MultiApp V4 JavaCard Virtual Machine
CSV information ?
Status | active |
---|---|
Valid from | 28.05.2020 |
Valid until | 22.04.2027 |
Scheme | 🇫🇷 FR |
Manufacturer | Gemalto |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | EAL7 |
Maintenance updates | Reassessment report: ANSSI-CC-2020/33-S01 (22.04.2022) Certification report |
Heuristics summary ?
Certificate ?
Extracted keywords
Security level
EAL7Certificates
ANSSI-CC-2020/33-S01Evaluation facilities
SERMAFile metadata
Title | ANSSI-CC-2020/33 |
---|---|
Keywords | version x.x, révision x |
Author | DUCLOS Charlene |
Creation date | D:20220429113327+02'00' |
Modification date | D:20220429113327+02'00' |
Pages | 2 |
Creator | Microsoft® Word 2019 |
Producer | Microsoft® Word 2019 |
Certification report ?
Extracted keywords
Symmetric Algorithms
DESProtocols
PACEVendor
Infineon Technologies AG, Infineon, GemaltoSecurity level
EAL 7, EAL2, EAL5, EAL 5, EAL7, EAL 2, EAL 1, EAL 3, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSCertificates
BSI-DSZ-CC-0891-V4-2019, ANSSI-CC-2020/33, ANSSI-CC-2017/76, ANSSI-CC-2017/76-S01Evaluation facilities
Serma Safety & Security, Trusted LabsStandards
CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Title | Microsoft Word - ANSSI-CC-2020_33fr.doc |
---|---|
Author | Pat |
Creation date | D:20200604113216+02'00' |
Modification date | D:20200604113216+02'00' |
Pages | 14 |
Creator | PDF24 Creator |
Producer | GPL Ghostscript 9.26 |
Frontpage
Certificate ID | ANSSI-CC-2020/33 |
---|---|
Certified item | MultiApp V4 JavaCard Virtual Machine |
Certification lab | Serma Safety & Security 14 rue Galilée, CS 10071, 33608 Pessac Cedex, France |
Developer | Gemalto 6 rue de la verrerie, 92190 Meudon, France Trusted Labs 6 rue de la verrerie, 92190 Meudon, France Infineon Technologies AG Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la verrerie, 92190 Meudon, France |
References
Outgoing- ANSSI-CC-2017/76 - active - Plateforme JavaCard MultiApp V4.0.1 - PACE en configuration ouverte masquée sur le composant M7892 G12
- BSI-DSZ-CC-0891-V4-2019 - active - Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware and optional software
Security target ?
Extracted keywords
Randomness
RNG, RNDJavaCard versions
Java Card 2.2.2, Java Card 3.0.4JavaCard API constants
TYPE_ACCESSVendor
Infineon, GemaltoSecurity level
EAL7, EAL6, EAL6+, EAL5+, EAL6 augmentedClaims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, O.FIREWALL, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.ALARM, O.INSTALL, O.SID, O.RESOURCES, O.REALLOCATION, O.GLOBAL_ARRAYS_CONFID, O.TRANSACTION, O.PIN-, O.KEY-MNGT, O.OBJ-DELETION, O.LOAD, O.DELETION, O.CARD-MANAGEMENT, O.SCP, O.RND, O.APPLET, O.JAVAOBJECT, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, A.APPLET, A.DELETION, A.VERIFICATION, A.SID, A.FIREWALL-ENV, A.GLOBAL_ARRAYS_CONFID, A.OPERATE-ENV, A.REALLOCATION, A.RESOURCES, A.ALARM-ENV, A.CIPHER, A.KEY-MNGT, A.PIN-MNGT, A.TRANSACTION, A.OBJ-DELETION, A.LOAD, A.INSTALL-ENV, A.OBJ-, A.GLOBAL_ARRAYS_CONFI, R.JAVA, OT.GLOBAL_ARRAYS_INTEG, OP.ARRAY_ACCESS, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUT, OP.CREATE, OE.VERIFICATION, OE.APPLET, OE.CODE-EVIDENCE, OE.SCP, OE.CARD-MANAGEMENT, OE.SID, OE.FIREWALL-ENV, OE.GLOBAL_ARRAYS_CONFID, OE.OPERATE-ENV, OE.REALLOCATION, OE.RESOURCES, OE.ALARM-ENV, OE.CIPHER, OE.KEY-MNGT, OE.PIN-MNGT, OE.TRANSACTION, OE.OBJ-DELETION, OE.DELETION, OE.LOAD, OE.INSTALL-ENV, OE.RND, OE.CARD_MANAGEMENT, OE.GLOBAL_ARRAYS_INTEG, OE.OPERATE, OSP.VERIFICATION, OSP.RNDSecurity Assurance Requirements (SAR)
