ChipDoc v3.1 on JCOP 4 P71 in ICAO EAC(1&2) with PACE configurationVersion 3.1.6.52 (ANSSI-CC-2021/19-R01v2)

CSV information

Status active
Valid from 16.02.2026
Valid until 12.02.2031
Scheme 🇫🇷 FR
Manufacturer NXP Semiconductors Germany GmbH
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, EAL5+, ALC_DVS.2
Protection profiles

Heuristics summary

Certificate ID: ANSSI-CC-2021/19-R01v2

Certificate

certificate file processing did not finish successfully.
Download pdf: OK
Convert pdf to text: OK
Extract keywords: ERROR

Extracted keywords

Protocols
PACE

Operating System name
JCOP 4
Vendor
NXP

Security level
EAL5, EAL2
Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5
Protection profiles
BSI-CC-PP-0056-V2-2012-MA-02, BSI-CC-PP-0068-V2-2011-MA-01
Certificates
ANSSI-CC-2021/19-R01v2

Standards
ICAO

Certification report

Extracted keywords

Symmetric Algorithms
DES
Protocols
PACE

Operating System name
JCOP 4
Vendor
NXP

Security level
EAL5, EAL2, EAL7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR, AVA_VAN.5, AVA_VAN
Protection profiles
BSI-CC-PP-0056-V2-2012-MA-02, BSI-CC-PP-0068-V2-2011-MA-01, BSI-CC-PP-0056-V2-2012-MA02
Certificates
BSI-DSZ-CC-1136-V4-2024, ANSSI-CC-2021/19-R01v2, ANSSI-CC-2021/19-R01, NSCIB-CC-2300172-01
Evaluation facilities
CESTI

Standards
ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Creation date D:20260212110725+01'00'
Modification date D:20260217085002+00'00'
Pages 16
Creator Acrobat PDFMaker 25 pour Word
Producer PDFKit.NET 26.1.0.63468 DMV9

References

Outgoing
  • NSCIB-CC-2300172-01-CR - active - NXP JCOP 4 P71 v4.7 R1.00.4, JCOP 4 P71 v4.7 R1.01.4, JCOP 4 P71 v4.7 R1.02.4, JCOP 4 SE050 v4.7 R2.00.11, JCOP 4 SE050 v4.7 R2.03.11
  • BSI-DSZ-CC-1136-V4-2024 - active - NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4)

Security target

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES, TDES, KMAC, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DH
Hash functions
SHA-1, SHA-256, SHA-224
Schemes
MAC, Key Agreement
Protocols
PACE
Engines
SmartMX3
Libraries
Crypto Library ............9
Block cipher modes
CBC

Operating System name
JCOP 4, JCOP4
IC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG13, EF.DG14, EF.DG15, EF.COM, EF.CardAccess, EF.SOD
Vendor
NXP, NXP Semiconductors

Security level
EAL5, EAL 4, EAL 4+, EAL5 augmented, EAL 4 augmented
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP.2, ADV_TDS.3, AGD_PRE.1, AGD_OPE.1, ALC_LCD, ALC_DVS.2, ALC_DEL.1, ALC_DVS, ALC_CMC.4, ALC_CMS.5, ALC_LCD.1, ALC_TAT.2, ATE_DPT.2, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, AVA_VAN, ASE_INT, ASE_ECD, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS, FAU_GEN, FAU_SAS.1.1, FCS_CKM, FCS_RND.1, FCS_RND, FCS_CKM.1, FCS_RND.1.1, FCS_COP, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_CKM.2, FDP_ACF, FDP_ACC.1, FDP_ACC, FDP_ACF.1, FDP_UCT, FDP_UIT, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.4, FDP_RIP.1, FDP_RIP.1.1, FDP_UCT.1, FDP_UIT.1, FDP_RIP, FDP_MTD, FDP_ITC, FIA_API.1, FIA_API, FIA_SOS.2, FIA_API.1.1, FIA_UID, FIA_UAU.4, FIA_UAU, FIA_AFL, FIA_AFL.1, FIA_UID.1, FIA_UAU.1, FIA_UAU.4.1, FIA_UAU.5, FIA_UAU.6, FMT_LIM.1, FMT_LIM.2, FMT_LIM, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MTD, FMT_MTD.3, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.2, FMT_SMR.1.1, FMT_MOF.1, FMT_MTD.1, FMT_MTD.3.1, FMT_SMF, FMT_SMR, FMT_MOF, FPT_EMS.1.2, FPT_FLS.1, FPT_FLS.1.1, FPT_TST.1, FPT_PHP.3, FPT_PHP.3.1, FPT_RVM.1, FPT_SEP.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS, FPT_ITC, FTP_ITC, FTP_ITC.1
Protection profiles
BSI-CC-PP-0056-V2-2012-MA-02, BSI-CC-PP-0068-V2-2011-MA-01, BSI-CC-PP-0086, BSI-CC-PP0055, BSI-CC-PP-0056-V2-2012, BSI-CC-PP0068-V2-2011-MA-01, BSI-CC-PP-0087
Certificates
BSI-DSZ-CC-1136-V4-2024, NSCIB-CC-2300172-01

