E-Bio KEC - Secure Smartcard Readers Firmware v1.1
CSV information ?
Status | active |
---|---|
Valid from | 11.07.2019 |
Scheme | 🇹🇷 TR |
Manufacturer | ETB Elektronik Teknoloji ve Bilişim Hizmetleri San. Tic. Ltd. Şti. |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | EAL4+, ALC_DVS.2 |
Heuristics summary ?
Certification report ?
Extracted keywords
Protocols
TLSSecurity level
EAL 4+, EAL2, EAL4+Security Assurance Requirements (SAR)
ADV_ARC, ADV_IMP.1, ADV_TDS.3, ALC_DVS.2, ALC_CMC, ALC_CMS.4, ALC_DEL.1, ALC_DVS, ATE_DPT.1, ATE_IND.2, AVA_VAN, ASE_CCLCertificates
21.0.03/TSE-CCCS-60, 21.0.03/18-006Standards
ISO/IEC 17025, CCMB-2012-09-004File metadata
Creation date: | D:20190710130503+02'00' |
---|---|
Pages: | 16 |
Creator: | Canon iR-ADV C5240 PDF |
Producer: | Adobe PSL 1.2e for Canon |
References
No references.
Heuristics ?
Extracted SARs
ATE_IND.2, ADV_IMP.1, ADV_TDS.3, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ATE_DPT.1References ?
No references are available for this certificate.
Updates ?
-
26.04.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'scheme_data': None}
.
- The following values were inserted:
-
11.02.2023 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.cc.CCCertificate
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.InternalState
. - The report_txt_hash property was set to
3e0d0bc03a048e7091f6e058187230bc78d19b60501e2db7a9095d92bd9bcdee
. - The following properties were deleted:
['errors']
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.PdfData
. - The report_keywords property was updated, with the
{'cc_cert_id': {'TR': {'21.0.03/TSE-CCCS-60': 2, '21.0.03/18-006': 1}}, 'cc_security_level': {'EAL': {'EAL 4+': 1, 'EAL2': 1, 'EAL4+': 2}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'ALC': {'ALC_DVS.2': 3, 'ALC_CMC': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS': 1}, 'ATE': {'ATE_DPT.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN': 1}, 'ASE': {'ASE_CCL': 1}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 1}}}, 'standard_id': {'ISO': {'ISO/IEC 17025': 2}, 'CC': {'CCMB-2012-09-004': 1}}, 'javacard_packages': {'org': {'org.tr': 1}}}
data.
The computed heuristics were updated.
- The following values were inserted:
{'direct_transitive_cves': None, 'indirect_transitive_cves': None}
. - The _type property was set to
sec_certs.sample.cc.CCCertificate.Heuristics
. - The cert_id property was set to
21.0.03/TSE-CCCS-60
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}]}
values added. - The following properties were deleted:
['direct_dependency_cves', 'indirect_dependency_cves']
.
- The new value is
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was updated.
-
24.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was updated, with the
[[0, 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/E-Bio%20KEC%20SSR%20Firmware%20v1.1%20Certification%20Report.pdf, code: nok']]
values inserted.
- The errors property was updated, with the
-
24.12.2022 The certificate data changed.
Certificate changed
The manufacturer_web was updated.
- The new value is
https://www.etb.com.tr/
.
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Application Firmware of Secure Smartcard Reader for Electronic Identity Verifi...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/SSR_Application_Firmware_PP_v2.8.pdf', 'pp_ids': None}]}
.
- The new value is
-
23.12.2022 The certificate data changed.
Certificate changed
The manufacturer_web was updated.
- The new value is
None
.
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': []}
.
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_garbage property was set to
True
. - The errors property was set to
['failed to convert security target pdf->txt', 'failed to convert security target pdf->txt']
. - The st_pdf_hash property was set to
b2d4e640e6909873adda441794314e0e888e0058bb72295e72d7211ed3def2d1
.
The PDF extraction data was updated.
- The st_filename property was set to
E-Bio-KEC-ST-v1.6.docx
.
