Apollo OS e-Passport Version 1.0

CSV information ?

Status archived
Valid from 27.07.2009
Valid until 31.07.2014
Scheme 🇯🇵 JP
Manufacturer SC Square LTD.
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL4+, AVA_VLA.4, AVA_MSU.3

Heuristics summary ?

Certificate ID: JISEC-CC-CRP-C0229

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
DES

Vendor
Infineon, Infineon Technologies AG

Security level
EAL4, EAL 5, EAL5+, EAL 5 augmented, EAL4 augmented
Claims
A.PERS_AGENT, A.INSP_SYS
Security Assurance Requirements (SAR)
ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4
Protection profiles
BSI-PP-0017
Certificates
BSI-DSZ-CC-0399-2007, CRP-C0229-01, Certification No. C0229
Evaluation facilities
TÜV Informationstechnik, TÜViT

Side-channel analysis
physical probing, DPA, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, fault injection, Fault Injection, reverse engineering

Standards
AIS 1, AIS 14, AIS 19, AIS 23, AIS 31, AIS 32, AIS 34, ISO/IEC 15408:2005, ISO/IEC 18045:2005, ICAO, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004

File metadata

Title: untitled
Creation date: D:20090910140719+09'00'
Modification date: D:20090910140719+09'00'
Pages: 27
Producer: Acrobat Distiller 6.0 (Windows)

References

Outgoing
  • BSI-DSZ-CC-0399-2007 - Infineon Smart Card IC (Security Controller) SLE66CLX800PE / m1581-e12, SLE66CLX800PEM / m1580-e12, SLE66CLX800PES / m1582-e12, SLE66CLX360PE / m1587-e12, SLE66CLX360PEM / m1588-e12 and SLE66CLX360PES / m1589-e12 with specific IC Dedicated Software

Security target ?

Extracted keywords

Symmetric Algorithms
DES, Triple-DES, 3DES
Hash functions
SHA-1
Schemes
MAC
Protocols
PGP
Randomness
RND
Block cipher modes
ECB, CBC

IC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16
Vendor
Infineon

Security level
EAL 4+, EAL4, EAL5, EAL5+, EAL4+, EAL 5+, EAL4 augmented, EAL5 augmented
Claims
O.RND, T.CHIP_ID, T.SKIMMING, T.EAVESDROPPING, T.FORGERY, T.ABUSE_FUNC, T.INFORMATION_LEAKAGE, T.PHYS_TAMPER, T.MALFUNCTION, A.PERS_AGENT, A.INSP_SYS, OT.AC_PERS, OT.DATA_CONF, OT.PROT_ABUSE_FUNC, OT.PROT_PHYS_TAMPER, OT.PROT_INF_LEAK, OT.PROT_MALFUNCT, OT.PROT_ABUSE_FU, OE.PERSONALIZATION, OE.EXAM_MRTD, OE.PROT_LOGICAL_MRTD
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ADO_IGS, ADO_DEL, ADO_DEL.2, ADO_IGS.1, ADV_IMP.2, ADV_SPM.1, ADV_FSP.2, ADV_HLD.2, ADV_LLD.1, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ALC_DVS, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.3, AVA_VLA.4, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2
Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS.1.1, FCS_CKM.1, FCS_CKM, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_RND, FCS_COP, FCS_RND.1, FCS_UIT, FCS_CKM.1.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACF.1, FDP_ACF, FDP_UCT, FDP_UIT, FDP_UCT.1, FDP_IFC.1, FDP_UIT.1, FDP_ACC, FDP_DAU.1, FDP_DAU, FDP_IFC, FDP_IFF, FDP_ACF.1.2, FDP_ACF.1.4, FDP_ACC.1.1, FDP_SDI.1, FDP_SDI.2, FIA_UAU, FIA_API, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_API.1, FIA_UCT, FMT_MTD, FMT_MSA.2, FMT_MOF.1, FMT_MSA.3, FMT_SMF.1, FMT_MOF.1.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MTD.1, FMT_MSA.1, FMT_MSA.3.1, FMT_MSA.3.2, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_RVM.1, FPT_SEP.1, FPT_FLS.1.1, FPT_TST, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_AMT.1, FPT_PHP.3.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_TST.2.1, FRU_FLT.2.1, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-PP-0017, BSI-PP-0002-2001
Certificates
BSI-DSZ-CC-0399-2007, CC-1, CC-2, CC-3, CC-4

Side-channel analysis
Leak-Inherent, physical probing, DPA, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineering

Standards
FIPS 180-212, FIPS 46-3, FIPS 180-2, FIPS PUB 46-3, AIS31, ISO/IEC 7816, ICAO, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004

File metadata

Creation date: D:20090812100814Z
Modification date: D:20090812131114+03'00'
Pages: 116
Creator: Microsoft® Office Word 2007
Producer: Microsoft® Office Word 2007

References

Outgoing
  • BSI-DSZ-CC-0399-2007 - Infineon Smart Card IC (Security Controller) SLE66CLX800PE / m1581-e12, SLE66CLX800PEM / m1580-e12, SLE66CLX800PES / m1582-e12, SLE66CLX360PE / m1587-e12, SLE66CLX360PEM / m1588-e12 and SLE66CLX360PES / m1589-e12 with specific IC Dedicated Software

Heuristics ?

Certificate ID: JISEC-CC-CRP-C0229

Extracted SARs

ATE_COV.2, AVA_SOF.1, ADV_RCR.1, ATE_IND.2, AVA_VLA.4, ALC_LCD.1, AGD_ADM.1, ATE_FUN.1, ALC_TAT.1, ALC_DVS.2, ATE_DPT.1, AGD_USR.1, ADV_LLD.1, ADV_HLD.2, AVA_MSU.3, ADV_SPM.1, ADV_FSP.2, ADV_IMP.2

Scheme data ?

Cert Id C0229
Supplier SC Square LTD.
Toe Overseas Name Apollo OS e-Passport 1.0
Claim EAL4+ ADV_IMP.2, ALC_DVS.2 PP
Certification Date 2009-07
Toe Overseas Link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0229_it8194.html
Toe Japan Name Apollo OS e-Passport 1.0
Enhanced
Product Apollo OS e-Passport
Toe Version 1.0
Product Type IT Product (IC chip firmware)
Certification Date 2009-07-27
Cc Version 2.3
Assurance Level EAL4 Augmented with ADV_IMP.2, ALC_DVS.2
Protection Profile BSI-PP-0017
Vendor SC Square LTD.
Evaluation Facility TÜV Informationstechnik GmbH, Evaluation Body for IT-Security
Report Link https://www.ipa.go.jp/en/security/c0229_erpt.pdf
Cert Link https://www.ipa.go.jp/en/security/c0229_eimg.pdf
Target Link https://www.ipa.go.jp/en/security/c0229_est.pdf
Description PRODUCT DESCRIPTION Description of TOE The Target of Evaluation (TOE) is the contactless integrated circuit chip of machine readable travel documents (MRTD's chip) programmed according to the Logical Data Structure (LDS) [LDS] and providing the Basic Access Control according to the ICAO technical report [PKI]. The MRTD is viewed as unit of - The physical MRTD as travel document in form of paper, plastic and chip. It presents visual readable data including (but not limited to) personal data of the MRTD holder - the biographical data on the biographical data page of the passport book, - the printed data in the Machine Readable Zone (MRZ) and - The printed portrait. - The logical MRTD as data of the MRTD holder stored according to the Logical Data Structure [LDS] as specified by ICAO on the contactless integrated circuit. It presents contactless readable data including (but not limited to) personal data of the MRTD holder - the digital Machine Readable Zone Data (digital MRZ data, EF.DG1), - the digitized portraits (EF.DG2), - the biometric reference data of finger(s) (EF.DG3) or iris image(s) (EF.DG4) or both - the other data according to LDS (EF.DG5 to EF.DG16) and - the Document security object The physical MRTD is protected by physical security measures (e.g. watermark on paper, security printing), logical (e.g. authentication keys of the MRTD痴 chip) and organisational security measures (e.g. control of materials, personalization procedures) [SSMR]. These security measures include the binding of the MRTD痴 chip to the passport book. The logical MRTD is protected in authenticity and integrity by a digital signature created by the document signer acting for the issuing State or Organization and the security features of the MRTD痴 chip. TOE security functions TOE security function is as follows - SF.Cryptographic Support The cryptographic support for the other Security Functions. - SF.Identification and Authentication The identification and authentication for the TOE user - SF. User Data Protection The user data protection - SF.Security Management The security management of the TOE - SF.Protection (Protection of TSC) This Security Function protects the TSF functionality, TSF data and user data.

