}, 'AVA': {'AVA_VAN.5': 1, 'AVA_VAN': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Gemalto': {'Gemalto': 1}, 'Microsoft': {'Microsoft': 1}}, 'eval_facility': {'Serma': {'SERMA': 1}, 'CESTI': {'CESTI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0891-V7-2024': 1}, 'FR': {'ANSSI-PP-2010/03-M01': 1}, 'NL': {'CC-1': 2, 'CC-2': 3, 'CC-3': 3}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-': 1, 'BSI-CC-PP- 0068-V2-2011-MA-01': 1, 'BSI-CC-PP-0056-V2-2012': 1, 'BSI-PP-0055-': 1}}, 'cc_security_level': {'EAL': {'EAL5+': 2, 'EAL6': 1, 'EAL6+': 1, 'EAL5': 6, 'EAL 6+': 1, 'EAL6 augmented': 1, 'EAL5 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 9, 'ADV_TDS.1': 2, 'ADV_TDS.4': 7, 'ADV_IMP.1': 7, 'ADV_TDS.3': 4, 'ADV_INT.2': 1, 'ADV_FSP.5': 4, 'ADV_FSP.1': 1, 'ADV_FSP.2': 2, 'ADV_FSP.4': 2, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_PRE': 1, 'AGD_OPE': 1, 'AGD_OPE.1': 7, 'AGD_PRE.1': 6}, 'ALC': {'ALC_DVS.2': 7, 'ALC_TAT.1': 2, 'ALC_TAT.2': 3, 'ALC_CMC.4': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 3, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.2': 2, 'ATE_FUN.1': 6, 'ATE_COV.1': 2, 'ATE_IND.2': 1, 'ATE_DPT.1': 2, 'ATE_DPT.3': 1}, 'AVA': {'AVA_VAN.5': 7}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 13, 'FAU_ARP.1.1': 1, 'FAU_SAA.1': 2}, 'FCO': {'FCO_NRO': 5, 'FCO_NRO.2': 3}, 'FCS': {'FCS_RND': 14, 'FCS_CKM': 45, 'FCS_COP.1': 27, 'FCS_COP': 28, 'FCS_RND.1': 10, 'FCS_CKM.1': 28, 'FCS_RND.1.1': 3, 'FCS_CKM.1.1': 3, 'FCS_CKM.2': 10, 'FCS_CKM.2.1': 1, 'FCS_CKM.3': 5, 'FCS_CKM.3.1': 1, 'FCS_CKM.4': 26, 'FCS_CKM.4.1': 2, 'FCS_COP.1.1': 5}, 'FDP': {'FDP_ACF': 37, 'FDP_ACC': 41, 'FDP_ACC.2': 6, 'FDP_ACF.1': 21, 'FDP_IFC': 20, 'FDP_IFC.1': 12, 'FDP_IFF': 13, 'FDP_IFF.1': 12, 'FDP_RIP': 77, 'FDP_RIP.1': 10, 'FDP_ROL': 12, 'FDP_ROL.1': 2, 'FDP_SDI.2': 6, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITC': 10, 'FDP_ITC.2': 18, 'FDP_IFC.2': 2, 'FDP_UIT': 5, 'FDP_UIT.1': 2, 'FDP_ACC.1': 18, 'FDP_ITC.1': 13, 'FDP_RIP.1.1': 1}, 'FIA': {'FIA_AFL': 21, 'FIA_SOS.2': 1, 'FIA_ATD': 12, 'FIA_ATD.1': 3, 'FIA_UID': 31, 'FIA_UID.2': 1, 'FIA_USB': 6, 'FIA_USB.1': 3, 'FIA_UAU': 53, 'FIA_UAI.1': 1, 'FIA_UAU.1': 5, 'FIA_UID.1': 19, 'FIA_UAU.4': 1, 'FIA_AFL.1.1': 2, 'FIA_AFL.1.2': 2, 'FIA_UID.1.1': 2, 'FIA_UID.1.2': 2, 'FIA_UAU.1.1': 2, 'FIA_UAU.1.2': 2, 'FIA_UAU.4.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6.1': 1}, 'FMT': {'FMT_LIM': 18, 'FMT_LIM.1': 15, 'FMT_LIM.2': 14, 'FMT_LIM.1.1': 3, 'FMT_LIM.2.1': 3, 'FMT_MSA': 78, 'FMT_MSA.1': 12, 'FMT_MSA.2': 1, 'FMT_MSA.3': 18, 'FMT_SMR': 71, 'FMT_SMR.1': 30, 'FMT_SMF': 56, 'FMT_SMF.1': 20, 'FMT_MTD': 31, 'FMT_MTD.1': 9, 'FMT_MTD.3': 1, 'FMT_SMF.1.1': 2, 'FMT_SMR.1.1': 2, 'FMT_SMR.1.2': 2}, 'FPR': {'FPR_UNO.1': 8, 'FPR_UNO.1.1': 1, 'FPR_UNO': 5}, 'FPT': {'FPT_EMS': 4, 'FPT_TST': 7, 'FPT_EMS.1': 12, 'FPT_EMS.1.1': 3, 'FPT_EMS.1.2': 3, 'FPT_FLS': 43, 'FPT_FLS.1': 14, 'FPT_TDC.1': 7, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_RCV': 12, 'FPT_RCV.3': 4, 'FPT_TST.1': 12, 'FPT_PHP': 5, 'FPT_PHP.3': 12, 'FPT_RCV.4': 2, 'FPT_ITT': 5, 'FPT_ITT.1': 1, 'FPT_FLS.