MultiApp V5.1 GP-SE PlatformConfiguration 1 : 5.1 revision B version 2 (0x3055) et filter set 0x00,configuration 2 : 5.1 revision C version 2 (0x3055) et filter set 0x10,configuration 3 : 5.1 revision B version 2 (0x3055) et filter set 0x14,configuration 4 : 5.1 revision C version 2 (0x3055) et filter set 0x24(ANSSI-CC-2025/57)

CSV information

Status active
Valid from 04.02.2026
Valid until 04.02.2031
Scheme 🇫🇷 FR
Manufacturer THALES DIS FRANCE SA
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL6+, ALC_FLR.2
Protection profiles

Heuristics summary

Certificate ID: ANSSI-CC-2025/57

Certificate

Extracted keywords

Security level
EAL6, EAL2
Security Assurance Requirements (SAR)
ALC_FLR.2
Protection profiles
BSI-PP-099-V2-2020
Certificates
ANSSI-CC-2025/57
Evaluation facilities
CEA - LETI

File metadata

Creation date D:20260119101711+01'00'
Modification date D:20260204134646+00'00'
Pages 2
Creator Acrobat PDFMaker 25 pour Word
Producer PDFKit.NET 26.1.0.63468 DMV9

Certification report

Extracted keywords

Symmetric Algorithms
DES

Security level
EAL6, EAL2, EAL7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
AGD_OPE, AGD_PRE, ALC_FLR.2, ALC_FLR, AVA_VAN
Protection profiles
BSI-CC-PP-0099-V2-2020
Certificates
ANSSI-CC-2025/57, ANSSI-CC-2023/01-R01
Evaluation facilities
CESTI, CEA - LETI

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Creation date D:20260119101909+01'00'
Modification date D:20260204134644+00'00'
Pages 14
Creator Acrobat PDFMaker 25 pour Word
Producer PDFKit.NET 26.1.0.63468 DMV9

References

Outgoing
  • ANSSI-CC-2023/01-R01 - active - AQUARIUS_BA_09 & CA_09 Référence : AQUARIUS_TOE_v3 ( ANSSI-CC-2023/01-R01)

Security target

Extracted keywords

Symmetric Algorithms
AES, AES-256, AES256, DES, TDEA, 3DES, TDES, Triple-DES, HMAC, KMAC, CMAC
Asymmetric Algorithms
RSA 1024, ECDH, ECDSA, ECC, DH, Diffie-Hellman
Hash functions
SHA1, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA224, SHA2, SHA3, SHA3-256, SHA3-384, SHA3-512
Schemes
MAC, Key Agreement, Key agreement
Protocols
TLS, PACE
Randomness
PRNG, RNG, RND
Block cipher modes
ECB, CBC, CCM

JavaCard versions
Java Card 3.1
JavaCard API constants
TYPE_ACCESS
CPLC
IC Fabricator, IC Type
IC data groups
EF.DG1, EF.DG16, EF.DG3, EF.DG4
Trusted Execution Environments
SE
Vendor
Thales

Security level
EAL6+, EAL6, EAL4, EAL 6+, EAL4 augmented, EAL6 augmented
Claims
D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.APP_KEYS, D.ISD_KEYS, D.APSD_KEYS, D.CASD_KEYS, D.PIN, D.TOE_IDENTIFIER, D.GP_REGISTRY, D.GP_CODE, D.CVM_PIN, D.CVM_MGMT_STATE, D.TOKEN-VERIFICATION-KEY, D.RECEIPT-GENERATION-KEY, D.CONFIRMATION-DATA, D.DAP_BLOCK, D.APSD_DAP_KEYS, D.CASD_DAP_KEYS, D.OS-UPDATE_DEC-KEY, D.OS-UPDATE_SGNVER-KEY, D.OS-, D.OS-UPDATE-CODE-ID, D.OS-UPDATE_ADDITIONALCODE, O.DELETION, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.RNG, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.LOAD, O.INSTALL, O.CARD-MANAGEMENT, O.DOMAIN_RIGHTS, O.APPLI-AUTH, O.COMM_AUTH, O.COMM_INTEGRITY, O.COMM_CONFIDENTIALITY, O.SECURITY_DOMAINS, O.NO-KEY-REUSE, O.PRIVILEGES-MANAGEMENT, O.LC-MANAGEMENT, O.ARRAY_VIEWS_CONFID, O.SCP, O.CARD-, O.DOMAIN-RIGHTS, O.SECURITY-, O.COMM-AUTH, O.COMM-INTEGRITY, O.COMM-, O.PRIVILEGES-, O.GLOBAL-CVM, O.CVM-BLOCK, O.CVM-MGMT, O.RECEIPT, O.TOKEN, O.SECURE_LOAD_ACODE, O.SECURE_AC_ACTIVATION, O.TOE_IDENTIFICATION, O.CONFID-OS-UPDATE, O.PIN_MNGT, O.KEY_DELETION, O.ARRAY_VIEWS_INTEG, O.COMM-CONFIDENTIALITY, O.CVM-MGNT, O.SECURITY-DOMAINS, O.RND, O.APPLET, O.CODE_CAP_FILE, O.JAVAOBJECT, O.OBJ_DELETION, O.CVM-MNGT, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, T.COM_EXPLOIT, T.UNAUTHORIZED_CARD_MNGT, T.LIFE_CYCLE, T.BRUTE-FORCE-SCP, T.UNAUTHORISED-CARD-MGMT, T.LIFE-CYCLE, T.COM-EXPLOIT, T.CVM-IMPERSONATE, T.CVM-UPDATE, T.BRUTE-FORCE-CVM, T.RECEIPT, T.TOKEN, T.INTEGAPPLI-DATA, T.UNAUTHORISED-TOE-CODE-UPDATE, T.FAKE-SGNVER-KEY, T.WRONG-UPDATE-STATE, T.INTEG-OS-UPDATE_LOAD, T.CONFID-OS-UPDATE_LOAD, T.INTEG-APPLI-, T.INTEG, T.CONFID-OS-UPDATE-LOAD, A.DELETION, A.APPLET, A.VERIFICATION, A.OTA-ADMIN, A.APPS-PROVIDER, A.VERIFICATION-AUTHORITY, A.KEY-ESCROW, A.PERSONALIZER, A.CONTROLLING-AUTHORITY, A.PRODUCTION, A.ISSUER, A.SCP-SUPP, A.KEYS-PROT, A.ADMIN, A.PERSONALISER, A.OS-UPDATE-EVIDENCE, A.SECURE_ACODE_MANAGEMENT, A.CAP_FILE, R.JAVA, OT.X, OP.ARRAY_ACCESS, OP.ARRAY_LENGTH, OP.ARRAY_AASTORE, OP.ARRAY_T_ALOAD, OP.ARRAY_T_ASTORE, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_CAP_FILE, OP.DELETE_CAP_FILE_APPLET, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUT, OP.PUTFIELD, OP.PUTSTATIC, OE.APPLET, OE.CARD-MANAGEMENT, OE.SCP, OE.VERIFICATION, OE.CODE-EVIDENCE, OE.OTA-ADMIN, OE.APPS-PROVIDER, OE.VERIFICATION-AUTHORITY, OE.KEY-ESCROW, OE.PERSONALIZER, OE.CONTROLLING-AUTHORITY, OE.PRODUCTION, OE.AID-MANAGEMENT, OE.OTA-LOADING, OE.OTA-SERVERS, OE.AP-KEYS, OE.KEY-GENERATION, OE.CA-KEYS, OE.VA-KEYS, OE.KEY-CHANGE, OE.SECURITY-DOMAINS, OE.ISSUER, OE.ISSUER-KEYS, OE.APPLICATIONS, OE.CARD_MANAGEMENT, OE.OS-UPDATE-ENCRYPTION, OE.CAP_FILE, OE.ADMIN, OE.VERIFICATION-, OE.PERSONALISER, OE.CONTROLLING-, OE.SCP-SUPP, OE.KEYS-PROT, OE.LOADING, OE.SERVERS, OE.ISD-KEYS, OE.TOKEN-GEN, OE.RECEIPT-VER, OE.DAP_BLOCK_GEN, OE.OS-UPDATE-EVIDENCE, OE.SECURE_ACODE_MANAGEMENT, OE.KEY-, OE.RECEIPTVER, OE.OS-, OE.NATIVE, OSP, OSP.VERIFICATION, OSP.AID-MANAGEMENT, OSP.OTA-LOADING, OSP.OTA-SERVERS, OSP.APSD-KEYS, OSP.KEY-GENERATION, OSP.CASD-KEYS, OSP.KEY-CHANGE, OSP.SECURITY-DOMAINS, OSP.ISSUER-KEYS, OSP.APPLICATIONS, OSP.LOADING, OSP.SERVERS, OSP.ISD-KEYS, OSP.RNG, OSP.TOKEN-GEN, OSP.RECEIPT-VER, OSP.DAP_BLOCK_GEN, OSP.ATOMIC_ACTIVATION, OSP.TOE_IDENTIFICATION, OSP.ADDITIONAL_CODE_SIGNING, OSP.ADDITIONAL_CODE_ENCRYPTION
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.5, ADV_FSP.4, ADV_ARC, ADV_TDS.1, ADV_IMP.1, ADV_TDS.3, ADV_FSP.1, ADV_FSP.2, ADV_TDS.4, ADV_FSP, ADV_IMP, ADV_TDS, ADV_INT.2, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_DVS.2, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ALC_TAT.1, ALC_CMC.4, ALC_TAT.2, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, ATE_FUN.1, ATE_COV.1, ATE_COV.2, ATE_DPT.1, AVA_VAN.5, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FAU_SAS.1, FCO_NRO, FCO_NRO.2, FCO_NRR, FCO_NRR.1, FCS_RNG, FCS_CKM, FCS_COP, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.2.1, FCS_CKM.3, FCS_CKM.3.1, FCS_CKM.4.1, FCS_COP.1.1, FCS_CMK.4, FDP_ACC, FDP_ACF, FDP_IFC, FDP_IFF, FDP_RIP, FDP_ROL, FDP_SDI, FDP_ITC, FDP_UIT, FDP_UCT, FDP_ACC.2, FDP_ACF.1, FDP_IFC.1, FDP_IFF.1, FDP_RIP.1, FDP_ROL.1, FDP_SDI.2, FDP_ACC.1, FDP_ITC.1, FDP_ITC.2, FDP_RIP.1.1, FDP_IFC.2, FDP_UIT.1, FDP_UCT.1, FDP_SDC.1, FDP_ITT.1, FIA_AFL, FIA_ATD, FIA_UID, FIA_USB, FIA_UAU, FIA_ATD.1, FIA_UID.2, FIA_USB.1, FIA_UAU.4, FIA_UAU.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UID.1.1, FIA_UID.1.2, FIA_UID.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6.1, FIA_AFL.1, FIA_API.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_MSA, FMT_SMF.1, FMT_SMR.1, FMT_MTD, FMT_SMR, FMT_SMF, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.1, FMT_MTD.3, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPR_UNO.1, FPR_UNO, FPR_UNO.1.1, FPT_EMS, FPT_TST, FPT_EMS.1, FPT_FLS.1, FPT_TDC.1, FPT_FLS, FPT_RCV, FPT_TDC, FPT_EMS.1.1, FPT_EMS.1.2, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TST.1, FPT_PHP, FPT_PHP.3, FPT_RCV.4, FPT_ITT, FPT_ITT.1, FPT_FLS.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3.1, FPT_RCV.3, FRU_FLT.2, FTP_ITC, FTP_TRP, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1, FTP_ITC.1
Protection profiles
BSI-CC-PP- 00842014, BSI-CC-PP-0099-V2-, BSI-PP-0056-V2-MA-2012, BSI-CC-PP-0084-2014
Certificates
ANSSI-CC-2023/01-R01, CC-1, CC-2, CC-3

