IDEMIA CA (Version 1.3.1)(ANSSI-CC-2025/29)

CSV information

Status active
Valid from 14.10.2025
Valid until 14.10.2030
Scheme 🇫🇷 FR
Manufacturer IN SMART IDENTITY FRANCE
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_FLR.1, EAL4+

Heuristics summary

Certificate ID: ANSSI-CC-2025/29

Certificate

Extracted keywords

Vendor
IDEMIA

Security level
EAL4, EAL2
Security Assurance Requirements (SAR)
ALC_FLR.1
Certificates
ANSSI-CC-2025/29
Evaluation facilities
AMOSSYS

File metadata

Creation date D:20251014114027+02'00'
Modification date D:20251014062248-07'00'
Pages 2
Creator Acrobat PDFMaker 25 pour Word
Producer PDFKit.NET 12.3.654.0 DMV10

Certification report

Extracted keywords

Symmetric Algorithms
DES

Vendor
IDEMIA

Security level
EAL4, EAL2, ITSEC E3 Elémentaire
Security Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLR
Certificates
ANSSI-CC-2025/29
Evaluation facilities
CESTI, AMOSSYS

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Creation date D:20251014114218+02'00'
Modification date D:20251014062249-07'00'
Pages 14
Creator Acrobat PDFMaker 25 pour Word
Producer PDFKit.NET 12.3.654.0 DMV10

