IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application

CSV information ?

Status archived
Valid from 09.07.2018
Valid until 09.07.2023
Scheme 🇫🇷 FR
Manufacturer Idemia
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, ALC_DVS.2, EAL5+

Heuristics summary ?

Certificate ID: ANSSI-CC-2018/22

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
DES
Asymmetric Algorithms
ECC
Hash functions
SHA-2
Libraries
v1.02.013

CPLC
IC Fabricator, IC Type
Vendor
Infineon, Infineon Technologies AG, Idemia, IDEMIA

Security level
EAL 5, EAL2, EAL5, EAL7, EAL 1, EAL 3, EAL 7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_PRE, AGD_OPE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Protection profiles
BSI-CC-PP- 0059-2009-MA-01, BSI-CC-PP- 0071-2012, BSI-CC-PP- 0072-2012, BSI-CC-PP- 0076-2013, PP-SSCD-Part2, PP-SSCD-Part3, PP-SSCD-, PP-SSCD-Part5, PP-SSCD-Part6
Certificates
ANSSI-CC-2018/22, ANSSI-CC-2017/59, ANSSI-CC-2016/70
Evaluation facilities
CESTI, CEA - LETI

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Keywords ANSSI-CC-CER-F-07.026
Creation date D:20180713115402+02'00'
Modification date D:20180713145243+02'00'
Pages 18
Creator Acrobat PDFMaker 11 pour Word
Producer Adobe PDF Library 11.0

Frontpage

Certificate ID ANSSI-CC-2018/22
Certified item IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application
Certification lab CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
Developer Idemia 8 Chaussée Jules César, 95520 Osny, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Idemia 18 Chaussée Jules César, 95520 Osny, France

References

Outgoing
  • ANSSI-CC-2016/70 - archived - ID.me 1.28 on IDeal Citiz MOSID V2.1.1
  • ANSSI-CC-2017/59 - archived - IDeal Citiz v2.15-i on Infineon M7892 B11 Java Card Open Platform

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDES, 3DES, CMAC
Asymmetric Algorithms
RSA-PSS, RSA-OAEP, ECDH, ECDSA, ECC, Diffie-Hellman
Hash functions
SHA-1, SHA-224, SHA-384, SHA-512, SHA-256, SHA-2
Schemes
MAC, Key agreement
Protocols
PACE
Randomness
RNG
Libraries
v1.02.013
Block cipher modes
CBC

Vendor
Infineon, IDEMIA

Security level
EAL 5+, EAL 6+, EAL5, EAL6, EAL6+, EAL 5, EAL5+, EAL4+, EAL5 augmented, EAL6 augmented, EAL 5 augmented
Claims
D.SCD, D.SVD, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.KEY-MNGT, O.PIN-MNGT, O.BIO-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.SCP, O.CARD-MANAGEMENT, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, T.APP_DATA_INTEGRITY, T.UNAUTH_CARD_MNGT, T.LIFE_CYCLE, T.UNAUTH_ACCESS, A.CSP, A.CGA, A.SCA, A.APPLET, A.VERIFICATION, A.PRODUCTION, OE.HI_VAD, OE.HID_VAD, OE.APPLET, OE.VERIFICATION, OE.CODE-EVIDENCE, OE.SECURITY-DOMAINS, OE.QUOTAS, OE.SHARE-CONTROL, OE.KEY_GENERATION, OE.PRODUCTION, OSP.VERIFICATION, OSP.SECURITY_DOMAINS, OSP.QUOTAS, OSP.KEY_GENERATION, OSP.SHARE-CONTROL
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.5, ADV_TDS.4, ADV_IMP.1, ADV_TDS.3, ADV_INT.2, ADV_FSP.2, ADV_FSP.4, AGD_PRE, AGD_OPE, AGD_USR, AGD_ADM, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.5, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, ATE_DPT.3, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_GEN, FCO_NRO, FCS_RND, FCS_RND.1, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM, FCS_COP, FCS_RND.1.1, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_UIT, FDP_DAU, FDP_ACC, FDP_ACF, FDP_RIP.1, FDP_SDI, FDP_ITC, FDP_UCT, FDP_IFC, FDP_IFF, FDP_RIP, FDP_ROL, FDP_SDI.2, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1.1, FDP_ITC.1, FDP_UCT.1, FDP_DAU.2, FDP_UIT.1, FDP_ITC.2, FDP_IFC.1, FIA_API, FIA_API.1, FIA_UAU.1, FIA_UID.1, FIA_AFL.1, FIA_ATD, FIA_UID, FIA_USB, FIA_API.1.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_AFL.1.1, FIA_AFL.1.2, FMT_SMR.1, FMT_SMF.1, FMT_MOF.1, FMT_MSA, FMT_MSA.2, FMT_MSA.3, FMT_MSA.4, FMT_MTD, FMT_SMF, FMT_SMR, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1.1, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4.1, FMT_MTD.1, FPR_UNO.1, FPT_EMS, FPT_EMS.1, FPT_FLS.1, FPT_PHP.1, FPT_PHP.3, FPT_TST.1, FPT_FLS, FPT_TDC.1, FPT_RCV, FPT_PHP, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1.1, FPT_TST, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP-0068-V2-, BSI-PP-0035, BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012, BSI-CC-PP-0071-2012, BSI-CC-PP-0072-2012, BSI-CC-PP-0076-2013, ANSSI-CC-PP-, PP-SSCD2, PP-SSCD3, PP-SSCD4, PP-SSCD5, PP-SSCD6, PP-SSCD
Certificates
BSI-DSZ-CC-0782-V2-2015-RA-01, ANSSI-CC-2017/59
Evaluation facilities
CEA-LETI

