This page was not yet optimized for use on mobile
devices.
MorphoSmart Optic 301 Version 1.0
CSV information
| Status | archived |
|---|---|
| Valid from | 31.01.2013 |
| Valid until | 01.09.2019 |
| Scheme | 🇩🇪 DE |
| Manufacturer | Safran Morpho |
| Category | Biometric Systems and Devices |
| Security level | ATE_FUN.1, ALC_DEL.1, ATE_COV.1, ASE_OBJ.2, ASE_ECD.1, ALC_CMC.2, AGD_PRE.1, ADV_TDS.1, ASE_TSS.1, ALC_CMS.2, ATE_IND.2, ASE_SPD.1, ASE_CCL.1, ALC_FLR.1, ADV_FSP.2, ASE_REQ.2, ADV_ARC.1, AGD_OPE.1, ASE_INT.1 |
| Protection profiles |
Heuristics summary
Certificate ID: BSI-DSZ-CC-0790-2013
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Vendor
MorphoSecurity level
EAL 4, EAL1, EAL4, EAL3, EAL5, EAL7, EAL2, EAL6, ITSEC EvaluationSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, ADV_FSP.1, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR.1, ALC_CMC.1, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DVS.1, ALC_DVS.2, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_COV.1, ATE_FUN.1, ATE_IND.2, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.2, ATE_IND.1, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN.5, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_OBJ.1, ASE_REQ.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSSecurity Functional Requirements (SFR)
FPT_SPOD.1Protection profiles
BSI-CC-PP-0062-2010Certificates
BSI-DSZ-CC-0790-2013Evaluation facilities
TĂśV Informationstechnik, TĂśViTCertification process
out of scope, relevant events and protection of residual and security relevant data. Biometric verification is out of scope of the certification. The Security Target [6] is the basis for this certification. It is based on, Target, Version 8, 12 September 2012, MorphoSmart Optic 301 Security Target, Safran Morpho (confidential document) [7] Fingerprint Spoof Detection Protection Profile based on Organisational Security Policies, 8] Evaluation Technical Report, Version 6, 21 January 2013, TÜV Informationstechnik GmbH, (confidential document) [9] Fingerprint Spoof Detection Evaluation Guidance (FSDEG), Version 2.1, 18 December 2009, 19 September 2012, MorphoSmart Optic 301 – Life Cycle Support (ALC) (chapter 2.1), Safran Morpho (confidential document) [13] MSO 301– GUIDES, Version 12, 18 September 2012, Safran Morpho [14] MorphoSmart Programmer’sStandards
AIS 35, AIS 32Technical reports
BSI 7125, BSI 7148File metadata
| Title | Certification Report BSI-DSZ-CC-0790-2013 |
|---|---|
| Subject | Common Criteria Certification |
| Keywords | "Common Criteria, Certification, Zertifizierung, Fingerprint Spoof Detection, Fingerprint, Biometrics, Fingerprint Fake Detection" |
| Author | Federal Office for Information Security |
| Creation date | D:20130306111458+01'00' |
| Modification date | D:20130306154334+01'00' |
| Pages | 34 |
| Creator | Writer |
| Producer | OpenOffice.org 3.2 |
Frontpage
| Certificate ID | BSI-DSZ-CC-0790-2013 |
|---|---|
| Certified item | MorphoSmart Optic 301, Version 1.0 |
| Certification lab | BSI |
| Developer | Safran Morpho |
Security target
Extracted keywords
Trusted Execution Environments
SEVendor
MorphoSecurity level
EAL 2Claims
O.SPOOF_DETECTION, O.AUDIT, O.RESIDUAL, O.MANAGEMENT, A.BIO, OE.ADMINISTRATION, OE.PHYSICAL, OE.PLATFORM, OE.BIO, OSP.SPOOF_DETECTION, OSP.MANAGEMENT, OSP.RESIDUAL, OSP.AUDITSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_REQ.1Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FDP_RIP, FDP_RIP.2, FDP_RIP.2.1, FMT_MTD, FMT_SMF.1, FMT_MTD.3, FMT_MTD.3.1, FMT_SMF.1.1, FMT_MTD.1, FMT_SMF, FPT_SPOD, FPT_SPOD.1, FPT_SPOD.1.1, FPT_SPOD.1.2, FPT_SPOD.1.3, FPT_SPOD.1.4, FPT_STM.1Protection profiles
BSI-CC-PP-0062Certification process
out of scope, of the TOE but do not realize any part of the fake finger detection functionality and are therefore out of scope of the certified security functionality. The storage of the generated log, i.e., the Audit log, is, and the fingerprint if genuine. Please be aware that the mechanism for biometric matching is out of scope of the certification. The MSO Demonstrator Application is a software which enables using the MSOStandards
CCMB-2006-09-001File metadata
| Title | MSO FFD Public Security Target |
