NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.2.2) (ANSSI-CC-2024/09)

CSV information ?

Status active
Valid from 17.04.2024
Valid until 17.04.2029
Scheme 🇫🇷 FR
Manufacturer Nuvoton Technology
Category Trusted Computing
Security level ALC_FLR.1, AVA_VAN.4, EAL4+, ALC_DVS.2

Heuristics summary ?

Certificate ID: ANSSI-CC-2024/09

Certificate ?

Extracted keywords

Security level
EAL4, EAL2
Security Assurance Requirements (SAR)
ALC_FLR.1, ALC_DVS.2, AVA_VAN.4
Protection profiles
ANSSI-CC-PP-2021/02
Certificates
ANSSI-CC-2024/09
Evaluation facilities
SERMA

File metadata

Creation date D:20240424095859+02'00'
Modification date D:20240424100717+02'00'
Pages 2
Creator Acrobat PDFMaker 23 pour Word
Producer Adobe PDF Library 23.1.175

Certification report ?

Extracted keywords

Symmetric Algorithms
DES

Security level
EAL4, EAL2, EAL7, ITSEC E6 Elevé
Claims
O.C, R.O
Security Assurance Requirements (SAR)
ALC_FLR.1, ALC_DVS.2, ALC_FLR, AVA_VAN.4, AVA_VAN
Protection profiles
ANSSI-CC-PP-2021/02
Certificates
ANSSI-CC-2024/09
Evaluation facilities
SERMA, CESTI

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Creation date D:20240424100001+02'00'
Modification date D:20240424100716+02'00'
Pages 12
Creator Acrobat PDFMaker 23 pour Word
Producer Adobe PDF Library 23.1.175

Security target ?

Extracted keywords

Symmetric Algorithms
AES, AES-, AES-256, HMAC
Asymmetric Algorithms
RSA 4096, RSA 2048, ECDH, ECDSA, ECC
Hash functions
SHA-1, SHA-256, SHA-384
Randomness
DRBG, RNG, RBG
Elliptic Curves
P-256, P-384, NIST P-384
Block cipher modes
CTR, CFB, OFB

Vendor
Microsoft

Security level
EAL 4, EAL4, EAL 4 augmented, EAL4 augmented
Claims
O.C, O.DAC, R.O
Security Assurance Requirements (SAR)
ALC_FLR.1, ALC_DVS.2, ALC_DVS.1, AVA_VAN.4
Security Functional Requirements (SFR)
FCO_NRO, FCO_NRO.1, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1, FCS_CKM.4.1, FCS_COP, FDP_ACC.1, FDP_IFC.1, FDP_RIP.1, FDP_RIP.1.1, FDP_ITC.1, FDP_ITC.2, FDP_ITT.1, FDP_ITT.1.1, FDP_ACC, FDP_ACF.1, FDP_ACC.2, FDP_ACF, FDP_UIT, FDP_UIT.1, FDP_SDI.1, FDP_SDI.1.1, FDP_ETC, FDP_ETC.2, FDP_ITC, FDP_UCT, FDP_UCT.1, FDP_ETC.1, FIA_UID.1, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_AFL, FIA_UAU.1, FIA_AFL.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_UAU.6.1, FIA_USB.1, FIA_ATD.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_SOS.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA.2, FMT_MSA.1, FMT_MSA.2.1, FMT_MSA, FMT_MSA.4, FMT_MTD, FMT_MTD.1, FMT_MSA.3, FMT_MOF, FMT_MOF.1, FPT_STM.1, FPT_STM.1.1, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS, FPT_FLS.1, FPT_PHP.3, FPT_PHP.3.1, FPT_ITT.1, FPT_ITT.1.1, FPT_TDC.1, FTP_ITC.1, FTP_TRP.1, FTP_ITC, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3
Protection profiles
ANSSI-CC-PP-2021/02

Side-channel analysis
physical probing, Physical Tampering, physical tampering, malfunction, Malfunction

Standards
FIPS140-2, FIPS 186-3, FIPS 140-2, FIPS 180-4, FIPS 198-1, FIPS186-4, FIPS180-4, FIPS PUB 186-4, FIPS198-1, FIPS 197, FIPS 180-1, PKCS#1, PKCS #1, AIS31, RFC 3447, ISO/IEC 15408, ISO/IEC 14888-3, ISO/IEC 9797-2, ISO/IEC 18033-3, ISO/IEC 15946-1, ISO/IEC 10116:2006, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Title Developer Document
Subject Security Target
Author Karsten Grans
Creation date D:20240314170130+02'00'
Modification date D:20240314170130+02'00'
Pages 90
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

Heuristics ?

