Sdu ICAO eMRTD version 1.0

CSV information ?

Status archived
Valid from 02.05.2007
Valid until 01.09.2019
Scheme 🇩🇪 DE
Manufacturer Sdu Identification bv
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL4+, ALC_DVS.2, ADV_IMP.2
Maintenance updates Sdu ICAO eMRTD version 1.1.0 (07.08.2007) Certification report

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0383-2007

Certification report ?

Extracted keywords

Symmetric Algorithms
DES, Triple-DES
Schemes
MAC
Randomness
RNG

JavaCard versions
Java Card 2.2.1
IC data groups
EF.DG1, EF.DG12, EF.COM
Vendor
Infineon Technologies AG, Philips

Security level
EAL4, EAL 1, EAL 7, EAL 4, EAL4+, EAL5+, EAL1, EAL3, EAL5, EAL7, EAL2, EAL6, EAL4 augmented
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL.2, ADO_IGS.1, ADO_DEL, ADO_IGS, ADV_IMP.2, ADV_FSP.2, ADV_HLD.2, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM.1, AGD_USR.1, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VLA.2, AVA_MSU.2, AVA_SOF.1, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA, AVA_VLA.3, AVA_VLA.4, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_SAS.1, FCS_CKM, FCS_CKM.4, FCS_COP, FCS_RND, FDP_ACC.1, FDP_ACF.1, FDP_ITC.1, FDP_UCT, FDP_UIT, FDP_DAU, FIA_UID.1, FIA_UAU.1, FIA_UAU, FIA_UAU.5, FIA_API, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FMT_MTD, FMT_LIM.1, FMT_LIM.2, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_RVM.1, FPT_SEP.1
Protection profiles
BSI-PP-0017-2005, BSI-PP- 0017-2005, BSI-PP-0017, BSI-PP-0002-2001
Certificates
BSI-DSZ-CC-0383-2007, BSI-DSZ-CC-0249-2006
Evaluation facilities
TÜV Informationstechnik
Certification process
6] Electronic Passport SECURITY TARGET for Sdu ICAO eMRTD, BSI- DSZ-CC-0383 Version 1.5.4, Sdu (confidential document) B-20 BSI-DSZ-CC-0383-2007 Certification Report [7] Electronic Passport SECURITY TARGET LITE for, Version 2, 07 March 2007, BSI-DSZ-CC- 0383 for Sdu ICAO eMRTD 1.0, TÜV Informationstechnik GmbH (confidential document) [9] Common Criteria Protection Profile Machine Readable Travel Document with „ICAO Application, Target (Electronic Passport SECURITY TARGET for Sdu ICAO eMRTD, BSI-DSZ-CC-0383 Version 1.5.4, Sdu (confidential document) [6]). The evaluators verified, that the requirements for the TOE life cycle phases up to delivery

Side-channel analysis
physical probing, Physical Tampering, Malfunction, malfunction
Certification process
6] Electronic Passport SECURITY TARGET for Sdu ICAO eMRTD, BSI- DSZ-CC-0383 Version 1.5.4, Sdu (confidential document) B-20 BSI-DSZ-CC-0383-2007 Certification Report [7] Electronic Passport SECURITY TARGET LITE for, Version 2, 07 March 2007, BSI-DSZ-CC- 0383 for Sdu ICAO eMRTD 1.0, TÜV Informationstechnik GmbH (confidential document) [9] Common Criteria Protection Profile Machine Readable Travel Document with „ICAO Application, Target (Electronic Passport SECURITY TARGET for Sdu ICAO eMRTD, BSI-DSZ-CC-0383 Version 1.5.4, Sdu (confidential document) [6]). The evaluators verified, that the requirements for the TOE life cycle phases up to delivery

Standards
AIS 34, AIS 36, AIS 25, AIS 26, AIS20, AIS 32, ISO/IEC 15408:2005, ISO/IEC15408: 2005, ICAO
Technical reports
BSI 7125, BSI 7148, BSI 7149

File metadata

Title: Certification Report BSI-DSZ-CC-0383-2007
Keywords: Common Criteria, Certification, Zertifizierung, Sdu ICAO eMRTD version 1.0, Sdu Identification bv
Author: Bundesamt für Sicherheit in der Informationstechnik
Creation date: D:20070503100302+02'00'
Modification date: D:20070523155029+02'00'
Pages: 44
Creator: Acrobat PDFMaker 7.0.7 für Word
Producer: Acrobat Distiller 7.0.5 (Windows)

Frontpage

Certificate ID: BSI-DSZ-CC-0383-2007
Certified item: Sdu ICAO eMRTD version 1.0
Certification lab: BSI
Developer: Sdu Identification bv

References

Security target ?

Extracted keywords

Symmetric Algorithms
DES, Triple-DES, KMAC
Asymmetric Algorithms
ECDSA
Hash functions
SHA-1, SHA-224
Schemes
MAC
Randomness
RND
Block cipher modes
CBC

Vendor
Philips

Security level
EAL4+, EAL4, EAL4 augmented
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_SCP.2, ADO_DEL.2, ADV_IMP.2, ADV_SPM.1, ADV_FSP.2, ADV_HLD.2, ADV_LLD.1, ADV_RCR.1, AGD_ADM.1, ALC_DVS.2, ALC_TAT.1, ATE_COV.2, ATE_FUN.1, ATE_IND.2, AVA_MSU.2, AVA_VLA.2, APE_SRE
Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_SAS.1.1, FAU_GEN, FCS_RND, FCS_CKM, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_COP, FCS_RND.1, FCS_RND.1.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACF.1, FDP_ACF, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_IFC.1, FDP_UCT, FDP_UCT.1, FDP_UIT, FDP_UIT.1, FDP_DAU, FDP_DAU.1, FDP_ACC, FDP_IFC, FDP_IFF, FIA_API, FIA_UAU, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_API.1, FIA_SOS.2, FIA_API.1.1, FMT_LIM, FMT_MSA.2, FMT_MOF.1, FMT_MSA.3, FMT_MOF.1.1, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_LIM.1, FMT_LIM.1.1, FMT_LIM.2, FMT_LIM.2.1, FMT_MTD, FMT_MTD.1, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_RVM.1, FPT_SEP.1, FPT_FLS.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_AMT.1, FPT_PHP.3.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-PP-0017, BSI-PP-0002-2001

Side-channel analysis
physical probing, DPA, SPA, timing attacks, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineering

Standards
FIPS 180-224, FIPS 46-3, FIPS 180-1, FIPS 180-2, FIPS PUB 46-3, PKCS#1, AIS 20, RFC3369, ISO/IEC 14443, ISO/IEC 7816-4, ISO/IEC 9796-2, ICAO
Technical reports
BSI 10

File metadata

Title: SDU_ICAO_ST_Lite 1.0.0
Author: tomk
Creation date: D:20070326084010Z
Modification date: D:20070523155109+02'00'
Pages: 68
Creator: PDFCreator Version 0.8.0
Producer: AFPL Ghostscript 8.14

References

Heuristics ?