Security target

Extracted keywords

Hash functions
SHA-1
Protocols
TLS, TLS v1.3

Vendor
IDEMIA

Security level
EAL4, EAL4 augmented
Claims
O.CPS, T.CRITICAL_COMPONENT_FAILURE, T.FLAWED_CODE, T.MALICIOUS_CODE_EXPLOITATION, T.MESSAGE_CONTENT_TAMPERING, T.DISCLOSURE_OF_SECRET_KEYS, T.MODIFICATION_OF_SECRET_KEYS, T.SENDER_DENIABILITY, T.UNAUTHORIZED_ENTITY_ACCESS, T.PHYSICAL_UNAUTHORIZED_ENTITY_ACCESS, T.WEAK_CRYPTOGRAPHY, T.RESIDUAL_MEMORY_ACCESS, T.UNDETECTED_ACTIONS, T.CERTIFICATE_CORRUPTION, T.AUDIT_LOG_CORRUPTION, T.CONFIG_CORRUPTION, T.UNAUTHENTICATED_TRANSACTIONS, T.CRITICAL_COMPONENT, T.MESSAGE_CONTENT_TA, T.DISCLOSURE_OF_SECR, T.MODIFICATION_OF_SE, T.PHYSICAL_UNAUTHORI, T.AUDIT_LOG_CORRUPTI, A.AUDITORS_REVIEW_LOGS, A.COMPETENT_OPERATORS, A.CPS, A.DISPOSAL_OF_AUTHENTICATION_DATA, A.NOTIFY_AUTHORITIES_OF_SECURITY_ISSUES, A.SOCIAL_ENGINEERING_TRAINING, A.OPERATING_SYSTEM, A.PHYSICAL_COMMUNICATIONS_PROTECTIONS, A.PHYSICAL_PROTECTIONS, A.SANE_INSTALL, A.HSM_SECURITY, A.TRUSTED_AUTH_SERVER, A.DATABASE_SECURITY_AND_BACKUP, A.AUDITORS_REVIEW_LO, A.COMPETENT_OPERATO, A.DISPOSAL_OF_AUTHEN, A.NOTIFY_AUTHORITIES_, A.SOCIAL_ENGINEERING_, A.PHYSICAL_PROTECTION, A.TRUSTED_AUTH_SERVE, A.DATABASE_SECURITY_, OT.CERTIFICATES, OT.NON_REPUDIATION, OT.COMMMUNICATION_PROTECTIONS, OT.DATA_IMPORT_EXPORT, OT.RESTRICT_ACTIONS_BEFORE_AUTHENTIFICATION, OT.MAINTAIN_USER_ATTRIBUTES, OT.ADMIN_ACCESS_CONTROL, OT.MANAGE_SECURITY_FUNCTIONS, OT.AUDIT, OT.PROTECT_AUDIT_LOG, OT.TOE_CRYPTOGRAPHY, OT.RESIDUAL_MEMORY_CLEARING, OT.SESSION_MANAGEMENT, OT.CA_MANAGEMENT, OT.CERTIFICATION, OT.CRL_MANAGEMENT, OT.REPLAY_PROTECTION, OT.RESTRICT_ACTIONS_BEFORE_AUTHENTIFIC, OT.COMMMUNICATION_PRO, OT.MAINTAIN_USER_ATTRI, OT.ADMIN_ACCESS_CONTR, OT.MANAGE_SECURITY_FU, OP.READ_CONFIG, OP.READ_TLS_KEYS, OP.FWD_HTTP_REQS, OP.VERIF_AUTH_TOKEN, OP.PRIVILEGED_WRITE_CA_AND_CERTS, OP.WRITE_CA_AND_CERTS, OP.WRITE_CSR, OP.READ_CERTS, OP.WRITE_AUDIT_LOG, OP.READ_AUDIT_LOGS, OP.AUTHORIZE_HSM, OP.UNAUTHORIZE_HSM, OP.FWD_PRIVKEY_REQS, OP.USE_PRIVKEY, OE.ADMINISTRATOR_DOCUMENTATION, OE.AUDITORS_REVIEW_LOGS, OE.CREDENTIALS_POLICY, OE.PHYSICAL_COMMUNICATION_PROTECTIONS, OE.COMPETENT_OPERATORS, OE.ENVIRONMENT_CRYPTOGRAPHY, OE.SANE_INSTALL, OE.LIFECYCLE_SECURITY, OE.MALICIOUS_CODE_NOT_SIGNED, OE.NOTIFY_AUTHORITIES_OF_SECURITY_ISSUES, OE.OPERATING_SYSTEM, OE.PERIODIC_INTEGRITY_CHECK, OE.PHYSICAL_PROTECTION, OE.REPAIR_SECURITY_FLAWS, OE.SECURITY_ROLES, OE.SOCIAL_ENGINEERING_TRAINING, OE.BACKUP_STORAGE, OE.VALIDATION_OF_SECURITY_FUNCTIONS, OE.PREVENT_MALICIOUS_CODE, OE.RECOVERY_FROM_MALICIOUS_CODE, OE.CONFIGURATION_MANAGEMENT, OE.REQUIRE_INSPECTION_DOWNLOAD, OE.TIMESTAMPS, OE.DATA_INTEGRITY, OE.PROTECT_DATA_INTERNAL_TRANSFER, OE.SECURE_KEY_STORAGE_AND_OPERATIONS, OE.AUTHENTICATE_OPERATORS, OE.CERT_REPOSITORY, OE.KEY_ARCHIVAL, OE.NOTIFY_AUTHORITIES_OF_SECURITY_ISSU
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_PRE, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_GEN.2.1, FAU_SEL.1, FAU_SEL.1.1, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2, FAU_SAR.2.1, FAU_SAR.3, FAU_SAR.3.1, FCO_NRO_CIMC.4, FCO_NRO_CIMC.3, FCO_NRO_CIMC.3.1, FCO_NRO_CIMC.3.2, FCO_NRO_CIMC.3.3, FCO_NRO_CIMC, FCO_NRO_CIMC.4.1, FCO_NRO_CIMC.4.2, FCS_SOF_CIMC.1, FCS_SOF_CIMC.1.1, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.3, FDP_ACF.1.4, FDP_UCT.1, FDP_UCT.1.1, FDP_CIMC_CSE.1, FDP_CIMC_CSE.1.1, FDP_CIMC_CER.1, FDP_CIMC_CER.1.1, FDP_CIMC_CER.1.2, FDP_CIMC_CER.1.3, FDP_CIMC_CER.1.4, FDP_CIMC_CRL.1, FDP_CIMC_CRL.1.1, FDP_RIP.1, FDP_RIP.1.1, FDP_DAU.1, FDP_DAU.1.1, FDP_DAU.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_ATD.1, FIA_UAU.6, FIA_UAU.6.1, FMT_MOF_IDA.3, FMT_MODF_IDA.3, FMT_MOF_CIMC.3, FMT_MOF_CIMC.3.3, FMT_MOF_IDA.3.1, FMT_MOF_IDA.3.2, FMT_MOF_IDA.3.3, FMT_MOF_IDA.3.4, FMT_MOF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MOF_CIMC.5, FMT_MOF_CIMC.5.1, FMT_MOF_CIMC.5.2, FMT_MOF_CIMC.5.3, FMT_SMR.2, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_SMF.1, FMT_SMF.1.1, FMT_MTD.1, FMT_MTD.1.1, FMT_SMR, FPT_ITC.1, FPT_ITC.1.1, FPT_RPL.1, FPT_RPL.1.1, FPT_RPL.1.2, FTA_SSL.3, FTA_SSL.3.1, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3
Evaluation facilities
AMOSSYS