- The new value is
-
23.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_garbage property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/E-Bio-KEC-ST-v1.6.docx, code: nok']
. - The st_pdf_hash property was set to
None
.
The PDF extraction data was updated.
- The st_filename property was set to
None
.
- The st_download_ok property was set to
-
11.11.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report_txt_hash property was set to
c7f9034fd448868f927dcf94fe314df53b524af244a01203ee2bad12dddc8386
.
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {}, 'cc_security_level': {}, 'cc_sar': {}, 'crypto_protocol': {}, 'standard_id': {}, 'javacard_packages': {}}
data.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}]}
values discarded.
- The report_txt_hash property was set to
-
05.10.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Application Firmware of Secure Smartcard Reader for Electronic Identity Verifi...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/SSR_Application_Firmware_PP_v2.8.pdf', 'pp_ids': None}]}
.
The state of the certificate object was updated.
- The following values were inserted:
{'st_convert_garbage': True, 'report_convert_garbage': True}
. - The st_extract_ok property was set to
False
.
- The new value is
-
04.10.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Application Firmware of Secure Smartcard Reader for Electronic Identity Verifi...', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/SSR_Application_Firmware_PP_v2.8.pdf', 'pp_link': None, 'pp_ids': None}]}
.
- The new value is
-
28.09.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The report_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data.
- The report_references property was updated, with the
-
24.09.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The following values were inserted:
{'report_filename': 'E-Bio KEC SSR Firmware v1.1 Certification Report.pdf', 'st_filename': 'E-Bio-KEC-ST-v1.6.docx'}
. - The report_keywords property was updated, with the
{'cc_security_level': {'__update__': {'EAL': {'__insert__': {'EAL2': 1}}}}, 'cc_sar': {'__insert__': {'AVA': {'AVA_VAN': 1}, 'ASE': {'ASE_CCL': 1}}, '__update__': {'ADV': {'__insert__': {'ADV_ARC': 1}}, 'ALC': {'__insert__': {'ALC_CMC': 1, 'ALC_DVS': 1}}}}, 'cc_claims': {}, 'crypto_scheme': {}, 'tee_name': {}}
data.
The computed heuristics were updated.
- The report_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['21.0.03/18-006']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['21.0.03/18-006']}}
data.
- The following values were inserted:
-
02.09.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
False
. - The errors property was set to
['failed to convert security target pdf->txt', 'failed to convert security target pdf->txt']
. - The st_pdf_hash property was set to
b2d4e640e6909873adda441794314e0e888e0058bb72295e72d7211ed3def2d1
.
- The st_download_ok property was set to
-
01.09.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
True
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/E-Bio%20KEC%20SSR%20Firmware%20v1.1%20Certification%20Report.pdf, code: 408']
. - The st_pdf_hash property was set to
None
.
- The st_download_ok property was set to
-
23.07.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'TR': {'__insert__': {'21.0.03/18-006': 1}}}}}
data.
- The report_keywords property was updated, with the
-
18.07.2022 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.common_criteria.CommonCriteriaCert
.
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Application Firmware of Secure Smartcard Reader for Electronic Identity Verifi...', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/SSR_Application_Firmware_PP_v2.8.pdf', 'pp_ids': None}]}
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData
.
The computed heuristics were updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics
. - The st_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The report_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}]}
.
- The new value is
-
17.07.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report_txt_hash property was set to
63f5fdc158e3d86bce16cf45ca961a4a0c33da2fc87d4a4d8794a7900ffadcfb
.
The PDF extraction data was updated.
- The report_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
values inserted. - The report_keywords property was set to
{'cc_cert_id': {'TR': {'21.0.03/TSE-CCCS-60': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4+': 2, 'EAL 4+': 1}}, 'cc_sar': {'ADV': {'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'ALC': {'ALC_DVS.2': 3, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_DPT.1': 1, 'ATE_IND.2': 1}}, 'cc_sfr': {}, 'cc_claims': {'D': {'D.I': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'KA': {'KA': 16}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 23}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 17025': 2}, 'CC': {'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {'org': {'org.tr': 1}}, 'certification_process': {}}
.
