IDEAL CITIZ V2.17-I on Infineon M7892 B11 embedding ID.me 1.6-i application

CSV information ?

Status active
Valid from 05.10.2018
Valid until 03.12.2026
Scheme 🇫🇷 FR
Manufacturer Idemia
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, ALC_DVS.2, EAL5+
Maintenance updates IDeal Citiz v2.17-i on Infineon M7892 B11 embedding ID.me 1.6-i application (Version 1.6-i / v 2.0.15.0.0) (07.11.2019) Certification report
Reassessment report: ANSSI-CC-2018/44-S01 (03.12.2021) Certification report

Heuristics summary ?

Certificate ID: ANSSI-CC-2018/44-S01

Certificate ?

Certification report ?

Extracted keywords

Vendor
Infineon, IDEMIA

Security level
EAL5, EAL2
Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5
Certificates
ANSSI-CC-2018/44-S01
Evaluation facilities
CEA-LETI

File metadata

Creation date D:20211207160024+01'00'
Modification date D:20211207160024+01'00'
Pages 2
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 11.0 (Windows)

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDES, 3DES, KMAC, CMAC
Asymmetric Algorithms
RSA-PSS, RSA-OAEP, ECDH, ECDSA, ECC, DH
Hash functions
SHA-1, SHA-224, SHA-384, SHA-512, SHA-256, SHA-2
Schemes
MAC, Key agreement
Protocols
PACE
Randomness
RNG
Libraries
v1.02.013
Block cipher modes
CBC

IC data groups
EF.CardAccess, EF.ChipSecurity
Vendor
Infineon, IDEMIA

Security level
EAL 5+, EAL 6+, EAL5, EAL6, EAL6+, EAL 5, EAL5+, EAL4+, EAL4, EAL5 augmented, EAL6 augmented, EAL 5 augmented, EAL4 augmented
Claims
D.SCD, D.SVD, A.CSP, A.CGA, A.SCA, OE.HI_VAD, OE.HID_VAD
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.5, ADV_TDS.4, ADV_IMP.1, ADV_TDS.3, ADV_FSP.2, ADV_FSP.4, AGD_PRE, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.5, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, ATE_DPT.3, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN, FCS_RND, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_RND.1, FCS_RND.1.1, FCS_COP.1.1, FCS_CKM.4.1, FCS_CKM.1.1, FCS_CKM, FCS_COP, FCS_CKM.2, FDP_UIT, FDP_DAU, FDP_ACC, FDP_ACF, FDP_RIP.1, FDP_SDI, FDP_ITC, FDP_UCT, FDP_SDI.2, FDP_RIP.1.1, FDP_ACC.1, FDP_ACF.1, FDP_UCT.1, FDP_ITC.1, FDP_DAU.2, FDP_UIT.1, FDP_ITC.2, FDP_IFC.1, FIA_API, FIA_API.1, FIA_UAU.1, FIA_UID.1, FIA_AFL.1, FIA_API.1.1, FIA_SOS.2, FIA_UID.1.1, FIA_UID.1.2, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU, FIA_UAU.5, FIA_AFL, FIA_UAU.6, FIA_UID, FIA_UAU.4, FMT_LIM, FMT_SMR.1, FMT_SMF.1, FMT_MOF.1, FMT_MSA, FMT_MSA.2, FMT_MSA.3, FMT_MSA.4, FMT_MTD, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1.1, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4.1, FMT_MTD.1, FMT_SMR, FMT_MTD.3, FMT_MTD.3.1, FPT_EMS, FPT_EMS.1, FPT_FLS.1, FPT_PHP.1, FPT_PHP.3, FPT_TST.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1.1, FPT_TST, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP-0068-V2-, BSI-PP-0035, BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012, BSI-CC-PP-0071-2012, BSI-CC-PP-0072-2012, BSI-CC-PP-0076-2013, BSI-CC-PP-0086, ANSSI-CC-PP-, PP-SSCD3, PP-SSCD4, PP-SSCD5, PP-SSCD6, PP-SSCD2
Certificates
BSI-DSZ-CC-0782-V4-2018, ANSSI-CC-2018/27
Evaluation facilities
CEA-LETI

