TPM 2.0 Hardware version FB5C85D, Firmware version 1.3.0.1

CSV information ?

Status archived
Valid from 22.07.2016
Valid until 22.07.2016
Scheme 🇫🇷 FR
Manufacturer Nuvoton Technology
Category Trusted Computing
Security level ALC_DVS.2, ALC_FLR.1, EAL4+, AVA_VAN.4
Maintenance updates ANSSI-CC-2016/15-M02 (13.02.2017) Certification report
ANSSI-CC-2016/15-M01 (14.11.2016) Certification report

Heuristics summary ?

Certificate ID: ANSSI-CC-2016/15

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES, HMAC
Asymmetric Algorithms
ECC
Hash functions
SHA1, SHA-1, SHA-256

Security level
EAL 4, EAL2, EAL7, EAL 1, EAL 3, EAL 5, EAL 7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR.1, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_LCD, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.4, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Protection profiles
ANSSI-CC-PP-2015/07
Certificates
ANSSI-CC-2016/15
Evaluation facilities
Serma Safety & Security

Standards
CCMB-2012-09-004

File metadata

Title: ANSSI-CC-2016-15
Pages: 15
Creator: PDFCreator Version 1.2.1
Producer: GPL Ghostscript 9.02

Frontpage

Certificate ID: ANSSI-CC-2016/15
Certified item: TPM 2.0
Certification lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
Developer: Nuvoton Technology Israel Ltd. 8 Hasadnaot St, POB 3007, Herzlia B. 46130, Israël Commanditaire Nuvoton Technology Israel Ltd. 8 Hasadnaot St, POB 3007, Herzlia B. 46130, Israël

References

Incoming
  • ANSSI-CC-2017/55 - NPCT6xx TPM 2.0 Hardware version FB5C85D and FB5C85E, Firmware version 1.3.0.1, 1.3.1.0 and 1.3.2.8

Security target ?

Extracted keywords

Symmetric Algorithms
AES, AES-, HMAC
Asymmetric Algorithms
RSA 2048, RSA 1024, ECDH, ECDSA, ECC
Hash functions
SHA-1, SHA1, SHA-256
Randomness
RNG
Elliptic Curves
P-256
Block cipher modes
CTR, CFB, OFB

Vendor
Microsoft

Security level
EAL 4, EAL4, EAL 4 augmented, EAL4 augmented
Claims
O.C, O.DAC, O.ECDAA, R.O, OE.ECDAA, OSP.ECDAA
Security Assurance Requirements (SAR)
ALC_FLR.1, ALC_DVS.2, AVA_VAN.4
Security Functional Requirements (SFR)
FCO_NRO, FCO_NRO.1, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1, FCS_CKM.4.1, FCS_COP, FCS_RNG.2, FDP_ACC.1, FDP_IFC.1, FDP_RIP.1, FDP_RIP.1.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC, FDP_ACF.1, FDP_ACC.2, FDP_ACF, FDP_UIT, FDP_UIT.1, FDP_SDI.1, FDP_SDI.1.1, FDP_ETC, FDP_ETC.2, FDP_ITC, FDP_UCT, FDP_UCT.1, FDP_ETC.1, FIA_UID.1, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_AFL, FIA_UAU.1, FIA_AFL.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_UAU.6.1, FIA_USB.1, FIA_ATD.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA.2, FMT_MSA.1, FMT_MSA.2.1, FMT_MSA, FMT_MSA.4, FMT_MTD, FMT_MTD.1, FMT_MSA.3, FMT_MOF, FMT_MOF.1, FPT_STM.1, FPT_STM.1.1, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS, FPT_FLS.1, FPT_PHP.3, FPT_PHP.3.1, FPT_TDC.1, FTP_ITC.1, FTP_TRP.1, FTP_ITC, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3
Protection profiles
ANSSI-CC-PP-2015/07

Side-channel analysis
physical probing, Physical Tampering, physical tampering, malfunction, Malfunction

Standards
FIPS140-2, FIPS 186-3, FIPS 140-2, FIPS 180-4, FIPS 198-1, FIPS 180, FIPS PUB 180-2, FIPS180-4, FIPS186-4, FIPS PUB 186-4, FIPS198-1, FIPS 197, FIPS 180-1, NIST SP 800-90A, PKCS#1, PKCS #1, AIS31, RFC 3447, ISO/IEC 15408, ISO/IEC 14888-3, ISO/IEC 9797-2, ISO/IEC 18033-3, ISO/IEC 15946-1, ISO/IEC 10116:2006, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003

File metadata

Title: Developer Document
Subject: Security Target
Author: Karsten Grans
Creation date: D:20160712145056+03'00'
Modification date: D:20160712145056+03'00'
Pages: 87
Creator: Microsoft® Word 2010
Producer: Microsoft® Word 2010

References

Incoming

Heuristics ?

Certificate ID: ANSSI-CC-2016/15

Extracted SARs

AVA_VAN.4, ALC_DVS.2, ALC_FLR.1

Scheme data ?