Side-channel analysis
physical tampering

Standards
FIPS 140-2, RFC5280, RFC 5280, X.509, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Title FQR 550 0219 Ed 11 - IDEMIA CA v1.3 Security Target
Author Antoine GUELLIER
Creation date D:20250912163327+08'00'
Modification date D:20250912163327+08'00'
Pages 69
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

Heuristics

Certificate ID: ANSSI-CC-2025/29

Extracted SARs

ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3

Similar certificates

Name Certificate ID
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.3.3) (ANSSI-CC-2025/12) ANSSI-CC-2025/12 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.3.3) (ANSSI-CC-2025/11) ANSSI-CC-2025/11 Compare
NPCT7xx TPM2.0 rev 1.59 configuration version 1.5.3.3 (ANSSI-CC-2025/14) ANSSI-CC-2025/14 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.3.3) (ANSSI-CC-2025/13) ANSSI-CC-2025/13 Compare
MIFARE DESFire EV3 on ST31R480 A01(version 1.0.3) (ANSSI-CC-2025/31) ANSSI-CC-2025/31 Compare
MIFARE® Plus® EV2 on ST31R480 A01 (version 1.0.3) (ANSSI-CC-2025/33) ANSSI-CC-2025/33 Compare
PPCA application on MultiApp V5.1 Platform (version 1.0.1.A) (ANSSI-CC-2025/05) ANSSI-CC-2025/05 Compare
ChipDoc v3.2 on JCOP 4 P71 in ICAO EAC(1&2) with PACE configuration (Version 3.2.0.52) (ANSSI-CC-2025/02) ANSSI-CC-2025/02 Compare
ACOS-IDv4.1 eMRTD (A) BAC Configuration (version 4.1 eMRTD (A)) ( ANSSI-CC-2025/15) ANSSI-CC-2025/15 Compare
ACOS-IDv4.1 SSCD (A) CB-Comm (version 4.1 SSCD (A)) (ANSSI-CC-2025/17) ANSSI-CC-2025/17 Compare
ACOS-IDv4.1 SSCD (A) CL-TC-Comm (version 4.1 SSCD (A)) (ANSSI-CC-2025/18) ANSSI-CC-2025/18 Compare
ACOS-IDv4.1 eMRTD (A) EAC/PACE Configuration (version 4.1 eMRTD (A)) (ANSSI-CC-2025/16) ANSSI-CC-2025/16 Compare
Cryptographic library NESLIB 6.11.3 on ST31R480 A01 (version 6.11.3)(ANSSI-CC-2025/26) ANSSI-CC-2025/26 Compare
Cryptographic library NESLIB 6.11.3 on ST31R480 B01 (version 6.11.3) (ANSSI-CC-2025/27) ANSSI-CC-2025/27 Compare
eTravel 3.1 BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/34 ) ANSSI-CC-2023/34 Compare
eTravel 3.1 EAC on BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/35 ) ANSSI-CC-2023/35 Compare
eTravel 3.1 EAC on SAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/36 ) ANSSI-CC-2023/36 Compare
TEQS V1.0 (version 1.0) (ANSSI-CC-2025/20) ANSSI-CC-2025/20 Compare
Infineon eID-OSv1.0 eMRTD (A) BAC Configuration (version 1.0 eMRTD (A)) (ANSSI-CC-2025/23) ANSSI-CC-2025/23 Compare
Infineon eID-OSv1.0 SSCD (A) CB-Comm (version 1.0 SSCD (A)) (ANSSI-CC-2025/21) ANSSI-CC-2025/21 Compare
Connected eSE 5.3.4 v1.2 Platform (Revision 1.0) (ANSSI-CC-2025/04) ANSSI-CC-2025/04 Compare
Infineon eID-OSv1.0 SSCD (A) CL-TC-Comm (version 1.0 SSCD (A)) (ANSSI-CC-2025/22) ANSSI-CC-2025/22 Compare
Infineon eID-OSv1.0 eMRTD (A) EAC/PACE Configuration (version 1.0 eMRTD (A)) (ANSSI-CC-2025/24) ANSSI-CC-2025/24 Compare
ChipDoc v3.2 on JCOP 4 P71 in SSCD configuration (Version 3.2.0.52) (ANSSI-CC-2025/03) ANSSI-CC-2025/03 Compare
ChipDoc v3.2 on JCOP 4 P71 in ICAO BAC configuration (Version 3.2.0.52)(ANSSI-CC-2025/01) ANSSI-CC-2025/01 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/54) ANSSI-CC-2023/54 Compare
eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated(version 2.3.0.1) ( ANSSI-CC-2023/55 ) ANSSI-CC-2023/55 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/56) ANSSI-CC-2023/56 Compare
Smart Tachograph G2 on MultiApp V4.0.1 (Versions 2.0.1 G et 2.0.1 H) (EUCC-ANSSI-2025-03-02) ANSSI-CC-2025/03 Compare
ChipDoc v3.1 on JCOP 4 P71 in ICAO EAC(1&2) with PACE configuration (Version 3.1.6.52) (ANSSI-CC-2021/19-R01) ANSSI-CC-2021/19-R01 Compare
NPCT6xx TPM 2.0 Hardware version FB5C85D and FB5C85E, Firmware version 1.3.0.1, 1.3.1.0 and 1.3.2.8 ANSSI-CC-2017/55 Compare
IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A (ANSSI-CC-2023/57 ) ANSSI-CC-2023/57 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.2.2) (ANSSI-CC-2024/10) ANSSI-CC-2024/10 Compare
ChipDoc v3.1 on JCOP 4 P71 in SSCD configuration (Version 3.1.6.52) (ANSSI-CC-2021/20-R01) ANSSI-CC-2021/20-R01 Compare
ChipDoc v3.1 on JCOP 4 P71 in ICAO BAC configuration (Version 3.1.6.52) (ANSSI-CC-2021/18-R01) ANSSI-CC-2021/18-R01 Compare
ArcaShield Platform(Version 0003040E) (ANSSI-CC-2025/38) ANSSI-CC-2025/38 Compare
IAS ECC v2, version 1.3, in configuration #3 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’application : F0 02 02 13 (ANSSI-CC-2020/52-R01) ANSSI-CC-2020/52-R01 Compare
IAS ECC v2, version 1.3, in configuration #1 on ID-One Cosmo v8.2 open platform on NXP P6022M VB (Identification de l’application : F0 02 02 13) (ANSSI-CC-2020/50-R01) ANSSI-CC-2020/50-R01 Compare
TESS v5.2 Platform(Révision 1.0) (ANSSI-CC-2025/19) ANSSI-CC-2025/19 Compare
MultiApp 5.2 Premium PQC (version 5.2)(ANSSI-CC-2025/32) ANSSI-CC-2025/32 Compare
MultiApp 5.2 Premium PQC GP-SE(version 5.2) (ANSSI-CC-2025/30) ANSSI-CC-2025/30 Compare
MISTRAL VS9 (Software v9.2.3.5 / Hardware IP9001 & IP9010) (ANSSI-CC-2025/06) ANSSI-CC-2025/06 Compare
Showing 5 out of 42.