References ?

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f26ccca1470cbfbb6ce3effb35195ed8f5e922cb312c87f87989873662d9d91b', 'txt_hash': 'b60ded4ae888ec20879ce4bc753b2573abb13639acfde84339720ee86a541120'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '1bbf86d94d9fb2279b839d4ab92d80a59e5012ec43c7b36b549caa18746a1222', 'txt_hash': '405e8f2f6e6e4efd52ee0478b151cb757d953adff74d39bd842d0a5768af01cf'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': None, 'cert_filename': None}.
    • The report_frontpage property was set to {}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0399-2007': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'NL': {'CC-1': 3, 'CC-2': 3, 'CC-3': 2, 'CC-4': 1}}, '__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0399-2007': 1}}}}} data.

    The computed heuristics were updated.

    • The cert_id property was set to JISEC-CC-CRP-C0229.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0399-2007': 2}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0399-2007': 2}}}, '__delete__': ['NL']}} data.

    The computed heuristics were updated.

    • The cert_id property was set to C0229.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__delete__': ['CA']}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'CA': {'2009-7-16': 1}}, '__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0399-2007': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'NL': {'CC-1': 3, 'CC-2': 3, 'CC-3': 2, 'CC-4': 1}}, '__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0399-2007': 1}}}}} data.

    The computed heuristics were updated.