Side-channel analysis
Leak-Inherent, physical probing, DPA, SPA, timing attacks, physical tampering, Physical Tampering, malfunction, Malfunction, fault induction
Certification process
out of scope, biometry is out of scope of the TOE, in §1.3, Filter set field = 0X00 Rev. C with patch or 0X10 Rev. C with patch), we consider BioPIN out of scope of the TOE, filter set = 0x00 and 0x10) no patch is loaded and Biometry feature is out of scope of the TOE, • The DELETE and INSTALL APDU commands are out of scope of this SPM, 1 : MultiApp v5.1 Rev. B with biometry features but forbidden to use without patch (biometry is out of scope of the TOE) 2. Config 2 : MultiApp v5.1 Rev. C with biometry features but forbidden to use without, biometry is out of scope of the TOE) 3. Config 3 : MultiApp v5.1 Rev. B with biometry features included in the TOE (Upgraded, in §1.3, Filter set field = 0X00 Rev. C with patch or 0X10 Rev. C with patch), we consider BioPIN out of scope of the TOE. 2.4 TOE DESCRIPTION 2.4.1 Architecture The MultiApp V5.1 platform is an operating, for 2 others configurations (filter set = 0x00 and 0x10) no patch is loaded and Biometry feature is out of scope of the TOE. If another patch is required in the future, it would require at least a maintenance of, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are, the active context is not the same as the Selected Applet Context. Application note: This rule is out of scope of the SPM modelisation because CLEAR_ON_DESELECT objects can be created exclusively in the API, is also out of scope (Hypothesis 4 of the SPM document [MAV51_SPM]).. 3) S.CAP_FILE performing OP.ARRAY_AASTORE of the, as a null reference. Such a mechanism is implementation-dependent. The deletion of applets is out of scope of this SPM scope. In the case of an array type, fields are components of the array ([JVM], §2.14, Context, the Selected Applet Context, and the Active Applets Note: the Selected Applet context is out of scope of the VM functionalities. It is a process that occurs prior to VM start The initial setting of, and deletion; see #.DELETION and #.INSTALL). • The DELETE and INSTALL APDU commands are out of scope of this SPM. The list of registred applets’ AIDs is proven to be not modified during the execution, 1, are out of the scope of the SPM as they are linked to the applet loading or deletion that is out of scope of the SPM boundaries limited to VM opcodes The SFR FMT_MTD.3/JCRE is out of scope of the SPM, because AID registry is created during loading phase, which is also out of scope of the SPM (Hypothesis 2 of the SPM document [MAV51_SPM]). MultiApp V5.1: GP-SE Security Target

Standards
FIPS180-4, FIPS202, FIPS197, FIPS 197, FIPS 198, FIPS 180-4, SP 800-67, PKCS#1, PKCS#5, BSI-AIS31, AIS31, AIS20, ICAO, SCP02, SCP21, SCP01, SCP03, SCP10, SCP11, SCP22, SCP80, SCP81, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Creation date D:20251211164533+01'00'
Modification date D:20251211164533+01'00'
Pages 199
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

References

Outgoing
  • ANSSI-CC-2023/01-R01 - active - AQUARIUS_BA_09 & CA_09 Référence : AQUARIUS_TOE_v3 ( ANSSI-CC-2023/01-R01)

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

ANSSI-CC-2025/57

Extracted SARs

ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.5, AGD_OPE.1, AGD_PRE.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_FLR.2, ALC_LCD.1, ALC_TAT.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.2, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, AVA_VAN.5