Side-channel analysis
physical probing, side channel, DPA, SPA, timing attacks, physical tampering, malfunction, DFA, fault injection
Certification process
out of scope, only EC is used to generate keys, the RSA key generation is out of scope of the platform evaluation, pre- personalization phase. Beside the TOE, the product can include other Java Card applications (out of scope of the TOE). IDealCitiz v2.1.1 Platform enforces separation of the data between the applets and, v2.1.1 mechanisms FCS_CKM.1 FCS_CKM.1 (only EC is used to generate keys, the RSA key generation is out of scope of the platform evaluation) The requirement in this ST is equiva- lent to parts of the platform ST

Standards
FIPS PUB 180-2, NIST SP 800-38B, PKCS3, PKCS#1, PKCS1, AIS20, AIS 20, AIS31, ISO/IEC 7816-4, ISO/IEC 14443, ISO/IEC 9797-, ISO/IEC 9797-1, ISO/IEC 15408:2005, ICAO, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004, CCMB-2017-04-001

File metadata

Creation date D:20171013152111+02'00'
Modification date D:20180713145229+02'00'
Pages 124
Creator Microsoft® Word 2013
Producer Microsoft® Word 2013

References

Outgoing
  • ANSSI-CC-2017/59 - archived - IDeal Citiz v2.15-i on Infineon M7892 B11 Java Card Open Platform

Heuristics ?

Certificate ID: ANSSI-CC-2018/22

Extracted SARs

ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, AVA_VAN.5

Scheme data ?

Product IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application
Url https://cyber.gouv.fr/produits-certifies/ideal-citiz-v215i-infineon-m7892-b11-embedding-idme-148b-application
Description Le produit certifié est « IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application » développé par IDEMIA et INFINEON TECHNOLOGIES AG. Ce produit est une carte à puce constituée d’un logiciel conforme au standard IAS ECC v1.0.1. Ce produit est destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD1). Il peut être utilisé dans différents types de docum
Sponsor Idemia
Developer Idemia, Infineon Technologies AG
Cert Id ANSSI-CC-2018/22
Level EAL5+
Enhanced
Cert Id ANSSI-CC-2018/22
Certification Date 09.07.2018
Category Cartes Ă  puce
Cc Version Critères Communs version 3.1r5
Developer Idemia, Infineon Technologies AG
Sponsor Idemia
Evaluation Facility CEA - LETI
Level EAL5+
Protection Profile
Mutual Recognition SOG-IS CCRA
Augmented ALC_DVS.2, AVA_VAN.5
Report Link https://cyber.gouv.fr/sites/default/files/2018/07/anssi-cc-2018_22fr.pdf
Target Link https://cyber.gouv.fr/sites/default/files/2018/07/anssi-cible-cc-2018_22en.pdf

References ?

Updates ?