Product TPM 2.0 - Hardware version FB5C85D, Firmware version 1.3.0.1
Url https://cyber.gouv.fr/produits-certifies/tpm-20-hardware-version-fb5c85d-firmware-version-1301
Description Le produit certifiĂ© est « TPM 2.0, Hardware version FB5C85D, » dĂ©veloppĂ© par NUVOTON TECHNOLOGY ISRAEL LTD. Ce produit est destinĂ© Ă  garantir l’intĂ©gritĂ© matĂ©rielle et logicielle des plateformes de confiance (serveurs, ordinateurs, etc.) conformĂ©ment aux spĂ©cifications fonctionnelles TPM(Trusted Platform Module).  
Sponsor Nuvoton Technology Israel Ltd.
Developer Nuvoton Technology Israel Ltd.
Cert Id 2016/15
Level EAL4+
Enhanced
Cert Id 2016/15
Certification Date 22/07/2016
Category Micro-circuits
Cc Version Critères Communs version 3.1r4
Developer Nuvoton Technology Israel Ltd.
Sponsor Nuvoton Technology Israel Ltd.
Evaluation Facility Serma Safety & Security
Level EAL4+
Protection Profile ANSSI-CC-PP-2015/07
Mutual Recognition SOG-IS CCRA
Augmented ALC_DVS.2, ALC_FLR.1, AVA_VAN.4
Target Link https://cyber.gouv.fr/sites/default/files/2016/07/cible_lite_2016_15-m02.pdf
Report Link https://cyber.gouv.fr/sites/default/files/2016/07/anssi-cc-2016-15.pdf

References ?

