SLB9670_1.2 v6.40.0190.00

CSV information ?

Status archived
Valid from 16.04.2015
Valid until 16.04.2020
Scheme 🇩🇪 DE
Manufacturer Infineon Technologies AG
Category Trusted Computing
Security level EAL4+, ALC_FLR.1, AVA_VAN.4
Protection profiles
Maintenance updates Infineon Technologies AG Trusted Platform Module SLB9670_1.2, v6.40.0190.00, v6.41.0197.00, v6.41.0198.00, v6.42.0204.00 and v6.42.0205.00 (23.02.2017) Certification report Security target
Infineon Technologies AG Trusted Platform Module SLB9670_1.2, v6.40.0190.00 and v6.41.0197.00 and v6.41.0198.00 (03.05.2016) Certification report Security target

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0958-2015

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, HMAC
Asymmetric Algorithms
RSA2048
Hash functions
SHA-1, SHA-256
Schemes
MAC, Key Agreement
Randomness
TRNG, RNG, RND
Block cipher modes
CBC, CTR

Vendor
Infineon Technologies AG, Infineon, Infineon Technologies

Security level
EAL 4, EAL 1, EAL 2, EAL5+, EAL6, EAL 3, EAL 5, EAL 6, EAL 7, EAL 4 augmented, ITSEC Evaluation
Claims
O.C, R.O
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_FLR.1, ALC_FLR, ALC_DVS, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_DVS.2, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_TAT, ATE_FUN, ATE_IND, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, AVA_VAN.4, AVA_VAN, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.5, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSS
Protection profiles
BSI-CC-PP-0030-2008-MA-02
Certificates
BSI-DSZ-CC-0958-2015
Evaluation facilities
TÜV Informationstechnik, TÜViT, TUViT
Certification process
and certification procedure is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the product or resulting from the evaluation and certification, Documentation - Configuration Management SLB9670_1.2, Infineon Technologies AG, V0.4, 2015-03-31 (confidential document) 8 Specifically: • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung, 9] Evaluation Technical Report BSI-DSZ-CC-0958-2015, V2, 2015-04-14, TÜV Informationstechnik GmbH (confidential document) [10] Evaluation Documentation - SLB9670_1.2 Literature_Reference, Infineon Technologies AG, V0.6, confidential document) [11] RFC 2104, HMAC: Keyed-Hashing for Message Authentication, http://www.ietf.org/rfc/rfc2104.txt

Side-channel analysis
side channel, SPA, DPA, physical tampering, Fault Injection, JIL
Certification process
and certification procedure is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the product or resulting from the evaluation and certification, Documentation - Configuration Management SLB9670_1.2, Infineon Technologies AG, V0.4, 2015-03-31 (confidential document) 8 Specifically: • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung, 9] Evaluation Technical Report BSI-DSZ-CC-0958-2015, V2, 2015-04-14, TÜV Informationstechnik GmbH (confidential document) [10] Evaluation Documentation - SLB9670_1.2 Literature_Reference, Infineon Technologies AG, V0.6, confidential document) [11] RFC 2104, HMAC: Keyed-Hashing for Message Authentication, http://www.ietf.org/rfc/rfc2104.txt

Standards
FIPS180-2, FIPS197, SP 800-108, PKCS#1, PKCS #1, AIS20, AIS31, AIS 34, AIS 20, AIS 31, AIS 1, AIS 14, AIS 19, AIS 25, AIS 26, AIS 32, AIS 37, AIS 38, AIS 41, AIS 46, RFC2104, RFC 2104, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065
Technical reports
BSI TR-02102, BSI 7138, BSI 7125, BSI 7148

File metadata

Title: Certification Report BSI-DSZ-CC-0958-2015
Subject: Common Criteria Zertifizierung
Keywords: "Common Criteria, Certification, Zertifizierung, TPM, Infineon"
Author: Bundesamt für Sicherheit in der Informationstechnik
Creation date: D:20150422071632+02'00'
Modification date: D:20150422144720+02'00'
Pages: 42
Creator: Writer
Producer: LibreOffice 4.2

Frontpage

Certificate ID: BSI-DSZ-CC-0958-2015
Certified item: SLB9670_1.2 v6.40.0190.00
Certification lab: BSI
Developer: Infineon Technologies AG

References

Incoming
  • BSI-DSZ-CC-0958-V2-2017 - Infineon Technologies AG Trusted Platform Module SLB9670_1.2 v6.43.0243.00, v6.43.0244.00, v6.43.0245.00 and v6.43.0246.00
  • BSI-DSZ-CC-1021-2016 - Infineon Technologies AG Trusted Platform Module SLB9670_2.0 v7.60.2677.00

Security target ?