Certificate ID: ANSSI-CC-2024/09

Extracted SARs

AVA_VAN.4, ALC_DVS.2, ALC_FLR.1

Similar certificates

Name Certificate ID
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.2.2) (ANSSI-CC-2024/10) ANSSI-CC-2024/10 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.2.2) (ANSSI-CC-2024/11) ANSSI-CC-2024/11 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.0.0) ANSSI-CC-2021/50 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.0.0.1) ANSSI-CC-2022/24 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.0.1.1) ANSSI-CC-2022/28 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.0.1) ANSSI-CC-2022/25 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.0.0.0) ANSSI-CC-2021/49 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.0.0) ANSSI-CC-2021/52 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.0.0) ANSSI-CC-2021/51 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.0.1) ANSSI-CC-2022/27 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.0.1) ANSSI-CC-2022/26 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.1.1) ANSSI-CC-2022/29 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.1.1) ANSSI-CC-2022/31 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.1.1) ANSSI-CC-2022/30 Compare
MIFARE® DESFire® EV3 on ST31N600A02 (version 1.0.2) (ANSSI-CC-2024/25) ANSSI-CC-2024/25 Compare
MIFARE Plus EV2 on ST31N600 A01 (Version 1.0.2) (ANSSI-CC-2024/03) ANSSI-CC-2024/03 Compare
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH(Version 4.1.0.2) ( ANSSI-CC-2023/30 ) ANSSI-CC-2023/30 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration (Version 4.0.1.52) (ANSSI-CC-2023/11-R01) ANSSI-CC-2023/11-R01 Compare
NPCT7xx TPM2.0 rev 1.38 (Hardware LAG019, Firmware 7.2.2.0) ANSSI-CC-2020/21 Compare
NPCT7xx TPM2.0 rev1.38 Hardware version LAG019 Firmware version 7.2.1.0 ANSSI-CC-2018/61 Compare
NPCT6xx TPM 2.0 Hardware version FB5C85D and FB5C85E, Firmware version 1.3.0.1, 1.3.1.0 and 1.3.2.8 ANSSI-CC-2017/55 Compare
IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A (ANSSI-CC-2023/57 ) ANSSI-CC-2023/57 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration Version 4.1.1.52 ( ANSSI-CC-2023/68) ANSSI-CC-2023/68 Compare
TESS v5.1 Platform (Revision 1.0) (ANSSI-CC-2024/28) ANSSI-CC-2024/28 Compare
TESS v5.0 Platform (revision 1.0) (ANSSI-CC-2024/12) ANSSI-CC-2024/12 Compare
Produit IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 Version 5.2.1.A.C et 5.2.1.A.O ( ANSSI-CC-2023/42 ) ANSSI-CC-2023/42 Compare
NPCT7xx TPM 2.0 Hardware version LAG019, Firmware version 7.2.0.1 ANSSI-CC-2017/75 Compare
eTravel 3.1 BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/34 ) ANSSI-CC-2023/34 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/54) ANSSI-CC-2023/54 Compare
eTravel 3.1 EAC on SAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/36 ) ANSSI-CC-2023/36 Compare
eTravel 3.1 EAC on BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/35 ) ANSSI-CC-2023/35 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/56) ANSSI-CC-2023/56 Compare
eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated(version 2.3.0.1) ( ANSSI-CC-2023/55 ) ANSSI-CC-2023/55 Compare
NXP JCOP 7.x with eUICC extension on SN300 B1.1 Secure Element, version JCOP 7.0 R1.64.0.2, JCOP 7.0 R2.04.0.2, JCOP 7.1 R1.04.0.2, JCOP 7.2 R1.09.0.2 NSCIB-CC-2200029-03-CR Compare
IAS ECC v2, version 1.3, in configuration #2 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’application : F0 02 02 13 (ANSSI-CC-2020/51-R01) ANSSI-CC-2020/51-R01 Compare
IAS ECC v2, version 1.3, in configuration #1 on ID-One Cosmo v8.2 open platform on NXP P6022M VB (Identification de l’application : F0 02 02 13) (ANSSI-CC-2020/50-R01) ANSSI-CC-2020/50-R01 Compare
NPCT7xx TPM1.2 rev 116; Hardware version LAG019; Firmware version 7.4.0.0 ANSSI-CC-2019/30 Compare
secunet konnektor 2.0.0 und 2.0.1, Version 5.50.1:2.0.0 und 5.50.1:2.0.1 BSI-DSZ-CC-1044-V7-2023 Compare
