This page was not yet optimized for use on mobile
devices.
Aselsan STC-8250A v1.1
CSV information
| Status | archived |
|---|---|
| Valid from | 08.06.2018 |
| Valid until | 08.06.2023 |
| Scheme | 🇪🇸 ES |
| Manufacturer | Aselsan A.S. |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | EAL4+, ATE_DPT.2, AVA_VAN.5 |
| Protection profiles |
Heuristics summary
Certificate ID: 2012-32-INF-2355
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Security level
EAL4, EAL4 augmentedClaims
T.I, A.SSecurity Assurance Requirements (SAR)
ALC_FLR, ATE_DPT.2, AVA_VAN.5Protection profiles
BSI-CC-PP-0057Certification report
Extracted keywords
Vendor
STMSecurity level
EAL4, EAL4+, EAL 4, EAL 1, EAL 2, EAL2, ITSEC EvaluationClaims
A.SSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DVS.1, ALC_TAT.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR, ATE_DPT.2, ATE_COV.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Certificates
2012-32-INF-2355 v1File metadata
| Creation date | D:20180621163401+02'00' |
|---|---|
| Modification date | D:20180621163401+02'00' |
| Pages | 13 |
| Creator | Microsoft® Word 2013 |
| Producer | Microsoft® Word 2013 |
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, TDESAsymmetric Algorithms
ECDSAHash functions
SHA-1, SHA-256Elliptic Curves
Curve P-192, P-192Block cipher modes
ECB, CBC, OFBSecurity level
EAL4, EAL4 augmentedClaims
OSP.PKISecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ADV_ARC, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DVS.1, ALC_TAT.1, ALC_DEL.1, ALC_LCD.1, ATE_DPT.2, ATE_COV.2, ATE_FUN.1, ATE_IND.2, ATE_DPT.1, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_ECDSecurity Functional Requirements (SFR)
FAU_GEN, FAU_STG, FAU_SAR, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.4, FAU_STG.3, FAU_STG.4.1, FCO_NRO, FCO_NRO.1, FCO_NRO.1.1, FCO_NRO.1.2, FCO_NRO.1.3, FCS_COP, FCS_CKM, FCS_CKM.2, FCS_CKM.3, FCS_CKM.4, FCS_COP.1, FCS_CKM.1, FCS_CKM.4.1, FDP_ACC, FDP_ACF, FDP_ETC, FDP_ETC.2, FDP_RIP.1, FDP_ITC, FDP_SDI, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACF.1, FDP_ACF.1.1, FDP_IFC.1, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_RIP, FDP_RIP.1.1, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FIA_UID, FIA_UAU, FIA_AFL, FIA_ATD, FIA_UID.1, FIA_AFL.1, FIA_ATD.1, FIA_UAU.1, FIA_UID.2, FIA_UAU.2, FIA_UAU.3, FIA_UAU.5, FIA_UAU.6, FMT_SMR, FMT_MSA.1, FMT_SMF.1, FMT_MSA, FMT_MOF, FMT_MOF.1, FMT_SMF, FMT_MSA.1.1, FMT_MSA.3, FMT_SMF.1.1, FMT_SMR.1, FPR_UNO, FPR_UNO.1, FPR_UNO.1.1, FPT_STM, FPT_TDC, FPT_FLS, FPT_PHP, FPT_TST, FPT_STM.1, FPT_FLS.1, FPT_FLS.1.1, FPT_PHP.1, FPT_PHP.2, FPT_PHP.3, FPT_PHP.3.1, FPT_STM.1.1, FPT_TDC.1, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FRU_PRS, FRU_PRS.1, FRU_PRS.1.1, FRU_PRS.1.2, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-CC-PP-0057Side-channel analysis
physical tampering, reverse engineering, JILCertification process
out of scope, REQ105b, at least 365 days) is also out of scope of the formal content of FAU_STG.4, respective part of requirement for ‘specific conditions data’ (REQ105b, at least 365 days) is also out of scope of the formal content of FAU_STG.4. 7.1.2 Class FCO Communication 7.1.2.1 FCO_NRO Non-repudiationStandards
FIPS PUB 46-3, FIPS 186-2, FIPS 180-2, FIPS PUB 197, PKCS1, PKCS#1, ISO/IEC 7816-4, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
| Title | Security Target |
|---|---|
| Author | ASELSAN A.Ş. |
| Creation date | D:20180427084044+03'00' |
| Modification date | D:20180621163459+02'00' |
| Pages | 118 |
| Creator | Microsoft® Word 2013 |
