High Sec Labs DK82PHU-4TR, SX42PHU-4TR, SX82PHU-4TR, SC42PHU-4TR, SC82PHU-4TR, SC162PHU-4TR Ruggedized KVM Devices Firmware Version 44444 R7R7

CSV information

Status active
Valid from 28.11.2025
Valid until 28.11.2030
Scheme 🇨🇦 CA
Manufacturer High Security Labs Ltd.
Category Other Devices and Systems
Security level
Protection profiles

Heuristics summary

Certificate ID: 671-EWA

Certificate

certificate file processing did not finish successfully.
Download pdf: OK
Convert pdf to text: OK
Extract keywords: ERROR

Extracted keywords

Certificates
671-EWA
Evaluation facilities
EWA-Canada

Certification report

Extracted keywords

Asymmetric Algorithms
DH

Evaluation facilities
EWA-Canada

Standards
ISO/IEC 17025

File metadata

Author Sinitski, Kiril
Creation date D:20251203071958-05'00'
Modification date D:20251203071958-05'00'
Pages 16
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

Security target

Extracted keywords

Asymmetric Algorithms
DH

Device models
STM32F446ZCT6, STM32F446ZET7, STM32F072C8U6
Vendor
NXP

Claims
O.COMPUTER, O.USER_DATA, O.NO_USER, O.NO_OTHER, O.LEAK, O.AUTHORIZED, O.PERIPHERAL, O.REJECT, O.NO_TOE_ACCESS, O.TAMPER, O.ANTI_TAMPERING, O.SELF_TEST, O.EMULATED_INPUT, O.UNIDIRECTIONAL, O.USER, O.SESSION, O.PROTECTED, O.PERIPHERAL_PORTS, O.PROTECTED_EDID, O.LEAK_PREVENTION, O.NO_USER_DATA, O.TAMPER_EVIDENT, O.SELF_TEST_FAIL, T.DATA_LEAK, T.SIGNAL_LEAK, T.RESIDUAL_LEAK, T.UNINTENDED_USE, T.UNAUTHORIZED_DEVICES, T.LOGICAL_TAMPER, T.PHYSICAL_TAMPER, T.REPLACEMENT, T.FAILED, T.RESIDUAL, T.UNINTENDED, T.UNAUTHORIZED, T.LOGICAL, T.PHYSICAL, A.NO_TEMPEST, A.PHYSICAL, A.NO_WIRELESS_DEVICES, A.TRUSTED_ADMIN, A.TRUSTED_CONFIG, A.USER_ALLOWED_ACCESS, A.NO_SPECIAL_ANALOG, A.NO_WIRELESS, A.TRUSTED, A.USER_ALLOWED, A.NO_SPECIAL, A.NO_PHYSICAL, OE.NO_TEMPEST, OE.PHYSICAL, OE.NO_WIRELESS_DEVICES, OE.TRUSTED_ADMIN, OE.TRUSTED_CONFIG, OE.NO_SPECIAL_ANALOG, OE.NO_WIRELESS, OE.TRUSTED, OE.NO_SPECIAL
Security Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FDP_APC_EXT.1, FDP_IPC_EXT.1, FDP_APC_EXT, FDP_PDC_EXT.1, FDP_FIL_EXT, FDP_RDR_EXT.1, FDP_SWI_EXT.3, FDP_PDC_EXT, FDP_PDC_EXT.4, FDP_PWR_EXT.1, FDP_SWI_EXT.2, FDP_RIP_EXT.1, FDP_RIP, FDP_SWI_EXT.1, FDP_CDS_EXT.1, FDP_SPR_EXT, FDP_UDF_EXT, FDP_UAI_EXT.1, FDP_TER_EXT.1, FDP_TER_EXT.2, FDP_TER_EXT.3, FDP_CDS_EXT, FDP_IPC_EXT, FDP_PWR_EXT, FDP_RDR_EXT, FDP_RIP_EXT, FDP_SWI_EXT, FDP_TER_EXT, FDP_UAI_EXT, FDP_CDS_EXT.1.1, FDP_FIL_EXT.1, FDP_IPC_EXT.1.1, FDP_IPC_EXT.1.2, FDP_PDC_EXT.1.1, FDP_PDC_EXT.1.2, FDP_PDC_EXT.1.3, FDP_PDC_EXT.1.4, FDP_PDC_EXT.1.5, FDP_PDC_EXT.2, FDP_PDC_EXT.3, FDP_PDC_EXT.4.1, FDP_PWR_EXT.1.1, FDP_RDR_EXT.1.1, FDP_RIP.1, FDP_RIP_EXT.1.1, FDP_SPR_EXT.1, FDP_SWI_EXT.1.1, FDP_SWI_EXT.2.1, FDP_SWI_EXT.2.2, FDP_SWI_EXT.3.1, FDP_TER_EXT.1.1, FDP_TER_EXT.2.1, FDP_TER_EXT.3.1, FDP_TER_EXT.3.2, FDP_UAI_EXT.1.1, FDP_UDF_EXT.1, FPT_STM.1, FPT_PHP.3, FPT_NTA_EXT.1, FPT_PHP.1, FPT_TST.1, FPT_FLS_EXT.1, FPT_TST_EXT.1, FPT_FLS_EXT, FPT_NTA_EXT, FPT_TST_EXT, FPT_FLS_EXT.1.1, FPT_NTA_EXT.1.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_TST_EXT.1.1, FTA_CIN_EXT.1, FTA_CIN_EXT, FTA_CIN_EXT.1.1, FTA_CIN_EXT.1.2, FTA_CIN_EXT.1.3
Evaluation facilities
EWA-Canada, Intertek