OPENLiMiT SignCubes base components 2.0, Version 2.0.1.1 with OPENLiMiT SignCubes PDF Plugin, Version 2.0.1.1 for Adobe BSI-DSZ-CC-0299-2005 Compare
Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h (Version 4.2.0, Java Card version 3.0.5, GP version 2.3) ANSSI-CC-2020/65v2 Compare
Suite MISTRAL IP : version 7.0.2 pour TRC 7535, version 7.0.1 pour TRC 7539-11-A et leur centre de gestion CGM version 7.0.1 ANSSI-CC-2011/78 Compare
TPM 2.0 Hardware version FB5C85D, Firmware version 1.3.0.1 ANSSI-CC-2016/15 Compare
eTravel v2.2 BAC on MultiApp platform v4.0.1 with Filter Set 1.0 Version 1.0 ANSSI-CC-2020/43 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in SSCD configuration Version 4.1.1.52 (ANSSI-CC-2023/69) ANSSI-CC-2023/69 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO BAC configuration Version 4.1.1.52 ( ANSSI-CC-2023/67) ANSSI-CC-2023/67 Compare
eTravel v2.2 EAC/BAC on MultiApp v4.0.1 platform with Filter Set 1.0 version 1.0 ANSSI-CC-2020/44 Compare
eTravel v2.2 EAC/SAC on MultiApp v4.0.1 platform with Filter Set 1.0 version 1.0 ANSSI-CC-2020/45 Compare
ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52) (ANSSI-CC-2023/12-R01) ANSSI-CC-2023/12-R01 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO BAC configuration (Version 4.0.1.52) ( ANSSI-CC-2023/10-R01 ) ANSSI-CC-2023/10-R01 Compare
IAS ECC v2, version 1.3, in configuration #4 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’application : F0 02 02 13 (ANSSI-CC-2020/53-R01) ANSSI-CC-2020/53-R01 Compare
IAS ECC v2, version 1.3, in configuration #3 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’application : F0 02 02 13 (ANSSI-CC-2020/52-R01) ANSSI-CC-2020/52-R01 Compare
VOP 2.0.1 / Javacard 2.1.1 JPH33V2 Operating system version 1 installed on Integrated circuit PHILIPS P8WE5033 ANSSI-CC-2001/13 Compare
OPENLiMiT SignCubes Basiskomponenten 2.1, Version 2.1.1.1 with OPENLiMiT PDF Plugin Version 2.0.1.1 for Adobe BSI-DSZ-CC-0420-2007 Compare
SCE900U (Version A) (ANSSI-CC-2024/19) ANSSI-CC-2024/19 Compare
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6 BSI-DSZ-CC-0772-2014 Compare
secunet konnektor 2.1.0, Version 5.1.2:2.1.0 BSI-DSZ-CC-1202-2022 Compare
HaltDos Mitigation Platform version 1.1 comprising of hdInspector version 1.0, hdDeviceUI version 2.0, hdDetectionService version 1.0 and hdCLI version 2.0. IC3S/BG01/HALTDOS/EAL2/0317/0008 Compare
secunet konnektor 2.1.0, Version 5.1.2:2.1.0 BSI-DSZ-CC-1128-V5-2022 Compare
Carte IAS ECC v1.0.1 sur ID-One Cosmo v7.0.1-a : applet (version 3124) masquée sur ID-One Cosmo V7.0.1-a (composant Inside Secure) en configuration Standard et Basic avec correctif 075243 ANSSI-CC-2012/10 Compare
Microcontrôleur sécurisé ST33H768 révision C,Firmware révision 5, incluant optionnellement la bibliothèque cryptographique Neslib versions 4.1 et 4.1.1 et la bibliothèque MIFARE4Mobile version 2.1.0 ANSSI-CC-2017/01 Compare
Microcontrôleur sécurisé ST33G1M2 révision F, Firmware révisions 9 et A, incluant optionnellement la bibliothèque cryptographique Neslib versions 4.1 et 4.1.1 et la bibliothèque MIFARE4Mobile version 2.1.0 ANSSI-CC-2015/61 Compare
eTravel Essential 1.3-2.0 - BAC and AA activated (Version 1.0) ANSSI-CC-2021/60 Compare
eTravel Essential 1.3-2.0 – BAC, EAC and AA activated (Version 1.0) ANSSI-CC-2021/64 Compare
eTravel Essential 1.3-2.0 – PACE, EAC and AA activated (Version 1.0) ANSSI-CC-2021/63 Compare
Carte IAS ECC v1.0.1 : applet version 6179 sur ID-One Cosmo v7.0.1-n R2.0, masquée sur composants NXP P5CC081 et P5CD081, en configuration Standard ou Standard Dual ANSSI-CC-2013/70 Compare
NCR E10 New Generation FCR 2.0 (FCR Application Version 2.0, OpenSSL Version 1.0.2d Secure-IC firmware and hardware crypto library Version 0.0.6) 21.0.03/TSE-CCCS-48 Compare
secunet konnektor 2.0.0, Version 5.1.2:2.0.0 BSI-DSZ-CC-1201-2022 Compare
secunet konnektor 2.0.0, Version 5.1.2:2.0.0 BSI-DSZ-CC-1044-V6-2022 Compare
Showing 5 out of 68.

