ID&Trust IDentity-J with SAC (PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52G v1.0.7052

CSV information ?

Status active
Valid from 28.08.2019
Valid until 28.08.2024
Scheme 🇯🇵 JP
Manufacturer Maxell, Ltd
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, EAL4+, ALC_DVS.2
Protection profiles

Heuristics summary ?

Certificate ID: JISEC-CC-CRP-C0648-01-2019

Certificate ?

Extracted keywords

Protocols
PACE

Security level
EAL4, EAL2
Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5
Certificates
JISEC-CC-CRP-C0648-01-2019
Evaluation facilities
TÜV Informationstechnik

File metadata

Creation date: D:20191004102920+09'00'
Modification date: D:20191004103115+09'00'
Pages: 2
Creator: Microsoft® Word 2010
Producer: Microsoft® Word 2010

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES, CMAC
Asymmetric Algorithms
ECDH, ECDSA, DH, Diffie-Hellman
Hash functions
SHA-1, SHA-256, SHA-384
Schemes
MAC, Key agreement
Protocols
PACE
Elliptic Curves
P-256, P-384, NIST P-256, NIST P-384
Block cipher modes
CBC

IC data groups
EF.DG1, EF.DG2, EF.DG13, EF.DG14, EF.DG15, EF.COM, EF.CardAccess, EF.SOD
Vendor
Infineon, Infineon Technologies AG, Gemalto

Security level
EAL4, EAL6, EAL6+, EAL4 augmented, EAL6 augmented
Claims
A.PKI
Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5
Certificates
BSI-DSZ-CC-0869-V2-2019, BSI-DSZ-CC-0891-V3-2018, JISEC-CC-CRP-C0648-01-2019
Evaluation facilities
TÜV Informationstechnik, TÜViT

Side-channel analysis
physical probing, Side channel, physical tampering, malfunction, DFA, Fault Injection

Standards
AIS34, ISO/IEC 7816-4, ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Creation date: D:20191113095255+09'00'
Modification date: D:20191113095335+09'00'
Pages: 48
Creator: Microsoft® Word 2010
Producer: Microsoft® Word 2010

References

Outgoing
  • BSI-DSZ-CC-0891-V3-2018 - Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware and optional software
  • BSI-DSZ-CC-0869-V2-2019 - Java Card Platform Implementation for Infineon on M7892 G12 (SLJ 52GxxyyyzC) V2.0

Security target ?

Extracted keywords

Symmetric Algorithms
AES, AES-128, AES-256, CMAC
Asymmetric Algorithms
ECDH, ECDSA, Diffie-Hellman
Hash functions
SHA-1, SHA-256, SHA-384
Schemes
MAC, Key agreement
Protocols
PACE
Randomness
RND
Block cipher modes
CBC

JavaCard versions
Java Card 3.0.1
IC data groups
EF.DG1, EF.DG2, EF.DG13, EF.DG14, EF.DG15, EF.COM, EF.CardAccess, EF.SOD
Vendor
Infineon

Security level
EAL4+, EAL5+, EAL4, EAL5, EAL4 augmented
Claims
O.OPERATE, O.RESOURCES, O.ALARM, O.CIPHER, O.PACE, O.KEY-MNGT, O.PIN-MNGT, O.RND, O.GLOBAL_ARRAYS_CONFID, O.TRANSACTION, O.REALLOCATION, O.RECOVERY, O.OS_SUPPORT, O.AA, T.CONFID-APPLI-DATA, T.CONFID-JCS-DATA, T.INTEG-APPLI-DATA, T.INTEG-JCS-DATA, T.RESOURCES, T.RND, T.PHYSICAL, T.LEAKAGE, T.FAULT, T.SID, A.PKI, A.APPLET, A.VERIFICATION, OE.PKI
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_IMP.1, AGD_OPE.1, ALC_DVS.2, ALC_DVS.1, ALC_CMC.4, ALC_DEL.1, ALC_LCD.1, ATE_COV.2, ATE_FUN.1, AVA_VAN.5, AVA_VAN.3, ASE_CCL.1, ASE_INT.1, ASE_REQ.2, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FCO_NRO, FCS_CKM, FCS_CKM.4, FCS_COP, FCS_RND.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_COP.1, FCS_RNG.1, FCS_RND.1.1, FCS_CKM.4.1, FDP_ACC, FDP_ACF, FDP_ITC.1, FDP_UCT, FDP_UIT, FDP_IFC, FDP_IFF, FDP_ITC, FDP_RIP, FDP_ROL, FDP_SDI.2, FDP_ITC.2, FDP_ACF.1, FDP_ACC.1, FDP_IFC.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_UCT.1, FDP_UIT.1, FIA_AFL, FIA_UAU.1, FIA_UAU.4, FIA_UAU.5, FIA_UID.1, FIA_ATD, FIA_UID, FIA_USB, FIA_AFL.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA, FMT_MTD, FMT_SMF, FMT_SMR, FMT_MSA.3, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPR_UNO.1, FPT_PHP.3, FPT_FLS.1, FPT_FLS, FPT_RCV, FPT_TDC.1, FPT_PHP.3.1, FTP_ITC.1, FTP_ITC, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3

Side-channel analysis
side-channel, SPA, DPA, timing attack

Standards
FIPS 180-4, FIPS 180-2, FIPS 197, SP 800-38B, BSI-AIS20, AIS20, ISO/IEC 10116, ICAO, CCMB-2017-04-002

File metadata

Title: ID&Trust IDENTITY APPLET-J with SAC (PACE) and AA - Security Target Lite
Author: LovaszD
Creation date: D:20190726101904+02'00'
Modification date: D:20190726101904+02'00'
Pages: 57
Creator: Microsoft® Word for Office 365
Producer: Microsoft® Word for Office 365

References

Outgoing

Heuristics ?

Certificate ID: JISEC-CC-CRP-C0648-01-2019

Extracted SARs

ASE_CCL.1, ASE_INT.1, ADV_ARC.1, AGD_OPE.1, ASE_REQ.2, ALC_DEL.1, ALC_DVS.2, ATE_FUN.1, ASE_TSS.1, AVA_VAN.5, ADV_IMP.1, ATE_COV.2, ALC_CMC.4, ALC_LCD.1

Scheme data ?

