NXP SmartePP Enhanced/Next-gen on P71 version 03 00 00 10

CSV information ?

Status active
Valid from 12.05.2021
Valid until 12.05.2026
Scheme 🇳🇱 NL
Manufacturer NXP Semiconductors Germany GmbH
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, EAL5+, ALC_FLR.1, ALC_DVS.2
Protection profiles
Maintenance updates Assurance Continuity Maintenance Report (12.10.2022) Certification report Security target

Heuristics summary ?

Certificate ID: NSCIB-CC-0108263-CR

Certificate ?

Extracted keywords

Protocols
PACE

Vendor
NXP Semiconductors, NXP

Claims
R.L
Security Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.1, AVA_VAN.5
Protection profiles
BSI-CC-PP-0056-V2-2012-MA-02, BSI-CC-PP-0068-V2-2011-MA-01
Certificates
CC-21-0108263
Evaluation facilities
Riscure

Standards
ISO/IEC 15408-1, ISO/IEC 15408-2, ISO/IEC 15408-3, ISO/IEC 18045

File metadata

Title: C458-M&S21052110330
Creation date: D:20210521103353+01'00'
Modification date: D:20210521103509+02'00'
Pages: 1
Creator: C458-M
Producer: KONICA MINOLTA bizhub C458

Certification report ?

Extracted keywords

Protocols
PACE
Libraries
Crypto Library 0.7.6

Vendor
NXP, NXP Semiconductors

Security level
EAL4, EAL5, EAL5+, EAL 5, EAL5 augmented, EAL 5 augmented
Security Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.1, AVA_VAN.5
Protection profiles
BSI-CC-PP-0056-V2-2012, BSI-CC-PP- 0068-V2-MA-01
Certificates
BSI-DSZ-CC-1136-2021, NSCIB-CC-0108263-CR
Evaluation facilities
Riscure

Side-channel analysis
JIL-AM, JIL-AAPS, JIL, JHAS

Standards
ICAO

File metadata

Creation date: D:20210512104422+02'00'
Modification date: D:20210512104422+02'00'
Pages: 11
Producer: Foxit Reader PDF Printer Version 7.1.0.112

Frontpage

Certificate ID: NSCIB-CC-0108263-CR
Certified item: NXP SmartePP on P71, version 03 00 00 10
Certification lab: Riscure B.V
Developer: NXP Semiconductors Germany GmbH

References

Outgoing
  • BSI-DSZ-CC-1136-2021 - NXP Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2)

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES, TDES, Triple-DES, KMAC, CMAC
Asymmetric Algorithms
RSA 1024, ECDH, ECDSA, ECC, Diffie-Hellman, DH
Hash functions
SHA-1, SHA1, SHA-224, SHA-256, SHA224, SHA256, SHA384, SHA512
Schemes
MAC
Protocols
PACE
Randomness
RNG
Block cipher modes
ECB, CBC

IC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG14, EF.COM, EF.SOD
Vendor
NXP, NXP Semiconductors

Security level
EAL5, EAL 6+, EAL 5, EAL5 augmented, EAL 5 augmented
Security Assurance Requirements (SAR)
ALC_FLR.1, ALC_DVS.2, AVA_VAN.5, ASE_TSS.2
Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS, FAU_CKM.4.1, FCS_RND.1, FCS_RND, FCS_CKM, FCS_CKM.4, FCS_COP, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_RND.1.1, FCS_EMS.1, FDP_RIP.1, FDP_UCT, FDP_UIT, FDP_ITC.1, FDP_ITC.2, FDP_RIP.1.1, FDP_ACC, FDP_ACF, FDP_ACC.1, FDP_ACF.1, FDP_ACC.2, FDP_IFC.1, FDP_ITC, FIA_API.1, FIA_API, FIA_AFL, FIA_UAU, FIA_AFL.1, FIA_UAU.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UID, FIA_UID.1, FIA_UAU.1.1, FIA_UAU.4, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.5, FIA_FLT, FMT_LIM.1, FMT_LIM.2, FMT_LIM, FMT_SMF.1, FMT_MTD, FMT_SMR, FMT_MTD.3, FMT_SMR.1, FMT_MTD.1, FMT_MSA, FMT_SMF, FMT_MSA.3, FMT_MSA.1, FPT_EMS, FPT_TST.1, FPT_FLS.1, FPT_PHP.3, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FTP_ITC, FTP_ITC.1
Protection profiles
BSI-CC-PP-0056-V2-2012-MA-02, BSI-CC-PP-0068-V2-2011-MA-01, BSI-CC-PP-0056-V2-2012-, BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0084-2014, BSI-CC-PP-0068-, BSI-CC-PP-0055
Certificates
BSI-DSZ-CC-1136-2021, NSCIB-20-0108263