Scheme data ?

Product NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.2.2)
Url https://cyber.gouv.fr/produits-certifies/npct7xx-tpm20-rev-159-configuration-version-1122
Description Le produit évalué est « NPCT7xx TPM2.0 rev 1.59, configuration version 1.1.2.2 » développé par NUVOTON TECHNOLOGY CORPORATION. Ce produit est un TPM (Trusted Platform Module). Il est destiné à garantir l’intégrité matérielle et logicielle des plateformes de confiance (serveurs, ordinateurs, etc.) conformément aux spécifications fonctionnelles TPM2.0.
Sponsor NUVOTON TECHNOLOGY CORPORATION
Developer NUVOTON TECHNOLOGY CORPORATION
Cert Id ANSSI-CC-2024/09
Level EAL4+
Expiration Date 17 Avril 2029
Enhanced
Cert Id ANSSI-CC-2024/09
Certification Date 17/04/2024
Expiration Date 17/04/2029
Category Micro-circuits
Cc Version Critères Communs version 3.1r5
Developer NUVOTON TECHNOLOGY CORPORATION
Sponsor NUVOTON TECHNOLOGY CORPORATION
Evaluation Facility SERMA SAFETY & SECURITY
Level EAL4+
Protection Profile Protection Profile PC Client Specific TPM PP PCCS TPM F2.0 L0 r1.59 V1.3, certifié ANSSI-CC-PP-2021/02 le 30 novembre 2021
Mutual Recognition CCRA SOG-IS
Augmented ALC_FLR.1, AVA_VAN.4, ALC_DVS.2
Report Link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_09fr%201.1.2.2.pdf
Target Link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2024_09en%201.1.2.2.pdf
Cert Link https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2024_09fr%201.1.2.2.pdf

References ?

No references are available for this certificate.

Updates ?

