This page was not yet optimized for use on mobile devices.
collaborative PP-Module for Biometric enrolment and verification - for unlocking the device
Web information
Status: activeCertification date: 2022-09-12
Scheme: ❌
Category: Biometric Systems and Devices
Security level: EAL1
Certification report
Extracted keywords
Protocols
TLS, DTLS, IPsecClaims
O.PROTECTED_COMMS, O.STORAGE, O.CONFIG, O.AUTH, O.INTEGRITY, O.PRIVACY, O.AUTH_COMM, O.CRYPTOGRAPHIC_FUNCTIONS, O.SELF_TEST, O.SYSTEM_MONITORING, O.TOE_ADMINISTRATION, O.WIRELESS_ACCESS_POINT_CONN, T.NETWORK_EAVESDROP, T.NETWORK_ATTACK, T.PHYSICAL_ACCESS, T.MALICIOUS_APP, T.PERSISTENT_PRESENCE, T.TSF_FAILURE, T.UNAUTHORIZED_ACCESS, T.UNDETECTED_ACTIONS, T.PERSISTENT, A.CONFIG, A.NOTIFY, A.PRECAUTION, A.PROPER_USER, A.NO_TOE_BYPASS, A.TRUSTED_ADMIN, OE.CONFIG, OE.NOTIFY, OE.PRECAUTION, OE.DATA_PROPER_USER, OE.NO_TOE_BYPASS, OE.TRUSTED_ADMINSecurity Assurance Requirements (SAR)
ACE_REQ, ACE_INT.1, ACE_CCL.1, ACE_SPD.1, ACE_OBJ.1, ACE_ECD.1, ACE_REQ.1, ACE_MCO.1, ACE_CCO.1, APE_REQ, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_ECD.1, APE_REQ.1Security Functional Requirements (SFR)
FAU_GEN, FAU_SAR, FAU_STG, FAU_SEL, FCS_CKM_EXT, FCS_CKM, FCS_COP, FCS_RBG_EXT, FCS_SRV_EXT, FCS_STG_EXT, FCS_TLSC_EXT, FCS_WPA_EXT, FDP_ACF_EXT, FDP_DAR_EXT, FDP_IFC_EXT, FDP_STG_EXT, FDP_UPC_EXT, FDP_BCK_EXT, FDP_BLT_EXT, FIA_MBV_EXT.1, FIA_AFL_EXT, FIA_PMG_EXT, FIA_TRT_EXT, FIA_UAU, FIA_UAU_EXT, FIA_MBE_EXT, FIA_MBV_EXT, FIA_BLT_EXT, FIA_PAE_EXT, FMT_SMF_EXT, FMT_MOF_EXT, FMT_SMF, FPT_AEX_EXT, FPT_KST_EXT, FPT_JTA_EXT, FPT_NOT_EXT, FPT_STM, FPT_TST_EXT, FPT_TUD_EXT, FPT_BDP_EXT, FPT_PBT_EXT, FPT_BBD_EXT, FPT_BLT_EXT, FTA_SSL_EXT, FTA_TAB, FTA_WSE_EXT, FTP_ITC_EXT, FTP_BLT_EXT, FTP_ITCEvaluation facilities
Gossamer SecurityCertification process
out of scope, access to its storage media. Note: Defending against device re-use after physical compromise is out of scope for this Protection Profile. T.MALICIOUS_APP Applications loaded onto the Mobile Device may includeStandards
X.509File metadata
Author | Brown, Michelle A |
---|---|
Creation date | D:20230224152520-05'00' |
Modification date | D:20230224152520-05'00' |
Pages | 26 |
Creator | Microsoft® Word for Microsoft 365 |
Producer | Microsoft® Word for Microsoft 365 |
Profile
Extracted keywords
Claims
O.AUTH, O.STORAGE, T.PHYSICAL_ACCESSSecurity Functional Requirements (SFR)