    • The cert_id property was set to JISEC-CC-CRP-C0229.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
    • The scheme_data property was updated, with the {'claim': 'EAL4+\n ADV_IMP.2, \n ALC_DVS.2\n PP'} data.
  • 20.06.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'supplier': 'SC Square LTD.'} data.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'cert_id': 'C0229', 'supplier': 'SC Square \n LTD.', 'toe_overseas_name': 'Apollo OS e-Passport\n 1.0', 'claim': 'EAL4+\n ADV_IMP.2, \n ALC_DVS.2', 'certification_date': '2009-07', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0229_it8194.html', 'toe_japan_name': 'Apollo OS e-Passport\n 1.0', 'enhanced': {'product': 'Apollo OS e-Passport', 'toe_version': '1.0', 'product_type': 'IT Product (IC chip firmware)', 'certification_date': '2009-07-27', 'cc_version': '2.3', 'assurance_level': 'EAL4 Augmented with ADV_IMP.2, ALC_DVS.2', 'protection_profile': 'BSI-PP-0017', 'vendor': 'SC Square LTD.', 'evaluation_facility': 'TÜV Informationstechnik GmbH, \n Evaluation Body for IT-Security', 'report_link': 'https://www.ipa.go.jp/en/security/c0229_erpt.pdf', 'cert_link': 'https://www.ipa.go.jp/en/security/c0229_eimg.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0229_est.pdf', 'description': "PRODUCT DESCRIPTION \n Description of TOE The Target of Evaluation (TOE) is the contactless integrated circuit chip of machine readable travel documents (MRTD's chip) programmed according to the Logical Data Structure (LDS) [LDS] and providing the Basic Access Control according to the ICAO technical report [PKI]. \n The MRTD is viewed as unit of \n \n \n \n - \n The physical MRTD as travel document in form of paper, plastic and chip. It presents visual readable data including (but not limited to) personal data of the MRTD holder \n \n \n \n \n \n \n \n \n -\n \n the biographical data on the biographical data page of the passport book, \n \n \n \n \n \n -\n \n the printed data in the Machine Readable Zone (MRZ) and \n \n \n \n \n \n -\n \n The printed portrait. \n \n \n - \n The logical MRTD as data of the MRTD holder stored according to the Logical Data Structure [LDS] as specified by ICAO on the contactless integrated circuit. It presents contactless readable data including (but not limited to) personal data of the MRTD holder \n \n \n \n \n \n \n \n \n \n \n \n -\n \n the digital Machine Readable Zone Data (digital MRZ data, EF.DG1), \n \n \n \n \n \n -\n \n the digitized portraits (EF.DG2), \n \n \n \n \n \n -\n \n the biometric reference data of finger(s) (EF.DG3) or iris image(s) (EF.DG4) or both \n \n \n \n \n \n -\n \n the other data according to LDS (EF.DG5 to EF.DG16) and \n \n \n \n \n \n -\n \n the Document security object \n \n \n \n The physical MRTD is protected by physical security measures (e.g. watermark on paper, security printing), logical (e.g. authentication keys of the MRTD痴 chip) and organisational security measures (e.g. control of materials, personalization procedures) [SSMR]. These security measures include the binding of the MRTD痴 chip to the passport book. The logical MRTD is protected in authenticity and integrity by a digital signature created by the document signer acting for the issuing State or Organization and the security features of the MRTD痴 chip. \n \n \n \n TOE security functions \n TOE security function is as follows \n \n \n \n - SF.Cryptographic Support \n \n \n \n The cryptographic support for the other Security Functions. \n \n \n - SF.Identification and Authentication \n \n \n \n The identification and authentication for the TOE user \n \n \n - SF. User Data Protection \n \n \n \n The user data protection \n \n \n - SF.Security Management \n \n \n \n The security management of the TOE \n \n \n - SF.Protection (Protection of TSC) \n \n \n \n This Security Function protects the TSF functionality, TSF data and user data."}}}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 05.02.2023 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 1bbf86d94d9fb2279b839d4ab92d80a59e5012ec43c7b36b549caa18746a1222.
    • The st_txt_hash property was set to 405e8f2f6e6e4efd52ee0478b151cb757d953adff74d39bd842d0a5768af01cf.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1066290, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 116, '/CreationDate': 'D:20090812100814Z', '/Creator': 'Microsoft® Office Word 2007', '/ModDate': "D:20090812131114+03'00'", '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0399-2007': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0017': 3, 'BSI-PP-0002-2001': 1}}, 'cc_security_level': {'EAL': {'EAL 4+': 1, 'EAL4': 9, 'EAL5': 1, 'EAL5+': 1, 'EAL4+': 1, 'EAL 5+': 1, 'EAL4 augmented': 2, 'EAL5 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 1, 'ACM_CAP.4': 1}, 'ADO': {'ADO_IGS': 1, 'ADO_DEL': 1, 'ADO_DEL.2': 1, 'ADO_IGS.1': 1}, 'ADV': {'ADV_IMP.2': 8, 'ADV_SPM.1': 3, 'ADV_FSP.2': 1, 'ADV_HLD.2': 1, 'ADV_LLD.1': 1, 'ADV_RCR.1': 1}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1}, 'ALC': {'ALC_DVS.2': 8, 'ALC_LCD.1': 1, 'ALC_TAT.1': 2, 'ALC_DVS': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_MSU.3': 1, 'AVA_VLA.4': 1, 'AVA_MSU.2': 1, 'AVA_SOF.1': 1, 'AVA_VLA.2': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 7, 'FAU_SAS.1.1': 4}, 'FCS': {'FCS_CKM.1': 30, 'FCS_CKM': 22, 'FCS_CKM.2': 4, 'FCS_COP.1': 24, 'FCS_CKM.4': 33, 'FCS_RND': 8, 'FCS_COP': 46, 'FCS_RND.1': 13, 'FCS_UIT': 1, 'FCS_CKM.1.1': 1}, 'FDP': {'FDP_ITC.1': 17, 'FDP_ITC.2': 13, 'FDP_ACC.1': 25, 'FDP_ACF.1': 34, 'FDP_ACF': 15, 'FDP_UCT': 12, 'FDP_UIT': 12, 'FDP_UCT.1': 12, 'FDP_IFC.1': 9, 'FDP_UIT.1': 13, 'FDP_ACC': 19, 'FDP_DAU.1': 5, 'FDP_DAU': 2, 'FDP_IFC': 1, 'FDP_IFF': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.4': 1, 'FDP_ACC.1.1': 1, 'FDP_SDI.1': 1, 'FDP_SDI.2': 1}, 'FIA': {'FIA_UAU': 36, 'FIA_API': 6, 'FIA_UID.1': 9, 'FIA_UID.1.1': 3, 'FIA_UID.1.2': 3, 'FIA_UAU.1': 6, 'FIA_UAU.1.1': 