  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.2.2)', 'url': 'https://cyber.gouv.fr/produits-certifies/npct7xx-tpm20-rev-159-configuration-version-1122', 'description': 'Le produit Ă©valuĂ© est « NPCT7xx TPM2.0 rev 1.59, configuration version 1.1.2.2 » dĂ©veloppĂ© par NUVOTON TECHNOLOGY CORPORATION.\nCe produit est un TPM (Trusted Platform Module). Il est destinĂ© Ă  garantir l’intĂ©gritĂ© matĂ©rielle et logicielle des plateformes de confiance (serveurs, ordinateurs, etc.) conformĂ©ment aux spĂ©cifications fonctionnelles TPM2.0.', 'sponsor': 'NUVOTON TECHNOLOGY CORPORATION', 'developer': 'NUVOTON TECHNOLOGY CORPORATION', 'cert_id': 'ANSSI-CC-2024/09', 'level': 'EAL4+', 'expiration_date': '17 Avril 2029', 'enhanced': {'cert_id': 'ANSSI-CC-2024/09', 'certification_date': '17/04/2024', 'expiration_date': '17/04/2029', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'NUVOTON TECHNOLOGY CORPORATION', 'sponsor': 'NUVOTON TECHNOLOGY CORPORATION', 'evaluation_facility': 'SERMA SAFETY & SECURITY', 'level': 'EAL4+', 'protection_profile': 'Protection Profile PC Client Specific TPM\nPP PCCS TPM F2.0 L0 r1.59 V1.3, certifiĂ© ANSSI-CC-PP-2021/02 le 30 novembre 2021', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ALC_FLR.1, AVA_VAN.4, ALC_DVS.2', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_09fr%201.1.2.2.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2024_09en%201.1.2.2.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2024_09fr%201.1.2.2.pdf'}}.
  • 02.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'cb72e6e5bff9be8bbc70833848556ed0ad8db6b178b54e7bde23ebc6f50ccb5b', 'txt_hash': 'a736f15814ec38c261122c5970fda781754792d91e5936c8dc1954b98f399c6a'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '8c175ad164e2dd33a5f5903eb25be543a2d1b4fff17d64a581daf228a65a3bb7', 'txt_hash': '5728ee8cb3fa210a3ebf7ac66678f5e52c3359a01b9c367dd207d3efbcbde93e'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7a05c89163746bb540cdb1b0cb903f62bd18082ee28855c3a06e96fd1bdb4b89', 'txt_hash': 'd7c9f79837ada4d8dd63eeccfde881bdeaf331ffcd42d8efa1240d531ef8456a'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 337932, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 12, '/CreationDate': "D:20240424100001+02'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20240424100716+02'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'http://www.ssi.gouv.fr/', 'http://www.commoncriteriaportal.org/', 'http://www.sogis.eu/']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 2833410, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 90, '/Author': 'Karsten Grans', '/CreationDate': "D:20240314170130+02'00'", '/Creator': 'Microsoft® Word 2016', '/ModDate': "D:20240314170130+02'00'", '/Producer': 'Microsoft® Word 2016', '/Subject': 'Security Target', '/Title': 'Developer Document', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.trustedcomputinggroup.org/home', 'file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23FDP_UCT_1_FW', 'file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FMT_MSA_2_States', 'file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FPT_FLS_1_States', 'file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FDP_ACF_1_States', 'http://www.rsa.com/']}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 149443, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/CreationDate': "D:20240424095859+02'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20240424100717+02'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'FR': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2024/09': 2}}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2021/02': 2}}, 'cc_security_level': {'EAL': {'EAL4': 1, 'EAL2': 2, 'EAL7': 1}, 'ITSEC': {'ITSEC E6 ElevĂ©': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 2, 'ALC_DVS.2': 1, 'ALC_FLR': 1}, 'AVA': {'AVA_VAN.4': 1, 'AVA_VAN': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.C': 2}, 'R': {'R.O': 2}}, 'vendor': {}, 'eval_facility': {'Serma': {'SERMA': 1}, 'CESTI': {'CESTI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2021/02': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL4': 2, 'EAL 4 augmented': 1, 'EAL4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 3, 'ALC_DVS.2': 4, 'ALC_DVS.1': 1}, 'AVA': {'AVA_VAN.4': 3}}, 'cc_sfr': {'FCO': {'FCO_NRO': 6, 'FCO_NRO.1': 6}, 'FCS': {'FCS_RNG.1': 4, 'FCS_RNG.1.1': 1, 'FCS_RNG.1.2': 1, 'FCS_CKM': 12, 'FCS_CKM.2': 4, 'FCS_COP.1': 11, 'FCS_CKM.4': 14, 'FCS_CKM.1': 12, 'FCS_CKM.4.1': 1, 'FCS_COP': 21}, 'FDP': {'FDP_ACC.1': 35, 'FDP_IFC.1': 20, 'FDP_RIP.1': 3, 'FDP_RIP.1.1': 1, 'FDP_ITC.1': 11, 'FDP_ITC.2': 13, 'FDP_ITT.1': 3, 'FDP_ITT.1.1': 1, 'FDP_ACC': 21, 'FDP_ACF.1': 35, 'FDP_ACC.2': 2, 'FDP_ACF': 23, 'FDP_UIT': 9, 'FDP_UIT.1': 4, 'FDP_SDI.1': 3, 'FDP_SDI.1.1': 1, 'FDP_ETC': 6, 'FDP_ETC.2': 4, 'FDP_ITC': 6, 'FDP_UCT': 7, 'FDP_UCT.1': 2, 'FDP_ETC.1': 2}, 'FIA': {'FIA_UID.1': 7, 'FIA_SOS.2': 3, 'FIA_SOS.2.1': 1, 'FIA_SOS.2.2': 1, 'FIA_AFL': 12, 'FIA_UAU.1': 7, 'FIA_AFL.1': 8, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.5': 3, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6': 3, 'FIA_UAU.6.1': 1, 'FIA_USB.1': 3, 'FIA_ATD.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_SOS.1': 1}, 'FMT': {'FMT_SMR.1': 21, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1': 13, 'FMT_SMF.1.1': 1, 'FMT_MSA.2': 4, 'FMT_MSA.1': 15, 'FMT_MSA.2.1': 1, 'FMT_MSA': 51, 'FMT_MSA.4': 3, 'FMT_MTD': 6, 'FMT_MTD.1': 2, 'FMT_MSA.3': 22, 'FMT_MOF': 3, 'FMT_MOF.1': 1}, 'FPT': {'FPT_STM.1': 2, 'FPT_STM.1.1': 1, 'FPT_TST.1': 5, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_FLS': 7, 'FPT_FLS.1': 2, 'FPT_PHP.3': 3, 'FPT_PHP.3.1': 1, 'FPT_ITT.1': 3, 'FPT_ITT.1.1': 1, 'FPT_TDC.1': 1}, 'FTP': {'FTP_ITC.1': 5, 'FTP_TRP.1': 5, 'FTP_ITC': 3, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.C': 9, 'O.DAC': 5}, 'R': {'R.O': 9}}, 'vendor': {'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 9, 'AES-': 1, 'AES-256': 2}}, 'constructions': {'MAC': {'HMAC': 31}}}, 'asymmetric_crypto': {'RSA': {'RSA 4096': 1, 'RSA 2048': 2}, 'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 2}, 'ECC': {'ECC': 24}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 8}, 'SHA2': {'SHA-256': 7, 'SHA-384': 8}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'PRNG': {'DRBG': 5}, 'RNG': {'RNG': 17, 'RBG': 1}}, 'cipher_mode': {'CTR': {'CTR': 2}, 'CFB': {'CFB': 2}, 'OFB': {'OFB': 2}}, 'ecc_curve': {'NIST': {'P-256': 2, 'P-384': 3, 'NIST P-384': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1}, 'FI': {'Physical Tampering': 2, 'physical tampering': 2, 'malfunction': 2, 'Malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS140-2': 2, 'FIPS 186-3': 4, 'FIPS 140-2': 3, 'FIPS 180-4': 1, 'FIPS 198-1': 2, 'FIPS186-4': 2, 'FIPS180-4': 1, 'FIPS PUB 186-4': 1, 'FIPS198-1': 1, 'FIPS 197': 2, 'FIPS 180-1': 1}, 'PKCS': {'PKCS#1': 1, 'PKCS #1': 1}, 'BSI': {'AIS31': 1}, 'RFC': {'RFC 3447': 1}, 'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 14888-3': 1, 'ISO/IEC 9797-2': 1, 'ISO/IEC 18033-3': 1, 'ISO/IEC 15946-1': 1, 'ISO/IEC 10116:2006': 1}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2024/09': 2}}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2021/02': 1}}, 'cc_security_level': {'EAL': {'EAL4': 1, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 2, 'ALC_DVS.2': 1}, 'AVA': {'AVA_VAN.4': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Serma': {'SERMA': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to ANSSI-CC-2024_09fr 1.1.2.2.pdf.
    • The st_filename property was set to ANSSI-cible-CC-2024_09en 1.1.2.2.pdf.
    • The cert_filename property was set to Certificat-CC-2024_09fr 1.1.2.2.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ANSSI-CC-2024/09.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_09fr%201.1.2.2.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2024_09en%201.1.2.2.pdf.