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'c96314dd0710bc9b2a6923fa0df18aba4f0bbfb149e854aae39a7d7df004651d', 'txt_hash': '632491f176b15a08a3ae73ebe37bc636298bc8dd38b453a538f76c9ef2ea419f'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '07ddc15f4927a9831eccd075fbde1929b4bca043ddd881287359466bfa5143ba', 'txt_hash': '70aec6450854804728c5dd3aa9820c1652a5c9a9b9634e0201f73d906c2e7a69'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': None, 'cert_filename': None}.
    • The report_frontpage property was set to {'FR': {'match_rules': ['RĂ©fĂ©rence du rapport de certification(.+)Nom du produit(.+)RĂ©fĂ©rence/version du produit(.+)ConformitĂ© Ă  un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)DĂ©veloppeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2016/15', 'cert_item': 'TPM 2.0', 'cert_item_version': 'Hardware version FB5C85D, Firmware version 1.3.0.1', 'ref_protection_profiles': 'ANSSI-CC-PP-2015/07] PC Client Specific Trusted Platform Module, Family 2.0, Level 0, Revision v1.16, Version 1.0', 'cc_version': 'Critères Communs version 3.1 rĂ©vision 4', 'cc_security_level': 'EAL 4 augmentĂ© ALC_DVS.2, ALC_FLR.1, AVA_VAN.4', 'developer': 'Nuvoton Technology Israel Ltd. 8 Hasadnaot St, POB 3007, Herzlia B. 46130, IsraĂ«l Commanditaire Nuvoton Technology Israel Ltd. 8 Hasadnaot St, POB 3007, Herzlia B. 46130, IsraĂ«l', 'cert_lab': 'Serma Safety & Security 14 rue GalilĂ©e, CS 10055, 33615 Pessac Cedex, France'}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'FR': {'__update__': {'ANSSI-CC-2016/15': 16}}}}} data.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'FR': {'__update__': {'ANSSI-CC-2016/15': 32}}}}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__delete__': ['CA']}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'CA': {'1 1 1': 21, '1 2 3': 5, '5 5 6': 1, '1 1 2': 1, '2 3 3': 1, '5 6 3': 1, '4 5 5': 2, '5 5 5': 1, '1 2 2': 5, '2 2 2': 2, '3 3 2': 1, '1 1 3': 1, '2 2 1': 1, '2 2 3': 1}}, '__update__': {'FR': {'__update__': {'ANSSI-CC-2016/15': 16}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'CA': {'886-3-5770066': 1, '886-3-5665577': 1}}} data.
  • 05.02.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'TPM 2.0 - Hardware version FB5C85D, Firmware version 1.3.0.1', 'url': 'https://cyber.gouv.fr/produits-certifies/tpm-20-hardware-version-fb5c85d-firmware-version-1301', 'description': 'Le produit certifiĂ© est « TPM 2.0, Hardware version FB5C85D, » dĂ©veloppĂ© par NUVOTON TECHNOLOGY ISRAEL LTD.\n\nCe produit est destinĂ© Ă  garantir l’intĂ©gritĂ© matĂ©rielle et logicielle des plateformes de confiance (serveurs, ordinateurs, etc.) conformĂ©ment aux spĂ©cifications fonctionnelles TPM(Trusted Platform Module).\n\n ', 'sponsor': 'Nuvoton Technology Israel Ltd.', 'developer': 'Nuvoton Technology Israel Ltd.', 'cert_id': '2016/15', 'level': 'EAL4+', 'enhanced': {'cert_id': '2016/15', 'certification_date': '22/07/2016', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r4', 'developer': 'Nuvoton Technology Israel Ltd.', 'sponsor': 'Nuvoton Technology Israel Ltd.', 'evaluation_facility': 'Serma Safety & Security', 'level': 'EAL4+', 'protection_profile': 'ANSSI-CC-PP-2015/07', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, ALC_FLR.1, AVA_VAN.4', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2016/07/cible_lite_2016_15-m02.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2016/07/anssi-cc-2016-15.pdf'}}.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': None}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2016-11-14', 'maintenance_title': 'ANSSI-CC-2016/15-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2016_15_M01.pdf', 'maintenance_st_link': None}, {'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2017-02-13', 'maintenance_title': 'ANSSI-CC-2016/15-M02', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2016_15_M02.pdf', 'maintenance_st_link': None}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 07ddc15f4927a9831eccd075fbde1929b4bca043ddd881287359466bfa5143ba.
    • The st_txt_hash property was set to 70aec6450854804728c5dd3aa9820c1652a5c9a9b9634e0201f73d906c2e7a69.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1498848, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 87, '/Title': 'Developer Document', '/Author': 'Karsten Grans', '/Subject': 'Security Target', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20160712145056+03'00'", '/ModDate': "D:20160712145056+03'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FMT_MSA_2_States', 'http://www.nuvoton.com.tw/', 'http://www.nuvoton.com/', 'file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FDP_ACF_1_States', 'file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FPT_FLS_1_States', 'file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23FDP_UCT_1_FW', 'mailto:APC.Support@nuvoton.com', 'https://www.trustedcomputinggroup.org/home', 'http://www.rsa.com/']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2015/07': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL4': 2, 'EAL 4 augmented': 1, 'EAL4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 3, 'ALC_DVS.2': 3}, 'AVA': {'AVA_VAN.4': 3}}, 'cc_sfr': {'FCO': {'FCO_NRO': 4, 'FCO_NRO.1': 6}, 'FCS': {'FCS_RNG.1': 2, 'FCS_RNG.1.1': 1, 'FCS_RNG.1.2': 1, 'FCS_CKM': 8, 'FCS_CKM.2': 4, 'FCS_COP.1': 12, 'FCS_CKM.4': 14, 'FCS_CKM.1': 13, 'FCS_CKM.4.1': 1, 'FCS_COP': 16, 'FCS_RNG.2': 1}, 'FDP': {'FDP_ACC.1': 34, 'FDP_IFC.1': 19, 'FDP_RIP.1': 2, 'FDP_RIP.1.1': 1, 'FDP_ITC.1': 12, 'FDP_ITC.2': 14, 'FDP_ACC': 14, 'FDP_ACF.1': 35, 'FDP_ACC.2': 2, 'FDP_ACF': 17, 'FDP_UIT': 8, 'FDP_UIT.1': 4, 'FDP_SDI.1': 2, 'FDP_SDI.1.1': 1, 'FDP_ETC': 4, 'FDP_ETC.2': 4, 'FDP_ITC': 4, 'FDP_UCT': 6, 'FDP_UCT.1': 2, 'FDP_ETC.1': 2}, 'FIA': {'FIA_UID.1': 6, 'FIA_SOS.2': 2, 'FIA_SOS.2.1': 1, 'FIA_SOS.2.2': 1, 'FIA_AFL': 4, 'FIA_UAU.1': 4, 'FIA_AFL.1': 4, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.5': 2, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6': 2, 'FIA_UAU.6.1': 1, 'FIA_USB.1': 2, 'FIA_ATD.