3, 'FIA_UAU.1.2': 3, 'FIA_UAU.4': 7, 'FIA_UAU.5': 4, 'FIA_UAU.5.1': 3, 'FIA_UAU.5.2': 4, 'FIA_UAU.6': 7, 'FIA_API.1': 1, 'FIA_UCT': 1}, 'FMT': {'FMT_MTD': 22, 'FMT_MSA.2': 22, 'FMT_MOF.1': 12, 'FMT_MSA.3': 4, 'FMT_SMF.1': 17, 'FMT_MOF.1.1': 4, 'FMT_SMF.1.1': 3, 'FMT_SMR.1': 16, 'FMT_SMR.1.1': 3, 'FMT_SMR.1.2': 3, 'FMT_LIM.1': 12, 'FMT_LIM.2': 12, 'FMT_LIM.1.1': 3, 'FMT_LIM.2.1': 3, 'FMT_MTD.1': 14, 'FMT_MSA.1': 2, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1}, 'FPT': {'FPT_FLS.1': 11, 'FPT_TST.1': 11, 'FPT_PHP.3': 11, 'FPT_RVM.1': 6, 'FPT_SEP.1': 8, 'FPT_FLS.1.1': 3, 'FPT_TST': 1, 'FPT_TST.1.1': 3, 'FPT_TST.1.2': 3, 'FPT_TST.1.3': 4, 'FPT_AMT.1': 1, 'FPT_PHP.3.1': 4, 'FPT_RVM.1.1': 3, 'FPT_SEP.1.1': 4, 'FPT_SEP.1.2': 4, 'FPT_TST.2.1': 1}, 'FRU': {'FRU_FLT.2.1': 1}, 'FTP': {'FTP_ITC.1': 9, 'FTP_TRP.1': 8}}, 'cc_claims': {'O': {'O.RND': 1}, 'T': {'T.CHIP_ID': 1, 'T.SKIMMING': 1, 'T.EAVESDROPPING': 1, 'T.FORGERY': 1, 'T.ABUSE_FUNC': 1, 'T.INFORMATION_LEAKAGE': 1, 'T.PHYS_TAMPER': 1, 'T.MALFUNCTION': 1}, 'A': {'A.PERS_AGENT': 2, 'A.INSP_SYS': 2}, 'OT': {'OT.AC_PERS': 4, 'OT.DATA_CONF': 3, 'OT.PROT_ABUSE_FUNC': 1, 'OT.PROT_PHYS_TAMPER': 1, 'OT.PROT_INF_LEAK': 2, 'OT.PROT_MALFUNCT': 2, 'OT.PROT_ABUSE_FU': 2}, 'OE': {'OE.PERSONALIZATION': 2, 'OE.EXAM_MRTD': 1, 'OE.PROT_LOGICAL_MRTD': 2}}, 'vendor': {'Infineon': {'Infineon': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 11}, '3DES': {'Triple-DES': 22, '3DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 7}}}, 'crypto_scheme': {'MAC': {'MAC': 10}}, 'crypto_protocol': {'PGP': {'PGP': 2}}, 'randomness': {'RNG': {'RND': 4}}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CBC': {'CBC': 6}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2, 'physical probing': 4, 'DPA': 1}, 'FI': {'Physical Tampering': 5, 'physical tampering': 8, 'Physical tampering': 1, 'Malfunction': 5, 'malfunction': 6, 'fault injection': 1}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 1, 'EF.DG2': 1, 'EF.DG3': 1, 'EF.DG4': 1, 'EF.DG5': 1, 'EF.DG16': 1}}, 'standard_id': {'FIPS': {'FIPS 180-212': 1, 'FIPS 46-3': 3, 'FIPS 180-2': 3, 'FIPS PUB 46-3': 1}, 'BSI': {'AIS31': 5}, 'ISO': {'ISO/IEC 7816': 2}, 'ICAO': {'ICAO': 12}, 'CC': {'CCMB-2005-08-001': 1, 'CCMB-2005-08-002': 1, 'CCMB-2005-08-003': 1, 'CCMB-2005-08-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to c0229_est.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0399-2007']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0399-2007', 'BSI-DSZ-CC-0266-2005', 'BSI-DSZ-CC-0322-2005']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}]} values added.
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was updated, with the [[1, 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/c0229_est.pdf, code: 408']] values inserted.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was updated, with the [[1, 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/c0229_est.pdf, code: nok']] values inserted.
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0399-2007']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0169-2002', 'BSI-DSZ-CC-0322-2005', 'BSI-DSZ-CC-0266-2005', 'BSI-DSZ-CC-0223-2003', 'BSI-DSZ-CC-0399-2007']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}]} values discarded.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/c0229_erpt.pdf, code: nok'].
    • The st_pdf_hash property was set to 1bbf86d94d9fb2279b839d4ab92d80a59e5012ec43c7b36b549caa18746a1222.
    • The st_txt_hash property was set to 405e8f2f6e6e4efd52ee0478b151cb757d953adff74d39bd842d0a5768af01cf.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1066290, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 116, '/CreationDate': 'D:20090812100814Z', '/Creator': 'Microsoft® Office Word 2007', '/ModDate': "D:20090812131114+03'00'", '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0399-2007': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0017': 3, 'BSI-PP-0002-2001': 1}}, 'cc_security_level': {'EAL': {'EAL 4+': 1, 'EAL4': 9, 'EAL5': 1, 'EAL5+': 1, 'EAL4+': 1, 'EAL 5+': 1, 'EAL4 augmented': 2, 'EAL5 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 1, 'ACM_CAP.4': 1}, 'ADO': {'ADO_IGS': 1, 'ADO_DEL': 1, 'ADO_DEL.2': 1, 'ADO_IGS.1': 1}, 'ADV': {'ADV_IMP.2': 8, 'ADV_SPM.1': 3, 'ADV_FSP.2': 1, 'ADV_HLD.2': 1, 'ADV_LLD.1': 1, 'ADV_RCR.1': 1}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1}, 'ALC': {'ALC_DVS.2': 8, 'ALC_LCD.1': 1, 'ALC_TAT.1': 2, 'ALC_DVS': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_MSU.3': 1, 'AVA_VLA.4': 1, 'AVA_MSU.2': 1, 'AVA_SOF.1': 1, 'AVA_VLA.2': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 7, 'FAU_SAS.1.1': 4}, 'FCS': {'FCS_CKM.1': 30, 'FCS_CKM': 22, 'FCS_CKM.2': 4, 'FCS_COP.1': 24, 'FCS_CKM.4': 33, 'FCS_RND': 8, 'FCS_COP': 46, 'FCS_RND.1': 13, 'FCS_UIT': 1, 'FCS_CKM.1.1': 1}, 'FDP': {'FDP_ITC.1': 17, 'FDP_ITC.2': 13, 'FDP_ACC.1': 25, 'FDP_ACF.1': 34, 'FDP_ACF': 15, 'FDP_UCT': 12, 'FDP_UIT': 12, 'FDP_UCT.1': 12, 'FDP_IFC.1': 9, 'FDP_UIT.1': 13, 'FDP_ACC': 19, 'FDP_DAU.1': 5, 'FDP_DAU': 2, 'FDP_IFC': 1, 'FDP_IFF': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.4': 1, 'FDP_ACC.1.1': 1, 'FDP_SDI.1': 1, 'FDP_SDI.2': 1}, 'FIA': {'FIA_UAU': 36, 'FIA_API': 6, 'FIA_UID.1': 9, 'FIA_UID.1.1': 3, 'FIA_UID.1.2': 3, 'FIA_UAU.1': 6, 'FIA_UAU.1.1': 3, 'FIA_UAU.1.2': 3, 'FIA_UAU.4': 7, 'FIA_UAU.5': 4, 'FIA_UAU.5.1': 3, 'FIA_UAU.5.2': 4, 'FIA_UAU.6': 7, 'FIA_API.1': 1, 'FIA_UCT': 1}, 'FMT': {'FMT_MTD': 22, 'FMT_MSA.2': 22, 'FMT_MOF.1': 12, 'FMT_MSA.3': 4, 'FMT_SMF.1': 17, 'FMT_MOF.1.1': 4, 'FMT_SMF.1.1': 3, 'FMT_SMR.1': 16, 'FMT_SMR.1.1': 3, 'FMT_SMR.1.2': 3, 'FMT_LIM.1': 12, 'FMT_LIM.2': 12, 'FMT_LIM.1.1': 3, 'FMT_LIM.2.1': 3, 'FMT_MTD.1': 14, 'FMT_MSA.1': 2, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1}, 'FPT': {'FPT_FLS.1': 11, 'FPT_TST.1': 11, 'FPT_PHP.3': 11, 'FPT_RVM.1': 6, 'FPT_SEP.1': 8, 'FPT_FLS.1.1': 3, 'FPT_TST': 1, 'FPT_TST.1.1': 3, 