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'product': 'NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.2.2)', 'url': 'https://cyber.gouv.fr/produits-certifies/npct7xx-tpm20-rev-159-configuration-version-1122', 'description': 'Le produit Ă©valuĂ© est « NPCT7xx TPM2.0 rev 1.59, configuration version 1.1.2.2 » dĂ©veloppĂ© par NUVOTON TECHNOLOGY CORPORATION.\nCe produit est un TPM (Trusted Platform Module). Il est destinĂ© Ă  garantir l’intĂ©gritĂ© matĂ©rielle et logicielle des plateformes de confiance (serveurs, ordinateurs, etc.) conformĂ©ment aux spĂ©cifications fonctionnelles TPM2.0.', 'cert_id': 'ANSSI-CC-2024/09', 'expiration_date': '17 Avril 2029', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2024/09', 'certification_date': '17/04/2024', 'expiration_date': '17/04/2029', 'protection_profile': 'Protection Profile PC Client Specific TPM\nPP PCCS TPM F2.0 L0 r1.59 V1.3, certifiĂ© ANSSI-CC-PP-2021/02 le 30 novembre 2021', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ALC_FLR.1, AVA_VAN.4, ALC_DVS.2', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2024_09fr%201.1.2.2.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2024_09en%201.1.2.2.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_09fr%201.1.2.2.pdf'}}} data.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The scheme_data property was set to {'product': 'NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.0.0)', 'url': 'https://cyber.gouv.fr/produits-certifies/npct7xx-tpm20-rev-159-configuration-version-1100', 'description': 'Le produit Ă©valuĂ© est « NPCT7xx TPM2.0 rev 1.59, configuration version 1.1.0.0 » dĂ©veloppĂ© par\nNUVOTON TECHNOLOGY CORPORATION.\nCe produit est destinĂ© Ă  garantir l’intĂ©gritĂ© matĂ©rielle et logicielle des plateformes de confiance\n(serveurs, ordinateurs, etc.) conformĂ©ment aux spĂ©cifications fonctionnelles TPM2.0.', 'sponsor': 'NUVOTON TECHNOLOGY CORPORATION', 'developer': 'NUVOTON TECHNOLOGY CORPORATION', 'cert_id': '2021/50', 'level': 'EAL4+', 'expiration_date': '22 Octobre 2026', 'enhanced': {'cert_id': '2021/50', 'certification_date': '22/10/2021', 'expiration_date': '22/10/2026', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'NUVOTON TECHNOLOGY CORPORATION', 'sponsor': 'NUVOTON TECHNOLOGY CORPORATION', 'evaluation_facility': 'SERMA SAFETY & SECURITY', 'level': 'EAL4+', 'protection_profile': 'NA', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_FLR.1, ALC_DVS.2, AVA_VAN.4', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2021/11/certificat-2021_50.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2021/11/anssi-cible-cc-2021_50en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2021/11/anssi-cc-2021_50fr.pdf'}}.
  • 05.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'cb72e6e5bff9be8bbc70833848556ed0ad8db6b178b54e7bde23ebc6f50ccb5b', 'txt_hash': 'a736f15814ec38c261122c5970fda781754792d91e5936c8dc1954b98f399c6a'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 337932, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 12, '/CreationDate': "D:20240424100001+02'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20240424100716+02'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'http://www.ssi.gouv.fr/', 'http://www.commoncriteriaportal.org/', 'http://www.sogis.eu/']}}.
    • The report_frontpage property was set to {'FR': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2024/09': 2}}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2021/02': 2}}, 'cc_security_level': {'EAL': {'EAL4': 1, 'EAL2': 2, 'EAL7': 1}, 'ITSEC': {'ITSEC E6 ElevĂ©': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 2, 'ALC_DVS.2': 1, 'ALC_FLR': 1}, 'AVA': {'AVA_VAN.4': 1, 'AVA_VAN': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.C': 2}, 'R': {'R.O': 2}}, 'vendor': {}, 'eval_facility': {'Serma': {'SERMA': 1}, 'CESTI': {'CESTI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to ANSSI-CC-2024_09fr 1.1.2.2.pdf.
  • 31.07.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.2.2) (ANSSI-CC-2024/09) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Trusted Computing",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2024_09fr%201.1.2.2.pdf",
  "dgst": "aac4c61aee502a1e",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2024/09",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.0",
        "1.1.2.2",
        "1.59"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "ANSSI-CC-2024/09",
      "description": "Le produit \u00e9valu\u00e9 est \u00ab NPCT7xx TPM2.0 rev 1.59, configuration version 1.1.2.2 \u00bb d\u00e9velopp\u00e9 par NUVOTON TECHNOLOGY CORPORATION.\nCe produit est un TPM (Trusted Platform Module). Il est destin\u00e9 \u00e0 garantir l\u2019int\u00e9grit\u00e9 mat\u00e9rielle et logicielle des plateformes de confiance (serveurs, ordinateurs, etc.) conform\u00e9ment aux sp\u00e9cifications fonctionnelles TPM2.0.",
      "developer": "NUVOTON TECHNOLOGY CORPORATION",
      "enhanced": {
        "augmented": "ALC_FLR.1, AVA_VAN.4, ALC_DVS.2",
        "category": "Micro-circuits",