References

No references are available for this certificate.

Updates

  • 20.10.2025 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name IDEMIA CA (Version 1.3.1)(ANSSI-CC-2025/29) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2025_29fr.pdf",
  "dgst": "9505587f065ae03f",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2025/29",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.3.1"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "IN SMART IDENTITY FRANCE",
  "manufacturer_web": "https://ingroupe.com/fr",
  "name": "IDEMIA CA (Version 1.3.1)(ANSSI-CC-2025/29)",
  "not_valid_after": "2030-10-14",
  "not_valid_before": "2025-10-14",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "Certificat-ANSSI-CC-2025_29fr.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2025/29": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.1": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL4": 2
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "AMOSSYS": {
          "AMOSSYS": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 1
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20251014114027+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 25 pour Word",
      "/ModDate": "D:20251014062248-07\u002700\u0027",
      "/Producer": "PDFKit.NET 12.3.654.0 DMV10",
      "pdf_file_size_bytes": 274579,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "ANSSI-CC-2025_29fr.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2025/29": 3
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 1,
          "ALC_FLR.1": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 2,
          "EAL4": 3
        },
        "ITSEC": {
          "ITSEC E3 El\u00e9mentaire": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "AMOSSYS": {
          "AMOSSYS": 1
        },
        "CESTI": {
          "CESTI": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 7
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20251014114218+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 25 pour Word",
      "/ModDate": "D:20251014062249-07\u002700\u0027",
      "/Producer": "PDFKit.NET 12.3.654.0 DMV10",
      "pdf_file_size_bytes": 704424,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "http://www.sogis.eu/",
          "mailto:[email protected]",
          "http://www.cyber.gouv.fr/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 14
    },
    "st_filename": "ANSSI-Cible-CC-2025_29en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.AUDITORS_REVIEW_LO": 2,
          "A.AUDITORS_REVIEW_LOGS": 1,
          "A.COMPETENT_OPERATO": 2,
          "A.COMPETENT_OPERATORS": 1,
          "A.CPS": 1,
          "A.DATABASE_SECURITY_": 2,
          "A.DATABASE_SECURITY_AND_BACKUP": 5,
          "A.DISPOSAL_OF_AUTHEN": 2,
          "A.DISPOSAL_OF_AUTHENTICATION_DATA": 1,
          "A.HSM_SECURITY": 4,
          "A.NOTIFY_AUTHORITIES_": 2,
          "A.NOTIFY_AUTHORITIES_OF_SECURITY_ISSUES": 1,
          "A.OPERATING_SYSTEM": 3,
          "A.PHYSICAL_COMMUNICATIONS_PROTECTIONS": 1,
          "A.PHYSICAL_PROTECTION": 2,
          "A.PHYSICAL_PROTECTIONS": 1,
          "A.SANE_INSTALL": 4,
          "A.SOCIAL_ENGINEERING_": 2,
          "A.SOCIAL_ENGINEERING_TRAINING": 1,