Side-channel analysis
timing attacks, Physical Tampering, physical tampering, Malfunction, malfunction

Standards
FIPS 180-4, PKCS#3, PKCS #3, AIS31, ISO/IEC 14443, ISO/IEC 7816, ISO/IEC 9796-2, ICAO, ICAO-SAC, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004
Technical reports
BSI TR-03110

File metadata

Title: Security Target - Lite
Subject: NXP SmartePP on P71 - ICAO EAC with SAC/PACE
Keywords: Security Target, ICAO, Enhanced Access Control (EAC)
Author: NXP B.V.
Creation date: D:20210302094347Z
Modification date: D:20210302094410Z
Pages: 48
Creator: DITA Open Toolkit 2.5.4
Producer: Apache FOP Version 1.1

References

Outgoing
  • BSI-DSZ-CC-1136-2021 - NXP Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2)

Heuristics ?

Certificate ID: NSCIB-CC-0108263-CR

Extracted SARs

ALC_FLR.1, ASE_TSS.2, AVA_VAN.5, ALC_DVS.2

Scheme data ?

Manufacturer NXP Semiconductors Germany GmbH
Product NXP SmartePP on P71, version 03 00 00 10
Scheme NSCIB
Cert Id CC-21-0108259
Manufacturer Link www.nxp.com
Level EAL4 augmented with ALC_DVS.2 and ALC_FLR.1
Cert Link https://www.tuv-nederland.nl/assets/files/cerfiticaten/2021/05/nscib-certificate-cc-21-0108259.pdf
Report Link https://www.tuv-nederland.nl/assets/files/cerfiticaten/2021/05/nscib-cc-0108259-certification-reportbac.pdf
Target Link https://www.tuv-nederland.nl/assets/files/cerfiticaten/2022/10/nscib-cc-0108259-stlite-v1.8.pdf
Maintenance Link https://www.tuv-nederland.nl/assets/files/cerfiticaten/2022/10/nscib-cc-0108259-ma-1.0.pdf

References ?

