Sensor for digital tachograph LESIKAR TACH2

CSV information ?

Status active
Valid from 01.07.2016
Scheme 🇸🇪 SE
Manufacturer Lesikar a.s.
Category Other Devices and Systems
Security level ATE_DPT.2, EAL4, AVA_VAN.5

Heuristics summary ?

Certificate ID: CSEC2015001

Certification report ?

Extracted keywords

Security level
EAL4, EAL 4, EAL4+, EAL 2
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_DPT.2, ATE_COV.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.4, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1
Certificates
CSEC2015001
Evaluation facilities
Combitech AB

Side-channel analysis
side channel, side-channel, SPA, DPA, physical tampering, Physical tampering

Standards
ISO/IEC 17025, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003

File metadata

Title: Certification Report Lesikar TACH 2
Subject: 15FMV443-
Author: Imre Juhász
Creation date: D:20160701125201+02'00'
Modification date: D:20160825084427+02'00'
Pages: 20
Creator: Microsoft® Word 2010
Producer: Microsoft® Word 2010

References

Security target ?

Extracted keywords

Symmetric Algorithms
DES, TDES, TDEA

Security level
EAL4+, EAL4, EAL4 augmented, ITSEC E3
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_DPT.2, ATE_COV.2, ATE_FUN.1, ATE_IND.2, ATE_DPT.1, AVA_VAN.4, AVA_VAN.5, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FCS_CKM, FCS_COP, FCS_CKM.2, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_CKM.1, FDP_ACC.2, FDP_ACF.1, FDP_ITC.1, FDP_IFC, FDP_IFF, FDP_ETC.1, FDP_ACC, FDP_ACF, FDP_ETC, FDP_ITC, FDP_SDI, FDP_UIT, FDP_SDI.1, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_ETC.1.1, FDP_ETC.1.2, FDP_SDI.1.1, FDP_ITC.2, FDP_ACC.1, FDP_IFC.1, FDP_IFF.1, FDP_AFL.1, FIA_AFL, FIA_UAU, FIA_UID, FIA_AFL.1, FIA_UAU.3, FIA_UAU.2, FIA_UID.2, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.2.1, FIA_UAU.3.1, FIA_UAU.3.2, FIA_UID.2.1, FIA_UID.1, FMT_MSA.3, FPT_FLS, FPT_PHP.1, FPT_PHP.3, FPT_TST, FPT_TST.1, FPT_STM.1, FPT_FLS.1, FPT_FLS.1.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1
Certification process
out of scope, data generation and transport are performed before the operational state of the TOE and therefore out of scope (handled by assurance requirements, e.g. ALC, ADV). The confidentiality and integrity of the

Side-channel analysis
physical tampering, Malfunction, JIL
Certification process
out of scope, data generation and transport are performed before the operational state of the TOE and therefore out of scope (handled by assurance requirements, e.g. ALC, ADV). The confidentiality and integrity of the

Standards
FIPS PUB 46-3, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004

File metadata

Title: Security Target for Lesikar
Author: Daniel Poignant
Creation date: D:20160701085642+02'00'
Modification date: D:20160825083704+02'00'
Pages: 70
Creator: Microsoft® Word 2013
Producer: Microsoft® Word 2013

References

Heuristics ?

Certificate ID: CSEC2015001

Extracted SARs

ASE_OBJ.2, ADV_FSP.4, ATE_DPT.2, ASE_TSS.1, ALC_TAT.1, ADV_IMP.1, ADV_ARC.1, ALC_DEL.1, ADV_TDS.3, ALC_DVS.1, AVA_VAN.5, ASE_REQ.2, ATE_FUN.1, ALC_CMS.4, ATE_COV.2, ASE_CCL.1, ASE_ECD.1, AGD_OPE.1, ALC_CMC.4, AGD_PRE.1, ASE_SPD.1, ATE_IND.2, ASE_INT.1, ALC_LCD.1

References ?

Updates ?

  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Sensor for digital tachograph LESIKAR TACH2 was processed.