          "A.TRUSTED_AUTH_SERVE": 2,
          "A.TRUSTED_AUTH_SERVER": 3
        },
        "O": {
          "O.CPS": 1
        },
        "OE": {
          "OE.ADMINISTRATOR_DOCUMENTATION": 2,
          "OE.AUDITORS_REVIEW_LOGS": 3,
          "OE.AUTHENTICATE_OPERATORS": 3,
          "OE.BACKUP_STORAGE": 3,
          "OE.CERT_REPOSITORY": 3,
          "OE.COMPETENT_OPERATORS": 2,
          "OE.CONFIGURATION_MANAGEMENT": 3,
          "OE.CREDENTIALS_POLICY": 3,
          "OE.DATA_INTEGRITY": 3,
          "OE.ENVIRONMENT_CRYPTOGRAPHY": 3,
          "OE.KEY_ARCHIVAL": 3,
          "OE.LIFECYCLE_SECURITY": 2,
          "OE.MALICIOUS_CODE_NOT_SIGNED": 3,
          "OE.NOTIFY_AUTHORITIES_OF_SECURITY_ISSU": 1,
          "OE.NOTIFY_AUTHORITIES_OF_SECURITY_ISSUES": 1,
          "OE.OPERATING_SYSTEM": 3,
          "OE.PERIODIC_INTEGRITY_CHECK": 3,
          "OE.PHYSICAL_COMMUNICATION_PROTECTIONS": 3,
          "OE.PHYSICAL_PROTECTION": 3,
          "OE.PREVENT_MALICIOUS_CODE": 2,
          "OE.PROTECT_DATA_INTERNAL_TRANSFER": 3,
          "OE.RECOVERY_FROM_MALICIOUS_CODE": 3,
          "OE.REPAIR_SECURITY_FLAWS": 2,
          "OE.REQUIRE_INSPECTION_DOWNLOAD": 2,
          "OE.SANE_INSTALL": 3,
          "OE.SECURE_KEY_STORAGE_AND_OPERATIONS": 3,
          "OE.SECURITY_ROLES": 3,
          "OE.SOCIAL_ENGINEERING_TRAINING": 3,
          "OE.TIMESTAMPS": 3,
          "OE.VALIDATION_OF_SECURITY_FUNCTIONS": 2
        },
        "OP": {
          "OP.AUTHORIZE_HSM": 1,
          "OP.FWD_HTTP_REQS": 1,
          "OP.FWD_PRIVKEY_REQS": 1,
          "OP.PRIVILEGED_WRITE_CA_AND_CERTS": 1,
          "OP.READ_AUDIT_LOGS": 1,
          "OP.READ_CERTS": 1,
          "OP.READ_CONFIG": 1,
          "OP.READ_TLS_KEYS": 1,
          "OP.UNAUTHORIZE_HSM": 1,
          "OP.USE_PRIVKEY": 1,
          "OP.VERIF_AUTH_TOKEN": 1,
          "OP.WRITE_AUDIT_LOG": 1,
          "OP.WRITE_CA_AND_CERTS": 1,
          "OP.WRITE_CSR": 1
        },
        "OT": {
          "OT.ADMIN_ACCESS_CONTR": 2,
          "OT.ADMIN_ACCESS_CONTROL": 3,
          "OT.AUDIT": 5,
          "OT.CA_MANAGEMENT": 3,
          "OT.CERTIFICATES": 5,
          "OT.CERTIFICATION": 5,
          "OT.COMMMUNICATION_PRO": 2,
          "OT.COMMMUNICATION_PROTECTIONS": 3,
          "OT.CRL_MANAGEMENT": 3,
          "OT.DATA_IMPORT_EXPORT": 5,
          "OT.MAINTAIN_USER_ATTRI": 2,
          "OT.MAINTAIN_USER_ATTRIBUTES": 2,
          "OT.MANAGE_SECURITY_FU": 2,
          "OT.MANAGE_SECURITY_FUNCTIONS": 3,
          "OT.NON_REPUDIATION": 2,
          "OT.PROTECT_AUDIT_LOG": 3,
          "OT.REPLAY_PROTECTION": 5,
          "OT.RESIDUAL_MEMORY_CLEARING": 3,
          "OT.RESTRICT_ACTIONS_BEFORE_AUTHENTIFIC": 1,
          "OT.RESTRICT_ACTIONS_BEFORE_AUTHENTIFICATION": 2,
          "OT.SESSION_MANAGEMENT": 5,
          "OT.TOE_CRYPTOGRAPHY": 5
        },
        "T": {
          "T.AUDIT_LOG_CORRUPTI": 2,
          "T.AUDIT_LOG_CORRUPTION": 9,
          "T.CERTIFICATE_CORRUPTION": 12,
          "T.CONFIG_CORRUPTION": 8,
          "T.CRITICAL_COMPONENT": 2,
          "T.CRITICAL_COMPONENT_FAILURE": 1,
          "T.DISCLOSURE_OF_SECR": 2,
          "T.DISCLOSURE_OF_SECRET_KEYS": 5,
          "T.FLAWED_CODE": 4,