Side-channel analysis
physical probing, side channel, DPA, SPA, timing attacks, physical tampering, Physical Tampering, malfunction, Malfunction, DFA, fault injection
Certification process
out of scope, ii) the TOE and the CGA. Beside the TOE, the product can include other Java Card applications (out of scope of the TOE, ii) the TOE and the CGA. Beside the TOE, the product can include other Java Card applications (out of scope of the TOE). IDeal Citiz v2.17-i Java Card Open Platform enforces separation of the data between

Standards
FIPS PUB 180-2, FIPS180-4, NIST SP 800-38B, PKCS#1, PKCS1, AIS31, ISO/IEC 7816-4, ISO/IEC 9797-, ISO/IEC 9797-1, ISO/IEC 15408:2005, ICAO, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2012-09-004
Technical reports
BSI TR-03110

File metadata

Title Title
Author G509704
Creation date D:20180925153329+02'00'
Modification date D:20180925153329+02'00'
Pages 143
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

References

Outgoing
  • ANSSI-CC-2018/27 - active - IDeal Citiz v2.17-i on Infineon M7892 B11 Java Card Open Platform
  • BSI-DSZ-CC-0782-V4-2018 - archived - Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013 or v2.07.003, EC v1.02.013 or v2.07.003, SHA-2 v1.01, SCL v2.02.012, Base v1.02.013 or v2.07.003, and Toolbox v1.02.013 or v2.07.003 libraries and with specific IC dedicated software (firmware)

Heuristics ?

Certificate ID: ANSSI-CC-2018/44-S01

Extracted SARs

ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, AVA_VAN.5

Scheme data ?

Product IDEAL CITIZ V2.17-I on Infineon M7892 B11embedding ID.me 1.6-i application
Url https://cyber.gouv.fr/produits-certifies/ideal-citiz-v217-i-infineon-m7892-b11embedding-idme-16-i-application
Description Le produit évalué est une applet Java Card «IDeal Citiz v2.17-i on Infineon M7892 B11 embedding ID.me 1.6-i application» développé par Idemia et Infineon Technologies AG. Ce produit offre des services d’authentification et de signature électronique conformes aux spécifications IAS ECC v1.0.1. Il est embarqué sur la plateforme Java Card ouverte IDeal Citiz v2.17-i on M7892 B11 préalablement
Sponsor Idemia
Developer Idemia, Infineon Technologies AG
Cert Id ANSSI-CC-2018/44
Level EAL5+
Expiration Date 03.12.2026
Enhanced
Cert Id ANSSI-CC-2018/44
Certification Date 05.10.2018
Expiration Date 03.12.2026
Category Cartes Ă  puce
Cc Version Critères Communs version 3.1r5
Developer Idemia, Infineon Technologies AG
Sponsor Idemia
Evaluation Facility CEA-LETI
Level EAL5+
Protection Profile PP for secure signature creation device (Part 2 Ă  6 incluse)
Mutual Recognition SOG-IS CCRA
Augmented ALC_DVS.2, AVA_VAN.5
Report Link https://cyber.gouv.fr/sites/default/files/2018/10/anssi-cc-2018_44fr.pdf
Target Link https://cyber.gouv.fr/sites/default/files/2018/10/anssi-cible-cc-2018_44en.pdf
Cert Link https://cyber.gouv.fr/sites/default/files/2018/10/certificat-anssi-cc-2018_44-s01fr.pdf

References ?

Updates ?

