collaborative PP-Module for Biometric enrolment and verification - for unlocking the device

Web information ?

Status: active
Certification date: 2022-09-12
Scheme:
Category: Biometric Systems and Devices
Security level: EAL1

Certification report ?

Extracted keywords

Protocols
TLS, DTLS, IPsec

Claims
O.PROTECTED_COMMS, O.STORAGE, O.CONFIG, O.AUTH, O.INTEGRITY, O.PRIVACY, O.AUTH_COMM, O.CRYPTOGRAPHIC_FUNCTIONS, O.SELF_TEST, O.SYSTEM_MONITORING, O.TOE_ADMINISTRATION, O.WIRELESS_ACCESS_POINT_CONN, T.NETWORK_EAVESDROP, T.NETWORK_ATTACK, T.PHYSICAL_ACCESS, T.MALICIOUS_APP, T.PERSISTENT_PRESENCE, T.TSF_FAILURE, T.UNAUTHORIZED_ACCESS, T.UNDETECTED_ACTIONS, T.PERSISTENT, A.CONFIG, A.NOTIFY, A.PRECAUTION, A.PROPER_USER, A.NO_TOE_BYPASS, A.TRUSTED_ADMIN, OE.CONFIG, OE.NOTIFY, OE.PRECAUTION, OE.DATA_PROPER_USER, OE.NO_TOE_BYPASS, OE.TRUSTED_ADMIN
Security Assurance Requirements (SAR)
ACE_REQ, ACE_INT.1, ACE_CCL.1, ACE_SPD.1, ACE_OBJ.1, ACE_ECD.1, ACE_REQ.1, ACE_MCO.1, ACE_CCO.1, APE_REQ, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_ECD.1, APE_REQ.1
Security Functional Requirements (SFR)
FAU_GEN, FAU_SAR, FAU_STG, FAU_SEL, FCS_CKM_EXT, FCS_CKM, FCS_COP, FCS_RBG_EXT, FCS_SRV_EXT, FCS_STG_EXT, FCS_TLSC_EXT, FCS_WPA_EXT, FDP_ACF_EXT, FDP_DAR_EXT, FDP_IFC_EXT, FDP_STG_EXT, FDP_UPC_EXT, FDP_BCK_EXT, FDP_BLT_EXT, FIA_MBV_EXT.1, FIA_AFL_EXT, FIA_PMG_EXT, FIA_TRT_EXT, FIA_UAU, FIA_UAU_EXT, FIA_MBE_EXT, FIA_MBV_EXT, FIA_BLT_EXT, FIA_PAE_EXT, FMT_SMF_EXT, FMT_MOF_EXT, FMT_SMF, FPT_AEX_EXT, FPT_KST_EXT, FPT_JTA_EXT, FPT_NOT_EXT, FPT_STM, FPT_TST_EXT, FPT_TUD_EXT, FPT_BDP_EXT, FPT_PBT_EXT, FPT_BBD_EXT, FPT_BLT_EXT, FTA_SSL_EXT, FTA_TAB, FTA_WSE_EXT, FTP_ITC_EXT, FTP_BLT_EXT, FTP_ITC
Evaluation facilities
Gossamer Security

Certification process
out of scope, access to its storage media. Note: Defending against device re-use after physical compromise is out of scope for this Protection Profile. T.MALICIOUS_APP Applications loaded onto the Mobile Device may include

Standards
X.509

File metadata

Author Brown, Michelle A
Creation date D:20230224152520-05'00'
Modification date D:20230224152520-05'00'
Pages 26
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

Profile ?

Extracted keywords

Claims
O.AUTH, O.STORAGE, T.PHYSICAL_ACCESS
Security Functional Requirements (SFR)
FAU_GEN, FCS_CKM_EXT.4, FCS_CKM_EXT.4.2, FIA_MBE_EXT.3, FIA_MBV_EXT.3, FIA_MBE_EXT, FIA_MBV_EXT, FIA_MBV_EXT.1.1, FIA_MBV_EXT.1, FIA_MBE_EXT.1, FIA_MBE_EXT.1.1, FIA_MBE_EXT.2, FIA_MBE_EXT.2.1, FIA_MBV_EXT.1.2, FIA_MBV_EXT.2, FIA_MBV_EXT.2.1, FIA_UAU.5.1, FIA_UAU.6.2, FIA_UAU.5.2, FIA_MBE, FIA_MBV, FIA_AFL_EXT.1, FIA_TRT_EXT.1.1, FIA_UAU.7.1, FIA_MBE_EXT.3.1, FIA_MBV_EXT.3.1, FMT_SMF_EXT.1, FPT_BDP_EXT, FPT_PBT_EXT, FPT_AEX_EXT.4, FPT_KST_EXT.1, FPT_KST_EXT.1.1, FPT_KST_EXT.2, FPT_KST_EXT.2.1, FPT_BDP_EXT.1, FPT_BDP_EXT.1.1, FPT_BDP_EXT.1.2, FPT_PBT_EXT.1, FPT_PBT_EXT.1.1