Similar certificates

Name Certificate ID
MultiApp V5.1 JCSConfiguration 1 : 5.1 revision B version 2 (0x3055) et filter set 0x00,configuration 2 : 5.1 revisio... ANSSI-CC-2025/55 Compare
IAS Classic v5.2.3 with MOC Server v3.1.1 on MultiApp V5.2 Versions 5.2.3.A.C et 5.2.3.A.O (ANSSI-CC-2025/40) ANSSI-CC-2025/40 Compare
MultiApp V5.0 Platform (configuration 1 : 5.0.1 version 2a et configuration 2 : 5.0.1 version 2b) (ANSSI-CC-2025/42) ANSSI-CC-2025/42 Compare
IAS Classic v5.2 on MultiApp V5.0 (versions 5.2.0.A.C version 2 et 5.2.0.A.O version 2) (ANSSI-CC-2025/46) ANSSI-CC-2025/46 Compare
IAS Classic v5.2.1 on Open platform MultiApp V5.1Versions 5.2.0.A.C et 5.2.0.A.O (ANSSI-CC-2025/58) ANSSI-CC-2025/58 Compare
Produit IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 Version 5.2.1.A.C et 5.2.1.A.O ( ANSSI-CC-2023/42 ) ANSSI-CC-2023/42 Compare
IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A (ANSSI-CC-... ANSSI-CC-2023/57 Compare
eTravel 3.2 BAC on MultiApp V5.2 version 3.2.1.0 (ANSSI-CC-2025/43) ANSSI-CC-2025/43 Compare
eTravel 3.2 EAC/BAC on MultiApp V5.2 version 3.2.1.0 (ANSSI-CC-2025/44) ANSSI-CC-2025/44 Compare
eTravel 3.2 EAC on SAC on MultiApp V5.2 version 3.2.1.0 (ANSSI-CC-2025/45) ANSSI-CC-2025/45 Compare
IAS Classic V4.4.2 on MultiApp V4.1 Version IAS 4.4.2.A version 2 (ANSSI-CC-2025/54) ANSSI-CC-2025/54 Compare
MultiApp 5.2 Premium PQC GP-SE(version 5.2) (ANSSI-CC-2025/30) ANSSI-CC-2025/30 Compare
ChipDoc v3.2 on JCOP 4 P71 in ICAO EAC(1&2) with PACE configuration (Version 3.2.0.52) (ANSSI-CC-2025/02) ANSSI-CC-2025/02 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.3.3) (ANSSI-CC-2025/13) ANSSI-CC-2025/13 Compare
ACOS-IDv2.1 eMRTD (C) BAC Configuration Version 2.1 eMRTD (C) (ANSSI-CC-2025/48) ANSSI-CC-2025/48 Compare
NPCT7xx TPM2.0 rev 1.59 configuration version 1.5.3.3 (ANSSI-CC-2025/14) ANSSI-CC-2025/14 Compare
ACOS-IDv2.1 eMRTD (C) EAC/PACE Configuration Version 2.1 eMRTD (C) (ANSSI-CC-2025/49) ANSSI-CC-2025/49 Compare
Connected eSE 5.3.4 v1.2 Platform (Revision 1.0) (ANSSI-CC-2025/04) ANSSI-CC-2025/04 Compare
Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h (Version 4.2.0, Java Car... ANSSI-CC-2020/65v2 Compare
ChipDoc v3.2 on JCOP 4 P71 in SSCD configuration (Version 3.2.0.52) (ANSSI-CC-2025/03) ANSSI-CC-2025/03 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.3.3) (ANSSI-CC-2025/12) ANSSI-CC-2025/12 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.3.3) (ANSSI-CC-2025/11) ANSSI-CC-2025/11 Compare
ChipDoc v3.2 on JCOP 4 P71 in ICAO BAC configuration (Version 3.2.0.52)(ANSSI-CC-2025/01) ANSSI-CC-2025/01 Compare
MultiApp 5.2 Premium PQC (version 5.2)(ANSSI-CC-2025/32) ANSSI-CC-2025/32 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration Version 4.1.1.52 ( ANSSI-CC-2023/68) ANSSI-CC-2023/68 Compare
Smart Tachograph G2 on MultiApp V4.0.1 (Versions 2.0.1 G et 2.0.1 H) (EUCC-ANSSI-2025-03-02) ANSSI-CC-2025/03 Compare
Microcontrôleur sécurisé ST33H768 révision C,Firmware révision 5, incluant optionnellement la bibliothèque cryptograp... ANSSI-CC-2017/01 Compare
MultiApp v4.1 Javacard Platform(version 4.1.0.4) (ANSSI-CC-2025/53) ANSSI-CC-2025/53 Compare
ACOS-IDv2.1 SSCD (C) CB-Comm Version 2.1 SSCD (C) (ANSSI-CC-2025/50) ANSSI-CC-2025/50 Compare
ACOS-IDv2.1 SSCD (C) CL-TC-Comm Version 2.1 SSCD (C) (ANSSI-CC-2025/51) ANSSI-CC-2025/51 Compare
PPCA application on MultiApp V5.1 Platform (version 1.0.1.A) (ANSSI-CC-2025/05) ANSSI-CC-2025/05 Compare
IAS Classic V4.4.2 with MOC server v1.1 on MultiApp V4.0.1(IAS version 4.4.2.A / MOC Server 1.1.1A) (ANSSI-CC-2018/24-R01) ANSSI-CC-2018/24-R01 Compare
Quantum IAS v1.0.0.A and MOC Server v3.1.1 on MultiApp V5.2 Premium PQCVersions 1.0.0.A (Q-IAS) et 3.1.1 (MOC server)... ANSSI-CC-2026/03 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration (Version 4.0.1.52) (ANSSI-CC-2023/11-R01) ANSSI-CC-2023/11-R01 Compare
ACOS-IDv4.1 eMRTD (A) BAC Configuration (version 4.1 eMRTD (A)) ( ANSSI-CC-2025/15) ANSSI-CC-2025/15 Compare
ACOS-IDv4.1 eMRTD (A) EAC/PACE Configuration (version 4.1 eMRTD (A)) (ANSSI-CC-2025/16) ANSSI-CC-2025/16 Compare
BELPIC V1.8 applet On MultiApp V4.1 Platform Révision 1.0 version 2 (ANSSI-CC-2025/56) ANSSI-CC-2025/56 Compare
eTravel v2.2 BAC on MultiApp v4.0.1 platform with Filter Set 1.0 (version 1.0) (ANSSI-CC-2020/43-R01) ANSSI-CC-2020/43-R01 Compare
eTravel v2.2 EAC/BAC on MultiApp v4.0.1 platform with Filter Set 1.0 (version 1.0) (ANSSI-CC-2020/44-R01) ANSSI-CC-2020/44-R01 Compare
eTravel v2.2 EAC/SAC on MultiApp v4.0.1 platform with Filter Set 1.0 (version 1.0) (ANSSI-CC-2020/45-R01) ANSSI-CC-2020/45-R01 Compare
ChipDoc v3.1 on JCOP 4 P71 in ICAO EAC(1&2) with PACE configuration (Version 3.1.6.52) (ANSSI-CC-2021/19-R01) ANSSI-CC-2021/19-R01 Compare
eTravel 3.1 BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/34 ) ANSSI-CC-2023/34 Compare
eTravel 3.1 EAC on SAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/36 ) ANSSI-CC-2023/36 Compare
eTravel 3.1 EAC on BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/35 ) ANSSI-CC-2023/35 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in SSCD configuration Version 4.1.1.52 (ANSSI-CC-2023/69) ANSSI-CC-2023/69 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO BAC configuration Version 4.1.1.52 ( ANSSI-CC-2023/67) ANSSI-CC-2023/67 Compare
MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip(MultiApp v4.0.1 with Filter Set 1.0) (A... ANSSI-CC-2020/42-R01 Compare
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH(Version 4.1.0.2)... ANSSI-CC-2023/30 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’applicati... ANSSI-CC-2018/58v2 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’applicati... ANSSI-CC-2018/56v2 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.2.2) (ANSSI-CC-2024/10) ANSSI-CC-2024/10 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.2.2) (ANSSI-CC-2024/11) ANSSI-CC-2024/11 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/54) ANSSI-CC-2023/54 Compare
eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated(version 2.3.0.1) ( ANSSI-CC-2023/55 ) ANSSI-CC-2023/55 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/56) ANSSI-CC-2023/56 Compare
IDEMIA CA (Version 1.3.1)(ANSSI-CC-2025/29) ANSSI-CC-2025/29 Compare
eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated Version de l’application eTravel : 2.3 Version de ... ANSSI-CC-2018/57v2 Compare
ACOS-IDv4.1 SSCD (A) CB-Comm (version 4.1 SSCD (A)) (ANSSI-CC-2025/17) ANSSI-CC-2025/17 Compare
Platforme MultiApp V5.1 GP-SE (version 5.1) (2023/33) ANSSI-CC-2023/33 Compare
Microcontrôleur sécurisé ST33G1M2 révision F, Firmware révisions 9 et A, incluant optionnellement la bibliothèque cry... ANSSI-CC-2015/61 Compare
ACOS-IDv4.1 SSCD (A) CL-TC-Comm (version 4.1 SSCD (A)) (ANSSI-CC-2025/18) ANSSI-CC-2025/18 Compare
IAS Classic V4.4 with MOC Server 1.1 on MultiApp V4(IAS version 4.4.0.A / MOC Server 1.1.1A) (ANSSI-CC-2017/22-R01) ANSSI-CC-2017/22-R01 Compare
Digital Identity on MultiApp v4.0.1 platform with Filter Set 1.0 - PACE, EAC(version 1.0) (ANSSI-CC-2020/49-R01) ANSSI-CC-2020/49-R01 Compare
IAS ECC v2, version 1.3, in configuration #4 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’a... ANSSI-CC-2020/53-R01 Compare