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_SMR.1': 20, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1': 12, 'FMT_SMF.1.1': 1, 'FMT_MSA.2': 4, 'FMT_MSA.1': 15, 'FMT_MSA.2.1': 1, 'FMT_MSA': 34, 'FMT_MSA.4': 3, 'FMT_MTD': 4, 'FMT_MTD.1': 2, 'FMT_MSA.3': 22, 'FMT_MOF': 2, 'FMT_MOF.1': 1}, 'FPT': {'FPT_STM.1': 2, 'FPT_STM.1.1': 1, 'FPT_TST.1': 4, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_FLS': 6, 'FPT_FLS.1': 2, 'FPT_PHP.3': 2, 'FPT_PHP.3.1': 1, 'FPT_TDC.1': 1}, 'FTP': {'FTP_ITC.1': 5, 'FTP_TRP.1': 5, 'FTP_ITC': 2, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.C': 5, 'O.DAC': 1, 'O.ECDAA': 2}, 'R': {'R.O': 5}, 'OE': {'OE.ECDAA': 2}, 'OSP': {'OSP.ECDAA': 2}}, 'vendor': {'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 9, 'AES-': 1}}, 'constructions': {'MAC': {'HMAC': 27}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 1, 'RSA 1024': 1}, 'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 21}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 6, 'SHA1': 1}, 'SHA2': {'SHA-256': 8}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 18}}, 'cipher_mode': {'CTR': {'CTR': 2}, 'CFB': {'CFB': 2}, 'OFB': {'OFB': 2}}, 'ecc_curve': {'NIST': {'P-256': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1}, 'FI': {'Physical Tampering': 2, 'physical tampering': 2, 'malfunction': 2, 'Malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS140-2': 2, 'FIPS 186-3': 7, 'FIPS 140-2': 3, 'FIPS 180-4': 1, 'FIPS 198-1': 2, 'FIPS 180': 1, 'FIPS PUB 180-2': 1, 'FIPS180-4': 1, 'FIPS186-4': 1, 'FIPS PUB 186-4': 1, 'FIPS198-1': 1, 'FIPS 197': 2, 'FIPS 180-1': 1}, 'NIST': {'NIST SP 800-90A': 2}, 'PKCS': {'PKCS#1': 2, 'PKCS #1': 2}, 'BSI': {'AIS31': 1}, 'RFC': {'RFC 3447': 1}, 'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 14888-3': 1, 'ISO/IEC 9797-2': 1, 'ISO/IEC 18033-3': 1, 'ISO/IEC 15946-1': 1, 'ISO/IEC 10116:2006': 1}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {'com': {'com.tw': 1}}, 'certification_process': {}}.
    • The st_filename property was set to ANSSI_cible2016_15en.pdf.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/ANSSI_cible2016_15en.pdf, code: 408'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was updated.
    • The st_pdf_hash property was set to 07ddc15f4927a9831eccd075fbde1929b4bca043ddd881287359466bfa5143ba.
    • The st_txt_hash property was set to 70aec6450854804728c5dd3aa9820c1652a5c9a9b9634e0201f73d906c2e7a69.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1498848, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 87, '/Title': 'Developer Document', '/Author': 'Karsten Grans', '/Subject': 'Security Target', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20160712145056+03'00'", '/ModDate': "D:20160712145056+03'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FMT_MSA_2_States', 'http://www.nuvoton.com.tw/', 'http://www.nuvoton.com/', 'file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FDP_ACF_1_States', 'file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FPT_FLS_1_States', 'file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23FDP_UCT_1_FW', 'mailto:APC.Support@nuvoton.com', 'https://www.trustedcomputinggroup.org/home', 'http://www.rsa.com/']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2015/07': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL4': 2, 'EAL 4 augmented': 1, 'EAL4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 3, 'ALC_DVS.2': 3}, 'AVA': {'AVA_VAN.4': 3}}, 'cc_sfr': {'FCO': {'FCO_NRO': 4, 'FCO_NRO.1': 6}, 'FCS': {'FCS_RNG.1': 2, 'FCS_RNG.1.1': 1, 'FCS_RNG.1.2': 1, 'FCS_CKM': 8, 'FCS_CKM.2': 4, 'FCS_COP.1': 12, 'FCS_CKM.4': 14, 'FCS_CKM.1': 13, 'FCS_CKM.4.1': 1, 'FCS_COP': 16, 'FCS_RNG.2': 1}, 'FDP': {'FDP_ACC.1': 34, 'FDP_IFC.1': 19, 'FDP_RIP.1': 2, 'FDP_RIP.1.1': 1, 'FDP_ITC.1': 12, 'FDP_ITC.2': 14, 'FDP_ACC': 14, 'FDP_ACF.1': 35, 'FDP_ACC.2': 2, 'FDP_ACF': 17, 'FDP_UIT': 8, 'FDP_UIT.1': 4, 'FDP_SDI.1': 2, 'FDP_SDI.1.1': 1, 'FDP_ETC': 4, 'FDP_ETC.2': 4, 'FDP_ITC': 4, 'FDP_UCT': 6, 'FDP_UCT.1': 2, 'FDP_ETC.1': 2}, 'FIA': {'FIA_UID.1': 6, 'FIA_SOS.2': 2, 'FIA_SOS.2.1': 1, 'FIA_SOS.2.2': 1, 'FIA_AFL': 4, 'FIA_UAU.1': 4, 'FIA_AFL.1': 4, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.5': 2, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6': 2, 'FIA_UAU.6.1': 1, 'FIA_USB.1': 2, 'FIA_ATD.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_SMR.1': 20, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1': 12, 'FMT_SMF.1.1': 1, 'FMT_MSA.2': 4, 'FMT_MSA.1': 15, 'FMT_MSA.2.1': 1, 'FMT_MSA': 34, 'FMT_MSA.4': 3, 'FMT_MTD': 4, 'FMT_MTD.1': 2, 'FMT_MSA.3': 22, 'FMT_MOF': 2, 'FMT_MOF.1': 1}, 'FPT': {'FPT_STM.1': 2, 'FPT_STM.1.1': 1, 'FPT_TST.1': 4, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_FLS': 6, 'FPT_FLS.1': 2, 'FPT_PHP.3': 2, 'FPT_PHP.3.1': 1, 'FPT_TDC.1': 1}, 'FTP': {'FTP_ITC.1': 5, 'FTP_TRP.1': 5, 'FTP_ITC': 2, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.C': 5, 'O.DAC': 1, 'O.ECDAA': 2}, 'R': {'R.O': 5}, 'OE': {'OE.ECDAA': 2}, 'OSP': {'OSP.ECDAA': 2}}, 'vendor': {'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 9, 'AES-': 1}}, 'constructions': {'MAC': {'HMAC': 27}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 1, 'RSA 1024': 1}, 'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 21}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 6, 'SHA1': 1}, 'SHA2': {'SHA-256': 8}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 18}}, 'cipher_mode': {'CTR': {'CTR': 2}, 'CFB': {'CFB': 2}, 'OFB': {'OFB': 2}}, 'ecc_curve': {'NIST': {'P-256': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1}, 'FI': {'Physical Tampering': 2, 'physical tampering': 2, 'malfunction': 2, 'Malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS140-2': 2, 'FIPS 186-3': 7, 'FIPS 140-2': 3, 'FIPS 180-4': 1, 'FIPS 198-1': 2, 'FIPS 180': 1, 'FIPS PUB 180-2': 1, 'FIPS180-4': 1, 'FIPS186-4': 1, 'FIPS PUB 186-4': 1, 'FIPS198-1': 1, 'FIPS 197': 2, 'FIPS 180-1': 1}, 'NIST': {'NIST SP 800-90A': 2}, 'PKCS': {'PKCS#1': 2, 'PKCS #1': 2}, 'BSI': {'AIS31': 1}, 'RFC': {'RFC 3447': 1}, 'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 14888-3': 1, 'ISO/IEC 9797-2': 1, 'ISO/IEC 18033-3': 1, 'ISO/IEC 15946-1': 1, 'ISO/IEC 10116:2006': 1}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {'com': {'com.tw': 1}}, 'certification_process': {}}.