Certification process
out of scope, developed for each use case. This PP-Module only assumes USE CASE 1 described below. USE CASE 2 is out of scope of this PP- Module. 2.3.4.1. USE CASE 1: Biometric verification for unlocking the computer This use, provided by the TOE. Presentation attacks during biometric enrolment and verification may be out of scope, but optionally addressed. FTE is not a security relevant criterion for this use case. 2.3.4.2. USE, and data loaded inside to be protected with respect to confidentiality and integrity. This SEE is out of scope of the Biometric System defined in this PP-Module and shall be provided by the mobile device and, ST author can arbitrarily specify. Details of the assessment method can be described in a separate confidential document as explained in [BIOSD]. 6.3.1.3. FIA_MBV_EXT.1 Biometric verification FIA_MBV_EXT.1.1 The TSF, ST author can arbitrarily specify. Details of the assessment method can be described in a separate confidential document as explained in [BIOSD]. 6.3.2. Protection of the TSF (FPT) 18 6.3.2.1. FPT_BDP_EXT.1 Biometric

Standards
ISO/IEC 19795-1, ISO/IEC 29156, ISO/IEC 30107-1, ISO/IEC 19795-, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title collaborative PP-Module for Biometric enrolment and verification - for unlocking the device - [BIOPP-Module]
Creation date D:20220824093001-04'00'
Modification date D:20220823113709-04'00'
Pages 38
Creator Asciidoctor PDF 1.6.2, based on Prawn 2.4.0
Producer Asciidoctor PDF 1.6.2, based on Prawn 2.4.0

Updates ?

  • 04.02.2025 The protection profile was first processed.
    New Protection Profile

    A new Protection Profile with the name collaborative PP-Module for Biometric enrolment and verification - for unlocking the device was processed.