Cert Id C0648
Supplier Maxell, Ltd.
Toe Overseas Name ID&Trust IDentity-J with SAC (PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52Gv1.0.7052
Claim EAL4+ ALC_DVS.2,AVA_VAN.5 PP
Certification Date 2019-08
Toe Overseas Link https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/c0648_it8678.html
Toe Japan Name ID&Trust IDentity-J with SAC (PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52Gv1.0.7052
Enhanced
Product ID&Trust IDentity-J with SAC (PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52G
Toe Version v1.0.7052
Product Type ICs for e-passports
Certification Date 2019-08-28
Cc Version 3.1 release5
Assurance Level EAL4 Augmented with ALC_DVS.2, AVA_VAN.5
Protection Profile Protection Profile for ePassport IC with SAC (PACE) and Active Authentication version 1.00 (Certification Identification: JISEC-C0499)
Vendor Maxell, Ltd.
Evaluation Facility TÜV Informationstechnik GmbH, Evaluation Body for IT Security
Report Link https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/b9ck990000000nba-att/C0648_erpt.pdf
Cert Link https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/b9ck990000000nba-att/c0648_eimg.pdf
Target Link https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/b9ck990000000nba-att/c0648_st.pdf
Description PRODUCT DESCRIPTION Description of TOE The TOE is an ePassport IC (including necessary software). This ePassport IC is IC chip hardware with the contactless communication interface, and basic software and ePassport application program. The operation of the security functions applied to contactless communication with the terminal comply with the PACE, and Active Authentication specifications defined by Part11 of “ICAO Doc 9303 Machine readable Travel Documents Seventh Edition”. TOE security functionality The main security functions of the TOE are to protect data stored in the TOE from illicit reading or writing. The TOE provides the main security functions, including: Password Authenticated Connection Establishment function; Active Authentication function; Write protection function; Protection function in transport; and Tamper resistance.

References ?

Updates ?

  • 22.04.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'claim': 'EAL4+\nALC_DVS.2,AVA_VAN.5 PP', 'enhanced': {'__update__': {'report_link': 'https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/b9ck990000000nba-att/C0648_erpt.pdf', 'cert_link': 'https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/b9ck990000000nba-att/c0648_eimg.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/b9ck990000000nba-att/c0648_st.pdf', 'description': 'PRODUCT DESCRIPTION \n \n \n Description of TOE \n The TOE is an ePassport IC (including necessary software). This ePassport IC is IC chip hardware with the contactless communication interface, and basic software and ePassport application program. The operation of the security functions applied to contactless communication with the terminal comply with the PACE, and Active Authentication specifications defined by Part11 of “ICAO Doc 9303 Machine readable Travel Documents Seventh Edition”. \n \n \n \n TOE security functionality \n The main security functions of the TOE are to protect data stored in the TOE from illicit reading or writing. The TOE provides the main security functions, including: \n \n Password Authenticated Connection Establishment function; \n Active Authentication function; \n Write protection function; \n Protection function in transport; and \n Tamper resistance.'}}} data.
  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '1b8f811a97829be3b8d42ec70347734a660a438fc6ac9bfa5b8c6197f61fcad4', 'txt_hash': '0c5a7aa7bc34151d6844f5858889c59b5a99a4750d5cddc272684d00f363719a'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '9a1b162063f33b20faaa6d4f2ad229af099b1b04003d8b673e34cefe4888a091', 'txt_hash': '982a3088799c3bdc77def8229ca87a4a4f1981c708098ad7952dc32c7ad72721'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ef114a5738dd05a9b1fd91aff959ff7f709300f77daef5c209479e43c70bcd02', 'txt_hash': '52969d660b6c0023e6f4bb94d42a07ea86fc90e69997e6ce11d1486919858652'}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': {'pdf_file_size_bytes': 86462, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 2, '/CreationDate': "D:20191004102920+09'00'", '/Creator': 'Microsoft® Word 2010', '/ModDate': "D:20191004103115+09'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'JP': {'JISEC-CC-CRP-C0648-01-2019': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 1, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'PACE': {'PACE': 2}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': 'c0648_eimg.pdf'}.
    • The report_frontpage property was set to {}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0869-V2-2019': 2, 'BSI-DSZ-CC-0891-V3-2018': 1}, '__delete__': ['BSI-DSZ-CC-0869-V2-209']}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {}} data.

    The computed heuristics were updated.

    • The cert_id property was set to JISEC-CC-CRP-C0648-01-2019.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0869-V2-209': 1}, '__update__': {'BSI-DSZ-CC-0869-V2-2019': 4, 'BSI-DSZ-CC-0891-V3-2018': 2}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0869-V2': 3}}} data.

    The computed heuristics were updated.

    • The cert_id property was set to C0648.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0869-V2-2019': 2, 'BSI-DSZ-CC-0891-V3-2018': 1}, '__delete__': ['BSI-DSZ-CC-0869-V2-209']}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {}} data.

    The computed heuristics were updated.