ADV_SPM.1, ADV_FSP.6, ADV_TDS.6, ADV_IMP.2, ADV_INT.3, ADV_ARC.1, ADV_TDS.1, ADV_FSP.4, ADV_TDS.3, ADV_FSP.1, ADV_IMP.1, ADV_FSP.2, ADV_TDS.4, ADV_CMC.5, ADV_LCD.2, ADV_TAT.3, AGD_PRE, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_CMC.5, ALC_LCD.2, ALC_TAT.3, ALC_DVS.2, ALC_TAT.1, ALC_LCD.1, ALC_DEL.1, ALC_CMS.1, ATE_DPT.4, ATE_COV.3, ATE_FUN.2, ATE_FUN.1, ATE_COV.1, ATE_IND.3, ATE_DPT.1, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FCO_NRO, FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.4, FCS_COP.1, FCS_RND.1, FDP_ACC, FDP_ACF, FDP_IFC, FDP_IFF, FDP_RIP, FDP_ROL, FDP_SDI.2, FDP_ITC, FDP_UIT, FDP_ACC.2, FDP_ACF.1, FDP_IFC.1, FDP_IFF.1, FDP_ROL.1, FDP_ACC.1, FDP_SDI.1, FIA_ATD, FIA_UID, FIA_USB, FIA_ATD.1, FIA_UID.1, FIA_UAU, FMT_MSA, FMT_SMF.1, FMT_SMR.1, FMT_MTD, FMT_SMR, FMT_SMF, FMT_REV, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.1, FMT_MTD.3, FPR_UNO.1, FPR_UNO, FPT_FLS.1, FPT_TDC.1, FPT_FLS, FPT_RCV, FPT_TDC.1.1, FPT_TDC.1.2, FPT_RCV.3, FPT_TST, FPT_ITT, FPT_PHP, FPT_PHP.3, FTP_ITCProtection profiles
BSI-CC-PP-0084-Certificates
BSI-DSZ-CC-0891-V2-2016, CC-1, CC-2, CC-3Evaluation facilities
Serma Technologies, Trusted LabsSide-channel analysis
Leak-Inherent, physical probing, DPA, physical tampering, malfunction, Malfunction, fault inductionCertification process
out of scope, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives OE.SCP.RECOVERY and OE.SCP.SUPPORT areStandards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
Title | Security Target: Formal assurance for MultiAppV4 JCS |
---|---|
Subject | Security Target |
Keywords | Security Target, CC |
Author | Maria Christofi |
Creation date | D:20200309171000+01'00' |
Modification date | D:20200309171000+01'00' |
Pages | 61 |
Creator | Microsoft® Word 2013 |
Producer | Microsoft® Word 2013 |
References
Outgoing- BSI-DSZ-CC-0891-V2-2016 - archived - Infineon Security Controller, M7892 Design Steps D11 and G12, with optional RSA2048/4096 v2.03.008, EC v2.03.008, SHA-2 v1.01 and Toolbox v2.03.008 libraries, symmetric crypto library v2.02.010 and with specific IC dedicated software (firmware)
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_CMC.5, ADV_FSP.6, ADV_IMP.2, ADV_INT.3, ADV_LCD.2, ADV_SPM.1, ADV_TAT.3, ADV_TDS.6, AGD_OPE.1, AGD_PRE.1, ALC_CMC.5, ALC_CMS.1, ALC_DEL.1, ALC_DVS.2, ALC_LCD.2, ALC_TAT.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.3, ATE_DPT.4, ATE_FUN.2, ATE_IND.3, AVA_VAN.5Scheme data ?
Product | MultiApp V4 JavaCard Virtual Machine | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/multiapp-v4-javacard-virtual-machine | |
Description | Le produit considéré est la carte « MultiApp V4.0.1 » développée par GEMALTO, TRUSTED LABS et INFINEON TECHNOLOGIES AG. La « plateforme JavaCard MultiApp V4.0.1 » de la carte a déjà fait l’objet d’une certification au niveau EAL5 augmenté des composants ALC_DVS.2 et AVA_VAN.5. L’objet du présent rapport de certification est le résultat de l’évaluation de la machine virtuelle « MultiApp V4 JavaCard | |
Sponsor | Gemalto | |
Developer | Gemalto, Trusted Labs, Infineon Technologies AG | |
Cert Id | ANSSI-CC-2020/33 | |
Level | EAL7 | |
Expiration Date | 22.04.2027 | |
Enhanced | ||
Cert Id | ANSSI-CC-2020/33 | |
Certification Date | 28.05.2020 | |
Expiration Date | 22.04.2027 | |
Category | Cartes Ă puce | |
Cc Version | Critères Communs version 3.1r4 | |
Developer | Gemalto, Trusted Labs, Infineon Technologies AG | |
Sponsor | Gemalto | |
Evaluation Facility | Serma Safety & Security | |
Level | EAL7 | |
Protection Profile | ||
Mutual Recognition | SOG-IS CCRA | |
Augmented | ||
Report Link | https://cyber.gouv.fr/sites/default/files/2020/06/anssi-cc-2020_33fr.pdf | |
Target Link | https://cyber.gouv.fr/sites/default/files/2020/06/cible_anssi_cc_2020-33.pdf | |
Cert Link | https://cyber.gouv.fr/sites/default/files/2020/06/certificat-anssi-cc-2020_33-s01.pdf |
References ?
Updates ?