Side-channel analysis
physical probing, SPA, DPA, timing attacks, Physical Tampering, Malfunction, malfunction

Standards
FIPS 180-2, FIPS 46-3, FIPS 197, FIPS PUB 46-3, FIPS PUB 180-2, PKCS#3, PKCS#1, AIS31, RFC 2631, RFC3369, ISO/IEC 14443, ISO/IEC 7816, ISO/IEC 9796-2, ISO/IEC 7816-2, ISO/IEC 7816-4, ICAO, ICAO-SAC, SCP03, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003
Technical reports
BSI TR-03110-2, BSI TR-03110, BSI 2006

File metadata

Author David Herrgesell
Creation date D:20251125140100+01'00'
Modification date D:20251125140100+01'00'
Pages 123
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

References

Outgoing
  • NSCIB-CC-2300172-01-CR - active - NXP JCOP 4 P71 v4.7 R1.00.4, JCOP 4 P71 v4.7 R1.01.4, JCOP 4 P71 v4.7 R1.02.4, JCOP 4 SE050 v4.7 R2.00.11, JCOP 4 SE050 v4.7 R2.03.11
  • BSI-DSZ-CC-1136-V4-2024 - active - NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4)

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

ANSSI-CC-2021/19-R01v2

Extracted SARs

ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5

Similar certificates

Name Certificate ID
ChipDoc v3.1 on JCOP 4 P71 in ICAO EAC(1&2) with PACE configuration (Version 3.1.6.52) (ANSSI-CC-2021/19-R01) ANSSI-CC-2021/19-R01 Compare
ChipDoc v3.1 on JCOP 4 P71 in SSCD configurationVersion 3.1.6.52 (ANSSI-CC-2021/20-R01v2) ANSSI-CC-2021/20-R01v2 Compare
ChipDoc v3.1 on JCOP 4 P71 in ICAO EAC (1&2) with PACE configuration, Version 3.1.6.52 ANSSI-CC-2021/19 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC (1&2) with PACE configurationVersion 4.0.1.52 (ANSSI-CC-2023/11-R01v2) ANSSI-CC-2023/11-R01v2 Compare
ChipDoc v3.2 on JCOP 4 P71 in ICAO EAC(1&2) with PACE configurationVersion 3.2.0.52 (ANSSI-CC-2025/02v2) ANSSI-CC-2025/02v2 Compare
ChipDoc v3.2 on JCOP 4 P71 in ICAO EAC(1&2) with PACE configuration (Version 3.2.0.52) (ANSSI-CC-2025/02) ANSSI-CC-2025/02 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configurationVersion 4.1.1.52 (ANSSI-CC-2023/68v2) ANSSI-CC-2023/68v2 Compare
ChipDoc v3.1 on JCOP 4 P71 in ICAO BAC configuration (Version 3.1.6.52) (ANSSI-CC-2021/18-R01) ANSSI-CC-2021/18-R01 Compare
ChipDoc v3.1 on JCOP 4 P71 in SSCD configuration (Version 3.1.6.52) (ANSSI-CC-2021/20-R01) ANSSI-CC-2021/20-R01 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration Version 4.1.1.52 ( ANSSI-CC-2023/68) ANSSI-CC-2023/68 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration (Version 4.0.1.52) (ANSSI-CC-2023/11-R01) ANSSI-CC-2023/11-R01 Compare
ChipDoc v3.1 on JCOP 4 P71 in ICAO EAC (1&2) with PACE configuration (v2) ANSSI-CC-2021/19v2 Compare
ChipDoc v3.1 on JCOP 4 P71 in ICAO BAC configuration (Version 3.1.6.52) ANSSI-CC-2021/18 Compare
ChipDoc v3 on JCOP 4 P71 in ICAO EAC with PACE configuration (Version 3.0.0.52) (ANSSI-CC-2020/72-R01) ANSSI-CC-2020/72-R01 Compare
ChipDoc v3.2 on JCOP 4 P71 in SSCD configurationVersion 3.2.0.52 (ANSSI-CC-2025/03v2) ANSSI-CC-2025/03v2 Compare
ChipDoc v4 on JCOP 4.5 P71 in SSCD configurationVersion 4.0.1.52 (ANSSI-CC-2023/12-R01v2) ANSSI-CC-2023/12-R01v2 Compare
ChipDoc v3.2 on JCOP 4 P71 in ICAO BAC configuration (Version 3.2.0.52)(ANSSI-CC-2025/01) ANSSI-CC-2025/01 Compare