    • The cert_id property was set to JISEC-CC-CRP-C0648-01-2019.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
    • The scheme_data property was updated, with the {'claim': 'EAL4+\n ALC_DVS.2,AVA_VAN.5PP'} data.
  • 21.09.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'cert_id': 'C0648', 'toe_overseas_name': 'ID&Trust IDentity-J with SAC (PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52Gv1.0.7052', 'claim': 'EAL4+\n ALC_DVS.2,AVA_VAN.5', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/c0648_it8678.html', 'toe_japan_name': 'ID&Trust IDentity-J with SAC (PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52Gv1.0.7052', 'enhanced': {'__update__': {'product': 'ID&Trust IDentity-J with SAC (PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52G', 'assurance_level': 'EAL4 Augmented with ALC_DVS.2, AVA_VAN.5', 'protection_profile': 'Protection Profile for ePassport IC with SAC (PACE) and Active Authentication version 1.00 (Certification Identification: JISEC-C0499)', 'vendor': 'Maxell, Ltd.', 'report_link': 'https://www.ipa.go.jp/en/security/C0648_erpt.pdf', 'cert_link': 'https://www.ipa.go.jp/en/security/c0648_eimg.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0648_st.pdf', 'description': 'PRODUCT DESCRIPTION \n Description of TOE \n The TOE is an ePassport IC (including necessary software). This ePassport IC is IC chip hardware with the contactless communication interface, and basic software and ePassport application program. The operation of the security functions applied to contactless communication with the terminal comply with the PACE, and Active Authentication specifications defined by Part11 of “ICAO Doc 9303 Machine readable Travel Documents Seventh Edition”. \n \n TOE security functionality \n The main security functions of the TOE are to protect data stored in the TOE from illicit reading or writing. The TOE provides the main security functions, including: \n \n \n \n - \n Password Authenticated Connection Establishment function; \n \n \n - \n Active Authentication function; \n \n \n - \n Write protection function; \n \n \n - \n Protection function in transport; and \n \n \n - \n Tamper resistance.'}}} data.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'cert_id': 'C0649', 'supplier': 'Maxell, Ltd.', 'toe_overseas_name': 'ID&Trust IDentity-J with SAC (BAC+PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52Gv1.0.7052', 'claim': 'EAL4+\n ALC_DVS.2', 'certification_date': '2019-08', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/c0649_it8679.html', 'toe_japan_name': 'ID&Trust IDentity-J with SAC (BAC+PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52Gv1.0.7052', 'enhanced': {'product': 'ID&Trust IDentity-J with SAC (BAC+PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52G', 'toe_version': 'v1.0.7052', 'product_type': 'ICs for e-passports', 'certification_date': '2019-08-28', 'cc_version': '3.1 release5', 'assurance_level': 'EAL4 Augmented with ALC_DVS.2', 'protection_profile': 'Protection Profile for ePassport IC with SAC (BAC+PACE) and Active Authentication version 1.00 (Certification Identification : JISEC-C0500)', 'vendor': 'Maxell, Ltd', 'evaluation_facility': 'TÜV Informationstechnik GmbH, Evaluation Body for IT Security', 'report_link': 'https://www.ipa.go.jp/en/security/C0649_erpt.pdf', 'cert_link': 'https://www.ipa.go.jp/en/security/c0649_eimg.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0649_st.pdf', 'description': 'PRODUCT DESCRIPTION \n Description of TOE \n The TOE is an ePassport IC (including necessary software). This ePassport IC is IC chip hardware with the contactless communication interface, and basic software and ePassport application program. The operation of the security functions applied to contactless communication with the terminal comply with the BAC, PACE, and Active Authentication specifications defined by Part11 of “ICAO Doc 9303 Machine readable Travel Documents Seventh Edition”. \n \n TOE security functionality \n The main security functions of the TOE are to protect data stored in the TOE from illicit reading or writing. The TOE provides the main security functions, including: \n \n \n \n - \n Basic Access Control function; \n \n \n - \n Password Authenticated Connection Establishment function; \n \n \n - \n Active Authentication function; \n \n \n - \n Disable function of BAC function; \n \n \n - \n Write protection function; \n \n \n - \n Protection function in transport; and \n \n \n - \n Tamper resistance.'}}}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V2-2016', 'BSI-DSZ-CC-0891-2015']}}} data.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V2-2016', 'BSI-DSZ-CC-0891-2015']}}} data.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is https://www.commoncriteriaportal.org/files/epfiles/c0648_eimg.pdf.

    The manufacturer_web was updated.

    • The new value is https://www.maxell.com/.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for ePassport IC with SAC (PACE) and Active Authentication 1.00', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/c0499_epp.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['EPASS_IC_SAC_PACE_V1.0']}}]}.

    The state of the certificate object was updated.

    • The report_download_ok property was set to True.
    • The report_convert_ok property was set to True.
    • The report_extract_ok property was set to True.
    • The errors property was set to [].
    • The report_pdf_hash property was set to 1b8f811a97829be3b8d42ec70347734a660a438fc6ac9bfa5b8c6197f61fcad4.
    • The report_txt_hash property was set to 0c5a7aa7bc34151d6844f5858889c59b5a99a4750d5cddc272684d00f363719a.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 546653, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 48, '/CreationDate': "D:20191113095255+09'00'", '/Creator': 'Microsoft® Word 2010', '/ModDate': "D:20191113095335+09'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0869-V2-2019': 4, 'BSI-DSZ-CC-0891-V3-2018': 2, 'BSI-DSZ-CC-0869-V2-209': 1}, 'JP': {'JISEC-CC-CRP-C0648-01-2019': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 3, 'EAL6': 1, 'EAL6+': 1, 'EAL4 augmented': 2, 'EAL6 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 4}, 'AVA': {'AVA_VAN.5': 3}}, 'cc_sfr': {}, 'cc_claims': {'A': {'A.PKI': 3}}, 'vendor': {'Infineon': {'Infineon': 7, 'Infineon Technologies AG': 1}, 'Gemalto': {'Gemalto': 1}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 11, 'TÜViT': 7}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 10}}, 'DES': {'DES': {'DES': 2}}, 'constructions': {'MAC': {'CMAC': 2}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 5}, 'ECDSA': {'ECDSA': 6}}, 'FF': {'DH': {'DH': 1, 'Diffie-Hellman': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-256': 4, 'SHA-384': 3}}}, 'crypto_scheme': {'MAC': {'MAC': 2}, 'KA': {'Key agreement': 1}}, 'crypto_protocol': {'PACE': {'PACE': 59}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 2}}, 'ecc_curve': {'NIST': {'P-256': 1, 'P-384': 1, 'NIST P-256': 1, 'NIST P-384': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'Side channel': 1}, 'FI': {'physical tampering': 1, 'malfunction': 1, 'DFA': 3, 'Fault Injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 4, 'EF.DG2': 4, 'EF.DG13': 4, 'EF.DG14': 6, 'EF.DG15': 9, 'EF.COM': 4, 'EF.CardAccess': 8, 'EF.SOD': 4}}, 'standard_id': {'BSI': {'AIS34': 1}, 'ISO': {'ISO/IEC 7816-4': 4}, 'ICAO': {'ICAO': 12}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to c0648_erpt.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to C0648.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V3-2018', 'BSI-DSZ-CC-0869-V2-2019']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V3-2018', 'BSI-DSZ-CC-0891-V2-2016', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0869-2015', 'BSI-DSZ-CC-0891-2015', 'BSI-DSZ-CC-0869-V2-2019']}} data.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is None.