Side-channel analysis
physical tampering

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Author Michelle Ruppel
Creation date D:20251125120342-05'00'
Modification date D:20251125120342-05'00'
Pages 67
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

671-EWA

Extracted SARs

ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_IND.1, AVA_VAN.1

Scheme data

Product High Sec Labs DK82PHU-4TR, SX42PHU- 4TR, SX82PHU-4TR, SC42PHU 4TR, SC82PHU-4TR, SC162PHU-4TR Ruggedized KVM Devices Firmware Version 44444 R7R7
Vendor High Sec Labs Ltd.
Level PP_PSD_V4.0 MOD_KM_V1.0 MOD_UA_V1.0 MOD_VI_V1.0
Certification Date 28.11.2025

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/671-EWA%20CT.pdf",
  "dgst": "0120484e78bfc16b",
  "heuristics": {
    "_type": "sec_certs.sample.cc_eucc_common.Heuristics",
    "annotated_references": null,
    "cert_id": "671-EWA",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL1",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "44444"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "76f8f05a35d87f59",
        "48f73a122587b992",
        "42cf355b24450489",
        "814f66c77bc7f33b"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "certification_date": "2025-11-28",
      "level": "PP_PSD_V4.0 MOD_KM_V1.0 MOD_UA_V1.0 MOD_VI_V1.0",
      "product": "High Sec Labs DK82PHU-4TR, SX42PHU- 4TR, SX82PHU-4TR, SC42PHU 4TR, SC82PHU-4TR, SC162PHU-4TR Ruggedized KVM Devices Firmware Version 44444 R7R7",
      "vendor": "High Sec Labs Ltd."
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "High Security Labs Ltd.",
  "manufacturer_web": "https://www.highseclabs.com/",
  "name": "High Sec Labs DK82PHU-4TR, SX42PHU-4TR, SX82PHU-4TR, SC42PHU-4TR, SC82PHU-4TR, SC162PHU-4TR Ruggedized KVM Devices Firmware Version 44444 R7R7",
  "not_valid_after": "2030-11-28",
  "not_valid_before": "2025-11-28",
  "pdf_data": {
    "_type": "sec_certs.sample.cc_eucc_common.PdfData",
    "cert_filename": "671-EWA CT.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "CA": {
          "671-EWA": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "EWA": {
          "EWA-Canada": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": null,
    "report_filename": "671-EWA CR.pdf",
    "report_frontpage": {
      "CA": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "DH": 1
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "EWA": {
          "EWA-Canada": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 17025": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Sinitski, Kiril",
      "/CreationDate": "D:20251203071958-05\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ActionId": "f4235719-a1a3-4fb4-8b18-a47ac84bac11",
      "/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ContentBits": "1",
      "/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Enabled": "true",
      "/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Method": "Privileged",
      "/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Name": "UNCLASSIFIED",
      "/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SetDate": "2022-07-20T10:41:47Z",
      "/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SiteId": "da9cbe40-ec1e-4997-afb3-17d87574571a",
      "/ModDate": "D:20251203071958-05\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 802683,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "https://nvd.nist.gov/vuln/search",
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 16
    },
    "st_filename": "671-EWA ST v1.0.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "DH": 1
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.NO_PHYSICAL": 1,
          "A.NO_SPECIAL": 1,
          "A.NO_SPECIAL_ANALOG": 1,
          "A.NO_TEMPEST": 2,