  • 16.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'IDEAL CITIZ V2.17-I on Infineon M7892 B11embedding ID.me 1.6-i application', 'url': 'https://cyber.gouv.fr/produits-certifies/ideal-citiz-v217-i-infineon-m7892-b11embedding-idme-16-i-application', 'description': 'Le produit Ă©valuĂ© est une applet Java Card «IDeal Citiz v2.17-i on Infineon M7892 B11 embedding ID.me 1.6-i application» dĂ©veloppĂ© par Idemia et Infineon Technologies AG. Ce produit offre des services d’authentification et de signature Ă©lectronique conformes aux spĂ©cifications IAS ECC v1.0.1. Il est embarquĂ© sur la plateforme Java Card ouverte IDeal Citiz v2.17-i on M7892 B11 prĂ©alablement', 'sponsor': 'Idemia', 'developer': 'Idemia, Infineon Technologies AG', 'cert_id': 'ANSSI-CC-2018/44', 'level': 'EAL5+', 'expiration_date': '2026-12-03', 'enhanced': {'cert_id': 'ANSSI-CC-2018/44', 'certification_date': '2018-10-05', 'expiration_date': '2026-12-03', 'category': 'Cartes Ă  puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'Idemia, Infineon Technologies AG', 'sponsor': 'Idemia', 'evaluation_facility': 'CEA-LETI', 'level': 'EAL5+', 'protection_profile': 'PP for secure signature creation device (Part 2 Ă  6 incluse)', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2018/10/anssi-cc-2018_44fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2018/10/anssi-cible-cc-2018_44en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2018/10/certificat-anssi-cc-2018_44-s01fr.pdf'}}.
  • 09.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'description': 'Le produit Ă©valuĂ© est une applet Java Card «IDeal Citiz v2.17-i on Infineon M7892 B11 embedding ID.me 1.6-i application» dĂ©veloppĂ© par Idemia et Infineon Technologies AG. Ce produit offre des services d’authentification et de signature Ă©lectronique conformes aux spĂ©cifications IAS ECC v1.0.1. Il est embarquĂ© sur la plateforme Java Card ouverte IDeal Citiz v2.17-i on M7892 B11 prĂ©alablement', 'cert_id': 'ANSSI-CC-2018/44', 'expiration_date': '2026-12-03', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2018/44', 'certification_date': '2018-10-05', 'expiration_date': '2026-12-03', 'mutual_recognition': 'SOG-IS CCRA'}}} data.
  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Protection Profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Privilege Directed Content Protection, Version 1.3', 'pp_eal': 'EAL4', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/authpp[1].pdf', 'pp_ids': None}]}.
  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'IDEAL CITIZ V2.17-I on Infineon M7892 B11embedding ID.me 1.6-i application', 'url': 'https://cyber.gouv.fr/produits-certifies/ideal-citiz-v217-i-infineon-m7892-b11embedding-idme-16-i-application', 'description': 'Le produit Ă©valuĂ© est une applet Java Card «IDeal Citiz v2.17-i on Infineon M7892 B11 embedding ID.me 1.6-i application» dĂ©veloppĂ© par Idemia et Infineon Technologies AG.\n\nCe produit offre des services d’authentification et de signature Ă©lectronique conformes aux spĂ©cifications IAS ECC v1.0.1. Il est embarquĂ© sur la plateforme Java Card ouverte IDeal Citiz v2.17-i on M7892 B11 prĂ©alablement', 'sponsor': 'Idemia', 'developer': 'Idemia, Infineon Technologies AG', 'cert_id': '2018/44', 'level': 'EAL5+', 'expiration_date': '3 DĂ©cembre 2026', 'enhanced': {'cert_id': '2018/44', 'certification_date': '05/10/2018', 'expiration_date': '03/12/2026', 'category': 'Cartes Ă  puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'Idemia, Infineon Technologies AG', 'sponsor': 'Idemia', 'evaluation_facility': 'CEA-LETI', 'level': 'EAL5+', 'protection_profile': 'PP for secure signature creation device (Part 2 Ă  6 incluse)', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2018/10/anssi-cc-2018_44fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2018/10/anssi-cible-cc-2018_44en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2018/10/certificat-anssi-cc-2018_44-s01fr.pdf'}}.