  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The report_keywords property was updated, with the {'rules_cert_id': {'CSEC2015001': 1}} data.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['-']}.
    • The cert_id property was set to CSEC2015001.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}]}}.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': 'd125ea5720ffe442f956415d5ca9976c682191706c6ecf430d0476a27350c437', 'st_pdf_hash': '8b5c85b4b46ab9d8edf83bfe635a8279ff8dcc780df4097d620104293ce35761', 'report_txt_hash': '1ff9820fb71239eb2f18169538f9337dabd4b96df09316329c779a1adb1ca1e2', 'st_txt_hash': 'b0b1380fffee4f10d6d19cb5f00bca5d19c296c8d1e2a37aba9b10b9e9046bcd'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {'SE': 1}, 'rules_side_channels': {'Malfunction': 1, 'physical tampering': 1, 'Physical tampering': 1, 'side channel': 1, 'side-channel': 1, 'SPA': 2, 'DPA': 2}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'TDES': 5, 'DES': 4, 'TDEA': 2}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {'Malfunction': 2, 'physical tampering': 19}} values inserted.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://dtc.jrc.ec.europa.eu/']}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'SE': {'CSEC2015001': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 1, 'EAL 4': 1, 'EAL4+': 1, 'EAL 2': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_DPT.2': 5, 'ATE_COV.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.4': 2}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Combitech': {'Combitech AB': 4}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'KA': {'KA': 7}}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 1, 'side-channel': 1, 'SPA': 2, 'DPA': 2}, 'FI': {'physical tampering': 1, 'Physical tampering': 1, 'Malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 17025': 2}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4+': 2, 'EAL4': 3, 'EAL4 augmented': 3}, 'ITSEC': {'ITSEC E3': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 3, 'ADV_FSP.4': 2, 'ADV_IMP.1': 2, 'ADV_TDS.3': 3}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_DPT.2': 7, 'ATE_COV.2': 1, 'ATE_FUN.1': 2, 'ATE_IND.2': 1, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.4': 5, 'AVA_VAN.5': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 11, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1}, 'FCS': {'FCS_CKM.2': 1, 'FCS_CKM.4': 19, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 1, 'FCS_CKM': 1, 'FCS_CKM.1': 5}, 'FDP': {'FDP_ACC.2': 12, 'FDP_ACF.1': 10, 'FDP_ITC.1': 26, 'FDP_ETC.1': 15, 'FDP_IFC': 1, 'FDP_SDI.1': 13, 'FDP_ACC.2.1': 1, 'FDP_ACC.2.2': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 1, 'FDP_SDI.1.1': 1, 'FDP_ITC.2': 5, 'FDP_ACC.1': 5, 'FDP_IFC.1': 6, 'FDP_IFF.1': 2, 'FDP_AFL.1': 2}, 'FIA': {'FIA_AFL.1': 12, 'FIA_UAU.2': 19, 'FIA_UAU.3': 12, 'FIA_UID.2': 19, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.3.1': 1, 'FIA_UAU.3.2': 1, 'FIA_UID.2.1': 1, 'FIA_UAU.1': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_MSA.3': 4}, 'FPT': {'FPT_PHP.1': 11, 