-
16.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'MultiApp V4 JavaCard Virtual Machine', 'url': 'https://cyber.gouv.fr/produits-certifies/multiapp-v4-javacard-virtual-machine', 'description': 'Le produit considéré est la carte « MultiApp V4.0.1 » développée par GEMALTO, TRUSTED LABS et INFINEON TECHNOLOGIES AG. La « plateforme JavaCard MultiApp V4.0.1 » de la carte a déjà fait l’objet d’une certification au niveau EAL5 augmenté des composants ALC_DVS.2 et AVA_VAN.5. L’objet du présent rapport de certification est le résultat de l’évaluation de la machine virtuelle « MultiApp V4 JavaCard', 'sponsor': 'Gemalto', 'developer': 'Gemalto, Trusted Labs, Infineon Technologies AG', 'cert_id': 'ANSSI-CC-2020/33', 'level': 'EAL7', 'expiration_date': '2027-04-22', 'enhanced': {'cert_id': 'ANSSI-CC-2020/33', 'certification_date': '2020-05-28', 'expiration_date': '2027-04-22', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r4', 'developer': 'Gemalto, Trusted Labs, Infineon Technologies AG', 'sponsor': 'Gemalto', 'evaluation_facility': 'Serma Safety & Security', 'level': 'EAL7', 'protection_profile': '', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': '', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/06/anssi-cc-2020_33fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/06/cible_anssi_cc_2020-33.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2020/06/certificat-anssi-cc-2020_33-s01.pdf'}}
.
- The scheme_data property was set to
-
09.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'cert_id': 'ANSSI-CC-2020/33', 'expiration_date': '2027-04-22', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2020/33', 'certification_date': '2020-05-28', 'expiration_date': '2027-04-22', 'mutual_recognition': 'SOG-IS CCRA'}}}
data.
- The scheme_data property was updated, with the
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'MultiApp V4 JavaCard Virtual Machine', 'url': 'https://cyber.gouv.fr/produits-certifies/multiapp-v4-javacard-virtual-machine', 'description': 'Le produit considéré est la carte « MultiApp V4.0.1 » développée par GEMALTO, TRUSTED LABS et INFINEON TECHNOLOGIES AG. La « plateforme JavaCard MultiApp V4.0.1 » de la carte a déjà fait l’objet d’une certification au niveau EAL5 augmenté des composants ALC_DVS.2 et AVA_VAN.5. L’objet du présent rapport de certification est le résultat de l’évaluation de la machine virtuelle « MultiApp V4 JavaCard', 'sponsor': 'Gemalto', 'developer': 'Gemalto, Trusted Labs, Infineon Technologies AG', 'cert_id': '2020/33', 'level': 'EAL7', 'expiration_date': '22 Avril 2027', 'enhanced': {'cert_id': '2020/33', 'certification_date': '28/05/2020', 'expiration_date': '22/04/2027', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r4', 'developer': 'Gemalto, Trusted Labs, Infineon Technologies AG', 'sponsor': 'Gemalto', 'evaluation_facility': 'Serma Safety & Security', 'level': 'EAL7', 'protection_profile': '', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': '', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/06/anssi-cc-2020_33fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/06/cible_anssi_cc_2020-33.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2020/06/certificat-anssi-cc-2020_33-s01.pdf'}}
.
- The scheme_data property was set to
-
02.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '39ec177ec0356eafb6b4f11fbaeed24df5a071d7b27e894c807647d870244594', 'txt_hash': '6f97c47d0ae0d67866706226f3315813082d725fd8e4dddbb6eeab864453182a'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ad3c404d14d59f9af2000db8a0d3112132bff43e4ac298a3febdc10d1a10bf7f', 'txt_hash': '50f50ff2a59792eb7b17dc11ee3ab8bedc50c43f0907b410e6d1e01ca18bbece'}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 1571623, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 61, '/Title': 'Security Target: Formal assurance for MultiAppV4 JCS', '/Author': 'Maria Christofi', '/Subject': 'Security Target', '/Keywords': 'Security Target, CC', '/Creator': 'Microsoft® Word 2013', '/CreationDate': "D:20200309171000+01'00'", '/ModDate': "D:20200309171000+01'00'", '/Producer': 'Microsoft® Word 2013', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 251233, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Title': 'ANSSI-CC-2020/33', '/Author': 'DUCLOS Charlene', '/Keywords': 'version x.x, révision x', '/Creator': 'Microsoft® Word 2019', '/CreationDate': "D:20220429113327+02'00'", '/ModDate': "D:20220429113327+02'00'", '/Producer': 'Microsoft® Word 2019', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0891-V2-2016': 1}, 'NL': {'CC-1': 2, 'CC-2': 3, 'CC-3': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-': 1}}, 'cc_security_level': {'EAL': {'EAL7': 8, 'EAL6': 1, 'EAL6+': 1, 'EAL5+': 1, 'EAL6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_SPM.1': 7, 'ADV_FSP.6': 11, 'ADV_TDS.6': 15, 'ADV_IMP.2': 6, 'ADV_INT.3': 4, 