    • The st_filename property was set to ANSSI_cible2016_15en.pdf.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2016-15.pdf, code: nok', 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/ANSSI_cible2016_15en.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PC Client Specific Trusted Platform Module (Family 2.0, Level 0, Revision 1.16, Version 1.0)...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/TCG_PP_PC_client_specific_TPM_SecV2_v10.pdf', 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PC Client Specific Trusted Platform Module (Family 2.0, Level 0, Revision 1.16, Version 1.0)...', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/TCG_PP_PC_client_specific_TPM_SecV2_v10.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'ANSSI-CC-2016-15.pdf', 'st_filename': 'ANSSI_cible2016_15en.pdf'}.
    • The report_frontpage property was updated, with the {'anssi': {'__update__': {'ref_protection_profiles': 'ANSSI-CC-PP-2015/07] PC Client Specific Trusted Platform Module, Family 2.0, Level 0, Revision v1.16, Version 1.0'}}} data.
    • The report_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__insert__': {'EAL7': 1}, '__update__': {'EAL 4': 2, 'EAL2': 2}, '__delete__': ['EAL 2', 'EAL 6', 'EAL 4+']}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_CMS': 1, 'ALC_FLR': 2}}, 'AVA': {'__update__': {'AVA_VAN.4': 4}}}}, 'cc_claims': {}, 'eval_facility': {'__update__': {'Serma': {'__update__': {'Serma Safety & Security': 2}}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 1}}}}}}, 'asymmetric_crypto': {'__update__': {'ECC': {'__update__': {'ECC': {'__update__': {'ECC': 1}}}}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__update__': {'SHA-256': 1}}}}}}, 'crypto_scheme': {}, 'tee_name': {}, 'standard_id': {'CC': {'CCMB-2012-09-004': 1}}} data.
    • The st_keywords property was updated, with the {'cc_sar': {'__update__': {'ALC': {'__insert__': {'ALC_DVS.2': 3}}}}, 'cc_sfr': {'__insert__': {'FCO': {'FCO_NRO': 4, 'FCO_NRO.1': 6}}, '__update__': {'FCS': {'__insert__': {'FCS_CKM': 8, 'FCS_COP': 16}, '__update__': {'FCS_RNG.1': 2, 'FCS_COP.1': 12, 'FCS_CKM.1': 13}}, 'FDP': {'__insert__': {'FDP_ACC': 14, 'FDP_ACC.2': 2, 'FDP_ACF': 17, 'FDP_UIT': 8, 'FDP_UIT.1': 4, 'FDP_ETC': 4, 'FDP_ETC.2': 4, 'FDP_ITC': 4, 'FDP_UCT': 6, 'FDP_UCT.1': 2, 'FDP_ETC.1': 2}, '__update__': {'FDP_ACC.1': 34, 'FDP_ITC.1': 12, 'FDP_ITC.2': 14, 'FDP_ACF.1': 35}}, 'FIA': {'__insert__': {'FIA_AFL': 4, 'FIA_AFL.1': 4}}, 'FMT': {'__insert__': {'FMT_MSA': 34, 'FMT_MSA.4': 3, 'FMT_MTD': 4, 'FMT_MTD.1': 2, 'FMT_MOF': 2, 'FMT_MOF.1': 1}, '__update__': {'FMT_MSA.1': 15, 'FMT_MSA.3': 22}}, 'FPT': {'__insert__': {'FPT_FLS': 6, 'FPT_FLS.1': 2}}, 'FTP': {'__insert__': {'FTP_ITC': 2}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.DAC': 1}}, 'R': {'R.O': 5}, 'OE': {'__delete__': ['OE']}}}, 'vendor': {'__delete__': ['STMicroelectronics']}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 9}}}}, 'constructions': {'__update__': {'MAC': {'__update__': {'HMAC': 27}}}}}}, 'asymmetric_crypto': {'__update__': {'ECC': {'__update__': {'ECDSA': {'__update__': {'ECDSA': 1}}, 'ECC': {'__update__': {'ECC': 21}}}}}, '__delete__': ['FF']}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__update__': {'SHA-256': 8}}}}}}, 'crypto_scheme': {}, 'tee_name': {}, 'standard_id': {'__update__': {'FIPS': {'__insert__': {'FIPS 180-1': 1}, '__update__': {'FIPS 186-3': 7, 'FIPS 197': 2}}, 'NIST': {'__update__': {'NIST SP 800-90A': 2}}}}} data.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PC Client Specific Trusted Platform Module (Family 2.0, Level 0, Revision 1.16, Version 1.0)...', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/TCG_PP_PC_client_specific_TPM_SecV2_v10.pdf', 'pp_ids': None}]}.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2017-02-13', 'maintenance_title': 'ANSSI-CC-2016/15-M02', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2016_15_M02.pdf', 'maintenance_st_link': None}, {'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2016-11-14', 'maintenance_title': 'ANSSI-CC-2016/15-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2016_15_M01.pdf', 'maintenance_st_link': None}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FMT_MSA_2_States', 'http://www.rsa.com/', 'http://www.nuvoton.com.tw/', 'http://www.nuvoton.com/', 'file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FDP_ACF_1_States', 'file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23FDP_UCT_1_FW', 'mailto:APC.Support@nuvoton.com', 'https://www.trustedcomputinggroup.org/home', 'file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FPT_FLS_1_States']}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2016/15': 32}}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2015/07': 5}}, 'cc_security_level': {'EAL': {'EAL 4': 3, 'EAL2': 1, 'EAL 1': 1, 'EAL 2': 1, 'EAL 3': 1, 'EAL 5': 1, 'EAL 6': 1, 'EAL 7': 1, 'EAL 4+': 1}, 