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_PHP.3.1': 1}, 'FTP': {'FTP_ITC': 14, 'FTP_ITC.1': 5, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP': 7, 'FTP_TRP.1': 5}}, 'cc_claims': {'D': {'D.APP_CODE': 6, 'D.APP_C_DATA': 3, 'D.APP_I_DATA': 4, 'D.PIN': 4, 'D.API_DATA': 3, 'D.CRYPTO': 5, 'D.JCS_CODE': 3, 'D.JCS_DATA': 5, 'D.SEC_DATA': 7}, 'O': {'O.SID': 12, 'O.FIREWALL': 11, 'O.GLOBAL_ARRAYS_CONFID': 5, 'O.GLOBAL_ARRAYS_INTEG': 4, 'O.NATIVE': 10, 'O.OPERATE': 14, 'O.REALLOCATION': 4, 'O.RESOURCES': 8, 'O.ALARM': 14, 'O.CIPHER': 10, 'O.KEY-MNGT': 5, 'O.PIN-MNGT': 5, 'O.TRANSACTION': 5, 'O.OBJ-DELETION': 3, 'O.DELETION': 7, 'O.LOAD': 5, 'O.INSTALL': 10, 'O.SCP': 27, 'O.CARD-MANAGEMENT': 3, 'O.RND': 8, 'O.KEY_MNGT': 4, 'O.CARD_MANAGEMENT': 18, 'O.APPLET': 28, 'O.CODE_PKG': 7, 'O.JAVAOBJECT': 56, 'O.CODE_PCKG': 16, 'O.GLOBAL_ARRAYS_CO': 3, 'O.GLOBAL_ARRAYS_INT': 3}, 'T': {'T.CONFID-APPLI-DATA': 3, 'T.CONFID-JCS-CODE': 3, 'T.CONFID-JCS-DATA': 3, 'T.INTEG-APPLI-CODE': 6, 'T.INTEG-APPLI-DATA': 6, 'T.INTEG-JCS-CODE': 3, 'T.INTEG-JCS-DATA': 3, 'T.SID': 6, 'T.EXE-CODE': 6, 'T.NATIVE': 3, 'T.RESOURCES': 3, 'T.DELETION': 3, 'T.INSTALL': 3, 'T.OBJ-DELETION': 3, 'T.PHYSICAL': 3, 'T.WRONG_SERVICE_DEPLOYEMENT_STATE': 3, 'T.CONFID_INTEG_SERVICE_DEPLOYEMENT': 3}, 'A': {'A.APPLET': 4, 'A.DELETION': 4, 'A.VERIFICATION': 3}, 'R': {'R.JAVA': 9}, 'OT': {'OT.X': 1}, 'OP': {'OP.ARRAY_ACCESS': 6, 'OP.CREATE': 10, 'OP.DELETE_APPLET': 6, 'OP.DELETE_PCKG': 4, 'OP.DELETE_PCKG_APPLET': 4, 'OP.INSTANCE_FIELD': 6, 'OP.INVK_VIRTUAL': 8, 'OP.INVK_INTERFACE': 10, 'OP.JAVA': 8, 'OP.THROW': 7, 'OP.TYPE_ACCESS': 7, 'OP.PUT': 7}, 'OE': {'OE.VERIFICATION': 24, 'OE.APPLET': 4, 'OE.CODE-EVIDENCE': 9}, 'OSP': {'OSP.VERIFICATION': 3, 'OSP.RND': 3, 'OSP.ATOMIC_ACTIVATION': 3, 'OSP.TOE_IDENTIFICATION': 3}}, 'vendor': {'Infineon': {'Infineon': 12}, 'Gemalto': {'Gemalto': 2}, 'Thales': {'Thales': 10}}, 'eval_facility': {'Serma': {'Serma Safety & Security': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 31}}, 'DES': {'DES': {'DES': 20}, '3DES': {'TDEA': 1, '3DES': 2, 'TDES': 14, 'Triple-DES': 3}}, 'constructions': {'MAC': {'HMAC': 3, 'KMAC': 2, 'CMAC': 3}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 8}, 'ECDSA': {'ECDSA': 4}, 'ECC': {'ECC': 10}}, 'FF': {'DH': {'Diffie-Hellman': 5, 'DH': 11}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 1}, 'SHA2': {'SHA-224': 1, 'SHA-256': 6, 'SHA-512': 6, 'SHA-384': 4}}}, 'crypto_scheme': {'MAC': {'MAC': 14}, 'KA': {'Key Agreement': 3, 'Key agreement': 2}}, 'crypto_protocol': {'PACE': {'PACE': 156}}, 