TCOS Identity Card Version 1.0 Release 1 / SLE78CLX1440P-FSV02

CSV information ?

Status archived
Valid from 29.07.2011
Valid until 01.09.2019
Scheme 🇩🇪 DE
Manufacturer T-Systems International GMBH
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL4+, AVA_VAN.5, ALC_DVS.2, ATE_DPT.2
Protection profiles

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0722-2011

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC
Hash functions
SHA-1, SHA-224, SHA-256, SHA-2
Protocols
PACE

Vendor
NXP, Infineon, Infineon Technologies, Infineon Technologies AG

Security level
EAL 4, EAL 5, EAL1, EAL4, EAL5, EAL5+, EAL6, EAL3, EAL7, EAL2, EAL 4 augmented, ITSEC Evaluation
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_DPT.2, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSS
Security Functional Requirements (SFR)
FCS_COP, FCS_CKM
Protection profiles
BSI-CC-PP-0061-2009, BSI-CC-PP- 0061-2009
Certificates
BSI-DSZ-CC-0722-2011, BSI-DSZ-CC-0677-2010, BSI-DSZ-CC-0640-2010
Evaluation facilities
TĂśV Informationstechnik, SRC Security Research & Consulting, T-Systems International
Certification process
Identity Card Version 1.0 Release 1/ SLE78CLX1440P-FSV02, SRC Security Research & Consulting GmbH (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product Infineon SLE78CLXxxxP/M/PS, A11, Version 4, 26.07.2010, TÜV Informationstechnik GmbH – Evaluation Body for IT Security (confidential document) 9 specifically • AIS 20, Version 1, 02 December 1999, Funktionalitätsklassen und, 1/P5CD128/145 und TCOS Identity Card Version 1.0 Release 1/SLE78CLX1440P, 08.06.2011, Version 1.3 (confidential document) [12] TCOS Identity Card 1.0, Release 1, Administrator's Guidance, Guidance Documentation of TCOS

Side-channel analysis
side channel, fault injection, JIL
Certification process
Identity Card Version 1.0 Release 1/ SLE78CLX1440P-FSV02, SRC Security Research & Consulting GmbH (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product Infineon SLE78CLXxxxP/M/PS, A11, Version 4, 26.07.2010, TÜV Informationstechnik GmbH – Evaluation Body for IT Security (confidential document) 9 specifically • AIS 20, Version 1, 02 December 1999, Funktionalitätsklassen und, 1/P5CD128/145 und TCOS Identity Card Version 1.0 Release 1/SLE78CLX1440P, 08.06.2011, Version 1.3 (confidential document) [12] TCOS Identity Card 1.0, Release 1, Administrator's Guidance, Guidance Documentation of TCOS

Standards
FIPS 180-2, FIPS 197, AIS 34, AIS 25, AIS 26, AIS 36, AIS 20, AIS 31, AIS 32, AIS 38, ICAO
Technical reports
BSI 7125, BSI 7148, BSI 7149, BSI 22

File metadata

Title: Certification Report BSI-DSZ-CC-0722-2011
Subject: TCOS Identity Card Version 1.0 Release 1/ SLE78CLX1440P-FSV02
Keywords: "Common Criteria, Certification, Zertifizierung, nPA, elektronischer Personalausweis, neuer Personalausweis, eID, electronic Identity Card, ID_Card, ID Card"
Author: Bundesamt fĂĽr Sicherheit in der Informationstechnik
Creation date: D:20110928150719+02'00'
Modification date: D:20110928150907+02'00'
Pages: 36
Creator: Writer
Producer: OpenOffice.org 3.2

Frontpage

Certificate ID: BSI-DSZ-CC-0722-2011
Certified item: TCOS Identity Card Version 1.0 Release 1/ SLE78CLX1440P-FSV02
Certification lab: BSI
Developer: T-Systems International GmbH

References

Outgoing
  • BSI-DSZ-CC-0640-2010 - Infineon Technologies Smart Card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.1.18, EC v1.1.18 and SHA-2 v1.1 libraries and with specific IC dedicated software
  • BSI-DSZ-CC-0677-2010 - TCOS Identity Card Version 1.0 Release 1/ SLE78CLX1440P

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, Triple-DES, 3DES, KMAC, CMAC, CBC-MAC
Asymmetric Algorithms
ECDH, ECDSA, Diffie-Hellman, DH
Hash functions
SHA-1, SHA-224, SHA-256, SHA512, SHA-2
Schemes
MAC, Key Agreement
Protocols
PACE
Randomness
TRNG, PRNG, RND
Elliptic Curves
P-256, NIST P-256
Block cipher modes
CBC