MultiApp V5.1 Java Card Virtual Machine Version 5.1 (ANSSI-CC-2023/45) ANSSI-CC-2023/45 Compare
Connected eSE 5.3.4 Platform v1.1 (Revision 1.0) (ANSSI-CC-2024/33) ANSSI-CC-2024/33 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.2.2) (ANSSI-CC-2024/09) ANSSI-CC-2024/09 Compare
secunet konnektor 2.0.0 und 2.1.0, Version 5.70.4:2.0.0 und 5.70.4:2.1.0 BSI-DSZ-CC-1044-V8-2025 Compare
IAS Classic v5.0 with MOC Server v3.0 on MultiApp v4.2 Version 5.0.0.A.C, version 3.0.1A ANSSI-CC-2020/70 Compare
ChipDoc v3.1 on JCOP 4 P71 in SSCD configuration (Version 3.1.6.52) (ANSSI-CC-2021/20-R01) ANSSI-CC-2021/20-R01 Compare
ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52) (ANSSI-CC-2023/12-R01) ANSSI-CC-2023/12-R01 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO BAC configuration (Version 4.0.1.52) ( ANSSI-CC-2023/10-R01 ) ANSSI-CC-2023/10-R01 Compare
ChipDoc v3.1 on JCOP 4 P71 in ICAO BAC configuration (Version 3.1.6.52) (ANSSI-CC-2021/18-R01) ANSSI-CC-2021/18-R01 Compare
TESS v5.2 Platform(Révision 1.0) (ANSSI-CC-2025/19) ANSSI-CC-2025/19 Compare
Market Central SecureSwitch® Fiber Optic Switch Models: A, B, C, D, 1:1, 2:1, 3:1, 4:1, 5:1, 6:1, 7:1 and 8:1 383-4-506 Compare
MIFARE® Plus® EV2 on ST31R480 A01 (version 1.0.3) (ANSSI-CC-2025/33) ANSSI-CC-2025/33 Compare
MIFARE DESFire EV3 on ST31R480 A01(version 1.0.3) (ANSSI-CC-2025/31) ANSSI-CC-2025/31 Compare
Microcontrôleur sécurisé ST33H768 révision C, Firmware révision 4, incluant optionnellement la bibliothèque cryptogra... ANSSI-CC-2015/36 Compare
IAS ECC v2, version 1.3, in configuration #3 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’a... ANSSI-CC-2020/52-R01 Compare
IAS ECC v2, version 1.3, in configuration #2 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’a... ANSSI-CC-2020/51-R01 Compare
IAS ECC v2, version 1.3, in configuration #1 on ID-One Cosmo v8.2 open platform on NXP P6022M VB (Identification de l... ANSSI-CC-2020/50-R01 Compare
MISTRAL VS9 (Software v9.2.3.5 / Hardware IP9001 & IP9010) (ANSSI-CC-2025/06) ANSSI-CC-2025/06 Compare
Infineon eID-OSv1.0 eMRTD (A) BAC Configuration (version 1.0 eMRTD (A)) (ANSSI-CC-2025/23) ANSSI-CC-2025/23 Compare
NPCT6xx TPM 2.0 Hardware version FB5C85D and FB5C85E, Firmware version 1.3.0.1, 1.3.1.0 and 1.3.2.8 ANSSI-CC-2017/55 Compare
Infineon eID-OSv1.0 eMRTD (A) EAC/PACE Configuration (version 1.0 eMRTD (A)) (ANSSI-CC-2025/24) ANSSI-CC-2025/24 Compare
eTravel 2.4 en configuration BAC sur plateforme ID Motion V2 (Version de l’application eTravel : 2.4) (ANSSI-CC-2018/... ANSSI-CC-2018/36v2 Compare
eTravel 2.4 en configuration EAC SAC sur plateforme ID Motion V2 (Version de l’application eTravel : 2.4) (ANSSI-CC-2... ANSSI-CC-2018/38v2 Compare
eTravel 2.4 en configuration EAC BAC sur plateforme ID Motion V2(Version de l’application eTravel : 2.4) ( ANSSI-CC-2... ANSSI-CC-2018/37v2 Compare
eTravel v2.2 BAC on MultiApp platform v4.0.1 with Filter Set 1.0 Version 1.0 ANSSI-CC-2020/43 Compare
eTravel v2.2 EAC/BAC on MultiApp v4.0.1 platform with Filter Set 1.0 version 1.0 ANSSI-CC-2020/44 Compare
ChipDoc v3.1 on JCOP 4 P71 in ICAO EAC (1&2) with PACE configuration, Version 3.1.6.52 ANSSI-CC-2021/19 Compare
eTravel v2.2 EAC/SAC on MultiApp v4.0.1 platform with Filter Set 1.0 version 1.0 ANSSI-CC-2020/45 Compare
Cryptographic library NESLIB 6.11.3 on ST31R480 B01 (version 6.11.3) (ANSSI-CC-2025/27) ANSSI-CC-2025/27 Compare
Cryptographic library NESLIB 6.11.3 on ST31R480 A01 (version 6.11.3)(ANSSI-CC-2025/26) ANSSI-CC-2025/26 Compare
Application eTravel EAC v2.1, en configuration EAC et SAC, sur la plateforme ouverte ou fermée MultiApp V3.1 masquée ... ANSSI-CC-2015/39 Compare
Utimaco CryptoServer Se-Series Gen2 CP5, versions: CryptoServer CP5 Se12 5.1.2.0, CryptoServer CP5 Se52 5.1.2.0, Cryp... NSCIB-CC-2300142-02-CR Compare
ID-One Cosmo v9.1 embedding VITALE application(version 2.1.4)(ANSSI-CC-2022/33-R01) ANSSI-CC-2022/33-R01 Compare
Application IAS V4.2.0.B sur la plateforme Javacard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA (versio... ANSSI-CC-2015/37 Compare
Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA (Versio... ANSSI-CC-2016/04 Compare
Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA (Versio... ANSSI-CC-2016/03 Compare
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3... BSI-DSZ-CC-0772-2014 Compare
eTravel 2.5.A BAC on MultiApp V5.0.A (version 2.5.A.0) ANSSI-CC-2022/54 Compare
eTravel 2.5.A BAC on MultiApp V5.0.A(version 2.5.A.0) ANSSI-CC-2022/54 Compare
eTravel 2.5 BAC on MultiApp V5.0 (version 2.5.0.0) ANSSI-CC-2021/43 Compare
eTravel 2.5.A BAC on MultiApp V5.0.A (version 2.5.A.0.0) ANSSI-CC-2022/11 Compare
TEQS V1.0 (version 1.0) (ANSSI-CC-2025/20) ANSSI-CC-2025/20 Compare
eTravel 2.5.A EAC on BAC on MultiApp V5.0.A (version 2.5.A.0.0) ANSSI-CC-2022/12 Compare
eTravel 2.5.A EAC on SAC on MultiApp V5.0.A (version 2.5.A.0.0) ANSSI-CC-2022/13 Compare
eTravel 2.5.A EAC on SAC on MultiApp V5.0.A(version 2.5.A.0.0) ANSSI-CC-2022/56 Compare
eTravel 2.5.A EAC on BAC on MultiApp V5.0.A (version 2.5.A.0.0) ANSSI-CC-2022/55 Compare
Infineon eID-OSv1.0 SSCD (A) CB-Comm (version 1.0 SSCD (A)) (ANSSI-CC-2025/21) ANSSI-CC-2025/21 Compare
CC IDeal Citiz SmartCard (on SB23YR48B), version 1.4.5 IAS ECC application with PIN or MOC authentication ANSSI-CC-2010/57 Compare
Infineon eID-OSv1.0 SSCD (A) CL-TC-Comm (version 1.0 SSCD (A)) (ANSSI-CC-2025/22) ANSSI-CC-2025/22 Compare
ST33TPMF2ESPI Hardware ST33HTPM révision interne C,Firmware versions 1.2.46.00 et 1.2.46.08 ANSSI-CC-2015/80 Compare
Market Central SecureSwitch® Fiber Optic Switch Models: A, B, C, D, 1:1, 2:1, 3:1, 4:1, 5:1, 6:1, 7:1 and 8:1 657-LSS Compare
MultiApp V4.2 ID version 4.2.1 ANSSI-CC-2021/41 Compare
secunet konnektor 2.1.0, Version 5.1.2:2.1.0 BSI-DSZ-CC-1128-V5-2022 Compare
MultiApp V5.1 (version 5.1) ( 2023/31) ANSSI-CC-2023/31 Compare
IAS ECC V2, Version 1.3 en configuration #4 sur la plateforme ID-One Cosmo v8.2 ANSSI-CC-2019/36 Compare
IAS ECC V2, version 1.3 en configuration #4 sur la plateforme ID-One Cosmo v8.2 ANSSI-CC-2020/53 Compare
Digital Identity on MultiApp v4.0.1 platform with Filter Set 1.0 – PACE, EAC (version 1.0) ANSSI-CC-2020/49 Compare
IDmove v5 on SCR404U in EAC configuration with AA in optionOS Commercial Version : 0x098912 ; OS Unique Identifier : ... ANSSI-CC-2023/64 Compare
Carte Mobile PayPass 1.0 sur Orange NFC V2 G1 release B sur composant ST33F1ME, configuration MIFARE activé ou config... ANSSI-CC-2013/57 Compare
IDmove v4 on Infineon in EAC with PACE configuration with AA in option OS Commercial Version : 0x 09 08 06 ; OS Uniqu... ANSSI-CC-2019/57-R01 Compare
IDmove v5 on SCR404U in PACE configuration with AA and/or CA in optionOS Commercial Version : 0x098912 ; OS Unique Id... ANSSI-CC-2023/66 Compare
IDmove v5 on SCR404U in BAC configuration with AA and/or CA in option(OS Commercial Version : 0x098912;OS Unique Iden... ANSSI-CC-2023/63 Compare
IDmove v5 on SCR404U in EAC with PACE configuration and LDSv2, AA in optionOS Commercial Version : 0x098912 ; OS Uniq... ANSSI-CC-2023/65 Compare
ChipDoc v3 on JCOP 4 P71 in SSCD configuration (Version 3.0.0.52) (ANSSI-CC-2020/73-R01) ANSSI-CC-2020/73-R01 Compare