'randomness': {'PRNG': {'PRNG': 1}, 'RNG': {'RNG': 12, 'RND': 11}}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 5, 'DPA': 2, 'SPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 1, 'Physical Tampering': 3, 'malfunction': 8, 'Malfunction': 3, 'fault induction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {'ICFab': {'IC Fabricator': 2}, 'ICType': {'IC Type': 2}}, 'ic_data_group': {'EF': {'EF.DG1': 6, 'EF.DG16': 6, 'EF.DG3': 1, 'EF.DG4': 1, 'EF.SOD': 1}}, 'standard_id': {'FIPS': {'FIPS180-2': 1, 'FIPS197': 5, 'FIPS 46-3': 1, 'FIPS 197': 1}, 'NIST': {'SP 800-67': 1}, 'PKCS': {'PKCS#3': 1, 'PKCS#1': 7, 'PKCS#5': 5}, 'BSI': {'AIS31': 4}, 'ICAO': {'ICAO': 3}, 'SCP': {'SCP03': 7, 'SCP01': 4, 'SCP02': 4}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.2': 3, 'Java Card 3.0.4': 8}}, 'javacard_api_const': {'ALG': {'AES': {'ALG_AES_CMAC_128': 1}}, 'misc': {'TYPE_ACCESS': 7}}, 'javacard_packages': {'javacard': {'javacard.framework': 2}}, 'certification_process': {'OutOfScope': {'out of scope': 3, 'The commands terminal authenticate (TA) and Chip Authenticate (CA) are out of scope of this TOE and are managed at application level': 1, 'The PACE module to provide PACE secure channel. Note: The Biometry feature of the Javacard API is out of scope of the TOE Applications stored in Flash mask in code area in MultiApp V4.0.1, are outside the TOE': 1, 'is an extension of PACE, (The commands terminal authenticate (TA) and Chip Authenticate (CA) are out of scope of this TOE and are managed at application level). GAP provides mutual authentication, secure': 1, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are': 1}}}
. - The cert_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2020/42-R01': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL5': 1, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Serma': {'SERMA': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
ANSSI-CC-2020_42-R01fr.pdf
. - The st_filename property was set to
ANSSI-cible-CC-2020_42-R01en.pdf
. - The cert_filename property was set to
certificat-CC-2020_42-R01.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
ANSSI-CC-2020/42-R01
. - The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V7-2024']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V7-2024']}}
data. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/49-R01']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/49-R01']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V7-2024']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-2015', 'BSI-DSZ-CC-0891-V3-2018', 'BSI-DSZ-CC-0891-V2-2016', 'BSI-DSZ-CC-0891-V4-2019', 'BSI-DSZ-CC-0891-V6-2021', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0891-V7-2024']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}]}
values added. - The scheme_data property was set to
None
.