'FPT_PHP.3': 9, 'FPT_TST.1': 17, 'FPT_FLS.1': 11, 'FPT_FLS.1.1': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_STM.1': 1}, 'FTP': {'FTP_ITC.1': 11, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 2}}, 'cc_claims': {}, 'vendor': {'STMicroelectronics': {'STM': 3}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 9, 'DEA': 2}, '3DES': {'TDES': 5, 'TDEA': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'KA': {'KA': 8}}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {'ECB': {'ECB': 5}, 'CBC': {'CBC': 5}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 19, 'Malfunction': 2}, 'other': {'JIL': 6}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 2}, 'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'y data generation and transport are performed before the operational state of the TOE and therefore out of scope (handled by assurance requirements, e.g. ALC, ADV). The confidentiality and integrity of the': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'Certification Report Lesikar TACH 2.pdf(312939)_TMP.pdf', 'st_filename': 'ST Lesikar TACH2_v2.5 final.pdf(312817)_TMP.pdf'}.
    • The report_keywords property was updated, with the {'cc_sar': {'__update__': {'AVA': {'__update__': {'AVA_VAN.4': 5}}}}, 'crypto_scheme': {}, 'side_channel_analysis': {'__update__': {'FI': {'__update__': {'physical tampering': 2}, '__delete__': ['Malfunction']}}}, 'tee_name': {}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL4': 6}}}}, 'cc_sar': {'__update__': {'AVA': {'__update__': {'AVA_VAN.4': 8}}}}, 'cc_sfr': {'__update__': {'FAU': {'__insert__': {'FAU_GEN': 1}}, 'FCS': {'__insert__': {'FCS_COP': 23}, '__update__': {'FCS_CKM': 32}}, 'FDP': {'__insert__': {'FDP_IFF': 44, 'FDP_ACC': 1, 'FDP_ACF': 1, 'FDP_ETC': 1, 'FDP_ITC': 1, 'FDP_SDI': 1, 'FDP_UIT': 20}, '__update__': {'FDP_ACC.2': 13, 'FDP_ACF.1': 8, 'FDP_ETC.1': 10, 'FDP_IFC': 41}}, 'FIA': {'__insert__': {'FIA_AFL': 1, 'FIA_UAU': 2, 'FIA_UID': 1}, '__update__': {'FIA_UAU.2': 13, 'FIA_UAU.3': 15, 'FIA_UID.2': 16}, '__delete__': ['FIA_UAU.1']}, 'FMT': {'__update__': {'FMT_MSA.3': 8}}, 'FPT': {'__insert__': {'FPT_FLS': 1, 'FPT_TST': 1}, '__update__': {'FPT_PHP.1': 10, 'FPT_PHP.3': 7, 'FPT_TST.1': 15, 'FPT_FLS.1': 9, 'FPT_STM.1': 3}}, 'FTP': {'__insert__': {'FTP_ITC': 1}}}}, 'vendor': {}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 4}, '__delete__': ['DEA']}}}}}, 'crypto_scheme': {}, 'cipher_mode': {}, 'side_channel_analysis': {'__update__': {'FI': {'__update__': {'Malfunction': 1}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'data generation and transport are performed before the operational state of the TOE and therefore out of scope (handled by assurance requirements, e.g. ALC, ADV). The confidentiality and integrity of the': 1}, '__delete__': ['y data generation and transport are performed before the operational state of the TOE and therefore out of scope (handled by assurance requirements, e.g. ALC, ADV). The confidentiality and integrity of the']}}}} data.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 11.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/ST%20Lesikar%20TACH2_v2.5%20final.pdf(312817)_TMP.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}]} values discarded.