    The manufacturer_web was updated.

    • The new value is None.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'EPASS_IC_SAC_PACE_V1.0', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The report_download_ok property was set to False.
    • The report_convert_ok property was set to False.
    • The report_extract_ok property was set to False.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/c0648_erpt.pdf, code: nok', 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/c0648_erpt.pdf, code: 408'].
    • The report_pdf_hash property was set to None.
    • The report_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-2015']}}} data.
  • 21.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-2015']}}} data.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for ePassport IC with SAC (PACE) and Active Authentication 1.00', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/c0499_epp.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['EPASS_IC_SAC_PACE_V1.0']}}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for ePassport IC with SAC (PACE) and Active Authentication 1.00', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/c0499_epp.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 28.09.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0869-V2-209']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0869-V2-209']}}} data.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'c0648_erpt.pdf', 'st_filename': 'c0648_st.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'JP': {'__update__': {'JISEC-CC-CRP-C0648-01-2019': 1}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_DVS.2': 4}}}}, 'symmetric_crypto': {'__update__': {'constructions': {'__update__': {'MAC': {'__update__': {'CMAC': 2}}}}}}, 'asymmetric_crypto': {'__update__': {'FF': {'__update__': {'DH': {'__update__': {'DH': 1}}}, '__delete__': ['DSA']}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 2}}}}, 'crypto_protocol': {'__update__': {'PACE': {'__update__': {'PACE': 59}}}}, 'tee_name': {}, 'ic_data_group': {'__update__': {'EF': {'__update__': {'EF.DG14': 6, 'EF.DG15': 9}}}}, 'standard_id': {'__update__': {'ISO': {'__update__': {'ISO/IEC 7816-4': 4}}, 'ICAO': {'__update__': {'ICAO': 12}}}}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__insert__': {'EAL4 augmented': 1}}}}, 'cc_sar': {'__update__': {'ADV': {'__delete__': ['ADV_FSP.4', 'ADV_TDS.3']}, 'AGD': {'__delete__': ['AGD_PRE.1']}, 'ALC': {'__update__': {'ALC_DVS.2': 10}, '__delete__': ['ALC_CMS.4', 'ALC_TAT.1']}, 'ATE': {'__delete__': ['ATE_DPT.1', 'ATE_IND.2']}, 'AVA': {'__update__': {'AVA_VAN.5': 9, 'AVA_VAN.3': 2}}, 'ASE': {'__delete__': ['ASE_ECD.1', 'ASE_OBJ.2', 'ASE_SPD.1']}}, '__delete__': ['ACE']}, 'cc_sfr': {'__insert__': {'FCO': {'FCO_NRO': 1}}, '__update__': {'FCS': {'__insert__': {'FCS_COP': 90}, '__update__': {'FCS_CKM.1': 19, 'FCS_COP.1': 45, 'FCS_CKM': 31}}, 'FDP': {'__insert__': {'FDP_ACC': 26, 'FDP_ACF': 22, 'FDP_UCT': 10, 'FDP_UIT': 11, 'FDP_IFC': 2, 'FDP_IFF': 2, 'FDP_ITC': 1, 'FDP_RIP': 9, 'FDP_ROL': 1, 'FDP_UCT.1': 1, 'FDP_UIT.1': 2}, '__update__': {'FDP_ITC.1': 32, 'FDP_ACF.1': 12, 'FDP_ACC.1': 10}}, 'FIA': {'__insert__': {'FIA_AFL': 24, 'FIA_ATD': 1, 'FIA_UID': 3, 'FIA_USB': 1, 'FIA_AFL.1': 6}, '__update__': {'FIA_UAU.1': 15, 'FIA_UID.1': 13}}, 'FMT': {'__insert__': {'FMT_MSA': 13, 'FMT_MTD': 2, 'FMT_SMF': 4, 'FMT_SMR': 4}, '__update__': {'FMT_SMR.1': 10, 'FMT_SMF.1': 12, 'FMT_MTD.1': 11}}, 'FPT': {'__insert__': {'FPT_FLS': 3, 'FPT_RCV': 3}}, 'FTP': {'__insert__': {'FTP_ITC': 1}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.AA': 8, 'O.PACE': 11}, '__delete__': ['O.IC_SUPPORT']}, 'T': {'__insert__': {'T.SID': 1}}, 'OE': {'__delete__': ['OE']}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 3}, '__delete__': ['AES-']}}}, 'constructions': {'__update__': {'MAC': {'__update__': {'CMAC': 1}}}}}, '__delete__': ['DES']}, 'asymmetric_crypto': {'__update__': {'ECC': {'__update__': {'ECDH': {'__update__': {'ECDH': 4}}, 'ECDSA': {'__update__': {'ECDSA': 3}}}}, 'FF': {'__update__': {'DH': {'__delete__': ['DH']}}, '__delete__': ['DSA']}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__update__': {'SHA-256': 4, 'SHA-384': 2}}}}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 3}}, 'KA': {'__update__': {'Key agreement': 5}, '__delete__': ['KA']}}}, 'crypto_protocol': {'__update__': {'PACE': {'__update__': {'PACE': 102}}}}, 'cipher_mode': {'__update__': {'CBC': {'__update__': {'CBC': 1}}}}, 'ic_data_group': {'__update__': {'EF': {'__update__': {'EF.COM': 4}}}}, 'standard_id': {'__update__': {'BSI': {'__update__': {'AIS20': 1}}, 'ICAO': {'__update__': {'ICAO': 7}}}}} data.

    The computed heuristics were updated.