Extracted keywords

Symmetric Algorithms
AES, Triple-DES, HMAC
Asymmetric Algorithms
RSA-2048, RSA2048, RSA 512, ECC
Hash functions
SHA-1
Schemes
MAC
Randomness
RNG, RND
Block cipher modes
CBC, CTR

Vendor
Infineon Technologies AG, Infineon Technologies

Security level
EAL4, EAL4 augmented
Security Assurance Requirements (SAR)
ADV_VAN.4, ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS, ALC_FLR.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.4, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FCO_NRO, FCO_NRO.1, FCS_RNG.1, FCS_RNG, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1, FCS_CKM.4.1, FCS_COP, FDP_ITC.1, FDP_ITC.2, FDP_ACF, FDP_ACC.1, FDP_ACF.1, FDP_IFC.1, FDP_ACC, FDP_RIP.1, FDP_ETC.2, FDP_UCT, FDP_UIT, FDP_TDC.1, FDP_UCT.1, FDP_UIT.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.4, FIA_UAU.6, FIA_USB.1, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA.3, FMT_MSA, FMT_MSA.1, FMT_SMR.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MTD, FMT_MTD.1, FPR_UNL.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_FLS.1, FPT_FLS.1.1, FPT_PHP.3, FPT_PHP.3.1, FPT_STM.1, FPT_TST.1
Protection profiles
BSI-CC-PP-0030-2008-MA-02, BSI-PP-0030-2008-MA-02

Side-channel analysis
physical probing, DPA, SPA, DFA

Standards
FIPS PUB 140-1, FIPS PUB 197, FIPS PUB 180-2, FIPS 180-1, PKCS#1, PKCS #1, AIS 20, RFC3447, RFC2104, RFC 2104, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004

File metadata

Title: Microsoft Word - SLB9670_SecTar.doc
Author: Noller
Creation date: D:20150331095209+02'00'
Modification date: D:20150331095216+02'00'
Pages: 66
Creator: Microsoft Word - SLB9670_SecTar.doc
Producer: Nuance PDF Create 8

References

Incoming

Heuristics ?

Certificate ID: BSI-DSZ-CC-0958-2015

Extracted SARs

APE_INT.1, APE_ECD.1, ASE_OBJ.2, ADV_FSP.4, ADV_SPM.1, APE_OBJ.2, ALC_TAT.1, ADV_IMP.1, ASE_TSS.1, ADV_ARC.1, ALC_DEL.1, ADV_TDS.3, ALC_DVS.1, ASE_REQ.2, ALC_CMS.4, ATE_FUN.1, ATE_COV.2, APE_CCL.1, ALC_FLR.1, ADV_INT.3, ASE_CCL.1, ATE_DPT.1, AVA_VAN.4, APE_REQ.2, ASE_ECD.1, AGD_OPE.1, ALC_CMC.4, ADV_VAN.4, APE_SPD.1, AGD_PRE.1, ASE_SPD.1, ATE_IND.2, ASE_INT.1, ALC_LCD.1

References ?

Updates ?

  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name SLB9670_1.2 v6.40.0190.00 was processed.

  • 01.02.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'PC Client Specific Trusted Platform Module Family 1.2; Level 2, Version 1.1', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0030b.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['BSI-CC-PP-030-2008']}}]}.
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['1.2', '6.40.0190.00']}.
    • The directly_affected_by property was set to {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0958-V2-2017']}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0958-V2-2017']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0958-V2-2017']}, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 4}, {'_type': 'SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 1}]}}.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '616cd6fa62f92830f5ee3905d8dc41d2724eda60637798ee0490e2641a1da78c', 'st_pdf_hash': '8e947b567157b3e15beaf1d05855cb530d3aa1bc44258afaff8a4c774f28ff59', 'report_txt_hash': '691813e244dcaa4f829c4ffca24ecd5ecf7a1544fcead8d41663b7e7bb92bd34', 'st_txt_hash': 'b6251dc69d30058acec74308f47213f3af5ed871b30b3223695f5dc39c7fcc3a'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 6, 'AES-': 1, 'HMAC': 5}, 'rules_asymmetric_crypto': {'RSA2048': 1}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 4, 'SHA-256': 2}, 'rules_crypto_schemes': {'MAC': 6}, 'rules_randomness': {'TRNG': 1, 'RNG': 7, 'RND': 1}, 'rules_tee': {'SE': 1}, 'rules_side_channels': {'physical tampering': 1, 'side channel': 1, 'SPA': 1, 'DPA': 2, 'Fault Injection': 1}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 26, 'DES': 1, 'HMAC': 9}, 'rules_asymmetric_crypto': {'RSA-2048': 1, 'RSA2048': 1, 'RSA 512': 5, 'ECC': 2}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 29}, 'rules_crypto_schemes': {'MAC': 13}, 'rules_randomness': {'TRNG': 1, 'RNG': 27, 'RND': 1}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {'physical probing': 2, 'SPA': 1, 'DPA': 1, 'DFA': 1}} values inserted.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to False.
    • The errors property was set to ['Failed to read metadata of certs/targets/pdf/d5c7e2e456748263.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/d5c7e2e456748263.pdf, error: can only concatenate list (not "IndirectObject") to list'].