Vendor
Infineon Technologies, Infineon Technologies AG

Security level
EAL4, EAL 5, EAL 4, EAL4 augmented, EAL 4 augmented, EAL 5 augmented
Claims
O.RND, O.MEM_ACCESS, T.RND, T.MEM_ACCESS, A.CGA, A.SCA, OE.CGA_SSCD, OE.CGA_SVD, OE.HID_VAD, OE.SCA_DTBS, OE.SVD_
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_ARC, ADV_FSP, ADV_TDS, ADV_IMP.1, ADV_FSP.4, ADV_TDS.3, AGD_PRE.1, AGD_OPE.1, ALC_DVS.2, ALC_DVS.1, ALC_DEL.1, ALC_CMC.4, ALC_CMS.4, ALC_LCD.1, ALC_TAT.1, ATE_DPT.2, ATE_DPT.1, ATE_COV.2, ATE_FUN.1, AVA_VAN.5
Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_SAS.1.1, FCS_RND, FCS_RND.1, FCS_RND.1.1, FCS_COP, FCS_CKM, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.4.1, FCS_RNG.1, FDP_ACF, FDP_RIP, FDP_SDI, FDP_ITC.1, FDP_ITC.2, FDP_RIP.1, FDP_ACC, FDP_ACF.1, FDP_ACC.1, FDP_RIP.1.1, FDP_SDI.1, FDP_SDI.2, FDP_IFC.1, FDP_ITC, FDP_ITT.1, FIA_API, FIA_API.1, FIA_API.1.1, FIA_UAU, FIA_UID, FIA_AFL, FIA_UIA, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FIA_UAU.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UID.1.1, FIA_UID.1.2, FIA_UID.1, FIA_UAU.4.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6.1, FIA_AFL.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_SMR, FMT_MTD, FMT_MTD.3, FMT_MSA.3, FMT_MSA.1, FMT_SMF.1.1, FMT_MSA, FMT_SMF.1, FMT_SMR.1, FMT_SMF, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FMT_MTD.3.1, FMT_MOF, FMT_MOF.1, FMT_MSA.2, FMT_MSA.4, FMT_MDT.3, FPT_TST.1, FPT_FLS.1, FPT_PHP.3, FPT_FLS.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3.1, FPT_FLS, FPT_PHP, FPT_TST, FPT_PHP.1, FPT_ITT.1, FPT_TST.2, FRU_FLT.2, FTP_ITC, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_ITC.1
Protection profiles
BSI-PP-0061, BSI-PP-0059, BSI-CC-PP-0055-2009, BSI-PP-0026-2006, BSI-CC-PP-0056-2009, BSI-CC-PP-0061-, BSI-CC-PP-0035-2007, BSI-CC-PP-0059-2009
Certificates
BSI-DSZ-CC-0640-2010
Evaluation facilities
T-Systems International
Certification process
out of scope, For the eSign Application the interface is not specified in the SSCD PP ([SSCDPP]) and it is out of scope of the Technical Guideline TR-03110 (cf, For the eSign Application the interface is not specified in the SSCD PP ([SSCDPP]) and it is out of scope of the Technical Guideline TR-03110 (cf. [EACTR, B.7]). 8 For the ePassport application, the

Side-channel analysis
Leak-Inherent, physical probing, Physical Probing, DPA, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineering
Certification process
out of scope, For the eSign Application the interface is not specified in the SSCD PP ([SSCDPP]) and it is out of scope of the Technical Guideline TR-03110 (cf, For the eSign Application the interface is not specified in the SSCD PP ([SSCDPP]) and it is out of scope of the Technical Guideline TR-03110 (cf. [EACTR, B.7]). 8 For the ePassport application, the

Standards
FIPS 180-2, FIPS 197, FIPS197, FIPS180, FIPS PUB 180-2, PKCS#3, AIS36, AIS31, AIS 31, AIS 36, RFC 2631, RFC 3369, RFC3369, ISO/IEC 7816-2, ISO/IEC 7816-4, ICAO, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004

File metadata

Title: Security Target TCOS Identity Card Version 1.0 Release 1 SLE78M7820-FSV02
Subject: TCOS Identity Card Version 1.0 Release 1 *Final Document*
Keywords: TCOS Identity Card, ePassport, eID, eSign
Author: T-Systems International GmbH
Creation date: D:20110114010001
Modification date: D:20110114095202+01'00'
Pages: 129
Creator: T-Systems AFPL Ghostscript
Producer: GPL Ghostscript 8.64

References

Outgoing
  • BSI-DSZ-CC-0640-2010 - Infineon Technologies Smart Card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.1.18, EC v1.1.18 and SHA-2 v1.1 libraries and with specific IC dedicated software

Heuristics ?

Certificate ID: BSI-DSZ-CC-0722-2011

Extracted SARs

APE_INT.1, APE_ECD.1, ASE_OBJ.2, ADV_FSP.4, ADV_SPM.1, ATE_DPT.2, APE_OBJ.2, ALC_TAT.1, ADV_IMP.1, ASE_TSS.2, ADV_ARC.1, ALC_DEL.1, ADV_TDS.3, ALC_DVS.2, AVA_VAN.5, ASE_REQ.2, ALC_CMS.4, ATE_FUN.1, ATE_COV.2, APE_CCL.1, ADV_INT.3, ASE_CCL.1, APE_REQ.2, ATE_IND.3, ALC_FLR.3, ASE_ECD.1, AGD_OPE.1, ALC_CMC.4, APE_SPD.1, AGD_PRE.1, ASE_SPD.1, ASE_INT.1, ALC_LCD.1

References ?

Updates ?

  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name TCOS Identity Card Version 1.0 Release 1 / SLE78CLX1440P-FSV02 was processed.