Digital Identity 1.0.A PACE, EAC on MultiApp V5.0.A(version 1.0.A) ANSSI-CC-2022/57 Compare
SAMSUNG S3FV9QM / S3FV9QK référence : S3FV9QM/S3FV9QK rev3_TRCv1.0_PKALibv1.4-GUIv1.38a_DTRNGlibv2.0/3.0-Iv1.2_BLv2.1... ANSSI-CC-2017/16 Compare
Digital Identity on MultiApp v4.0.1 platform with Filter Set 1.0 - PACE, EAC(version 1.0) ANSSI-CC-2020/49-R01 Compare
ChipDoc v3 on JCOP 4 P71 in ICAO EAC with PACE configuration (Version 3.0.0.52) (ANSSI-CC-2020/72-R01) ANSSI-CC-2020/72-R01 Compare
TESS v5.1 Platform (Revision 1.0) (ANSSI-CC-2024/28) ANSSI-CC-2024/28 Compare
S3NSEN4/S3NSEN3 with Bootloader & system API v1.1, DTRNG FRO M libraries v2.2, v3.3 & PTG.1 DTRNG FRO M library v1.4 ... ANSSI-CC-2021/30 Compare
Xerox WorkCentre 7346 Version: Controller+PS ROM Ver. 1.223.4, IOT ROM Ver 3.2.0, IIT ROM Ver 20.4.3, ADF ROM Ver 11.6.5 JISEC-CC-CRP-C0169 Compare
Application eTravel EAC v2.1, en configuration BAC, sur la plateforme ouverte ou fermée MultiApp V3.1 masquée sur le ... ANSSI-CC-2015/40 Compare
Microcontrôleur sécurisé ST31-K330A révision F pour version bi-mode (contact et sans contact) ou version sans contact... ANSSI-CC-2013/66 Compare
Application eTravel EAC v2.1, en configuration "EAC on BAC", sur la plateforme ouverte ou fermée MultiApp V3.1 masqué... ANSSI-CC-2015/41 Compare
Soffid IAM. IAM-console version 3.5, Sync-server version 3.5, PAMlauncherversion 1.4, y PAM-store version 1.4 2023-36-INF-4551 Compare
S3NSEN4/S3NSEN3 with Bootloader & system API v1.1, DTRNG FRO M libraries v2.2, v3.3 & PTG.1 DTRNG FROM library v1.4 (... ANSSI-CC-2021/30-R01 Compare
ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration(Version 4.0.1.52) ANSSI-CC-2023/12 Compare
ChipDoc v3.1 on JCOP 4 P71 in SSCD configuration Version 3.1.6.52 ANSSI-CC-2021/20 Compare
Strong Customer Authentication for Apple Pay on Apple Watch Series 10 with S10 running watchOS 11.4(watchOS 11.4 (bui... ANSSI-CC-2025/35 Compare
Strong Customer Authentication for Apple Pay on iPhone 16 Pro with A18 Pro running iOS 18.4(iOS 18.4 (build 22E240)) ... ANSSI-CC-2025/34 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO BAC configuration(Version 4.0.1.52) ANSSI-CC-2023/10 Compare
ChipDoc v3.1 on JCOP 4 P71 in ICAO BAC configuration (Version 3.1.6.52) ANSSI-CC-2021/18 Compare
Ricoh imagio MP C5001A SP/C4001A SP both with imagio FAX Unit Type24 Version: - Software version: System/Copy 2.02, N... JISEC-CC-CRP-C0324 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC with PACE configuration (Version 4.0.1.52) ANSSI-CC-2023/11 Compare
Strong Customer Authentication for Apple Pay on Mac mini with M4 running macOS Sequoia 15.4, paired with Magic keyboa... ANSSI-CC-2025/36 Compare
Ricoh imagio MP C5001 SP / imagio MP C4001 SP, both with imagio FAX Unit Type24, and Ricoh imagio MP C5001 SPF / imag... JISEC-CC-CRP-C0301 Compare
MultiApp V4.0.1 Platform (Version 4.0.1) (ANSSI-2017/76-R01) ANSSI-CC-2017/76-R01 Compare
SCR700U (version A) (ANSSI-CC-2025/39) ANSSI-CC-2025/39 Compare
IAS ECC V2, version 1.3 en configuration #3 sur la plateforme ID-One Cosmo v8.2 ANSSI-CC-2020/52 Compare
IAS ECC V2, Version 1.3 en configuration #3 sur la plateforme ID-One Cosmo v8.2 ANSSI-CC-2019/35 Compare
IAS ECC V2, version 1.3 en configuration #2 sur la plateforme ID-One Cosmo v8.2 ANSSI-CC-2020/51 Compare
IAS ECC V2, version 1.3 en configuration #1 sur la plateforme ID-One Cosmo v8.2 ANSSI-CC-2019/33 Compare
IAS ECC V2, version 1.3 en configuration #2 sur la plateforme ID-One Cosmo v8.2 ANSSI-CC-2019/34 Compare
IAS ECC V2, version 1.3 en configuration #1 sur la plateforme ID-One Cosmo v8.2 ANSSI-CC-2020/50 Compare
secunet konnektor 2.1.0, Version 4.1.3:2.1.0 BSI-DSZ-CC-1174-2021 Compare
Tachograph G1, G2V1, G2V2 on IFX_CCI_000039h(version 2.2.1.N) (ANSSI-CC-2022/38-R01) ANSSI-CC-2022/38-R01 Compare
Stationäres eHealth-Kartenterminal ORGA 6141 online Version 3.9.2:1.2.0 / 3.9.2:2.0.0 BSI-DSZ-CC-0519-V6-2025 Compare
secunet konnektor 2.1.0, Version 4.1.3:2.1.0 BSI-DSZ-CC-1128-V3-2021 Compare
Application IAS V4.2 sur la plateformeJavaCard ouverte MultiApp V3.1 masquée surle composant P60D080PVC(version du pa... ANSSI-CC-2015/08 Compare
Microcontrôleurs sécurisés ST33G1M2A et ST33G1M2M révision G, Firmware révision 1.3.2, incluant optionnellement la bi... ANSSI-CC-2017/02 Compare
SecureSwitch® Fiber Optic Switch Models 1:1, 2:1, 3:1, 4:1, 5:1, 6:1, 7:1, 8:1 Rev A 383-4-410 Compare
Application Mobile PayPass 1.0.13vA.2.4(S1133159, release B) sur plateforme UpTeqNFC2.0.4_OFM configuration MIFARE ac... ANSSI-CC-2014/83 Compare
Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D144PVA (v... ANSSI-CC-2015/15 Compare
Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D080PVC(Ve... ANSSI-CC-2014/86 Compare
Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1iOS 16.4... ANSSI-CC-2023/58 Compare
Microcontrôleur sécurisé ST31-K330A révisionH pour version bi-mode (contact et sanscontact) ou version sans contact s... ANSSI-CC-2014/94 Compare
Application Mobile PayPass 1.0.13vA.2.4 (S1133159, release B) sur plateforme Orange NFC V2 G1 configuration MIFARE ac... ANSSI-CC-2014/96 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.1.1) ANSSI-CC-2022/30 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.1.1) ANSSI-CC-2022/31 Compare
ArcaShield Platform(Version 0003040E) (ANSSI-CC-2025/38) ANSSI-CC-2025/38 Compare
secunet konnektor 2.0.0 und 2.0.1, Version 5.50.1:2.0.0 und 5.50.1:2.0.1 BSI-DSZ-CC-1044-V7-2023 Compare
Cryptek Inc. DiamondTEK (DiamondCentral (NSC Application S/W version 2.4.0.5, NSD-Prime F/W version 2.4.0.3) and NSD ... CCEVS-VR-0054-2006 Compare
TPM 2.0 Hardware version FB5C85D, Firmware version 1.3.0.1 ANSSI-CC-2016/15 Compare
eTravel 2.5 EAC on SAC on MultiApp V5.0 (2.5.0.0) ANSSI-CC-2021/45 Compare
MS6003 embarquant la bibliothèque cryptographique Toolbox version 06.04.01.05 et la bibliothèque Wear Levelling versi... ANSSI-CC-2020/20-R01 Compare
Y7 4.3.1:1.2.9 with eHealth Application 1.1.20 BSI-DSZ-CC-1233-2025 Compare
Bittium Tough Mobile C (BTMC). HW version: 9304809A03. SW version: Android 5.1.1. Kernel version: 3.4.0. Build: S2_BS... 2017-25-INF-2751 Compare
Ricoh imagio MP 5002/4002 all of above with Printer/Scanner/Facsimile Functions Version: - Software: System/Copy 1.00... JISEC-CC-CRP-C0346 Compare
Suite MISTRAL IP : version 7.0.2 pour TRC 7535, version 7.0.1 pour TRC 7539-11-A et leur centre de gestion CGM version 7.0.1 ANSSI-CC-2011/78 Compare
Ricoh imagio MP C5002A SP/C4002A SP all of above with Facsimile Function Version: - Software: System/Copy 1.05.4, Net... JISEC-CC-CRP-C0354 Compare
NXP JCOP 7.x with eUICC extension on SN300 B1.1 Secure Element, versions JCOP 7.0 R1.64.0.2, JCOP 7.0 R2.04.0.2, JCOP... NSCIB-CC-3110-2025-08-2500052-01-CR Compare
Ricoh imagio MP C3302 SP/C3302 SPF/C2802 SP/C2802 SPF all of above with Facsimile Function Version: - Software: Syste... JISEC-CC-CRP-C0352 Compare
Ricoh imagio MP C5002 SP/C5002 SPF/C4002 SP/C4002 SPF all of above with Facsimile Function Version: - Software: Syste... JISEC-CC-CRP-C0356 Compare
Plateforme Java Card MultiApp GP-SE (version 5.0) ANSSI-CC-2022/23 Compare
Showing 5 out of 188.