- The report property was updated, with the
-
27.01.2025 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip(MultiApp v4.0.1 with Filter Set 1.0) (ANSSI-CC-2020/42-R01) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2020_42-R01.pdf",
"dgst": "da1854c6923c5a64",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2020/42-R01",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL5+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"4.0.1",
"1.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"94167fd161e87d71"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2020/49-R01"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0891-V7-2024"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2020/49-R01"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0891-V3-2018",
"BSI-DSZ-CC-0891-V7-2024",
"BSI-DSZ-CC-0891-2015",
"BSI-DSZ-CC-0891-V4-2019",
"BSI-DSZ-CC-0782-2012",
"BSI-DSZ-CC-0891-V2-2016",
"BSI-DSZ-CC-0891-V6-2021"
]
}
},
"scheme_data": {
"cert_id": "ANSSI-CC-2020/42-R01",
"description": "Le produit \u00e9valu\u00e9 est \u00ab MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip, MultiApp v4.0.1 with Filter Set 1.0 \u00bb d\u00e9velopp\u00e9 par THALES DIS FRANCE SAS.",
"developer": "THALES DIS FRANCE SAS",
"enhanced": {
"augmented": "ALC_DVS.2, AVA_VAN.5",
"category": "Cartes \u00e0 puce",
"cc_version": "Crit\u00e8res Communs version 3.1r5",
"cert_id": "ANSSI-CC-2020/42-R01",
"cert_link": "https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2020_42-R01.pdf",
"certification_date": "2025-01-08",
"developer": "THALES DIS FRANCE SAS",
"evaluation_facility": "SERMA SAFETY \u0026 SECURITY",
"expiration_date": "2030-01-08",
"level": "EAL5+",
"mutual_recognition": "CCRA SOG-IS",
"protection_profile": "Java Card Platform Protection Profile \u2013 Open configuration, version 3.0",
"report_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2020_42-R01fr.pdf",
"sponsor": "THALES DIS FRANCE SAS",
"target_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2020_42-R01en.pdf"
},
"expiration_date": "2030-01-08",
"level": "EAL5+",
"product": "MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip (MultiApp v4.0.1 with Filter Set 1.0)",
"sponsor": "THALES DIS FRANCE SAS",
"url": "https://cyber.gouv.fr/produits-certifies/multiapp-v401-filter-set-10-java-card-open-platform-m7892-g12-chip-multiapp-v401"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0891-V7-2024"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0891-V7-2024"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "THALES DIS FRANCE SA",
"manufacturer_web": "https://www.thalesgroup.com/en/europe/france",
"name": "MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip(MultiApp v4.0.1 with Filter Set 1.0) (ANSSI-CC-2020/42-R01)",
"not_valid_after": "2030-01-08",
"not_valid_before": "2025-01-08",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "certificat-CC-2020_42-R01.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2020/42-R01": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL5": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"SERMA": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20250110094558+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 23 pour Word",
"/Keywords": "",
"/ModDate": "D:20250110094717+01\u002700\u0027",
"/Producer": "Adobe PDF Library 23.1.175",