  • 02.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '78b474aa11b4540e07e5d291ecb70d5404c9617268614c9ff67d1a68cb6a8284', 'txt_hash': '143e16ade05bd81cfe8fb22f6bb76e0a92d6b9b6250f53ec7d0c56a323ce85df'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 2635084, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 143, '/Title': 'Title', '/Author': 'G509704', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20180925153329+02'00'", '/ModDate': "D:20180925153329+02'00'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0782-V4-2018': 2}, 'FR': {'ANSSI-CC-2018/27': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0068-V2-': 1, 'BSI-PP-0035': 1, 'BSI-CC-PP-0059-2009-MA-01': 1, 'BSI-CC-PP-0075-2012': 1, 'BSI-CC-PP-0071-2012': 1, 'BSI-CC-PP-0072-2012': 1, 'BSI-CC-PP-0076-2013': 1, 'BSI-CC-PP-0086': 1}, 'ANSSI': {'ANSSI-CC-PP-': 1}, 'other': {'PP-SSCD3': 21, 'PP-SSCD4': 24, 'PP-SSCD5': 18, 'PP-SSCD6': 23, 'PP-SSCD2': 21}}, 'cc_security_level': {'EAL': {'EAL 5+': 1, 'EAL 6+': 1, 'EAL5': 3, 'EAL6': 1, 'EAL6+': 1, 'EAL 5': 1, 'EAL5+': 1, 'EAL4+': 1, 'EAL4': 3, 'EAL5 augmented': 3, 'EAL6 augmented': 1, 'EAL 5 augmented': 1, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 5, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.5': 8, 'ADV_TDS.4': 8, 'ADV_IMP.1': 8, 'ADV_TDS.3': 3, 'ADV_FSP.2': 2, 'ADV_FSP.4': 1}, 'AGD': {'AGD_PRE': 2, 'AGD_OPE': 2, 'AGD_OPE.1': 5, 'AGD_PRE.1': 5}, 'ALC': {'ALC_DVS.2': 8, 'ALC_TAT.1': 2, 'ALC_TAT.2': 3, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 3, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 6, 'ATE_COV.1': 2, 'ATE_DPT.1': 1, 'ATE_DPT.3': 1}, 'AVA': {'AVA_VAN.5': 8}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1}, 'FCS': {'FCS_RND': 5, 'FCS_CKM.1': 25, 'FCS_CKM.4': 31, 'FCS_COP.1': 17, 'FCS_RND.1': 20, 'FCS_RND.1.1': 2, 'FCS_COP.1.1': 1, 'FCS_CKM.4.1': 1, 'FCS_CKM.1.1': 1, 'FCS_CKM': 24, 'FCS_COP': 40, 'FCS_CKM.2': 2}, 'FDP': {'FDP_UIT': 18, 'FDP_DAU': 9, 'FDP_ACC': 67, 'FDP_ACF': 56, 'FDP_RIP.1': 25, 'FDP_SDI': 20, 'FDP_ITC': 11, 'FDP_UCT': 22, 'FDP_SDI.2': 4, 'FDP_RIP.1.1': 1, 'FDP_ACC.1': 19, 'FDP_ACF.1': 30, 'FDP_UCT.1': 2, 'FDP_ITC.1': 9, 'FDP_DAU.2': 2, 'FDP_UIT.1': 4, 'FDP_ITC.2': 6, 'FDP_IFC.1': 9}, 'FIA': {'FIA_API': 19, 'FIA_API.1': 12, 'FIA_UAU.1': 23, 'FIA_UID.1': 25, 'FIA_AFL.1': 13, 'FIA_API.1.1': 2, 'FIA_SOS.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU': 93, 'FIA_UAU.5': 3, 'FIA_AFL': 36, 'FIA_UAU.6': 2, 'FIA_UID': 34, 'FIA_UAU.4': 1}, 'FMT': {'FMT_LIM': 5, 'FMT_SMR.1': 37, 'FMT_SMF.1': 57, 'FMT_MOF.1': 9, 'FMT_MSA': 21, 'FMT_MSA.2': 11, 'FMT_MSA.3': 24, 'FMT_MSA.4': 13, 'FMT_MTD': 176, 'FMT_LIM.1': 14, 'FMT_LIM.2': 13, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 2, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_MOF.1.1': 1, 'FMT_MSA.1': 5, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.4.1': 1, 'FMT_MTD.1': 15, 'FMT_SMR': 28, 'FMT_MTD.3': 11, 'FMT_MTD.3.1': 1}, 'FPT': {'FPT_EMS': 5, 'FPT_EMS.1': 16, 'FPT_FLS.1': 12, 'FPT_PHP.1': 7, 'FPT_PHP.3': 15, 'FPT_TST.1': 17, 'FPT_EMS.1.1': 4, 'FPT_EMS.1.2': 3, 'FPT_FLS.1.1': 1, 'FPT_TST': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC': 73, 'FTP_ITC.1': 22, 'FTP_TRP.1': 4}}, 'cc_claims': {'D': {'D.SCD': 1, 'D.SVD': 1}, 'A': {'A.CSP': 9, 'A.CGA': 6, 'A.SCA': 5}, 'OE': {'OE.HI_VAD': 2, 'OE.HID_VAD': 7}}, 'vendor': {'Infineon': {'Infineon': 14}, 'Idemia': {'IDEMIA': 17}}, 'eval_facility': {'CEA-LETI': {'CEA-LETI': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 20}}, 'DES': {'DES': {'DES': 1}, '3DES': {'TDES': 9, '3DES': 10}}, 'constructions': {'MAC': {'KMAC': 2, 'CMAC': 5}}}, 'asymmetric_crypto': {'RSA': {'RSA-PSS': 1, 'RSA-OAEP': 1}, 'ECC': {'ECDH': {'ECDH': 4}, 'ECDSA': {'ECDSA': 4}, 'ECC': {'ECC': 17}}, 'FF': {'DH': {'DH': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 7}, 'SHA2': {'SHA-224': 5, 'SHA-384': 5, 'SHA-512': 4, 'SHA-256': 5, 'SHA-2': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 7}, 'KA': {'Key agreement': 1}}, 'crypto_protocol': {'PACE': {'PACE': 118}}, 'randomness': {'RNG': {'RNG': 2}}, 'cipher_mode': {'CBC': {'CBC': 11}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 8}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 3, 'side channel': 1, 'DPA': 3, 'SPA': 3, 'timing attacks': 