          "A.NO_WIRELESS": 1,
          "A.NO_WIRELESS_DEVICES": 1,
          "A.PHYSICAL": 2,
          "A.TRUSTED": 1,
          "A.TRUSTED_ADMIN": 2,
          "A.TRUSTED_CONFIG": 1,
          "A.USER_ALLOWED": 1,
          "A.USER_ALLOWED_ACCESS": 1
        },
        "O": {
          "O.ANTI_TAMPERING": 2,
          "O.AUTHORIZED": 2,
          "O.COMPUTER": 5,
          "O.EMULATED_INPUT": 3,
          "O.LEAK": 1,
          "O.LEAK_PREVENTION": 1,
          "O.NO_OTHER": 3,
          "O.NO_TOE_ACCESS": 2,
          "O.NO_USER": 1,
          "O.NO_USER_DATA": 1,
          "O.PERIPHERAL": 1,
          "O.PERIPHERAL_PORTS": 1,
          "O.PROTECTED": 1,
          "O.PROTECTED_EDID": 3,
          "O.REJECT": 4,
          "O.SELF_TEST": 4,
          "O.SELF_TEST_FAIL": 2,
          "O.SESSION": 5,
          "O.TAMPER": 1,
          "O.TAMPER_EVIDENT": 2,
          "O.UNIDIRECTIONAL": 7,
          "O.USER": 4,
          "O.USER_DATA": 2
        },
        "OE": {
          "OE.NO_SPECIAL": 1,
          "OE.NO_SPECIAL_ANALOG": 1,
          "OE.NO_TEMPEST": 2,
          "OE.NO_WIRELESS": 1,
          "OE.NO_WIRELESS_DEVICES": 1,
          "OE.PHYSICAL": 3,
          "OE.TRUSTED": 2,
          "OE.TRUSTED_ADMIN": 1,
          "OE.TRUSTED_CONFIG": 1
        },
        "T": {
          "T.DATA_LEAK": 2,
          "T.FAILED": 2,
          "T.LOGICAL": 1,
          "T.LOGICAL_TAMPER": 1,
          "T.PHYSICAL": 1,
          "T.PHYSICAL_TAMPER": 1,
          "T.REPLACEMENT": 2,
          "T.RESIDUAL": 1,
          "T.RESIDUAL_LEAK": 1,
          "T.SIGNAL_LEAK": 2,
          "T.UNAUTHORIZED": 1,
          "T.UNAUTHORIZED_DEVICES": 1,
          "T.UNINTENDED": 1,
          "T.UNINTENDED_USE": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.1": 1,
          "ALC_CMS.1": 1,
          "ALC_FLR": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_IND.1": 1
        },
        "AVA": {
          "AVA_VAN.1": 1
        }
      },
      "cc_security_level": {},
      "cc_sfr": {
        "FDP": {
          "FDP_APC_EXT": 30,
          "FDP_APC_EXT.1": 17,
          "FDP_CDS_EXT": 1,
          "FDP_CDS_EXT.1": 5,
          "FDP_CDS_EXT.1.1": 1,
          "FDP_FIL_EXT": 23,
          "FDP_FIL_EXT.1": 6,
          "FDP_IPC_EXT": 1,
          "FDP_IPC_EXT.1": 6,
          "FDP_IPC_EXT.1.1": 1,
          "FDP_IPC_EXT.1.2": 1,
          "FDP_PDC_EXT": 34,
          "FDP_PDC_EXT.1": 33,
          "FDP_PDC_EXT.1.1": 1,
          "FDP_PDC_EXT.1.2": 1,
          "FDP_PDC_EXT.1.3": 1,
          "FDP_PDC_EXT.1.4": 1,
          "FDP_PDC_EXT.1.5": 1,
          "FDP_PDC_EXT.2": 7,
          "FDP_PDC_EXT.3": 6,
          "FDP_PDC_EXT.4": 10,
          "FDP_PDC_EXT.4.1": 1,
          "FDP_PWR_EXT": 1,
          "FDP_PWR_EXT.1": 10,
          "FDP_PWR_EXT.1.1": 1,
          "FDP_RDR_EXT": 1,
          "FDP_RDR_EXT.1": 10,
          "FDP_RDR_EXT.1.1": 1,
          "FDP_RIP": 5,
          "FDP_RIP.1": 1,
          "FDP_RIP_EXT": 1,
          "FDP_RIP_EXT.1": 5,
          "FDP_RIP_EXT.1.1": 1,
          "FDP_SPR_EXT": 13,
          "FDP_SPR_EXT.1": 2,
          "FDP_SWI_EXT": 1,
          "FDP_SWI_EXT.1": 6,
          "FDP_SWI_EXT.1.1": 1,
          "FDP_SWI_EXT.2": 12,
          "FDP_SWI_EXT.2.1": 1,
          "FDP_SWI_EXT.2.2": 1,
          "FDP_SWI_EXT.3": 10,
          "FDP_SWI_EXT.3.1": 1,
          "FDP_TER_EXT": 1,
          "FDP_TER_EXT.1": 5,
          "FDP_TER_EXT.1.1": 1,
          "FDP_TER_EXT.2": 5,
          "FDP_TER_EXT.2.1": 1,
          "FDP_TER_EXT.3": 5,
          "FDP_TER_EXT.3.1": 1,
          "FDP_TER_EXT.3.2": 1,
          "FDP_UAI_EXT": 1,
          "FDP_UAI_EXT.1": 5,
          "FDP_UAI_EXT.1.1": 1,
          "FDP_UDF_EXT": 12,
          "FDP_UDF_EXT.1": 2
        },
        "FPT": {
          "FPT_FLS_EXT": 1,
