This page was not yet optimized for use on mobile devices.
Trusted Execution Environment (référence GPD_SPE_021, version 1.2.1)
Web information ?
Status: activeCertification date: 2016-12-13
Scheme: 🇫🇷
Category: Trusted Computing
Security level: EAL2+
Certification report ?
Extracted keywords
Trusted Execution Environments
TEEProtection profiles
ANSSI-CC-PP-2014/01-M01, ANSSI-CC-PP-2014/01Certificates
ANSSI-CC-PP-2014/01-M01, ANSSI-CC-PP-2014/01File metadata
Title | ANSSI-CC-PP-2014-01_M01 |
---|---|
Pages | 3 |
Creator | PDFCreator Version 1.2.1 |
Producer | GPL Ghostscript 9.02 |
Profile ?
Extracted keywords
Symmetric Algorithms
AES, DES, T-DESAsymmetric Algorithms
RSA 2048Hash functions
SHA-256Schemes
MACProtocols
SSL, TLS, IPsec, VPNRandomness
RNGTrusted Execution Environments
TEESecurity level
EAL 2, EAL 2 augmentedClaims
O.ROLLBACK_PROTECTION, O.CA_TA_IDENTIFICATION, O.KEYS_USAGE, O.TEE_ID, O.INITIALIZATION, O.INSTANCE_TIME, O.OPERATION, O.RNG, O.RUNTIME_CONFIDENTIALITY, O.RUNTIME_INTEGRITY, O.TA_AUTHENTICITY, O.TA_ISOLATION, O.TEE_DATA_PROTECTION, O.TEE_ISOLATION, O.TRUSTED_STORAGE, O.TA_PERSISTENT_TIME, O.DEBUG, T.ABUSE_FUNCT, T.CLONE, T.FLASH_DUMP, T.IMPERSONATION, T.ROGUE_CODE_EXECUTION, T.PERTURBATION, T.RAM, T.RNG, T.SPY, T.TEE_FIRMWARE_DOWNGRADE, T.STORAGE_CORRUPTION, T.ROLLBACK, T.TA_PERSISTENT_TIME_ROLLBACK, T.ABUSE_DEBUG, A.PROTECTION_AFTER_DELIVERY, A.ROLLBACK, A.TA_DEVELOPMENT, A.TA_ROLLBACK, OP.USE_KEY, OP.EXTRACT_KEY, OP.LOAD, OP.STORE, OP.AUTHENTICATE, OP.DEBUG, OP.ACTIVATE, OE.ROLLBACK, OE.INTEGRATION_CONFIGURATION, OE.PROTECTION_AFTER_DELIVERY, OE.SECRETS, OE.TA_DEVELOPMENT, OSP.INTEGRATION_CONFIGURATION, OSP.SECRETSSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.1, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, AVA_TEE, AVA_TEE.2, AVA_VAN.2, AVA_VAN, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_SAR.1, FAU_STG.1, FAU_ARP.1.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FAU_STG.1.2, FAU_SAA.1, FAU_GEN.1, FCS_RNG, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_COP.1, FCS_COP.1.1, FCS_COP, FCS_CKM.1, FCS_CKM.4, FDP_SDI, FDP_SDI.2, FDP_ACC.1, FDP_ACF.1, FDP_IFC.2, FDP_IFF.1, FDP_ITT.1, FDP_RIP.1, FDP_ROL.1, FDP_IFC, FDP_IFF, FDP_ITT, FDP_ACC, FDP_ACF, FDP_ROL, FDP_RIP, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC.1, FDP_ITC.2, FDP_IFC.1, FIA_ATD.1, FIA_UID.2, FIA_USB.1, FIA_ATD.1.1, FIA_UID.2.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UAU.2, FIA_UAU.6, FIA_UID, FIA_ATD, FIA_USB, FIA_UAU, FIA_UID.1, FMT_MSA.1, FMT_MSA.3, FMT_SMR.1, FMT_SMF.1, FMT_MSA, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1.1, FMT_MTD.1, FMT_MTD, FMT_SMF, FMT_SMR, FPT_INI, FPT_INI.1, FPT_INI.1.1, FPT_INI.1.2, FPT_INI.1.3, FPT_FLS.1, FPT_ITT.1, FPT_STM.1, FPT_TEE.1, FPT_ITT, FPT_FLS.1.1, FPT_TEE.1.1, FPT_TEE.1.2, FPT_STM, FPT_FLSEvaluation facilities
Trusted LabsSide-channel analysis
side-channels, side-channel, side channel, Fault Injection, fault injection, Fault injectionStandards
FIPS PUB 197, FIPS PUB 46-3, FIPS PUB 180-4, AIS31, RFC2119, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Title | Microsoft Word - PP TEE v1.2.1_20161215.docx |
---|---|
Creation date | D:20161215171239Z00'00' |
Modification date | D:20161215171239Z00'00' |
Pages | 102 |
Creator | Word |
Producer | Mac OS X 10.11.6 Quartz PDFContext |
References ?