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.d/', 'http://www.ietf.org/rfc/rfc2104.txt', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/zertifizierung', 'https://www.bsi.bund.de/']}} values inserted.
    • The st_metadata property was set to None.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0958-2015': 88}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0030-2008-MA-02': 4}}, 'cc_security_level': {'EAL': {'EAL 4': 14, 'EAL 1': 7, 'EAL 2': 5, 'EAL5+': 1, 'EAL6': 1, 'EAL 3': 4, 'EAL 5': 6, 'EAL 6': 4, 'EAL 7': 4, 'EAL 4 augmented': 3}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.1': 1, 'ADV_FSP.2': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.5': 1, 'ADV_FSP.6': 1, 'ADV_IMP.1': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_INT.2': 1, 'ADV_INT.3': 1, 'ADV_SPM.1': 1, 'ADV_TDS.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.4': 1, 'ADV_TDS.5': 1, 'ADV_TDS.6': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.1': 7, 'ALC_FLR': 3, 'ALC_DVS': 2, 'ALC_CMC.1': 1, 'ALC_CMC.2': 1, 'ALC_CMC.3': 1, 'ALC_CMC.4': 2, 'ALC_CMC.5': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 2, 'ALC_CMS.5': 1, 'ALC_DEL.1': 2, 'ALC_DVS.1': 2, 'ALC_DVS.2': 1, 'ALC_FLR.2': 1, 'ALC_FLR.3': 1, 'ALC_LCD.1': 2, 'ALC_LCD.2': 1, 'ALC_TAT.1': 2, 'ALC_TAT.2': 1, 'ALC_TAT.3': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_FUN': 3, 'ATE_IND': 2, 'ATE_COV.1': 1, 'ATE_COV.2': 1, 'ATE_COV.3': 1, 'ATE_DPT.1': 1, 'ATE_DPT.2': 1, 'ATE_DPT.3': 1, 'ATE_DPT.4': 1, 'ATE_FUN.1': 1, 'ATE_FUN.2': 1, 'ATE_IND.1': 1, 'ATE_IND.2': 1, 'ATE_IND.3': 1, 'ATE_COV': 1, 'ATE_DPT': 1}, 'AVA': {'AVA_VAN.4': 5, 'AVA_VAN': 3, 'AVA_VAN.1': 1, 'AVA_VAN.2': 1, 'AVA_VAN.3': 1, 'AVA_VAN.5': 1}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.C': 2}, 'R': {'R.O.C': 2}}, 'vendor': {'Infineon': {'Infineon Technologies AG': 13, 'Infineon Technologies': 11, 'Infineon': 4}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 3, 'TÜViT': 1, 'TUViT': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 6, 'AES-': 1}}, 'constructions': {'MAC': {'HMAC': 5}}}, 'asymmetric_crypto': {'RSA': {'RSA2048': 1}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}, 'SHA2': {'SHA-256': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 6}, 'KA': {'Key Agreement': 2}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RNG': 7, 'RND': 1}}, 'cipher_mode': {'CBC': {'CBC': 2}, 'CTR': {'CTR': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 1, 'SPA': 1, 'DPA': 2}, 'FI': {'physical tampering': 1, 'Fault Injection': 1}, 'other': {'JIL': 1}}, 'technical_report_id': {'BSI': {'BSI 7138': 2, 'BSI 7125': 2, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS180-2': 5, 'FIPS197': 2}, 'NIST': {'SP 800-108': 1}, 'PKCS': {'PKCS#1': 6, 'PKCS #1': 1}, 'BSI': {'AIS20': 2, 'AIS31': 1, 'AIS 34': 2, 'AIS 20': 2, 'AIS 31': 2, 'AIS 1': 1, 'AIS 14': 1, 'AIS 19': 1, 'AIS 25': 1, 'AIS 26': 1, 'AIS 32': 1, 'AIS 37': 1, 'AIS 38': 1, 'AIS 41': 1, 'AIS 46': 1}, 'RFC': {'RFC2104': 4, 'RFC 2104': 1}, 'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'n and certification procedure is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the product or resulting from the evaluation and certification': 1, 'n Documentation - Configuration Management SLB9670_1.2, Infineon Technologies AG, V0.4, 2015-03-31 (confidential document) 8 Specifically: • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung': 1, '[9] Evaluation Technical Report BSI-DSZ-CC-0958-2015, V2, 2015-04-14, TÜV Informationstechnik GmbH (confidential document) [10] Evaluation Documentation - SLB9670_1.2 Literature_Reference, Infineon Technologies AG, V0.6': 1, '2015-03-31 (confidential document) [11] RFC 2104, HMAC: Keyed-Hashing for Message Authentication, http://www.ietf.org/rfc/rfc2104.txt': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0030-2008-MA-02': 1, 'BSI-PP-0030-2008-MA-02': 1}}, 'cc_security_level': {'EAL': {'EAL3': 1, 