Certificate ID: BSI-DSZ-CC-0383-2007

Extracted SARs

ASE_DES.1, ASE_ENV.1, ADV_SPM.1, ASE_TSS.1, ALC_TAT.1, AGD_USR.1, AVA_VLA.2, ALC_DVS.2, ADV_LLD.1, ASE_SRE.1, ATE_FUN.1, ADV_FSP.2, AVA_SOF.1, ATE_COV.2, AGD_ADM.1, ADV_IMP.2, ATE_DPT.1, ASE_OBJ.1, AVA_MSU.2, ASE_REQ.1, ADV_HLD.2, ASE_PPC.1, ATE_IND.2, ADV_RCR.1, ASE_INT.1, ALC_LCD.1

References ?

Updates ?

  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Sdu ICAO eMRTD version 1.0 was processed.

  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['1.0']}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0249-2006']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0249-2006']}}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_DES', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_SCP', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_ENV', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_PPC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SRE', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'SAR', 'family': 'ACM_AUT', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_DEL', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 4}, {'_type': 'SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 2}]}}.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '743dfb2cbb2f8e8f5a610d2ba5be7d21e2fe31e03d7353745d1244818d585c83', 'st_pdf_hash': '22219cb2545ada670f7dd170ee71ec812a87767a034eb4ca526d5e3977bbe489', 'report_txt_hash': 'e9febc8833f0b696ec537624ef10c833e557923cc8b2640896361bc49683263d', 'st_txt_hash': '1b14626c0e57b206b98310013b53f6033bd1baf4716279c3d542e987010a6ce7'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'DES': 5}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'MAC': 1}, 'rules_randomness': {'RNG': 2}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {'Malfunction': 1, 'malfunction': 1, 'physical probing': 1, 'Physical Tampering': 1}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'DES': 20, 'KMAC': 1}, 'rules_asymmetric_crypto': {'ECDSA': 1, 'DSA': 1}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 8, 'SHA-224': 1}, 'rules_crypto_schemes': {'MAC': 15}, 'rules_randomness': {'RND': 8}, 'rules_tee': {'SE': 1}, 'rules_side_channels': {'Malfunction': 1, 'malfunction': 4, 'physical probing': 3, 'Physical Tampering': 2, 'physical tampering': 1, 'Physical tampering': 1, 'SPA': 1, 'DPA': 2, 'fault injection': 1, 'timing attacks': 1, 'reverse engineering': 1}} values inserted.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_extract_ok property was set to False.
    • The errors property was set to ['Failed to read metadata of certs/reports/pdf/8e47614ffc7cecd5.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/reports/pdf/8e47614ffc7cecd5.pdf, error: can only concatenate list (not "IndirectObject") to list'].