  • 12.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 8b5c85b4b46ab9d8edf83bfe635a8279ff8dcc780df4097d620104293ce35761.
    • The st_txt_hash property was set to b0b1380fffee4f10d6d19cb5f00bca5d19c296c8d1e2a37aba9b10b9e9046bcd.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1876150, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 70, '/Author': 'Daniel Poignant', '/CreationDate': "D:20160701085642+02'00'", '/Creator': 'Microsoft® Word 2013', '/ModDate': "D:20160825083704+02'00'", '/Producer': 'Microsoft® Word 2013', '/Title': 'Security Target for Lesikar', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://dtc.jrc.ec.europa.eu/']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4+': 2, 'EAL4': 6, 'EAL4 augmented': 3}, 'ITSEC': {'ITSEC E3': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 3, 'ADV_FSP.4': 2, 'ADV_IMP.1': 2, 'ADV_TDS.3': 3}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_DPT.2': 7, 'ATE_COV.2': 1, 'ATE_FUN.1': 2, 'ATE_IND.2': 1, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.4': 8, 'AVA_VAN.5': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1, 'FAU_GEN.1': 11, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1}, 'FCS': {'FCS_CKM': 32, 'FCS_COP': 23, 'FCS_CKM.2': 1, 'FCS_CKM.4': 19, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 1, 'FCS_CKM.1': 5}, 'FDP': {'FDP_ACC.2': 13, 'FDP_ACF.1': 8, 'FDP_ITC.1': 26, 'FDP_IFC': 41, 'FDP_IFF': 44, 'FDP_ETC.1': 10, 'FDP_ACC': 1, 'FDP_ACF': 1, 'FDP_ETC': 1, 'FDP_ITC': 1, 'FDP_SDI': 1, 'FDP_UIT': 20, 'FDP_SDI.1': 13, 'FDP_ACC.2.1': 1, 'FDP_ACC.2.2': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 1, 'FDP_SDI.1.1': 1, 'FDP_ITC.2': 5, 'FDP_ACC.1': 5, 'FDP_IFC.1': 6, 'FDP_IFF.1': 2, 'FDP_AFL.1': 2}, 'FIA': {'FIA_AFL': 1, 'FIA_UAU': 2, 'FIA_UID': 1, 'FIA_AFL.1': 12, 'FIA_UAU.3': 15, 'FIA_UAU.2': 13, 'FIA_UID.2': 16, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.3.1': 1, 'FIA_UAU.3.2': 1, 'FIA_UID.2.1': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_MSA.3': 8}, 'FPT': {'FPT_FLS': 1, 'FPT_PHP.1': 10, 'FPT_PHP.3': 7, 'FPT_TST': 1, 'FPT_TST.1': 15, 'FPT_STM.1': 3, 'FPT_FLS.1': 9, 'FPT_FLS.1.1': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC': 1, 'FTP_ITC.1': 11, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 2}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 4}, '3DES': {'TDES': 5, 'TDEA': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 19, 'Malfunction': 1}, 'other': {'JIL': 6}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 2}, 'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'data generation and transport are performed before the operational state of the TOE and therefore out of scope (handled by assurance requirements, e.g. ALC, ADV). The confidentiality and integrity of the': 1}}}.
    • The st_filename property was set to ST Lesikar TACH2_v2.5 final.pdf(312817)_TMP.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}]} values added.