    • The cert_id property was set to C0648.
    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0869-V2']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0869-V2']}} data.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V3-2018', 'BSI-DSZ-CC-0869-V2-209', 'BSI-DSZ-CC-0869-V2-2019']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V3-2018', 'BSI-DSZ-CC-0891-V2-2016', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0891-2015', 'BSI-DSZ-CC-0869-2015', 'BSI-DSZ-CC-0869-V2-2019', 'BSI-DSZ-CC-0869-V2-209']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}]} values discarded.
  • 02.09.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 9a1b162063f33b20faaa6d4f2ad229af099b1b04003d8b673e34cefe4888a091.
    • The st_txt_hash property was set to 982a3088799c3bdc77def8229ca87a4a4f1981c708098ad7952dc32c7ad72721.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1095310, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 57, '/Title': 'ID&Trust IDENTITY APPLET-J with SAC (PACE) and AA - Security Target Lite', '/Author': 'LovaszD', '/Creator': 'Microsoft® Word for Office 365', '/CreationDate': "D:20190726101904+02'00'", '/ModDate': "D:20190726101904+02'00'", '/Producer': 'Microsoft® Word for Office 365', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0869-V2': 3}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4+': 3, 'EAL5+': 1, 'EAL4': 6, 'EAL5': 2}}, 'cc_sar': {'ACE': {'ACE_SUPP': 2}, 'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS.2': 11, 'ALC_DVS.1': 1, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 6, 'AVA_VAN.3': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 3}, 'FCS': {'FCS_CKM.1': 17, 'FCS_CKM.2': 5, 'FCS_CKM.3': 1, 'FCS_CKM.4': 40, 'FCS_COP.1': 5, 'FCS_RNG.1': 6, 'FCS_RND.1': 12, 'FCS_CKM': 1, 'FCS_RND.1.1': 2, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_SDI.2': 2, 'FDP_ITC.1': 29, 'FDP_ITC.2': 16, 'FDP_ACF.1': 4, 'FDP_ACC.1': 9, 'FDP_IFC.1': 6, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1}, 'FIA': {'FIA_UAU.1': 17, 'FIA_UAU.4': 9, 'FIA_UAU.5': 9, 'FIA_UID.1': 14, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.4.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_SMR.1': 11, 'FMT_SMF.1': 11, 'FMT_MTD.1': 9, 'FMT_MSA.3': 9, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPR': {'FPR_UNO.1': 1}, 'FPT': {'FPT_PHP.3': 13, 'FPT_FLS.1': 2, 'FPT_TDC.1': 1, 'FPT_PHP.3.1': 1}, 'FTP': {'FTP_ITC.1': 19, 'FTP_TRP.1': 4, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.OPERATE': 1, 'O.RESOURCES': 1, 'O.ALARM': 1, 'O.CIPHER': 1, 'O.AA': 11, 'O.PACE': 14, 'O.KEY-MNGT': 1, 'O.PIN-MNGT': 1, 'O.RND': 1, 'O.GLOBAL_ARRAYS_CONFID': 1, 'O.TRANSACTION': 1, 'O.REALLOCATION': 1, 'O.IC_SUPPORT': 1, 'O.RECOVERY': 1, 'O.OS_SUPPORT': 1}, 'T': {'T.CONFID-APPLI-DATA': 1, 'T.CONFID-JCS-DATA': 1, 'T.INTEG-APPLI-DATA': 1, 'T.INTEG-JCS-DATA': 1, 'T.RESOURCES': 1, 'T.RND': 1, 'T.PHYSICAL': 1, 'T.LEAKAGE': 1, 'T.FAULT': 1}, 'A': {'A.PKI': 5, 'A.APPLET': 1, 'A.VERIFICATION': 1}, 'OE': {'OE': 1, 'OE.PKI': 3}}, 'vendor': {'Infineon': {'Infineon': 7}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 8, 'AES-': 1, 'AES-128': 1, 'AES-256': 1}}, 'DES': {'DES': {'DES': 1}}, 'constructions': {'MAC': {'CMAC': 7}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 7}, 'ECDSA': {'ECDSA': 5}}, 'FF': {'DH': {'DH': 7, 'Diffie-Hellman': 2}, 'DSA': {'DSA': 5}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 2}, 'SHA2': {'SHA-256': 5, 'SHA-384': 3}}}, 'crypto_scheme': {'MAC': {'MAC': 13}, 'KA': {'KA': 3, 'Key agreement': 3}}, 'crypto_protocol': {'PACE': {'PACE': 95}}, 'randomness': {'RNG': {'RND': 2}}, 'cipher_mode': {'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side-channel': 1, 'SPA': 1, 'DPA': 2, 'timing attack': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 5, 'EF.DG2': 5, 'EF.DG13': 5, 'EF.DG14': 5, 'EF.DG15': 6, 'EF.COM': 5, 'EF.CardAccess': 6, 'EF.SOD': 5}}, 'standard_id': {'FIPS': {'FIPS 180-4': 4, 'FIPS 180-2': 1, 'FIPS 197': 3}, 'NIST': {'SP 800-38B': 1}, 'BSI': {'BSI-AIS20': 1, 'AIS20': 2}, 'ISO': {'ISO/IEC 10116': 8}, 'ICAO': {'ICAO': 6}, 'CC': {'CCMB-2017-04-002': 1}}, 'javacard_version': {'JavaCard': {'Java Card 3.0.1': 3}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}]} values added.
  • 01.09.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/c0648_erpt.pdf, code: 408'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}]} values discarded.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for ePassport IC with SAC (PACE) and Active Authentication 1.00', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/c0499_epp.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['EPASS_IC_SAC_PACE_V1.0']}}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0869-V2-2019': 4, 'BSI-DSZ-CC-0891-V3-2018': 2, 'BSI-DSZ-CC-0869-V2-209': 1}, 'JP': {'JISEC-CC-CRP-C0648-01-2019': 48}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 3, 'EAL6': 1, 'EAL6+': 1, 'EAL4 augmented': 2, 'EAL6 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 3}, 'AVA': {'AVA_VAN.5': 3}}, 'cc_sfr': {}, 'cc_claims': {'A': {'A.PKI': 3}}, 'vendor': {'Infineon': {'Infineon': 7, 'Infineon Technologies AG': 1}, 'Gemalto': {'Gemalto': 1}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 11, 'TÜViT': 7}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 10}}, 'DES': {'DES': {'DES': 2}}, 'constructions': {'MAC': {'CMAC': 4}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 5}, 'ECDSA': {'ECDSA': 6}}, 'FF': {'DH': {'DH': 6, 'Diffie-Hellman': 1}, 'DSA': {'DSA': 6}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-256': 4, 'SHA-384': 3}}}, 'crypto_scheme': {'MAC': {'MAC': 4}, 'KA': {'Key agreement': 1}}, 'crypto_protocol': {'PACE': {'PACE': 57}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 2}}, 'ecc_curve': {'NIST': {'P-256': 1, 'P-384': 1, 'NIST P-256': 1, 'NIST P-384': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'Side channel': 1}, 'FI': {'physical tampering': 1, 'malfunction': 1, 'DFA': 3, 'Fault Injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 4, 'EF.DG2': 4, 'EF.DG13': 4, 'EF.DG14': 5, 'EF.DG15': 8, 'EF.COM': 4, 