'EAL4': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS': 1, 'ALC_FLR.1': 3, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.4': 2}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 1}, 'FCO': {'FCO_NRO.1': 1}, 'FCS': {'FCS_RNG.1': 19, 'FCS_RNG': 5, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM.2': 2, 'FCS_COP.1': 3, 'FCS_CKM.4': 9, 'FCS_CKM.1': 7, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ITC.1': 5, 'FDP_ITC.2': 7, 'FDP_ACC.1': 9, 'FDP_IFC.1': 1, 'FDP_ETC.2': 3, 'FDP_ACF.1': 1, 'FDP_TDC.1': 1, 'FDP_UCT.1': 1, 'FDP_UIT.1': 1, 'FDP_RIP.1': 1}, 'FIA': {'FIA_UID.1': 5, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 5, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.5': 4, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_AFL.1': 3, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.4': 3, 'FIA_UAU.6': 3, 'FIA_USB.1': 1}, 'FMT': {'FMT_SMF.1': 3, 'FMT_SMF.1.1': 1, 'FMT_MSA.3': 7, 'FMT_MSA.1': 6, 'FMT_SMR.1': 7, 'FMT_MSA.2': 3, 'FMT_MSA.2.1': 1, 'FMT_MTD.1': 1}, 'FPR': {'FPR_UNL.1': 2}, 'FPT': {'FPT_TDC.1': 2, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_FLS.1': 3, 'FPT_FLS.1.1': 1, 'FPT_PHP.3': 3, 'FPT_PHP.3.1': 1, 'FPT_STM.1': 2, 'FPT_TST.1': 2}}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies AG': 10, 'Infineon Technologies': 8}, 'STMicroelectronics': {'STM': 3}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 26}}, 'DES': {'DES': {'DES': 1}, '3DES': {'Triple-DES': 1}}, 'constructions': {'MAC': {'HMAC': 9}}}, 'asymmetric_crypto': {'RSA': {'RSA-2048': 1, 'RSA2048': 1, 'RSA 512': 5}, 'ECC': {'ECC': {'ECC': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 29}}}, 'crypto_scheme': {'MAC': {'MAC': 13}, 'KA': {'KA': 1}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RNG': 27, 'RND': 1}}, 'cipher_mode': {'CBC': {'CBC': 4}, 'CTR': {'CTR': 2}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 2, 'DPA': 1, 'SPA': 1}, 'FI': {'DFA': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 140-1': 3, 'FIPS PUB 197': 3, 'FIPS PUB 180-2': 3}, 'PKCS': {'PKCS#1': 5, 'PKCS #1': 1}, 'BSI': {'AIS 20': 1}, 'RFC': {'RFC3447': 3, 'RFC2104': 3, 'RFC 2104': 1}, 'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PC Client Specific Trusted Platform Module Family 1.2; Level 2, Version 1.1', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0030b.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['BSI-CC-PP-030-2008']}}]}.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2017-02-23', 'maintenance_title': 'Infineon Technologies AG Trusted Platform Module SLB9670_1.2, v6.40.0190.00, v6.41.0197.00, v6.41.0198.00, v6.42.0204.00 and v6.42.0205.00', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/0958ma2a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/0958ma2b_pdf.pdf'}, {'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2016-05-03', 'maintenance_title': 'Infineon Technologies AG Trusted Platform Module SLB9670_1.2, v6.40.0190.00 and v6.41.0197.00 and v6.41.0198.00', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/0958ma1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/0958ma1b_pdf.pdf'}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]}.
  • 28.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1316328, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 66, '/Creator': 'Microsoft Word - SLB9670_SecTar.doc', '/Producer': 'Nuance PDF Create 8', '/CreationDate': "D:20150331095209+02'00'", '/ModDate': "D:20150331095216+02'00'", '/Author': 'Noller', '/Title': 'Microsoft Word - SLB9670_SecTar.doc', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.infineon.com/', 'http://www.ietf.org/rfc/rfc2104.txt', 'http://www.rsa.com/']}}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '0958a_pdf.pdf', 'st_filename': '0958b_pdf.