Our activities

Our technical consultancy activities :

Our technical consultancy activities focus on three complementary areas:

Technical expertise in new digital trust technologies:

• Digital identities, biometrics, mobile applications, cyber security, cryptography ;

• Certification schemes (security and functional) ;

• Security of distributed systems (Blockchain) ;

• Data protection ;

• Intelligent transport ;

• Smart borders ;

• Telecommunications and telecom packages ;

• Digital Single Market.

Monitoring of standards and regulations in the fields of :

• State of the art ;

• Contribution to the creation of international or European norms and standards;

• Impact analysis on business plans,

• Support in drawing up specifications for products and services,

• Secure integration into new technologies such as Big Data, Blockchain, Cloud computing, Artificial Intelligence and biometrics.

Functional or Security certification :

•Management of security certifications such as C.S.P.N (ANSSI first-level certification) on behalf of developers;

• Writing Protection Profiles and security targets in accordance with the Common Criteria standard (ISO/IEC 15408),

• Establishment of private functional and/or security certification schemes (e.g. as part of the Cybersecurity Act regulations);

• Writing test plans and evaluation methodologies.

Our activities as an independent laboratory assessing the security of biometric, digital identity and mobile security technologies, products and services:

Our assessment services:

Biometric conformity assessment

• ISO/IEC 30107 (parts 3 and 4)

• CEN/TS 18099

• ETSI TS 119 461

• ISO/IEC 19794-7 (2007 and 2021)

Biometric Performance Evaluation

• ISO/IEC 19795-2

 

 

 

ANSSI Evaluations

• Physical biometric test PVID

• PVID “digital” biometric test

Cybersecurity Evaluations

• EN 17640 : Fixed Time Cybersecurity Evaluation Methodology for ICT products

Nos services d’audit de sécurité :

• Liveness detection

• Complete biometric systems

• Border management (Gates, entry-exit)

• Remote identity verification systems

• Physical identity verification systems

• Identity enrolment systems

• Physical access control systems

• Digital identity portfolios

• Vulnerability assessment

• Code review

• Test on demand

• Compliance audit of the ANSSI’s IT hygiene guide

• Audit of compliance with the requirements of the ANSSI C.S.P.N assessment methodology

• Organisational security audits

• Intrusion test