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0383-2007': 86, 'BSI-DSZ-CC-0249-2006': 4}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0017-2005': 2, 'BSI-PP- 0017-2005': 1, 'BSI-PP-0017': 1, 'BSI-PP-0002-2001': 1}}, 'cc_security_level': {'EAL': {'EAL4': 14, 'EAL 1': 1, 'EAL 7': 1, 'EAL 4': 1, 'EAL4+': 1, 'EAL5+': 1, 'EAL1': 5, 'EAL2': 4, 'EAL3': 4, 'EAL5': 6, 'EAL6': 4, 'EAL7': 4, 'EAL4 augmented': 3}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 2, 'ACM_CAP.4': 2, 'ACM_SCP.2': 2, 'ACM_AUT': 2, 'ACM_CAP': 2, 'ACM_SCP': 2}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 2, 'ADO_DEL': 2, 'ADO_IGS': 2}, 'ADV': {'ADV_IMP.2': 5, 'ADV_FSP.2': 1, 'ADV_HLD.2': 1, 'ADV_LLD.1': 1, 'ADV_RCR.1': 1, 'ADV_SPM.1': 1, 'ADV_FSP': 2, 'ADV_HLD': 2, 'ADV_IMP': 2, 'ADV_INT': 2, 'ADV_LLD': 2, 'ADV_RCR': 2, 'ADV_SPM': 2}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1, 'AGD_ADM': 2, 'AGD_USR': 2}, 'ALC': {'ALC_DVS.2': 6, 'ALC_LCD.1': 2, 'ALC_TAT.1': 2, 'ALC_DVS': 2, 'ALC_FLR': 2, 'ALC_LCD': 2, 'ALC_TAT': 2}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_COV': 2, 'ATE_DPT': 2, 'ATE_FUN': 2, 'ATE_IND': 2}, 'AVA': {'AVA_VLA.2': 3, 'AVA_MSU.2': 1, 'AVA_SOF.1': 1, 'AVA_CCA': 2, 'AVA_MSU': 2, 'AVA_SOF': 3, 'AVA_VLA': 3, 'AVA_VLA.3': 1, 'AVA_VLA.4': 1}, 'ASE': {'ASE_DES.1': 1, 'ASE_ENV.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.1': 1, 'ASE_PPC.1': 1, 'ASE_REQ.1': 1, 'ASE_SRE.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 1}, 'FCS': {'FCS_CKM.4': 1}, 'FDP': {'FDP_ACC.1': 2, 'FDP_ACF.1': 2, 'FDP_ITC.1': 1}, 'FIA': {'FIA_UID.1': 1, 'FIA_UAU.1': 1, 'FIA_UAU.5': 1}, 'FMT': {'FMT_MOF.1': 1, 'FMT_SMF.1': 1, 'FMT_SMR.1': 1, 'FMT_LIM.1': 1, 'FMT_LIM.2': 1}, 'FPT': {'FPT_FLS.1': 1, 'FPT_TST.1': 1, 'FPT_PHP.3': 1, 'FPT_RVM.1': 1, 'FPT_SEP.1': 1}}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies AG': 1}, 'Philips': {'Philips': 5}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 5}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 5}, '3DES': {'Triple-DES': 3}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 2}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1}, 'FI': {'Physical Tampering': 1, 'Malfunction': 1, 'malfunction': 1}}, 'technical_report_id': {'BSI': {'BSI 7125': 2, 'BSI 7148': 1, 'BSI 7149': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 1, 'EF.DG12': 1, 'EF.COM': 1}}, 'standard_id': {'BSI': {'AIS 34': 3, 'AIS 36': 3, 'AIS 25': 2, 'AIS 26': 2, 'AIS20': 1, 'AIS 32': 1}, 'ISO': {'ISO/IEC 15408:2005': 3, 'ISO/IEC15408: 2005': 1}, 'ICAO': {'ICAO': 30}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.1': 1}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'te [6] Electronic Passport SECURITY TARGET for Sdu ICAO eMRTD, BSI- DSZ-CC-0383 Version 1.5.4, Sdu (confidential document) B-20 BSI-DSZ-CC-0383-2007 Certification Report [7] Electronic Passport SECURITY TARGET LITE for': 1, 't, Version 2, 07 March 2007, BSI-DSZ-CC- 0383 for Sdu ICAO eMRTD 1.0, TÜV Informationstechnik GmbH (confidential document) [9] Common Criteria Protection Profile Machine Readable Travel Document with „ICAO Application': 1, 'Target (Electronic Passport SECURITY TARGET for Sdu ICAO eMRTD, BSI-DSZ-CC-0383 Version 1.5.4, Sdu (confidential document) [6]). The evaluators verified, that the requirements for the TOE life cycle phases up to delivery ': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0017': 1, 'BSI-PP-0002-2001': 1}}, 'cc_security_level': {'EAL': {'EAL4+': 1, 'EAL4': 3, 'EAL4 augmented': 2}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 1, 'ACM_CAP.4': 1, 'ACM_SCP.2': 1}, 'ADO': {'ADO_DEL.2': 1, 'ADO_IGS.1': 1}, 'ADV': {'ADV_IMP.2': 5, 'ADV_SPM.1': 2, 'ADV_FSP.2': 1, 'ADV_HLD.2': 1, 'ADV_LLD.1': 1, 'ADV_RCR.1': 1}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1}, 'ALC': {'ALC_DVS.2': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_MSU.2': 1, 'AVA_SOF.1': 1, 'AVA_VLA.2': 1}, 'APE': {'APE_SRE': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS': 6, 'FAU_SAS.1': 6, 'FAU_SAS.1.1': 2, 'FAU_GEN': 1}, 'FCS': {'FCS_RND': 8, 'FCS_CKM.1': 14, 'FCS_CKM.2': 3, 'FCS_COP.1': 11, 'FCS_CKM.4': 14, 'FCS_RND.1': 6, 'FCS_RND.1.1': 1}, 'FDP': {'FDP_ITC.1': 12, 'FDP_ITC.2': 12, 'FDP_ACC.1': 12, 'FDP_ACF.1': 6, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_IFC.1': 6, 'FDP_UCT.1': 4, 'FDP_DAU.1': 1, 'FDP_ACC': 1, 'FDP_ACF': 2, 'FDP_IFC': 1, 'FDP_IFF': 1}, 'FIA': {'FIA_API': 7, 'FIA_UID.1': 4, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 2, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.4': 2, 'FIA_UAU.5': 2, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 2, 'FIA_UAU.6': 2, 'FIA_SOS.2': 1, 'FIA_API.1': 3, 'FIA_API.1.1': 1}, 'FMT': {'FMT_LIM': 8, 'FMT_MSA.2': 13, 'FMT_MOF.1': 4, 'FMT_MSA.3': 3, 'FMT_MOF.1.1': 1, 'FMT_SMF.1': 6, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 6, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_LIM.1': 14, 'FMT_LIM.1.1': 2, 'FMT_LIM.2': 13, 'FMT_LIM.2.1': 2, 'FMT_MTD.1': 4}, 'FPT': {'FPT_FLS.1': 3, 'FPT_TST.1': 3, 'FPT_PHP.3': 4, 'FPT_RVM.1': 3, 'FPT_SEP.1': 3, 'FPT_FLS.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_AMT.1': 1, 'FPT_PHP.3.1': 1, 'FPT_RVM.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1}, 'FTP': {'FTP_ITC.1': 4, 'FTP_TRP.1': 4}}, 'cc_claims': {'D': {'D.ICC': 2, 'D.IFD': 1}, 'O': {'O': 2}, 'T': {'T': 1}, 'OE': {'OE': 1}}, 'vendor': {'Philips': {'Philips': 5}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 20}, '3DES': {'Triple-DES': 13}}, 'constructions': {'MAC': {'KMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 1}}, 'FF': {'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 8}, 'SHA2': {'SHA-224': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 15}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RND': 8}}, 'cipher_mode': {'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 3, 'DPA': 2, 'SPA': 1, 'timing attacks': 1}, 'FI': {'Physical Tampering': 2, 'physical tampering': 1, 'Physical tampering': 1, 'Malfunction': 1, 'malfunction': 4, 'fault injection': 1}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 180-224': 1, 'FIPS 46-3': 4, 'FIPS 180-2': 1, 'FIPS PUB 46-3': 1}, 'BSI': {'AIS 20': 3}, 'RFC': {'RFC3369': 1}, 'ISO': {'ISO/IEC 14443': 2, 'ISO/IEC 7816-4': 1, 'ISO/IEC 9796-2': 1}, 'ICAO': {'ICAO': 90}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