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '95e2703a6e67030e07fba5cf6e048c9954e17ada8fe1c71c29fef4b2182bd0bf', 'txt_hash': '3d6674170036a85bb4c23f6c64308eed88fd234714afddee3429ca1a4465ea43'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ba48fb7d71aa9edb67a6ed20594d038a2853fa8a835a319bfe15a065f130f3ec', 'txt_hash': '123ed0607bbc6921a1193217d6b6019b8eeee00405f99bb8f4052a7aa927c484'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'bfb61e72168fab8790d65c0caf2f9e1b9fe6c0b10b820cf8469d020631635888', 'txt_hash': 'c6a0dc96dec5618ffcd016cf91357278ac069c50dd9aa9dcfbc2ba474e017154'}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': {'pdf_file_size_bytes': 79553, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/CreationDate': "D:20210521103353+01'00'", '/Creator': 'C458-M', '/ModDate': "D:20210521103509+02'00'", '/Producer': 'KONICA MINOLTA bizhub C458', '/Title': 'C458-M&S21052110330', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'NL': {'CC-21-0108263': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0056-V2-2012-MA-02': 1, 'BSI-CC-PP-0068-V2-2011-MA-01': 1}}, 'cc_security_level': {}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1, 'ALC_FLR.1': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {'R': {'R.L': 1}}, 'vendor': {'NXP': {'NXP Semiconductors': 1, 'NXP': 1}}, 'eval_facility': {'Riscure': {'Riscure': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'PACE': {'PACE': 3}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408-1': 1, 'ISO/IEC 15408-2': 1, 'ISO/IEC 15408-3': 1, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': 'nscib-certificate-21-0108263.pdf'}.
    • The report_frontpage property was set to {'NL': {'cert_id': 'NSCIB-CC-0108263-CR', 'cert_item': 'NXP SmartePP on P71, version 03 00 00 10', 'developer': 'NXP Semiconductors Germany GmbH', 'cert_lab': ' Riscure B.V'}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1136-2021': 1}}, 'NL': {'__update__': {'NSCIB-CC-0108263-CR': 11}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'NL': {'NSCIB-20-0108263': 1}}, '__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1136-2021': 1}}}}} data.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1136-2021': 2}}, 'NL': {'__update__': {'NSCIB-CC-0108263-CR': 33}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1136-2021': 2}}}, '__delete__': ['NL']}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__delete__': ['CA']}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__delete__': ['CA']}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'CA': {'888 7 888': 1, '888 7 879': 1}}, '__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1136-2021': 1}}, 'NL': {'__update__': {'NSCIB-CC-0108263-CR': 11}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'NL': {'NSCIB-20-0108263': 1}, 'CA': {'180-4 60': 1}}, '__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1136-2021': 1}}}}} data.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'manufacturer': 'NXP Semiconductors Germany GmbH', 'product': 'NXP SmartePP on P71, version 03 00 00 10', 'scheme': 'NSCIB', 'cert_id': 'CC-21-0108259', 'manufacturer_link': 'www.nxp.com', 'level': 'EAL4 augmented with ALC_DVS.2 and ALC_FLR.1', 'cert_link': 'https://www.tuv-nederland.nl/assets/files/cerfiticaten/2021/05/nscib-certificate-cc-21-0108259.pdf', 'report_link': 'https://www.tuv-nederland.nl/assets/files/cerfiticaten/2021/05/nscib-cc-0108259-certification-reportbac.pdf', 'target_link': 'https://www.tuv-nederland.nl/assets/files/cerfiticaten/2022/10/nscib-cc-0108259-stlite-v1.8.pdf', 'maintenance_link': 'https://www.tuv-nederland.nl/assets/files/cerfiticaten/2022/10/nscib-cc-0108259-ma-1.0.pdf'}}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2022-10-12', 'maintenance_title': 'Assurance Continuity Maintenance Report', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/NSCIB-CC-0108263-MA-1.0.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/NSCIB-CC-0108263-STLite_v1.11.pdf'}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to ba48fb7d71aa9edb67a6ed20594d038a2853fa8a835a319bfe15a065f130f3ec.