| Producer | Microsoft® Word 2013 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
2012-32-INF-2355Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.5References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2012-32-CCRA.pdf",
"dgst": "07673dda55ca6b09",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "2012-32-INF-2355",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.1"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"d29f1d59475a76cf"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Aselsan A.S.",
"manufacturer_web": "https://www.aselsan.com.tr",
"name": "Aselsan STC-8250A v1.1",
"not_valid_after": "2023-06-08",
"not_valid_before": "2018-06-08",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "2012-32-CCRA.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.S": 1
},
"T": {
"T.I": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0057": 1
}
},
"cc_sar": {
"ALC": {
"ALC_FLR": 1
},
"ATE": {
"ATE_DPT.2": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL4": 1,
"EAL4 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "2012-32-INF-2355.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"ES": {
"2012-32-INF-2355 v1": 1
}
},
"cc_claims": {
"A": {
"A.S": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR": 3,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.2": 7,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 8
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 1,
"EAL 4": 3,
"EAL2": 1,
"EAL4": 7,
"EAL4+": 1
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"STMicroelectronics": {
"STM": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20180621163401+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2013",
"/ModDate": "D:20180621163401+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2013",
"pdf_file_size_bytes": 888193,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://oc.ccn.cni.es/",
"https://www.sogis.org/",
"http://www.commoncriteriaportal.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 13
},
"st_filename": "2012-32-ST.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 6
}
}
},
"cc_cert_id": {},
"cc_claims": {
"OSP": {
"OSP.PKI": 7
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0057": 3
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 2,
"ADV_ARC.1": 3,
"ADV_FSP.4": 2,
"ADV_IMP.1": 1,
"ADV_TDS.3": 3
},
"AGD": {
"AGD_OPE.1": 2,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 7,
"ATE_FUN.1": 2,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 7
}
},
"cc_security_level": {
"EAL": {
"EAL4": 11,
"EAL4 augmented": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 13,
"FAU_GEN.1": 33,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAR": 3,
"FAU_SAR.1": 8,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_STG": 5,
"FAU_STG.1": 9,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.3": 1,
"FAU_STG.4": 8,
"FAU_STG.4.1": 1
},
"FCO": {
"FCO_NRO": 3,
"FCO_NRO.1": 8,
"FCO_NRO.1.1": 1,
"FCO_NRO.1.2": 1,
"FCO_NRO.1.3": 1
},
"FCS": {
"FCS_CKM": 39,
"FCS_CKM.1": 6,
"FCS_CKM.2": 12,
"FCS_CKM.3": 12,
"FCS_CKM.4": 25,
"FCS_CKM.4.1": 1,
"FCS_COP": 49,
"FCS_COP.1": 6
},
"FDP": {
"FDP_ACC": 113,
"FDP_ACC.1": 11,
"FDP_ACF": 104,
"FDP_ACF.1": 29,
"FDP_ACF.1.1": 2,
"FDP_ETC": 3,
"FDP_ETC.2": 20,
"FDP_ETC.2.1": 1,
"FDP_ETC.2.2": 1,
"FDP_ETC.2.3": 1,
"FDP_ETC.2.4": 1,
"FDP_IFC.1": 5,
"FDP_ITC": 37,
"FDP_ITC.1": 14,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_ITC.2": 17,
"FDP_RIP": 2,
"FDP_RIP.1": 12,
"FDP_RIP.1.1": 1,
"FDP_SDI": 3,
"FDP_SDI.2": 9,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1
},