'EF.CardAccess': 8, 'EF.SOD': 4}}, 'standard_id': {'BSI': {'AIS34': 1}, 'ISO': {'ISO/IEC 7816-4': 1}, 'ICAO': {'ICAO': 6}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0869-V2': 3}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4+': 3, 'EAL5+': 1, 'EAL4': 6, 'EAL5': 2}}, 'cc_sar': {'ACE': {'ACE_SUPP': 2}, 'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS.2': 11, 'ALC_DVS.1': 1, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 6, 'AVA_VAN.3': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 3}, 'FCS': {'FCS_CKM.1': 17, 'FCS_CKM.2': 5, 'FCS_CKM.3': 1, 'FCS_CKM.4': 40, 'FCS_COP.1': 5, 'FCS_RNG.1': 6, 'FCS_RND.1': 12, 'FCS_CKM': 1, 'FCS_RND.1.1': 2, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_SDI.2': 2, 'FDP_ITC.1': 29, 'FDP_ITC.2': 16, 'FDP_ACF.1': 4, 'FDP_ACC.1': 9, 'FDP_IFC.1': 6, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1}, 'FIA': {'FIA_UAU.1': 17, 'FIA_UAU.4': 9, 'FIA_UAU.5': 9, 'FIA_UID.1': 14, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.4.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_SMR.1': 11, 'FMT_SMF.1': 11, 'FMT_MTD.1': 9, 'FMT_MSA.3': 9, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPR': {'FPR_UNO.1': 1}, 'FPT': {'FPT_PHP.3': 13, 'FPT_FLS.1': 2, 'FPT_TDC.1': 1, 'FPT_PHP.3.1': 1}, 'FTP': {'FTP_ITC.1': 19, 'FTP_TRP.1': 4, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.OPERATE': 1, 'O.RESOURCES': 1, 'O.ALARM': 1, 'O.CIPHER': 1, 'O.AA': 11, 'O.PACE': 14, 'O.KEY-MNGT': 1, 'O.PIN-MNGT': 1, 'O.RND': 1, 'O.GLOBAL_ARRAYS_CONFID': 1, 'O.TRANSACTION': 1, 'O.REALLOCATION': 1, 'O.IC_SUPPORT': 1, 'O.RECOVERY': 1, 'O.OS_SUPPORT': 1}, 'T': {'T.CONFID-APPLI-DATA': 1, 'T.CONFID-JCS-DATA': 1, 'T.INTEG-APPLI-DATA': 1, 'T.INTEG-JCS-DATA': 1, 'T.RESOURCES': 1, 'T.RND': 1, 'T.PHYSICAL': 1, 'T.LEAKAGE': 1, 'T.FAULT': 1}, 'A': {'A.PKI': 5, 'A.APPLET': 1, 'A.VERIFICATION': 1}, 'OE': {'OE': 1, 'OE.PKI': 3}}, 'vendor': {'Infineon': {'Infineon': 7}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 8, 'AES-': 1, 'AES-128': 1, 'AES-256': 1}}, 'DES': {'DES': {'DES': 1}}, 'constructions': {'MAC': {'CMAC': 7}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 7}, 'ECDSA': {'ECDSA': 5}}, 'FF': {'DH': {'DH': 7, 'Diffie-Hellman': 2}, 'DSA': {'DSA': 5}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 2}, 'SHA2': {'SHA-256': 5, 'SHA-384': 3}}}, 'crypto_scheme': {'MAC': {'MAC': 13}, 'KA': {'KA': 3, 'Key agreement': 3}}, 'crypto_protocol': {'PACE': {'PACE': 95}}, 'randomness': {'RNG': {'RND': 2}}, 'cipher_mode': {'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side-channel': 1, 'SPA': 1, 'DPA': 2, 'timing attack': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 5, 'EF.DG2': 5, 'EF.DG13': 5, 'EF.DG14': 5, 'EF.DG15': 6, 'EF.COM': 5, 'EF.CardAccess': 6, 'EF.SOD': 5}}, 'standard_id': {'FIPS': {'FIPS 180-4': 4, 'FIPS 180-2': 1, 'FIPS 197': 3}, 'NIST': {'SP 800-38B': 1}, 'BSI': {'BSI-AIS20': 1, 'AIS20': 2}, 'ISO': {'ISO/IEC 10116': 8}, 'ICAO': {'ICAO': 6}, 'CC': {'CCMB-2017-04-002': 1}}, 'javacard_version': {'JavaCard': {'Java Card 3.0.1': 3}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '1b8f811a97829be3b8d42ec70347734a660a438fc6ac9bfa5b8c6197f61fcad4', 'st_pdf_hash': '9a1b162063f33b20faaa6d4f2ad229af099b1b04003d8b673e34cefe4888a091', 'report_txt_hash': '0c5a7aa7bc34151d6844f5858889c59b5a99a4750d5cddc272684d00f363719a', 'st_txt_hash': '982a3088799c3bdc77def8229ca87a4a4f1981c708098ad7952dc32c7ad72721'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_ecc_curves': {'__insert__': {'NIST P-256': 1, 'NIST P-384': 1}}} data.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 8, 'AES-': 1, 'AES-128': 1, 'AES-256': 1, 'DES': 1}, 'rules_asymmetric_crypto': {'ECDH': 7, 'ECDSA': 5, 'DH': 7, 'Diffie-Hellman': 2, 'DSA': 5}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 2, 'SHA-256': 5, 'SHA-384': 3}, 'rules_crypto_schemes': {'PACE': 95, 'MAC': 13}, 'rules_randomness': {'RND': 2}, 'rules_tee': {}, 'rules_side_channels': {'side-channel': 1, 'SPA': 1, 'DPA': 2, 'timing attack': 1}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 546653, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 48, '/CreationDate': "D:20191113095255+09'00'", '/Creator': 'Microsoft® Word 2010', '/ModDate': "D:20191113095335+09'00'", '/Producer': 'Microsoft® Word 2010'}.
    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The report_keywords property was updated, with the {'rules_cert_id': {'__insert__': {'JISEC-CC-CRP-C0648-01-2019': 48}}} data.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['1.0', '1.0.7052']}.
    • The cert_id property was set to JISEC-CC-CRP-C0648-01-2019.
    • The directly_affecting property was set to None.
    • The indirectly_affecting property was set to None.
  • 01.02.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Protection Profile for ePassport IC with SAC (PACE) and Active Authentication 1.00', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/c0499_epp.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['EPASS_IC_SAC_PACE_V1.0']}}]}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name ID&Trust IDentity-J with SAC (PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52G v1.0.7052 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/c0648_eimg.pdf",
  "dgst": "902dbd430adb77a5",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "JISEC-CC-CRP-C0648-01-2019",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.0.7052",
        "1.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0869-V2-2019",
          "BSI-DSZ-CC-0891-V3-2018"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0891-2015",
          "BSI-DSZ-CC-0869-V2-2019",
          "BSI-DSZ-CC-0869-2015",
          "BSI-DSZ-CC-0782-2012",
          "BSI-DSZ-CC-0891-V2-2016",
          "BSI-DSZ-CC-0891-V3-2018"
        ]
      }
    },
    "scheme_data": {
      "cert_id": "C0648",
      "certification_date": "2019-08",
      "claim": "EAL4+\nALC_DVS.2,AVA_VAN.5 PP",
      "enhanced": {
        "assurance_level": "EAL4 Augmented with ALC_DVS.2, AVA_VAN.5",
        "cc_version": "3.1 release5",