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0958-2015': 48}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL 4': 13, 'EAL 2': 4, 'EAL 6': 3}}}}, 'cc_sar': {'__update__': {'ALC': {'__delete__': ['ALC_LCD']}, 'AVA': {'__update__': {'AVA_VAN.4': 6}}}}, 'cc_claims': {'__update__': {'R': {'R.O': 2}}}, 'vendor': {'__update__': {'Infineon': {'__update__': {'Infineon Technologies AG': 15, 'Infineon Technologies': 9}}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__delete__': ['AES-']}}}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 1}}}}, 'randomness': {'__update__': {'RNG': {'__update__': {'RNG': 3}}}}, 'technical_report_id': {'__update__': {'BSI': {'__insert__': {'BSI TR-02102': 1}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'ISO': {'__insert__': {'ISO/IEC 18045': 4}, '__update__': {'ISO/IEC 15408': 4}}}}, 'certification_process': {'__update__': {'ConfidentialDocument': {'and certification procedure is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the product or resulting from the evaluation and certification': 1, 'Documentation - Configuration Management SLB9670_1.2, Infineon Technologies AG, V0.4, 2015-03-31 (confidential document) 8 Specifically: • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung': 1, '9] Evaluation Technical Report BSI-DSZ-CC-0958-2015, V2, 2015-04-14, TÜV Informationstechnik GmbH (confidential document) [10] Evaluation Documentation - SLB9670_1.2 Literature_Reference, Infineon Technologies AG, V0.6': 1, 'confidential document) [11] RFC 2104, HMAC: Keyed-Hashing for Message Authentication, http://www.ietf.org/rfc/rfc2104.txt': 1}}}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__delete__': ['EAL3']}}}, 'cc_sar': {'__update__': {'ADV': {'__insert__': {'ADV_VAN.4': 1}}}}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_GEN.1': 3}}, 'FCO': {'__insert__': {'FCO_NRO': 4}}, 'FCS': {'__insert__': {'FCS_CKM': 8, 'FCS_COP': 19}, '__update__': {'FCS_RNG.1': 22, 'FCS_RNG': 4, 'FCS_COP.1': 6, 'FCS_CKM.4': 10, 'FCS_CKM.1': 9}}, 'FDP': {'__insert__': {'FDP_ACF': 25, 'FDP_ACC': 18, 'FDP_UCT': 4, 'FDP_UIT': 4}, '__update__': {'FDP_ITC.2': 8, 'FDP_ACF.1': 30, 'FDP_RIP.1': 2}}, 'FIA': {'__update__': {'FIA_AFL.1': 4, 'FIA_UAU.4': 2, 'FIA_USB.1': 3}}, 'FMT': {'__insert__': {'FMT_MSA': 36, 'FMT_MTD': 8}, '__update__': {'FMT_SMF.1': 4, 'FMT_MSA.3': 17, 'FMT_MSA.1': 7, 'FMT_SMR.1': 8, 'FMT_MSA.2': 4}}, 'FPR': {'__update__': {'FPR_UNL.1': 3}}, 'FPT': {'__update__': {'FPT_TDC.1': 3, 'FPT_FLS.1': 4, 'FPT_PHP.3': 4, 'FPT_STM.1': 3, 'FPT_TST.1': 3}}}}, 'vendor': {'__update__': {'Infineon': {'__update__': {'Infineon Technologies AG': 12, 'Infineon Technologies': 5}}}, '__delete__': ['STMicroelectronics']}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 21}}}}, 'DES': {'__delete__': ['DES']}, 'constructions': {'__update__': {'MAC': {'__update__': {'HMAC': 8}}}}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA1': {'__update__': {'SHA-1': 32}}}}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 4}}}, '__delete__': ['KA']}, 'randomness': {'__update__': {'RNG': {'__update__': {'RNG': 14}}}, '__delete__': ['TRNG']}, 'tee_name': {}, 'standard_id': {'__update__': {'FIPS': {'__insert__': {'FIPS 180-1': 1}}, 'RFC': {'__update__': {'RFC3447': 4}}}}} data.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1021-2016']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1058-2018', 'BSI-DSZ-CC-1021-V2-2017', 'BSI-DSZ-CC-1057-2018', 'BSI-DSZ-CC-1021-2016', 'BSI-DSZ-CC-1086-2018', 'BSI-DSZ-CC-1100-2018']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_VAN', 'level': 4}]} values added.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PC Client Specific Trusted Platform Module Family 1.2; Level 2, Version 1.1', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0030b.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PC Client Specific Trusted Platform Module Family 1.2; Level 2, Version 1.1', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0030b.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['BSI-CC-PP-030-2008']}}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.