    • The st_txt_hash property was set to 123ed0607bbc6921a1193217d6b6019b8eeee00405f99bb8f4052a7aa927c484.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 366231, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 48, '/Author': 'NXP B.V.', '/CreationDate': 'D:20210302094347Z', '/Creator': 'DITA Open Toolkit 2.5.4', '/Keywords': 'Security Target, ICAO, Enhanced Access Control\n\t\t\t\t(EAC)', '/ModDate': 'D:20210302094410Z', '/PDFVersion': '1.4', '/Producer': 'Apache FOP Version 1.1', '/Subject': 'NXP SmartePP on P71 - ICAO EAC with SAC/PACE', '/Title': 'Security Target - Lite', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1136-2021': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0056-V2-2012-MA-02': 1, 'BSI-CC-PP-0068-V2-2011-MA-01': 2, 'BSI-CC-PP-0056-V2-2012-': 1, 'BSI-CC-PP-0056-V2-2012': 2, 'BSI-CC-PP-0084-2014': 1, 'BSI-CC-PP-0068-': 1, 'BSI-CC-PP-0055': 1}}, 'cc_security_level': {'EAL': {'EAL5': 3, 'EAL 6+': 2, 'EAL 5': 1, 'EAL5 augmented': 1, 'EAL 5 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 5, 'ALC_DVS.2': 4}, 'AVA': {'AVA_VAN.5': 4}, 'ASE': {'ASE_TSS.2': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 4, 'FAU_SAS': 1, 'FAU_CKM.4.1': 1}, 'FCS': {'FCS_RND.1': 13, 'FCS_RND': 1, 'FCS_CKM': 14, 'FCS_CKM.4': 25, 'FCS_COP': 82, 'FCS_CKM.1': 14, 'FCS_CKM.2': 3, 'FCS_COP.1': 9, 'FCS_RND.1.1': 1, 'FCS_EMS.1': 1}, 'FDP': {'FDP_RIP.1': 9, 'FDP_UCT': 5, 'FDP_UIT': 5, 'FDP_ITC.1': 10, 'FDP_ITC.2': 10, 'FDP_RIP.1.1': 1, 'FDP_ACC': 10, 'FDP_ACF': 12, 'FDP_ACC.1': 5, 'FDP_ACF.1': 6, 'FDP_ACC.2': 3, 'FDP_IFC.1': 2, 'FDP_ITC': 1}, 'FIA': {'FIA_API.1': 5, 'FIA_API': 9, 'FIA_AFL': 7, 'FIA_UAU': 59, 'FIA_AFL.1': 1, 'FIA_UAU.1': 7, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UID': 19, 'FIA_UID.1': 9, 'FIA_UAU.1.1': 1, 'FIA_UAU.4': 4, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.5': 1, 'FIA_FLT': 1}, 'FMT': {'FMT_LIM.1': 4, 'FMT_LIM.2': 4, 'FMT_LIM': 1, 'FMT_SMF.1': 12, 'FMT_MTD': 51, 'FMT_SMR': 7, 'FMT_MTD.3': 2, 'FMT_SMR.1': 11, 'FMT_MTD.1': 2, 'FMT_MSA': 7, 'FMT_SMF': 6, 'FMT_MSA.3': 4, 'FMT_MSA.1': 2}, 'FPT': {'FPT_EMS': 1, 'FPT_TST.1': 10, 'FPT_FLS.1': 9, 'FPT_PHP.3': 3, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_EMS.1': 17, 'FPT_EMS.1.1': 1, 'FPT_EMS.1.2': 1}, 'FTP': {'FTP_ITC': 1, 'FTP_ITC.1': 2}}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP': 116, 'NXP Semiconductors': 27}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 17}}, 'DES': {'DES': {'DES': 1}, '3DES': {'3DES': 7, 'TDES': 7, 'Triple-DES': 4}}, 'constructions': {'MAC': {'KMAC': 2, 'CMAC': 5}}}, 'asymmetric_crypto': {'RSA': {'RSA 1024': 1}, 'ECC': {'ECDH': {'ECDH': 6}, 'ECDSA': {'ECDSA': 6}, 'ECC': {'ECC': 2}}, 'FF': {'DH': {'Diffie-Hellman': 14, 'DH': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 3, 'SHA1': 1}, 'SHA2': {'SHA-224': 1, 'SHA-256': 1, 'SHA224': 1, 'SHA256': 1, 'SHA384': 1, 'SHA512': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 14}}, 'crypto_protocol': {'PACE': {'PACE': 76}}, 'randomness': {'RNG': {'RNG': 2}}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CBC': {'CBC': 6}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'timing attacks': 1}, 'FI': {'Physical Tampering': 2, 'physical tampering': 1, 'Malfunction': 1, 'malfunction': 2}}, 'technical_report_id': {'BSI': {'BSI TR-03110': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 5, 'EF.DG2': 3, 'EF.DG3': 4, 'EF.DG4': 4, 'EF.DG5': 3, 'EF.DG16': 6, 'EF.DG14': 1, 'EF.COM': 3, 'EF.SOD': 3}}, 'standard_id': {'FIPS': {'FIPS 180-4': 1}, 'PKCS': {'PKCS#3': 3, 'PKCS #3': 1}, 'BSI': {'AIS31': 1}, 'ISO': {'ISO/IEC 14443': 2, 'ISO/IEC 7816': 2, 'ISO/IEC 9796-2': 1}, 'ICAO': {'ICAO': 71, 'ICAO-SAC': 2}, 'CC': {'CCMB-2017-04-001': 2, 'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2, 'CCMB-2017-04-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to smart_ePP_EAC_Lite_v1.4_20210302.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1136-2021']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1136-2021']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}]} values added.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was updated, with the [[0, 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/NSCIB-CC-0108263-Certification%20Report(EAC).pdf, code: nok']] values inserted.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/smart_ePP_EAC_Lite_v1.4_20210302.pdf, code: nok'].
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is https://www.commoncriteriaportal.org/files/epfiles/nscib-certificate-21-0108263.pdf.