|---|---|
| Subject | ST-lite |
| Keywords | MSO 301, Common Criteria, CC, Securtiy Target, ST, ST-lite |
| Author | Safran Morpho |
| Creation date | D:20130121143511 |
| Modification date | D:20130121144124+01'00' |
| Pages | 30 |
| Creator | Microsoft® Office Word 2007 |
| Producer | Microsoft® Office Word 2007 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-0790-2013Extracted SARs
ADV_ARC.1, ADV_FSP.2, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ALC_LCD.2, ALC_TAT.3, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.2, APE_SPD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_DPT.4, ATE_FUN.1, ATE_IND.2, AVA_VAN.2References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Biometric Systems and Devices",
"cert_link": null,
"dgst": "a9925b1140bde436",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0790-2013",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL2+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"b02ed76d2545326a"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Safran Morpho",
"manufacturer_web": "https://morpho.com",
"name": "MorphoSmart Optic 301 Version 1.0",
"not_valid_after": "2019-09-01",
"not_valid_before": "2013-01-31",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0790a_pdf.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-0790-2013",
"cert_item": "MorphoSmart Optic 301, Version 1.0",
"cert_lab": "BSI",
"developer": "Safran Morpho",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0790-2013": 17
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0062-2010": 4
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 5,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 5,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 1,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 1,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 5,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 5,
"AGD_PRE": 1,
"AGD_PRE.1": 5
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 5,
"ALC_CMC.3": 1,
"ALC_CMC.4": 1,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 5,
"ALC_CMS.3": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 5,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 1,
"ALC_FLR": 1,
"ALC_FLR.1": 5,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 1,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 1,
"ALC_TAT.2": 1,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 5,
"ASE_ECD": 1,
"ASE_ECD.1": 5,
"ASE_INT": 1,
"ASE_INT.1": 5,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 5,
"ASE_REQ.1": 1,
"ASE_REQ.2": 5,
"ASE_SPD": 1,
"ASE_SPD.1": 5,
"ASE_TSS": 1,
"ASE_TSS.1": 5,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 5,
"ATE_COV.2": 1,
"ATE_COV.3": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 1,
"ATE_DPT.4": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 5,
"ATE_FUN.2": 1,
"ATE_IND": 1,
"ATE_IND.1": 1,
"ATE_IND.2": 5,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 2,
"EAL1": 7,
"EAL2": 3,
"EAL3": 4,
"EAL4": 6,
"EAL5": 6,
"EAL6": 3,
"EAL7": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {
"FPT": {
"FPT_SPOD.1": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"19 September 2012, MorphoSmart Optic 301 \u2013 Life Cycle Support (ALC) (chapter 2.1), Safran Morpho (confidential document) [13] MSO 301\u2013 GUIDES, Version 12, 18 September 2012, Safran Morpho [14] MorphoSmart Programmer\u2019s": 1,
"8] Evaluation Technical Report, Version 6, 21 January 2013, T\u00dcV Informationstechnik GmbH, (confidential document) [9] Fingerprint Spoof Detection Evaluation Guidance (FSDEG), Version 2.1, 18 December 2009": 1,
"Target, Version 8, 12 September 2012, MorphoSmart Optic 301 Security Target, Safran Morpho (confidential document) [7] Fingerprint Spoof Detection Protection Profile based on Organisational Security Policies": 1
},
"OutOfScope": {
"out of scope": 1,
"relevant events and protection of residual and security relevant data. Biometric verification is out of scope of the certification. The Security Target [6] is the basis for this certification. It is based on": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 4,
"T\u00dcViT": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 32": 1,