  • 16.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application', 'url': 'https://cyber.gouv.fr/produits-certifies/ideal-citiz-v215i-infineon-m7892-b11-embedding-idme-148b-application', 'description': 'Le produit certifiĂ© est « IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application » dĂ©veloppĂ© par IDEMIA et INFINEON TECHNOLOGIES AG. Ce produit est une carte Ă  puce constituĂ©e d’un logiciel conforme au standard IAS ECC v1.0.1. Ce produit est destinĂ© Ă  ĂŞtre utilisĂ© comme dispositif sĂ©curisĂ© de crĂ©ation de signature (SSCD1). Il peut ĂŞtre utilisĂ© dans diffĂ©rents types de docum', 'sponsor': 'Idemia', 'developer': 'Idemia, Infineon Technologies AG', 'cert_id': 'ANSSI-CC-2018/22', 'level': 'EAL5+', 'enhanced': {'cert_id': 'ANSSI-CC-2018/22', 'certification_date': '2018-07-09', 'category': 'Cartes Ă  puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'Idemia, Infineon Technologies AG', 'sponsor': 'Idemia', 'evaluation_facility': 'CEA - LETI', 'level': 'EAL5+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2018/07/anssi-cc-2018_22fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2018/07/anssi-cible-cc-2018_22en.pdf'}}.
  • 09.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'description': 'Le produit certifiĂ© est « IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application » dĂ©veloppĂ© par IDEMIA et INFINEON TECHNOLOGIES AG. Ce produit est une carte Ă  puce constituĂ©e d’un logiciel conforme au standard IAS ECC v1.0.1. Ce produit est destinĂ© Ă  ĂŞtre utilisĂ© comme dispositif sĂ©curisĂ© de crĂ©ation de signature (SSCD1). Il peut ĂŞtre utilisĂ© dans diffĂ©rents types de docum', 'cert_id': 'ANSSI-CC-2018/22', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2018/22', 'certification_date': '2018-07-09', 'mutual_recognition': 'SOG-IS CCRA'}}} data.
  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application', 'url': 'https://cyber.gouv.fr/produits-certifies/ideal-citiz-v215i-infineon-m7892-b11-embedding-idme-148b-application', 'description': 'Le produit certifiĂ© est « IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application » dĂ©veloppĂ© par IDEMIA et INFINEON TECHNOLOGIES AG.\n\nCe produit est une carte Ă  puce constituĂ©e d’un logiciel conforme au standard IAS ECC v1.0.1. Ce produit est destinĂ© Ă  ĂŞtre utilisĂ© comme dispositif sĂ©curisĂ© de crĂ©ation de signature (SSCD1). Il peut ĂŞtre utilisĂ© dans diffĂ©rents types de docum', 'sponsor': 'Idemia', 'developer': 'Idemia, Infineon Technologies AG', 'cert_id': '2018/22', 'level': 'EAL5+', 'enhanced': {'cert_id': '2018/22', 'certification_date': '09/07/2018', 'category': 'Cartes Ă  puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'Idemia, Infineon Technologies AG', 'sponsor': 'Idemia', 'evaluation_facility': 'CEA - LETI', 'level': 'EAL5+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2018/07/anssi-cc-2018_22fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2018/07/anssi-cible-cc-2018_22en.pdf'}}.
  • 02.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '5c3b6c48be363bf1196a0ee3f8cec62c5f05612b0b7df84de74e3891ac0be65f', 'txt_hash': 'bfcc7ee8068e63e79911434bb7ad2a93dc594fef76a14966ac314e45fb793574'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '82bcb1dbd3b194c97b23cc09803becbf87884f94a047c5799c9729e753f2dead', 'txt_hash': '62a1969742ba1a7fde0d80e3141e3998c41e7efed436dbe969739a6276eb6dcf'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 287772, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 18, '/Category': 'RĂ©fĂ©rence, Version', '/Comments': 'Idemia', '/Company': 'SGDSN/ANSSI', '/CreationDate': "D:20180713115402+02'00'", '/Creator': 'Acrobat PDFMaker 11 pour Word', '/Keywords': 'ANSSI-CC-CER-F-07.026', '/ModDate': "D:20180713145243+02'00'", '/Producer': 'Adobe PDF Library 11.0', '/SourceModified': 'D:20180713095351', '/Subject': '', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'http://www.ssi.gouv.fr/']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 2578944, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 124, '/CreationDate': "D:20171013152111+02'00'", '/Creator': 'Microsoft® Word 2013', '/ModDate': "D:20180713145229+02'00'", '/Producer': 'Microsoft® Word 2013', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok117', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok156', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok125', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok149', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok140', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok120', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok148', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok130', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok160', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok167', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok137', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok115', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok119', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok116', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok123', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok124', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok170', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok135', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok127', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok134', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok141', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok128', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok169', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok162', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok164', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok155', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok231', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok126', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok121', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok235', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok136', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok144', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok233', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok138', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok157', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok232', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok114', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok131', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok236', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok113', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok154', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok146', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok152', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok147', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok122', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok132', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok234']}}.