        "cc_version": "Crit\u00e8res Communs version 3.1r5",
        "cert_id": "ANSSI-CC-2024/09",
        "cert_link": "https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2024_09fr%201.1.2.2.pdf",
        "certification_date": "17/04/2024",
        "developer": "NUVOTON TECHNOLOGY CORPORATION",
        "evaluation_facility": "SERMA SAFETY \u0026 SECURITY",
        "expiration_date": "17/04/2029",
        "level": "EAL4+",
        "mutual_recognition": "CCRA\n                          SOG-IS",
        "protection_profile": "Protection Profile PC Client Specific TPM\nPP PCCS TPM F2.0 L0 r1.59 V1.3, certifi\u00e9 ANSSI-CC-PP-2021/02 le 30 novembre 2021",
        "report_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_09fr%201.1.2.2.pdf",
        "sponsor": "NUVOTON TECHNOLOGY CORPORATION",
        "target_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2024_09en%201.1.2.2.pdf"
      },
      "expiration_date": "17 Avril 2029",
      "level": "EAL4+",
      "product": "NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.2.2)",
      "sponsor": "NUVOTON TECHNOLOGY CORPORATION",
      "url": "https://cyber.gouv.fr/produits-certifies/npct7xx-tpm20-rev-159-configuration-version-1122"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Nuvoton Technology",
  "manufacturer_web": null,
  "name": "NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.2.2) (ANSSI-CC-2024/09)",
  "not_valid_after": "2029-04-17",
  "not_valid_before": "2024-04-17",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "Certificat-CC-2024_09fr 1.1.2.2.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2024/09": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-2021/02": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1,
          "ALC_FLR.1": 2
        },
        "AVA": {
          "AVA_VAN.4": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL4": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "SERMA": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20240424095859+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 pour Word",
      "/Keywords": "",
      "/ModDate": "D:20240424100717+02\u002700\u0027",
      "/Producer": "Adobe PDF Library 23.1.175",
      "pdf_file_size_bytes": 149443,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "ANSSI-CC-2024_09fr 1.1.2.2.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2024/09": 2
        }
      },
      "cc_claims": {
        "O": {
          "O.C": 2
        },
        "R": {
          "R.O": 2
        }
      },
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-2021/02": 2
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1,
          "ALC_FLR": 1,
          "ALC_FLR.1": 2
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.4": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 2,
          "EAL4": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CESTI": {
          "CESTI": 1
        },
        "Serma": {
          "SERMA": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20240424100001+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 pour Word",
      "/Keywords": "",
      "/ModDate": "D:20240424100716+02\u002700\u0027",
      "/Producer": "Adobe PDF Library 23.1.175",
      "pdf_file_size_bytes": 337932,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "http://www.ssi.gouv.fr/",
          "http://www.sogis.eu/",
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 12
    },
    "st_filename": "ANSSI-cible-CC-2024_09en 1.1.2.2.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 24
          },
          "ECDH": {
            "ECDH": 1
          },
          "ECDSA": {
            "ECDSA": 2
          }
        },
        "RSA": {
          "RSA 2048": 2,
          "RSA 4096": 1
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.C": 9,
          "O.DAC": 5
        },
        "R": {
          "R.O": 9
        }
      },
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-2021/02": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 4,
          "ALC_FLR.1": 3
        },
        "AVA": {
          "AVA_VAN.4": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL 4 augmented": 1,
          "EAL4": 2,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {
        "FCO": {
          "FCO_NRO": 6,
          "FCO_NRO.1": 6
        },
        "FCS": {
          "FCS_CKM": 12,
          "FCS_CKM.1": 12,
          "FCS_CKM.2": 4,
          "FCS_CKM.4": 14,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 21,
          "FCS_COP.1": 11,
          "FCS_RNG.1": 4,
          "FCS_RNG.1.1": 1,
          "FCS_RNG.1.2": 1
        },
        "FDP": {
          "FDP_ACC": 21,
          "FDP_ACC.1": 35,
          "FDP_ACC.2": 2,
          "FDP_ACF": 23,
          "FDP_ACF.1": 35,
          "FDP_ETC": 6,
          "FDP_ETC.1": 2,
          "FDP_ETC.2": 4,
          "FDP_IFC.1": 20,
          "FDP_ITC": 6,
          "FDP_ITC.1": 11,
          "FDP_ITC.2": 13,
          "FDP_ITT.1": 3,
          "FDP_ITT.1.1": 1,
          "FDP_RIP.1": 3,
          "FDP_RIP.1.1": 1,
          "FDP_SDI.1": 3,
          "FDP_SDI.1.1": 1,