Raw data

{
  "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert",
  "category": "Trusted Computing",
  "cert_link": null,
  "dgst": "d5c7e2e456748263",
  "heuristics": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics",
    "cert_id": "BSI-DSZ-CC-0958-2015",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_dependency_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_VAN",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.2",
        "6.40.0190.00"
      ]
    },
    "indirect_dependency_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0958-V2-2017",
          "BSI-DSZ-CC-1021-2016"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0958-V2-2017",
          "BSI-DSZ-CC-1100-2018",
          "BSI-DSZ-CC-1057-2018",
          "BSI-DSZ-CC-1021-V2-2017",
          "BSI-DSZ-CC-1086-2018",
          "BSI-DSZ-CC-1021-2016",
          "BSI-DSZ-CC-1058-2018"
        ]
      },
      "indirectly_referencing": null
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport",
        "maintenance_date": "2016-05-03",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/0958ma1a_pdf.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/files/epfiles/0958ma1b_pdf.pdf",
        "maintenance_title": "Infineon Technologies AG Trusted Platform Module SLB9670_1.2, v6.40.0190.00 and v6.41.0197.00 and v6.41.0198.00"
      },
      {
        "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport",
        "maintenance_date": "2017-02-23",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/0958ma2a_pdf.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/files/epfiles/0958ma2b_pdf.pdf",
        "maintenance_title": "Infineon Technologies AG Trusted Platform Module SLB9670_1.2, v6.40.0190.00, v6.41.0197.00, v6.41.0198.00, v6.42.0204.00 and v6.42.0205.00"
      }
    ]
  },
  "manufacturer": "Infineon Technologies AG",
  "manufacturer_web": "https://www.infineon.com/",
  "name": "SLB9670_1.2 v6.40.0190.00",
  "not_valid_after": "2020-04-16",
  "not_valid_before": "2015-04-16",
  "pdf_data": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData",
    "report_filename": "0958a_pdf.pdf",
    "report_frontpage": {
      "anssi": {},
      "bsi": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.1 and AVA_VAN.4 Valid until (*): 15 April 2020 SOGIS Recognition Agreement",
        "cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-0958-2015",
        "cert_item": "SLB9670_1.2 v6.40.0190.00",
        "cert_lab": "BSI",
        "developer": "Infineon Technologies AG",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "TCG Protection Profile PC Client Specific TPM, Family 1.2; Level 2 Revision 116, Version: 1.3; 14 July, 2014, BSI-CC-PP-0030-2008-MA-02"
      },
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "RSA": {
          "RSA2048": 1
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0958-2015": 48
        }
      },
      "cc_claims": {
        "O": {
          "O.C": 2
        },
        "R": {
          "R.O": 2
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0030-2008-MA-02": 4
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_FSP": 1,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 1,
          "ADV_FSP.3": 1,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 1,
          "ADV_FSP.6": 1,
          "ADV_IMP": 1,
          "ADV_IMP.1": 1,
          "ADV_IMP.2": 1,
          "ADV_INT": 1,
          "ADV_INT.1": 1,
          "ADV_INT.2": 1,
          "ADV_INT.3": 1,
          "ADV_SPM": 1,
          "ADV_SPM.1": 1,
          "ADV_TDS": 1,
          "ADV_TDS.1": 1,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 1,
          "ADV_TDS.4": 1,
          "ADV_TDS.5": 1,
          "ADV_TDS.6": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.1": 1,
          "ALC_CMC.2": 1,
          "ALC_CMC.3": 1,
          "ALC_CMC.4": 2,
          "ALC_CMC.5": 1,
          "ALC_CMS": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.2": 1,
          "ALC_CMS.3": 1,
          "ALC_CMS.4": 2,
          "ALC_CMS.5": 1,
          "ALC_DEL": 1,
          "ALC_DEL.1": 2,
          "ALC_DVS": 2,
          "ALC_DVS.1": 2,
          "ALC_DVS.2": 1,
          "ALC_FLR": 3,
          "ALC_FLR.1": 7,
          "ALC_FLR.2": 1,
          "ALC_FLR.3": 1,
          "ALC_LCD.1": 2,
          "ALC_LCD.2": 1,
          "ALC_TAT": 1,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 1,
          "ALC_TAT.3": 1
        },
        "APE": {
          "APE_CCL.1": 1,
          "APE_ECD.1": 1,
          "APE_INT.1": 1,
          "APE_OBJ.1": 1,
          "APE_OBJ.2": 1,
          "APE_REQ.1": 1,
          "APE_REQ.2": 1,
          "APE_SPD.1": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 1,
          "ASE_ECD": 1,
          "ASE_ECD.1": 1,