References

Loading...

Updates Feed

  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2025-57-certificat.pdf",
  "dgst": "31cf2a7aec823213",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2025/57",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL6+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "5.1"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "7f886b64878b68c1",
        "3ebd6b9f8d81e522"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2023/01-R01"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2023/01-R01"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2023/01-R01"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2023/01-R01"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "THALES DIS FRANCE SA",
  "manufacturer_web": "https://www.thalesgroup.com/en/europe/france",
  "name": "MultiApp V5.1 GP-SE PlatformConfiguration 1 : 5.1 revision B version 2 (0x3055) et filter set 0x00,configuration 2 : 5.1 revision C version 2 (0x3055) et filter set 0x10,configuration 3 : 5.1 revision B version 2 (0x3055) et filter set 0x14,configuration 4 : 5.1 revision C version 2 (0x3055) et filter set 0x24(ANSSI-CC-2025/57)",
  "not_valid_after": "2031-02-04",
  "not_valid_before": "2026-02-04",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "ANSSI-CC-2025-57-certificat.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2025/57": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-099-V2-2020": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_FLR.2": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL6": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA - LETI": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20260119101711+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 25 pour Word",
      "/ModDate": "D:20260204134646+00\u002700\u0027",
      "/Producer": "PDFKit.NET 26.1.0.63468 DMV9",
      "pdf_file_size_bytes": 306939,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "ANSSI-CC-2025-57-rapport.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2023/01-R01": 2,
          "ANSSI-CC-2025/57": 3
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0099-V2-2020": 2
        }
      },
      "cc_sar": {
        "AGD": {
          "AGD_OPE": 2,
          "AGD_PRE": 1
        },
        "ALC": {
          "ALC_FLR": 1,
          "ALC_FLR.2": 2
        },
        "AVA": {
          "AVA_VAN": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 2,
          "EAL6": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA - LETI": 1
        },
        "CESTI": {
          "CESTI": 5
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20260119101909+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 25 pour Word",
      "/ModDate": "D:20260204134644+00\u002700\u0027",
      "/Producer": "PDFKit.NET 26.1.0.63468 DMV9",
      "pdf_file_size_bytes": 875393,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.cyber.gouv.fr/",
          "http://www.commoncriteriaportal.org/",
          "http://www.sogis.eu/",
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 14
    },
    "st_filename": "ANSSI-CC-2025-57-cible.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 12
          },
          "ECDH": {
            "ECDH": 8
          },
          "ECDSA": {
            "ECDSA": 4
          }
        },
        "FF": {
          "DH": {
            "DH": 14,
            "Diffie-Hellman": 5
          }
        },
        "RSA": {
          "RSA 1024": 3
        }
      },
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2023/01-R01": 1
        },
        "NL": {
          "CC-1": 2,
          "CC-2": 4,
          "CC-3": 4
        }
      },
      "cc_claims": {
        "A": {
          "A.ADMIN": 3,
          "A.APPLET": 1,
          "A.APPS-PROVIDER": 4,
          "A.CAP_FILE": 3,
          "A.CONTROLLING-AUTHORITY": 4,
          "A.DELETION": 2,
          "A.ISSUER": 4,
          "A.KEY-ESCROW": 4,
          "A.KEYS-PROT": 4,
          "A.OS-UPDATE-EVIDENCE": 3,
          "A.OTA-ADMIN": 1,
          "A.PERSONALISER": 3,
          "A.PERSONALIZER": 1,
          "A.PRODUCTION": 4,
          "A.SCP-SUPP": 4,
          "A.SECURE_ACODE_MANAGEMENT": 3,
          "A.VERIFICATION": 4,
          "A.VERIFICATION-AUTHORITY": 4
        },
        "D": {
          "D.API_DATA": 4,
          "D.APP_CODE": 8,
          "D.APP_C_DATA": 6,
          "D.APP_I_DATA": 8,
          "D.APP_KEYS": 9,
          "D.APSD_DAP_KEYS": 1,
          "D.APSD_KEYS": 6,
          "D.CASD_DAP_KEYS": 1,
          "D.CASD_KEYS": 4,
          "D.CONFIRMATION-DATA": 2,
          "D.CRYPTO": 6,
          "D.CVM_MGMT_STATE": 3,
          "D.CVM_PIN": 3,
          "D.DAP_BLOCK": 1,
          "D.GP_CODE": 2,
          "D.GP_REGISTRY": 4,
          "D.ISD_KEYS": 6,
          "D.JCS_CODE": 7,
          "D.JCS_DATA": 9,
          "D.OS-": 1,
          "D.OS-UPDATE-CODE-ID": 3,
          "D.OS-UPDATE_ADDITIONALCODE": 4,
          "D.OS-UPDATE_DEC-KEY": 2,
          "D.OS-UPDATE_SGNVER-KEY": 3,
          "D.PIN": 6,
          "D.RECEIPT-GENERATION-KEY": 2,
          "D.SEC_DATA": 9,
          "D.TOE_IDENTIFIER": 2,
          "D.TOKEN-VERIFICATION-KEY": 2
        },
        "O": {
          "O.ALARM": 15,
          "O.APPLET": 28,
          "O.APPLI-AUTH": 7,
          "O.ARRAY_VIEWS_CONFID": 5,
          "O.ARRAY_VIEWS_INTEG": 3,
          "O.CARD-": 3,
          "O.CARD-MANAGEMENT": 23,
          "O.CIPHER": 13,
          "O.CODE_CAP_FILE": 23,
          "O.COMM-": 1,
          "O.COMM-AUTH": 5,
          "O.COMM-CONFIDENTIALITY": 4,
          "O.COMM-INTEGRITY": 5,
          "O.COMM_AUTH": 1,
          "O.COMM_CONFIDENTIALITY": 1,
          "O.COMM_INTEGRITY": 1,
          "O.CONFID-OS-UPDATE": 5,
          "O.CVM-BLOCK": 5,
          "O.CVM-MGMT": 6,
          "O.CVM-MGNT": 1,
          "O.CVM-MNGT": 1,
          "O.DELETION": 7,
          "O.DOMAIN-RIGHTS": 4,
          "O.DOMAIN_RIGHTS": 1,
          "O.FIREWALL": 14,
          "O.GLOBAL-CVM": 5,
          "O.GLOBAL_ARRAYS_CONFID": 8,
          "O.GLOBAL_ARRAYS_INTEG": 6,
          "O.INSTALL": 10,
          "O.JAVAOBJECT": 68,
          "O.KEY-MNGT": 7,
          "O.KEY_DELETION": 1,
          "O.LC-MANAGEMENT": 4,
          "O.LOAD": 11,
          "O.NATIVE": 11,
          "O.NO-KEY-REUSE": 4,
          "O.OBJ-DELETION": 5,
          "O.OBJ_DELETION": 1,
          "O.OPERATE": 17,
          "O.PIN-MNGT": 7,
          "O.PIN_MNGT": 2,
          "O.PRIVILEGES-": 1,
          "O.PRIVILEGES-MANAGEMENT": 5,
          "O.REALLOCATION": 6,
          "O.RECEIPT": 4,
          "O.RESOURCES": 9,
          "O.RND": 1,
          "O.RNG": 13,
          "O.SCP": 32,
          "O.SECURE_AC_ACTIVATION": 6,
          "O.SECURE_LOAD_ACODE": 8,
          "O.SECURITY-": 1,
          "O.SECURITY-DOMAINS": 3,
          "O.SECURITY_DOMAINS": 1,
          "O.SID": 13,
          "O.TOE_IDENTIFICATION": 7,
          "O.TOKEN": 5,
          "O.TRANSACTION": 7
        },
        "OE": {
          "OE.ADMIN": 2,
          "OE.AID-MANAGEMENT": 4,
          "OE.AP-KEYS": 3,
          "OE.APPLET": 1,
          "OE.APPLICATIONS": 3,
          "OE.APPS-PROVIDER": 4,
          "OE.CA-KEYS": 4,
          "OE.CAP_FILE": 5,
          "OE.CARD-MANAGEMENT": 2,
          "OE.CARD_MANAGEMENT": 1,
          "OE.CODE-EVIDENCE": 12,
          "OE.CONTROLLING-": 1,
          "OE.CONTROLLING-AUTHORITY": 3,
          "OE.DAP_BLOCK_GEN": 3,
          "OE.ISD-KEYS": 3,
          "OE.ISSUER": 4,
          "OE.ISSUER-KEYS": 1,
          "OE.KEY-": 2,
          "OE.KEY-CHANGE": 2,
          "OE.KEY-ESCROW": 4,
          "OE.KEY-GENERATION": 2,
          "OE.KEYS-PROT": 2,
          "OE.LOADING": 2,
          "OE.NATIVE": 1,
          "OE.OS-": 3,
          "OE.OS-UPDATE-ENCRYPTION": 4,
          "OE.OS-UPDATE-EVIDENCE": 2,
          "OE.OTA-ADMIN": 1,
          "OE.OTA-LOADING": 1,
          "OE.OTA-SERVERS": 1,
          "OE.PERSONALISER": 2,
          "OE.PERSONALIZER": 1,
          "OE.PRODUCTION": 4,
          "OE.RECEIPT-VER": 1,
          "OE.RECEIPTVER": 1,
          "OE.SCP": 9,
          "OE.SCP-SUPP": 2,
          "OE.SECURE_ACODE_MANAGEMENT": 4,
          "OE.SECURITY-DOMAINS": 1,