  • 01.02.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Electronic Identity Card (ID_Card PP), Version 1.03', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0061b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_ID_CARD_V1.03']}}]}.
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['1.0']}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0640-2010']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0640-2010']}}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0640-2010', 'BSI-DSZ-CC-0677-2010']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0640-2010', 'BSI-DSZ-CC-0677-2010']}}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'APE_CCL', 'level': 1}]}}.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': 'f253827007a2e9a9f1d37c788ed20fea238e0d096e236ed9e21ab208f6c2800a', 'st_pdf_hash': '4b57dc8502444cfb53a913b0574b592b232003511024ccb2b3857d04eb09e9e7', 'report_txt_hash': '73c8ed8f435fdc9a168343f40d2611b30434d394f957300cd8837f8bd3c77f0f', 'st_txt_hash': '69dc6f6fddaccd7e4fa166bffc5f95fd12e2b897c0c32f7ad098b4cc89f6852c'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 4}, 'rules_asymmetric_crypto': {'ECDH': 2, 'ECDSA': 4, 'ECC': 3, 'DH': 2, 'DSA': 4}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 1, 'SHA-224': 1, 'SHA-256': 1}, 'rules_crypto_schemes': {'PACE': 5, 'MAC': 2}, 'rules_randomness': {}, 'rules_tee': {'SE': 1}, 'rules_side_channels': {'side channel': 1, 'fault injection': 1}} values inserted.
    • The st_keywords property was updated, with the {'rules_ecc_curves': {'__insert__': {'NIST P-256': 1}}} data.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/']}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0722-2011': 74, 'BSI-DSZ-CC-0677-2010': 4, 'BSI-DSZ-CC-0640-2010': 8}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0061-2009': 3, 'BSI-CC-PP- 0061-2009': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 6, 'EAL 5': 3, 'EAL1': 7, 'EAL4': 8, 'EAL5': 7, 'EAL5+': 1, 'EAL6': 5, 'EAL2': 4, 'EAL3': 4, 'EAL7': 4, 'EAL 4 augmented': 3}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.1': 1, 'ADV_FSP.2': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.5': 1, 'ADV_FSP.6': 1, 'ADV_IMP.1': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_INT.2': 1, 'ADV_INT.3': 1, 'ADV_SPM.1': 1, 'ADV_TDS.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.4': 1, 'ADV_TDS.5': 1, 'ADV_TDS.6': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_DVS.2': 7, 'ALC_CMC.1': 1, 'ALC_CMC.2': 1, 'ALC_CMC.3': 1, 'ALC_CMC.4': 2, 'ALC_CMC.5': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 2, 'ALC_CMS.5': 1, 'ALC_DEL.1': 2, 'ALC_DVS.1': 1, 'ALC_FLR.1': 1, 'ALC_FLR.2': 1, 'ALC_FLR.3': 1, 'ALC_LCD.1': 2, 'ALC_LCD.2': 1, 'ALC_TAT.1': 2, 'ALC_TAT.2': 1, 'ALC_TAT.3': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_DPT.2': 6, 'ATE_COV.1': 1, 'ATE_COV.2': 1, 'ATE_COV.3': 1, 'ATE_DPT.1': 1, 'ATE_DPT.3': 1, 'ATE_DPT.4': 1, 'ATE_FUN.1': 1, 'ATE_FUN.2': 1, 'ATE_IND.1': 1, 'ATE_IND.2': 1, 'ATE_IND.3': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 5, 'AVA_VAN.1': 1, 'AVA_VAN.2': 1, 'AVA_VAN.3': 1, 'AVA_VAN.4': 1, 'AVA_VAN': 2}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP': 1}, 'Infineon': {'Infineon': 7, 'Infineon Technologies': 1, 'Infineon Technologies AG': 1}}, 'eval_facility': {'TUV': {'TĂśV Informationstechnik': 1}, 'SRC': {'SRC Security Research & Consulting': 3}, 'TSystems': {'T-Systems International': 9}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 4}}, 'constructions': {'MAC': {'CMAC': 2}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 2}, 'ECDSA': {'ECDSA': 4}, 'ECC': {'ECC': 3}}, 'FF': {'DH': {'DH': 2}, 'DSA': {'DSA': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-224': 1, 'SHA-256': 1, 'SHA-2': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 2}}, 'crypto_protocol': {'PACE': {'PACE': 5}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 1}, 'FI': {'fault injection': 1}, 'other': {'JIL': 3}}, 'technical_report_id': {'BSI': {'BSI 7125': 2, 'BSI 7148': 1, 'BSI 7149': 1, 'BSI 22': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 180-2': 3, 'FIPS 197': 1}, 'BSI': {'AIS 34': 2, 'AIS 25': 3, 'AIS 26': 3, 'AIS 36': 4, 'AIS 20': 1, 'AIS 31': 1, 'AIS 32': 1, 'AIS 38': 1}, 'ICAO': {'ICAO': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'Identity Card Version 1.0 Release 1/ SLE78CLX1440P-FSV02, SRC Security Research & Consulting GmbH (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product Infineon SLE78CLXxxxP/M/PS': 1, '/M7820 A11, Version 4, 26.07.2010, TĂśV Informationstechnik GmbH – Evaluation Body for IT Security (confidential document) 9 specifically • AIS 20, Version 1, 02 December 1999, Funktionalitätsklassen und': 1, "1/P5CD128/145 und TCOS Identity Card Version 1.0 Release 1/SLE78CLX1440P, 08.06.2011, Version 