FAU_GEN, FCS_CKM_EXT.4, FCS_CKM_EXT.4.2, FIA_MBE_EXT.3, FIA_MBV_EXT.3, FIA_MBE_EXT, FIA_MBV_EXT, FIA_MBV_EXT.1.1, FIA_MBV_EXT.1, FIA_MBE_EXT.1, FIA_MBE_EXT.1.1, FIA_MBE_EXT.2, FIA_MBE_EXT.2.1, FIA_MBV_EXT.1.2, FIA_MBV_EXT.2, FIA_MBV_EXT.2.1, FIA_UAU.5.1, FIA_UAU.6.2, FIA_UAU.5.2, FIA_MBE, FIA_MBV, FIA_AFL_EXT.1, FIA_TRT_EXT.1.1, FIA_UAU.7.1, FIA_MBE_EXT.3.1, FIA_MBV_EXT.3.1, FMT_SMF_EXT.1, FPT_BDP_EXT, FPT_PBT_EXT, FPT_AEX_EXT.4, FPT_KST_EXT.1, FPT_KST_EXT.1.1, FPT_KST_EXT.2, FPT_KST_EXT.2.1, FPT_BDP_EXT.1, FPT_BDP_EXT.1.1, FPT_BDP_EXT.1.2, FPT_PBT_EXT.1, FPT_PBT_EXT.1.1Certification process
out of scope, developed for each use case. This PP-Module only assumes USE CASE 1 described below. USE CASE 2 is out of scope of this PP- Module. 2.3.4.1. USE CASE 1: Biometric verification for unlocking the computer This use, provided by the TOE. Presentation attacks during biometric enrolment and verification may be out of scope, but optionally addressed. FTE is not a security relevant criterion for this use case. 2.3.4.2. USE, and data loaded inside to be protected with respect to confidentiality and integrity. This SEE is out of scope of the Biometric System defined in this PP-Module and shall be provided by the mobile device and, ST author can arbitrarily specify. Details of the assessment method can be described in a separate confidential document as explained in [BIOSD]. 6.3.1.3. FIA_MBV_EXT.1 Biometric verification FIA_MBV_EXT.1.1 The TSF, ST author can arbitrarily specify. Details of the assessment method can be described in a separate confidential document as explained in [BIOSD]. 6.3.2. Protection of the TSF (FPT) 18 6.3.2.1. FPT_BDP_EXT.1 BiometricStandards
ISO/IEC 19795-1, ISO/IEC 29156, ISO/IEC 30107-1, ISO/IEC 19795-, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
Title | collaborative PP-Module for Biometric enrolment and verification - for unlocking the device - [BIOPP-Module] |
---|---|
Creation date | D:20220824093001-04'00' |
Modification date | D:20220823113709-04'00' |
Pages | 38 |
Creator | Asciidoctor PDF 1.6.2, based on Prawn 2.4.0 |
Producer | Asciidoctor PDF 1.6.2, based on Prawn 2.4.0 |
References
- Apple iOS 16: iPhones active
- Apple iOS 17: iPhone active
- Apple iPadOS 16: iPads active
- Apple iPadOS 17: iPad active
- Google Pixel Devices on Android 14 active
- Google Pixel Devices on Android 15 active
- Motorola Mobility LLC Mobile Devices on Android 13 active
- Motorola Mobility LLC Mobile Devices on Android 14 active
- Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 13 – Fall active
- Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 14 - Spring active
- Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 15 – Spring active
- Samsung Galaxy Devices on Android 14 - Fall active
Updates
-
22.04.2025 The protection profile data changed.
Protection Profile changed
The CC portal data was updated.