'ADV_ARC.1': 6, 'ADV_TDS.1': 1, 'ADV_FSP.4': 3, 'ADV_TDS.3': 3, 'ADV_FSP.1': 2, 'ADV_IMP.1': 5, 'ADV_FSP.2': 2, 'ADV_TDS.4': 3, 'ADV_CMC.5': 3, 'ADV_LCD.2': 1, 'ADV_TAT.3': 1}, 'AGD': {'AGD_PRE': 1, 'AGD_OPE': 1, 'AGD_OPE.1': 6, 'AGD_PRE.1': 5}, 'ALC': {'ALC_CMC.5': 7, 'ALC_LCD.2': 6, 'ALC_TAT.3': 10, 'ALC_DVS.2': 6, 'ALC_TAT.1': 2, 'ALC_LCD.1': 3, 'ALC_DEL.1': 1, 'ALC_CMS.1': 1}, 'ATE': {'ATE_DPT.4': 4, 'ATE_COV.3': 5, 'ATE_FUN.2': 5, 'ATE_FUN.1': 6, 'ATE_COV.1': 3, 'ATE_IND.3': 1, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.5': 4}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 16, 'FAU_ARP.1.1': 1, 'FAU_SAA.1': 2}, 'FCO': {'FCO_NRO': 2}, 'FCS': {'FCS_CKM.1': 3, 'FCS_CKM.2': 2, 'FCS_CKM.3': 2, 'FCS_CKM.4': 2, 'FCS_COP.1': 3, 'FCS_RND.1': 1}, 'FDP': {'FDP_ACC': 22, 'FDP_ACF': 19, 'FDP_IFC': 15, 'FDP_IFF': 13, 'FDP_RIP': 16, 'FDP_ROL': 12, 'FDP_SDI.2': 3, 'FDP_ITC': 2, 'FDP_UIT': 2, 'FDP_ACC.2': 2, 'FDP_ACF.1': 6, 'FDP_IFC.1': 5, 'FDP_IFF.1': 8, 'FDP_ROL.1': 3, 'FDP_ACC.1': 4, 'FDP_SDI.1': 1}, 'FIA': {'FIA_ATD': 8, 'FIA_UID': 4, 'FIA_USB': 2, 'FIA_ATD.1': 1, 'FIA_UID.1': 1, 'FIA_UAU': 1}, 'FMT': {'FMT_MSA': 54, 'FMT_SMF.1': 4, 'FMT_SMR.1': 8, 'FMT_MTD': 16, 'FMT_SMR': 18, 'FMT_SMF': 14, 'FMT_REV': 1, 'FMT_MSA.1': 5, 'FMT_MSA.2': 3, 'FMT_MSA.3': 10, 'FMT_MTD.1': 2, 'FMT_MTD.3': 1}, 'FPR': {'FPR_UNO.1': 2, 'FPR_UNO': 1}, 'FPT': {'FPT_FLS.1': 4, 'FPT_TDC.1': 9, 'FPT_FLS': 21, 'FPT_RCV': 10, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_RCV.3': 7, 'FPT_TST': 1, 'FPT_ITT': 1, 'FPT_PHP': 1, 'FPT_PHP.3': 1}, 'FTP': {'FTP_ITC': 2}}, 'cc_claims': {'D': {'D.APP_CODE': 6, 'D.APP_C_DATA': 3, 'D.APP_I_DATA': 4, 'D.PIN': 4, 'D.API_DATA': 3, 'D.CRYPTO': 3, 'D.JCS_CODE': 3, 'D.JCS_DATA': 5, 'D.SEC_DATA': 7}, 'O': {'O.FIREWALL': 15, 'O.GLOBAL_ARRAYS_INTEG': 3, 'O.NATIVE': 11, 'O.OPERATE': 16, 'O.ALARM': 15, 'O.INSTALL': 8, 'O.SID': 1, 'O.RESOURCES': 1, 'O.REALLOCATION': 1, 'O.GLOBAL_ARRAYS_CONFID': 2, 'O.TRANSACTION': 1, 'O.PIN-': 1, 'O.KEY-MNGT': 1, 'O.OBJ-DELETION': 1, 'O.LOAD': 1, 'O.DELETION': 1, 'O.CARD-MANAGEMENT': 1, 'O.SCP': 3, 'O.RND': 4, 'O.APPLET': 1, 'O.JAVAOBJECT': 31}, 'T': {'T.CONFID-APPLI-DATA': 4, 'T.CONFID-JCS-CODE': 4, 'T.CONFID-JCS-DATA': 4, 'T.INTEG-APPLI-CODE': 7, 'T.INTEG-APPLI-DATA': 8, 'T.INTEG-JCS-CODE': 3, 'T.INTEG-JCS-DATA': 4, 'T.SID': 8, 'T.EXE-CODE': 8, 'T.NATIVE': 4, 'T.RESOURCES': 3, 'T.DELETION': 3, 'T.INSTALL': 4, 'T.OBJ-DELETION': 4, 'T.PHYSICAL': 4}, 'A': {'A.APPLET': 5, 'A.DELETION': 8, 'A.VERIFICATION': 5, 'A.SID': 4, 'A.FIREWALL-ENV': 4, 'A.GLOBAL_ARRAYS_CONFID': 3, 'A.OPERATE-ENV': 4, 'A.REALLOCATION': 4, 'A.RESOURCES': 4, 'A.ALARM-ENV': 4, 'A.CIPHER': 4, 'A.KEY-MNGT': 4, 'A.PIN-MNGT': 4, 'A.TRANSACTION': 4, 'A.OBJ-DELETION': 3, 'A.LOAD': 4, 'A.INSTALL-ENV': 4, 'A.OBJ-': 1, 'A.GLOBAL_ARRAYS_CONFI': 1}, 'R': {'R.JAVA': 5}, 'OT': {'OT.GLOBAL_ARRAYS_INTEG': 1}, 'OP': {'OP.ARRAY_ACCESS': 6, 'OP.INSTANCE_FIELD': 6, 'OP.INVK_VIRTUAL': 8, 'OP.INVK_INTERFACE': 10, 'OP.JAVA': 8, 'OP.THROW': 7, 'OP.TYPE_ACCESS': 7, 'OP.PUT': 9, 'OP.CREATE': 12}, 'OE': {'OE.VERIFICATION': 26, 'OE.APPLET': 4, 'OE.CODE-EVIDENCE': 10, 'OE.SCP': 22, 'OE.CARD-MANAGEMENT': 1, 'OE.SID': 8, 'OE.FIREWALL-ENV': 4, 'OE.GLOBAL_ARRAYS_CONFID': 4, 'OE.OPERATE-ENV': 4, 'OE.REALLOCATION': 4, 'OE.RESOURCES': 6, 'OE.ALARM-ENV': 2, 'OE.CIPHER': 7, 'OE.KEY-MNGT': 5, 'OE.PIN-MNGT': 7, 'OE.TRANSACTION': 5, 'OE.OBJ-DELETION': 5, 'OE.DELETION': 3, 'OE.LOAD': 7, 'OE.INSTALL-ENV': 2, 'OE.RND': 4, 'OE.CARD_MANAGEMENT': 15, 'OE.GLOBAL_ARRAYS_INTEG': 1, 'OE.OPERATE': 1}, 'OSP': {'OSP.VERIFICATION': 4, 'OSP.RND': 4}}, 'vendor': {'Infineon': {'Infineon': 1}, 'Gemalto': {'Gemalto': 66}}, 'eval_facility': {'Serma': {'Serma Technologies': 1}, 'TrustedLabs': {'Trusted Labs': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 2, 'RND': 12}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 3, 'physical probing': 2, 'DPA': 1}, 'FI': {'physical tampering': 1, 'malfunction': 2, 'Malfunction': 3, 'fault induction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.2': 3, 'Java Card 3.0.4': 4}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 7}}, 'javacard_packages': {'java': {'java.lang': 1}, 'javacard': {'javacard.framework': 1, 'javacard.framework.service': 1, 'javacard.security': 1}, 'javacardx': {'javacardx.crypto': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives OE.SCP.RECOVERY and OE.SCP.SUPPORT are': 1}}}
. - The cert_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2020/33-S01': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL7': 1}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Serma': {'SERMA': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
cible_anssi_cc_2020-33.pdf
. - The cert_filename property was set to
certificat-anssi-cc-2020_33-s01.pdf
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V2-2016']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V2-2016']}}