1.3 (confidential document) [12] TCOS Identity Card 1.0, Release 1, Administrator's Guidance, Guidance Documentation of TCOS": 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0640-2010': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0061': 1, 'BSI-PP-0059': 1, 'BSI-CC-PP-0055-2009': 1, 'BSI-PP-0026-2006': 1, 'BSI-CC-PP-0056-2009': 1, 'BSI-CC-PP-0061-': 1, 'BSI-CC-PP-0035-2007': 1, 'BSI-CC-PP-0059-2009': 1}}, 'cc_security_level': {'EAL': {'EAL4': 11, 'EAL 4': 1, 'EAL 5': 1, 'EAL4 augmented': 2, 'EAL 4 augmented': 1, 'EAL 5 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 2, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_TDS': 1, 'ADV_IMP.1': 3, 'ADV_FSP.4': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS.2': 8, 'ALC_DVS.1': 1, 'ALC_DEL.1': 2, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_DPT.2': 7, 'ATE_DPT.1': 1, 'ATE_COV.2': 1, 'ATE_FUN.1': 1}, 'AVA': {'AVA_VAN.5': 7}}, 'cc_sfr': {'FAU': {'FAU_SAS': 4, 'FAU_SAS.1': 13, 'FAU_SAS.1.1': 2}, 'FCS': {'FCS_RND': 4, 'FCS_RND.1': 12, 'FCS_RND.1.1': 2, 'FCS_CKM.1': 15, 'FCS_CKM.2': 8, 'FCS_COP.1': 9, 'FCS_CKM.4': 44, 'FCS_CKM.4.1': 1, 'FCS_RNG.1': 2}, 'FDP': {'FDP_ACF': 1, 'FDP_ITC.1': 8, 'FDP_ITC.2': 15, 'FDP_ACF.1': 15, 'FDP_ACC.1': 14, 'FDP_RIP.1': 16, 'FDP_RIP.1.1': 1, 'FDP_RIP': 1, 'FDP_SDI.1': 3, 'FDP_IFC.1': 8, 'FDP_ITT.1': 1, 'FDP_SDI.2': 1}, 'FIA': {'FIA_API': 4, 'FIA_API.1': 4, 'FIA_API.1.1': 2, 'FIA_UAU.5': 15, 'FIA_UAU.6': 7, 'FIA_UAU.1': 8, 'FIA_AFL.1.1': 3, 'FIA_AFL.1.2': 3, 'FIA_UID.1.1': 2, 'FIA_UID.1.2': 2, 'FIA_UID.1': 10, 'FIA_UAU.4': 8, 'FIA_UAU.4.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6.1': 1}, 'FMT': {'FMT_LIM': 4, 'FMT_LIM.1': 24, 'FMT_LIM.2': 22, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 2, 'FMT_MTD.3': 14, 'FMT_MSA.3': 10, 'FMT_MSA.1': 8, 'FMT_SMF.1.1': 2, 'FMT_SMF.1': 64, 'FMT_SMR.1': 60, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD.1': 2, 'FMT_MTD.3.1': 1, 'FMT_MDT.3': 1, 'FMT_MSA.2': 2}, 'FPT': {'FPT_TST.1': 12, 'FPT_FLS.1': 14, 'FPT_PHP.3': 13, 'FPT_FLS.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 2, 'FPT_PHP.3.1': 1, 'FPT_ITT.1': 1, 'FPT_TST.2': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC.1.1': 2, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'D': {'D.TCOS.ASE': 1}, 'O': {'O.RND': 3, 'O.MEM_ACCESS': 1}, 'T': {'T.RND': 2, 'T.MEM_ACCESS': 1}, 'A': {'A.CGA': 2, 'A.SCA': 2}, 'OE': {'OE': 2, 'OE.CGA_SSCD': 2, 'OE.CGA_SVD': 1, 'OE.HID_VAD': 3, 'OE.SCA_DTBS': 1, 'OE.SVD_': 1}}, 'vendor': {'Infineon': {'Infineon Technologies': 1, 'Infineon Technologies AG': 1}}, 'eval_facility': {'TSystems': {'T-Systems International': 130}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 33}}, 'DES': {'DES': {'DES': 7}, '3DES': {'Triple-DES': 3, '3DES': 1}}, 'constructions': {'MAC': {'KMAC': 18, 'CMAC': 26}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 9}, 'ECDSA': {'ECDSA': 7}}, 'FF': {'DH': {'Diffie-Hellman': 17, 'DH': 23}, 'DSA': {'DSA': 7}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}, 'SHA2': {'SHA-224': 2, 'SHA-256': 3, 'SHA512': 1, 'SHA-2': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 37}, 'KA': {'Key Agreement': 1, 'KA': 1}}, 'crypto_protocol': {'PACE': {'PACE': 165}}, 'randomness': {'TRNG': {'TRNG': 1}, 'PRNG': {'PRNG': 1}, 'RNG': {'RND': 13, 'RNG': 2}}, 'cipher_mode': {'CBC': {'CBC': 2}, 'CTR': {'CTR': 195}}, 'ecc_curve': {'NIST': {'P-256': 1, 'NIST P-256': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 6, 'physical probing': 2, 'Physical Probing': 2, 'DPA': 1}, 'FI': {'Physical Tampering': 2, 'physical tampering': 5, 'Physical tampering': 1, 'Malfunction': 14, 'malfunction': 5, 'fault injection': 1}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 180-2': 1, 'FIPS 197': 1, 'FIPS197': 2, 'FIPS180': 1, 'FIPS PUB 180-2': 1}, 'PKCS': {'PKCS#3': 4}, 'BSI': {'AIS36': 4, 'AIS31': 3, 'AIS 31': 1, 'AIS 36': 1}, 'RFC': {'RFC 2631': 1, 'RFC 3369': 1, 'RFC3369': 1}, 'ISO': {'ISO/IEC 7816-2': 1, 'ISO/IEC 7816-4': 1}, 'ICAO': {'ICAO': 8}, 'CC': {'CCMB-2009-07-001': 2, 'CCMB-2009-07-002': 2, 'CCMB-2009-07-003': 2, 'CCMB-2009-07-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, '. For the eSign Application the interface is not specified in the SSCD PP ([SSCDPP]) and it is out of scope of the Technical Guideline TR-03110 (cf': 1, 'ACTR]. For the eSign Application the interface is not specified in the SSCD PP ([SSCDPP]) and it is out of scope of the Technical Guideline TR-03110 (cf. [EACTR, B.7]). 8 For the ePassport application, the': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Electronic Identity Card (ID_Card PP), Version 1.03', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0061b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_ID_CARD_V1.03']}}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '0722a_pdf.pdf', 'st_filename': '0722b_pdf.