- The report_link property was set to
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CFG_MDF-BIO-BT-WLANC_V1.0_VR.pdf
.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 376154, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 26, '/Author': 'Brown, Michelle A', '/Creator': 'Microsoft® Word for Microsoft 365', '/CreationDate': "D:20230224152520-05'00'", '/ModDate': "D:20230224152520-05'00'", '/Producer': 'Microsoft® Word for Microsoft 365', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The pp_metadata property was set to
{'pdf_file_size_bytes': 784366, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 38, '/Title': 'collaborative PP-Module for Biometric enrolment and verification - for unlocking the device - [BIOPP-Module]', '/Creator': 'Asciidoctor PDF 1.6.2, based on Prawn 2.4.0', '/Producer': 'Asciidoctor PDF 1.6.2, based on Prawn 2.4.0', '/ModDate': "D:20220823113709-04'00'", '/CreationDate': "D:20220824093001-04'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://biometricitc.github.io/PP-allowed.html']}}
. - The report_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {'ACE': {'ACE_REQ': 1, 'ACE_INT.1': 3, 'ACE_CCL.1': 3, 'ACE_SPD.1': 3, 'ACE_OBJ.1': 3, 'ACE_ECD.1': 3, 'ACE_REQ.1': 3, 'ACE_MCO.1': 3, 'ACE_CCO.1': 1}, 'APE': {'APE_REQ': 1, 'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 3, 'FAU_SAR': 1, 'FAU_STG': 2, 'FAU_SEL': 1}, 'FCS': {'FCS_CKM_EXT': 9, 'FCS_CKM': 5, 'FCS_COP': 5, 'FCS_RBG_EXT': 3, 'FCS_SRV_EXT': 2, 'FCS_STG_EXT': 3, 'FCS_TLSC_EXT': 2, 'FCS_WPA_EXT': 1}, 'FDP': {'FDP_ACF_EXT': 3, 'FDP_DAR_EXT': 2, 'FDP_IFC_EXT': 1, 'FDP_STG_EXT': 1, 'FDP_UPC_EXT': 2, 'FDP_BCK_EXT': 1, 'FDP_BLT_EXT': 1}, 'FIA': {'FIA_MBV_EXT.1': 2, 'FIA_AFL_EXT': 1, 'FIA_PMG_EXT': 1, 'FIA_TRT_EXT': 1, 'FIA_UAU': 4, 'FIA_UAU_EXT': 3, 'FIA_MBE_EXT': 3, 'FIA_MBV_EXT': 3, 'FIA_BLT_EXT': 7, 'FIA_PAE_EXT': 1}, 'FMT': {'FMT_SMF_EXT': 4, 'FMT_MOF_EXT': 1, 'FMT_SMF': 2}, 'FPT': {'FPT_AEX_EXT': 8, 'FPT_KST_EXT': 5, 'FPT_JTA_EXT': 1, 'FPT_NOT_EXT': 2, 'FPT_STM': 1, 'FPT_TST_EXT': 5, 'FPT_TUD_EXT': 6, 'FPT_BDP_EXT': 1, 'FPT_PBT_EXT': 1, 'FPT_BBD_EXT': 1, 'FPT_BLT_EXT': 1}, 'FTA': {'FTA_SSL_EXT': 1, 'FTA_TAB': 1, 'FTA_WSE_EXT': 1}, 'FTP': {'FTP_ITC_EXT': 1, 'FTP_BLT_EXT': 4, 'FTP_ITC': 1}}, 'cc_claims': {'O': {'O.PROTECTED_COMMS': 2, 'O.STORAGE': 1, 'O.CONFIG': 1, 'O.AUTH': 1, 'O.INTEGRITY': 1, 'O.PRIVACY': 1, 'O.AUTH_COMM': 1, 'O.CRYPTOGRAPHIC_FUNCTIONS': 1, 'O.SELF_TEST': 1, 'O.SYSTEM_MONITORING': 1, 'O.TOE_ADMINISTRATION': 1, 'O.WIRELESS_ACCESS_POINT_CONN': 1}, 'T': {'T.NETWORK_EAVESDROP': 3, 'T.NETWORK_ATTACK': 3, 'T.PHYSICAL_ACCESS': 3, 'T.MALICIOUS_APP': 3, 'T.PERSISTENT_PRESENCE': 2, 'T.TSF_FAILURE': 1, 'T.UNAUTHORIZED_ACCESS': 1, 'T.UNDETECTED_ACTIONS': 1, 'T.PERSISTENT': 1}, 'A': {'A.CONFIG': 1, 'A.NOTIFY': 1, 'A.PRECAUTION': 1, 'A.PROPER_USER': 1, 'A.NO_TOE_BYPASS': 1, 'A.TRUSTED_ADMIN': 1}, 'OE': {'OE.CONFIG': 1, 