    • The report_frontpage property was set to {'FR': {'match_rules': ['RĂ©fĂ©rence du rapport de certification(.+)Nom du produit(.+)RĂ©fĂ©rence/version du produit(.*)ConformitĂ© Ă  un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)DĂ©veloppeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2018/22', 'cert_item': 'IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application', 'cert_item_version': 'OFFICIEL_IDME_1_4_8B_IDealCitiz_SLE78CLFX4000PM_2_1_5_0_R2', 'ref_protection_profiles': 'Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.0.1 ; Part 3: Device with key import, v1.0.2 ; Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1 ; Part 5: Extension for device with key generation and trusted communication with signature creation application, v1.0.1 ; Part 6: Extension for device with key import and trusted communication with signature creation application, v1.0.4', 'cc_version': 'Critères Communs version 3.1 rĂ©vision 5', 'cc_security_level': 'EAL 5 augmentĂ© ALC_DVS.2, AVA_VAN.5', 'developer': 'Idemia 8 ChaussĂ©e Jules CĂ©sar, 95520 Osny, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Idemia 18 ChaussĂ©e Jules CĂ©sar, 95520 Osny, France', 'cert_lab': 'CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France'}}.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2018/22': 19, 'ANSSI-CC-2017/59': 1, 'ANSSI-CC-2016/70': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP- 0059-2009-MA-01': 1, 'BSI-CC-PP- 0071-2012': 1, 'BSI-CC-PP- 0072-2012': 1, 'BSI-CC-PP- 0076-2013': 1}, 'other': {'PP-SSCD-Part2': 1, 'PP-SSCD-Part3': 1, 'PP-SSCD-': 6, 'PP-SSCD-Part5': 1, 'PP-SSCD-Part6': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 3, 'EAL2': 2, 'EAL5': 1, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E6 ElevĂ©': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_PRE': 3, 'AGD_OPE': 2}, 'ALC': {'ALC_DVS.2': 3, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 6, 'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon': 24, 'Infineon Technologies AG': 1}, 'Idemia': {'Idemia': 2, 'IDEMIA': 19}}, 'eval_facility': {'CESTI': {'CESTI': 3}, 'CEA-LETI': {'CEA - LETI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-2': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 4}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {'ICFab': {'IC Fabricator': 1}, 'ICType': {'IC Type': 1}}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0782-V2-2015-RA-01': 2}, 'FR': {'ANSSI-CC-2017/59': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0068-V2-': 1, 'BSI-PP-0035': 2, 'BSI-CC-PP-0059-2009-MA-01': 1, 'BSI-CC-PP-0075-2012': 1, 'BSI-CC-PP-0071-2012': 1, 'BSI-CC-PP-0072-2012': 1, 'BSI-CC-PP-0076-2013': 1}, 'ANSSI': {'ANSSI-CC-PP-': 1}, 'other': {'PP-SSCD2': 23, 'PP-SSCD3': 17, 'PP-SSCD4': 16, 'PP-SSCD5': 20, 'PP-SSCD6': 16, 'PP-SSCD': 1}}, 'cc_security_level': {'EAL': {'EAL 5+': 1, 'EAL 6+': 1, 'EAL5': 5, 'EAL6': 1, 'EAL6+': 1, 'EAL 5': 1, 'EAL5+': 3, 'EAL4+': 1, 'EAL5 augmented': 5, 'EAL6 augmented': 1, 'EAL 5 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.5': 8, 'ADV_TDS.4': 8, 'ADV_IMP.1': 8, 'ADV_TDS.3': 3, 'ADV_INT.2': 1, 'ADV_FSP.2': 2, 'ADV_FSP.4': 1}, 'AGD': {'AGD_PRE': 6, 'AGD_OPE': 4, 'AGD_USR': 1, 'AGD_ADM': 1, 'AGD_OPE.1': 5, 'AGD_PRE.1': 5}, 'ALC': {'ALC_DVS.2': 8, 'ALC_TAT.1': 2, 'ALC_TAT.2': 3, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 3, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 6, 'ATE_COV.1': 2, 'ATE_DPT.1': 1, 'ATE_DPT.3': 1}, 'AVA': {'AVA_VAN.5': 8}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 1, 'FAU_GEN': 1}, 'FCO': {'FCO_NRO': 1}, 'FCS': {'FCS_RND': 5, 'FCS_RND.1': 12, 'FCS_CKM.1': 21, 'FCS_CKM.4': 15, 'FCS_COP.1': 15, 'FCS_CKM.2': 2, 'FCS_CKM.3': 1, 'FCS_CKM': 2, 'FCS_COP': 1, 'FCS_RND.1.1': 2, 'FCS_CKM.1.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_UIT': 12, 'FDP_DAU': 11, 'FDP_ACC': 65, 'FDP_ACF': 55, 'FDP_RIP.1': 12, 'FDP_SDI': 24, 'FDP_ITC': 13, 'FDP_UCT': 17, 'FDP_IFC': 2, 'FDP_IFF': 2, 'FDP_RIP': 8, 'FDP_ROL': 1, 'FDP_SDI.2': 5, 'FDP_ACC.1': 15, 'FDP_ACF.1': 20, 'FDP_RIP.1.1': 1, 'FDP_ITC.1': 5, 'FDP_UCT.1': 1, 'FDP_DAU.2': 2, 'FDP_UIT.1': 2, 'FDP_ITC.2': 2, 'FDP_IFC.1': 7}, 'FIA': {'FIA_API': 5, 'FIA_API.1': 12, 'FIA_UAU.1': 23, 'FIA_UID.1': 21, 'FIA_AFL.1': 10, 'FIA_ATD': 1, 'FIA_UID': 2, 'FIA_USB': 1, 'FIA_API.1.1': 2, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1}, 'FMT': {'FMT_SMR.1': 27, 'FMT_SMF.1': 24, 'FMT_MOF.1': 12, 'FMT_MSA': 37, 'FMT_MSA.2': 14, 'FMT_MSA.3': 24, 'FMT_MSA.4': 16, 'FMT_MTD': 26, 'FMT_SMF': 2, 'FMT_SMR': 3, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_MOF.1.1': 1, 'FMT_MSA.1': 4, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.4.1': 1, 'FMT_MTD.1': 2}, 'FPR': {'FPR_UNO.1': 1}, 'FPT': {'FPT_EMS': 5, 'FPT_EMS.1': 15, 'FPT_FLS.1': 13, 'FPT_PHP.1': 9, 'FPT_PHP.3': 13, 'FPT_TST.1': 15, 'FPT_FLS': 3, 'FPT_TDC.1': 1, 'FPT_RCV': 3, 'FPT_PHP': 1, 'FPT_EMS.1.1': 4, 'FPT_EMS.1.2': 3, 'FPT_FLS.1.1': 1, 'FPT_TST': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC': 65, 'FTP_ITC.1': 14, 'FTP_TRP.1': 2}}, 'cc_claims': {'D': {'D.SCD': 1, 'D.SVD': 1}, 'O': {'O.SID': 1, 'O.FIREWALL': 1, 'O.GLOBAL_ARRAYS_CONFID': 1, 'O.GLOBAL_ARRAYS_INTEG': 1, 'O.NATIVE': 1, 'O.OPERATE': 1, 'O.REALLOCATION': 1, 'O.RESOURCES': 1, 'O.ALARM': 1, 'O.CIPHER': 1, 'O.KEY-MNGT': 1, 'O.PIN-MNGT': 1, 'O.BIO-MNGT': 