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0722-2011': 40}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL4': 7, 'EAL6': 4, 'EAL2': 3}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_DVS.2': 6}, '__delete__': ['ALC_LCD']}, 'AVA': {'__update__': {'AVA_VAN.5': 6}}}}, 'cc_sfr': {'FCS': {'FCS_COP': 6, 'FCS_CKM': 4}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 3}}}}, 'constructions': {'__update__': {'MAC': {'__update__': {'CMAC': 1}}}}}}, 'asymmetric_crypto': {'__delete__': ['FF']}, 'crypto_scheme': {}, 'crypto_protocol': {'__update__': {'PACE': {'__update__': {'PACE': 4}}}}, 'tee_name': {}, 'certification_process': {'__update__': {'ConfidentialDocument': {'__insert__': {'A11, Version 4, 26.07.2010, TĂśV Informationstechnik GmbH – Evaluation Body for IT Security (confidential document) 9 specifically • AIS 20, Version 1, 02 December 1999, Funktionalitätsklassen und': 1}, '__delete__': ['/M7820 A11, Version 4, 26.07.2010, TĂśV Informationstechnik GmbH – Evaluation Body for IT Security (confidential document) 9 specifically • AIS 20, Version 1, 02 December 1999, Funktionalitätsklassen und']}}}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL4': 12, 'EAL 5': 2, 'EAL4 augmented': 3}}}}, 'cc_sar': {'__update__': {'AGD': {'__update__': {'AGD_PRE.1': 2}}, 'AVA': {'__update__': {'AVA_VAN.5': 8}}}}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_SAS': 6, 'FAU_SAS.1': 14}}, 'FCS': {'__insert__': {'FCS_COP': 72, 'FCS_CKM': 79}, '__update__': {'FCS_RND': 5, 'FCS_CKM.1': 17, 'FCS_COP.1': 13, 'FCS_CKM.4': 39}}, 'FDP': {'__insert__': {'FDP_SDI': 14, 'FDP_ACC': 44, 'FDP_ITC': 6}, '__update__': {'FDP_ACF': 37, 'FDP_ACF.1': 31, 'FDP_ACC.1': 18, 'FDP_RIP.1': 17, 'FDP_RIP': 4, 'FDP_SDI.2': 5}}, 'FIA': {'__insert__': {'FIA_UAU': 57, 'FIA_UID': 37, 'FIA_AFL': 41, 'FIA_UIA': 2, 'FIA_AFL.1': 2}, '__update__': {'FIA_API': 23, 'FIA_UAU.5': 16, 'FIA_UAU.6': 10, 'FIA_UAU.1': 14, 'FIA_UID.1': 12, 'FIA_UAU.4': 9}}, 'FMT': {'__insert__': {'FMT_SMR': 21, 'FMT_MTD': 130, 'FMT_MSA': 43, 'FMT_SMF': 16, 'FMT_MOF': 5, 'FMT_MOF.1': 1, 'FMT_MSA.4': 1}, '__update__': {'FMT_LIM': 5, 'FMT_MSA.3': 12, 'FMT_MSA.1': 10, 'FMT_SMF.1': 67, 'FMT_SMR.1': 30, 'FMT_MTD.1': 12, 'FMT_MSA.2': 3}}, 'FPT': {'__insert__': {'FPT_FLS': 2, 'FPT_PHP': 7, 'FPT_TST': 2, 'FPT_PHP.1': 2}, '__update__': {'FPT_PHP.3': 14}}, 'FTP': {'__insert__': {'FTP_ITC': 28, 'FTP_ITC.1': 2}}}}, 'cc_claims': {'__update__': {'OE': {'__delete__': ['OE']}}, '__delete__': ['D']}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 19}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 2}}}}, 'constructions': {'__update__': {'MAC': {'__insert__': {'CBC-MAC': 1}, '__update__': {'KMAC': 7, 'CMAC': 6}}}}}}, 'asymmetric_crypto': {'__update__': {'ECC': {'__update__': {'ECDH': {'__update__': {'ECDH': 8}}, 'ECDSA': {'__update__': {'ECDSA': 6}}}}, 'FF': {'__update__': {'DH': {'__update__': {'Diffie-Hellman': 10, 'DH': 3}}}, '__delete__': ['DSA']}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__update__': {'SHA-2': 2}}}}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 4}}, 'KA': {'__delete__': ['KA']}}}, 'crypto_protocol': {'__update__': {'PACE': {'__update__': {'PACE': 98}}}}, 'randomness': {'__update__': {'RNG': {'__update__': {'RND': 5}, '__delete__': ['RNG']}}}, 'cipher_mode': {'__delete__': ['CTR']}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'physical probing': 3}}, 'FI': {'__update__': {'Malfunction': 10, 'malfunction': 6}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'ICAO': {'__update__': {'ICAO': 5}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {' For the eSign Application the interface is not specified in the SSCD PP ([SSCDPP]) and it is out of scope of the Technical Guideline TR-03110 (cf': 1, ' For the eSign Application the interface is not specified in the SSCD PP ([SSCDPP]) and it is out of scope of the Technical Guideline TR-03110 (cf. [EACTR, B.7]). 8 For the ePassport application, the': 1}, '__delete__': ['. For the eSign Application the interface is not specified in the SSCD PP ([SSCDPP]) and it is out of scope of the Technical Guideline TR-03110 (cf', 'ACTR]. For the eSign Application the interface is not specified in the SSCD PP ([SSCDPP]) and it is out of scope of the Technical Guideline TR-03110 (cf. [EACTR, B.7]). 8 For the ePassport application, the']}}}} data.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Electronic Identity Card (ID_Card PP), Version 1.03', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0061b_pdf.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Electronic Identity Card (ID_Card PP), Version 1.03', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0061b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_ID_CARD_V1.03']}}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.