'OE.NOTIFY': 1, 'OE.PRECAUTION': 1, 'OE.DATA_PROPER_USER': 1, 'OE.NO_TOE_BYPASS': 1, 'OE.TRUSTED_ADMIN': 1}}, 'vendor': {}, 'eval_facility': {'Gossamer': {'Gossamer Security': 4}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 3}, 'DTLS': {'DTLS': 1}}, 'IPsec': {'IPsec': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'X509': {'X.509': 6}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'access to its storage media. Note: Defending against device re-use after physical compromise is out of scope for this Protection Profile. T.MALICIOUS_APP Applications loaded onto the Mobile Device may include': 1}}}
. - The pp_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {}, 'cc_sfr': {'FAU': {'FAU_GEN': 4}, 'FCS': {'FCS_CKM_EXT.4': 1, 'FCS_CKM_EXT.4.2': 2}, 'FIA': {'FIA_MBE_EXT.3': 7, 'FIA_MBV_EXT.3': 7, 'FIA_MBE_EXT': 2, 'FIA_MBV_EXT': 2, 'FIA_MBV_EXT.1.1': 4, 'FIA_MBV_EXT.1': 11, 'FIA_MBE_EXT.1': 11, 'FIA_MBE_EXT.1.1': 3, 'FIA_MBE_EXT.2': 6, 'FIA_MBE_EXT.2.1': 2, 'FIA_MBV_EXT.1.2': 4, 'FIA_MBV_EXT.2': 6, 'FIA_MBV_EXT.2.1': 2, 'FIA_UAU.5.1': 4, 'FIA_UAU.6.2': 2, 'FIA_UAU.5.2': 1, 'FIA_MBE': 3, 'FIA_MBV': 2, 'FIA_AFL_EXT.1': 2, 'FIA_TRT_EXT.1.1': 1, 'FIA_UAU.7.1': 1, 'FIA_MBE_EXT.3.1': 1, 'FIA_MBV_EXT.3.1': 2}, 'FMT': {'FMT_SMF_EXT.1': 2}, 'FPT': {'FPT_BDP_EXT': 2, 'FPT_PBT_EXT': 2, 'FPT_AEX_EXT.4': 2, 'FPT_KST_EXT.1': 3, 'FPT_KST_EXT.1.1': 1, 'FPT_KST_EXT.2': 3, 'FPT_KST_EXT.2.1': 1, 'FPT_BDP_EXT.1': 7, 'FPT_BDP_EXT.1.1': 2, 'FPT_BDP_EXT.1.2': 2, 'FPT_PBT_EXT.1': 7, 'FPT_PBT_EXT.1.1': 2}}, 'cc_claims': {'O': {'O.AUTH': 1, 'O.STORAGE': 1}, 'T': {'T.PHYSICAL_ACCESS': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 19795-1': 2, 'ISO/IEC 29156': 6, 'ISO/IEC 30107-1': 2, 'ISO/IEC 19795-': 1}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 3, 'developed for each use case. This PP-Module only assumes USE CASE 1 described below. USE CASE 2 is out of scope of this PP- Module. 2.3.4.1. USE CASE 1: Biometric verification for unlocking the computer This use': 1, 'provided by the TOE. Presentation attacks during biometric enrolment and verification may be out of scope, but optionally addressed. FTE is not a security relevant criterion for this use case. 2.3.4.2. USE': 1, 'and data loaded inside to be protected with respect to confidentiality and integrity. This SEE is out of scope of the Biometric System defined in this PP-Module and shall be provided by the mobile device and': 1}, 'ConfidentialDocument': {'ST author can arbitrarily specify. Details of the assessment method can be described in a separate confidential document as explained in [BIOSD]. 6.3.1.3. FIA_MBV_EXT.1 Biometric verification FIA_MBV_EXT.1.1 The TSF': 1, 'ST author can arbitrarily specify. Details of the assessment method can be described in a separate confidential document as explained in [BIOSD]. 6.3.2. Protection of the TSF (FPT) 18 6.3.2.1. FPT_BDP_EXT.1 Biometric': 1}}}
.
