Cortex M33 r0p4

CSV information ?

Status active
Valid from 13.02.2020
Valid until 13.02.2025
Scheme 🇳🇱 NL
Manufacturer Arm Limited
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_FLR.1, ASE_TSS.2, EAL6+

Heuristics summary ?

Certificate ID: NSCIB-CC-202003-CR

Certificate ?

Extracted keywords

Security level
EAL6, EAL7, EAL6 augmented
Security Assurance Requirements (SAR)
ALC_FLR.1, ASE_TSS.2
Certificates
CC-20-202003
Evaluation facilities
Brightsight

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Creation date: D:20200213160251+01'00'
Modification date: D:20200213160645+01'00'
Pages: 1
Creator: NL-ARN-SAL-C
Producer: KONICA MINOLTA bizhub C300i

Certification report ?

Extracted keywords

Randomness
RNG

Security level
EAL4, EAL6+, EAL6, EAL4+, EAL 6, EAL6 augmented, EAL 6 augmented
Security Assurance Requirements (SAR)
ADV_IMP, ALC_FLR.1, AVA_VAN.5, ASE_TSS.2, ASE_TSS.1
Protection profiles
BSI-PP-0084-2014
Certificates
NSCIB-CC-202003-CR
Evaluation facilities
Brightsight

Side-channel analysis
JIL-COMP, JIL-AAPS, JIL

File metadata

Title: Certification Report NSCIB-CC-202003-CR v1.1.docx
Author: p647
Creation date: D:20200617122500+02'00'
Pages: 13
Creator: pdfFactory Pro www.pdffactory.com
Producer: pdfFactory Pro 5.32 (Windows 7 Ultimate x64 Dutch)

Frontpage

Certificate ID: NSCIB-CC-202003-CR
Certified item: Cortex M33 r0p4
Certification lab: Brightsight
Developer: Arm Limited

References

No references.

Security target ?

Extracted keywords

Schemes
MAC
Randomness
RND

Trusted Execution Environments
SE

Security level
EAL6, EAL4, EAL6 augmented, EAL4 augmented
Claims
T.RND
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_SPM.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ADV_ARC, ADV_FSP, ADV_IMP, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_FLR.1, ALC_DVS.2, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ALC_DEL, ALC_DVS, ALC_CMS, ALC_CMC, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, ATE_COV, AVA_VAN.5, AVA_VAN, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1
Security Functional Requirements (SFR)
FDP_ACC.2, FDP_ACC, FDP_ACF.1, FDP_ACF, FDP_ACC.1, FDP_IFC.1, FMT_MSA.3, FMT_MSA, FMT_MSA.1, FMT_SMF.1, FMT_SMF, FMT_SMR.1, FPT_FLS.1
Protection profiles
BSI-CC-PP-0084-2014
Certification process
out of scope, Page 42 of 53 SAR Refinement Description ALC_CMS 199 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to consumer software that can be part of manufacturing and delivery, 205 in [PP84] This refinement in [PP84] is out of scope for the TOE because it refers to the CMS refinement. 206 in [PP84] This refinement in [PP84] is out, transitions of power save modes if provided by the TOE. 210 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to test features used in wafer testing. ADV_FSP 215 in [PP84] This, to test software delivered but not available in the operational phase. This refinement is regarded out of scope for the TOE. 216 in [PP84] This refinement refers to features that do not provide functionality but, contribute to SFRs. This refinement is regarded out of scope for the TOE. 217 in [PP84] The Functional Specification is expected to refer to mechanisms. 218 in, This refinement refers to operating conditions. This refinement is regarded out of scope for the TOE. ADV_IMP 223 in [PP84] It must be checked that the provided implementation, must be tested under different operating conditions within the specified ranges. This refinement is out of scope for the TOE. 227 in [PP84] This refinement relates to physical testing. This refinement is out of, This refinement relates to requirements concerting embedded software. This requirement is regarded out of scope for the TOE. 235 in [PP84] Guidance documents must not contain security relevant details which are, 240 in [PP84] This refinement refers to configuration in Phase 2 or Phase 7. This refinement is out of scope for the TOE. 241 in [PP84] This refinement refers to downloading of embedded software. This, is out of scope for the TOE. AVA_VAN 245 in [PP84] The vulnerability analysis shall include a justification for the

Side-channel analysis
Leak-Inherent, Physical Probing, Malfunction
Certification process
out of scope, Page 42 of 53 SAR Refinement Description ALC_CMS 199 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to consumer software that can be part of manufacturing and delivery, 205 in [PP84] This refinement in [PP84] is out of scope for the TOE because it refers to the CMS refinement. 206 in [PP84] This refinement in [PP84] is out, transitions of power save modes if provided by the TOE. 210 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to test features used in wafer testing. ADV_FSP 215 in [PP84] This, to test software delivered but not available in the operational phase. This refinement is regarded out of scope for the TOE. 216 in [PP84] This refinement refers to features that do not provide functionality but, contribute to SFRs. This refinement is regarded out of scope for the TOE. 217 in [PP84] The Functional Specification is expected to refer to mechanisms. 218 in, This refinement refers to operating conditions. This refinement is regarded out of scope for the TOE. ADV_IMP 223 in [PP84] It must be checked that the provided implementation, must be tested under different operating conditions within the specified ranges. This refinement is out of scope for the TOE. 227 in [PP84] This refinement relates to physical testing. This refinement is out of, This refinement relates to requirements concerting embedded software. This requirement is regarded out of scope for the TOE. 235 in [PP84] Guidance documents must not contain security relevant details which are, 240 in [PP84] This refinement refers to configuration in Phase 2 or Phase 7. This refinement is out of scope for the TOE. 241 in [PP84] This refinement refers to downloading of embedded software. This, is out of scope for the TOE. AVA_VAN 245 in [PP84] The vulnerability analysis shall include a justification for the

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Creation date: D:20200114111242+01'00'
Modification date: D:20200114111313+01'00'
Pages: 53
Creator: Acrobat PDFMaker 15 for Word
Producer: Adobe PDF Library 15.0

References

No references.