'ITSEC': {'ITSEC E6 ElevĂ©': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_DVS.2': 2, 'ALC_FLR.1': 2, 'ALC_CMC': 1, 'ALC_CMS': 2, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.4': 3, 'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T': 1}}, 'vendor': {}, 'eval_facility': {'Serma': {'Serma Safety & Security': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}, 'DES': {'DES': {'DES': 5}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 1, 'SHA-1': 1}, 'SHA2': {'SHA-256': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 3}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2015/07': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL4': 2, 'EAL 4 augmented': 1, 'EAL4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 3}, 'AVA': {'AVA_VAN.4': 3}}, 'cc_sfr': {'FCS': {'FCS_RNG.1': 3, 'FCS_RNG.1.1': 1, 'FCS_RNG.1.2': 1, 'FCS_CKM.2': 4, 'FCS_COP.1': 4, 'FCS_CKM.4': 14, 'FCS_CKM.1': 9, 'FCS_CKM.4.1': 1, 'FCS_RNG.2': 1}, 'FDP': {'FDP_ACC.1': 28, 'FDP_IFC.1': 19, 'FDP_RIP.1': 2, 'FDP_RIP.1.1': 1, 'FDP_ITC.1': 9, 'FDP_ITC.2': 9, 'FDP_ACF.1': 7, 'FDP_SDI.1': 2, 'FDP_SDI.1.1': 1}, 'FIA': {'FIA_UID.1': 6, 'FIA_SOS.2': 2, 'FIA_SOS.2.1': 1, 'FIA_SOS.2.2': 1, 'FIA_UAU.1': 4, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.5': 2, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6': 2, 'FIA_UAU.6.1': 1, 'FIA_USB.1': 2, 'FIA_ATD.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_SMR.1': 20, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1': 12, 'FMT_SMF.1.1': 1, 'FMT_MSA.2': 4, 'FMT_MSA.1': 8, 'FMT_MSA.2.1': 1, 'FMT_MSA.3': 8}, 'FPT': {'FPT_STM.1': 2, 'FPT_STM.1.1': 1, 'FPT_TST.1': 4, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_PHP.3': 2, 'FPT_PHP.3.1': 1, 'FPT_TDC.1': 1}, 'FTP': {'FTP_ITC.1': 5, 'FTP_TRP.1': 5, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.C': 5, 'O.DAC': 2, 'O.ECDAA': 2}, 'R': {'R': 3, 'R.O.C': 5}, 'OE': {'OE': 1, 'OE.ECDAA': 2}, 'OSP': {'OSP.ECDAA': 2}}, 'vendor': {'STMicroelectronics': {'STM': 3}, 'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 11, 'AES-': 1}}, 'constructions': {'MAC': {'HMAC': 31}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 1, 'RSA 1024': 1}, 'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 4}, 'ECC': {'ECC': 25}}, 'FF': {'DH': {'DH': 1}, 'DSA': {'DSA': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 6, 'SHA1': 1}, 'SHA2': {'SHA-256': 9}}}, 'crypto_scheme': {'MAC': {'MAC': 31}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 18}}, 'cipher_mode': {'CTR': {'CTR': 2}, 'CFB': {'CFB': 2}, 'OFB': {'OFB': 2}}, 'ecc_curve': {'NIST': {'P-256': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1}, 'FI': {'Physical Tampering': 2, 'physical tampering': 2, 'malfunction': 2, 'Malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS140-2': 2, 'FIPS 186-3': 3, 'FIPS 140-2': 3, 'FIPS 180-4': 1, 'FIPS 198-1': 2, 'FIPS 180': 1, 'FIPS PUB 180-2': 1, 'FIPS180-4': 1, 'FIPS186-4': 1, 'FIPS PUB 186-4': 1, 'FIPS198-1': 1, 'FIPS 197': 1}, 'NIST': {'NIST SP 800-90A': 1}, 'PKCS': {'PKCS#1': 2, 'PKCS #1': 2}, 'BSI': {'AIS31': 1}, 'RFC': {'RFC 3447': 1}, 'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 14888-3': 1, 'ISO/IEC 9797-2': 1, 'ISO/IEC 18033-3': 1, 'ISO/IEC 15946-1': 1, 'ISO/IEC 10116:2006': 1}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {'com': {'com.tw': 1}}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': 'c96314dd0710bc9b2a6923fa0df18aba4f0bbfb149e854aae39a7d7df004651d', 'st_pdf_hash': '07ddc15f4927a9831eccd075fbde1929b4bca043ddd881287359466bfa5143ba', 'report_txt_hash': '632491f176b15a08a3ae73ebe37bc636298bc8dd38b453a538f76c9ef2ea419f', 'st_txt_hash': '70aec6450854804728c5dd3aa9820c1652a5c9a9b9634e0201f73d906c2e7a69'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 2, 'DES': 5, 'HMAC': 1}, 'rules_asymmetric_crypto': {'ECC': 2}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA1': 1, 'SHA-1': 1, 'SHA-256': 2}, 'rules_crypto_schemes': {'MAC': 1}, 'rules_randomness': {}, 'rules_tee': {'SE': 3}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 11, 'AES-': 1, 'HMAC': 31}, 'rules_asymmetric_crypto': {'RSA 2048': 1, 'RSA 1024': 1, 'ECDH': 1, 'ECDSA': 4, 'ECC': 25, 'DH': 1, 'DSA': 4}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 6, 'SHA1': 1, 'SHA-256': 9}, 'rules_crypto_schemes': {'MAC': 31}, 'rules_randomness': {'RNG': 18}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {'malfunction': 2, 'Malfunction': 2, 'physical probing': 1, 'Physical Tampering': 2, 'physical tampering': 2}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'AVA_VAN', 'level': 4}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 1}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/55']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/55']}, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['1.3.0.1', '2.0']}.
    • The directly_affected_by property was set to {'_type': 'Set', 'elements': ['ANSSI-CC-2017/55']}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name TPM 2.0 Hardware version FB5C85D, Firmware version 1.3.0.1 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Trusted Computing",
  "cert_link": null,
  "dgst": "4e7b5a210809acf9",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2016/15",
    "cert_lab": [
      "SERMA"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.3.0.1",
        "2.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2017/55"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2017/55"
        ]
      },
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "2016/15",