The state of the protection profile object was updated.
- The pp property was updated, with the
{'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'aa00f217e0b1728df6f3e172ce3a87bbc2fe5465095384df24b66a0db3aa0c83', 'txt_hash': 'e88f21eeec368d02816fc9f39da91ab71cb464c3ef8fe092e8fa6ca823bf8ff8'}
data. - The report property was updated, with the
{'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '40c7bbbb30595981c4523dcd4b6e3e8b0ff95639cfc627ace33aea62ee271ecf', 'txt_hash': '9fcbbbb04fee35341665fa743f83a89606cee5a5d45851ca5c5f785e4e694d5c'}
data.
- The report_link property was set to
-
14.04.2025 The protection profile data changed.
Protection Profile changed
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The pp_metadata property was set to
None
. - The report_keywords property was set to
None
. - The pp_keywords property was set to
None
.
The state of the protection profile object was updated.
- The pp property was updated, with the
{'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None}
data. - The report property was updated, with the
{'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None}
data.
- The report_metadata property was set to
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name collaborative PP-Module for Biometric enrolment and verification - for unlocking the device was processed.
Raw data
{
"_id": "29ba341b00e9bd10",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "29ba341b00e9bd10",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "MOD-BIO-v1.1.pdf",
"pp_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.AUTH": 1,
"O.STORAGE": 1
},
"T": {
"T.PHYSICAL_ACCESS": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 4
},
"FCS": {
"FCS_CKM_EXT.4": 1,
"FCS_CKM_EXT.4.2": 2
},
"FIA": {
"FIA_AFL_EXT.1": 2,
"FIA_MBE": 3,
"FIA_MBE_EXT": 2,
"FIA_MBE_EXT.1": 11,
"FIA_MBE_EXT.1.1": 3,
"FIA_MBE_EXT.2": 6,
"FIA_MBE_EXT.2.1": 2,
"FIA_MBE_EXT.3": 7,
"FIA_MBE_EXT.3.1": 1,
"FIA_MBV": 2,
"FIA_MBV_EXT": 2,
"FIA_MBV_EXT.1": 11,
"FIA_MBV_EXT.1.1": 4,
"FIA_MBV_EXT.1.2": 4,
"FIA_MBV_EXT.2": 6,
"FIA_MBV_EXT.2.1": 2,
"FIA_MBV_EXT.3": 7,
"FIA_MBV_EXT.3.1": 2,
"FIA_TRT_EXT.1.1": 1,
"FIA_UAU.5.1": 4,
"FIA_UAU.5.2": 1,
"FIA_UAU.6.2": 2,
"FIA_UAU.7.1": 1
},
"FMT": {
"FMT_SMF_EXT.1": 2
},
"FPT": {
"FPT_AEX_EXT.4": 2,
"FPT_BDP_EXT": 2,
"FPT_BDP_EXT.1": 7,
"FPT_BDP_EXT.1.1": 2,
"FPT_BDP_EXT.1.2": 2,
"FPT_KST_EXT.1": 3,
"FPT_KST_EXT.1.1": 1,
"FPT_KST_EXT.2": 3,
"FPT_KST_EXT.2.1": 1,
"FPT_PBT_EXT": 2,
"FPT_PBT_EXT.1": 7,
"FPT_PBT_EXT.1.1": 2
}
},
"certification_process": {
"ConfidentialDocument": {
"ST author can arbitrarily specify. Details of the assessment method can be described in a separate confidential document as explained in [BIOSD]. 6.3.1.3. FIA_MBV_EXT.1 Biometric verification FIA_MBV_EXT.1.1 The TSF": 1,