data. - The report_references property was updated, with the
{'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/54', 'BSI-DSZ-CC-0891-V3-2018', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0891-2015', 'BSI-DSZ-CC-0891-V2-2016', 'ANSSI-CC-2017/07']}}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}]}
values added.
- The st property was updated, with the
-
19.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'a931948eb5cf7896a6102d4b96da007cb1dc077fce0ccf48a9aa600efa82dd1b', 'txt_hash': '3f13b3077cce9ed377097b191e674740d8eb8ee9e6dae8aa5be950bcf754370e'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 481052, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 14, '/Producer': 'GPL Ghostscript 9.26', '/CreationDate': "D:20200604113216+02'00'", '/ModDate': "D:20200604113216+02'00'", '/Title': 'Microsoft Word - ANSSI-CC-2020_33fr.doc', '/Creator': 'PDF24 Creator', '/Author': 'Pat', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'FR': {'match_rules': ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2020/33', 'cert_item': 'MultiApp V4 JavaCard Virtual Machine', 'cert_item_version': 'Référence 4.0.1', 'ref_protection_profiles': 'Néant', 'cc_version': 'Critères Communs version 3.1 révision 4', 'cc_security_level': 'EAL 7', 'developer': 'Gemalto 6 rue de la verrerie, 92190 Meudon, France Trusted Labs 6 rue de la verrerie, 92190 Meudon, France Infineon Technologies AG Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la verrerie, 92190 Meudon, France', 'cert_lab': 'Serma Safety & Security 14 rue Galilée, CS 10071, 33608 Pessac Cedex, France'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0891-V4-2019': 1}, 'FR': {'ANSSI-CC-2020/33': 15, 'ANSSI-CC-2017/76': 2, 'ANSSI-CC-2017/76-S01': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 7': 7, 'EAL2': 1, 'EAL5': 2, 'EAL 5': 2, 'EAL7': 2, 'EAL 2': 1, 'EAL 1': 1, 'EAL 3': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 4, 'AGD_PRE': 2}, 'ALC': {'ALC_DVS.2': 2, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 4, 'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies AG': 1, 'Infineon': 2}, 'Gemalto': {'Gemalto': 3}}, 'eval_facility': {'Serma': {'Serma Safety & Security': 1}, 'TrustedLabs': {'Trusted Labs': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'PACE': {'PACE': 3}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
anssi-cc-2020_33fr.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['SERMA']
. - The cert_id property was set to
ANSSI-CC-2020/33
. - The report_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/76', 'BSI-DSZ-CC-0891-V4-2019']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/76', 'BSI-DSZ-CC-0891-V4-2019']}}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}]}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_33fr.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible_anssi_cc_2020-33.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The report_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The report_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was set to
None
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The report_references property was updated, with the
{'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V4-2019']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V4-2019', 'BSI-DSZ-CC-0891-V3-2018', 'BSI-DSZ-CC-0782-2012']}}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}]}
values discarded. - The scheme_data property was set to
{'product': 'MultiApp V4 JavaCard Virtual Machine', 'url': 'https://cyber.gouv.fr/produits-certifies/multiapp-v4-javacard-virtual-machine', 'description': 'Le produit considéré est la carte « MultiApp V4.0.1 » développée par GEMALTO, TRUSTED LABS et INFINEON TECHNOLOGIES AG. La « plateforme JavaCard MultiApp V4.0.1 » de la carte a déjà fait l’objet d’une certification au niveau EAL5 augmenté des composants ALC_DVS.2 et AVA_VAN.5. L’objet du présent rapport de certification est le résultat de l’évaluation de la machine virtuelle « MultiApp V4 JavaCard', 'sponsor': 'Gemalto', 'developer': 'Gemalto, Trusted Labs, Infineon Technologies AG', 'cert_id': '2020/33', 'level': 'EAL7', 'expiration_date': '22 Avril 2027', 'enhanced': {'cert_id': '2020/33', 'certification_date': '28/05/2020', 'expiration_date': '22/04/2027', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r4', 'developer': 'Gemalto, Trusted Labs, Infineon Technologies AG', 'sponsor': 'Gemalto', 'evaluation_facility': 'Serma Safety & Security', 'level': 'EAL7', 'protection_profile': '', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': '', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/06/anssi-cc-2020_33fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/06/cible_anssi_cc_2020-33.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2020/06/certificat-anssi-cc-2020_33-s01.pdf'}}
.