Heuristics ?

Certificate ID: NSCIB-CC-202003-CR

Extracted SARs

AGD_PRE.1, ADV_INT.3, ASE_TSS.2, ASE_REQ.2, ASE_OBJ.2, AGD_OPE.1, ADV_IMP.2, ADV_FSP.5, ASE_CCL.1, ALC_CMC.5, ASE_INT.1, ATE_COV.3, ADV_TDS.5, AVA_VAN.5, ALC_DEL.1, ASE_ECD.1, ALC_LCD.1, ALC_FLR.1, ALC_DVS.2, ATE_FUN.2, ALC_CMS.5, ADV_SPM.1, ASE_SPD.1, ATE_DPT.3, ATE_IND.2, ALC_TAT.3, ADV_ARC.1

References ?

No references are available for this certificate.

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b5695eca1de6d58db99d1735e56a5f7fdb334334d7faf591f8e2e1518b21c3df', 'txt_hash': '45ff3c52ee8e2653aac13074bb49a7a52463dc291e59dddfe6e4ecccf556a70f'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '63b9c6431ed90b1ea675a52b67bd0e40da30855e491cee888b90205af7a770d1', 'txt_hash': 'aa0b8d033ae52c725ddbae153e1dbaa0f3c13372d95717d4cb35108ef52d9996'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '15e24a0559b88716a72f8fb08d727a5500e1e45ca75cc79ea30ed54b98a01fdf', 'txt_hash': '0b51504d1e0d68a40998fd130db4c6a17e4a5c48a2b19fa48c5f618f355b2d4f'}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': {'pdf_file_size_bytes': 173675, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/CreationDate': "D:20200213160251+01'00'", '/Creator': 'NL-ARN-SAL-C', '/ModDate': "D:20200213160645+01'00'", '/Producer': 'KONICA MINOLTA bizhub C300i', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'NL': {'CC-20-202003': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL6': 1, 'EAL7': 1, 'EAL6 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 1}, 'ASE': {'ASE_TSS.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'BrightSight': {'Brightsight': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': 'CC-20-202003.pdf'}.
    • The report_frontpage property was set to {'NL': {'cert_id': 'NSCIB-CC-202003-CR', 'cert_item': 'Cortex M33 r0p4', 'developer': 'Arm Limited', 'cert_lab': ' Brightsight'}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'NL': {'__update__': {'NSCIB-CC-202003-CR': 13}}}}} data.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'NL': {'__update__': {'NSCIB-CC-202003-CR': 39}}}}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__delete__': ['CA']}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'CA': {'888 7 888': 1, '888 7 879': 1}}, '__update__': {'NL': {'__update__': {'NSCIB-CC-202003-CR': 13}}}}} data.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'manufacturer': 'Arm Limited', 'product': 'Cortex M33 r0p4', 'scheme': 'NSCIB', 'cert_id': 'CC-20-202003', 'manufacturer_link': 'http://www.arm.com', 'level': 'EAL6 augmented with ALC_FLR.1 and ASE_TSS.2', 'cert_link': 'https://www.tuv-nederland.nl/assets/files/cerfiticaten/2020/02/cc-20-202003.pdf', 'report_link': 'https://www.tuv-nederland.nl/assets/files/cerfiticaten/2020/06/certification-report-nscib-cc-202003-cr-v1.1.pdf', 'target_link': 'https://www.tuv-nederland.nl/assets/files/cerfiticaten/2020/02/m33-stl-arm_cortex_m33_r0p4_security_target_lite_v1.1.pdf'}}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 05.02.2023 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/Certification%20Report%20NSCIB-CC-202003-CR%20v1.1.pdf, code: nok'].
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 63b9c6431ed90b1ea675a52b67bd0e40da30855e491cee888b90205af7a770d1.
    • The st_txt_hash property was set to aa0b8d033ae52c725ddbae153e1dbaa0f3c13372d95717d4cb35108ef52d9996.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 631615, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 53, '/Author': '', '/ContentTypeId': '0x010100A8B48D26C6F1F04297EA635FC081D18100BCD4AE3A3793464CA413EFC4B5DDFF84', '/CreationDate': "D:20200114111242+01'00'", '/Creator': 'Acrobat PDFMaker 15 for Word', '/Document Type': '', '/ModDate': "D:20200114111313+01'00'", '/Producer': 'Adobe PDF Library 15.0', '/Security Classification': '', '/SourceModified': '', '/Title': '', '/_dlc_DocIdItemGuid': '8a4541cf-d2a4-4635-bb38-c025604d1781', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.arm.com/company/policies/trademarks', 'http://www.arm.com/', 'http://infocenter.arm.com/help/topic/com.arm.doc.aeg0014-/index.html']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL6': 11, 'EAL4': 1, 'EAL6 augmented': 3, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_SPM.1': 8, 'ADV_FSP.5': 1, 'ADV_IMP.2': 1, 'ADV_INT.3': 1, 'ADV_TDS.5': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 2}, 'ALC': {'ALC_FLR.1': 7, 'ALC_DVS.2': 2, 'ALC_CMC.5': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_CMS': 1, 'ALC_CMC': 1}, 'ATE': {'ATE_COV.3': 1, 'ATE_DPT.3': 1, 'ATE_FUN.2': 1, 'ATE_IND.2': 1, 'ATE_COV': 1}, 'AVA': {'AVA_VAN.5': 2, 'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 8, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}, 'cc_sfr': {'FDP': {'FDP_ACC.2': 10, 'FDP_ACC': 23, 'FDP_ACF.1': 23, 'FDP_ACF': 22, 'FDP_ACC.1': 11, 'FDP_IFC.1': 4}, 'FMT': {'FMT_MSA.3': 15, 'FMT_MSA': 38, 'FMT_MSA.1': 10, 'FMT_SMF.1': 10, 'FMT_SMF': 18, 'FMT_SMR.1': 11}, 'FPT': {'FPT_FLS.1': 1}}, 'cc_claims': {'T': {'T.RND': 3}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 2}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RND': 4}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 6, 'Physical Probing': 2}, 'FI': {'Malfunction': 6}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 94}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 12, 'Page 42 of 53 SAR Refinement Description ALC_CMS 199 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to consumer software that can be part of manufacturing and delivery': 1, '205 in [PP84] This refinement in [PP84] is out of scope for the TOE because it refers to the CMS refinement. 206 in [PP84] This refinement in [PP84] is out': 1, 'transitions of power save modes if provided by the TOE. 210 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to test features used in wafer testing. ADV_FSP 215 in [PP84] This': 1, 'to test software delivered but not available in the operational phase. This refinement is regarded out of scope for the TOE. 216 in [PP84] This refinement refers to features that do not provide functionality but': 1, 'contribute to SFRs. This refinement is regarded out of scope for the TOE. 217 in [PP84] The Functional Specification is expected to refer to mechanisms. 218 in': 1, 'This refinement refers to operating conditions. This refinement is regarded out of scope for the TOE. ADV_IMP 223 in [PP84] It must be checked that the provided implementation': 1, 'must be tested under different operating conditions within the specified ranges. This refinement is out of scope for the TOE. 227 in [PP84] This refinement relates to physical testing. This refinement is out of': 1, 'This refinement relates to requirements concerting embedded software. This requirement is regarded out of scope for the TOE. 235 in [PP84] Guidance documents must not contain security relevant details which are': 1, '240 in [PP84] This refinement refers to configuration in Phase 2 or Phase 7. This refinement is out of scope for the TOE. 241 in [PP84] This refinement refers to downloading of embedded software. This': 1, 'is out of scope for the TOE. AVA_VAN 245 in [PP84] The vulnerability analysis shall include a justification for the': 1}}}.
    • The st_filename property was set to [M33-STL] arm_cortex_m33_r0p4_security_target_lite_v1.1.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values added.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/[M33-STL]%20arm_cortex_m33_r0p4_security_target_lite_v1.1.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values discarded.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is https://www.commoncriteriaportal.org/files/epfiles/CC-20-202003.pdf.