    The manufacturer_web was updated.

    • The new value is https://www.nxp.com.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3', 'pp_eal': 'EAL4', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['MRTD-PP_V1.10', 'MRTD_ICAO_EAC_V1.3']}}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP)', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0068_V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['MRTD_SAC_PACEV2_V1.0', 'EPASS_PACE_V1.0', 'EPASS_V1.0']}}]}.

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/smart_ePP_EAC_Lite_v1.4_20210302.pdf, code: 408'].
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is None.

    The manufacturer_web was updated.

    • The new value is None.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'EPASS_PACE_V1.0', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'MRTD_ICAO_EAC_V1.3', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The errors property was updated.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/NSCIB-CC-0108263-Certification%20Report(EAC).pdf, code: nok', 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/smart_ePP_EAC_Lite_v1.4_20210302.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}]} values discarded.
  • 21.10.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name NXP SmartePP Enhanced/Next-gen on P71 version 03 00 00 10 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/nscib-certificate-21-0108263.pdf",
  "dgst": "5140d3b40ac28386",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "NSCIB-CC-0108263-CR",
    "cert_lab": [
      ""
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "03",
        "10",
        "00"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1136-2021"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1136-2021"
        ]
      }
    },
    "scheme_data": {
      "cert_id": "CC-21-0108259",
      "cert_link": "https://www.tuv-nederland.nl/assets/files/cerfiticaten/2021/05/nscib-certificate-cc-21-0108259.pdf",
      "level": "EAL4 augmented with ALC_DVS.2 and ALC_FLR.1",
      "maintenance_link": "https://www.tuv-nederland.nl/assets/files/cerfiticaten/2022/10/nscib-cc-0108259-ma-1.0.pdf",
      "manufacturer": "NXP Semiconductors Germany GmbH",
      "manufacturer_link": "www.nxp.com",
      "product": "NXP SmartePP on P71, version 03 00 00 10",
      "report_link": "https://www.tuv-nederland.nl/assets/files/cerfiticaten/2021/05/nscib-cc-0108259-certification-reportbac.pdf",
      "scheme": "NSCIB",
      "target_link": "https://www.tuv-nederland.nl/assets/files/cerfiticaten/2022/10/nscib-cc-0108259-stlite-v1.8.pdf"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1136-2021"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1136-2021"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2022-10-12",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/NSCIB-CC-0108263-MA-1.0.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/files/epfiles/NSCIB-CC-0108263-STLite_v1.11.pdf",
        "maintenance_title": "Assurance Continuity Maintenance Report"
      }
    ]
  },
  "manufacturer": "NXP Semiconductors Germany GmbH",
  "manufacturer_web": "https://www.nxp.com",
  "name": "NXP SmartePP Enhanced/Next-gen on P71 version 03 00 00 10",
  "not_valid_after": "2026-05-12",
  "not_valid_before": "2021-05-12",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "nscib-certificate-21-0108263.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "NL": {
          "CC-21-0108263": 1
        }
      },
      "cc_claims": {
        "R": {
          "R.L": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0056-V2-2012-MA-02": 1,
          "BSI-CC-PP-0068-V2-2011-MA-01": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1,
          "ALC_FLR.1": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 3
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Riscure": {
          "Riscure": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408-1": 1,
          "ISO/IEC 15408-2": 1,
          "ISO/IEC 15408-3": 1,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 1,
          "NXP Semiconductors": 1
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20210521103353+01\u002700\u0027",
      "/Creator": "C458-M",
      "/ModDate": "D:20210521103509+02\u002700\u0027",
      "/Producer": "KONICA MINOLTA bizhub C458",