Updates ?
-
18.02.2025 The protection profile data changed.
Protection Profile changed
The CC portal data was updated.
- The maintenances property was set to
[['2020-07-30', 'Trusted Execution Environment » (référence GPD_SPE_021, version 1.3)', 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-cc-pp-2014-01_m02.pdf']]
.
- The maintenances property was set to
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name Trusted Execution Environment (référence GPD_SPE_021, version 1.2.1) was processed.
Raw data
{
"_id": "8698d65d6df9b611",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "8698d65d6df9b611",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "PP TEE v1.2.1_20161215.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"RSA": {
"RSA 2048": 1
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.PROTECTION_AFTER_DELIVERY": 4,
"A.ROLLBACK": 4,
"A.TA_DEVELOPMENT": 4,
"A.TA_ROLLBACK": 1
},
"O": {
"O.CA_TA_IDENTIFICATION": 10,
"O.DEBUG": 16,
"O.INITIALIZATION": 24,
"O.INSTANCE_TIME": 8,
"O.KEYS_USAGE": 13,
"O.OPERATION": 42,
"O.RNG": 10,
"O.ROLLBACK_PROTECTION": 13,
"O.RUNTIME_CONFIDENTIALITY": 23,
"O.RUNTIME_INTEGRITY": 26,
"O.TA_AUTHENTICITY": 16,
"O.TA_ISOLATION": 20,
"O.TA_PERSISTENT_TIME": 11,
"O.TEE_DATA_PROTECTION": 19,
"O.TEE_ID": 11,
"O.TEE_ISOLATION": 15,
"O.TRUSTED_STORAGE": 27
},
"OE": {
"OE.INTEGRATION_CONFIGURATION": 10,
"OE.PROTECTION_AFTER_DELIVERY": 9,
"OE.ROLLBACK": 10,
"OE.SECRETS": 6,
"OE.TA_DEVELOPMENT": 6
},
"OP": {
"OP.ACTIVATE": 1,
"OP.AUTHENTICATE": 2,
"OP.DEBUG": 3,
"OP.EXTRACT_KEY": 4,
"OP.LOAD": 3,
"OP.STORE": 4,
"OP.USE_KEY": 4
},
"OSP": {
"OSP.INTEGRATION_CONFIGURATION": 4,
"OSP.SECRETS": 4
},
"T": {
"T.ABUSE_DEBUG": 4,
"T.ABUSE_FUNCT": 12,
"T.CLONE": 10,
"T.FLASH_DUMP": 4,
"T.IMPERSONATION": 6,
"T.PERTURBATION": 13,
"T.RAM": 8,
"T.RNG": 7,
"T.ROGUE_CODE_EXECUTION": 12,
"T.ROLLBACK": 4,
"T.SPY": 7,
"T.STORAGE_CORRUPTION": 12,
"T.TA_PERSISTENT_TIME_ROLLBACK": 4,
"T.TEE_FIRMWARE_DOWNGRADE": 6
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 6,
"ADV_FSP.1": 3,
"ADV_FSP.2": 14,
"ADV_TDS.1": 9
},
"AGD": {
"AGD_OPE.1": 10,
"AGD_PRE.1": 8
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 5,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 5,
"ATE_FUN.1": 4
},
"AVA": {
"AVA_TEE": 4,
"AVA_TEE.2": 21,
"AVA_VAN": 2,
"AVA_VAN.2": 9
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 8,
"EAL 2 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 8,
"FAU_ARP.1.1": 1,
"FAU_GEN.1": 4,
"FAU_SAA.1": 2,
"FAU_SAR.1": 7,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_STG.1": 7,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1
},
"FCS": {
"FCS_CKM.1": 5,
"FCS_CKM.4": 4,
"FCS_COP": 8,
"FCS_COP.1": 25,
"FCS_COP.1.1": 1,
"FCS_RNG": 3,
"FCS_RNG.1": 11,
"FCS_RNG.1.1": 3,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC": 33,
"FDP_ACC.1": 13,
"FDP_ACF": 32,
"FDP_ACF.1": 18,
"FDP_IFC": 16,
"FDP_IFC.1": 6,
"FDP_IFC.2": 3,
"FDP_IFF": 17,
"FDP_IFF.1": 8,
"FDP_ITC.1": 4,
"FDP_ITC.2": 4,
"FDP_ITT": 13,
"FDP_ITT.1": 4,
"FDP_RIP": 5,
"FDP_RIP.1": 2,
"FDP_ROL": 6,
"FDP_ROL.1": 3,
"FDP_SDI": 8,
"FDP_SDI.2": 20,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1
},
"FIA": {
"FIA_ATD": 8,
"FIA_ATD.1": 13,
"FIA_ATD.1.1": 1,
"FIA_UAU": 14,
"FIA_UAU.2": 2,
"FIA_UAU.6": 3,
"FIA_UID": 9,
"FIA_UID.1": 3,
"FIA_UID.2": 11,
"FIA_UID.2.1": 1,
"FIA_USB": 7,
"FIA_USB.1": 14,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MSA": 39,