    The manufacturer_web was updated.

    • The new value is https://www.arm.com.

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 63b9c6431ed90b1ea675a52b67bd0e40da30855e491cee888b90205af7a770d1.
    • The st_txt_hash property was set to aa0b8d033ae52c725ddbae153e1dbaa0f3c13372d95717d4cb35108ef52d9996.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 631615, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 53, '/Author': '', '/ContentTypeId': '0x010100A8B48D26C6F1F04297EA635FC081D18100BCD4AE3A3793464CA413EFC4B5DDFF84', '/CreationDate': "D:20200114111242+01'00'", '/Creator': 'Acrobat PDFMaker 15 for Word', '/Document Type': '', '/ModDate': "D:20200114111313+01'00'", '/Producer': 'Adobe PDF Library 15.0', '/Security Classification': '', '/SourceModified': '', '/Title': '', '/_dlc_DocIdItemGuid': '8a4541cf-d2a4-4635-bb38-c025604d1781', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.arm.com/company/policies/trademarks', 'http://www.arm.com/', 'http://infocenter.arm.com/help/topic/com.arm.doc.aeg0014-/index.html']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL6': 11, 'EAL4': 1, 'EAL6 augmented': 3, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_SPM.1': 8, 'ADV_FSP.5': 1, 'ADV_IMP.2': 1, 'ADV_INT.3': 1, 'ADV_TDS.5': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 2}, 'ALC': {'ALC_FLR.1': 7, 'ALC_DVS.2': 2, 'ALC_CMC.5': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_CMS': 1, 'ALC_CMC': 1}, 'ATE': {'ATE_COV.3': 1, 'ATE_DPT.3': 1, 'ATE_FUN.2': 1, 'ATE_IND.2': 1, 'ATE_COV': 1}, 'AVA': {'AVA_VAN.5': 2, 'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 8, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}, 'cc_sfr': {'FDP': {'FDP_ACC.2': 10, 'FDP_ACC': 23, 'FDP_ACF.1': 23, 'FDP_ACF': 22, 'FDP_ACC.1': 11, 'FDP_IFC.1': 4}, 'FMT': {'FMT_MSA.3': 15, 'FMT_MSA': 38, 'FMT_MSA.1': 10, 'FMT_SMF.1': 10, 'FMT_SMF': 18, 'FMT_SMR.1': 11}, 'FPT': {'FPT_FLS.1': 1}}, 'cc_claims': {'T': {'T.RND': 3}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 2}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RND': 4}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 6, 'Physical Probing': 2}, 'FI': {'Malfunction': 6}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 94}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 12, 'Page 42 of 53 SAR Refinement Description ALC_CMS 199 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to consumer software that can be part of manufacturing and delivery': 1, '205 in [PP84] This refinement in [PP84] is out of scope for the TOE because it refers to the CMS refinement. 206 in [PP84] This refinement in [PP84] is out': 1, 'transitions of power save modes if provided by the TOE. 210 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to test features used in wafer testing. ADV_FSP 215 in [PP84] This': 1, 'to test software delivered but not available in the operational phase. This refinement is regarded out of scope for the TOE. 216 in [PP84] This refinement refers to features that do not provide functionality but': 1, 'contribute to SFRs. This refinement is regarded out of scope for the TOE. 217 in [PP84] The Functional Specification is expected to refer to mechanisms. 218 in': 1, 'This refinement refers to operating conditions. This refinement is regarded out of scope for the TOE. ADV_IMP 223 in [PP84] It must be checked that the provided implementation': 1, 'must be tested under different operating conditions within the specified ranges. This refinement is out of scope for the TOE. 227 in [PP84] This refinement relates to physical testing. This refinement is out of': 1, 'This refinement relates to requirements concerting embedded software. This requirement is regarded out of scope for the TOE. 235 in [PP84] Guidance documents must not contain security relevant details which are': 1, '240 in [PP84] This refinement refers to configuration in Phase 2 or Phase 7. This refinement is out of scope for the TOE. 241 in [PP84] This refinement refers to downloading of embedded software. This': 1, 'is out of scope for the TOE. AVA_VAN 245 in [PP84] The vulnerability analysis shall include a justification for the': 1}}}.
    • The st_filename property was set to [M33-STL] arm_cortex_m33_r0p4_security_target_lite_v1.1.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values added.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is None.