1, 'O.TRANSACTION': 1, 'O.OBJ-DELETION': 1, 'O.DELETION': 1, 'O.LOAD': 1, 'O.INSTALL': 1, 'O.SCP': 3, 'O.CARD-MANAGEMENT': 1}, 'T': {'T.CONFID-APPLI-DATA': 1, 'T.CONFID-JCS-CODE': 1, 'T.CONFID-JCS-DATA': 1, 'T.INTEG-APPLI-CODE': 2, 'T.INTEG-APPLI-DATA': 2, 'T.INTEG-JCS-CODE': 1, 'T.INTEG-JCS-DATA': 1, 'T.SID': 2, 'T.EXE-CODE': 2, 'T.NATIVE': 1, 'T.RESOURCES': 1, 'T.DELETION': 1, 'T.INSTALL': 1, 'T.OBJ-DELETION': 1, 'T.PHYSICAL': 1, 'T.APP_DATA_INTEGRITY': 1, 'T.UNAUTH_CARD_MNGT': 1, 'T.LIFE_CYCLE': 1, 'T.UNAUTH_ACCESS': 1}, 'A': {'A.CSP': 9, 'A.CGA': 6, 'A.SCA': 5, 'A.APPLET': 1, 'A.VERIFICATION': 1, 'A.PRODUCTION': 1}, 'OE': {'OE.HI_VAD': 2, 'OE.HID_VAD': 5, 'OE.APPLET': 1, 'OE.VERIFICATION': 1, 'OE.CODE-EVIDENCE': 1, 'OE.SECURITY-DOMAINS': 1, 'OE.QUOTAS': 1, 'OE.SHARE-CONTROL': 1, 'OE.KEY_GENERATION': 1, 'OE.PRODUCTION': 1}, 'OSP': {'OSP.VERIFICATION': 1, 'OSP.SECURITY_DOMAINS': 1, 'OSP.QUOTAS': 1, 'OSP.KEY_GENERATION': 1, 'OSP.SHARE-CONTROL': 1}}, 'vendor': {'Infineon': {'Infineon': 13}, 'Idemia': {'IDEMIA': 8}}, 'eval_facility': {'CEA-LETI': {'CEA-LETI': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 13}}, 'DES': {'DES': {'DES': 1}, '3DES': {'TDES': 5, '3DES': 6}}, 'constructions': {'MAC': {'CMAC': 3}}}, 'asymmetric_crypto': {'RSA': {'RSA-PSS': 1, 'RSA-OAEP': 1}, 'ECC': {'ECDH': {'ECDH': 3}, 'ECDSA': {'ECDSA': 3}, 'ECC': {'ECC': 12}}, 'FF': {'DH': {'Diffie-Hellman': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 8}, 'SHA2': {'SHA-224': 2, 'SHA-384': 3, 'SHA-512': 6, 'SHA-256': 7, 'SHA-2': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 6}, 'KA': {'Key agreement': 1}}, 'crypto_protocol': {'PACE': {'PACE': 26}}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {'CBC': {'CBC': 5}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 6}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 2, 'side channel': 1, 'DPA': 3, 'SPA': 3, 'timing attacks': 2}, 'FI': {'physical tampering': 7, 'malfunction': 1, 'DFA': 1, 'fault injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 180-2': 2}, 'NIST': {'NIST SP 800-38B': 1}, 'PKCS': {'PKCS3': 1, 'PKCS#1': 3, 'PKCS1': 3}, 'BSI': {'AIS20': 1, 'AIS 20': 1, 'AIS31': 2}, 'ISO': {'ISO/IEC 7816-4': 1, 'ISO/IEC 14443': 2, 'ISO/IEC 9797-': 1, 'ISO/IEC 9797-1': 2, 'ISO/IEC 15408:2005': 2}, 'ICAO': {'ICAO': 7}, 'CC': {'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2, 'CCMB-2017-04-004': 2, 'CCMB-2017-04-001': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'only EC is used to generate keys, the RSA key generation is out of scope of the platform evaluation': 1, 'pre- personalization phase. Beside the TOE, the product can include other Java Card applications (out of scope of the TOE). IDealCitiz v2.1.1 Platform enforces separation of the data between the applets and': 1, 'v2.1.1 mechanisms FCS_CKM.1 FCS_CKM.1 (only EC is used to generate keys, the RSA key generation is out of scope of the platform evaluation) The requirement in this ST is equiva- lent to parts of the platform ST': 1}}}.
    • The report_filename property was set to anssi-cc-2018_22fr.pdf.
    • The st_filename property was set to anssi-cible-cc-2018_22en.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['CEA'].
    • The cert_id property was set to ANSSI-CC-2018/22.
    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/59']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/59']}} data.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2016/70', 'ANSSI-CC-2017/59']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2016/70', 'ANSSI-CC-2016/67', 'ANSSI-CC-2017/59', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0782-V2-2015', 'ANSSI-CC-2016/66', 'BSI-DSZ-CC-0879-V2-2015', 'BSI-DSZ-CC-0879-2014']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_22fr.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_22en.pdf.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]} values discarded.
    • The scheme_data property was set to {'product': 'IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application', 'url': 'https://cyber.gouv.fr/produits-certifies/ideal-citiz-v215i-infineon-m7892-b11-embedding-idme-148b-application', 'description': 'Le produit certifiĂ© est « IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application » dĂ©veloppĂ© par IDEMIA et INFINEON TECHNOLOGIES AG.\n\nCe produit est une carte Ă  puce constituĂ©e d’un logiciel conforme au standard IAS ECC v1.0.1. Ce produit est destinĂ© Ă  ĂŞtre utilisĂ© comme dispositif sĂ©curisĂ© de crĂ©ation de signature (SSCD1). Il peut ĂŞtre utilisĂ© dans diffĂ©rents types de docum', 'sponsor': 'Idemia', 'developer': 'Idemia, Infineon Technologies AG', 'cert_id': '2018/22', 'level': 'EAL5+', 'enhanced': {'cert_id': '2018/22', 'certification_date': '09/07/2018', 'category': 'Cartes Ă  puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'Idemia, Infineon Technologies AG', 'sponsor': 'Idemia', 'evaluation_facility': 'CEA - LETI', 'level': 'EAL5+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2018/07/anssi-cc-2018_22fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2018/07/anssi-cible-cc-2018_22en.pdf'}}.
  • 31.07.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "2c0fa55136a3d581",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2018/22",
    "cert_lab": [
      "CEA"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.4.8",
        "2.15"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2016/70",
          "ANSSI-CC-2017/59"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0879-2014",
          "ANSSI-CC-2016/66",
          "ANSSI-CC-2016/67",
          "BSI-DSZ-CC-0782-2012",
          "BSI-DSZ-CC-0879-V2-2015",
          "BSI-DSZ-CC-0782-V2-2015",
          "ANSSI-CC-2017/59",
          "ANSSI-CC-2016/70"
        ]
      }
    },
    "scheme_data": {
      "cert_id": "ANSSI-CC-2018/22",
      "description": "Le produit certifi\u00e9 est \u00ab IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application \u00bb d\u00e9velopp\u00e9 par IDEMIA et INFINEON TECHNOLOGIES AG. Ce produit est une carte \u00e0 puce constitu\u00e9e d\u2019un logiciel conforme au standard IAS ECC v1.0.1. Ce produit est destin\u00e9 \u00e0 \u00eatre utilis\u00e9 comme dispositif s\u00e9curis\u00e9 de cr\u00e9ation de signature (SSCD1). Il peut \u00eatre utilis\u00e9 dans diff\u00e9rents types de docum",