    • The cert_lab property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADO_DEL', 'level': 2}, {'_type': 'SAR', 'family': 'ACM_SCP', 'level': 2}, {'_type': 'SAR', 'family': 'ACM_AUT', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 4}, {'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}]} values discarded.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2007-08-07', 'maintenance_title': 'Sdu ICAO eMRTD version 1.1.0', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/0383_ma1.pdf', 'maintenance_st_link': None}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_DES', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ENV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_PPC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]}.
  • 28.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 302212, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 44, '/CreationDate': "D:20070503100302+02'00'", '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/Creator': 'Acrobat PDFMaker 7.0.7 für Word', '/Keywords': 'Common Criteria, Certification, Zertifizierung, Sdu ICAO eMRTD version 1.0, Sdu Identification bv', '/Producer': 'Acrobat Distiller 7.0.5 (Windows)', '/ModDate': "D:20070523155029+02'00'", '/Company': 'BSI, Postfach 200363, 53133 Bonn', '/SourceModified': 'D:20070503080240', '/Title': 'Certification Report BSI-DSZ-CC-0383-2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '0383a.pdf', 'st_filename': '0383b.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0383-2007': 44, 'BSI-DSZ-CC-0249-2006': 6}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL2': 3, 'EAL6': 3}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_LCD': 1}}}}, 'cc_sfr': {'__update__': {'FCS': {'__insert__': {'FCS_CKM': 4, 'FCS_COP': 8, 'FCS_RND': 2}}, 'FDP': {'__insert__': {'FDP_UCT': 2, 'FDP_UIT': 2, 'FDP_DAU': 1}}, 'FIA': {'__insert__': {'FIA_UAU': 4, 'FIA_API': 1}}, 'FMT': {'__insert__': {'FMT_MTD': 4}}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 2}}}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'ICAO': {'__update__': {'ICAO': 26}}}}, 'certification_process': {'__update__': {'ConfidentialDocument': {'6] Electronic Passport SECURITY TARGET for Sdu ICAO eMRTD, BSI- DSZ-CC-0383 Version 1.5.4, Sdu (confidential document) B-20 BSI-DSZ-CC-0383-2007 Certification Report [7] Electronic Passport SECURITY TARGET LITE for': 1, 'Version 2, 07 March 2007, BSI-DSZ-CC- 0383 for Sdu ICAO eMRTD 1.0, TÜV Informationstechnik GmbH (confidential document) [9] Common Criteria Protection Profile Machine Readable Travel Document with „ICAO Application': 1, 'Target (Electronic Passport SECURITY TARGET for Sdu ICAO eMRTD, BSI-DSZ-CC-0383 Version 1.5.4, Sdu (confidential document) [6]). The evaluators verified, that the requirements for the TOE life cycle phases up to delivery': 1}}}} data.
    • The st_keywords property was updated, with the {'cc_sar': {'__update__': {'ACM': {'__delete__': ['ACM_CAP.4']}, 'ADO': {'__delete__': ['ADO_IGS.1']}, 'AGD': {'__delete__': ['AGD_USR.1']}, 'ALC': {'__update__': {'ALC_DVS.2': 5}, '__delete__': ['ALC_LCD.1']}, 'ATE': {'__delete__': ['ATE_DPT.1']}, 'AVA': {'__delete__': ['AVA_SOF.1']}}}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_SAS': 7, 'FAU_SAS.1': 7}}, 'FCS': {'__insert__': {'FCS_CKM': 5, 'FCS_COP': 9}, '__update__': {'FCS_RND': 12, 'FCS_CKM.1': 17, 'FCS_COP.1': 19, 'FCS_CKM.4': 16, 'FCS_RND.1': 8}}, 'FDP': {'__insert__': {'FDP_UCT': 5, 'FDP_UIT': 5, 'FDP_UIT.1': 4, 'FDP_DAU': 1}, '__update__': {'FDP_ACC.1': 14, 'FDP_ACF.1': 14, 'FDP_UCT.1': 6, 'FDP_DAU.1': 3, 'FDP_ACC': 2, 'FDP_ACF': 4}}, 'FIA': {'__insert__': {'FIA_UAU': 16}, '__update__': {'FIA_API': 13, 'FIA_UAU.4': 4, 'FIA_UAU.6': 4, 'FIA_API.1': 4}}, 'FMT': {'__insert__': {'FMT_MTD': 4}, '__update__': {'FMT_MOF.1': 5, 'FMT_MTD.1': 8}}, 'FPT': {'__update__': {'FPT_TST.1': 4}}}}, 'cc_claims': {}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 8}}, '3DES': {'__update__': {'Triple-DES': 14}}}}}}, 'asymmetric_crypto': {'__delete__': ['FF']}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 7}}}}, 'randomness': {'__update__': {'RNG': {'__update__': {'RND': 3}}}}, 'technical_report_id': {'BSI': {'BSI 10': 1}}, 'tee_name': {}, 'standard_id': {'__insert__': {'PKCS': {'PKCS#1': 1}}, '__update__': {'FIPS': {'__insert__': {'FIPS 180-1': 1}, '__update__': {'FIPS 180-2': 3}}, 'ICAO': {'__update__': {'ICAO': 85}}}}} data.
  • 28.09.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 21.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/0383b.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 4}]} values added.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 22219cb2545ada670f7dd170ee71ec812a87767a034eb4ca526d5e3977bbe489.
    • The st_txt_hash property was set to 1b14626c0e57b206b98310013b53f6033bd1baf4716279c3d542e987010a6ce7.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 410147, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 68, '/CreationDate': 'D:20070326084010Z', '/Subject': '', '/Author': 'tomk', '/Creator': 'PDFCreator Version 0.8.0', '/Keywords': '', '/Producer': 'AFPL Ghostscript 8.14', '/ModDate': "D:20070523155109+02'00'", '/Title': 'SDU_ICAO_ST_Lite 1.0.0', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0017': 1, 'BSI-PP-0002-2001': 1}}, 'cc_security_level': {'EAL': {'EAL4+': 1, 'EAL4': 3, 'EAL4 augmented': 2}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 1, 'ACM_SCP.2': 1}, 'ADO': {'ADO_DEL.2': 1}, 'ADV': {'ADV_IMP.2': 5, 'ADV_SPM.1': 2, 'ADV_FSP.2': 1, 'ADV_HLD.2': 1, 'ADV_LLD.1': 1, 'ADV_RCR.1': 1}, 'AGD': {'AGD_ADM.1': 1}, 'ALC': {'ALC_DVS.2': 5, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_MSU.2': 1, 'AVA_VLA.2': 1}, 'APE': {'APE_SRE': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS': 