    The manufacturer_web was updated.

    • The new value is None.

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/[M33-STL]%20arm_cortex_m33_r0p4_security_target_lite_v1.1.pdf, code: 408'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values discarded.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/Certification%20Report%20NSCIB-CC-202003-CR%20v1.1.pdf, code: nok'].
  • 16.11.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The st_metadata property was updated, with the {'/Document Type': '', '/Security Classification': ''} values inserted.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was set to None.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'Certification Report NSCIB-CC-202003-CR v1.1.pdf', 'st_filename': '[M33-STL] arm_cortex_m33_r0p4_security_target_lite_v1.1.pdf'}.
    • The report_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL6+': 3}}}}, 'cc_sar': {'__update__': {'ASE': {'__insert__': {'ASE_TSS.1': 1}}}}, 'side_channel_analysis': {'__delete__': ['SCA']}, 'tee_name': {}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL6': 11}}}}, 'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_SPM.1': 8}}, 'ALC': {'__update__': {'ALC_FLR.1': 7}}, 'AVA': {'__update__': {'AVA_VAN.5': 2}}}}, 'cc_sfr': {'__update__': {'FDP': {'__update__': {'FDP_ACC': 23, 'FDP_ACF': 22, 'FDP_ACC.2': 10, 'FDP_ACF.1': 23}}, 'FMT': {'__insert__': {'FMT_MSA': 38, 'FMT_SMF': 18}, '__update__': {'FMT_MSA.3': 15, 'FMT_MSA.1': 10, 'FMT_SMF.1': 10}}}}, 'cc_claims': {'__update__': {'T': {'__update__': {'T.RND': 3}}}, '__delete__': ['D']}, 'symmetric_crypto': {}, 'randomness': {'__update__': {'RNG': {'__update__': {'RND': 4}}}}, 'side_channel_analysis': {'__update__': {'FI': {'__update__': {'Malfunction': 6}}}}, 'tee_name': {'__update__': {'IBM': {'__update__': {'SE': 94}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'Page 42 of 53 SAR Refinement Description ALC_CMS 199 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to consumer software that can be part of manufacturing and delivery': 1, '205 in [PP84] This refinement in [PP84] is out of scope for the TOE because it refers to the CMS refinement. 206 in [PP84] This refinement in [PP84] is out': 1, 'contribute to SFRs. This refinement is regarded out of scope for the TOE. 217 in [PP84] The Functional Specification is expected to refer to mechanisms. 218 in': 1, 'This refinement refers to operating conditions. This refinement is regarded out of scope for the TOE. ADV_IMP 223 in [PP84] It must be checked that the provided implementation': 1, '240 in [PP84] This refinement refers to configuration in Phase 2 or Phase 7. This refinement is out of scope for the TOE. 241 in [PP84] This refinement refers to downloading of embedded software. This': 1, 'is out of scope for the TOE. AVA_VAN 245 in [PP84] The vulnerability analysis shall include a justification for the': 1}, '__delete__': ['. ALC_CMC 205 in [PP84] This refinement in [PP84] is out of scope for the TOE because it refers to the CMS refinement', '. 210 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to test features used in wafer testing', '. This refinement is regarded out of scope for the TOE', '. 218 in [PP84] This refinement refers to operating conditions. This refinement is regarded out of scope for the TOE', '. This refinement is out of scope for the TOE', '. This requirement is regarded out of scope for the TOE', '. 240 in [PP84] This refinement refers to configuration in Phase 2 or Phase 7. This refinement is out of scope for the TOE', 'dential Page 42 of 53 SAR Refinement Description ALC_CMS 199 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to consumer software that can be part of manufacturing and delivery', 'ALC_CMC 205 in [PP84] This refinement in [PP84] is out of scope for the TOE because it refers to the CMS refinement. 206 in [PP84] This refinement in [PP84] is out', 'nevertheless contribute to SFRs. This refinement is regarded out of scope for the TOE. 217 in [PP84] The Functional Specification is expected to refer to mechanisms. 218 in', '[PP84] This refinement refers to operating conditions. This refinement is regarded out of scope for the TOE. ADV_IMP 223 in [PP84] It must be checked that the provided implementation', 'es. 240 in [PP84] This refinement refers to configuration in Phase 2 or Phase 7. This refinement is out of scope for the TOE. 241 in [PP84] This refinement refers to downloading of embedded software. This', 'refinement is out of scope for the TOE. AVA_VAN 245 in [PP84] The vulnerability analysis shall include a justification for the']}}}} data.
  • 02.09.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 63b9c6431ed90b1ea675a52b67bd0e40da30855e491cee888b90205af7a770d1.