The computed heuristics were updated.
- The _type property was set to
Heuristics
. - The cert_id property was set to
21.0.03/TSE-CCCS-60
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}]}
values added.
- The report_txt_hash property was set to
-
29.06.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'st_txt_hash': None}
.
- The following values were inserted:
-
14.06.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report_pdf_hash': '475a9d254e691c1045a3d4cd2282e2d96b1a1f2bf4ffecfcbe0a8558bc42d6b9', 'st_pdf_hash': 'b2d4e640e6909873adda441794314e0e888e0058bb72295e72d7211ed3def2d1', 'report_txt_hash': 'c7f9034fd448868f927dcf94fe314df53b524af244a01203ee2bad12dddc8386'}
.
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}}
values inserted.
- The following values were inserted:
-
13.05.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}]}}
.
- The following values were inserted:
-
24.04.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'direct_dependency_cves': None, 'indirect_dependency_cves': None}
.
- The following values were inserted:
-
08.03.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}
. - The following properties were deleted:
['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting']
.
- The following values were inserted:
-
18.02.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted.
The computed heuristics were updated.
- The extracted_versions property was set to
{'_type': 'Set', 'elements': ['1.1']}
.
- The report_frontpage property was updated, with the
-
28.01.2022 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name E-Bio KEC - Secure Smartcard Readers Firmware v1.1 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "4c9468f20fdb04f7",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"cert_id": "21.0.03/TSE-CCCS-60",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.1"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "ETB Elektronik Teknoloji ve Bili\u015fim Hizmetleri San. Tic. Ltd. \u015eti.",
"manufacturer_web": "https://www.etb.com.tr/",
"name": "E-Bio KEC - Secure Smartcard Readers Firmware v1.1",
"not_valid_after": null,
"not_valid_before": "2019-07-11",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"report_filename": "E-Bio KEC SSR Firmware v1.1 Certification Report.pdf",
"report_frontpage": {
"anssi": {},
"bsi": {},
"canada": {},
"niap": {},
"nscib": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"TR": {
"21.0.03/18-006": 1,
"21.0.03/TSE-CCCS-60": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 3
},
"ASE": {
"ASE_CCL": 1
},
"ATE": {
"ATE_DPT.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 4+": 1,
"EAL2": 1,
"EAL4+": 2
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {
"org": {
"org.tr": 1
}
},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2012-09-004": 1
},
"ISO": {
"ISO/IEC 17025": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20190710130503+02\u002700\u0027",
"/Creator": "Canon iR-ADV C5240 PDF",
"/Producer": "Adobe PSL 1.2e for Canon\u0000",
"pdf_file_size_bytes": 1103811,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 16
},
"st_filename": "E-Bio-KEC-ST-v1.6.docx",
"st_frontpage": null,
"st_keywords": null,
"st_metadata": null
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/SSR_Application_Firmware_PP_v2.8.pdf",
"pp_name": "Protection Profile for Application Firmware of Secure Smartcard Reader for Electronic Identity Verifi..."
}
]
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/E-Bio%20KEC%20SSR%20Firmware%20v1.1%20Certification%20Report.pdf",
"scheme": "TR",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+",
"ALC_DVS.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/E-Bio-KEC-ST-v1.6.docx",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"report_convert_garbage": true,
"report_convert_ok": true,
"report_download_ok": true,
"report_extract_ok": true,
"report_pdf_hash": "475a9d254e691c1045a3d4cd2282e2d96b1a1f2bf4ffecfcbe0a8558bc42d6b9",
"report_txt_hash": "3e0d0bc03a048e7091f6e058187230bc78d19b60501e2db7a9095d92bd9bcdee",
"st_convert_garbage": true,
"st_convert_ok": false,
"st_download_ok": true,
"st_extract_ok": false,
"st_pdf_hash": "b2d4e640e6909873adda441794314e0e888e0058bb72295e72d7211ed3def2d1",
"st_txt_hash": null
},
"status": "active"
}