          "T.MALICIOUS_CODE_EXPLOITATION": 4,
          "T.MESSAGE_CONTENT_TA": 2,
          "T.MESSAGE_CONTENT_TAMPERING": 5,
          "T.MODIFICATION_OF_SE": 2,
          "T.MODIFICATION_OF_SECRET_KEYS": 6,
          "T.PHYSICAL_UNAUTHORI": 2,
          "T.PHYSICAL_UNAUTHORIZED_ENTITY_ACCESS": 2,
          "T.RESIDUAL_MEMORY_ACCESS": 3,
          "T.SENDER_DENIABILITY": 4,
          "T.UNAUTHENTICATED_TRANSACTIONS": 6,
          "T.UNAUTHORIZED_ENTITY_ACCESS": 11,
          "T.UNDETECTED_ACTIONS": 8,
          "T.WEAK_CRYPTOGRAPHY": 5
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE": 3,
          "AGD_OPE.1": 1,
          "AGD_PRE": 3,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR.1": 6,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.3": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 6,
          "EAL4 augmented": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 3,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 3,
          "FAU_GEN.2.1": 1,
          "FAU_SAR.1": 3,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 3,
          "FAU_SAR.2.1": 1,
          "FAU_SAR.3": 3,
          "FAU_SAR.3.1": 1,
          "FAU_SEL.1": 3,
          "FAU_SEL.1.1": 1
        },
        "FCO": {
          "FCO_NRO_CIMC": 4,
          "FCO_NRO_CIMC.3": 6,
          "FCO_NRO_CIMC.3.1": 1,
          "FCO_NRO_CIMC.3.2": 1,
          "FCO_NRO_CIMC.3.3": 1,
          "FCO_NRO_CIMC.4": 4,
          "FCO_NRO_CIMC.4.1": 1,
          "FCO_NRO_CIMC.4.2": 1
        },
        "FCS": {
          "FCS_SOF_CIMC.1": 3,
          "FCS_SOF_CIMC.1.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 3,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 3,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_CIMC_CER.1": 3,
          "FDP_CIMC_CER.1.1": 1,
          "FDP_CIMC_CER.1.2": 1,
          "FDP_CIMC_CER.1.3": 1,
          "FDP_CIMC_CER.1.4": 1,
          "FDP_CIMC_CRL.1": 3,
          "FDP_CIMC_CRL.1.1": 1,
          "FDP_CIMC_CSE.1": 3,
          "FDP_CIMC_CSE.1.1": 1,
          "FDP_DAU.1": 3,
          "FDP_DAU.1.1": 1,
          "FDP_DAU.1.2": 1,
          "FDP_RIP.1": 3,
          "FDP_RIP.1.1": 1,
          "FDP_UCT.1": 3,
          "FDP_UCT.1.1": 1
        },
        "FIA": {
          "FIA_ATD.1": 4,
          "FIA_UAU.1": 3,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.6": 3,
          "FIA_UAU.6.1": 1,
          "FIA_UID.1": 6,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB.1": 3,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MODF_IDA.3": 1,
          "FMT_MOF.1": 6,
          "FMT_MOF.1.1": 1,
          "FMT_MOF_CIMC.3": 3,
          "FMT_MOF_CIMC.3.3": 1,
          "FMT_MOF_CIMC.5": 3,
          "FMT_MOF_CIMC.5.1": 1,
          "FMT_MOF_CIMC.5.2": 1,
          "FMT_MOF_CIMC.5.3": 1,
          "FMT_MOF_IDA.3": 6,
          "FMT_MOF_IDA.3.1": 1,
          "FMT_MOF_IDA.3.2": 1,
          "FMT_MOF_IDA.3.3": 1,
          "FMT_MOF_IDA.3.4": 1,
          "FMT_MTD.1": 4,
          "FMT_MTD.1.1": 1,
          "FMT_SMF.1": 4,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 2,
          "FMT_SMR.1": 2,
          "FMT_SMR.2": 4,
          "FMT_SMR.2.1": 1,
          "FMT_SMR.2.2": 1,