        "cert_link": "https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/b9ck990000000nba-att/c0648_eimg.pdf",
        "certification_date": "2019-08-28",
        "description": "PRODUCT DESCRIPTION \n    \n    \n    Description of TOE \n     The TOE is an ePassport IC (including necessary software). This ePassport IC is IC chip hardware with the contactless communication interface, and basic software and ePassport application program. The operation of the security functions applied to contactless communication with the terminal comply with the PACE, and Active Authentication specifications defined by Part11 of \u201cICAO Doc 9303 Machine readable Travel Documents Seventh Edition\u201d.  \n    \n    \n    \n    TOE security functionality \n     The main security functions of the TOE are to protect data stored in the TOE from illicit reading or writing. The TOE provides the main security functions, including:  \n     \n     Password Authenticated Connection Establishment function;  \n     Active Authentication function;  \n     Write protection function;  \n     Protection function in transport; and  \n     Tamper resistance.",
        "evaluation_facility": "T\u00dcV Informationstechnik GmbH, Evaluation Body for IT Security",
        "product": "ID\u0026Trust IDentity-J with SAC (PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52G",
        "product_type": "ICs for e-passports",
        "protection_profile": "Protection Profile for ePassport IC with SAC (PACE) and Active Authentication version 1.00 (Certification Identification: JISEC-C0499)",
        "report_link": "https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/b9ck990000000nba-att/C0648_erpt.pdf",
        "target_link": "https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/b9ck990000000nba-att/c0648_st.pdf",
        "toe_version": "v1.0.7052",
        "vendor": "Maxell, Ltd."
      },
      "supplier": "Maxell, Ltd.",
      "toe_japan_name": "ID\u0026Trust IDentity-J with SAC (PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52Gv1.0.7052",
      "toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/c0648_it8678.html",
      "toe_overseas_name": "ID\u0026Trust IDentity-J with SAC (PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52Gv1.0.7052"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Maxell, Ltd",
  "manufacturer_web": "https://www.maxell.com/",
  "name": "ID\u0026Trust IDentity-J with SAC (PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52G v1.0.7052",
  "not_valid_after": "2024-08-28",
  "not_valid_before": "2019-08-28",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "c0648_eimg.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "JP": {
          "JISEC-CC-CRP-C0648-01-2019": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL4": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 2
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20191004102920+09\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/ModDate": "D:20191004103115+09\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "pdf_file_size_bytes": 86462,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 2
    },
    "report_filename": "c0648_erpt.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 5
          },
          "ECDSA": {
            "ECDSA": 6
          }
        },
        "FF": {
          "DH": {
            "DH": 1,
            "Diffie-Hellman": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0869-V2-2019": 2,
          "BSI-DSZ-CC-0891-V3-2018": 1
        },
        "JP": {
          "JISEC-CC-CRP-C0648-01-2019": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.PKI": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 4
        },
        "AVA": {
          "AVA_VAN.5": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 3,
          "EAL4 augmented": 2,
          "EAL6": 1,
          "EAL6 augmented": 1,
          "EAL6+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 59
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key agreement": 1
        },
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "NIST P-256": 1,
          "NIST P-384": 1,
          "P-256": 1,
          "P-384": 1
        }
      },
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 11,
          "T\u00dcViT": 7
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          },
          "SHA2": {
            "SHA-256": 4,
            "SHA-384": 3
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.COM": 4,
          "EF.CardAccess": 8,
          "EF.DG1": 4,
          "EF.DG13": 4,
          "EF.DG14": 6,
          "EF.DG15": 9,
          "EF.DG2": 4,
          "EF.SOD": 4
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "DFA": 3,
          "Fault Injection": 1,
          "malfunction": 1,
          "physical tampering": 1
        },
        "SCA": {
          "Side channel": 1,
          "physical probing": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS34": 1
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "ICAO": {
          "ICAO": 12
        },
        "ISO": {
          "ISO/IEC 7816-4": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 10
          }
        },
        "DES": {
          "DES": {
            "DES": 2
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 1
        },
        "Infineon": {
          "Infineon": 7,
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20191113095255+09\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/ModDate": "D:20191113095335+09\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "pdf_file_size_bytes": 546653,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 48
    },
    "st_filename": "c0648_st.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 4
          },
          "ECDSA": {
            "ECDSA": 3
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 2
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.APPLET": 1,
          "A.PKI": 5,
          "A.VERIFICATION": 1
        },
        "O": {
          "O.AA": 8,
          "O.ALARM": 1,
          "O.CIPHER": 1,
          "O.GLOBAL_ARRAYS_CONFID": 1,
          "O.KEY-MNGT": 1,
          "O.OPERATE": 1,