    • The st_txt_hash property was set to aa0b8d033ae52c725ddbae153e1dbaa0f3c13372d95717d4cb35108ef52d9996.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 631615, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 53, '/Author': '', '/ContentTypeId': '0x010100A8B48D26C6F1F04297EA635FC081D18100BCD4AE3A3793464CA413EFC4B5DDFF84', '/CreationDate': "D:20200114111242+01'00'", '/Creator': 'Acrobat PDFMaker 15 for Word', '/Document#20Type': '', '/ModDate': "D:20200114111313+01'00'", '/Producer': 'Adobe PDF Library 15.0', '/Security#20Classification': '', '/SourceModified': '', '/Title': '', '/_dlc_DocIdItemGuid': '8a4541cf-d2a4-4635-bb38-c025604d1781', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.arm.com/company/policies/trademarks', 'http://www.arm.com/', 'http://infocenter.arm.com/help/topic/com.arm.doc.aeg0014-/index.html']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL6': 9, 'EAL4': 1, 'EAL6 augmented': 3, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_SPM.1': 3, 'ADV_FSP.5': 1, 'ADV_IMP.2': 1, 'ADV_INT.3': 1, 'ADV_TDS.5': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 2}, 'ALC': {'ALC_DVS.2': 2, 'ALC_FLR.1': 4, 'ALC_CMC.5': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_CMS': 1, 'ALC_CMC': 1}, 'ATE': {'ATE_COV.3': 1, 'ATE_DPT.3': 1, 'ATE_FUN.2': 1, 'ATE_IND.2': 1, 'ATE_COV': 1}, 'AVA': {'AVA_VAN.5': 1, 'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 8, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}, 'cc_sfr': {'FDP': {'FDP_ACC': 2, 'FDP_ACF': 1, 'FDP_ACC.2': 2, 'FDP_ACC.1': 11, 'FDP_ACF.1': 7, 'FDP_IFC.1': 4}, 'FMT': {'FMT_MSA.3': 7, 'FMT_MSA.1': 6, 'FMT_SMR.1': 11, 'FMT_SMF.1': 6}, 'FPT': {'FPT_FLS.1': 1}}, 'cc_claims': {'D': {'D': 1}, 'T': {'T.RND': 4}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 2}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RND': 3}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 6, 'Physical Probing': 2}, 'FI': {'Malfunction': 7}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 161}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 12, '. ALC_CMC 205 in [PP84] This refinement in [PP84] is out of scope for the TOE because it refers to the CMS refinement': 1, '. 210 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to test features used in wafer testing': 1, '. This refinement is regarded out of scope for the TOE': 2, '. 218 in [PP84] This refinement refers to operating conditions. This refinement is regarded out of scope for the TOE': 1, '. This refinement is out of scope for the TOE': 3, '. This requirement is regarded out of scope for the TOE': 1, '. 240 in [PP84] This refinement refers to configuration in Phase 2 or Phase 7. This refinement is out of scope for the TOE': 1, 'dential Page 42 of 53 SAR Refinement Description ALC_CMS 199 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to consumer software that can be part of manufacturing and delivery': 1, 'ALC_CMC 205 in [PP84] This refinement in [PP84] is out of scope for the TOE because it refers to the CMS refinement. 206 in [PP84] This refinement in [PP84] is out': 1, 'transitions of power save modes if provided by the TOE. 210 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to test features used in wafer testing. ADV_FSP 215 in [PP84] This': 1, 'to test software delivered but not available in the operational phase. This refinement is regarded out of scope for the TOE. 216 in [PP84] This refinement refers to features that do not provide functionality but': 1, 'nevertheless contribute to SFRs. This refinement is regarded out of scope for the TOE. 217 in [PP84] The Functional Specification is expected to refer to mechanisms. 218 in': 1, '[PP84] This refinement refers to operating conditions. This refinement is regarded out of scope for the TOE. ADV_IMP 223 in [PP84] It must be checked that the provided implementation': 1, 'must be tested under different operating conditions within the specified ranges. This refinement is out of scope for the TOE. 227 in [PP84] This refinement relates to physical testing. This refinement is out of': 1, 'This refinement relates to requirements concerting embedded software. This requirement is regarded out of scope for the TOE. 235 in [PP84] Guidance documents must not contain security relevant details which are': 1, 'es. 240 in [PP84] This refinement refers to configuration in Phase 2 or Phase 7. This refinement is out of scope for the TOE. 241 in [PP84] This refinement refers to downloading of embedded software. This': 1, 'refinement is out of scope for the TOE. AVA_VAN 245 in [PP84] The vulnerability analysis shall include a justification for the': 1}}}.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values added.
  • 01.09.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/Certification%20Report%20NSCIB-CC-202003-CR%20v1.1.pdf, code: 408'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values discarded.
  • 28.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to True.
    • The report_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 138797, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 13, '/Author': 'p647', '/CreationDate': "D:20200617122500+02'00'", '/Creator': 'pdfFactory Pro www.pdffactory.com', '/Producer': 'pdfFactory Pro 5.32 (Windows 7 Ultimate x64 Dutch)', '/Title': 'Certification Report NSCIB-CC-202003-CR v1.1.docx', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.commoncriteriaportal.org', 'http://www.tuv.com/nl', 'mailto:info@nl.tuv.com', 'http://www.sogisportal.eu']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 631615, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 53, '/Author': '', '/ContentTypeId': '0x010100A8B48D26C6F1F04297EA635FC081D18100BCD4AE3A3793464CA413EFC4B5DDFF84', '/CreationDate': "D:20200114111242+01'00'", '/Creator': 'Acrobat PDFMaker 15 for Word', '/Document#20Type': '', '/ModDate': "D:20200114111313+01'00'", '/Producer': 'Adobe PDF Library 15.0', '/Security#20Classification': '', '/SourceModified': '', '/Title': '', '/_dlc_DocIdItemGuid': '8a4541cf-d2a4-4635-bb38-c025604d1781', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.arm.com/company/policies/trademarks', 'http://www.arm.com/', 'http://infocenter.arm.com/help/topic/com.arm.doc.aeg0014-/index.html']}}.