      "developer": "Idemia, Infineon Technologies AG",
      "enhanced": {
        "augmented": "ALC_DVS.2, AVA_VAN.5",
        "category": "Cartes \u00e0 puce",
        "cc_version": "Crit\u00e8res Communs version 3.1r5",
        "cert_id": "ANSSI-CC-2018/22",
        "certification_date": "2018-07-09",
        "developer": "Idemia, Infineon Technologies AG",
        "evaluation_facility": "CEA - LETI",
        "level": "EAL5+",
        "mutual_recognition": "SOG-IS CCRA",
        "protection_profile": "",
        "report_link": "https://cyber.gouv.fr/sites/default/files/2018/07/anssi-cc-2018_22fr.pdf",
        "sponsor": "Idemia",
        "target_link": "https://cyber.gouv.fr/sites/default/files/2018/07/anssi-cible-cc-2018_22en.pdf"
      },
      "level": "EAL5+",
      "product": "IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application",
      "sponsor": "Idemia",
      "url": "https://cyber.gouv.fr/produits-certifies/ideal-citiz-v215i-infineon-m7892-b11-embedding-idme-148b-application"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2017/59"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2017/59"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Idemia",
  "manufacturer_web": "https://www.idemia.com",
  "name": "IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application",
  "not_valid_after": "2023-07-09",
  "not_valid_before": "2018-07-09",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "anssi-cc-2018_22fr.pdf",
    "report_frontpage": {
      "FR": {
        "cc_security_level": "EAL 5 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
        "cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 5",
        "cert_id": "ANSSI-CC-2018/22",
        "cert_item": "IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application",
        "cert_item_version": "OFFICIEL_IDME_1_4_8B_IDealCitiz_SLE78CLFX4000PM_2_1_5_0_R2",
        "cert_lab": "CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France",
        "developer": "Idemia 8 Chauss\u00e9e Jules C\u00e9sar, 95520 Osny, France Infineon Technologies AG AIM CC SM PS \u2013 Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Idemia 18 Chauss\u00e9e Jules C\u00e9sar, 95520 Osny, France",
        "match_rules": [
          "R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
        ],
        "ref_protection_profiles": "Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.0.1 ; Part 3: Device with key import, v1.0.2 ; Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1 ; Part 5: Extension for device with key generation and trusted communication with signature creation application, v1.0.1 ; Part 6: Extension for device with key import and trusted communication with signature creation application, v1.0.4"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          }
        }
      },
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2016/70": 1,
          "ANSSI-CC-2017/59": 1,
          "ANSSI-CC-2018/22": 19
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0059-2009-MA-01": 1,
          "BSI-CC-PP- 0071-2012": 1,
          "BSI-CC-PP- 0072-2012": 1,
          "BSI-CC-PP- 0076-2013": 1
        },
        "other": {
          "PP-SSCD-": 6,
          "PP-SSCD-Part2": 1,
          "PP-SSCD-Part3": 1,
          "PP-SSCD-Part5": 1,
          "PP-SSCD-Part6": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_FSP": 1,
          "ADV_IMP": 1,
          "ADV_INT": 1,
          "ADV_SPM": 1,
          "ADV_TDS": 1
        },
        "AGD": {
          "AGD_OPE": 2,
          "AGD_PRE": 3
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1,
          "ALC_DEL": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 3,
          "ALC_FLR": 2,
          "ALC_TAT": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.5": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 1,
          "EAL 5": 3,
          "EAL 7": 1,
          "EAL2": 2,
          "EAL5": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {
        "ICFab": {
          "IC Fabricator": 1
        },
        "ICType": {
          "IC Type": 1
        }
      },
      "crypto_engine": {},
      "crypto_library": {
        "Infineon": {
          "v1.02.013": 4
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA - LETI": 1
        },
        "CESTI": {
          "CESTI": 3
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-2": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 19,
          "Idemia": 2
        },
        "Infineon": {
          "Infineon": 24,
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Category": "R\u00e9f\u00e9rence, Version",
      "/Comments": "Idemia",
      "/Company": "SGDSN/ANSSI",
      "/CreationDate": "D:20180713115402+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 11 pour Word",
      "/Keywords": "ANSSI-CC-CER-F-07.026",
      "/ModDate": "D:20180713145243+02\u002700\u0027",
      "/Producer": "Adobe PDF Library 11.0",
      "/SourceModified": "D:20180713095351",
      "/Subject": "",
      "/Title": "",
      "pdf_file_size_bytes": 287772,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:[email protected]",
          "http://www.ssi.gouv.fr/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 18
    },
    "st_filename": "anssi-cible-cc-2018_22en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 12
          },
          "ECDH": {
            "ECDH": 3
          },
          "ECDSA": {
            "ECDSA": 3
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 1
          }
        },
        "RSA": {
          "RSA-OAEP": 1,
          "RSA-PSS": 1
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0782-V2-2015-RA-01": 2
        },
        "FR": {
          "ANSSI-CC-2017/59": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.APPLET": 1,
          "A.CGA": 6,
          "A.CSP": 9,
          "A.PRODUCTION": 1,
          "A.SCA": 5,
          "A.VERIFICATION": 1
        },
        "D": {
          "D.SCD": 1,
          "D.SVD": 1
        },
        "O": {
          "O.ALARM": 1,