ChipDoc v3.1 on JCOP 4 P71 in SSCD configuration Version 3.1.6.52 ANSSI-CC-2021/20 Compare
ChipDoc v3.2 on JCOP 4 P71 in SSCD configuration (Version 3.2.0.52) (ANSSI-CC-2025/03) ANSSI-CC-2025/03 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in SSCD configurationVersion 4.1.1.52 (ANSSI-CC-2023/69v2) ANSSI-CC-2023/69v2 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO BAC configuration Version 4.1.1.52 ( ANSSI-CC-2023/67) ANSSI-CC-2023/67 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC with PACE configuration (Version 4.0.1.52) ANSSI-CC-2023/11 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in SSCD configuration Version 4.1.1.52 (ANSSI-CC-2023/69) ANSSI-CC-2023/69 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO BAC configuration (Version 4.0.1.52) ( ANSSI-CC-2023/10-R01 ) ANSSI-CC-2023/10-R01 Compare
ChipDoc v3.1 on JCOP 4 P71 in ICAO EAC with PACE configuration ANSSI-CC-2020/75 Compare
ChipDoc v3 on JCOP 4 P71in ICAO EAC with PACE configuration (Version 3.0.0.52) ANSSI-CC-2020/09 Compare
ChipDoc v3 on JCOP 4 P71 in SSCD configuration (Version 3.0.0.52) (ANSSI-CC-2020/73-R01) ANSSI-CC-2020/73-R01 Compare
ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52) (ANSSI-CC-2023/12-R01) ANSSI-CC-2023/12-R01 Compare
ChipDoc v3.1 on JCOP 4 P71 in ICAO BAC configuration (v2) ANSSI-CC-2021/18v2 Compare
ChipDoc v3 on JCOP 4 P71 in ICAO EAC with PACE configuration ANSSI-CC-2020/72 Compare
IAS Classic v5.2.3 with MOC Server v3.1.1 on MultiApp V5.2 Versions 5.2.3.A.C et 5.2.3.A.O (ANSSI-CC-2025/40) ANSSI-CC-2025/40 Compare
ChipDoc v3 on JCOP 4 P71 in ICAO BAC configuration (Version 3.0.0.52) ANSSI-CC-2020/10 Compare
eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated(version 2.3.0.1) ( ANSSI-CC-2023/55 ) ANSSI-CC-2023/55 Compare
ChipDoc v3 on JCOP 4 P71 in ICAO BAC configuration(Version 3.0.0.52) ANSSI-CC-2020/10-R01 Compare
MultiApp V5.1 JCSConfiguration 1 : 5.1 revision B version 2 (0x3055) et filter set 0x00,configuration 2 : 5.1 revisio... ANSSI-CC-2025/55 Compare
MultiApp V5.1 GP-SE PlatformConfiguration 1 : 5.1 revision B version 2 (0x3055) et filter set 0x00,configuration 2 : ... ANSSI-CC-2025/57 Compare
MultiApp V5.1 Java Card Virtual MachineConfiguration 1 : 5.1 revision B version 2 (0x3055) et filter set 0x00,configu... ANSSI-CC-2026/02 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO BAC configuration(Version 4.0.1.52) ANSSI-CC-2023/10 Compare
eTravel 3.2 EAC/BAC on MultiApp V5.2 version 3.2.1.0 (ANSSI-CC-2025/44) ANSSI-CC-2025/44 Compare
eTravel 3.2 EAC on SAC on MultiApp V5.2 version 3.2.1.0 (ANSSI-CC-2025/45) ANSSI-CC-2025/45 Compare
IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A (ANSSI-CC-... ANSSI-CC-2023/57 Compare
ChipDoc v3.1 on JCOP 4 P71 in SSCD configuration (v2) ANSSI-CC-2021/20v2 Compare
IAS ECC v2, version 1.3, in configuration #3 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’a... ANSSI-CC-2020/52-R01 Compare
ChipDoc v3.1 on JCOP 4 P71 in ICAO BAC configuration ANSSI-CC-2020/74 Compare
IAS Classic V4.4.2 with MOC server v1.1 on MultiApp V4.0.1(IAS version 4.4.2.A / MOC Server 1.1.1A) (ANSSI-CC-2018/24-R01) ANSSI-CC-2018/24-R01 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/56) ANSSI-CC-2023/56 Compare