    The computed heuristics were updated.

    • The cert_lab property was set to [''].
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to False.
    • The report_extract_ok property was set to False.
    • The errors property was set to ["Failed to read metadata of certs/reports/pdf/d1c61604edcf6b7b.pdf, error: unsupported operand type(s) for +: 'IndirectObject' and 'list'", 'Failed to read metadata of certs/targets/pdf/d1c61604edcf6b7b.pdf, error: can only concatenate list (not "IndirectObject") to list', "Failed to read metadata of certs/reports/pdf/d1c61604edcf6b7b.pdf, error: unsupported operand type(s) for +: 'IndirectObject' and 'list'", 'Failed to read metadata of certs/targets/pdf/d1c61604edcf6b7b.pdf, error: can only concatenate list (not "IndirectObject") to list'].

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_keywords property was set to {'cc_cert_id': {'NL': {'NSCIB-CC-202003-CR': 39}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL4': 1, 'EAL6+': 5, 'EAL6': 5, 'EAL4+': 2, 'EAL 6': 1, 'EAL6 augmented': 3, 'EAL 6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_IMP': 1}, 'ALC': {'ALC_FLR.1': 2}, 'AVA': {'AVA_VAN.5': 2}, 'ASE': {'ASE_TSS.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'BrightSight': {'Brightsight': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 1, 'DPA': 1}, 'other': {'JIL-COMP': 3, 'JIL-AAPS': 2, 'JIL': 5}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL6': 9, 'EAL4': 1, 'EAL6 augmented': 3, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_SPM.1': 3, 'ADV_FSP.5': 1, 'ADV_IMP.2': 1, 'ADV_INT.3': 1, 'ADV_TDS.5': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 2}, 'ALC': {'ALC_DVS.2': 2, 'ALC_FLR.1': 4, 'ALC_CMC.5': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_CMS': 1, 'ALC_CMC': 1}, 'ATE': {'ATE_COV.3': 1, 'ATE_DPT.3': 1, 'ATE_FUN.2': 1, 'ATE_IND.2': 1, 'ATE_COV': 1}, 'AVA': {'AVA_VAN.5': 1, 'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 8, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}, 'cc_sfr': {'FDP': {'FDP_ACC': 2, 'FDP_ACF': 1, 'FDP_ACC.2': 2, 'FDP_ACC.1': 11, 'FDP_ACF.1': 7, 'FDP_IFC.1': 4}, 'FMT': {'FMT_MSA.3': 7, 'FMT_MSA.1': 6, 'FMT_SMR.1': 11, 'FMT_SMF.1': 6}, 'FPT': {'FPT_FLS.1': 1}}, 'cc_claims': {'D': {'D': 1}, 'T': {'T.RND': 4}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 2}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RND': 3}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 6, 'Physical Probing': 2}, 'FI': {'Malfunction': 7}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 161}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 12, '. ALC_CMC 205 in [PP84] This refinement in [PP84] is out of scope for the TOE because it refers to the CMS refinement': 1, '. 210 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to test features used in wafer testing': 1, '. This refinement is regarded out of scope for the TOE': 2, '. 218 in [PP84] This refinement refers to operating conditions. This refinement is regarded out of scope for the TOE': 1, '. This refinement is out of scope for the TOE': 3, '. This requirement is regarded out of scope for the TOE': 1, '. 240 in [PP84] This refinement refers to configuration in Phase 2 or Phase 7. This refinement is out of scope for the TOE': 1, 'dential Page 42 of 53 SAR Refinement Description ALC_CMS 199 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to consumer software that can be part of manufacturing and delivery': 1, 'ALC_CMC 205 in [PP84] This refinement in [PP84] is out of scope for the TOE because it refers to the CMS refinement. 206 in [PP84] This refinement in [PP84] is out': 1, 'transitions of power save modes if provided by the TOE. 210 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to test features used in wafer testing. ADV_FSP 215 in [PP84] This': 1, 'to test software delivered but not available in the operational phase. This refinement is regarded out of scope for the TOE. 216 in [PP84] This refinement refers to features that do not provide functionality but': 1, 'nevertheless contribute to SFRs. This refinement is regarded out of scope for the TOE. 217 in [PP84] The Functional Specification is expected to refer to mechanisms. 218 in': 1, '[PP84] This refinement refers to operating conditions. This refinement is regarded out of scope for the TOE. ADV_IMP 223 in [PP84] It must be checked that the provided implementation': 1, 'must be tested under different operating conditions within the specified ranges. This refinement is out of scope for the TOE. 227 in [PP84] This refinement relates to physical testing. This refinement is out of': 1, 'This refinement relates to requirements concerting embedded software. This requirement is regarded out of scope for the TOE. 235 in [PP84] Guidance documents must not contain security relevant details which are': 1, 'es. 240 in [PP84] This refinement refers to configuration in Phase 2 or Phase 7. This refinement is out of scope for the TOE. 241 in [PP84] This refinement refers to downloading of embedded software. This': 1, 'refinement is out of scope for the TOE. AVA_VAN 245 in [PP84] The vulnerability analysis shall include a justification for the': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