      "/Title": "C458-M\u0026S21052110330",
      "pdf_file_size_bytes": 79553,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "NSCIB-CC-0108263-Certification Report(EAC).pdf",
    "report_frontpage": {
      "NL": {
        "cert_id": "NSCIB-CC-0108263-CR",
        "cert_item": "NXP SmartePP on P71, version 03 00 00 10",
        "cert_lab": " Riscure B.V",
        "developer": "NXP Semiconductors Germany GmbH"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1136-2021": 1
        },
        "NL": {
          "NSCIB-CC-0108263-CR": 11
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0068-V2-MA-01": 1,
          "BSI-CC-PP-0056-V2-2012": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 2,
          "ALC_FLR.1": 2
        },
        "AVA": {
          "AVA_VAN.5": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL 5 augmented": 1,
          "EAL4": 1,
          "EAL5": 1,
          "EAL5 augmented": 1,
          "EAL5+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Generic": {
          "Crypto Library 0.7.6": 1
        }
      },
      "crypto_protocol": {
        "PACE": {
          "PACE": 5
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Riscure": {
          "Riscure": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "other": {
          "JHAS": 1,
          "JIL": 2,
          "JIL-AAPS": 2,
          "JIL-AM": 2
        }
      },
      "standard_id": {
        "ICAO": {
          "ICAO": 11
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 19,
          "NXP Semiconductors": 4
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "",
      "/CreationDate": "D:20210512104422+02\u002700\u0027",
      "/Creator": "",
      "/Keywords": "",
      "/ModDate": "D:20210512104422+02\u002700\u0027",
      "/Producer": "Foxit Reader PDF Printer Version 7.1.0.112",
      "/Subject": "",
      "/Title": "",
      "pdf_file_size_bytes": 180003,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 11
    },
    "st_filename": "smart_ePP_EAC_Lite_v1.4_20210302.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          },
          "ECDH": {
            "ECDH": 6
          },
          "ECDSA": {
            "ECDSA": 6
          }
        },
        "FF": {
          "DH": {
            "DH": 4,
            "Diffie-Hellman": 14
          }
        },
        "RSA": {
          "RSA 1024": 1
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1136-2021": 1
        },
        "NL": {
          "NSCIB-20-0108263": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0055": 1,
          "BSI-CC-PP-0056-V2-2012": 2,
          "BSI-CC-PP-0056-V2-2012-": 1,
          "BSI-CC-PP-0056-V2-2012-MA-02": 1,
          "BSI-CC-PP-0068-": 1,
          "BSI-CC-PP-0068-V2-2011-MA-01": 2,
          "BSI-CC-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 4,
          "ALC_FLR.1": 5
        },
        "ASE": {
          "ASE_TSS.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL 5 augmented": 1,
          "EAL 6+": 2,
          "EAL5": 3,
          "EAL5 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_CKM.4.1": 1,
          "FAU_SAS": 1,
          "FAU_SAS.1": 4
        },
        "FCS": {
          "FCS_CKM": 14,
          "FCS_CKM.1": 14,
          "FCS_CKM.2": 3,
          "FCS_CKM.4": 25,
          "FCS_COP": 82,
          "FCS_COP.1": 9,
          "FCS_EMS.1": 1,
          "FCS_RND": 1,
          "FCS_RND.1": 13,
          "FCS_RND.1.1": 1
        },
        "FDP": {
          "FDP_ACC": 10,
          "FDP_ACC.1": 5,
          "FDP_ACC.2": 3,
          "FDP_ACF": 12,
          "FDP_ACF.1": 6,
          "FDP_IFC.1": 2,
          "FDP_ITC": 1,
          "FDP_ITC.1": 10,
          "FDP_ITC.2": 10,
          "FDP_RIP.1": 9,
          "FDP_RIP.1.1": 1,
          "FDP_UCT": 5,
          "FDP_UIT": 5
        },
        "FIA": {
          "FIA_AFL": 7,
          "FIA_AFL.1": 1,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_API": 9,
          "FIA_API.1": 5,
          "FIA_FLT": 1,
          "FIA_UAU": 59,
          "FIA_UAU.1": 7,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.4": 4,
          "FIA_UAU.5": 1,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UID": 19,
          "FIA_UID.1": 9
        },
        "FMT": {
          "FMT_LIM": 1,
          "FMT_LIM.1": 4,
          "FMT_LIM.2": 4,
          "FMT_MSA": 7,