Raw data

{
  "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "994ac7d986a99e50",
  "heuristics": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics",
    "cert_id": "BSI-DSZ-CC-0722-2011",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_dependency_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.0"
      ]
    },
    "indirect_dependency_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0677-2010",
          "BSI-DSZ-CC-0640-2010"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0677-2010",
          "BSI-DSZ-CC-0640-2010"
        ]
      }
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0640-2010"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0640-2010"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "T-Systems International GMBH",
  "manufacturer_web": "https://www.t-systems.de/",
  "name": "TCOS Identity Card Version 1.0 Release 1 / SLE78CLX1440P-FSV02",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2011-07-29",
  "pdf_data": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData",
    "report_filename": "0722a_pdf.pdf",
    "report_frontpage": {
      "anssi": {},
      "bsi": {
        "cert_id": "BSI-DSZ-CC-0722-2011",
        "cert_item": "TCOS Identity Card Version 1.0 Release 1/ SLE78CLX1440P-FSV02",
        "cert_lab": "BSI",
        "developer": "T-Systems International GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ]
      },
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          },
          "ECDH": {
            "ECDH": 2
          },
          "ECDSA": {
            "ECDSA": 4
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0640-2010": 8,
          "BSI-DSZ-CC-0677-2010": 4,
          "BSI-DSZ-CC-0722-2011": 40
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0061-2009": 1,
          "BSI-CC-PP-0061-2009": 3
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_FSP": 1,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 1,
          "ADV_FSP.3": 1,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 1,
          "ADV_FSP.6": 1,
          "ADV_IMP": 1,
          "ADV_IMP.1": 1,
          "ADV_IMP.2": 1,
          "ADV_INT": 1,
          "ADV_INT.1": 1,
          "ADV_INT.2": 1,
          "ADV_INT.3": 1,
          "ADV_SPM": 1,
          "ADV_SPM.1": 1,
          "ADV_TDS": 1,
          "ADV_TDS.1": 1,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 1,
          "ADV_TDS.4": 1,
          "ADV_TDS.5": 1,
          "ADV_TDS.6": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.1": 1,
          "ALC_CMC.2": 1,
          "ALC_CMC.3": 1,
          "ALC_CMC.4": 2,
          "ALC_CMC.5": 1,
          "ALC_CMS": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.2": 1,
          "ALC_CMS.3": 1,
          "ALC_CMS.4": 2,
          "ALC_CMS.5": 1,
          "ALC_DEL": 1,
          "ALC_DEL.1": 2,
          "ALC_DVS": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 6,
          "ALC_FLR": 1,
          "ALC_FLR.1": 1,
          "ALC_FLR.2": 1,
          "ALC_FLR.3": 1,
          "ALC_LCD.1": 2,
          "ALC_LCD.2": 1,
          "ALC_TAT": 1,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 1,
          "ALC_TAT.3": 1
        },
        "APE": {
          "APE_CCL.1": 1,
          "APE_ECD.1": 1,
          "APE_INT.1": 1,
          "APE_OBJ.1": 1,
          "APE_OBJ.2": 1,
          "APE_REQ.1": 1,
          "APE_REQ.2": 1,
          "APE_SPD.1": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 1,
          "ASE_ECD": 1,
          "ASE_ECD.1": 1,
          "ASE_INT": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ": 1,
          "ASE_OBJ.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.1": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS": 1,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 1,
          "ATE_COV.2": 1,
          "ATE_COV.3": 1,
          "ATE_DPT": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.2": 6,
          "ATE_DPT.3": 1,
          "ATE_DPT.4": 1,
          "ATE_FUN": 1,
          "ATE_FUN.1": 1,
          "ATE_FUN.2": 1,
          "ATE_IND": 1,
          "ATE_IND.1": 1,
          "ATE_IND.2": 1,
          "ATE_IND.3": 1
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.1": 1,
          "AVA_VAN.2": 1,
          "AVA_VAN.3": 1,
          "AVA_VAN.4": 1,
          "AVA_VAN.5": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 6,
          "EAL 4 augmented": 3,
          "EAL 5": 3,
          "EAL1": 7,
          "EAL2": 3,
          "EAL3": 4,
          "EAL4": 7,
          "EAL5": 7,
          "EAL5+": 1,
          "EAL6": 4,
          "EAL7": 4
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM": 4,
          "FCS_COP": 6
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          "1/P5CD128/145 und TCOS Identity Card Version 1.0 Release 1/SLE78CLX1440P, 08.06.2011, Version 1.3 (confidential document) [12] TCOS Identity Card 1.0, Release 1, Administrator\u0027s Guidance, Guidance Documentation of TCOS": 1,
          "A11, Version 4, 26.07.2010, T\u00dcV Informationstechnik GmbH \u2013 Evaluation Body for IT Security (confidential document) 9 specifically \u2022 AIS 20, Version 1, 02 December 1999, Funktionalit\u00e4tsklassen und": 1,