'FPT_TST.1.2': 3, 'FPT_TST.1.3': 4, 'FPT_AMT.1': 1, 'FPT_PHP.3.1': 4, 'FPT_RVM.1.1': 3, 'FPT_SEP.1.1': 4, 'FPT_SEP.1.2': 4, 'FPT_TST.2.1': 1}, 'FRU': {'FRU_FLT.2.1': 1}, 'FTP': {'FTP_ITC.1': 9, 'FTP_TRP.1': 8}}, 'cc_claims': {'O': {'O.RND': 1}, 'T': {'T.CHIP_ID': 1, 'T.SKIMMING': 1, 'T.EAVESDROPPING': 1, 'T.FORGERY': 1, 'T.ABUSE_FUNC': 1, 'T.INFORMATION_LEAKAGE': 1, 'T.PHYS_TAMPER': 1, 'T.MALFUNCTION': 1}, 'A': {'A.PERS_AGENT': 2, 'A.INSP_SYS': 2}, 'OT': {'OT.AC_PERS': 4, 'OT.DATA_CONF': 3, 'OT.PROT_ABUSE_FUNC': 1, 'OT.PROT_PHYS_TAMPER': 1, 'OT.PROT_INF_LEAK': 2, 'OT.PROT_MALFUNCT': 2, 'OT.PROT_ABUSE_FU': 2}, 'OE': {'OE.PERSONALIZATION': 2, 'OE.EXAM_MRTD': 1, 'OE.PROT_LOGICAL_MRTD': 2}}, 'vendor': {'Infineon': {'Infineon': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 11}, '3DES': {'Triple-DES': 22, '3DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 7}}}, 'crypto_scheme': {'MAC': {'MAC': 10}}, 'crypto_protocol': {'PGP': {'PGP': 2}}, 'randomness': {'RNG': {'RND': 4}}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CBC': {'CBC': 6}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2, 'physical probing': 4, 'DPA': 1}, 'FI': {'Physical Tampering': 5, 'physical tampering': 8, 'Physical tampering': 1, 'Malfunction': 5, 'malfunction': 6, 'fault injection': 1}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 1, 'EF.DG2': 1, 'EF.DG3': 1, 'EF.DG4': 1, 'EF.DG5': 1, 'EF.DG16': 1}}, 'standard_id': {'FIPS': {'FIPS 180-212': 1, 'FIPS 46-3': 3, 'FIPS 180-2': 3, 'FIPS PUB 46-3': 1}, 'BSI': {'AIS31': 5}, 'ISO': {'ISO/IEC 7816': 2}, 'ICAO': {'ICAO': 12}, 'CC': {'CCMB-2005-08-001': 1, 'CCMB-2005-08-002': 1, 'CCMB-2005-08-003': 1, 'CCMB-2005-08-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to c0229_est.pdf.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}]} values added.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/c0229_est.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0169-2002', 'BSI-DSZ-CC-0223-2003']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}]} values discarded.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0266-2005', 'BSI-DSZ-CC-0322-2005']}}} data.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0322-2005']}}} data.
    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0169-2002', 'BSI-DSZ-CC-0266-2005', 'BSI-DSZ-CC-0223-2003']}}} data.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0266-2005']}}} data.
    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0169-2002', 'BSI-DSZ-CC-0266-2005', 'BSI-DSZ-CC-0223-2003']}}} data.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 21.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/c0229_erpt.pdf, code: nok'].
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 28.09.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0265-2004', 'BSI-DSZ-CC-338-2005', 'BSI-DSZ-CC-322-2005']}}} data.
  • 26.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The st_keywords property was updated, with the {'crypto_protocol': {'PGP': {'PGP': 2}}} data.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'c0229_erpt.pdf', 'st_filename': 'c0229_est.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'JP': {'__update__': {'CRP-C0229-01': 1}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_DVS.2': 4}}, 'AVA': {'__insert__': {'AVA_VLA.4': 1}}}}, 'vendor': {'__update__': {'Infineon': {'__update__': {'Infineon': 2}}}}, 'eval_facility': {'__update__': {'TUV': {'__update__': {'TÜV Informationstechnik': 2}}}}, 'side_channel_analysis': {'__update__': {'FI': {'__update__': {'Malfunction': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_sar': {'__update__': {'ACM': {'__delete__': ['ACM_SCP.2']}, 'ADV': {'__update__': {'ADV_LLD.1': 1}}, 'ALC': {'__insert__': {'ALC_DVS': 1}, '__update__': {'ALC_DVS.2': 8}}}}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_SAS.1': 7, 'FAU_SAS.1.1': 4}}, 'FCS': {'__insert__': {'FCS_CKM': 22, 'FCS_RND': 8, 'FCS_COP': 46, 'FCS_UIT': 1}, '__update__': {'FCS_CKM.1': 30, 'FCS_COP.1': 24, 'FCS_CKM.4': 33, 'FCS_RND.1': 13, 'FCS_CKM.1.1': 1}}, 'FDP': {'__insert__': {'FDP_UCT': 12, 'FDP_UIT': 12, 'FDP_DAU': 2}, '__update__': {'FDP_ACC.1': 25, 'FDP_ACF.1': 34, 'FDP_UCT.1': 12, 'FDP_DAU.1': 5, 'FDP_ACC': 19, 'FDP_ACF': 15, 'FDP_UIT.1': 13}}, 'FIA': {'__insert__': {'FIA_UAU': 36, 'FIA_API.1': 1, 'FIA_UCT': 1}, '__update__': {'FIA_UAU.1': 6, 'FIA_UAU.4': 7, 'FIA_UAU.6': 7, 'FIA_API': 6}}, 'FMT': {'__insert__': {'FMT_MTD': 22}, '__update__': {'FMT_MOF.1': 12, 'FMT_SMF.1': 17, 'FMT_LIM.1': 12, 'FMT_LIM.2': 12, 'FMT_MTD.1': 14}}, 'FPT': {'__insert__': {'FPT_TST': 1}, '__update__': {'FPT_FLS.1': 11, 'FPT_TST.1': 11, 'FPT_PHP.3': 11, 'FPT_TST.1.1': 3, 'FPT_AMT.1': 1, 'FPT_PHP.3.1': 4, 'FPT_SEP.1.1': 4, 'FPT_SEP.1.2': 4}}}}, 'cc_claims': {'__update__': {'T': {'__update__': {'T.MALFUNCTION': 1}, '__delete__': ['T.AC_PERS', 'T.DATA_INT', 'T.DATA_CONF', 'T.IDENTIFICATION', 'T.PROT_ABUSE_FUNC', 'T.PROT_INF_LEAK', 'T.PROT_PHYS_TAMPER', 'T.PROT_PHYS_TAM', 'T.PROT_MALFUNCT', 'T.PROT_ABUSE_FU']}, 'OT': {'__update__': {'OT.PROT_INF_LEAK': 2}, '__delete__': ['OT.DATA_INT', 'OT.IDENTIFICATION', 'OT.MALFUNCTION', 'OT.PROT_PHYS_TAM']}, 'OE': {'__update__': {'OE.EXAM_MRTD': 1}, '__delete__': ['OE.PASS_AUTH_SIGN', 'OE.PASSIVE_AUTH_VERIF', 'OE.SECURE_HANDLING']}}, '__delete__': ['D']}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 11}}, '3DES': {'__update__': {'Triple-DES': 22}}}}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 10}}}, '__delete__': ['KA']}, 'randomness': {'__update__': {'RNG': {'__update__': {'RND': 4}}}}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'physical probing': 4}}, 'FI': {'__update__': {'Physical Tampering': 5, 'physical tampering': 8, 'Malfunction': 5}}}}, 'standard_id': {'__insert__': {'ISO': {'ISO/IEC 7816': 2}}, '__update__': {'FIPS': {'__update__': {'FIPS 180-2': 3}}, 'BSI': {'__update__': {'AIS31': 5}}, 'ICAO': {'__update__': {'ICAO': 12}}}}} data.