"FIA": {
"FIA_AFL": 17,
"FIA_AFL.1": 5,
"FIA_ATD": 9,
"FIA_ATD.1": 1,
"FIA_UAU": 120,
"FIA_UAU.1": 7,
"FIA_UAU.2": 2,
"FIA_UAU.3": 6,
"FIA_UAU.5": 2,
"FIA_UAU.6": 3,
"FIA_UID": 48,
"FIA_UID.1": 4,
"FIA_UID.2": 6
},
"FMT": {
"FMT_MOF": 5,
"FMT_MOF.1": 8,
"FMT_MSA": 90,
"FMT_MSA.1": 18,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 12,
"FMT_SMF": 3,
"FMT_SMF.1": 12,
"FMT_SMF.1.1": 1,
"FMT_SMR": 19,
"FMT_SMR.1": 2
},
"FPR": {
"FPR_UNO": 3,
"FPR_UNO.1": 8,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_FLS": 3,
"FPT_FLS.1": 9,
"FPT_FLS.1.1": 1,
"FPT_PHP": 17,
"FPT_PHP.1": 2,
"FPT_PHP.2": 6,
"FPT_PHP.3": 8,
"FPT_PHP.3.1": 1,
"FPT_STM": 5,
"FPT_STM.1": 12,
"FPT_STM.1.1": 1,
"FPT_TDC": 27,
"FPT_TDC.1": 4,
"FPT_TST": 3,
"FPT_TST.1": 6,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FRU": {
"FRU_PRS": 3,
"FRU_PRS.1": 5,
"FRU_PRS.1.1": 1,
"FRU_PRS.1.2": 1
},
"FTP": {
"FTP_ITC.1": 3,
"FTP_TRP.1": 2
}
},
"certification_process": {
"OutOfScope": {
"REQ105b, at least 365 days) is also out of scope of the formal content of FAU_STG.4": 1,
"out of scope": 1,
"respective part of requirement for \u2018specific conditions data\u2019 (REQ105b, at least 365 days) is also out of scope of the formal content of FAU_STG.4. 7.1.2 Class FCO Communication 7.1.2.1 FCO_NRO Non-repudiation": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"ECB": {
"ECB": 2
},
"OFB": {
"OFB": 4
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {
"NIST": {
"Curve P-192": 2,
"P-192": 2
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 2
},
"SHA2": {
"SHA-256": 4
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {
"org": {
"org.tr": 1
}
},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"physical tampering": 13
},
"other": {
"JIL": 3,
"reverse engineering": 3
}
},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 2,
"CCMB-2012-09-002": 2,
"CCMB-2012-09-003": 2,
"CCMB-2012-09-004": 2
},
"FIPS": {
"FIPS 180-2": 1,
"FIPS 186-2": 1,
"FIPS PUB 197": 1,
"FIPS PUB 46-3": 2
},
"ISO": {
"ISO/IEC 7816-4": 2
},
"PKCS": {
"PKCS#1": 1,
"PKCS1": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 6
}
},
"DES": {
"3DES": {
"TDES": 6
},
"DES": {
"DES": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "ASELSAN A.\u015e.",
"/CreationDate": "D:20180427084044+03\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2013",
"/ModDate": "D:20180621163459+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2013",
"/Title": "Security Target",
"pdf_file_size_bytes": 2788083,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://dtc.jrc.ec.europa.eu/",
"http://staum.tobb.org.tr/",
"file:///D:/l"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 118
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0057b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2012-32-INF-2355.pdf",
"scheme": "ES",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"ATE_DPT.2",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2012-32-ST.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "c1d5ce5901e2c354063e8fbc0e1dc9fcd395b802d9e48b3f05366d6a1b5b19ea",
"txt_hash": "7f8ab22d61ee87913556e1ad178111175f74ac28a3fa127efbf8f6d518f20791"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "d37c126925379877ba43bd85a920ec84da2788ca4fecbf0a279c8e420b15366b",
"txt_hash": "22ea2c4e0978e16db7f2e4c1efd93714b013cec83143de1884bc9ed5e6beeea2"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "5904d2ec965683bde99aab6dd79179a7a587b00d51d142b54cb96821c36bdeba",
"txt_hash": "64328eca8d1046078a7f8ec414e0800670b304f2468409e69d394e280df32bac"
}
},
"status": "archived"
}