- The st property was updated, with the
-
31.07.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name MultiApp V4 JavaCard Virtual Machine was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2020_33-s01.pdf",
"dgst": "dfa48e7ac54d10f0",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2020/33",
"cert_lab": [
"SERMA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TAT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_LCD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 6
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_CMC",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 6
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2017/76",
"BSI-DSZ-CC-0891-V4-2019"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0891-2015",
"ANSSI-CC-2017/07",
"BSI-DSZ-CC-0891-V2-2016",
"BSI-DSZ-CC-0891-V4-2019",
"BSI-DSZ-CC-0782-2012",
"BSI-DSZ-CC-0891-V3-2018",
"ANSSI-CC-2017/54",
"ANSSI-CC-2017/76"
]
}
},
"scheme_data": {
"cert_id": "ANSSI-CC-2020/33",
"description": "Le produit consid\u00e9r\u00e9 est la carte \u00ab MultiApp V4.0.1 \u00bb d\u00e9velopp\u00e9e par GEMALTO, TRUSTED LABS et INFINEON TECHNOLOGIES AG. La \u00ab plateforme JavaCard MultiApp V4.0.1 \u00bb de la carte a d\u00e9j\u00e0 fait l\u2019objet d\u2019une certification au niveau EAL5 augment\u00e9 des composants ALC_DVS.2 et AVA_VAN.5. L\u2019objet du pr\u00e9sent rapport de certification est le r\u00e9sultat de l\u2019\u00e9valuation de la machine virtuelle \u00ab MultiApp V4 JavaCard",
"developer": "Gemalto, Trusted Labs, Infineon Technologies AG",
"enhanced": {
"augmented": "",
"category": "Cartes \u00e0 puce",
"cc_version": "Crit\u00e8res Communs version 3.1r4",
"cert_id": "ANSSI-CC-2020/33",
"cert_link": "https://cyber.gouv.fr/sites/default/files/2020/06/certificat-anssi-cc-2020_33-s01.pdf",
"certification_date": "2020-05-28",
"developer": "Gemalto, Trusted Labs, Infineon Technologies AG",
"evaluation_facility": "Serma Safety \u0026 Security",
"expiration_date": "2027-04-22",
"level": "EAL7",
"mutual_recognition": "SOG-IS CCRA",
"protection_profile": "",
"report_link": "https://cyber.gouv.fr/sites/default/files/2020/06/anssi-cc-2020_33fr.pdf",
"sponsor": "Gemalto",
"target_link": "https://cyber.gouv.fr/sites/default/files/2020/06/cible_anssi_cc_2020-33.pdf"
},
"expiration_date": "2027-04-22",
"level": "EAL7",
"product": "MultiApp V4 JavaCard Virtual Machine",
"sponsor": "Gemalto",
"url": "https://cyber.gouv.fr/produits-certifies/multiapp-v4-javacard-virtual-machine"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0891-V2-2016"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0891-V2-2016"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2022-04-22",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_33-s01.pdf",
"maintenance_st_link": null,
"maintenance_title": "Reassessment report: ANSSI-CC-2020/33-S01"
}
]
},
"manufacturer": "Gemalto",
"manufacturer_web": "https://www.gemalto.com/",
"name": "MultiApp V4 JavaCard Virtual Machine",
"not_valid_after": "2027-04-22",
"not_valid_before": "2020-05-28",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "certificat-anssi-cc-2020_33-s01.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2020/33-S01": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL7": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"SERMA": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "DUCLOS Charlene",
"/CreationDate": "D:20220429113327+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2019",
"/Keywords": "version x.x, r\u00e9vision x",
"/ModDate": "D:20220429113327+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2019",
"/Title": "ANSSI-CC-2020/33",
"pdf_file_size_bytes": 251233,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"report_filename": "anssi-cc-2020_33fr.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 7",
"cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 4",
"cert_id": "ANSSI-CC-2020/33",