    The computed heuristics were updated.

    • The cert_id property was set to C0229.
    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0399-2007']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0399-2007', 'BSI-DSZ-CC-0266-2005', 'BSI-DSZ-CC-0322-2005']}} data.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0399-2007']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0265-2004', 'BSI-DSZ-CC-0169-2002', 'BSI-DSZ-CC-338-2005', 'BSI-DSZ-CC-0322-2005', 'BSI-DSZ-CC-0266-2005', 'BSI-DSZ-CC-0223-2003', 'BSI-DSZ-CC-322-2005', 'BSI-DSZ-CC-0399-2007']}} data.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0399-2007': 2}, 'JP': {'CRP-C0229-01': 54, 'Certification No. C0229': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0017': 2}}, 'cc_security_level': {'EAL': {'EAL4': 3, 'EAL 5': 1, 'EAL5+': 1, 'EAL 5 augmented': 1, 'EAL4 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_IMP.2': 3}, 'ALC': {'ALC_DVS.2': 3}, 'AVA': {'AVA_MSU.3': 1}}, 'cc_sfr': {}, 'cc_claims': {'A': {'A.PERS_AGENT': 1, 'A.INSP_SYS': 1}}, 'vendor': {'Infineon': {'Infineon': 4, 'Infineon Technologies AG': 1}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 3, 'TÜViT': 2}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'DPA': 3}, 'FI': {'Physical Tampering': 1, 'physical tampering': 1, 'Physical tampering': 1, 'Malfunction': 2, 'malfunction': 3, 'fault injection': 3, 'Fault Injection': 1}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 1': 1, 'AIS 14': 1, 'AIS 19': 1, 'AIS 23': 1, 'AIS 31': 1, 'AIS 32': 1, 'AIS 34': 1}, 'ISO': {'ISO/IEC 15408:2005': 1, 'ISO/IEC 18045:2005': 2}, 'ICAO': {'ICAO': 7}, 'CC': {'CCMB-2005-08-001': 2, 'CCMB-2005-08-002': 2, 'CCMB-2005-08-003': 2, 'CCMB-2005-08-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0399-2007': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0017': 3, 'BSI-PP-0002-2001': 1}}, 'cc_security_level': {'EAL': {'EAL 4+': 1, 'EAL4': 9, 'EAL5': 1, 'EAL5+': 1, 'EAL4+': 1, 'EAL 5+': 1, 'EAL4 augmented': 2, 'EAL5 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 1, 'ACM_CAP.4': 1, 'ACM_SCP.2': 1}, 'ADO': {'ADO_IGS': 1, 'ADO_DEL': 1, 'ADO_DEL.2': 1, 'ADO_IGS.1': 1}, 'ADV': {'ADV_IMP.2': 8, 'ADV_SPM.1': 3, 'ADV_FSP.2': 1, 'ADV_HLD.2': 1, 'ADV_LLD.1': 2, 'ADV_RCR.1': 1}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1}, 'ALC': {'ALC_DVS.2': 7, 'ALC_LCD.1': 1, 'ALC_TAT.1': 2}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_MSU.3': 1, 'AVA_VLA.4': 1, 'AVA_MSU.2': 1, 'AVA_SOF.1': 1, 'AVA_VLA.2': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 5, 'FAU_SAS.1.1': 5}, 'FCS': {'FCS_CKM.1': 27, 'FCS_CKM.2': 4, 'FCS_COP.1': 9, 'FCS_CKM.4': 29, 'FCS_RND.1': 9, 'FCS_CKM.1.1': 2}, 'FDP': {'FDP_ITC.1': 17, 'FDP_ITC.2': 13, 'FDP_ACC.1': 19, 'FDP_ACF.1': 10, 'FDP_UCT.1': 7, 'FDP_IFC.1': 9, 'FDP_DAU.1': 3, 'FDP_ACC': 1, 'FDP_ACF': 1, 'FDP_IFC': 1, 'FDP_IFF': 1, 'FDP_UIT.1': 3, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.4': 1, 'FDP_ACC.1.1': 1, 'FDP_SDI.1': 1, 'FDP_SDI.2': 1}, 'FIA': {'FIA_UID.1': 9, 'FIA_UID.1.1': 3, 'FIA_UID.1.2': 3, 'FIA_UAU.1': 7, 'FIA_UAU.1.1': 3, 'FIA_UAU.1.2': 3, 'FIA_UAU.4': 3, 'FIA_UAU.5': 4, 'FIA_UAU.5.1': 3, 'FIA_UAU.5.2': 4, 'FIA_UAU.6': 3, 'FIA_API': 1}, 'FMT': {'FMT_MSA.2': 22, 'FMT_MOF.1': 9, 'FMT_MSA.3': 4, 'FMT_SMF.1': 19, 'FMT_MOF.1.1': 4, 'FMT_SMF.1.1': 3, 'FMT_SMR.1': 16, 'FMT_SMR.1.1': 3, 'FMT_SMR.1.2': 3, 'FMT_LIM.1': 14, 'FMT_LIM.2': 14, 'FMT_LIM.1.1': 3, 'FMT_LIM.2.1': 3, 'FMT_MTD.1': 2, 'FMT_MSA.1': 2, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1}, 'FPT': {'FPT_FLS.1': 12, 'FPT_TST.1': 8, 'FPT_PHP.3': 9, 'FPT_RVM.1': 6, 'FPT_SEP.1': 8, 'FPT_FLS.1.1': 3, 'FPT_TST.1.1': 4, 'FPT_TST.1.2': 3, 'FPT_TST.1.3': 4, 'FPT_AMT.1': 2, 'FPT_PHP.3.1': 5, 'FPT_RVM.1.1': 3, 'FPT_SEP.1.1': 5, 'FPT_SEP.1.2': 5, 'FPT_TST.2.1': 1}, 'FRU': {'FRU_FLT.2.1': 1}, 'FTP': {'FTP_ITC.1': 9, 'FTP_TRP.1': 8}}, 'cc_claims': {'D': {'D.ICC': 2, 'D.IFD': 1, 'D.ASSURANCE': 1, 'D.MATERIAL': 1}, 'O': {'O.RND': 1}, 'T': {'T.AC_PERS': 4, 'T.DATA_INT': 3, 'T.DATA_CONF': 3, 'T.IDENTIFICATION': 3, 'T.PROT_ABUSE_FUNC': 1, 'T.PROT_INF_LEAK': 3, 'T.PROT_PHYS_TAMPER': 1, 'T.MALFUNCTION': 2, 'T.CHIP_ID': 1, 'T.SKIMMING': 1, 'T.EAVESDROPPING': 1, 'T.FORGERY': 1, 'T.ABUSE_FUNC': 1, 'T.INFORMATION_LEAKAGE': 1, 'T.PHYS_TAMPER': 1, 'T.PROT_PHYS_TAM': 2, 'T.PROT_MALFUNCT': 2, 'T.PROT_ABUSE_FU': 2}, 'A': {'A.PERS_AGENT': 2, 'A.INSP_SYS': 2}, 'OT': {'OT.AC_PERS': 4, 'OT.DATA_INT': 3, 'OT.DATA_CONF': 3, 'OT.IDENTIFICATION': 3, 'OT.PROT_ABUSE_FUNC': 1, 'OT.PROT_INF_LEAK': 3, 'OT.PROT_PHYS_TAMPER': 1, 'OT.MALFUNCTION': 1, 'OT.PROT_PHYS_TAM': 2, 'OT.PROT_MALFUNCT': 2, 'OT.PROT_ABUSE_FU': 2}, 'OE': {'OE.PERSONALIZATION': 2, 'OE.PASS_AUTH_SIGN': 1, 'OE.EXAM_MRTD': 2, 'OE.PASSIVE_AUTH_VERIF': 1, 'OE.PROT_LOGICAL_MRTD': 2, 'OE.SECURE_HANDLING': 1}}, 'vendor': {'Infineon': {'Infineon': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 33}, '3DES': {'Triple-DES': 21, '3DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 7}}}, 'crypto_scheme': {'MAC': {'MAC': 20}, 'KA': {'KA': 1}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RND': 1}}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CBC': {'CBC': 6}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2, 'physical probing': 3, 'DPA': 1}, 'FI': {'Physical Tampering': 6, 'physical tampering': 6, 'Physical tampering': 1, 'Malfunction': 11, 'malfunction': 6, 'fault injection': 1}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 1, 'EF.DG2': 1, 'EF.DG3': 1, 'EF.DG4': 1, 'EF.DG5': 1, 'EF.DG16': 1}}, 'standard_id': {'FIPS': {'FIPS 180-212': 1, 'FIPS 46-3': 3, 'FIPS 180-2': 1, 'FIPS PUB 46-3': 1}, 'BSI': {'AIS31': 4}, 'ICAO': {'ICAO': 13}, 'CC': {'CCMB-2005-08-001': 1, 'CCMB-2005-08-002': 1, 'CCMB-2005-08-003': 1, 'CCMB-2005-08-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_SCP', 'level': 2}, {'_type': 'SAR', 'family': 'ACM_AUT', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 4}, {'_type': 'SAR', 'family': 'ADO_DEL', 'level': 2}]} values discarded.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': 'f26ccca1470cbfbb6ce3effb35195ed8f5e922cb312c87f87989873662d9d91b', 'st_pdf_hash': '1bbf86d94d9fb2279b839d4ab92d80a59e5012ec43c7b36b549caa18746a1222', 'report_txt_hash': 'b60ded4ae888ec20879ce4bc753b2573abb13639acfde84339720ee86a541120', 'st_txt_hash': '405e8f2f6e6e4efd52ee0478b151cb757d953adff74d39bd842d0a5768af01cf'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'DES': 1}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {'Malfunction': 2, 'malfunction': 3, 'physical probing': 1, 'Physical Tampering': 1, 'physical tampering': 1, 'Physical tampering': 1, 'DPA': 3, 'fault injection': 3, 'Fault Injection': 1, 'reverse engineering': 1}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'DES': 32, '3DES': 1}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 7}, 'rules_crypto_schemes': {'MAC': 20}, 'rules_randomness': {'RND': 1}, 'rules_tee': {}, 'rules_side_channels': {'Malfunction': 11, 'malfunction': 6, 'Leak-Inherent': 2, 'physical probing': 3, 'Physical Tampering': 6, 'physical tampering': 6, 'Physical tampering': 1, 'DPA': 1, 'fault injection': 1, 'reverse engineering': 1}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 4}, {'_type': 'SAR', 'family': 'AVA_MSU', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_DEL', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_SCP', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_AUT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VLA', 'level': 4}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['1.0']}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Apollo OS e-Passport Version 1.0 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "991790f44a825778",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "JISEC-CC-CRP-C0229",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0399-2007"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0322-2005",