"AIS 35": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7148": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Morpho": {
"Morpho": 17
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Federal Office for Information Security",
"/CreationDate": "D:20130306111458+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Fingerprint Spoof Detection, Fingerprint, Biometrics, Fingerprint Fake Detection\"",
"/ModDate": "D:20130306154334+01\u002700\u0027",
"/Producer": "OpenOffice.org 3.2",
"/Subject": "Common Criteria Certification",
"/Title": "Certification Report BSI-DSZ-CC-0790-2013",
"pdf_file_size_bytes": 880965,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.bsi.bund.de/zertifizierung",
"https://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 34
},
"st_filename": "0790b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.BIO": 3
},
"O": {
"O.AUDIT": 7,
"O.MANAGEMENT": 7,
"O.RESIDUAL": 5,
"O.SPOOF_DETECTION": 5
},
"OE": {
"OE.ADMINISTRATION": 9,
"OE.BIO": 2,
"OE.PHYSICAL": 7,
"OE.PLATFORM": 14
},
"OSP": {
"OSP.AUDIT": 4,
"OSP.MANAGEMENT": 4,
"OSP.RESIDUAL": 4,
"OSP.SPOOF_DETECTION": 5
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0062": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 2,
"ADV_FSP.1": 2,
"ADV_FSP.2": 7,
"ADV_TDS.1": 5
},
"AGD": {
"AGD_OPE.1": 4,
"AGD_PRE.1": 4
},
"ALC": {
"ALC_CMC.2": 2,
"ALC_CMS.2": 2,
"ALC_DEL.1": 2,
"ALC_FLR.1": 6
},
"ASE": {
"ASE_CCL.1": 2,
"ASE_ECD.1": 5,
"ASE_INT.1": 3,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 3,
"ASE_SPD.1": 2,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_COV.1": 5,
"ATE_FUN.1": 5,
"ATE_IND.2": 2
},
"AVA": {
"AVA_VAN.2": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 4
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 4,
"FAU_GEN.1": 4,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1
},
"FDP": {
"FDP_RIP": 3,
"FDP_RIP.2": 4,
"FDP_RIP.2.1": 1
},
"FMT": {
"FMT_MTD": 3,
"FMT_MTD.1": 1,
"FMT_MTD.3": 7,
"FMT_MTD.3.1": 1,
"FMT_SMF": 1,
"FMT_SMF.1": 6,
"FMT_SMF.1.1": 1
},
"FPT": {
"FPT_SPOD": 6,
"FPT_SPOD.1": 14,
"FPT_SPOD.1.1": 3,
"FPT_SPOD.1.2": 3,
"FPT_SPOD.1.3": 3,
"FPT_SPOD.1.4": 3,
"FPT_STM.1": 2
}
},
"certification_process": {
"OutOfScope": {
"and the fingerprint if genuine. Please be aware that the mechanism for biometric matching is out of scope of the certification. The MSO Demonstrator Application is a software which enables using the MSO": 1,
"of the TOE but do not realize any part of the fake finger detection functionality and are therefore out of scope of the certified security functionality. The storage of the generated log, i.e., the Audit log, is": 1,
"out of scope": 2
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2006-09-001": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 1
}
},
"tls_cipher_suite": {},
"vendor": {
"Morpho": {
"Morpho": 31
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Safran Morpho",
"/CreationDate": "D:20130121143511",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/Keywords": "MSO 301, Common Criteria, CC, Securtiy Target, ST, ST-lite",
"/ModDate": "D:20130121144124+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Subject": "ST-lite",
"/Title": "MSO FFD Public Security Target",
"pdf_file_size_bytes": 476138,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 30
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0062b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0790a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ADV_FSP.2",
"ASE_SPD.1",
"ASE_INT.1",
"ATE_IND.2",
"ALC_FLR.1",
"AGD_OPE.1",
"ASE_TSS.1",
"AGD_PRE.1",
"ALC_DEL.1",
"ALC_CMC.2",
"ASE_OBJ.2",
"ASE_ECD.1",
"ATE_FUN.1",
"ASE_CCL.1",
"ALC_CMS.2",
"ASE_REQ.2",
"ADV_TDS.1",
"ATE_COV.1",
"ADV_ARC.1"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0790b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "fb3a3931720aae3521c6502b150c3f493e3f8d0f59955db4d1acb6cc6f455eb2",
"txt_hash": "a609945e9b75135e216f533297ba03517ecda5e21bab80855ee1d9685dddef49"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ac0b65e4a858c1262630294f1339d0f627785d988d5fad678f0d77ffe4f3405a",
"txt_hash": "106e28cfee28dc7731bf810293165067bce6d28d2a467200d64649d069a43890"
}
},
"status": "archived"
}