          "OE.SERVERS": 3,
          "OE.TOKEN-GEN": 3,
          "OE.VA-KEYS": 1,
          "OE.VERIFICATION": 26,
          "OE.VERIFICATION-": 1,
          "OE.VERIFICATION-AUTHORITY": 2
        },
        "OP": {
          "OP.ARRAY_AASTORE": 3,
          "OP.ARRAY_ACCESS": 7,
          "OP.ARRAY_LENGTH": 3,
          "OP.ARRAY_T_ALOAD": 3,
          "OP.ARRAY_T_ASTORE": 3,
          "OP.CREATE": 11,
          "OP.DELETE_APPLET": 6,
          "OP.DELETE_CAP_FILE": 4,
          "OP.DELETE_CAP_FILE_APPLET": 4,
          "OP.INSTANCE_FIELD": 6,
          "OP.INVK_INTERFACE": 10,
          "OP.INVK_VIRTUAL": 8,
          "OP.JAVA": 8,
          "OP.PUT": 8,
          "OP.PUTFIELD": 1,
          "OP.PUTSTATIC": 1,
          "OP.THROW": 7,
          "OP.TYPE_ACCESS": 7
        },
        "OSP": {
          "OSP": 3,
          "OSP.ADDITIONAL_CODE_ENCRYPTION": 3,
          "OSP.ADDITIONAL_CODE_SIGNING": 3,
          "OSP.AID-MANAGEMENT": 4,
          "OSP.APPLICATIONS": 4,
          "OSP.APSD-KEYS": 4,
          "OSP.ATOMIC_ACTIVATION": 3,
          "OSP.CASD-KEYS": 4,
          "OSP.DAP_BLOCK_GEN": 3,
          "OSP.ISD-KEYS": 3,
          "OSP.ISSUER-KEYS": 1,
          "OSP.KEY-CHANGE": 4,
          "OSP.KEY-GENERATION": 4,
          "OSP.LOADING": 3,
          "OSP.OTA-LOADING": 1,
          "OSP.OTA-SERVERS": 1,
          "OSP.RECEIPT-VER": 3,
          "OSP.RNG": 3,
          "OSP.SECURITY-DOMAINS": 4,
          "OSP.SERVERS": 3,
          "OSP.TOE_IDENTIFICATION": 3,
          "OSP.TOKEN-GEN": 3,
          "OSP.VERIFICATION": 4
        },
        "OT": {
          "OT.X": 1
        },
        "R": {
          "R.JAVA": 13
        },
        "T": {
          "T.BRUTE-FORCE-CVM": 3,
          "T.BRUTE-FORCE-SCP": 5,
          "T.COM-EXPLOIT": 4,
          "T.COM_EXPLOIT": 2,
          "T.CONFID-APPLI-DATA": 4,
          "T.CONFID-JCS-CODE": 4,
          "T.CONFID-JCS-DATA": 4,
          "T.CONFID-OS-UPDATE-LOAD": 1,
          "T.CONFID-OS-UPDATE_LOAD": 2,
          "T.CVM-IMPERSONATE": 3,
          "T.CVM-UPDATE": 3,
          "T.DELETION": 6,
          "T.EXE-CODE": 8,
          "T.FAKE-SGNVER-KEY": 3,
          "T.INSTALL": 6,
          "T.INTEG": 1,
          "T.INTEG-APPLI-": 2,
          "T.INTEG-APPLI-CODE": 9,
          "T.INTEG-APPLI-DATA": 8,
          "T.INTEG-JCS-CODE": 4,
          "T.INTEG-JCS-DATA": 4,
          "T.INTEG-OS-UPDATE_LOAD": 2,
          "T.INTEGAPPLI-DATA": 1,
          "T.LIFE-CYCLE": 3,
          "T.LIFE_CYCLE": 2,
          "T.NATIVE": 4,
          "T.OBJ-DELETION": 4,
          "T.PHYSICAL": 4,
          "T.RECEIPT": 3,
          "T.RESOURCES": 4,
          "T.SID": 8,
          "T.TOKEN": 3,
          "T.UNAUTHORISED-CARD-MGMT": 4,
          "T.UNAUTHORISED-TOE-CODE-UPDATE": 3,
          "T.UNAUTHORIZED_CARD_MNGT": 2,
          "T.WRONG-UPDATE-STATE": 3
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 00842014": 1,
          "BSI-CC-PP-0084-2014": 1,
          "BSI-CC-PP-0099-V2-": 1,
          "BSI-PP-0056-V2-MA-2012": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 2,
          "ADV_ARC.1": 10,
          "ADV_FSP": 1,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 2,
          "ADV_FSP.5": 8,
          "ADV_IMP": 1,
          "ADV_IMP.1": 5,
          "ADV_IMP.2": 4,
          "ADV_INT.2": 2,
          "ADV_INT.3": 2,
          "ADV_SPM.1": 9,
          "ADV_TDS": 1,
          "ADV_TDS.1": 2,
          "ADV_TDS.3": 3,
          "ADV_TDS.4": 2,
          "ADV_TDS.5": 6
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 10,
          "AGD_PRE": 2,
          "AGD_PRE.1": 7
        },
        "ALC": {
          "ALC_CMC.4": 2,
          "ALC_CMC.5": 4,
          "ALC_CMS.5": 3,
          "ALC_DEL.1": 4,
          "ALC_DVS.2": 7,
          "ALC_FLR.2": 7,
          "ALC_LCD.1": 6,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 2,
          "ALC_TAT.3": 4
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 3,
          "ATE_COV.3": 2,
          "ATE_DPT.1": 1,
          "ATE_DPT.3": 4,
          "ATE_FUN.1": 6,
          "ATE_FUN.2": 4,
          "ATE_IND.2": 5
        },
        "AVA": {
          "AVA_VAN.5": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 6+": 1,
          "EAL4": 1,
          "EAL4 augmented": 1,
          "EAL6": 34,
          "EAL6 augmented": 1,
          "EAL6+": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 18,
          "FAU_ARP.1.1": 1,
          "FAU_SAA.1": 2,
          "FAU_SAS.1": 2
        },
        "FCO": {
          "FCO_NRO": 34,
          "FCO_NRO.2": 9,
          "FCO_NRR": 7,
          "FCO_NRR.1": 3
        },
        "FCS": {
          "FCS_CKM": 63,
          "FCS_CKM.1": 38,
          "FCS_CKM.1.1": 3,
          "FCS_CKM.2": 12,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.3": 7,
          "FCS_CKM.3.1": 1,
          "FCS_CKM.4": 41,
          "FCS_CKM.4.1": 2,
          "FCS_CMK.4": 1,
          "FCS_COP": 97,
          "FCS_COP.1": 35,
          "FCS_COP.1.1": 5,
          "FCS_RNG": 29,
          "FCS_RNG.1": 17,
          "FCS_RNG.1.1": 3,
          "FCS_RNG.1.2": 3
        },
        "FDP": {
          "FDP_ACC": 57,
          "FDP_ACC.1": 25,
          "FDP_ACC.2": 6,
          "FDP_ACF": 53,
          "FDP_ACF.1": 25,
          "FDP_IFC": 71,
          "FDP_IFC.1": 22,
          "FDP_IFC.2": 4,
          "FDP_IFF": 50,
          "FDP_IFF.1": 23,
          "FDP_ITC": 45,
          "FDP_ITC.1": 19,
          "FDP_ITC.2": 29,
          "FDP_ITT.1": 2,
          "FDP_RIP": 124,
          "FDP_RIP.1": 11,
          "FDP_RIP.1.1": 1,
          "FDP_ROL": 24,
          "FDP_ROL.1": 7,
          "FDP_SDC.1": 2,
          "FDP_SDI": 11,
          "FDP_SDI.2": 4,
          "FDP_UCT": 9,
          "FDP_UCT.1": 3,
          "FDP_UIT": 19,
          "FDP_UIT.1": 4
        },
        "FIA": {
          "FIA_AFL": 42,
          "FIA_AFL.1": 7,
          "FIA_AFL.1.1": 2,
          "FIA_AFL.1.2": 2,
          "FIA_API.1": 2,
          "FIA_ATD": 15,
          "FIA_ATD.1": 3,
          "FIA_UAU": 92,
          "FIA_UAU.1": 7,
          "FIA_UAU.1.1": 2,
          "FIA_UAU.1.2": 2,
          "FIA_UAU.4": 2,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6.1": 1,
          "FIA_UID": 67,
          "FIA_UID.1": 24,
          "FIA_UID.1.1": 2,
          "FIA_UID.1.2": 2,
          "FIA_UID.2": 1,
          "FIA_USB": 9,
          "FIA_USB.1": 3
        },
        "FMT": {
          "FMT_LIM": 42,
          "FMT_LIM.1": 17,
          "FMT_LIM.1.1": 3,
          "FMT_LIM.2": 16,
          "FMT_LIM.2.1": 3,
          "FMT_MSA": 174,
          "FMT_MSA.1": 16,
          "FMT_MSA.2": 2,
          "FMT_MSA.3": 24,
          "FMT_MTD": 100,
          "FMT_MTD.1": 16,
          "FMT_MTD.3": 2,
          "FMT_SMF": 111,
          "FMT_SMF.1": 33,
          "FMT_SMF.1.1": 2,
          "FMT_SMR": 128,
          "FMT_SMR.1": 38,
          "FMT_SMR.1.1": 2,
          "FMT_SMR.1.2": 2
        },
        "FPR": {
          "FPR_UNO": 23,
          "FPR_UNO.1": 13,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_EMS": 4,
          "FPT_EMS.1": 16,
          "FPT_EMS.1.1": 3,
          "FPT_EMS.1.2": 3,
          "FPT_FLS": 72,
          "FPT_FLS.1": 19,
          "FPT_FLS.1.1": 1,
          "FPT_ITT": 8,
          "FPT_ITT.1": 2,
          "FPT_PHP": 9,
          "FPT_PHP.3": 19,
          "FPT_PHP.3.1": 1,
          "FPT_RCV": 31,
          "FPT_RCV.3": 5,
          "FPT_RCV.4": 1,
          "FPT_TDC": 10,
          "FPT_TDC.1": 14,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 1,
          "FPT_TST": 10,
          "FPT_TST.1": 16,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FRU": {
          "FRU_FLT.2": 2
        },
        "FTP": {
          "FTP_ITC": 41,
          "FTP_ITC.1": 11,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP": 21,
          "FTP_TRP.1": 14
        }
      },
      "certification_process": {
        "OutOfScope": {
          " \u2022 The DELETE and INSTALL APDU commands are out of scope of this SPM": 1,
          "1 : MultiApp v5.1 Rev. B with biometry features but forbidden to use without patch (biometry is out of scope of the TOE) 2. Config 2 : MultiApp v5.1 Rev. C with biometry features but forbidden to use without": 1,