          "Identity Card Version 1.0 Release 1/ SLE78CLX1440P-FSV02, SRC Security Research \u0026 Consulting GmbH (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product Infineon SLE78CLXxxxP/M/PS": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 4
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "SRC": {
          "SRC Security Research \u0026 Consulting": 3
        },
        "TSystems": {
          "T-Systems International": 9
        },
        "TUV": {
          "T\u00dcV Informationstechnik": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          },
          "SHA2": {
            "SHA-2": 1,
            "SHA-224": 1,
            "SHA-256": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "fault injection": 1
        },
        "SCA": {
          "side channel": 1
        },
        "other": {
          "JIL": 3
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 1,
          "AIS 25": 3,
          "AIS 26": 3,
          "AIS 31": 1,
          "AIS 32": 1,
          "AIS 34": 2,
          "AIS 36": 4,
          "AIS 38": 1
        },
        "FIPS": {
          "FIPS 180-2": 3,
          "FIPS 197": 1
        },
        "ICAO": {
          "ICAO": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 3
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 1
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 22": 1,
          "BSI 7125": 2,
          "BSI 7148": 1,
          "BSI 7149": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 7,
          "Infineon Technologies": 1,
          "Infineon Technologies AG": 1
        },
        "NXP": {
          "NXP": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20110928150719+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, nPA, elektronischer Personalausweis, neuer Personalausweis, eID, electronic Identity Card, ID_Card, ID Card\"",
      "/ModDate": "D:20110928150907+02\u002700\u0027",
      "/Producer": "OpenOffice.org 3.2",
      "/Subject": "TCOS Identity Card Version 1.0 Release 1/ SLE78CLX1440P-FSV02",
      "/Title": "Certification Report BSI-DSZ-CC-0722-2011",
      "pdf_file_size_bytes": 949648,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 36
    },
    "st_filename": "0722b_pdf.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 8
          },
          "ECDSA": {
            "ECDSA": 6
          }
        },
        "FF": {
          "DH": {
            "DH": 3,
            "Diffie-Hellman": 10
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0640-2010": 2
        }
      },
      "cc_claims": {
        "A": {
          "A.CGA": 2,
          "A.SCA": 2
        },
        "O": {
          "O.MEM_ACCESS": 1,
          "O.RND": 3
        },
        "OE": {
          "OE.CGA_SSCD": 2,
          "OE.CGA_SVD": 1,
          "OE.HID_VAD": 3,
          "OE.SCA_DTBS": 1,
          "OE.SVD_": 1
        },
        "T": {
          "T.MEM_ACCESS": 1,
          "T.RND": 2
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0035-2007": 1,
          "BSI-CC-PP-0055-2009": 1,
          "BSI-CC-PP-0056-2009": 1,
          "BSI-CC-PP-0059-2009": 1,
          "BSI-CC-PP-0061-": 1,
          "BSI-PP-0026-2006": 1,
          "BSI-PP-0059": 1,
          "BSI-PP-0061": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 2,
          "ADV_FSP": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 3,
          "ADV_TDS": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 2,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 8,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.2": 7,
          "ATE_FUN.1": 1
        },
        "AVA": {
          "AVA_VAN.5": 8
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL 4 augmented": 1,
          "EAL 5": 2,
          "EAL 5 augmented": 1,
          "EAL4": 12,
          "EAL4 augmented": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS": 6,
          "FAU_SAS.1": 14,
          "FAU_SAS.1.1": 2
        },
        "FCS": {
          "FCS_CKM": 79,
          "FCS_CKM.1": 17,
          "FCS_CKM.2": 8,
          "FCS_CKM.4": 39,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 72,
          "FCS_COP.1": 13,
          "FCS_RND": 5,
          "FCS_RND.1": 12,
          "FCS_RND.1.1": 2,
          "FCS_RNG.1": 2
        },
        "FDP": {
          "FDP_ACC": 44,
          "FDP_ACC.1": 18,
          "FDP_ACF": 37,
          "FDP_ACF.1": 31,
          "FDP_IFC.1": 8,
          "FDP_ITC": 6,
          "FDP_ITC.1": 8,
          "FDP_ITC.2": 15,
          "FDP_ITT.1": 1,
          "FDP_RIP": 4,
          "FDP_RIP.1": 17,
          "FDP_RIP.1.1": 1,
          "FDP_SDI": 14,
          "FDP_SDI.1": 3,
          "FDP_SDI.2": 5
        },
        "FIA": {
          "FIA_AFL": 41,
          "FIA_AFL.1": 2,
          "FIA_AFL.1.1": 3,
          "FIA_AFL.1.2": 3,
          "FIA_API": 23,
          "FIA_API.1": 4,
          "FIA_API.1.1": 2,
          "FIA_UAU": 57,
          "FIA_UAU.1": 14,
          "FIA_UAU.4": 9,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.5": 16,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6": 10,
          "FIA_UAU.6.1": 1,
          "FIA_UIA": 2,
          "FIA_UID": 37,
          "FIA_UID.1": 12,
          "FIA_UID.1.1": 2,
          "FIA_UID.1.2": 2
        },
        "FMT": {
          "FMT_LIM": 5,