2}, 'FI': {'physical tampering': 7, 'Physical Tampering': 1, 'malfunction': 5, 'Malfunction': 5, 'DFA': 1, 'fault injection': 1}}, 'technical_report_id': {'BSI': {'BSI TR-03110': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.CardAccess': 2, 'EF.ChipSecurity': 1}}, 'standard_id': {'FIPS': {'FIPS PUB 180-2': 2, 'FIPS180-4': 1}, 'NIST': {'NIST SP 800-38B': 1}, 'PKCS': {'PKCS#1': 4, 'PKCS1': 4}, 'BSI': {'AIS31': 5}, 'ISO': {'ISO/IEC 7816-4': 1, 'ISO/IEC 9797-': 1, 'ISO/IEC 9797-1': 2, 'ISO/IEC 15408:2005': 2}, 'ICAO': {'ICAO': 2}, 'CC': {'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'ii) the TOE and the CGA. Beside the TOE, the product can include other Java Card applications (out of scope of the TOE': 1, 'ii) the TOE and the CGA. Beside the TOE, the product can include other Java Card applications (out of scope of the TOE). IDeal Citiz v2.17-i Java Card Open Platform enforces separation of the data between': 1}}}.
    • The st_filename property was set to anssi-cible-cc-2018_44en.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-V4-2018', 'ANSSI-CC-2018/27']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-V4-2018', 'ANSSI-CC-2018/27']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]} values added.
  • 19.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '660198a3aa416292eb1ca0855ebfbc5756e80a05832e12260d9e61530f3020b1', 'txt_hash': '96e3940607a61cdc4c5927c2a02647f727a67f9ab90a747496424c3198e523b5'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 280419, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Author': '', '/CreationDate': "D:20211207160024+01'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20211207160024+01'00'", '/Producer': 'Acrobat Distiller 11.0 (Windows)', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'FR': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2018/44-S01': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL5': 1, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon': 1}, 'Idemia': {'IDEMIA': 2}}, 'eval_facility': {'CEA-LETI': {'CEA-LETI': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to certificat-anssi-cc-2018_44-s01fr.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ANSSI-CC-2018/44-S01.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2018_44-s01fr.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_44en.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]} values discarded.
    • The scheme_data property was set to {'product': 'IDEAL CITIZ V2.17-I on Infineon M7892 B11embedding ID.me 1.6-i application', 'url': 'https://cyber.gouv.fr/produits-certifies/ideal-citiz-v217-i-infineon-m7892-b11embedding-idme-16-i-application', 'description': 'Le produit Ă©valuĂ© est une applet Java Card «IDeal Citiz v2.17-i on Infineon M7892 B11 embedding ID.me 1.6-i application» dĂ©veloppĂ© par Idemia et Infineon Technologies AG.\n\nCe produit offre des services d’authentification et de signature Ă©lectronique conformes aux spĂ©cifications IAS ECC v1.0.1. Il est embarquĂ© sur la plateforme Java Card ouverte IDeal Citiz v2.17-i on M7892 B11 prĂ©alablement', 'sponsor': 'Idemia', 'developer': 'Idemia, Infineon Technologies AG', 'cert_id': '2018/44', 'level': 'EAL5+', 'expiration_date': '3 DĂ©cembre 2026', 'enhanced': {'cert_id': '2018/44', 'certification_date': '05/10/2018', 'expiration_date': '03/12/2026', 'category': 'Cartes Ă  puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'Idemia, Infineon Technologies AG', 'sponsor': 'Idemia', 'evaluation_facility': 'CEA-LETI', 'level': 'EAL5+', 'protection_profile': 'PP for secure signature creation device (Part 2 Ă  6 incluse)', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2018/10/anssi-cc-2018_44fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2018/10/anssi-cible-cc-2018_44en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2018/10/certificat-anssi-cc-2018_44-s01fr.pdf'}}.
  • 31.07.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name IDEAL CITIZ V2.17-I on Infineon M7892 B11 embedding ID.me 1.6-i application was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "1a628b5ce7f4b999",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2018/44-S01",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.17",