"cert_item": "MultiApp V4 JavaCard Virtual Machine",
"cert_item_version": "R\u00e9f\u00e9rence 4.0.1",
"cert_lab": "Serma Safety \u0026 Security 14 rue Galil\u00e9e, CS 10071, 33608 Pessac Cedex, France",
"developer": "Gemalto 6 rue de la verrerie, 92190 Meudon, France Trusted Labs 6 rue de la verrerie, 92190 Meudon, France Infineon Technologies AG Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la verrerie, 92190 Meudon, France",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "N\u00e9ant"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0891-V4-2019": 1
},
"FR": {
"ANSSI-CC-2017/76": 2,
"ANSSI-CC-2017/76-S01": 1,
"ANSSI-CC-2020/33": 15
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 4,
"AGD_PRE": 2
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 1,
"EAL 3": 1,
"EAL 5": 2,
"EAL 7": 7,
"EAL2": 1,
"EAL5": 2,
"EAL7": 2
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 3
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"Serma Safety \u0026 Security": 1
},
"TrustedLabs": {
"Trusted Labs": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 3
},
"Infineon": {
"Infineon": 2,
"Infineon Technologies AG": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Pat",
"/CreationDate": "D:20200604113216+02\u002700\u0027",
"/Creator": "PDF24 Creator",
"/ModDate": "D:20200604113216+02\u002700\u0027",
"/Producer": "GPL Ghostscript 9.26",
"/Title": "Microsoft Word - ANSSI-CC-2020_33fr.doc",
"pdf_file_size_bytes": 481052,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 14
},
"st_filename": "cible_anssi_cc_2020-33.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0891-V2-2016": 1
},
"NL": {
"CC-1": 2,
"CC-2": 3,
"CC-3": 2
}
},
"cc_claims": {
"A": {
"A.ALARM-ENV": 4,
"A.APPLET": 5,
"A.CIPHER": 4,
"A.DELETION": 8,
"A.FIREWALL-ENV": 4,
"A.GLOBAL_ARRAYS_CONFI": 1,
"A.GLOBAL_ARRAYS_CONFID": 3,
"A.INSTALL-ENV": 4,
"A.KEY-MNGT": 4,
"A.LOAD": 4,
"A.OBJ-": 1,
"A.OBJ-DELETION": 3,
"A.OPERATE-ENV": 4,
"A.PIN-MNGT": 4,
"A.REALLOCATION": 4,
"A.RESOURCES": 4,
"A.SID": 4,
"A.TRANSACTION": 4,
"A.VERIFICATION": 5
},
"D": {
"D.API_DATA": 3,
"D.APP_CODE": 6,
"D.APP_C_DATA": 3,
"D.APP_I_DATA": 4,
"D.CRYPTO": 3,
"D.JCS_CODE": 3,
"D.JCS_DATA": 5,
"D.PIN": 4,
"D.SEC_DATA": 7
},
"O": {
"O.ALARM": 15,
"O.APPLET": 1,
"O.CARD-MANAGEMENT": 1,
"O.DELETION": 1,
"O.FIREWALL": 15,
"O.GLOBAL_ARRAYS_CONFID": 2,
"O.GLOBAL_ARRAYS_INTEG": 3,
"O.INSTALL": 8,
"O.JAVAOBJECT": 31,
"O.KEY-MNGT": 1,
"O.LOAD": 1,
"O.NATIVE": 11,
"O.OBJ-DELETION": 1,
"O.OPERATE": 16,
"O.PIN-": 1,
"O.REALLOCATION": 1,
"O.RESOURCES": 1,
"O.RND": 4,
"O.SCP": 3,
"O.SID": 1,
"O.TRANSACTION": 1
},
"OE": {
"OE.ALARM-ENV": 2,
"OE.APPLET": 4,
"OE.CARD-MANAGEMENT": 1,
"OE.CARD_MANAGEMENT": 15,
"OE.CIPHER": 7,
"OE.CODE-EVIDENCE": 10,
"OE.DELETION": 3,
"OE.FIREWALL-ENV": 4,
"OE.GLOBAL_ARRAYS_CONFID": 4,
"OE.GLOBAL_ARRAYS_INTEG": 1,
"OE.INSTALL-ENV": 2,
"OE.KEY-MNGT": 5,
"OE.LOAD": 7,
"OE.OBJ-DELETION": 5,
"OE.OPERATE": 1,
"OE.OPERATE-ENV": 4,
"OE.PIN-MNGT": 7,
"OE.REALLOCATION": 4,
"OE.RESOURCES": 6,
"OE.RND": 4,
"OE.SCP": 22,
"OE.SID": 8,
"OE.TRANSACTION": 5,
"OE.VERIFICATION": 26
},
"OP": {
"OP.ARRAY_ACCESS": 6,
"OP.CREATE": 12,
"OP.INSTANCE_FIELD": 6,
"OP.INVK_INTERFACE": 10,
"OP.INVK_VIRTUAL": 8,
"OP.JAVA": 8,
"OP.PUT": 9,
"OP.THROW": 7,
"OP.TYPE_ACCESS": 7
},
"OSP": {
"OSP.RND": 4,
"OSP.VERIFICATION": 4
},
"OT": {
"OT.GLOBAL_ARRAYS_INTEG": 1
},
"R": {
"R.JAVA": 5
},
"T": {
"T.CONFID-APPLI-DATA": 4,
"T.CONFID-JCS-CODE": 4,
"T.CONFID-JCS-DATA": 4,
"T.DELETION": 3,
"T.EXE-CODE": 8,
"T.INSTALL": 4,
"T.INTEG-APPLI-CODE": 7,
"T.INTEG-APPLI-DATA": 8,
"T.INTEG-JCS-CODE": 3,
"T.INTEG-JCS-DATA": 4,
"T.NATIVE": 4,
"T.OBJ-DELETION": 4,
"T.PHYSICAL": 4,
"T.RESOURCES": 3,
"T.SID": 8
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 6,
"ADV_CMC.5": 3,
"ADV_FSP.1": 2,
"ADV_FSP.2": 2,
"ADV_FSP.4": 3,
"ADV_FSP.6": 11,
"ADV_IMP.1": 5,
"ADV_IMP.2": 6,
"ADV_INT.3": 4,
"ADV_LCD.2": 1,
"ADV_SPM.1": 7,
"ADV_TAT.3": 1,
"ADV_TDS.1": 1,
"ADV_TDS.3": 3,