      "description": "Le produit certifi\u00e9 est \u00ab TPM 2.0, Hardware version FB5C85D, \u00bb d\u00e9velopp\u00e9 par NUVOTON TECHNOLOGY ISRAEL LTD.\n\nCe produit est destin\u00e9 \u00e0 garantir l\u2019int\u00e9grit\u00e9 mat\u00e9rielle et logicielle des plateformes de confiance (serveurs, ordinateurs, etc.) conform\u00e9ment aux sp\u00e9cifications fonctionnelles TPM(Trusted Platform Module).\n\n\u0026nbsp;",
      "developer": "Nuvoton Technology Israel Ltd.",
      "enhanced": {
        "augmented": "ALC_DVS.2, ALC_FLR.1, AVA_VAN.4",
        "category": "Micro-circuits",
        "cc_version": "Crit\u00e8res Communs version 3.1r4",
        "cert_id": "2016/15",
        "certification_date": "22/07/2016",
        "developer": "Nuvoton Technology Israel Ltd.",
        "evaluation_facility": "Serma Safety \u0026 Security",
        "level": "EAL4+",
        "mutual_recognition": "SOG-IS\n                          CCRA",
        "protection_profile": "ANSSI-CC-PP-2015/07",
        "report_link": "https://cyber.gouv.fr/sites/default/files/2016/07/anssi-cc-2016-15.pdf",
        "sponsor": "Nuvoton Technology Israel Ltd.",
        "target_link": "https://cyber.gouv.fr/sites/default/files/2016/07/cible_lite_2016_15-m02.pdf"
      },
      "level": "EAL4+",
      "product": "TPM 2.0 - Hardware version FB5C85D, Firmware version 1.3.0.1",
      "sponsor": "Nuvoton Technology Israel Ltd.",
      "url": "https://cyber.gouv.fr/produits-certifies/tpm-20-hardware-version-fb5c85d-firmware-version-1301"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2016-11-14",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2016_15_M01.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "ANSSI-CC-2016/15-M01"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2017-02-13",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2016_15_M02.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "ANSSI-CC-2016/15-M02"
      }
    ]
  },
  "manufacturer": "Nuvoton Technology",
  "manufacturer_web": null,
  "name": "TPM 2.0 Hardware version FB5C85D, Firmware version 1.3.0.1",
  "not_valid_after": "2016-07-22",
  "not_valid_before": "2016-07-22",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "ANSSI-CC-2016-15.pdf",
    "report_frontpage": {
      "FR": {
        "cc_security_level": "EAL 4 augment\u00e9 ALC_DVS.2, ALC_FLR.1, AVA_VAN.4",
        "cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 4",
        "cert_id": "ANSSI-CC-2016/15",
        "cert_item": "TPM 2.0",
        "cert_item_version": "Hardware version FB5C85D, Firmware version 1.3.0.1",
        "cert_lab": "Serma Safety \u0026 Security 14 rue Galil\u00e9e, CS 10055, 33615 Pessac Cedex, France",
        "developer": "Nuvoton Technology Israel Ltd. 8 Hasadnaot St, POB 3007, Herzlia B. 46130, Isra\u00ebl Commanditaire Nuvoton Technology Israel Ltd. 8 Hasadnaot St, POB 3007, Herzlia B. 46130, Isra\u00ebl",
        "match_rules": [
          "R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.+)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeur (.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
        ],
        "ref_protection_profiles": "ANSSI-CC-PP-2015/07] PC Client Specific Trusted Platform Module, Family 2.0, Level 0, Revision v1.16, Version 1.0"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          }
        }
      },
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2016/15": 16
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-2015/07": 5
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_FSP": 1,
          "ADV_IMP": 1,
          "ADV_INT": 1,
          "ADV_SPM": 1,
          "ADV_TDS": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_PRE": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1,
          "ALC_DEL": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 2,
          "ALC_FLR": 2,
          "ALC_FLR.1": 2,
          "ALC_LCD": 1,
          "ALC_TAT": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.4": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 1,
          "EAL 4": 2,
          "EAL 5": 1,
          "EAL 7": 1,
          "EAL2": 2,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "Serma Safety \u0026 Security": 2
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1,
            "SHA1": 1
          },
          "SHA2": {
            "SHA-256": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2012-09-004": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 2
          }
        },
        "DES": {
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "",
      "/CreationDate": "",
      "/Creator": "PDFCreator Version 1.2.1",
      "/Keywords": "",
      "/ModDate": "",
      "/Producer": "GPL Ghostscript 9.02",
      "/Subject": "",
      "/Title": "ANSSI-CC-2016-15",
      "pdf_file_size_bytes": 571547,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 15
    },
    "st_filename": "ANSSI_cible2016_15en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 21
          },
          "ECDH": {
            "ECDH": 1
          },
          "ECDSA": {
            "ECDSA": 1
          }
        },
        "RSA": {
          "RSA 1024": 1,
          "RSA 2048": 1
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.C": 5,
          "O.DAC": 1,
          "O.ECDAA": 2
        },
        "OE": {
          "OE.ECDAA": 2
        },
        "OSP": {
          "OSP.ECDAA": 2
        },
        "R": {
          "R.O": 5
        }
      },
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-2015/07": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 3,
          "ALC_FLR.1": 3
        },
        "AVA": {
          "AVA_VAN.4": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL 4 augmented": 1,
          "EAL4": 2,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {
        "FCO": {
          "FCO_NRO": 4,
          "FCO_NRO.1": 6
        },
        "FCS": {
          "FCS_CKM": 8,
          "FCS_CKM.1": 13,