"pdf_file_size_bytes": 170045,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"report_filename": "ANSSI-CC-2020_42-R01fr.pdf",
"report_frontpage": {
"FR": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0891-V7-2024": 2
},
"FR": {
"ANSSI-CC-2020/42-R01": 2,
"ANSSI-CC-PP-2010/03-M01": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2010/03-M01": 1
},
"BSI": {
"BSI-PP-0084-2014": 1
}
},
"cc_sar": {
"AGD": {
"AGD_OPE": 4,
"AGD_PRE": 2
},
"ALC": {
"ALC_DVS.2": 1,
"ALC_FLR": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 2,
"EAL5": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CESTI": {
"CESTI": 1
},
"Serma": {
"SERMA": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 1
},
"Microsoft": {
"Microsoft": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20250110094638+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 23 pour Word",
"/Keywords": "",
"/ModDate": "D:20250110094716+01\u002700\u0027",
"/Producer": "Adobe PDF Library 23.1.175",
"pdf_file_size_bytes": 411309,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"http://www.sogis.eu/",
"http://www.ssi.gouv.fr/",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 15
},
"st_filename": "ANSSI-cible-CC-2020_42-R01en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 10
},
"ECDH": {
"ECDH": 8
},
"ECDSA": {
"ECDSA": 4
}
},
"FF": {
"DH": {
"DH": 11,
"Diffie-Hellman": 5
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0891-V7-2024": 1
},
"FR": {
"ANSSI-PP-2010/03-M01": 1
},
"NL": {
"CC-1": 2,
"CC-2": 3,
"CC-3": 3
}
},
"cc_claims": {
"A": {
"A.APPLET": 4,
"A.DELETION": 4,
"A.VERIFICATION": 3
},
"D": {
"D.API_DATA": 3,
"D.APP_CODE": 6,
"D.APP_C_DATA": 3,
"D.APP_I_DATA": 4,
"D.CRYPTO": 5,
"D.JCS_CODE": 3,
"D.JCS_DATA": 5,
"D.PIN": 4,
"D.SEC_DATA": 7
},
"O": {
"O.ALARM": 14,
"O.APPLET": 28,
"O.CARD-MANAGEMENT": 3,
"O.CARD_MANAGEMENT": 18,
"O.CIPHER": 10,
"O.CODE_PCKG": 16,
"O.CODE_PKG": 7,
"O.DELETION": 7,
"O.FIREWALL": 11,
"O.GLOBAL_ARRAYS_CO": 3,
"O.GLOBAL_ARRAYS_CONFID": 5,
"O.GLOBAL_ARRAYS_INT": 3,
"O.GLOBAL_ARRAYS_INTEG": 4,
"O.INSTALL": 10,
"O.JAVAOBJECT": 56,
"O.KEY-MNGT": 5,
"O.KEY_MNGT": 4,
"O.LOAD": 5,
"O.NATIVE": 10,
"O.OBJ-DELETION": 3,
"O.OPERATE": 14,
"O.PIN-MNGT": 5,
"O.REALLOCATION": 4,
"O.RESOURCES": 8,
"O.RND": 8,
"O.SCP": 27,
"O.SID": 12,
"O.TRANSACTION": 5
},
"OE": {
"OE.APPLET": 4,
"OE.CODE-EVIDENCE": 9,
"OE.VERIFICATION": 24
},
"OP": {
"OP.ARRAY_ACCESS": 6,
"OP.CREATE": 10,
"OP.DELETE_APPLET": 6,
"OP.DELETE_PCKG": 4,
"OP.DELETE_PCKG_APPLET": 4,
"OP.INSTANCE_FIELD": 6,
"OP.INVK_INTERFACE": 10,
"OP.INVK_VIRTUAL": 8,
"OP.JAVA": 8,
"OP.PUT": 7,
"OP.THROW": 7,
"OP.TYPE_ACCESS": 7
},
"OSP": {
"OSP.ATOMIC_ACTIVATION": 3,
"OSP.RND": 3,
"OSP.TOE_IDENTIFICATION": 3,
"OSP.VERIFICATION": 3
},
"OT": {
"OT.X": 1
},
"R": {
"R.JAVA": 9
},
"T": {
"T.CONFID-APPLI-DATA": 3,
"T.CONFID-JCS-CODE": 3,
"T.CONFID-JCS-DATA": 3,
"T.CONFID_INTEG_SERVICE_DEPLOYEMENT": 3,
"T.DELETION": 3,
"T.EXE-CODE": 6,
"T.INSTALL": 3,
"T.INTEG-APPLI-CODE": 6,
"T.INTEG-APPLI-DATA": 6,
"T.INTEG-JCS-CODE": 3,
"T.INTEG-JCS-DATA": 3,
"T.NATIVE": 3,
"T.OBJ-DELETION": 3,
"T.PHYSICAL": 3,
"T.RESOURCES": 3,
"T.SID": 6,
"T.WRONG_SERVICE_DEPLOYEMENT_STATE": 3
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0068-V2-2011-MA-01": 1,
"BSI-CC-PP-0056-V2-2012": 1,
"BSI-CC-PP-0084-": 1,