"ADV_TDS.4": 3,
"ADV_TDS.6": 15
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 6,
"AGD_PRE": 1,
"AGD_PRE.1": 5
},
"ALC": {
"ALC_CMC.5": 7,
"ALC_CMS.1": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 6,
"ALC_LCD.1": 3,
"ALC_LCD.2": 6,
"ALC_TAT.1": 2,
"ALC_TAT.3": 10
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 5,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 3,
"ATE_COV.3": 5,
"ATE_DPT.1": 1,
"ATE_DPT.4": 4,
"ATE_FUN.1": 6,
"ATE_FUN.2": 5,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL5+": 1,
"EAL6": 1,
"EAL6 augmented": 1,
"EAL6+": 1,
"EAL7": 8
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 16,
"FAU_ARP.1.1": 1,
"FAU_SAA.1": 2
},
"FCO": {
"FCO_NRO": 2
},
"FCS": {
"FCS_CKM.1": 3,
"FCS_CKM.2": 2,
"FCS_CKM.3": 2,
"FCS_CKM.4": 2,
"FCS_COP.1": 3,
"FCS_RND.1": 1
},
"FDP": {
"FDP_ACC": 22,
"FDP_ACC.1": 4,
"FDP_ACC.2": 2,
"FDP_ACF": 19,
"FDP_ACF.1": 6,
"FDP_IFC": 15,
"FDP_IFC.1": 5,
"FDP_IFF": 13,
"FDP_IFF.1": 8,
"FDP_ITC": 2,
"FDP_RIP": 16,
"FDP_ROL": 12,
"FDP_ROL.1": 3,
"FDP_SDI.1": 1,
"FDP_SDI.2": 3,
"FDP_UIT": 2
},
"FIA": {
"FIA_ATD": 8,
"FIA_ATD.1": 1,
"FIA_UAU": 1,
"FIA_UID": 4,
"FIA_UID.1": 1,
"FIA_USB": 2
},
"FMT": {
"FMT_MSA": 54,
"FMT_MSA.1": 5,
"FMT_MSA.2": 3,
"FMT_MSA.3": 10,
"FMT_MTD": 16,
"FMT_MTD.1": 2,
"FMT_MTD.3": 1,
"FMT_REV": 1,
"FMT_SMF": 14,
"FMT_SMF.1": 4,
"FMT_SMR": 18,
"FMT_SMR.1": 8
},
"FPR": {
"FPR_UNO": 1,
"FPR_UNO.1": 2
},
"FPT": {
"FPT_FLS": 21,
"FPT_FLS.1": 4,
"FPT_ITT": 1,
"FPT_PHP": 1,
"FPT_PHP.3": 1,
"FPT_RCV": 10,
"FPT_RCV.3": 7,
"FPT_TDC.1": 9,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST": 1
},
"FTP": {
"FTP_ITC": 2
}
},
"certification_process": {
"OutOfScope": {
"a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives OE.SCP.RECOVERY and OE.SCP.SUPPORT are": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"Serma Technologies": 1
},
"TrustedLabs": {
"Trusted Labs": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {
"misc": {
"TYPE_ACCESS": 7
}
},
"javacard_packages": {
"java": {
"java.lang": 1
},
"javacard": {
"javacard.framework": 1,
"javacard.framework.service": 1,
"javacard.security": 1
},
"javacardx": {
"javacardx.crypto": 1
}
},
"javacard_version": {
"JavaCard": {
"Java Card 2.2.2": 3,
"Java Card 3.0.4": 4
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 12,
"RNG": 2
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 3,
"fault induction": 2,
"malfunction": 2,
"physical tampering": 1
},
"SCA": {
"DPA": 1,
"Leak-Inherent": 3,
"physical probing": 2
}
},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1,
"CCMB-2009-07-004": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 66
},
"Infineon": {
"Infineon": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Maria Christofi",
"/CreationDate": "D:20200309171000+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2013",
"/Keywords": "Security Target, CC",
"/ModDate": "D:20200309171000+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2013",
"/Subject": "Security Target",
"/Title": "Security Target: Formal assurance for MultiAppV4 JCS",
"pdf_file_size_bytes": 1571623,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 61
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_33fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"EAL7"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible_anssi_cc_2020-33.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ad3c404d14d59f9af2000db8a0d3112132bff43e4ac298a3febdc10d1a10bf7f",
"txt_hash": "50f50ff2a59792eb7b17dc11ee3ab8bedc50c43f0907b410e6d1e01ca18bbece"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "a931948eb5cf7896a6102d4b96da007cb1dc077fce0ccf48a9aa600efa82dd1b",
"txt_hash": "3f13b3077cce9ed377097b191e674740d8eb8ee9e6dae8aa5be950bcf754370e"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "39ec177ec0356eafb6b4f11fbaeed24df5a071d7b27e894c807647d870244594",
"txt_hash": "6f97c47d0ae0d67866706226f3315813082d725fd8e4dddbb6eeab864453182a"
}
},
"status": "active"
}