7, 'FAU_SAS.1': 7, 'FAU_SAS.1.1': 2, 'FAU_GEN': 1}, 'FCS': {'FCS_RND': 12, 'FCS_CKM': 5, 'FCS_CKM.1': 17, 'FCS_CKM.2': 3, 'FCS_COP.1': 19, 'FCS_CKM.4': 16, 'FCS_COP': 9, 'FCS_RND.1': 8, 'FCS_RND.1.1': 1}, 'FDP': {'FDP_ITC.1': 12, 'FDP_ITC.2': 12, 'FDP_ACC.1': 14, 'FDP_ACF.1': 14, 'FDP_ACF': 4, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_IFC.1': 6, 'FDP_UCT': 5, 'FDP_UCT.1': 6, 'FDP_UIT': 5, 'FDP_UIT.1': 4, 'FDP_DAU': 1, 'FDP_DAU.1': 3, 'FDP_ACC': 2, 'FDP_IFC': 1, 'FDP_IFF': 1}, 'FIA': {'FIA_API': 13, 'FIA_UAU': 16, 'FIA_UID.1': 4, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 2, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.4': 4, 'FIA_UAU.5': 2, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 2, 'FIA_UAU.6': 4, 'FIA_API.1': 4, 'FIA_SOS.2': 1, 'FIA_API.1.1': 1}, 'FMT': {'FMT_LIM': 8, 'FMT_MSA.2': 13, 'FMT_MOF.1': 5, 'FMT_MSA.3': 3, 'FMT_MOF.1.1': 1, 'FMT_SMF.1': 6, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 6, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_LIM.1': 14, 'FMT_LIM.1.1': 2, 'FMT_LIM.2': 13, 'FMT_LIM.2.1': 2, 'FMT_MTD': 4, 'FMT_MTD.1': 8}, 'FPT': {'FPT_FLS.1': 3, 'FPT_TST.1': 4, 'FPT_PHP.3': 4, 'FPT_RVM.1': 3, 'FPT_SEP.1': 3, 'FPT_FLS.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_AMT.1': 1, 'FPT_PHP.3.1': 1, 'FPT_RVM.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1}, 'FTP': {'FTP_ITC.1': 4, 'FTP_TRP.1': 4}}, 'cc_claims': {}, 'vendor': {'Philips': {'Philips': 5}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 8}, '3DES': {'Triple-DES': 14}}, 'constructions': {'MAC': {'KMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 8}, 'SHA2': {'SHA-224': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 7}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RND': 3}}, 'cipher_mode': {'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 3, 'DPA': 2, 'SPA': 1, 'timing attacks': 1}, 'FI': {'Physical Tampering': 2, 'physical tampering': 1, 'Physical tampering': 1, 'Malfunction': 1, 'malfunction': 4, 'fault injection': 1}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {'BSI': {'BSI 10': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 180-224': 1, 'FIPS 46-3': 4, 'FIPS 180-1': 1, 'FIPS 180-2': 3, 'FIPS PUB 46-3': 1}, 'PKCS': {'PKCS#1': 1}, 'BSI': {'AIS 20': 3}, 'RFC': {'RFC3369': 1}, 'ISO': {'ISO/IEC 14443': 2, 'ISO/IEC 7816-4': 1, 'ISO/IEC 9796-2': 1}, 'ICAO': {'ICAO': 85}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to 0383b.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}]} values added.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The report_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The report_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The report_extract_ok property was set to False.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0383a.pdf, code: nok', 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0383a.pdf, code: 408', 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/0383b.pdf, code: nok'].
    • The report_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.
    • The report_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The st_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_DES', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ENV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_PPC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]} values discarded.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The report_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The report_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The report_extract_ok property was set to True.
    • The errors property was updated.
    • The report_pdf_hash property was set to 743dfb2cbb2f8e8f5a610d2ba5be7d21e2fe31e03d7353745d1244818d585c83.
    • The st_txt_hash property was set to 1b14626c0e57b206b98310013b53f6033bd1baf4716279c3d542e987010a6ce7.
    • The report_txt_hash property was set to e9febc8833f0b696ec537624ef10c833e557923cc8b2640896361bc49683263d.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 302212, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 44, '/CreationDate': "D:20070503100302+02'00'", '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/Creator': 'Acrobat PDFMaker 7.0.7 für Word', '/Keywords': 'Common Criteria, Certification, Zertifizierung, Sdu ICAO eMRTD version 1.0, Sdu Identification bv', '/Producer': 'Acrobat Distiller 7.0.5 (Windows)', '/ModDate': "D:20070523155029+02'00'", '/Company': 'BSI, Postfach 200363, 53133 Bonn', '/SourceModified': 'D:20070503080240', '/Title': 'Certification Report BSI-DSZ-CC-0383-2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 410147, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 68, '/CreationDate': 'D:20070326084010Z', '/Subject': '', '/Author': 'tomk', '/Creator': 'PDFCreator Version 0.8.0', '/Keywords': '', '/Producer': 'AFPL Ghostscript 8.14', '/ModDate': "D:20070523155109+02'00'", '/Title': 'SDU_ICAO_ST_Lite 1.0.0', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'anssi': {}, 'bsi': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0383-2007', 'cert_item': 'Sdu ICAO eMRTD version 1.0', 'developer': 'Sdu Identification bv', 'cert_lab': 'BSI'}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0383-2007': 44, 'BSI-DSZ-CC-0249-2006': 6}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0017-2005': 2, 'BSI-PP- 0017-2005': 1, 'BSI-PP-0017': 1, 'BSI-PP-0002-2001': 1}}, 'cc_security_level': {'EAL': {'EAL4': 14, 'EAL 1': 1, 'EAL 7': 1, 'EAL 4': 1, 'EAL4+': 1, 'EAL5+': 1, 'EAL1': 5, 'EAL3': 4, 'EAL5': 6, 'EAL7': 4, 'EAL2': 3, 'EAL6': 3, 'EAL4 augmented': 3}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 2, 'ACM_CAP.4': 2, 'ACM_SCP.2': 2, 'ACM_AUT': 2, 'ACM_CAP': 2, 'ACM_SCP': 2}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 2, 'ADO_DEL': 2, 'ADO_IGS': 2}, 'ADV': {'ADV_IMP.2': 5, 'ADV_FSP.2': 1, 'ADV_HLD.2': 1, 'ADV_LLD.1': 1, 'ADV_RCR.1': 1, 'ADV_SPM.1': 1, 'ADV_FSP': 2, 'ADV_HLD': 2, 'ADV_IMP': 2, 'ADV_INT': 2, 'ADV_LLD': 2, 'ADV_RCR': 2, 'ADV_SPM': 2}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1, 'AGD_ADM': 2, 'AGD_USR': 2}, 'ALC': {'ALC_DVS.2': 6, 'ALC_LCD.1': 2, 'ALC_TAT.1': 2, 'ALC_DVS': 2, 'ALC_FLR': 2, 'ALC_LCD': 1, 'ALC_TAT': 2}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_COV': 2, 'ATE_DPT': 2, 'ATE_FUN': 2, 'ATE_IND': 2}, 'AVA': {'AVA_VLA.2': 3, 'AVA_MSU.2': 1, 'AVA_SOF.1': 1, 'AVA_CCA': 2, 'AVA_MSU': 2, 'AVA_SOF': 3, 'AVA_VLA': 3, 'AVA_VLA.3': 1, 'AVA_VLA.4': 1}, 'ASE': {'ASE_DES.1': 1, 'ASE_ENV.