"BSI-PP-0055-": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 9,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 2,
"ADV_FSP.4": 2,
"ADV_FSP.5": 4,
"ADV_IMP": 1,
"ADV_IMP.1": 7,
"ADV_INT.2": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 2,
"ADV_TDS.3": 4,
"ADV_TDS.4": 7
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 7,
"AGD_PRE": 1,
"AGD_PRE.1": 6
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 2,
"ALC_DVS.2": 7,
"ALC_LCD.1": 3,
"ALC_TAT.1": 2,
"ALC_TAT.2": 3
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 2,
"ATE_DPT.1": 2,
"ATE_DPT.3": 1,
"ATE_FUN.1": 6,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 7
}
},
"cc_security_level": {
"EAL": {
"EAL 6+": 1,
"EAL5": 6,
"EAL5 augmented": 2,
"EAL5+": 2,
"EAL6": 1,
"EAL6 augmented": 1,
"EAL6+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 13,
"FAU_ARP.1.1": 1,
"FAU_SAA.1": 2
},
"FCO": {
"FCO_NRO": 5,
"FCO_NRO.2": 3
},
"FCS": {
"FCS_CKM": 45,
"FCS_CKM.1": 28,
"FCS_CKM.1.1": 3,
"FCS_CKM.2": 10,
"FCS_CKM.2.1": 1,
"FCS_CKM.3": 5,
"FCS_CKM.3.1": 1,
"FCS_CKM.4": 26,
"FCS_CKM.4.1": 2,
"FCS_COP": 28,
"FCS_COP.1": 27,
"FCS_COP.1.1": 5,
"FCS_RND": 14,
"FCS_RND.1": 10,
"FCS_RND.1.1": 3
},
"FDP": {
"FDP_ACC": 41,
"FDP_ACC.1": 18,
"FDP_ACC.2": 6,
"FDP_ACF": 37,
"FDP_ACF.1": 21,
"FDP_IFC": 20,
"FDP_IFC.1": 12,
"FDP_IFC.2": 2,
"FDP_IFF": 13,
"FDP_IFF.1": 12,
"FDP_ITC": 10,
"FDP_ITC.1": 13,
"FDP_ITC.2": 18,
"FDP_RIP": 77,
"FDP_RIP.1": 10,
"FDP_RIP.1.1": 1,
"FDP_ROL": 12,
"FDP_ROL.1": 2,
"FDP_SDI.2": 6,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UIT": 5,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_AFL": 21,
"FIA_AFL.1.1": 2,
"FIA_AFL.1.2": 2,
"FIA_ATD": 12,
"FIA_ATD.1": 3,
"FIA_SOS.2": 1,
"FIA_UAI.1": 1,
"FIA_UAU": 53,
"FIA_UAU.1": 5,
"FIA_UAU.1.1": 2,
"FIA_UAU.1.2": 2,
"FIA_UAU.4": 1,
"FIA_UAU.4.1": 1,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.6.1": 1,
"FIA_UID": 31,
"FIA_UID.1": 19,
"FIA_UID.1.1": 2,
"FIA_UID.1.2": 2,
"FIA_UID.2": 1,
"FIA_USB": 6,
"FIA_USB.1": 3
},
"FMT": {
"FMT_LIM": 18,
"FMT_LIM.1": 15,
"FMT_LIM.1.1": 3,
"FMT_LIM.2": 14,
"FMT_LIM.2.1": 3,
"FMT_MSA": 78,
"FMT_MSA.1": 12,
"FMT_MSA.2": 1,
"FMT_MSA.3": 18,
"FMT_MTD": 31,
"FMT_MTD.1": 9,
"FMT_MTD.3": 1,
"FMT_SMF": 56,
"FMT_SMF.1": 20,
"FMT_SMF.1.1": 2,
"FMT_SMR": 71,
"FMT_SMR.1": 30,
"FMT_SMR.1.1": 2,
"FMT_SMR.1.2": 2
},
"FPR": {
"FPR_UNO": 5,
"FPR_UNO.1": 8,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_EMS": 4,
"FPT_EMS.1": 12,
"FPT_EMS.1.1": 3,
"FPT_EMS.1.2": 3,
"FPT_FLS": 43,
"FPT_FLS.1": 14,
"FPT_FLS.1.1": 1,
"FPT_ITT": 5,
"FPT_ITT.1": 1,
"FPT_PHP": 5,
"FPT_PHP.3": 12,
"FPT_PHP.3.1": 1,
"FPT_RCV": 12,
"FPT_RCV.3": 4,
"FPT_RCV.4": 2,
"FPT_TDC.1": 7,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST": 7,
"FPT_TST.1": 12,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC": 14,
"FTP_ITC.1": 5,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP": 7,
"FTP_TRP.1": 5
}
},
"certification_process": {
"OutOfScope": {
"The PACE module to provide PACE secure channel. Note: The Biometry feature of the Javacard API is out of scope of the TOE Applications stored in Flash mask in code area in MultiApp V4.0.1, are outside the TOE": 1,
"The commands terminal authenticate (TA) and Chip Authenticate (CA) are out of scope of this TOE and are managed at application level": 1,
"a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are": 1,