          "ASE_INT": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ": 1,
          "ASE_OBJ.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.1": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS": 1,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 1,
          "ATE_COV.2": 1,
          "ATE_COV.3": 1,
          "ATE_DPT": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.2": 1,
          "ATE_DPT.3": 1,
          "ATE_DPT.4": 1,
          "ATE_FUN": 3,
          "ATE_FUN.1": 1,
          "ATE_FUN.2": 1,
          "ATE_IND": 2,
          "ATE_IND.1": 1,
          "ATE_IND.2": 1,
          "ATE_IND.3": 1
        },
        "AVA": {
          "AVA_VAN": 3,
          "AVA_VAN.1": 1,
          "AVA_VAN.2": 1,
          "AVA_VAN.3": 1,
          "AVA_VAN.4": 6,
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 7,
          "EAL 2": 4,
          "EAL 3": 4,
          "EAL 4": 13,
          "EAL 4 augmented": 3,
          "EAL 5": 6,
          "EAL 6": 3,
          "EAL 7": 4,
          "EAL5+": 1,
          "EAL6": 1
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "9] Evaluation Technical Report BSI-DSZ-CC-0958-2015, V2, 2015-04-14, T\u00dcV Informationstechnik GmbH (confidential document) [10] Evaluation Documentation - SLB9670_1.2 Literature_Reference, Infineon Technologies AG, V0.6": 1,
          "Documentation - Configuration Management SLB9670_1.2, Infineon Technologies AG, V0.4, 2015-03-31 (confidential document) 8 Specifically: \u2022 AIS 1, Version 13, Durchf\u00fchrung der Ortsbesichtigung in der Entwicklungsumgebung": 1,
          "and certification procedure is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the product or resulting from the evaluation and certification": 1,
          "confidential document) [11] RFC 2104, HMAC: Keyed-Hashing for Message Authentication, http://www.ietf.org/rfc/rfc2104.txt": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "CTR": {
          "CTR": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 2
        },
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "TUViT": 1,
          "T\u00dcV Informationstechnik": 3,
          "T\u00dcViT": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 4
          },
          "SHA2": {
            "SHA-256": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 1,
          "RNG": 3
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Fault Injection": 1,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 2,
          "SPA": 1,
          "side channel": 1
        },
        "other": {
          "JIL": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 1": 1,
          "AIS 14": 1,
          "AIS 19": 1,
          "AIS 20": 2,
          "AIS 25": 1,
          "AIS 26": 1,
          "AIS 31": 2,
          "AIS 32": 1,
          "AIS 34": 2,
          "AIS 37": 1,
          "AIS 38": 1,
          "AIS 41": 1,
          "AIS 46": 1,
          "AIS20": 2,
          "AIS31": 1
        },
        "FIPS": {
          "FIPS180-2": 5,
          "FIPS197": 2
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        },
        "NIST": {
          "SP 800-108": 1
        },
        "PKCS": {
          "PKCS #1": 1,
          "PKCS#1": 6
        },
        "RFC": {
          "RFC 2104": 1,
          "RFC2104": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 6
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 5
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7125": 2,
          "BSI 7138": 2,
          "BSI 7148": 1,
          "BSI TR-02102": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 4,
          "Infineon Technologies": 9,
          "Infineon Technologies AG": 15
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20150422071632+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, TPM, Infineon\"",
      "/ModDate": "D:20150422144720+02\u002700\u0027",
      "/Producer": "LibreOffice 4.2",
      "/Subject": "Common Criteria Zertifizierung",
      "/Title": "Certification Report BSI-DSZ-CC-0958-2015",
      "pdf_file_size_bytes": 1466603,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.d/",
          "http://www.ietf.org/rfc/rfc2104.txt",
          "https://www.bsi.bund.de/",
          "https://www.bsi.bund.de/zertifizierung"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 42
    },
    "st_filename": "0958b_pdf.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          }
        },
        "RSA": {
          "RSA 512": 5,
          "RSA-2048": 1,
          "RSA2048": 1
        }
      },
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0030-2008-MA-02": 1,
          "BSI-PP-0030-2008-MA-02": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1,