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.1': 1, 'ASE_PPC.1': 1, 'ASE_REQ.1': 1, 'ASE_SRE.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 1}, 'FCS': {'FCS_CKM': 4, 'FCS_CKM.4': 1, 'FCS_COP': 8, 'FCS_RND': 2}, 'FDP': {'FDP_ACC.1': 2, 'FDP_ACF.1': 2, 'FDP_ITC.1': 1, 'FDP_UCT': 2, 'FDP_UIT': 2, 'FDP_DAU': 1}, 'FIA': {'FIA_UID.1': 1, 'FIA_UAU.1': 1, 'FIA_UAU': 4, 'FIA_UAU.5': 1, 'FIA_API': 1}, 'FMT': {'FMT_MOF.1': 1, 'FMT_SMF.1': 1, 'FMT_SMR.1': 1, 'FMT_MTD': 4, 'FMT_LIM.1': 1, 'FMT_LIM.2': 1}, 'FPT': {'FPT_FLS.1': 1, 'FPT_TST.1': 1, 'FPT_PHP.3': 1, 'FPT_RVM.1': 1, 'FPT_SEP.1': 1}}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies AG': 1}, 'Philips': {'Philips': 5}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 5}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 2}, '3DES': {'Triple-DES': 3}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 2}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1}, 'FI': {'Physical Tampering': 1, 'Malfunction': 1, 'malfunction': 1}}, 'technical_report_id': {'BSI': {'BSI 7125': 2, 'BSI 7148': 1, 'BSI 7149': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 1, 'EF.DG12': 1, 'EF.COM': 1}}, 'standard_id': {'BSI': {'AIS 34': 3, 'AIS 36': 3, 'AIS 25': 2, 'AIS 26': 2, 'AIS20': 1, 'AIS 32': 1}, 'ISO': {'ISO/IEC 15408:2005': 3, 'ISO/IEC15408: 2005': 1}, 'ICAO': {'ICAO': 26}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.1': 1}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'6] Electronic Passport SECURITY TARGET for Sdu ICAO eMRTD, BSI- DSZ-CC-0383 Version 1.5.4, Sdu (confidential document) B-20 BSI-DSZ-CC-0383-2007 Certification Report [7] Electronic Passport SECURITY TARGET LITE for': 1, 'Version 2, 07 March 2007, BSI-DSZ-CC- 0383 for Sdu ICAO eMRTD 1.0, TÜV Informationstechnik GmbH (confidential document) [9] Common Criteria Protection Profile Machine Readable Travel Document with „ICAO Application': 1, 'Target (Electronic Passport SECURITY TARGET for Sdu ICAO eMRTD, BSI-DSZ-CC-0383 Version 1.5.4, Sdu (confidential document) [6]). The evaluators verified, that the requirements for the TOE life cycle phases up to delivery': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0017': 1, 'BSI-PP-0002-2001': 1}}, 'cc_security_level': {'EAL': {'EAL4+': 1, 'EAL4': 3, 'EAL4 augmented': 2}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 1, 'ACM_SCP.2': 1}, 'ADO': {'ADO_DEL.2': 1}, 'ADV': {'ADV_IMP.2': 5, 'ADV_SPM.1': 2, 'ADV_FSP.2': 1, 'ADV_HLD.2': 1, 'ADV_LLD.1': 1, 'ADV_RCR.1': 1}, 'AGD': {'AGD_ADM.1': 1}, 'ALC': {'ALC_DVS.2': 5, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_MSU.2': 1, 'AVA_VLA.2': 1}, 'APE': {'APE_SRE': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS': 7, 'FAU_SAS.1': 7, 'FAU_SAS.1.1': 2, 'FAU_GEN': 1}, 'FCS': {'FCS_RND': 12, 'FCS_CKM': 5, 'FCS_CKM.1': 17, 'FCS_CKM.2': 3, 'FCS_COP.1': 19, 'FCS_CKM.4': 16, 'FCS_COP': 9, 'FCS_RND.1': 8, 'FCS_RND.1.1': 1}, 'FDP': {'FDP_ITC.1': 12, 'FDP_ITC.2': 12, 'FDP_ACC.1': 14, 'FDP_ACF.1': 14, 'FDP_ACF': 4, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_IFC.1': 6, 'FDP_UCT': 5, 'FDP_UCT.1': 6, 'FDP_UIT': 5, 'FDP_UIT.1': 4, 'FDP_DAU': 1, 'FDP_DAU.1': 3, 'FDP_ACC': 2, 'FDP_IFC': 1, 'FDP_IFF': 1}, 'FIA': {'FIA_API': 13, 'FIA_UAU': 16, 'FIA_UID.1': 4, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 2, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.4': 4, 'FIA_UAU.5': 2, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 2, 'FIA_UAU.6': 4, 'FIA_API.1': 4, 'FIA_SOS.2': 1, 'FIA_API.1.1': 1}, 'FMT': {'FMT_LIM': 8, 'FMT_MSA.2': 13, 'FMT_MOF.1': 5, 'FMT_MSA.3': 3, 'FMT_MOF.1.1': 1, 'FMT_SMF.1': 6, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 6, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_LIM.1': 14, 'FMT_LIM.1.1': 2, 'FMT_LIM.2': 13, 'FMT_LIM.2.1': 2, 'FMT_MTD': 4, 'FMT_MTD.1': 8}, 'FPT': {'FPT_FLS.1': 3, 'FPT_TST.1': 4, 'FPT_PHP.3': 4, 'FPT_RVM.1': 3, 'FPT_SEP.1': 3, 'FPT_FLS.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_AMT.1': 1, 'FPT_PHP.3.1': 1, 'FPT_RVM.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1}, 'FTP': {'FTP_ITC.1': 4, 'FTP_TRP.1': 4}}, 'cc_claims': {}, 'vendor': {'Philips': {'Philips': 5}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 8}, '3DES': {'Triple-DES': 14}}, 'constructions': {'MAC': {'KMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 8}, 'SHA2': {'SHA-224': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 7}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RND': 3}}, 'cipher_mode': {'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 3, 'DPA': 2, 'SPA': 1, 'timing attacks': 1}, 'FI': {'Physical Tampering': 2, 'physical tampering': 1, 'Physical tampering': 1, 'Malfunction': 1, 'malfunction': 4, 'fault injection': 1}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {'BSI': {'BSI 10': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 180-224': 1, 'FIPS 46-3': 4, 'FIPS 180-1': 1, 'FIPS 180-2': 3, 'FIPS PUB 46-3': 1}, 'PKCS': {'PKCS#1': 1}, 'BSI': {'AIS 20': 3}, 'RFC': {'RFC3369': 1}, 'ISO': {'ISO/IEC 14443': 2, 'ISO/IEC 7816-4': 1, 'ISO/IEC 9796-2': 1}, 'ICAO': {'ICAO': 85}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 0383a.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-0383-2007.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_DES', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ENV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_PPC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]} values added.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0383a.pdf, code: 408'].
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].