          "BSI-DSZ-CC-0169-2002",
          "BSI-DSZ-CC-0223-2003",
          "BSI-DSZ-CC-0399-2007",
          "BSI-DSZ-CC-0266-2005"
        ]
      }
    },
    "scheme_data": {
      "cert_id": "C0229",
      "certification_date": "2009-07",
      "claim": "EAL4+\n                      ADV_IMP.2, \n                      ALC_DVS.2\n                      PP",
      "enhanced": {
        "assurance_level": "EAL4 Augmented with ADV_IMP.2, ALC_DVS.2",
        "cc_version": "2.3",
        "cert_link": "https://www.ipa.go.jp/en/security/c0229_eimg.pdf",
        "certification_date": "2009-07-27",
        "description": "PRODUCT DESCRIPTION \n   Description of TOE The Target of Evaluation (TOE) is the contactless integrated circuit chip of machine readable travel documents (MRTD\u0027s chip) programmed according to the Logical Data Structure (LDS) [LDS] and providing the Basic Access Control according to the ICAO technical report [PKI]. \n    The MRTD is viewed as unit of \n     \n     \n       \n       - \n       The physical MRTD as travel document in form of paper, plastic and chip. It presents visual readable data including (but not limited to) personal data of the MRTD holder \n       \n       \n        \n       \n       \n        \n       \n        \n         -\n         \n       the biographical data on the biographical data page of the passport book, \n       \n       \n        \n       \n        \n         -\n         \n       the printed data in the Machine Readable Zone (MRZ) and \n       \n       \n        \n       \n        \n         -\n         \n       The printed portrait. \n       \n       \n       - \n       The logical MRTD as data of the MRTD holder stored according to the Logical Data Structure [LDS] as specified by ICAO on the contactless integrated circuit. It presents contactless readable data including (but not limited to) personal data of the MRTD holder \n       \n       \n        \n       \n       \n        \n       \n       \n        \n       \n        \n         -\n         \n       the digital Machine Readable Zone Data (digital MRZ data, EF.DG1), \n       \n       \n        \n       \n        \n         -\n         \n       the digitized portraits (EF.DG2), \n       \n       \n        \n       \n        \n         -\n         \n       the biometric reference data of finger(s) (EF.DG3) or iris image(s) (EF.DG4) or both \n       \n       \n        \n       \n        \n         -\n         \n       the other data according to LDS (EF.DG5 to EF.DG16) and \n       \n       \n        \n       \n        \n         -\n         \n       the Document security object \n       \n     \n      \n     The physical MRTD is protected by physical security measures (e.g. watermark on paper, security printing), logical (e.g. authentication keys of the MRTD\u75f4 chip) and organisational security measures (e.g. control of materials, personalization procedures) [SSMR]. These security measures include the binding of the MRTD\u75f4 chip to the passport book. The logical MRTD is protected in authenticity and integrity by a digital signature created by the document signer acting for the issuing State or Organization and the security features of the MRTD\u75f4 chip.   \n    \n    \n    \n   TOE security functions \n   TOE security function is as follows \n    \n    \n      \n      - SF.Cryptographic Support \n      \n      \n       \n      The cryptographic support for the other Security Functions. \n      \n      \n      - SF.Identification and Authentication \n      \n      \n       \n      The identification and authentication for the TOE user \n      \n      \n      - SF. User Data Protection \n      \n      \n       \n      The user data protection \n      \n      \n      - SF.Security Management \n      \n      \n       \n      The security management of the TOE \n      \n      \n      - SF.Protection (Protection of TSC) \n      \n      \n       \n      This Security Function protects the TSF functionality, TSF data and user data.",
        "evaluation_facility": "T\u00dcV Informationstechnik GmbH, \n      Evaluation Body for IT-Security",
        "product": "Apollo OS e-Passport",
        "product_type": "IT Product (IC chip firmware)",
        "protection_profile": "BSI-PP-0017",
        "report_link": "https://www.ipa.go.jp/en/security/c0229_erpt.pdf",
        "target_link": "https://www.ipa.go.jp/en/security/c0229_est.pdf",
        "toe_version": "1.0",
        "vendor": "SC Square LTD."
      },
      "supplier": "SC Square                     LTD.",
      "toe_japan_name": "Apollo OS e-Passport\n                    1.0",
      "toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0229_it8194.html",
      "toe_overseas_name": "Apollo OS e-Passport\n                    1.0"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0399-2007"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0399-2007",
          "BSI-DSZ-CC-0322-2005",
          "BSI-DSZ-CC-0266-2005"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "SC Square LTD.",
  "manufacturer_web": "https://www.scsquare.com/",
  "name": "Apollo OS e-Passport Version 1.0",
  "not_valid_after": "2014-07-31",
  "not_valid_before": "2009-07-27",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "c0229_erpt.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0399-2007": 1
        },
        "JP": {
          "CRP-C0229-01": 1,
          "Certification No. C0229": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.INSP_SYS": 1,
          "A.PERS_AGENT": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0017": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_IMP.2": 3
        },
        "ALC": {
          "ALC_DVS.2": 4
        },
        "AVA": {
          "AVA_MSU.3": 1,
          "AVA_VLA.4": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL 5 augmented": 1,
          "EAL4": 3,
          "EAL4 augmented": 2,
          "EAL5+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 2,
          "T\u00dcViT": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "Fault Injection": 1,
          "Malfunction": 1,
          "Physical Tampering": 1,
          "Physical tampering": 1,
          "fault injection": 3,
          "malfunction": 3,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 3,
          "physical probing": 1
        },
        "other": {
          "reverse engineering": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 1": 1,
          "AIS 14": 1,
          "AIS 19": 1,
          "AIS 23": 1,
          "AIS 31": 1,
          "AIS 32": 1,
          "AIS 34": 1
        },
        "CC": {
          "CCMB-2005-08-001": 2,
          "CCMB-2005-08-002": 2,
          "CCMB-2005-08-003": 2,
          "CCMB-2005-08-004": 2
        },
        "ICAO": {
          "ICAO": 7
        },
        "ISO": {
          "ISO/IEC 15408:2005": 1,
          "ISO/IEC 18045:2005": 2
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 2,