        "1.6"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "ANSSI-CC-2018/44",
      "description": "Le produit \u00e9valu\u00e9 est une applet Java Card \u00abIDeal Citiz v2.17-i on Infineon M7892 B11 embedding ID.me 1.6-i application\u00bb d\u00e9velopp\u00e9 par Idemia et Infineon Technologies AG. Ce produit offre des services d\u2019authentification et de signature \u00e9lectronique conformes aux sp\u00e9cifications IAS ECC v1.0.1. Il est embarqu\u00e9 sur la plateforme Java Card ouverte IDeal Citiz v2.17-i on M7892 B11 pr\u00e9alablement",
      "developer": "Idemia, Infineon Technologies AG",
      "enhanced": {
        "augmented": "ALC_DVS.2, AVA_VAN.5",
        "category": "Cartes \u00e0 puce",
        "cc_version": "Crit\u00e8res Communs version 3.1r5",
        "cert_id": "ANSSI-CC-2018/44",
        "cert_link": "https://cyber.gouv.fr/sites/default/files/2018/10/certificat-anssi-cc-2018_44-s01fr.pdf",
        "certification_date": "2018-10-05",
        "developer": "Idemia, Infineon Technologies AG",
        "evaluation_facility": "CEA-LETI",
        "expiration_date": "2026-12-03",
        "level": "EAL5+",
        "mutual_recognition": "SOG-IS CCRA",
        "protection_profile": "PP for secure signature creation device (Part 2 \u00e0 6 incluse)",
        "report_link": "https://cyber.gouv.fr/sites/default/files/2018/10/anssi-cc-2018_44fr.pdf",
        "sponsor": "Idemia",
        "target_link": "https://cyber.gouv.fr/sites/default/files/2018/10/anssi-cible-cc-2018_44en.pdf"
      },
      "expiration_date": "2026-12-03",
      "level": "EAL5+",
      "product": "IDEAL CITIZ V2.17-I on Infineon M7892 B11embedding ID.me 1.6-i application",
      "sponsor": "Idemia",
      "url": "https://cyber.gouv.fr/produits-certifies/ideal-citiz-v217-i-infineon-m7892-b11embedding-idme-16-i-application"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2018/27",
          "BSI-DSZ-CC-0782-V4-2018"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2018/27",
          "BSI-DSZ-CC-0782-V4-2018"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2021-12-03",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_44-s01fr.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "Reassessment report: ANSSI-CC-2018/44-S01"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2019-11-07",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_44-m01.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "IDeal Citiz v2.17-i on Infineon M7892 B11 embedding ID.me 1.6-i application (Version 1.6-i / v 2.0.15.0.0)"
      }
    ]
  },
  "manufacturer": "Idemia",
  "manufacturer_web": "https://www.idemia.com",
  "name": "IDEAL CITIZ V2.17-I on Infineon M7892 B11 embedding ID.me 1.6-i application",
  "not_valid_after": "2026-12-03",
  "not_valid_before": "2018-10-05",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "certificat-anssi-cc-2018_44-s01fr.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2018/44-S01": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL5": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA-LETI": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 2
        },
        "Infineon": {
          "Infineon": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "",
      "/CreationDate": "D:20211207160024+01\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20211207160024+01\u002700\u0027",
      "/Producer": "Acrobat Distiller 11.0 (Windows)",
      "/Title": "",
      "pdf_file_size_bytes": 280419,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "st_filename": "anssi-cible-cc-2018_44en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 17
          },
          "ECDH": {
            "ECDH": 4
          },
          "ECDSA": {
            "ECDSA": 4
          }
        },
        "FF": {
          "DH": {
            "DH": 2
          }
        },
        "RSA": {
          "RSA-OAEP": 1,
          "RSA-PSS": 1
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0782-V4-2018": 2