"FMT_MSA.1": 5,
"FMT_MSA.3": 13,
"FMT_MTD": 5,
"FMT_MTD.1": 2,
"FMT_SMF": 6,
"FMT_SMF.1": 22,
"FMT_SMF.1.1": 1,
"FMT_SMR": 7,
"FMT_SMR.1": 21,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS": 7,
"FPT_FLS.1": 18,
"FPT_FLS.1.1": 1,
"FPT_INI": 4,
"FPT_INI.1": 14,
"FPT_INI.1.1": 2,
"FPT_INI.1.2": 2,
"FPT_INI.1.3": 2,
"FPT_ITT": 9,
"FPT_ITT.1": 2,
"FPT_STM": 10,
"FPT_STM.1": 4,
"FPT_TEE.1": 6,
"FPT_TEE.1.1": 1,
"FPT_TEE.1.2": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IPsec": {
"IPsec": 2
},
"TLS": {
"SSL": {
"SSL": 1
},
"TLS": {
"TLS": 1
}
},
"VPN": {
"VPN": 2
}
},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TrustedLabs": {
"Trusted Labs": 4
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 29
}
},
"side_channel_analysis": {
"FI": {
"Fault Injection": 1,
"Fault injection": 1,
"fault injection": 3
},
"SCA": {
"side channel": 1,
"side-channel": 2,
"side-channels": 1
}
},
"standard_id": {
"BSI": {
"AIS31": 1
},
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1
},
"FIPS": {
"FIPS PUB 180-4": 1,
"FIPS PUB 197": 1,
"FIPS PUB 46-3": 1
},
"RFC": {
"RFC2119": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 7
}
},
"DES": {
"3DES": {
"T-DES": 1
},
"DES": {
"DES": 4
}
}
},
"technical_report_id": {},
"tee_name": {
"other": {
"TEE": 740
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/AAPL:Keywords": "[]",
"/CreationDate": "D:20161215171239Z00\u002700\u0027",
"/Creator": "Word",
"/Keywords": "",
"/ModDate": "D:20161215171239Z00\u002700\u0027",
"/Producer": "Mac OS X 10.11.6 Quartz PDFContext",
"/Title": "Microsoft Word - PP TEE v1.2.1_20161215.docx",
"pdf_file_size_bytes": 1295483,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 102
},
"report_filename": "ANSSI-CC-PP-2014-01_M01.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-PP-2014/01": 3,
"ANSSI-CC-PP-2014/01-M01": 3
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2014/01": 3,
"ANSSI-CC-PP-2014/01-M01": 3
}
},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {
"other": {
"TEE": 1
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "",
"/CreationDate": "",
"/Creator": "PDFCreator Version 1.2.1",
"/Keywords": "",
"/ModDate": "",
"/Producer": "GPL Ghostscript 9.02",
"/Subject": "",
"/Title": "ANSSI-CC-PP-2014-01_M01",
"pdf_file_size_bytes": 49748,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 3
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "2c2bce2c1d901f986052981419a1fd9b4458ba6fa2f2d5fa21116453cce7070b",
"txt_hash": "22956fe3e3b9ffa86d6b7c2a2a5c953db9758ebe84b8df154e75cdc335f48a66"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "d7a54f74a14f5ea422c1f1c9fc870107cfe2058aed6a928fc7293d658a139e6e",
"txt_hash": "2391be19bb5eb88bcbf8e9868060c2605c7c08e030b3f144998ecda952e2bbaa"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Trusted Computing",
"is_collaborative": false,
"maintenances": [
[
"2020-07-30",
"Trusted Execution Environment \u00bb (r\u00e9f\u00e9rence GPD_SPE_021, version 1.3)",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-cc-pp-2014-01_m02.pdf"
]
],
"name": "Trusted Execution Environment (r\u00e9f\u00e9rence GPD_SPE_021, version 1.2.1)",
"not_valid_after": null,
"not_valid_before": "2016-12-13",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP TEE v1.2.1_20161215.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-PP-2014-01_M01.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"EAL2+"
]
},
"status": "active",
"version": "1.2.1"
}
}