          "FPT_FLS_EXT.1": 5,
          "FPT_FLS_EXT.1.1": 2,
          "FPT_NTA_EXT": 1,
          "FPT_NTA_EXT.1": 4,
          "FPT_NTA_EXT.1.1": 1,
          "FPT_PHP.1": 6,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 4,
          "FPT_STM.1": 1,
          "FPT_TST.1": 5,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1,
          "FPT_TST_EXT": 1,
          "FPT_TST_EXT.1": 6,
          "FPT_TST_EXT.1.1": 1
        },
        "FTA": {
          "FTA_CIN_EXT": 1,
          "FTA_CIN_EXT.1": 7,
          "FTA_CIN_EXT.1.1": 1,
          "FTA_CIN_EXT.1.2": 1,
          "FTA_CIN_EXT.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {
        "STM": {
          "STM32": {
            "STM32F072C8U6": 1,
            "STM32F446ZCT6": 2,
            "STM32F446ZET7": 1
          }
        }
      },
      "ecc_curve": {},
      "eval_facility": {
        "EWA": {
          "EWA-Canada": 1
        },
        "Intertek": {
          "Intertek": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 7
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 2
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Michelle Ruppel",
      "/CreationDate": "D:20251125120342-05\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20251125120342-05\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 1233454,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.niap-ccevs.org/technical-decisions/TD0593",
          "https://www.niap-ccevs.org/technical-decisions/TD0514",
          "https://www.niap-ccevs.org/technical-decisions/TD0507",
          "https://www.niap-ccevs.org/technical-decisions/TD0518",
          "https://www.niap-ccevs.org/technical-decisions/TD0620",
          "https://www.niap-ccevs.org/technical-decisions/TD0804",
          "https://www.niap-ccevs.org/technical-decisions/TD0842",
          "https://www.niap-ccevs.org/technical-decisions/TD0619",
          "https://www.niap-ccevs.org/technical-decisions/TD0844",
          "https://www.niap-ccevs.org/technical-decisions/TD0506",
          "https://www.niap-ccevs.org/technical-decisions/TD0686",
          "https://www.niap-ccevs.org/technical-decisions/TD0584",
          "mailto:[email protected]",
          "https://highseclabs.com/quick-start-guides/",
          "https://www.niap-ccevs.org/technical-decisions/TD0539",
          "https://www.niap-ccevs.org/technical-decisions/TD0583",
          "https://www.niap-ccevs.org/technical-decisions/TD0681"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 67
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_km_v1.0.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_ua_v1.0.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vi_v1.0.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psd_v4.0.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/671-EWA%20CR.pdf",
  "scheme": "CA",
  "security_level": {
    "_type": "Set",
    "elements": []
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/671-EWA%20ST%20v1.0.pdf",
  "state": {
    "_type": "sec_certs.sample.cc_eucc_common.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": false,
      "json_hash": null,
      "pdf_hash": "9c2f020d4baa956903c6230bf0157a0674ca063365e5894c6811023501a9cbc1",
      "txt_hash": "f68a3e7500992af3afb22e3ac67060047cd1c8ac7f3c8385bc20d682e5f58176"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "ba8144419a977799631885d7dc3694ed2c94acaff3d0ce16c347e2c3f5af209e",
      "txt_hash": "22dd7e15d5db5387f19cec73f349976fb94f7708b5a4a1813a58bb010398f582"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "3b82f73e14690870d6b00c12646b531512c676189992ebbc86e28a0e9f43a5e4",
      "txt_hash": "e45d0506f08d46286f70fc598fc408f85defb41af0a49d36cfff77c48e58e1a3"
    }
  },
  "status": "active"
}