Raw data

{
  "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "8e47614ffc7cecd5",
  "heuristics": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics",
    "cert_id": "BSI-DSZ-CC-0383-2007",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_dependency_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_DES",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ENV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_PPC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.0"
      ]
    },
    "indirect_dependency_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport",
        "maintenance_date": "2007-08-07",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/0383_ma1.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "Sdu ICAO eMRTD version 1.1.0"
      }
    ]
  },
  "manufacturer": "Sdu Identification bv",
  "manufacturer_web": "https://www.sdu-identification.nl/index2.html",
  "name": "Sdu ICAO eMRTD version 1.0",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2007-05-02",
  "pdf_data": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData",
    "report_filename": "0383a.pdf",
    "report_frontpage": {
      "anssi": {},
      "bsi": {
        "cert_id": "BSI-DSZ-CC-0383-2007",
        "cert_item": "Sdu ICAO eMRTD version 1.0",
        "cert_lab": "BSI",
        "developer": "Sdu Identification bv",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ]
      },
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0249-2006": 6,
          "BSI-DSZ-CC-0383-2007": 44
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP- 0017-2005": 1,
          "BSI-PP-0002-2001": 1,
          "BSI-PP-0017": 1,
          "BSI-PP-0017-2005": 2
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 2,
          "ACM_AUT.1": 2,
          "ACM_CAP": 2,
          "ACM_CAP.4": 2,
          "ACM_SCP": 2,
          "ACM_SCP.2": 2
        },
        "ADO": {
          "ADO_DEL": 2,
          "ADO_DEL.2": 2,
          "ADO_IGS": 2,
          "ADO_IGS.1": 2
        },
        "ADV": {
          "ADV_FSP": 2,
          "ADV_FSP.2": 1,
          "ADV_HLD": 2,
          "ADV_HLD.2": 1,
          "ADV_IMP": 2,
          "ADV_IMP.2": 5,
          "ADV_INT": 2,
          "ADV_LLD": 2,
          "ADV_LLD.1": 1,
          "ADV_RCR": 2,
          "ADV_RCR.1": 1,
          "ADV_SPM": 2,
          "ADV_SPM.1": 1
        },
        "AGD": {
          "AGD_ADM": 2,
          "AGD_ADM.1": 1,
          "AGD_USR": 2,
          "AGD_USR.1": 1
        },
        "ALC": {
          "ALC_DVS": 2,
          "ALC_DVS.2": 6,
          "ALC_FLR": 2,
          "ALC_LCD": 1,
          "ALC_LCD.1": 2,
          "ALC_TAT": 2,
          "ALC_TAT.1": 2
        },
        "ASE": {
          "ASE_DES.1": 1,
          "ASE_ENV.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.1": 1,
          "ASE_PPC.1": 1,
          "ASE_REQ.1": 1,
          "ASE_SRE.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV": 2,
          "ATE_COV.2": 1,
          "ATE_DPT": 2,
          "ATE_DPT.1": 1,
          "ATE_FUN": 2,
          "ATE_FUN.1": 1,
          "ATE_IND": 2,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_CCA": 2,
          "AVA_MSU": 2,
          "AVA_MSU.2": 1,
          "AVA_SOF": 3,
          "AVA_SOF.1": 1,
          "AVA_VLA": 3,
          "AVA_VLA.2": 3,
          "AVA_VLA.3": 1,
          "AVA_VLA.4": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 4": 1,
          "EAL 7": 1,
          "EAL1": 5,
          "EAL2": 3,
          "EAL3": 4,
          "EAL4": 14,
          "EAL4 augmented": 3,
          "EAL4+": 1,
          "EAL5": 6,
          "EAL5+": 1,
          "EAL6": 3,
          "EAL7": 4
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS.1": 1
        },
        "FCS": {
          "FCS_CKM": 4,
          "FCS_CKM.4": 1,
          "FCS_COP": 8,
          "FCS_RND": 2
        },
        "FDP": {
          "FDP_ACC.1": 2,
          "FDP_ACF.1": 2,
          "FDP_DAU": 1,
          "FDP_ITC.1": 1,
          "FDP_UCT": 2,
          "FDP_UIT": 2
        },
        "FIA": {
          "FIA_API": 1,
          "FIA_UAU": 4,
          "FIA_UAU.1": 1,
          "FIA_UAU.5": 1,
          "FIA_UID.1": 1
        },
        "FMT": {
          "FMT_LIM.1": 1,
          "FMT_LIM.2": 1,
          "FMT_MOF.1": 1,
          "FMT_MTD": 4,
          "FMT_SMF.1": 1,
          "FMT_SMR.1": 1
        },
        "FPT": {
          "FPT_FLS.1": 1,
          "FPT_PHP.3": 1,
          "FPT_RVM.1": 1,
          "FPT_SEP.1": 1,
          "FPT_TST.1": 1
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          "6] Electronic Passport SECURITY TARGET for Sdu ICAO eMRTD, BSI- DSZ-CC-0383 Version 1.5.4, Sdu (confidential document) B-20 BSI-DSZ-CC-0383-2007 Certification Report [7] Electronic Passport SECURITY TARGET LITE for": 1,
          "Target (Electronic Passport SECURITY TARGET for Sdu ICAO eMRTD, BSI-DSZ-CC-0383 Version 1.5.4, Sdu (confidential document) [6]). The evaluators verified, that the requirements for the TOE life cycle phases up to delivery": 1,
          "Version 2, 07 March 2007, BSI-DSZ-CC- 0383 for Sdu ICAO eMRTD 1.0, T\u00dcV Informationstechnik GmbH (confidential document) [9] Common Criteria Protection Profile Machine Readable Travel Document with \u201eICAO Application": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 5
        }
      },
      "hash_function": {},
      "ic_data_group": {
        "EF": {
          "EF.COM": 1,
          "EF.DG1": 1,
          "EF.DG12": 1
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {
        "JavaCard": {
          "Java Card 2.2.1": 1
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 1,
          "Physical Tampering": 1,
          "malfunction": 1
        },
        "SCA": {
          "physical probing": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 25": 2,
          "AIS 26": 2,
          "AIS 32": 1,
          "AIS 34": 3,
          "AIS 36": 3,
          "AIS20": 1
        },
        "ICAO": {
          "ICAO": 26
        },
        "ISO": {
          "ISO/IEC 15408:2005": 3,
          "ISO/IEC15408: 2005": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "3DES": {
            "Triple-DES": 3
          },
          "DES": {
            "DES": 2
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7125": 2,
          "BSI 7148": 1,