          "1, are out of the scope of the SPM as they are linked to the applet loading or deletion that is out of scope of the SPM boundaries limited to VM opcodes The SFR FMT_MTD.3/JCRE is out of scope of the SPM": 1,
          "Context, the Selected Applet Context, and the Active Applets Note: the Selected Applet context is out of scope of the VM functionalities. It is a process that occurs prior to VM start The initial setting of": 1,
          "a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are": 1,
          "and deletion; see #.DELETION and #.INSTALL). \u2022 The DELETE and INSTALL APDU commands are out of scope of this SPM. The list of registred applets\u2019 AIDs is proven to be not modified during the execution": 1,
          "as a null reference. Such a mechanism is implementation-dependent. The deletion of applets is out of scope of this SPM scope. In the case of an array type, fields are components of the array ([JVM], \u00a72.14": 1,
          "because AID registry is created during loading phase, which is also out of scope of the SPM (Hypothesis 2 of the SPM document [MAV51_SPM]). MultiApp V5.1: GP-SE Security Target": 1,
          "biometry is out of scope of the TOE": 2,
          "biometry is out of scope of the TOE) 3. Config 3 : MultiApp v5.1 Rev. B with biometry features included in the TOE (Upgraded": 1,
          "filter set = 0x00 and 0x10) no patch is loaded and Biometry feature is out of scope of the TOE": 1,
          "for 2 others configurations (filter set = 0x00 and 0x10) no patch is loaded and Biometry feature is out of scope of the TOE. If another patch is required in the future, it would require at least a maintenance of": 1,
          "in \u00a71.3, Filter set field = 0X00 Rev. C with patch or 0X10 Rev. C with patch), we consider BioPIN out of scope of the TOE": 1,
          "in \u00a71.3, Filter set field = 0X00 Rev. C with patch or 0X10 Rev. C with patch), we consider BioPIN out of scope of the TOE. 2.4 TOE DESCRIPTION 2.4.1 Architecture The MultiApp V5.1 platform is an operating": 1,
          "is also out of scope (Hypothesis 4 of the SPM document [MAV51_SPM]).. 3) S.CAP_FILE performing OP.ARRAY_AASTORE of the": 1,
          "out of scope": 13,
          "the active context is not the same as the Selected Applet Context. Application note: This rule is out of scope of the SPM modelisation because CLEAR_ON_DESELECT objects can be created exclusively in the API": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 5
        },
        "CCM": {
          "CCM": 8
        },
        "ECB": {
          "ECB": 1
        }
      },
      "cplc_data": {
        "ICFab": {
          "IC Fabricator": 1
        },
        "ICType": {
          "IC Type": 1
        }
      },
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 169
        },
        "TLS": {
          "TLS": {
            "TLS": 1
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 6,
          "Key agreement": 2
        },
        "MAC": {
          "MAC": 16
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 6,
            "SHA1": 2
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 5,
            "SHA-384": 5,
            "SHA-512": 4,
            "SHA2": 1,
            "SHA224": 1
          },
          "SHA3": {
            "SHA3": 2,
            "SHA3-256": 1,
            "SHA3-384": 1,
            "SHA3-512": 1
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.DG1": 4,
          "EF.DG16": 4,
          "EF.DG3": 1,
          "EF.DG4": 1
        }
      },
      "javacard_api_const": {
        "misc": {
          "TYPE_ACCESS": 7
        }
      },
      "javacard_packages": {
        "com": {
          "com.gemalto.belpic": 1,
          "com.gemalto.javacard.eid": 1,
          "com.gemalto.javacard.fido.ctap": 1,
          "com.gemalto.javacard.iasclassic": 1,
          "com.gemalto.javacard.mspnp": 1,
          "com.gemalto.javacardx.gdp": 1,
          "com.gemalto.moc.client": 1,
          "com.gemalto.moc.server": 1,
          "com.gemalto.mpcos": 1,
          "com.gemalto.puredi": 1,
          "com.gemalto.tacho": 1
        },
        "java": {
          "java.lang": 1
        },
        "javacard": {
          "javacard.eid": 1,
          "javacard.fido.ctap": 1,
          "javacard.framework": 3,
          "javacard.iasclassic": 1,
          "javacard.mspnp": 1
        },
        "javacardx": {
          "javacardx.gdp": 1
        }
      },
      "javacard_version": {
        "JavaCard": {
          "Java Card 3.1": 8
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 1
        },
        "RNG": {
          "RND": 3,
          "RNG": 44
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 6,
          "Physical Tampering": 3,
          "fault induction": 2,
          "malfunction": 9,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 2,
          "Leak-Inherent": 3,
          "SPA": 1,
          "physical probing": 7,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS20": 2,
          "AIS31": 7,
          "BSI-AIS31": 1
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        },
        "FIPS": {
          "FIPS 180-4": 1,
          "FIPS 197": 2,
          "FIPS 198": 2,
          "FIPS180-4": 2,
          "FIPS197": 5,
          "FIPS202": 2
        },
        "ICAO": {
          "ICAO": 3
        },
        "NIST": {
          "SP 800-67": 1
        },
        "PKCS": {
          "PKCS#1": 8,
          "PKCS#5": 5
        },
        "SCP": {
          "SCP01": 4,
          "SCP02": 18,
          "SCP03": 16,
          "SCP10": 1,
          "SCP11": 1,
          "SCP21": 8,
          "SCP22": 1,
          "SCP80": 1,
          "SCP81": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 35,
            "AES-256": 1,
            "AES256": 1
          }
        },
        "DES": {
          "3DES": {
            "3DES": 2,
            "TDEA": 1,
            "TDES": 18,
            "Triple-DES": 3
          },
          "DES": {
            "DES": 21
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 5,
            "HMAC": 3,
            "KMAC": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 58
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Thales": {
          "Thales": 41
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20251211164533+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/MSIP_Label_c6c1d335-5221-4a6a-889f-c684b2c8474c_ActionId": "ad2ebb1e-ca3f-4ce0-b0a2-d8e4c7eec706",
      "/MSIP_Label_c6c1d335-5221-4a6a-889f-c684b2c8474c_ContentBits": "3",
      "/MSIP_Label_c6c1d335-5221-4a6a-889f-c684b2c8474c_Enabled": "true",
      "/MSIP_Label_c6c1d335-5221-4a6a-889f-c684b2c8474c_Method": "Privileged",
      "/MSIP_Label_c6c1d335-5221-4a6a-889f-c684b2c8474c_Name": "DIS Limited Distribution Scope",
      "/MSIP_Label_c6c1d335-5221-4a6a-889f-c684b2c8474c_SetDate": "2025-09-18T16:05:00Z",
      "/MSIP_Label_c6c1d335-5221-4a6a-889f-c684b2c8474c_SiteId": "6e603289-5e46-4e26-ac7c-03a85420a9a5",
      "/ModDate": "D:20251211164533+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 6700116,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 199
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CCN-CC-PP-5-2021.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099V2b_pdf.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2025-57-rapport.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.2",
      "EAL6+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2025-57-cible.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "fd507a764e59520c1763cd82adf9d720dcf13ef376e6c6e039240c3c71e966ca",
      "txt_hash": "7c633055191a70553c331affcd04dff4b5780cbefddf882917cd74ac50893f07"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "e6b2b0cea522d6b5593342f2cdcf9adc0c885704ba9cf0d1a3eb61f64bbd74bc",
      "txt_hash": "1dbcae04b6bc36369705ffcc7f33b6a5ae5a326fb5f97c1400c9d5e4b17f591d"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "2f41a2f1de4f32d63ced3556ef8590b43b6672257e71517d93f85c179c097687",
      "txt_hash": "e5dcc5cf55ada6c7187988b43b0cf7b19594a89e60cf8daf376e87700241d5af"
    }
  },
  "status": "active"
}