          "FMT_MSA.1": 2,
          "FMT_MSA.3": 4,
          "FMT_MTD": 51,
          "FMT_MTD.1": 2,
          "FMT_MTD.3": 2,
          "FMT_SMF": 6,
          "FMT_SMF.1": 12,
          "FMT_SMR": 7,
          "FMT_SMR.1": 11
        },
        "FPT": {
          "FPT_EMS": 1,
          "FPT_EMS.1": 17,
          "FPT_EMS.1.1": 1,
          "FPT_EMS.1.2": 1,
          "FPT_FLS.1": 9,
          "FPT_PHP.3": 3,
          "FPT_TST.1": 10,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 1,
          "FTP_ITC.1": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 6
        },
        "ECB": {
          "ECB": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 76
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 14
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 3,
            "SHA1": 1
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 1,
            "SHA224": 1,
            "SHA256": 1,
            "SHA384": 1,
            "SHA512": 1
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.COM": 3,
          "EF.DG1": 5,
          "EF.DG14": 1,
          "EF.DG16": 6,
          "EF.DG2": 3,
          "EF.DG3": 4,
          "EF.DG4": 4,
          "EF.DG5": 3,
          "EF.SOD": 3
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 1,
          "Physical Tampering": 2,
          "malfunction": 2,
          "physical tampering": 1
        },
        "SCA": {
          "timing attacks": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 1
        },
        "CC": {
          "CCMB-2017-04-001": 2,
          "CCMB-2017-04-002": 2,
          "CCMB-2017-04-003": 2,
          "CCMB-2017-04-004": 2
        },
        "FIPS": {
          "FIPS 180-4": 1
        },
        "ICAO": {
          "ICAO": 71,
          "ICAO-SAC": 2
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 7816": 2,
          "ISO/IEC 9796-2": 1
        },
        "PKCS": {
          "PKCS #3": 1,
          "PKCS#3": 3
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 17
          }
        },
        "DES": {
          "3DES": {
            "3DES": 7,
            "TDES": 7,
            "Triple-DES": 4
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 5,
            "KMAC": 2
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03110": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 116,
          "NXP Semiconductors": 27
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "NXP B.V.",
      "/CreationDate": "D:20210302094347Z",
      "/Creator": "DITA Open Toolkit 2.5.4",
      "/Keywords": "Security Target, ICAO, Enhanced Access Control\n\t\t\t\t(EAC)",
      "/ModDate": "D:20210302094410Z",
      "/PDFVersion": "1.4",
      "/Producer": "Apache FOP Version 1.1",
      "/Subject": "NXP SmartePP on P71 - ICAO EAC with SAC/PACE",
      "/Title": "Security Target - Lite",
      "pdf_file_size_bytes": 366231,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 48
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "MRTD_SAC_PACEV2_V1.0",
            "EPASS_V1.0",
            "EPASS_PACE_V1.0"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0068_V2b_pdf.pdf",
        "pp_name": "Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP)"
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "MRTD-PP_V1.10",
            "MRTD_ICAO_EAC_V1.3"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf",
        "pp_name": "Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/NSCIB-CC-0108263-Certification%20Report(EAC).pdf",
  "scheme": "NL",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_VAN.5",
      "ALC_DVS.2",
      "ALC_FLR.1",
      "EAL5+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/smart_ePP_EAC_Lite_v1.4_20210302.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "bfb61e72168fab8790d65c0caf2f9e1b9fe6c0b10b820cf8469d020631635888",
      "txt_hash": "c6a0dc96dec5618ffcd016cf91357278ac069c50dd9aa9dcfbc2ba474e017154"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "95e2703a6e67030e07fba5cf6e048c9954e17ada8fe1c71c29fef4b2182bd0bf",
      "txt_hash": "3d6674170036a85bb4c23f6c64308eed88fd234714afddee3429ca1a4465ea43"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "ba48fb7d71aa9edb67a6ed20594d038a2853fa8a835a319bfe15a065f130f3ec",
      "txt_hash": "123ed0607bbc6921a1193217d6b6019b8eeee00405f99bb8f4052a7aa927c484"
    }
  },
  "status": "active"
}