Raw data

{
  "_id": "29ba341b00e9bd10",
  "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
  "dgst": "29ba341b00e9bd10",
  "heuristics": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
  },
  "pdf_data": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
    "pp_filename": "MOD-BIO-v1.1.pdf",
    "pp_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.AUTH": 1,
          "O.STORAGE": 1
        },
        "T": {
          "T.PHYSICAL_ACCESS": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {},
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 4
        },
        "FCS": {
          "FCS_CKM_EXT.4": 1,
          "FCS_CKM_EXT.4.2": 2
        },
        "FIA": {
          "FIA_AFL_EXT.1": 2,
          "FIA_MBE": 3,
          "FIA_MBE_EXT": 2,
          "FIA_MBE_EXT.1": 11,
          "FIA_MBE_EXT.1.1": 3,
          "FIA_MBE_EXT.2": 6,
          "FIA_MBE_EXT.2.1": 2,
          "FIA_MBE_EXT.3": 7,
          "FIA_MBE_EXT.3.1": 1,
          "FIA_MBV": 2,
          "FIA_MBV_EXT": 2,
          "FIA_MBV_EXT.1": 11,
          "FIA_MBV_EXT.1.1": 4,
          "FIA_MBV_EXT.1.2": 4,
          "FIA_MBV_EXT.2": 6,
          "FIA_MBV_EXT.2.1": 2,
          "FIA_MBV_EXT.3": 7,
          "FIA_MBV_EXT.3.1": 2,
          "FIA_TRT_EXT.1.1": 1,
          "FIA_UAU.5.1": 4,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6.2": 2,
          "FIA_UAU.7.1": 1
        },
        "FMT": {
          "FMT_SMF_EXT.1": 2
        },
        "FPT": {
          "FPT_AEX_EXT.4": 2,
          "FPT_BDP_EXT": 2,
          "FPT_BDP_EXT.1": 7,
          "FPT_BDP_EXT.1.1": 2,
          "FPT_BDP_EXT.1.2": 2,
          "FPT_KST_EXT.1": 3,
          "FPT_KST_EXT.1.1": 1,
          "FPT_KST_EXT.2": 3,
          "FPT_KST_EXT.2.1": 1,
          "FPT_PBT_EXT": 2,
          "FPT_PBT_EXT.1": 7,
          "FPT_PBT_EXT.1.1": 2
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          "ST author can arbitrarily specify. Details of the assessment method can be described in a separate confidential document as explained in [BIOSD]. 6.3.1.3. FIA_MBV_EXT.1 Biometric verification FIA_MBV_EXT.1.1 The TSF": 1,
          "ST author can arbitrarily specify. Details of the assessment method can be described in a separate confidential document as explained in [BIOSD]. 6.3.2. Protection of the TSF (FPT) 18 6.3.2.1. FPT_BDP_EXT.1 Biometric": 1
        },
        "OutOfScope": {
          "and data loaded inside to be protected with respect to confidentiality and integrity. This SEE is out of scope of the Biometric System defined in this PP-Module and shall be provided by the mobile device and": 1,
          "developed for each use case. This PP-Module only assumes USE CASE 1 described below. USE CASE 2 is out of scope of this PP- Module. 2.3.4.1. USE CASE 1: Biometric verification for unlocking the computer This use": 1,
          "out of scope": 3,
          "provided by the TOE. Presentation attacks during biometric enrolment and verification may be out of scope, but optionally addressed. FTE is not a security relevant criterion for this use case. 2.3.4.2. USE": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "ISO": {
          "ISO/IEC 19795-": 1,
          "ISO/IEC 19795-1": 2,
          "ISO/IEC 29156": 6,
          "ISO/IEC 30107-1": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "pp_metadata": {
      "/CreationDate": "D:20220824093001-04\u002700\u0027",
      "/Creator": "Asciidoctor PDF 1.6.2, based on Prawn 2.4.0",
      "/ModDate": "D:20220823113709-04\u002700\u0027",
      "/Producer": "Asciidoctor PDF 1.6.2, based on Prawn 2.4.0",
      "/Title": "collaborative PP-Module for Biometric enrolment and verification - for unlocking the device - [BIOPP-Module]",
      "pdf_file_size_bytes": 784366,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://biometricitc.github.io/PP-allowed.html"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 38
    },
    "report_filename": "CFG_MDF-BIO-BT-WLANC_V1.0_VR.pdf",
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.CONFIG": 1,
          "A.NOTIFY": 1,
          "A.NO_TOE_BYPASS": 1,
          "A.PRECAUTION": 1,
          "A.PROPER_USER": 1,
          "A.TRUSTED_ADMIN": 1
        },
        "O": {
          "O.AUTH": 1,
          "O.AUTH_COMM": 1,
          "O.CONFIG": 1,
          "O.CRYPTOGRAPHIC_FUNCTIONS": 1,
          "O.INTEGRITY": 1,
          "O.PRIVACY": 1,
          "O.PROTECTED_COMMS": 2,
          "O.SELF_TEST": 1,
          "O.STORAGE": 1,
          "O.SYSTEM_MONITORING": 1,
          "O.TOE_ADMINISTRATION": 1,
          "O.WIRELESS_ACCESS_POINT_CONN": 1
        },
        "OE": {
          "OE.CONFIG": 1,
          "OE.DATA_PROPER_USER": 1,
          "OE.NOTIFY": 1,