    • The cert_lab property was set to None.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': 'b5695eca1de6d58db99d1735e56a5f7fdb334334d7faf591f8e2e1518b21c3df', 'st_pdf_hash': '63b9c6431ed90b1ea675a52b67bd0e40da30855e491cee888b90205af7a770d1', 'report_txt_hash': '45ff3c52ee8e2653aac13074bb49a7a52463dc291e59dddfe6e4ecccf556a70f', 'st_txt_hash': 'aa0b8d033ae52c725ddbae153e1dbaa0f3c13372d95717d4cb35108ef52d9996'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {'RNG': 1}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {'DPA': 1}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'DES': 1}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'MAC': 2}, 'rules_randomness': {'RND': 3}, 'rules_tee': {'SE': 161}, 'rules_side_channels': {'Malfunction': 7, 'Leak-Inherent': 6, 'Physical Probing': 2}} values inserted.
  • 21.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was set to {'_type': 'Set', 'elements': ['cpe:2.3:h:arm:cortex-m33:-:*:*:*:*:*:*:*']}.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 5}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The cert_lab property was set to [''].
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {'cert_id': 'NSCIB-CC-202003-CR', 'cert_item': 'Cortex M33 r0p4', 'developer': 'Arm Limited', 'cert_lab': ' Brightsight'}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['-']}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Cortex M33 r0p4 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/CC-20-202003.pdf",
  "dgst": "d1c61604edcf6b7b",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "NSCIB-CC-202003-CR",
    "cert_lab": [
      ""
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "CC-20-202003",
      "cert_link": "https://www.tuv-nederland.nl/assets/files/cerfiticaten/2020/02/cc-20-202003.pdf",
      "level": "EAL6 augmented with ALC_FLR.1 and ASE_TSS.2",
      "manufacturer": "Arm Limited",
      "manufacturer_link": "http://www.arm.com",
      "product": "Cortex M33 r0p4",
      "report_link": "https://www.tuv-nederland.nl/assets/files/cerfiticaten/2020/06/certification-report-nscib-cc-202003-cr-v1.1.pdf",
      "scheme": "NSCIB",
      "target_link": "https://www.tuv-nederland.nl/assets/files/cerfiticaten/2020/02/m33-stl-arm_cortex_m33_r0p4_security_target_lite_v1.1.pdf"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Arm Limited",
  "manufacturer_web": "https://www.arm.com",
  "name": "Cortex M33 r0p4",
  "not_valid_after": "2025-02-13",
  "not_valid_before": "2020-02-13",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "CC-20-202003.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "NL": {
          "CC-20-202003": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.1": 1
        },
        "ASE": {
          "ASE_TSS.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL6": 1,
          "EAL6 augmented": 1,
          "EAL7": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20200213160251+01\u002700\u0027",
      "/Creator": "NL-ARN-SAL-C",
      "/ModDate": "D:20200213160645+01\u002700\u0027",
      "/Producer": "KONICA MINOLTA bizhub C300i",
      "pdf_file_size_bytes": 173675,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "Certification Report NSCIB-CC-202003-CR v1.1.pdf",
    "report_frontpage": {
      "NL": {
        "cert_id": "NSCIB-CC-202003-CR",
        "cert_item": "Cortex M33 r0p4",
        "cert_lab": " Brightsight",
        "developer": "Arm Limited"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "NL": {
          "NSCIB-CC-202003-CR": 13
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_IMP": 1
        },
        "ALC": {
          "ALC_FLR.1": 2
        },
        "ASE": {
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 6": 1,
          "EAL 6 augmented": 1,
          "EAL4": 1,
          "EAL4+": 2,
          "EAL6": 5,
          "EAL6 augmented": 3,
          "EAL6+": 3
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "other": {
          "JIL": 5,
          "JIL-AAPS": 2,
          "JIL-COMP": 3
        }
      },
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "p647",
      "/CreationDate": "D:20200617122500+02\u002700\u0027",
      "/Creator": "pdfFactory Pro www.pdffactory.com",
      "/Producer": "pdfFactory Pro 5.32 (Windows 7 Ultimate x64 Dutch)",
      "/Title": "Certification Report NSCIB-CC-202003-CR v1.1.docx",
      "pdf_file_size_bytes": 138797,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.tuv.com/nl",
          "http://www.sogisportal.eu",
          "http://www.commoncriteriaportal.org",
          "mailto:info@nl.tuv.com"
        ]
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 13
    },
    "st_filename": "[M33-STL] arm_cortex_m33_r0p4_security_target_lite_v1.1.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "T": {
          "T.RND": 3
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_FSP": 1,
          "ADV_FSP.5": 1,
          "ADV_IMP": 1,
          "ADV_IMP.2": 1,
          "ADV_INT.3": 1,
          "ADV_SPM.1": 8,
          "ADV_TDS.5": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 2,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.5": 1,