"ST author can arbitrarily specify. Details of the assessment method can be described in a separate confidential document as explained in [BIOSD]. 6.3.2. Protection of the TSF (FPT) 18 6.3.2.1. FPT_BDP_EXT.1 Biometric": 1
},
"OutOfScope": {
"and data loaded inside to be protected with respect to confidentiality and integrity. This SEE is out of scope of the Biometric System defined in this PP-Module and shall be provided by the mobile device and": 1,
"developed for each use case. This PP-Module only assumes USE CASE 1 described below. USE CASE 2 is out of scope of this PP- Module. 2.3.4.1. USE CASE 1: Biometric verification for unlocking the computer This use": 1,
"out of scope": 3,
"provided by the TOE. Presentation attacks during biometric enrolment and verification may be out of scope, but optionally addressed. FTE is not a security relevant criterion for this use case. 2.3.4.2. USE": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
},
"ISO": {
"ISO/IEC 19795-": 1,
"ISO/IEC 19795-1": 2,
"ISO/IEC 29156": 6,
"ISO/IEC 30107-1": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/CreationDate": "D:20220824093001-04\u002700\u0027",
"/Creator": "Asciidoctor PDF 1.6.2, based on Prawn 2.4.0",
"/ModDate": "D:20220823113709-04\u002700\u0027",
"/Producer": "Asciidoctor PDF 1.6.2, based on Prawn 2.4.0",
"/Title": "collaborative PP-Module for Biometric enrolment and verification - for unlocking the device - [BIOPP-Module]",
"pdf_file_size_bytes": 784366,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://biometricitc.github.io/PP-allowed.html"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 38
},
"report_filename": "CFG_MDF-BIO-BT-WLANC_V1.0_VR.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONFIG": 1,
"A.NOTIFY": 1,
"A.NO_TOE_BYPASS": 1,
"A.PRECAUTION": 1,
"A.PROPER_USER": 1,
"A.TRUSTED_ADMIN": 1
},
"O": {
"O.AUTH": 1,
"O.AUTH_COMM": 1,
"O.CONFIG": 1,
"O.CRYPTOGRAPHIC_FUNCTIONS": 1,
"O.INTEGRITY": 1,
"O.PRIVACY": 1,
"O.PROTECTED_COMMS": 2,
"O.SELF_TEST": 1,
"O.STORAGE": 1,
"O.SYSTEM_MONITORING": 1,
"O.TOE_ADMINISTRATION": 1,
"O.WIRELESS_ACCESS_POINT_CONN": 1
},
"OE": {
"OE.CONFIG": 1,
"OE.DATA_PROPER_USER": 1,
"OE.NOTIFY": 1,
"OE.NO_TOE_BYPASS": 1,
"OE.PRECAUTION": 1,
"OE.TRUSTED_ADMIN": 1
},
"T": {
"T.MALICIOUS_APP": 3,
"T.NETWORK_ATTACK": 3,
"T.NETWORK_EAVESDROP": 3,
"T.PERSISTENT": 1,
"T.PERSISTENT_PRESENCE": 2,
"T.PHYSICAL_ACCESS": 3,
"T.TSF_FAILURE": 1,
"T.UNAUTHORIZED_ACCESS": 1,
"T.UNDETECTED_ACTIONS": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACE": {
"ACE_CCL.1": 3,
"ACE_CCO.1": 1,
"ACE_ECD.1": 3,
"ACE_INT.1": 3,
"ACE_MCO.1": 3,
"ACE_OBJ.1": 3,
"ACE_REQ": 1,
"ACE_REQ.1": 3,
"ACE_SPD.1": 3
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_REQ": 1,
"APE_REQ.1": 1,