          "OE.NO_TOE_BYPASS": 1,
          "OE.PRECAUTION": 1,
          "OE.TRUSTED_ADMIN": 1
        },
        "T": {
          "T.MALICIOUS_APP": 3,
          "T.NETWORK_ATTACK": 3,
          "T.NETWORK_EAVESDROP": 3,
          "T.PERSISTENT": 1,
          "T.PERSISTENT_PRESENCE": 2,
          "T.PHYSICAL_ACCESS": 3,
          "T.TSF_FAILURE": 1,
          "T.UNAUTHORIZED_ACCESS": 1,
          "T.UNDETECTED_ACTIONS": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACE": {
          "ACE_CCL.1": 3,
          "ACE_CCO.1": 1,
          "ACE_ECD.1": 3,
          "ACE_INT.1": 3,
          "ACE_MCO.1": 3,
          "ACE_OBJ.1": 3,
          "ACE_REQ": 1,
          "ACE_REQ.1": 3,
          "ACE_SPD.1": 3
        },
        "APE": {
          "APE_CCL.1": 1,
          "APE_ECD.1": 1,
          "APE_INT.1": 1,
          "APE_OBJ.1": 1,
          "APE_REQ": 1,
          "APE_REQ.1": 1,
          "APE_SPD.1": 1
        }
      },
      "cc_security_level": {},
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 3,
          "FAU_SAR": 1,
          "FAU_SEL": 1,
          "FAU_STG": 2
        },
        "FCS": {
          "FCS_CKM": 5,
          "FCS_CKM_EXT": 9,
          "FCS_COP": 5,
          "FCS_RBG_EXT": 3,
          "FCS_SRV_EXT": 2,
          "FCS_STG_EXT": 3,
          "FCS_TLSC_EXT": 2,
          "FCS_WPA_EXT": 1
        },
        "FDP": {
          "FDP_ACF_EXT": 3,
          "FDP_BCK_EXT": 1,
          "FDP_BLT_EXT": 1,
          "FDP_DAR_EXT": 2,
          "FDP_IFC_EXT": 1,
          "FDP_STG_EXT": 1,
          "FDP_UPC_EXT": 2
        },
        "FIA": {
          "FIA_AFL_EXT": 1,
          "FIA_BLT_EXT": 7,
          "FIA_MBE_EXT": 3,
          "FIA_MBV_EXT": 3,
          "FIA_MBV_EXT.1": 2,
          "FIA_PAE_EXT": 1,
          "FIA_PMG_EXT": 1,
          "FIA_TRT_EXT": 1,
          "FIA_UAU": 4,
          "FIA_UAU_EXT": 3
        },
        "FMT": {
          "FMT_MOF_EXT": 1,
          "FMT_SMF": 2,
          "FMT_SMF_EXT": 4
        },
        "FPT": {
          "FPT_AEX_EXT": 8,
          "FPT_BBD_EXT": 1,
          "FPT_BDP_EXT": 1,
          "FPT_BLT_EXT": 1,
          "FPT_JTA_EXT": 1,
          "FPT_KST_EXT": 5,
          "FPT_NOT_EXT": 2,
          "FPT_PBT_EXT": 1,
          "FPT_STM": 1,
          "FPT_TST_EXT": 5,
          "FPT_TUD_EXT": 6
        },
        "FTA": {
          "FTA_SSL_EXT": 1,
          "FTA_TAB": 1,
          "FTA_WSE_EXT": 1
        },
        "FTP": {
          "FTP_BLT_EXT": 4,
          "FTP_ITC": 1,
          "FTP_ITC_EXT": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "access to its storage media. Note: Defending against device re-use after physical compromise is out of scope for this Protection Profile. T.MALICIOUS_APP Applications loaded onto the Mobile Device may include": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IPsec": {
          "IPsec": 1
        },
        "TLS": {
          "DTLS": {
            "DTLS": 1
          },
          "TLS": {
            "TLS": 3
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Gossamer": {
          "Gossamer Security": 4
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "X509": {
          "X.509": 6
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Brown, Michelle A",
      "/CreationDate": "D:20230224152520-05\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20230224152520-05\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 376154,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 26
    }
  },
  "state": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
    "pp": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "aa00f217e0b1728df6f3e172ce3a87bbc2fe5465095384df24b66a0db3aa0c83",
      "txt_hash": "e88f21eeec368d02816fc9f39da91ab71cb464c3ef8fe092e8fa6ca823bf8ff8"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "40c7bbbb30595981c4523dcd4b6e3e8b0ff95639cfc627ace33aea62ee271ecf",
      "txt_hash": "9fcbbbb04fee35341665fa743f83a89606cee5a5d45851ca5c5f785e4e694d5c"
    }
  },
  "web_data": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
    "category": "Biometric Systems and Devices",
    "is_collaborative": true,
    "maintenances": [],
    "name": "collaborative PP-Module for Biometric enrolment and verification - for unlocking the device",
    "not_valid_after": null,
    "not_valid_before": "2022-09-12",
    "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD-BIO-v1.1.pdf",
    "report_link": "https://www.commoncriteriaportal.org/files/ppfiles/CFG_MDF-BIO-BT-WLANC_V1.0_VR.pdf",
    "scheme": null,
    "security_level": {
      "_type": "Set",
      "elements": [
        "EAL1"
      ]
    },
    "status": "active",
    "version": "1.1"
  }
}