          "FDP_UCT": 7,
          "FDP_UCT.1": 2,
          "FDP_UIT": 9,
          "FDP_UIT.1": 4
        },
        "FIA": {
          "FIA_AFL": 12,
          "FIA_AFL.1": 8,
          "FIA_ATD.1": 1,
          "FIA_SOS.1": 1,
          "FIA_SOS.2": 3,
          "FIA_SOS.2.1": 1,
          "FIA_SOS.2.2": 1,
          "FIA_UAU.1": 7,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.5": 3,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6": 3,
          "FIA_UAU.6.1": 1,
          "FIA_UID.1": 7,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB.1": 3,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MOF": 3,
          "FMT_MOF.1": 1,
          "FMT_MSA": 51,
          "FMT_MSA.1": 15,
          "FMT_MSA.2": 4,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 22,
          "FMT_MSA.4": 3,
          "FMT_MTD": 6,
          "FMT_MTD.1": 2,
          "FMT_SMF.1": 13,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 21,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FLS": 7,
          "FPT_FLS.1": 2,
          "FPT_ITT.1": 3,
          "FPT_ITT.1.1": 1,
          "FPT_PHP.3": 3,
          "FPT_PHP.3.1": 1,
          "FPT_STM.1": 2,
          "FPT_STM.1.1": 1,
          "FPT_TDC.1": 1,
          "FPT_TST.1": 5,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 3,
          "FTP_ITC.1": 5,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 5
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CFB": {
          "CFB": 2
        },
        "CTR": {
          "CTR": 2
        },
        "OFB": {
          "OFB": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "NIST P-384": 1,
          "P-256": 2,
          "P-384": 3
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 8
          },
          "SHA2": {
            "SHA-256": 7,
            "SHA-384": 8
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 5
        },
        "RNG": {
          "RBG": 1,
          "RNG": 17
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 2,
          "Physical Tampering": 2,
          "malfunction": 2,
          "physical tampering": 2
        },
        "SCA": {
          "physical probing": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 1
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        },
        "FIPS": {
          "FIPS 140-2": 3,
          "FIPS 180-1": 1,
          "FIPS 180-4": 1,
          "FIPS 186-3": 4,
          "FIPS 197": 2,
          "FIPS 198-1": 2,
          "FIPS PUB 186-4": 1,
          "FIPS140-2": 2,
          "FIPS180-4": 1,
          "FIPS186-4": 2,
          "FIPS198-1": 1
        },
        "ISO": {
          "ISO/IEC 10116:2006": 1,
          "ISO/IEC 14888-3": 1,
          "ISO/IEC 15408": 2,
          "ISO/IEC 15946-1": 1,
          "ISO/IEC 18033-3": 1,
          "ISO/IEC 9797-2": 1
        },
        "PKCS": {
          "PKCS #1": 1,
          "PKCS#1": 1
        },
        "RFC": {
          "RFC 3447": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 9,
            "AES-": 1,
            "AES-256": 2
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 31
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Karsten Grans",
      "/CreationDate": "D:20240314170130+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20240314170130+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Subject": "Security Target",
      "/Title": "Developer Document",
      "pdf_file_size_bytes": 2833410,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.rsa.com/",
          "file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FPT_FLS_1_States",
          "file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FMT_MSA_2_States",
          "file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23FDP_UCT_1_FW",
          "file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FDP_ACF_1_States",
          "https://www.trustedcomputinggroup.org/home"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 90
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-profil-pp-2021_02en.pdf",
        "pp_name": "Protection Profile PC Client Specific Trusted Platform Module Specification Family 2.0; Level 0; Revi..."
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_09fr%201.1.2.2.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_VAN.4",
      "ALC_FLR.1",
      "EAL4+",
      "ALC_DVS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2024_09en%201.1.2.2.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "7a05c89163746bb540cdb1b0cb903f62bd18082ee28855c3a06e96fd1bdb4b89",
      "txt_hash": "d7c9f79837ada4d8dd63eeccfde881bdeaf331ffcd42d8efa1240d531ef8456a"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "cb72e6e5bff9be8bbc70833848556ed0ad8db6b178b54e7bde23ebc6f50ccb5b",
      "txt_hash": "a736f15814ec38c261122c5970fda781754792d91e5936c8dc1954b98f399c6a"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "8c175ad164e2dd33a5f5903eb25be543a2d1b4fff17d64a581daf228a65a3bb7",
      "txt_hash": "5728ee8cb3fa210a3ebf7ac66678f5e52c3359a01b9c367dd207d3efbcbde93e"
    }
  },
  "status": "active"
}