        },
        "FR": {
          "ANSSI-CC-2018/27": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.CGA": 6,
          "A.CSP": 9,
          "A.SCA": 5
        },
        "D": {
          "D.SCD": 1,
          "D.SVD": 1
        },
        "OE": {
          "OE.HID_VAD": 7,
          "OE.HI_VAD": 2
        }
      },
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-": 1
        },
        "BSI": {
          "BSI-CC-PP-0059-2009-MA-01": 1,
          "BSI-CC-PP-0068-V2-": 1,
          "BSI-CC-PP-0071-2012": 1,
          "BSI-CC-PP-0072-2012": 1,
          "BSI-CC-PP-0075-2012": 1,
          "BSI-CC-PP-0076-2013": 1,
          "BSI-CC-PP-0086": 1,
          "BSI-PP-0035": 1
        },
        "other": {
          "PP-SSCD2": 21,
          "PP-SSCD3": 21,
          "PP-SSCD4": 24,
          "PP-SSCD5": 18,
          "PP-SSCD6": 23
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 5,
          "ADV_FSP.1": 3,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 8,
          "ADV_IMP.1": 8,
          "ADV_TDS.1": 2,
          "ADV_TDS.3": 3,
          "ADV_TDS.4": 8
        },
        "AGD": {
          "AGD_OPE": 2,
          "AGD_OPE.1": 5,
          "AGD_PRE": 2,
          "AGD_PRE.1": 5
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.5": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 8,
          "ALC_LCD.1": 3,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 3
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 5,
          "ASE_OBJ.2": 3,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 3,
          "ATE_DPT.1": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 6
        },
        "AVA": {
          "AVA_VAN.5": 8
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL 5 augmented": 1,
          "EAL 5+": 1,
          "EAL 6+": 1,
          "EAL4": 3,
          "EAL4 augmented": 1,
          "EAL4+": 1,
          "EAL5": 3,
          "EAL5 augmented": 3,
          "EAL5+": 1,
          "EAL6": 1,
          "EAL6 augmented": 1,
          "EAL6+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1
        },
        "FCS": {
          "FCS_CKM": 24,
          "FCS_CKM.1": 25,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 2,
          "FCS_CKM.4": 31,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 40,
          "FCS_COP.1": 17,
          "FCS_COP.1.1": 1,
          "FCS_RND": 5,
          "FCS_RND.1": 20,
          "FCS_RND.1.1": 2
        },
        "FDP": {
          "FDP_ACC": 67,
          "FDP_ACC.1": 19,
          "FDP_ACF": 56,
          "FDP_ACF.1": 30,
          "FDP_DAU": 9,
          "FDP_DAU.2": 2,
          "FDP_IFC.1": 9,
          "FDP_ITC": 11,
          "FDP_ITC.1": 9,
          "FDP_ITC.2": 6,
          "FDP_RIP.1": 25,
          "FDP_RIP.1.1": 1,
          "FDP_SDI": 20,
          "FDP_SDI.2": 4,
          "FDP_UCT": 22,
          "FDP_UCT.1": 2,
          "FDP_UIT": 18,
          "FDP_UIT.1": 4
        },
        "FIA": {
          "FIA_AFL": 36,
          "FIA_AFL.1": 13,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_API": 19,
          "FIA_API.1": 12,
          "FIA_API.1.1": 2,
          "FIA_SOS.2": 1,
          "FIA_UAU": 93,
          "FIA_UAU.1": 23,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.4": 1,
          "FIA_UAU.5": 3,
          "FIA_UAU.6": 2,
          "FIA_UID": 34,
          "FIA_UID.1": 25,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_LIM": 5,
          "FMT_LIM.1": 14,
          "FMT_LIM.1.1": 2,
          "FMT_LIM.2": 13,
          "FMT_LIM.2.1": 2,
          "FMT_MOF.1": 9,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 21,
          "FMT_MSA.1": 5,
          "FMT_MSA.2": 11,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 24,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MSA.4": 13,
          "FMT_MSA.4.1": 1,
          "FMT_MTD": 176,
          "FMT_MTD.1": 15,
          "FMT_MTD.3": 11,
          "FMT_MTD.3.1": 1,
          "FMT_SMF.1": 57,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 28,
          "FMT_SMR.1": 37,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_EMS": 5,