"APE_SPD.1": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 3,
"FAU_SAR": 1,
"FAU_SEL": 1,
"FAU_STG": 2
},
"FCS": {
"FCS_CKM": 5,
"FCS_CKM_EXT": 9,
"FCS_COP": 5,
"FCS_RBG_EXT": 3,
"FCS_SRV_EXT": 2,
"FCS_STG_EXT": 3,
"FCS_TLSC_EXT": 2,
"FCS_WPA_EXT": 1
},
"FDP": {
"FDP_ACF_EXT": 3,
"FDP_BCK_EXT": 1,
"FDP_BLT_EXT": 1,
"FDP_DAR_EXT": 2,
"FDP_IFC_EXT": 1,
"FDP_STG_EXT": 1,
"FDP_UPC_EXT": 2
},
"FIA": {
"FIA_AFL_EXT": 1,
"FIA_BLT_EXT": 7,
"FIA_MBE_EXT": 3,
"FIA_MBV_EXT": 3,
"FIA_MBV_EXT.1": 2,
"FIA_PAE_EXT": 1,
"FIA_PMG_EXT": 1,
"FIA_TRT_EXT": 1,
"FIA_UAU": 4,
"FIA_UAU_EXT": 3
},
"FMT": {
"FMT_MOF_EXT": 1,
"FMT_SMF": 2,
"FMT_SMF_EXT": 4
},
"FPT": {
"FPT_AEX_EXT": 8,
"FPT_BBD_EXT": 1,
"FPT_BDP_EXT": 1,
"FPT_BLT_EXT": 1,
"FPT_JTA_EXT": 1,
"FPT_KST_EXT": 5,
"FPT_NOT_EXT": 2,
"FPT_PBT_EXT": 1,
"FPT_STM": 1,
"FPT_TST_EXT": 5,
"FPT_TUD_EXT": 6
},
"FTA": {
"FTA_SSL_EXT": 1,
"FTA_TAB": 1,
"FTA_WSE_EXT": 1
},
"FTP": {
"FTP_BLT_EXT": 4,
"FTP_ITC": 1,
"FTP_ITC_EXT": 1
}
},
"certification_process": {
"OutOfScope": {
"access to its storage media. Note: Defending against device re-use after physical compromise is out of scope for this Protection Profile. T.MALICIOUS_APP Applications loaded onto the Mobile Device may include": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IPsec": {
"IPsec": 1
},
"TLS": {
"DTLS": {
"DTLS": 1
},
"TLS": {
"TLS": 3
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Gossamer": {
"Gossamer Security": 4
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"X509": {
"X.509": 6
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Brown, Michelle A",
"/CreationDate": "D:20230224152520-05\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20230224152520-05\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"pdf_file_size_bytes": 376154,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 26
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "aa00f217e0b1728df6f3e172ce3a87bbc2fe5465095384df24b66a0db3aa0c83",
"txt_hash": "e88f21eeec368d02816fc9f39da91ab71cb464c3ef8fe092e8fa6ca823bf8ff8"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "40c7bbbb30595981c4523dcd4b6e3e8b0ff95639cfc627ace33aea62ee271ecf",
"txt_hash": "9fcbbbb04fee35341665fa743f83a89606cee5a5d45851ca5c5f785e4e694d5c"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Biometric Systems and Devices",
"is_collaborative": true,
"maintenances": [],
"name": "collaborative PP-Module for Biometric enrolment and verification - for unlocking the device",
"not_valid_after": null,
"not_valid_before": "2022-09-12",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD-BIO-v1.1.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CFG_MDF-BIO-BT-WLANC_V1.0_VR.pdf",
"scheme": null,
"security_level": {
"_type": "Set",
"elements": [
"EAL1"
]
},
"status": "active",
"version": "1.1"
}
}