Raw data

{
  "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert",
  "category": "Other Devices and Systems",
  "cert_link": null,
  "dgst": "af95b4756f91c411",
  "heuristics": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics",
    "cert_id": "CSEC2015001",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_dependency_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_dependency_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Lesikar a.s.",
  "manufacturer_web": "https://www.lesikar.eu/",
  "name": "Sensor for digital tachograph LESIKAR TACH2",
  "not_valid_after": null,
  "not_valid_before": "2016-07-01",
  "pdf_data": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData",
    "report_filename": "Certification Report Lesikar TACH 2.pdf(312939)_TMP.pdf",
    "report_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "SE": {
          "CSEC2015001": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.2": 5,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.4": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 4": 1,
          "EAL4": 1,
          "EAL4+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Combitech": {
          "Combitech AB": 4
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "Physical tampering": 1,
          "physical tampering": 2
        },
        "SCA": {
          "DPA": 2,
          "SPA": 2,
          "side channel": 1,
          "side-channel": 1
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2012-09-001": 1,
          "CCMB-2012-09-002": 1,
          "CCMB-2012-09-003": 1
        },
        "ISO": {
          "ISO/IEC 17025": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Imre Juh\u00e1sz",
      "/CreationDate": "D:20160701125201+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/ModDate": "D:20160825084427+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "/Subject": "15FMV443-",
      "/Title": "Certification Report Lesikar TACH 2",
      "pdf_file_size_bytes": 287750,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 20
    },
    "st_filename": "ST Lesikar TACH2_v2.5 final.pdf(312817)_TMP.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 3,
          "ADV_FSP.4": 2,
          "ADV_IMP.1": 2,
          "ADV_TDS.3": 3
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.2": 7,
          "ATE_FUN.1": 2,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.4": 8,
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 6,
          "EAL4 augmented": 3,
          "EAL4+": 2
        },
        "ITSEC": {
          "ITSEC E3": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_GEN.1": 11,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1
        },
        "FCS": {
          "FCS_CKM": 32,
          "FCS_CKM.1": 5,
          "FCS_CKM.2": 1,
          "FCS_CKM.4": 19,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 23,
          "FCS_COP.1": 1
        },
        "FDP": {
          "FDP_ACC": 1,
          "FDP_ACC.1": 5,
          "FDP_ACC.2": 13,
          "FDP_ACC.2.1": 1,
          "FDP_ACC.2.2": 1,
          "FDP_ACF": 1,
          "FDP_ACF.1": 8,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_AFL.1": 2,
          "FDP_ETC": 1,
          "FDP_ETC.1": 10,
          "FDP_ETC.1.1": 1,
          "FDP_ETC.1.2": 1,
          "FDP_IFC": 41,
          "FDP_IFC.1": 6,
          "FDP_IFF": 44,
          "FDP_IFF.1": 2,
          "FDP_ITC": 1,
          "FDP_ITC.1": 26,
          "FDP_ITC.1.1": 1,
          "FDP_ITC.1.2": 1,
          "FDP_ITC.1.3": 1,
          "FDP_ITC.2": 5,
          "FDP_SDI": 1,
          "FDP_SDI.1": 13,
          "FDP_SDI.1.1": 1,
          "FDP_UIT": 20
        },
        "FIA": {
          "FIA_AFL": 1,
          "FIA_AFL.1": 12,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_UAU": 2,
          "FIA_UAU.2": 13,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.3": 15,
          "FIA_UAU.3.1": 1,
          "FIA_UAU.3.2": 1,
          "FIA_UID": 1,
          "FIA_UID.1": 1,
          "FIA_UID.2": 16,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MSA.3": 8
        },
        "FPT": {
          "FPT_FLS": 1,
          "FPT_FLS.1": 9,
          "FPT_FLS.1.1": 1,
          "FPT_PHP.1": 10,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 7,
          "FPT_PHP.3.1": 1,
          "FPT_STM.1": 3,
          "FPT_TST": 1,
          "FPT_TST.1": 15,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 1,
          "FTP_ITC.1": 11,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 2
        }
      },
      "certification_process": {
        "OutOfScope": {
          "data generation and transport are performed before the operational state of the TOE and therefore out of scope (handled by assurance requirements, e.g. ALC, ADV). The confidentiality and integrity of the": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 1,
          "physical tampering": 19
        },
        "other": {
          "JIL": 6
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2012-09-001": 2,
          "CCMB-2012-09-002": 2,
          "CCMB-2012-09-003": 2,
          "CCMB-2012-09-004": 2
        },
        "FIPS": {
          "FIPS PUB 46-3": 2
        }
      },
      "symmetric_crypto": {
        "DES": {
          "3DES": {
            "TDEA": 2,
            "TDES": 5
          },
          "DES": {
            "DES": 4
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Daniel Poignant",
      "/CreationDate": "D:20160701085642+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2013",
      "/ModDate": "D:20160825083704+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2013",
      "/Title": "Security Target for Lesikar",
      "pdf_file_size_bytes": 1876150,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://dtc.jrc.ec.europa.eu/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 70
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/Certification%20Report%20Lesikar%20TACH%202.pdf(312939)_TMP.pdf",
  "scheme": "SE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4",
      "AVA_VAN.5",
      "ATE_DPT.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/ST%20Lesikar%20TACH2_v2.5%20final.pdf(312817)_TMP.pdf",
  "state": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState",
    "errors": [],
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "d125ea5720ffe442f956415d5ca9976c682191706c6ecf430d0476a27350c437",
    "report_txt_hash": "1ff9820fb71239eb2f18169538f9337dabd4b96df09316329c779a1adb1ca1e2",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "8b5c85b4b46ab9d8edf83bfe635a8279ff8dcc780df4097d620104293ce35761",
    "st_txt_hash": "b0b1380fffee4f10d6d19cb5f00bca5d19c296c8d1e2a37aba9b10b9e9046bcd"
  },
  "status": "active"
}