          "O.OS_SUPPORT": 1,
          "O.PACE": 11,
          "O.PIN-MNGT": 1,
          "O.REALLOCATION": 1,
          "O.RECOVERY": 1,
          "O.RESOURCES": 1,
          "O.RND": 1,
          "O.TRANSACTION": 1
        },
        "OE": {
          "OE.PKI": 3
        },
        "T": {
          "T.CONFID-APPLI-DATA": 1,
          "T.CONFID-JCS-DATA": 1,
          "T.FAULT": 1,
          "T.INTEG-APPLI-DATA": 1,
          "T.INTEG-JCS-DATA": 1,
          "T.LEAKAGE": 1,
          "T.PHYSICAL": 1,
          "T.RESOURCES": 1,
          "T.RND": 1,
          "T.SID": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_IMP.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 10,
          "ALC_LCD.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_INT.1": 1,
          "ASE_REQ.2": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_FUN.1": 1
        },
        "AVA": {
          "AVA_VAN.3": 2,
          "AVA_VAN.5": 9
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 6,
          "EAL4 augmented": 1,
          "EAL4+": 3,
          "EAL5": 2,
          "EAL5+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 3
        },
        "FCO": {
          "FCO_NRO": 1
        },
        "FCS": {
          "FCS_CKM": 31,
          "FCS_CKM.1": 19,
          "FCS_CKM.2": 5,
          "FCS_CKM.3": 1,
          "FCS_CKM.4": 40,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 90,
          "FCS_COP.1": 45,
          "FCS_RND.1": 12,
          "FCS_RND.1.1": 2,
          "FCS_RNG.1": 6
        },
        "FDP": {
          "FDP_ACC": 26,
          "FDP_ACC.1": 10,
          "FDP_ACF": 22,
          "FDP_ACF.1": 12,
          "FDP_IFC": 2,
          "FDP_IFC.1": 6,
          "FDP_IFF": 2,
          "FDP_ITC": 1,
          "FDP_ITC.1": 32,
          "FDP_ITC.1.1": 1,
          "FDP_ITC.1.2": 1,
          "FDP_ITC.1.3": 1,
          "FDP_ITC.2": 16,
          "FDP_RIP": 9,
          "FDP_ROL": 1,
          "FDP_SDI.2": 2,
          "FDP_UCT": 10,
          "FDP_UCT.1": 1,
          "FDP_UIT": 11,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_AFL": 24,
          "FIA_AFL.1": 6,
          "FIA_ATD": 1,
          "FIA_UAU.1": 15,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.4": 9,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.5": 9,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UID": 3,
          "FIA_UID.1": 13,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB": 1
        },
        "FMT": {
          "FMT_MSA": 13,
          "FMT_MSA.3": 9,
          "FMT_MTD": 2,
          "FMT_MTD.1": 11,
          "FMT_MTD.1.1": 1,
          "FMT_SMF": 4,
          "FMT_SMF.1": 12,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 4,
          "FMT_SMR.1": 10,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO.1": 1
        },
        "FPT": {
          "FPT_FLS": 3,
          "FPT_FLS.1": 2,
          "FPT_PHP.3": 13,
          "FPT_PHP.3.1": 1,
          "FPT_RCV": 3,
          "FPT_TDC.1": 1
        },
        "FTP": {
          "FTP_ITC": 1,
          "FTP_ITC.1": 19,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 102
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key agreement": 5
        },
        "MAC": {
          "MAC": 3
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 2
          },
          "SHA2": {
            "SHA-256": 4,
            "SHA-384": 2
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.COM": 4,
          "EF.CardAccess": 6,
          "EF.DG1": 5,
          "EF.DG13": 5,
          "EF.DG14": 5,
          "EF.DG15": 6,
          "EF.DG2": 5,
          "EF.SOD": 5
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {
        "JavaCard": {
          "Java Card 3.0.1": 3
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 2
        }
      },
      "side_channel_analysis": {
        "SCA": {
          "DPA": 2,
          "SPA": 1,
          "side-channel": 1,
          "timing attack": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS20": 1,
          "BSI-AIS20": 1
        },
        "CC": {
          "CCMB-2017-04-002": 1
        },
        "FIPS": {
          "FIPS 180-2": 1,
          "FIPS 180-4": 4,
          "FIPS 197": 3
        },
        "ICAO": {
          "ICAO": 7
        },
        "ISO": {
          "ISO/IEC 10116": 8
        },
        "NIST": {
          "SP 800-38B": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 3,
            "AES-128": 1,
            "AES-256": 1
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 7
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "LovaszD",
      "/CreationDate": "D:20190726101904+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Office 365",
      "/ModDate": "D:20190726101904+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Office 365",
      "/Title": "ID\u0026Trust IDENTITY APPLET-J with SAC (PACE) and AA - Security Target Lite",
      "pdf_file_size_bytes": 1095310,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 57
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "EPASS_IC_SAC_PACE_V1.0"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/c0499_epp.pdf",
        "pp_name": "Protection Profile for ePassport IC with SAC (PACE) and Active Authentication 1.00"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/c0648_erpt.pdf",
  "scheme": "JP",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "AVA_VAN.5",
      "ALC_DVS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/c0648_st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "ef114a5738dd05a9b1fd91aff959ff7f709300f77daef5c209479e43c70bcd02",
      "txt_hash": "52969d660b6c0023e6f4bb94d42a07ea86fc90e69997e6ce11d1486919858652"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "1b8f811a97829be3b8d42ec70347734a660a438fc6ac9bfa5b8c6197f61fcad4",
      "txt_hash": "0c5a7aa7bc34151d6844f5858889c59b5a99a4750d5cddc272684d00f363719a"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "9a1b162063f33b20faaa6d4f2ad229af099b1b04003d8b673e34cefe4888a091",
      "txt_hash": "982a3088799c3bdc77def8229ca87a4a4f1981c708098ad7952dc32c7ad72721"
    }
  },
  "status": "active"
}