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20090910140719+09\u002700\u0027",
      "/ModDate": "D:20090910140719+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 6.0 (Windows)",
      "/Title": "untitled",
      "pdf_file_size_bytes": 170365,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 27
    },
    "st_filename": "c0229_est.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0399-2007": 1
        },
        "NL": {
          "CC-1": 3,
          "CC-2": 3,
          "CC-3": 2,
          "CC-4": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.INSP_SYS": 2,
          "A.PERS_AGENT": 2
        },
        "O": {
          "O.RND": 1
        },
        "OE": {
          "OE.EXAM_MRTD": 1,
          "OE.PERSONALIZATION": 2,
          "OE.PROT_LOGICAL_MRTD": 2
        },
        "OT": {
          "OT.AC_PERS": 4,
          "OT.DATA_CONF": 3,
          "OT.PROT_ABUSE_FU": 2,
          "OT.PROT_ABUSE_FUNC": 1,
          "OT.PROT_INF_LEAK": 2,
          "OT.PROT_MALFUNCT": 2,
          "OT.PROT_PHYS_TAMPER": 1
        },
        "T": {
          "T.ABUSE_FUNC": 1,
          "T.CHIP_ID": 1,
          "T.EAVESDROPPING": 1,
          "T.FORGERY": 1,
          "T.INFORMATION_LEAKAGE": 1,
          "T.MALFUNCTION": 1,
          "T.PHYS_TAMPER": 1,
          "T.SKIMMING": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0002-2001": 1,
          "BSI-PP-0017": 3
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT.1": 1,
          "ACM_CAP.4": 1
        },
        "ADO": {
          "ADO_DEL": 1,
          "ADO_DEL.2": 1,
          "ADO_IGS": 1,
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_FSP.2": 1,
          "ADV_HLD.2": 1,
          "ADV_IMP.2": 8,
          "ADV_LLD.1": 1,
          "ADV_RCR.1": 1,
          "ADV_SPM.1": 3
        },
        "AGD": {
          "AGD_ADM.1": 1,
          "AGD_USR.1": 1
        },
        "ALC": {
          "ALC_DVS": 1,
          "ALC_DVS.2": 8,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 2
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_MSU.2": 1,
          "AVA_MSU.3": 1,
          "AVA_SOF.1": 1,
          "AVA_VLA.2": 1,
          "AVA_VLA.4": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4+": 1,
          "EAL 5+": 1,
          "EAL4": 9,
          "EAL4 augmented": 2,
          "EAL4+": 1,
          "EAL5": 1,
          "EAL5 augmented": 1,
          "EAL5+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS.1": 7,
          "FAU_SAS.1.1": 4
        },
        "FCS": {
          "FCS_CKM": 22,
          "FCS_CKM.1": 30,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 4,
          "FCS_CKM.4": 33,
          "FCS_COP": 46,
          "FCS_COP.1": 24,
          "FCS_RND": 8,
          "FCS_RND.1": 13,
          "FCS_UIT": 1
        },
        "FDP": {
          "FDP_ACC": 19,
          "FDP_ACC.1": 25,
          "FDP_ACC.1.1": 1,
          "FDP_ACF": 15,
          "FDP_ACF.1": 34,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.4": 1,
          "FDP_DAU": 2,
          "FDP_DAU.1": 5,
          "FDP_IFC": 1,
          "FDP_IFC.1": 9,
          "FDP_IFF": 1,
          "FDP_ITC.1": 17,
          "FDP_ITC.2": 13,
          "FDP_SDI.1": 1,
          "FDP_SDI.2": 1,
          "FDP_UCT": 12,
          "FDP_UCT.1": 12,
          "FDP_UIT": 12,
          "FDP_UIT.1": 13
        },
        "FIA": {
          "FIA_API": 6,
          "FIA_API.1": 1,
          "FIA_UAU": 36,
          "FIA_UAU.1": 6,
          "FIA_UAU.1.1": 3,
          "FIA_UAU.1.2": 3,
          "FIA_UAU.4": 7,
          "FIA_UAU.5": 4,
          "FIA_UAU.5.1": 3,
          "FIA_UAU.5.2": 4,
          "FIA_UAU.6": 7,
          "FIA_UCT": 1,
          "FIA_UID.1": 9,
          "FIA_UID.1.1": 3,
          "FIA_UID.1.2": 3
        },
        "FMT": {
          "FMT_LIM.1": 12,
          "FMT_LIM.1.1": 3,
          "FMT_LIM.2": 12,
          "FMT_LIM.2.1": 3,
          "FMT_MOF.1": 12,
          "FMT_MOF.1.1": 4,
          "FMT_MSA.1": 2,
          "FMT_MSA.2": 22,
          "FMT_MSA.3": 4,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD": 22,
          "FMT_MTD.1": 14,
          "FMT_SMF.1": 17,
          "FMT_SMF.1.1": 3,
          "FMT_SMR.1": 16,
          "FMT_SMR.1.1": 3,
          "FMT_SMR.1.2": 3
        },
        "FPT": {
          "FPT_AMT.1": 1,
          "FPT_FLS.1": 11,
          "FPT_FLS.1.1": 3,
          "FPT_PHP.3": 11,
          "FPT_PHP.3.1": 4,
          "FPT_RVM.1": 6,
          "FPT_RVM.1.1": 3,
          "FPT_SEP.1": 8,
          "FPT_SEP.1.1": 4,
          "FPT_SEP.1.2": 4,
          "FPT_TST": 1,
          "FPT_TST.1": 11,
          "FPT_TST.1.1": 3,
          "FPT_TST.1.2": 3,
          "FPT_TST.1.3": 4,
          "FPT_TST.2.1": 1
        },
        "FRU": {
          "FRU_FLT.2.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 9,
          "FTP_TRP.1": 8
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 6
        },
        "ECB": {
          "ECB": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PGP": {
          "PGP": 2
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 10
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 7
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.DG1": 1,
          "EF.DG16": 1,
          "EF.DG2": 1,
          "EF.DG3": 1,
          "EF.DG4": 1,
          "EF.DG5": 1
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 4
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 5,
          "Physical Tampering": 5,
          "Physical tampering": 1,
          "fault injection": 1,
          "malfunction": 6,
          "physical tampering": 8
        },
        "SCA": {
          "DPA": 1,
          "Leak-Inherent": 2,
          "physical probing": 4
        },
        "other": {
          "reverse engineering": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 5
        },
        "CC": {
          "CCMB-2005-08-001": 1,
          "CCMB-2005-08-002": 1,
          "CCMB-2005-08-003": 1,
          "CCMB-2005-08-004": 1
        },
        "FIPS": {
          "FIPS 180-2": 3,
          "FIPS 180-212": 1,
          "FIPS 46-3": 3,
          "FIPS PUB 46-3": 1
        },
        "ICAO": {
          "ICAO": 12
        },
        "ISO": {
          "ISO/IEC 7816": 2
        }
      },
      "symmetric_crypto": {
        "DES": {
          "3DES": {
            "3DES": 1,
            "Triple-DES": 22
          },
          "DES": {
            "DES": 11
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 2
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20090812100814Z",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20090812131114+03\u002700\u0027",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "pdf_file_size_bytes": 1066290,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 116
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/c0229_erpt.pdf",
  "scheme": "JP",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "AVA_MSU.3",
      "AVA_VLA.4"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/c0229_est.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "f26ccca1470cbfbb6ce3effb35195ed8f5e922cb312c87f87989873662d9d91b",
      "txt_hash": "b60ded4ae888ec20879ce4bc753b2573abb13639acfde84339720ee86a541120"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "1bbf86d94d9fb2279b839d4ab92d80a59e5012ec43c7b36b549caa18746a1222",
      "txt_hash": "405e8f2f6e6e4efd52ee0478b151cb757d953adff74d39bd842d0a5768af01cf"
    }
  },
  "status": "archived"
}