          "BSI 7149": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon Technologies AG": 1
        },
        "Philips": {
          "Philips": 5
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/Company": "BSI, Postfach 200363, 53133 Bonn",
      "/CreationDate": "D:20070503100302+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 7.0.7 f\u00fcr Word",
      "/Keywords": "Common Criteria, Certification, Zertifizierung, Sdu ICAO eMRTD version 1.0, Sdu Identification bv",
      "/ModDate": "D:20070523155029+02\u002700\u0027",
      "/Producer": "Acrobat Distiller 7.0.5 (Windows)",
      "/SourceModified": "D:20070503080240",
      "/Title": "Certification Report BSI-DSZ-CC-0383-2007",
      "pdf_file_size_bytes": 302212,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 44
    },
    "st_filename": "0383b.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDSA": {
            "ECDSA": 1
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0002-2001": 1,
          "BSI-PP-0017": 1
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT.1": 1,
          "ACM_SCP.2": 1
        },
        "ADO": {
          "ADO_DEL.2": 1
        },
        "ADV": {
          "ADV_FSP.2": 1,
          "ADV_HLD.2": 1,
          "ADV_IMP.2": 5,
          "ADV_LLD.1": 1,
          "ADV_RCR.1": 1,
          "ADV_SPM.1": 2
        },
        "AGD": {
          "AGD_ADM.1": 1
        },
        "ALC": {
          "ALC_DVS.2": 5,
          "ALC_TAT.1": 1
        },
        "APE": {
          "APE_SRE": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_MSU.2": 1,
          "AVA_VLA.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 3,
          "EAL4 augmented": 2,
          "EAL4+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_SAS": 7,
          "FAU_SAS.1": 7,
          "FAU_SAS.1.1": 2
        },
        "FCS": {
          "FCS_CKM": 5,
          "FCS_CKM.1": 17,
          "FCS_CKM.2": 3,
          "FCS_CKM.4": 16,
          "FCS_COP": 9,
          "FCS_COP.1": 19,
          "FCS_RND": 12,
          "FCS_RND.1": 8,
          "FCS_RND.1.1": 1
        },
        "FDP": {
          "FDP_ACC": 2,
          "FDP_ACC.1": 14,
          "FDP_ACF": 4,
          "FDP_ACF.1": 14,
          "FDP_DAU": 1,
          "FDP_DAU.1": 3,
          "FDP_IFC": 1,
          "FDP_IFC.1": 6,
          "FDP_IFF": 1,
          "FDP_ITC.1": 12,
          "FDP_ITC.1.1": 1,
          "FDP_ITC.1.2": 1,
          "FDP_ITC.1.3": 1,
          "FDP_ITC.2": 12,
          "FDP_UCT": 5,
          "FDP_UCT.1": 6,
          "FDP_UIT": 5,
          "FDP_UIT.1": 4
        },
        "FIA": {
          "FIA_API": 13,
          "FIA_API.1": 4,
          "FIA_API.1.1": 1,
          "FIA_SOS.2": 1,
          "FIA_UAU": 16,
          "FIA_UAU.1": 2,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.4": 4,
          "FIA_UAU.5": 2,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 2,
          "FIA_UAU.6": 4,
          "FIA_UID.1": 4,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_LIM": 8,
          "FMT_LIM.1": 14,
          "FMT_LIM.1.1": 2,
          "FMT_LIM.2": 13,
          "FMT_LIM.2.1": 2,
          "FMT_MOF.1": 5,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.2": 13,
          "FMT_MSA.3": 3,
          "FMT_MTD": 4,
          "FMT_MTD.1": 8,
          "FMT_SMF.1": 6,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 6,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_AMT.1": 1,
          "FPT_FLS.1": 3,
          "FPT_FLS.1.1": 1,
          "FPT_PHP.3": 4,
          "FPT_PHP.3.1": 1,
          "FPT_RVM.1": 3,
          "FPT_RVM.1.1": 1,
          "FPT_SEP.1": 3,
          "FPT_SEP.1.1": 1,
          "FPT_SEP.1.2": 1,
          "FPT_TST.1": 4,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC.1": 4,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 7
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 8
          },
          "SHA2": {
            "SHA-224": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 3
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 1,
          "Physical Tampering": 2,
          "Physical tampering": 1,
          "fault injection": 1,
          "malfunction": 4,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 2,
          "SPA": 1,
          "physical probing": 3,
          "timing attacks": 1
        },
        "other": {
          "reverse engineering": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 3
        },
        "FIPS": {
          "FIPS 180-1": 1,
          "FIPS 180-2": 3,
          "FIPS 180-224": 1,
          "FIPS 46-3": 4,
          "FIPS PUB 46-3": 1
        },
        "ICAO": {
          "ICAO": 85
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 7816-4": 1,
          "ISO/IEC 9796-2": 1
        },
        "PKCS": {
          "PKCS#1": 1
        },
        "RFC": {
          "RFC3369": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "3DES": {
            "Triple-DES": 14
          },
          "DES": {
            "DES": 8
          }
        },
        "constructions": {
          "MAC": {
            "KMAC": 1
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 10": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Philips": {
          "Philips": 5
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "tomk",
      "/CreationDate": "D:20070326084010Z",
      "/Creator": "PDFCreator Version 0.8.0",
      "/Keywords": "",
      "/ModDate": "D:20070523155109+02\u002700\u0027",
      "/Producer": "AFPL Ghostscript 8.14",
      "/Subject": "",
      "/Title": "SDU_ICAO_ST_Lite 1.0.0",
      "pdf_file_size_bytes": 410147,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 68
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/0383a.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_DVS.2",
      "ADV_IMP.2",
      "EAL4+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/0383b.pdf",
  "state": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState",
    "errors": [],
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "743dfb2cbb2f8e8f5a610d2ba5be7d21e2fe31e03d7353745d1244818d585c83",
    "report_txt_hash": "e9febc8833f0b696ec537624ef10c833e557923cc8b2640896361bc49683263d",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "22219cb2545ada670f7dd170ee71ec812a87767a034eb4ca526d5e3977bbe489",
    "st_txt_hash": "1b14626c0e57b206b98310013b53f6033bd1baf4716279c3d542e987010a6ce7"
  },
  "status": "archived"
}