          "FCS_CKM.2": 4,
          "FCS_CKM.4": 14,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 16,
          "FCS_COP.1": 12,
          "FCS_RNG.1": 2,
          "FCS_RNG.1.1": 1,
          "FCS_RNG.1.2": 1,
          "FCS_RNG.2": 1
        },
        "FDP": {
          "FDP_ACC": 14,
          "FDP_ACC.1": 34,
          "FDP_ACC.2": 2,
          "FDP_ACF": 17,
          "FDP_ACF.1": 35,
          "FDP_ETC": 4,
          "FDP_ETC.1": 2,
          "FDP_ETC.2": 4,
          "FDP_IFC.1": 19,
          "FDP_ITC": 4,
          "FDP_ITC.1": 12,
          "FDP_ITC.2": 14,
          "FDP_RIP.1": 2,
          "FDP_RIP.1.1": 1,
          "FDP_SDI.1": 2,
          "FDP_SDI.1.1": 1,
          "FDP_UCT": 6,
          "FDP_UCT.1": 2,
          "FDP_UIT": 8,
          "FDP_UIT.1": 4
        },
        "FIA": {
          "FIA_AFL": 4,
          "FIA_AFL.1": 4,
          "FIA_ATD.1": 1,
          "FIA_SOS.2": 2,
          "FIA_SOS.2.1": 1,
          "FIA_SOS.2.2": 1,
          "FIA_UAU.1": 4,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.5": 2,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6": 2,
          "FIA_UAU.6.1": 1,
          "FIA_UID.1": 6,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB.1": 2,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MOF": 2,
          "FMT_MOF.1": 1,
          "FMT_MSA": 34,
          "FMT_MSA.1": 15,
          "FMT_MSA.2": 4,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 22,
          "FMT_MSA.4": 3,
          "FMT_MTD": 4,
          "FMT_MTD.1": 2,
          "FMT_SMF.1": 12,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 20,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FLS": 6,
          "FPT_FLS.1": 2,
          "FPT_PHP.3": 2,
          "FPT_PHP.3.1": 1,
          "FPT_STM.1": 2,
          "FPT_STM.1.1": 1,
          "FPT_TDC.1": 1,
          "FPT_TST.1": 4,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 2,
          "FTP_ITC.1": 5,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 5
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CFB": {
          "CFB": 2
        },
        "CTR": {
          "CTR": 2
        },
        "OFB": {
          "OFB": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 2
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 6,
            "SHA1": 1
          },
          "SHA2": {
            "SHA-256": 8
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {
        "com": {
          "com.tw": 1
        }
      },
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 18
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 2,
          "Physical Tampering": 2,
          "malfunction": 2,
          "physical tampering": 2
        },
        "SCA": {
          "physical probing": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 1
        },
        "CC": {
          "CCMB-2012-09-001": 1,
          "CCMB-2012-09-002": 1,
          "CCMB-2012-09-003": 1
        },
        "FIPS": {
          "FIPS 140-2": 3,
          "FIPS 180": 1,
          "FIPS 180-1": 1,
          "FIPS 180-4": 1,
          "FIPS 186-3": 7,
          "FIPS 197": 2,
          "FIPS 198-1": 2,
          "FIPS PUB 180-2": 1,
          "FIPS PUB 186-4": 1,
          "FIPS140-2": 2,
          "FIPS180-4": 1,
          "FIPS186-4": 1,
          "FIPS198-1": 1
        },
        "ISO": {
          "ISO/IEC 10116:2006": 1,
          "ISO/IEC 14888-3": 1,
          "ISO/IEC 15408": 2,
          "ISO/IEC 15946-1": 1,
          "ISO/IEC 18033-3": 1,
          "ISO/IEC 9797-2": 1
        },
        "NIST": {
          "NIST SP 800-90A": 2
        },
        "PKCS": {
          "PKCS #1": 2,
          "PKCS#1": 2
        },
        "RFC": {
          "RFC 3447": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 9,
            "AES-": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 27
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Karsten Grans",
      "/CreationDate": "D:20160712145056+03\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/ModDate": "D:20160712145056+03\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "/Subject": "Security Target",
      "/Title": "Developer Document",
      "pdf_file_size_bytes": 1498848,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.nuvoton.com/",
          "file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23FDP_UCT_1_FW",
          "https://www.trustedcomputinggroup.org/home",
          "mailto:APC.Support@nuvoton.com",
          "file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FPT_FLS_1_States",
          "file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FDP_ACF_1_States",
          "http://www.rsa.com/",
          "http://www.nuvoton.com.tw/",
          "file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FMT_MSA_2_States"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 87
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/TCG_PP_PC_client_specific_TPM_SecV2_v10.pdf",
        "pp_name": "PC Client Specific Trusted Platform Module (Family 2.0, Level 0, Revision 1.16, Version 1.0)..."
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2016-15.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_DVS.2",
      "ALC_FLR.1",
      "AVA_VAN.4"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI_cible2016_15en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "c96314dd0710bc9b2a6923fa0df18aba4f0bbfb149e854aae39a7d7df004651d",
      "txt_hash": "632491f176b15a08a3ae73ebe37bc636298bc8dd38b453a538f76c9ef2ea419f"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "07ddc15f4927a9831eccd075fbde1929b4bca043ddd881287359466bfa5143ba",
      "txt_hash": "70aec6450854804728c5dd3aa9820c1652a5c9a9b9634e0201f73d906c2e7a69"
    }
  },
  "status": "archived"
}