          "FMT_LIM.1": 24,
          "FMT_LIM.1.1": 2,
          "FMT_LIM.2": 22,
          "FMT_LIM.2.1": 2,
          "FMT_MDT.3": 1,
          "FMT_MOF": 5,
          "FMT_MOF.1": 1,
          "FMT_MSA": 43,
          "FMT_MSA.1": 10,
          "FMT_MSA.2": 3,
          "FMT_MSA.3": 12,
          "FMT_MSA.4": 1,
          "FMT_MTD": 130,
          "FMT_MTD.1": 12,
          "FMT_MTD.3": 14,
          "FMT_MTD.3.1": 1,
          "FMT_SMF": 16,
          "FMT_SMF.1": 67,
          "FMT_SMF.1.1": 2,
          "FMT_SMR": 21,
          "FMT_SMR.1": 30,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FLS": 2,
          "FPT_FLS.1": 14,
          "FPT_FLS.1.1": 1,
          "FPT_ITT.1": 1,
          "FPT_PHP": 7,
          "FPT_PHP.1": 2,
          "FPT_PHP.3": 14,
          "FPT_PHP.3.1": 1,
          "FPT_TST": 2,
          "FPT_TST.1": 12,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 2,
          "FPT_TST.2": 1
        },
        "FRU": {
          "FRU_FLT.2": 1
        },
        "FTP": {
          "FTP_ITC": 28,
          "FTP_ITC.1": 2,
          "FTP_ITC.1.1": 2,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          " For the eSign Application the interface is not specified in the SSCD PP ([SSCDPP]) and it is out of scope of the Technical Guideline TR-03110 (cf": 1,
          " For the eSign Application the interface is not specified in the SSCD PP ([SSCDPP]) and it is out of scope of the Technical Guideline TR-03110 (cf. [EACTR, B.7]). 8 For the ePassport application, the": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 98
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        },
        "MAC": {
          "MAC": 4
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "NIST P-256": 1,
          "P-256": 1
        }
      },
      "eval_facility": {
        "TSystems": {
          "T-Systems International": 130
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 4
          },
          "SHA2": {
            "SHA-2": 2,
            "SHA-224": 2,
            "SHA-256": 3,
            "SHA512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 1
        },
        "RNG": {
          "RND": 5
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 10,
          "Physical Tampering": 2,
          "Physical tampering": 1,
          "fault injection": 1,
          "malfunction": 6,
          "physical tampering": 5
        },
        "SCA": {
          "DPA": 1,
          "Leak-Inherent": 6,
          "Physical Probing": 2,
          "physical probing": 3
        },
        "other": {
          "reverse engineering": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 31": 1,
          "AIS 36": 1,
          "AIS31": 3,
          "AIS36": 4
        },
        "CC": {
          "CCMB-2009-07-001": 2,
          "CCMB-2009-07-002": 2,
          "CCMB-2009-07-003": 2,
          "CCMB-2009-07-004": 2
        },
        "FIPS": {
          "FIPS 180-2": 1,
          "FIPS 197": 1,
          "FIPS PUB 180-2": 1,
          "FIPS180": 1,
          "FIPS197": 2
        },
        "ICAO": {
          "ICAO": 5
        },
        "ISO": {
          "ISO/IEC 7816-2": 1,
          "ISO/IEC 7816-4": 1
        },
        "PKCS": {
          "PKCS#3": 4
        },
        "RFC": {
          "RFC 2631": 1,
          "RFC 3369": 1,
          "RFC3369": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 19
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1,
            "Triple-DES": 3
          },
          "DES": {
            "DES": 2
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 1,
            "CMAC": 6,
            "KMAC": 7
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon Technologies": 1,
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "T-Systems International GmbH",
      "/CreationDate": "D:20110114010001",
      "/Creator": "T-Systems AFPL Ghostscript",
      "/Keywords": "TCOS Identity Card, ePassport, eID, eSign",
      "/ModDate": "D:20110114095202+01\u002700\u0027",
      "/Producer": "GPL Ghostscript 8.64",
      "/Subject": "TCOS Identity Card Version 1.0 Release 1 *Final Document*",
      "/Title": "Security Target TCOS Identity Card Version 1.0 Release 1 SLE78M7820-FSV02",
      "pdf_file_size_bytes": 850674,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 129
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "PP_ID_CARD_V1.03"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0061b_pdf.pdf",
        "pp_name": "Electronic Identity Card (ID_Card PP), Version 1.03"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/0722a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_DVS.2",
      "ATE_DPT.2",
      "AVA_VAN.5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/0722b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState",
    "errors": [],
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "f253827007a2e9a9f1d37c788ed20fea238e0d096e236ed9e21ab208f6c2800a",
    "report_txt_hash": "73c8ed8f435fdc9a168343f40d2611b30434d394f957300cd8837f8bd3c77f0f",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "4b57dc8502444cfb53a913b0574b592b232003511024ccb2b3857d04eb09e9e7",
    "st_txt_hash": "69dc6f6fddaccd7e4fa166bffc5f95fd12e2b897c0c32f7ad098b4cc89f6852c"
  },
  "status": "archived"
}