          "ADV_VAN.4": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR.1": 3,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.4": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 2,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 3
        },
        "FCO": {
          "FCO_NRO": 4,
          "FCO_NRO.1": 1
        },
        "FCS": {
          "FCS_CKM": 8,
          "FCS_CKM.1": 9,
          "FCS_CKM.2": 2,
          "FCS_CKM.4": 10,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 19,
          "FCS_COP.1": 6,
          "FCS_RNG": 4,
          "FCS_RNG.1": 22,
          "FCS_RNG.1.1": 2,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC": 18,
          "FDP_ACC.1": 9,
          "FDP_ACF": 25,
          "FDP_ACF.1": 30,
          "FDP_ETC.2": 3,
          "FDP_IFC.1": 1,
          "FDP_ITC.1": 5,
          "FDP_ITC.2": 8,
          "FDP_RIP.1": 2,
          "FDP_TDC.1": 1,
          "FDP_UCT": 4,
          "FDP_UCT.1": 1,
          "FDP_UIT": 4,
          "FDP_UIT.1": 1
        },
        "FIA": {
          "FIA_AFL.1": 4,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_UAU.1": 5,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.4": 2,
          "FIA_UAU.5": 4,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6": 3,
          "FIA_UID.1": 5,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB.1": 3
        },
        "FMT": {
          "FMT_MSA": 36,
          "FMT_MSA.1": 7,
          "FMT_MSA.2": 4,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 17,
          "FMT_MTD": 8,
          "FMT_MTD.1": 1,
          "FMT_SMF.1": 4,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 8
        },
        "FPR": {
          "FPR_UNL.1": 3
        },
        "FPT": {
          "FPT_FLS.1": 4,
          "FPT_FLS.1.1": 1,
          "FPT_PHP.3": 4,
          "FPT_PHP.3.1": 1,
          "FPT_STM.1": 3,
          "FPT_TDC.1": 3,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 1,
          "FPT_TST.1": 3
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        },
        "CTR": {
          "CTR": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 4
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 32
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 1,
          "RNG": 14
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1
        },
        "SCA": {
          "DPA": 1,
          "SPA": 1,
          "physical probing": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 1
        },
        "CC": {
          "CCMB-2012-09-001": 2,
          "CCMB-2012-09-002": 2,
          "CCMB-2012-09-003": 2,
          "CCMB-2012-09-004": 1
        },
        "FIPS": {
          "FIPS 180-1": 1,
          "FIPS PUB 140-1": 3,
          "FIPS PUB 180-2": 3,
          "FIPS PUB 197": 3
        },
        "PKCS": {
          "PKCS #1": 1,
          "PKCS#1": 5
        },
        "RFC": {
          "RFC 2104": 1,
          "RFC2104": 3,
          "RFC3447": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 21
          }
        },
        "DES": {
          "3DES": {
            "Triple-DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 8
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon Technologies": 5,
          "Infineon Technologies AG": 12
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Noller",
      "/CreationDate": "D:20150331095209+02\u002700\u0027",
      "/Creator": "Microsoft Word - SLB9670_SecTar.doc",
      "/ModDate": "D:20150331095216+02\u002700\u0027",
      "/Producer": "Nuance PDF Create 8",
      "/Title": "Microsoft Word - SLB9670_SecTar.doc",
      "pdf_file_size_bytes": 1316328,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.infineon.com/",
          "http://www.ietf.org/rfc/rfc2104.txt",
          "http://www.rsa.com/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 66
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "BSI-CC-PP-030-2008"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0030b.pdf",
        "pp_name": "PC Client Specific Trusted Platform Module Family 1.2; Level 2, Version 1.1"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/0958a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_FLR.1",
      "AVA_VAN.4"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/0958b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState",
    "errors": [],
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "616cd6fa62f92830f5ee3905d8dc41d2724eda60637798ee0490e2641a1da78c",
    "report_txt_hash": "691813e244dcaa4f829c4ffca24ecd5ecf7a1544fcead8d41663b7e7bb92bd34",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "8e947b567157b3e15beaf1d05855cb530d3aa1bc44258afaff8a4c774f28ff59",
    "st_txt_hash": "b6251dc69d30058acec74308f47213f3af5ed871b30b3223695f5dc39c7fcc3a"
  },
  "status": "archived"
}