"is an extension of PACE, (The commands terminal authenticate (TA) and Chip Authenticate (CA) are out of scope of this TOE and are managed at application level). GAP provides mutual authentication, secure": 1,
"out of scope": 3
}
},
"cipher_mode": {
"CBC": {
"CBC": 3
},
"ECB": {
"ECB": 1
}
},
"cplc_data": {
"ICFab": {
"IC Fabricator": 2
},
"ICType": {
"IC Type": 2
}
},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 156
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 3,
"Key agreement": 2
},
"MAC": {
"MAC": 14
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"Serma Safety \u0026 Security": 1
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA1": 1
},
"SHA2": {
"SHA-224": 1,
"SHA-256": 6,
"SHA-384": 4,
"SHA-512": 6
}
}
},
"ic_data_group": {
"EF": {
"EF.DG1": 6,
"EF.DG16": 6,
"EF.DG3": 1,
"EF.DG4": 1,
"EF.SOD": 1
}
},
"javacard_api_const": {
"ALG": {
"AES": {
"ALG_AES_CMAC_128": 1
}
},
"misc": {
"TYPE_ACCESS": 7
}
},
"javacard_packages": {
"javacard": {
"javacard.framework": 2
}
},
"javacard_version": {
"JavaCard": {
"Java Card 2.2.2": 3,
"Java Card 3.0.4": 8
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"PRNG": 1
},
"RNG": {
"RND": 11,
"RNG": 12
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 3,
"Physical Tampering": 3,
"fault induction": 2,
"malfunction": 8,
"physical tampering": 1
},
"SCA": {
"DPA": 2,
"SPA": 1,
"physical probing": 5,
"timing attacks": 1
}
},
"standard_id": {
"BSI": {
"AIS31": 4
},
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
},
"FIPS": {
"FIPS 197": 1,
"FIPS 46-3": 1,
"FIPS180-2": 1,
"FIPS197": 5
},
"ICAO": {
"ICAO": 3
},
"NIST": {
"SP 800-67": 1
},
"PKCS": {
"PKCS#1": 7,
"PKCS#3": 1,
"PKCS#5": 5
},
"SCP": {
"SCP01": 4,
"SCP02": 4,
"SCP03": 7
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 31
}
},
"DES": {
"3DES": {
"3DES": 2,
"TDEA": 1,
"TDES": 14,
"Triple-DES": 3
},
"DES": {
"DES": 20
}
},
"constructions": {
"MAC": {
"CMAC": 3,
"HMAC": 3,
"KMAC": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 2
},
"Infineon": {
"Infineon": 12
},
"Thales": {
"Thales": 10
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "OHAYON Franck",
"/CreationDate": "D:20241127180125+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/Keywords": "Security Target, CC",
"/ModDate": "D:20241127180125+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"/Subject": "Security Target",
"/Title": "MultiApp v4.0.1 Javacard Platform with Filter Set 1.0",
"pdf_file_size_bytes": 2361844,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 122
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2020_42-R01fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"EAL5+",
"AVA_VAN.5",
"ALC_DVS.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2020_42-R01en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "721fe399a0bba91268e61766ab91b0266fe8d2c020a9532d591e2ebc3f2bb763",
"txt_hash": "1ad1b0f03e32c52a58626203e075f5db8a6ad1d03a798981b2cb2268399ecb23"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "e7707eebe301c926f4dcfeb7c76a430569b0c738cd3db86c9b588cd8928871cd",
"txt_hash": "10be943e428f309489a3580deea676176521dd08af6b3e62da5e7366049922e2"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "c57bdf1ff342f5a2e34e297ab5763540520b9c11e3b6fc86c3a5fac69f06d20b",
"txt_hash": "95f9d00426d5f658e43d35f85095d2458d7d2e4d2e33b596123e73f742d950e2"
}
},
"status": "active"
}