          "ALC_CMS": 1,
          "ALC_CMS.5": 1,
          "ALC_DEL": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 2,
          "ALC_FLR.1": 7,
          "ALC_LCD.1": 1,
          "ALC_TAT.3": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.2": 8
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.3": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN.2": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 1,
          "EAL4 augmented": 1,
          "EAL6": 11,
          "EAL6 augmented": 3
        }
      },
      "cc_sfr": {
        "FDP": {
          "FDP_ACC": 23,
          "FDP_ACC.1": 11,
          "FDP_ACC.2": 10,
          "FDP_ACF": 22,
          "FDP_ACF.1": 23,
          "FDP_IFC.1": 4
        },
        "FMT": {
          "FMT_MSA": 38,
          "FMT_MSA.1": 10,
          "FMT_MSA.3": 15,
          "FMT_SMF": 18,
          "FMT_SMF.1": 10,
          "FMT_SMR.1": 11
        },
        "FPT": {
          "FPT_FLS.1": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "205 in [PP84] This refinement in [PP84] is out of scope for the TOE because it refers to the CMS refinement. 206 in [PP84] This refinement in [PP84] is out": 1,
          "240 in [PP84] This refinement refers to configuration in Phase 2 or Phase 7. This refinement is out of scope for the TOE. 241 in [PP84] This refinement refers to downloading of embedded software. This": 1,
          "Page 42 of 53 SAR Refinement Description ALC_CMS 199 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to consumer software that can be part of manufacturing and delivery": 1,
          "This refinement refers to operating conditions. This refinement is regarded out of scope for the TOE. ADV_IMP 223 in [PP84] It must be checked that the provided implementation": 1,
          "This refinement relates to requirements concerting embedded software. This requirement is regarded out of scope for the TOE. 235 in [PP84] Guidance documents must not contain security relevant details which are": 1,
          "contribute to SFRs. This refinement is regarded out of scope for the TOE. 217 in [PP84] The Functional Specification is expected to refer to mechanisms. 218 in": 1,
          "is out of scope for the TOE. AVA_VAN 245 in [PP84] The vulnerability analysis shall include a justification for the": 1,
          "must be tested under different operating conditions within the specified ranges. This refinement is out of scope for the TOE. 227 in [PP84] This refinement relates to physical testing. This refinement is out of": 1,
          "out of scope": 12,
          "to test software delivered but not available in the operational phase. This refinement is regarded out of scope for the TOE. 216 in [PP84] This refinement refers to features that do not provide functionality but": 1,
          "transitions of power save modes if provided by the TOE. 210 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to test features used in wafer testing. ADV_FSP 215 in [PP84] This": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 4
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 6
        },
        "SCA": {
          "Leak-Inherent": 6,
          "Physical Probing": 2
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 94
        }
      },
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "",
      "/ContentTypeId": "0x010100A8B48D26C6F1F04297EA635FC081D18100BCD4AE3A3793464CA413EFC4B5DDFF84",
      "/CreationDate": "D:20200114111242+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 15 for Word",
      "/Document Type": "",
      "/ModDate": "D:20200114111313+01\u002700\u0027",
      "/Producer": "Adobe PDF Library 15.0",
      "/Security Classification": "",
      "/SourceModified": "",
      "/Title": "",
      "/_dlc_DocIdItemGuid": "8a4541cf-d2a4-4635-bb38-c025604d1781",
      "pdf_file_size_bytes": 631615,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://infocenter.arm.com/help/topic/com.arm.doc.aeg0014-/index.html",
          "http://www.arm.com/company/policies/trademarks",
          "http://www.arm.com/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 53
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/Certification%20Report%20NSCIB-CC-202003-CR%20v1.1.pdf",
  "scheme": "NL",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL6+",
      "ALC_FLR.1",
      "ASE_TSS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/[M33-STL]%20arm_cortex_m33_r0p4_security_target_lite_v1.1.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "15e24a0559b88716a72f8fb08d727a5500e1e45ca75cc79ea30ed54b98a01fdf",
      "txt_hash": "0b51504d1e0d68a40998fd130db4c6a17e4a5c48a2b19fa48c5f618f355b2d4f"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "b5695eca1de6d58db99d1735e56a5f7fdb334334d7faf591f8e2e1518b21c3df",
      "txt_hash": "45ff3c52ee8e2653aac13074bb49a7a52463dc291e59dddfe6e4ecccf556a70f"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "63b9c6431ed90b1ea675a52b67bd0e40da30855e491cee888b90205af7a770d1",
      "txt_hash": "aa0b8d033ae52c725ddbae153e1dbaa0f3c13372d95717d4cb35108ef52d9996"
    }
  },
  "status": "active"
}