          "FMT_SMR.2.3": 1
        },
        "FPT": {
          "FPT_ITC.1": 3,
          "FPT_ITC.1.1": 1,
          "FPT_RPL.1": 3,
          "FPT_RPL.1.1": 1,
          "FPT_RPL.1.2": 1
        },
        "FTA": {
          "FTA_SSL.3": 3,
          "FTA_SSL.3.1": 1
        },
        "FTP": {
          "FTP_TRP.1": 4,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 3,
            "TLS v1.3": 1
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "AMOSSYS": {
          "AMOSSYS": 2
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 1
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        },
        "FIPS": {
          "FIPS 140-2": 2
        },
        "RFC": {
          "RFC 5280": 1,
          "RFC5280": 3
        },
        "X509": {
          "X.509": 8
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 27
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Antoine GUELLIER",
      "/CreationDate": "D:20250912163327+08\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/MSIP_Label_5f8610cf-4e4f-4168-a9a0-556235a89a9b_ActionId": "1e42b2bc-5d7f-44f6-9170-0defe7e86da2",
      "/MSIP_Label_5f8610cf-4e4f-4168-a9a0-556235a89a9b_ContentBits": "0",
      "/MSIP_Label_5f8610cf-4e4f-4168-a9a0-556235a89a9b_Enabled": "true",
      "/MSIP_Label_5f8610cf-4e4f-4168-a9a0-556235a89a9b_Method": "Privileged",
      "/MSIP_Label_5f8610cf-4e4f-4168-a9a0-556235a89a9b_Name": "Unclassified",
      "/MSIP_Label_5f8610cf-4e4f-4168-a9a0-556235a89a9b_SetDate": "2025-09-11T13:04:15Z",
      "/MSIP_Label_5f8610cf-4e4f-4168-a9a0-556235a89a9b_SiteId": "7694d41c-5504-43d9-9e40-cb254ad755ec",
      "/MSIP_Label_5f8610cf-4e4f-4168-a9a0-556235a89a9b_Tag": "10, 0, 1, 1",
      "/MSIP_Label_9d900cae-8562-48ba-b9f0-7d683a8ec459_ActionId": "15dc182a-ce40-47eb-abee-7fa722c3e87a",
      "/MSIP_Label_9d900cae-8562-48ba-b9f0-7d683a8ec459_ContentBits": "0",
      "/MSIP_Label_9d900cae-8562-48ba-b9f0-7d683a8ec459_Enabled": "true",
      "/MSIP_Label_9d900cae-8562-48ba-b9f0-7d683a8ec459_Method": "Privileged",
      "/MSIP_Label_9d900cae-8562-48ba-b9f0-7d683a8ec459_SiteId": "76eb9ac3-0a27-417b-9e7d-e8eb81f82b62",
      "/ModDate": "D:20250912163327+08\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "/Title": "FQR 550 0219 Ed 11 - IDEMIA CA v1.3 Security Target",
      "pdf_file_size_bytes": 1725764,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 69
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2025_29fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_FLR.1"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2025_29en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "853ed346caeaf30f59f8067edc378c7b683caca9cda624dae182d49fab50bda7",
      "txt_hash": "f18fee3f3f188c1fbd4f12035644cf012ec29851ad2a59899d1e5135433a2e64"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "37a6b62e573afd0c02683dcba85b9c9ca7e7aabb80e50bfdbf3eb35d24eed267",
      "txt_hash": "9a65930f9144a7fc6361c02f96db60ed3f8c369e3c746e0475aa173db03894f4"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "7b76b0e6667ecc1e681e39b3653a4412bd9d18e4669f25e74aaf32978ea75cd8",
      "txt_hash": "2d14486e429652b3e148c3e45e25b55cf5801ee9965547c9e7399f0ba74530fa"
    }
  },
  "status": "active"
}