          "O.BIO-MNGT": 1,
          "O.CARD-MANAGEMENT": 1,
          "O.CIPHER": 1,
          "O.DELETION": 1,
          "O.FIREWALL": 1,
          "O.GLOBAL_ARRAYS_CONFID": 1,
          "O.GLOBAL_ARRAYS_INTEG": 1,
          "O.INSTALL": 1,
          "O.KEY-MNGT": 1,
          "O.LOAD": 1,
          "O.NATIVE": 1,
          "O.OBJ-DELETION": 1,
          "O.OPERATE": 1,
          "O.PIN-MNGT": 1,
          "O.REALLOCATION": 1,
          "O.RESOURCES": 1,
          "O.SCP": 3,
          "O.SID": 1,
          "O.TRANSACTION": 1
        },
        "OE": {
          "OE.APPLET": 1,
          "OE.CODE-EVIDENCE": 1,
          "OE.HID_VAD": 5,
          "OE.HI_VAD": 2,
          "OE.KEY_GENERATION": 1,
          "OE.PRODUCTION": 1,
          "OE.QUOTAS": 1,
          "OE.SECURITY-DOMAINS": 1,
          "OE.SHARE-CONTROL": 1,
          "OE.VERIFICATION": 1
        },
        "OSP": {
          "OSP.KEY_GENERATION": 1,
          "OSP.QUOTAS": 1,
          "OSP.SECURITY_DOMAINS": 1,
          "OSP.SHARE-CONTROL": 1,
          "OSP.VERIFICATION": 1
        },
        "T": {
          "T.APP_DATA_INTEGRITY": 1,
          "T.CONFID-APPLI-DATA": 1,
          "T.CONFID-JCS-CODE": 1,
          "T.CONFID-JCS-DATA": 1,
          "T.DELETION": 1,
          "T.EXE-CODE": 2,
          "T.INSTALL": 1,
          "T.INTEG-APPLI-CODE": 2,
          "T.INTEG-APPLI-DATA": 2,
          "T.INTEG-JCS-CODE": 1,
          "T.INTEG-JCS-DATA": 1,
          "T.LIFE_CYCLE": 1,
          "T.NATIVE": 1,
          "T.OBJ-DELETION": 1,
          "T.PHYSICAL": 1,
          "T.RESOURCES": 1,
          "T.SID": 2,
          "T.UNAUTH_ACCESS": 1,
          "T.UNAUTH_CARD_MNGT": 1
        }
      },
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-": 1
        },
        "BSI": {
          "BSI-CC-PP-0059-2009-MA-01": 1,
          "BSI-CC-PP-0068-V2-": 1,
          "BSI-CC-PP-0071-2012": 1,
          "BSI-CC-PP-0072-2012": 1,
          "BSI-CC-PP-0075-2012": 1,
          "BSI-CC-PP-0076-2013": 1,
          "BSI-PP-0035": 2
        },
        "other": {
          "PP-SSCD": 1,
          "PP-SSCD2": 23,
          "PP-SSCD3": 17,
          "PP-SSCD4": 16,
          "PP-SSCD5": 20,
          "PP-SSCD6": 16
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 6,
          "ADV_FSP.1": 3,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 8,
          "ADV_IMP.1": 8,
          "ADV_INT.2": 1,
          "ADV_TDS.1": 2,
          "ADV_TDS.3": 3,
          "ADV_TDS.4": 8
        },
        "AGD": {
          "AGD_ADM": 1,
          "AGD_OPE": 4,
          "AGD_OPE.1": 5,
          "AGD_PRE": 6,
          "AGD_PRE.1": 5,
          "AGD_USR": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.5": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 8,
          "ALC_LCD.1": 3,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 3
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 5,
          "ASE_OBJ.2": 3,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 3,
          "ATE_DPT.1": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 6
        },
        "AVA": {
          "AVA_VAN.5": 8
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL 5 augmented": 1,
          "EAL 5+": 1,
          "EAL 6+": 1,
          "EAL4+": 1,
          "EAL5": 5,
          "EAL5 augmented": 5,
          "EAL5+": 3,
          "EAL6": 1,
          "EAL6 augmented": 1,
          "EAL6+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 1,
          "FAU_GEN": 1
        },
        "FCO": {
          "FCO_NRO": 1
        },
        "FCS": {
          "FCS_CKM": 2,
          "FCS_CKM.1": 21,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 2,
          "FCS_CKM.3": 1,
          "FCS_CKM.4": 15,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 1,
          "FCS_COP.1": 15,
          "FCS_COP.1.1": 1,
          "FCS_RND": 5,
          "FCS_RND.1": 12,
          "FCS_RND.1.1": 2
        },
        "FDP": {
          "FDP_ACC": 65,
          "FDP_ACC.1": 15,
          "FDP_ACF": 55,
          "FDP_ACF.1": 20,
          "FDP_DAU": 11,
          "FDP_DAU.2": 2,
          "FDP_IFC": 2,
          "FDP_IFC.1": 7,
          "FDP_IFF": 2,
          "FDP_ITC": 13,
          "FDP_ITC.1": 5,
          "FDP_ITC.2": 2,
          "FDP_RIP": 8,
          "FDP_RIP.1": 12,
          "FDP_RIP.1.1": 1,
          "FDP_ROL": 1,
          "FDP_SDI": 24,
          "FDP_SDI.2": 5,
          "FDP_UCT": 17,
          "FDP_UCT.1": 1,
          "FDP_UIT": 12,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_AFL.1": 10,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_API": 5,
          "FIA_API.1": 12,
          "FIA_API.1.1": 2,
          "FIA_ATD": 1,
          "FIA_UAU.1": 23,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UID": 2,
          "FIA_UID.1": 21,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB": 1
        },
        "FMT": {
          "FMT_MOF.1": 12,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 37,
          "FMT_MSA.1": 4,
          "FMT_MSA.2": 14,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 24,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MSA.4": 16,
          "FMT_MSA.4.1": 1,
          "FMT_MTD": 26,
          "FMT_MTD.1": 2,
          "FMT_SMF": 2,
          "FMT_SMF.1": 24,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 3,
          "FMT_SMR.1": 27,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO.1": 1
        },
        "FPT": {
          "FPT_EMS": 5,
          "FPT_EMS.1": 15,
          "FPT_EMS.1.1": 4,
          "FPT_EMS.1.2": 3,
          "FPT_FLS": 3,
          "FPT_FLS.1": 13,
          "FPT_FLS.1.1": 1,
          "FPT_PHP": 1,
          "FPT_PHP.1": 9,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 13,
          "FPT_PHP.3.1": 1,
          "FPT_RCV": 3,
          "FPT_TDC.1": 1,
          "FPT_TST": 1,
          "FPT_TST.1": 15,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 65,
          "FTP_ITC.1": 14,
          "FTP_TRP.1": 2
        }
      },
      "certification_process": {
        "OutOfScope": {
          "only EC is used to generate keys, the RSA key generation is out of scope of the platform evaluation": 1,
          "out of scope": 2,