          "FPT_EMS.1": 16,
          "FPT_EMS.1.1": 4,
          "FPT_EMS.1.2": 3,
          "FPT_FLS.1": 12,
          "FPT_FLS.1.1": 1,
          "FPT_PHP.1": 7,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 15,
          "FPT_PHP.3.1": 1,
          "FPT_TST": 1,
          "FPT_TST.1": 17,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 73,
          "FTP_ITC.1": 22,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {
        "OutOfScope": {
          "ii) the TOE and the CGA. Beside the TOE, the product can include other Java Card applications (out of scope of the TOE": 1,
          "ii) the TOE and the CGA. Beside the TOE, the product can include other Java Card applications (out of scope of the TOE). IDeal Citiz v2.17-i Java Card Open Platform enforces separation of the data between": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 11
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Infineon": {
          "v1.02.013": 8
        }
      },
      "crypto_protocol": {
        "PACE": {
          "PACE": 118
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key agreement": 1
        },
        "MAC": {
          "MAC": 7
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA-LETI": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 7
          },
          "SHA2": {
            "SHA-2": 2,
            "SHA-224": 5,
            "SHA-256": 5,
            "SHA-384": 5,
            "SHA-512": 4
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.CardAccess": 2,
          "EF.ChipSecurity": 1
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1,
          "Malfunction": 5,
          "Physical Tampering": 1,
          "fault injection": 1,
          "malfunction": 5,
          "physical tampering": 7
        },
        "SCA": {
          "DPA": 3,
          "SPA": 3,
          "physical probing": 3,
          "side channel": 1,
          "timing attacks": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 5
        },
        "CC": {
          "CCMB-2012-09-004": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        },
        "FIPS": {
          "FIPS PUB 180-2": 2,
          "FIPS180-4": 1
        },
        "ICAO": {
          "ICAO": 2
        },
        "ISO": {
          "ISO/IEC 15408:2005": 2,
          "ISO/IEC 7816-4": 1,
          "ISO/IEC 9797-": 1,
          "ISO/IEC 9797-1": 2
        },
        "NIST": {
          "NIST SP 800-38B": 1
        },
        "PKCS": {
          "PKCS#1": 4,
          "PKCS1": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 20
          }
        },
        "DES": {
          "3DES": {
            "3DES": 10,
            "TDES": 9
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 5,
            "KMAC": 2
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03110": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 17
        },
        "Infineon": {
          "Infineon": 14
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "G509704",
      "/CreationDate": "D:20180925153329+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20180925153329+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Title": "Title",
      "pdf_file_size_bytes": 2635084,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 143
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4",
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/authpp[1].pdf",
        "pp_name": "Privilege Directed Content Protection, Version 1.3"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2018_44-s01fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_DVS.2",
      "AVA_VAN.5",
      "EAL5+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_44en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "660198a3aa416292eb1ca0855ebfbc5756e80a05832e12260d9e61530f3020b1",
      "txt_hash": "96e3940607a61cdc4c5927c2a02647f727a67f9ab90a747496424c3198e523b5"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "78b474aa11b4540e07e5d291ecb70d5404c9617268614c9ff67d1a68cb6a8284",
      "txt_hash": "143e16ade05bd81cfe8fb22f6bb76e0a92d6b9b6250f53ec7d0c56a323ce85df"
    }
  },
  "status": "active"
}