          "pre- personalization phase. Beside the TOE, the product can include other Java Card applications (out of scope of the TOE). IDealCitiz v2.1.1 Platform enforces separation of the data between the applets and": 1,
          "v2.1.1 mechanisms FCS_CKM.1 FCS_CKM.1 (only EC is used to generate keys, the RSA key generation is out of scope of the platform evaluation) The requirement in this ST is equiva- lent to parts of the platform ST": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 5
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Infineon": {
          "v1.02.013": 6
        }
      },
      "crypto_protocol": {
        "PACE": {
          "PACE": 26
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key agreement": 1
        },
        "MAC": {
          "MAC": 6
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA-LETI": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 8
          },
          "SHA2": {
            "SHA-2": 1,
            "SHA-224": 2,
            "SHA-256": 7,
            "SHA-384": 3,
            "SHA-512": 6
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1,
          "fault injection": 1,
          "malfunction": 1,
          "physical tampering": 7
        },
        "SCA": {
          "DPA": 3,
          "SPA": 3,
          "physical probing": 2,
          "side channel": 1,
          "timing attacks": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 1,
          "AIS20": 1,
          "AIS31": 2
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 2,
          "CCMB-2017-04-003": 2,
          "CCMB-2017-04-004": 2
        },
        "FIPS": {
          "FIPS PUB 180-2": 2
        },
        "ICAO": {
          "ICAO": 7
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 15408:2005": 2,
          "ISO/IEC 7816-4": 1,
          "ISO/IEC 9797-": 1,
          "ISO/IEC 9797-1": 2
        },
        "NIST": {
          "NIST SP 800-38B": 1
        },
        "PKCS": {
          "PKCS#1": 3,
          "PKCS1": 3,
          "PKCS3": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 13
          }
        },
        "DES": {
          "3DES": {
            "3DES": 6,
            "TDES": 5
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 3
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 8
        },
        "Infineon": {
          "Infineon": 13
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20171013152111+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2013",
      "/ModDate": "D:20180713145229+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2013",
      "pdf_file_size_bytes": 2578944,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok119",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok154",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok132",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok146",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok135",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok147",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok149",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok234",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok141",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok152",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok140",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok235",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok164",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok233",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok124",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok138",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok232",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok125",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok156",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok157",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok128",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok236",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok117",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok123",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok120",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok162",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok131",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok231",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok169",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok116",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok126",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok121",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok134",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok167",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok130",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok122",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok148",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok160",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok170",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok114",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok127",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok115",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok137",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok113",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok155",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok144",
          "file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok136"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 124
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_22fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_DVS.2",
      "AVA_VAN.5",
      "EAL5+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_22en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "5c3b6c48be363bf1196a0ee3f8cec62c5f05612b0b7df84de74e3891ac0be65f",
      "txt_hash": "bfcc7ee8068e63e79911434bb7ad2a93dc594fef76a14966ac314e45fb793574"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "82bcb1dbd3b194c97b23cc09803becbf87884f94a047c5799c9729e753f2dead",
      "txt_hash": "62a1969742ba1a7fde0d80e3141e3998c41e7efed436dbe969739a6276eb6dcf"
    }
  },
  "status": "archived"
}