Quantum IAS v1.0.0.A and MOC Server v3.1.1 on MultiApp V5.2 Premium PQCVersions 1.0.0.A (Q-IAS) et 3.1.1 (MOC server)... ANSSI-CC-2026/03 Compare
eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated Version de l’application eTravel : 2.3 Version de ... ANSSI-CC-2018/57v2 Compare
S3NSEN4/S3NSEN3 with Bootloader & system API v1.1, DTRNG FRO M libraries v2.2, v3.3 & PTG.1 DTRNG FRO M library v1.4 ... ANSSI-CC-2021/30 Compare
Produit IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 Version 5.2.1.A.C et 5.2.1.A.O ( ANSSI-CC-2023/42 ) ANSSI-CC-2023/42 Compare
eTravel Essential 1.3-2.0 – PACE, EAC and AA activated (Version 1.0) ANSSI-CC-2021/63 Compare
S3NSEN4/S3NSEN3 with Bootloader & system API v1.1, DTRNG FRO M libraries v2.2, v3.3 & PTG.1 DTRNG FROM library v1.4 (... ANSSI-CC-2021/30-R01 Compare
IAS Classic V4.4.2 on MultiApp V4.1 Version IAS 4.4.2.A version 2 (ANSSI-CC-2025/54) ANSSI-CC-2025/54 Compare
ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration(Version 4.0.1.52) ANSSI-CC-2023/12 Compare
secunet konnektor 2.1.0, Version 4.1.3:2.1.0 BSI-DSZ-CC-1128-V3-2021 Compare
ACOS-IDv4.1 eMRTD (A) EAC/PACE Configuration (version 4.1 eMRTD (A)) (ANSSI-CC-2025/16) ANSSI-CC-2025/16 Compare
ACOS-IDv2.1 eMRTD (C) EAC/PACE Configuration Version 2.1 eMRTD (C) (ANSSI-CC-2025/49) ANSSI-CC-2025/49 Compare
eTravel 3.2 BAC on MultiApp V5.2 version 3.2.1.0 (ANSSI-CC-2025/43) ANSSI-CC-2025/43 Compare
eTravel 3.1 EAC on SAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/36 ) ANSSI-CC-2023/36 Compare
eTravel 3.1 EAC on BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/35 ) ANSSI-CC-2023/35 Compare
ChipDoc v3.1 on JCOP 4 P71 in SSCD configuration ANSSI-CC-2020/76 Compare
TESS v5.2 Platform(Révision 1.0) (ANSSI-CC-2025/19) ANSSI-CC-2025/19 Compare
ChipDoc v2 on JCOP 3 P60 in ICAO EAC with PACE configuration ANSSI-CC-2020/47 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.2.2) (ANSSI-CC-2024/11) ANSSI-CC-2024/11 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.2.2) (ANSSI-CC-2024/10) ANSSI-CC-2024/10 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.3.3) (ANSSI-CC-2025/13) ANSSI-CC-2025/13 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/54) ANSSI-CC-2023/54 Compare
Connected eSE 5.3.4 v1.2 Platform (Revision 1.0) (ANSSI-CC-2025/04) ANSSI-CC-2025/04 Compare
eTravel 2.4 en configuration EAC SAC sur plateforme ID Motion V2 (Version de l’application eTravel : 2.4) (ANSSI-CC-2... ANSSI-CC-2018/38v2 Compare
eTravel 2.4 en configuration EAC BAC sur plateforme ID Motion V2(Version de l’application eTravel : 2.4) ( ANSSI-CC-2... ANSSI-CC-2018/37v2 Compare
ChipDoc P60 on JCOP 3 SECID P60 (OSA) ICAO EAC avec AA, CA et PACE masqué sur composant P6022J VB ANSSI-CC-2017/35 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’applicati... ANSSI-CC-2018/58v2 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’applicati... ANSSI-CC-2018/56v2 Compare
ChipDoc P60 on JCOP 3 SECID P60 (OSB) ICAO EAC avec AA, CA et PACE masqué sur composant P6022J VB (version v7b4) ANSSI-CC-2017/63 Compare
SAMSUNG S3FV9QM / S3FV9QK référence : S3FV9QM/S3FV9QK rev3_TRCv1.0_PKALibv1.4-GUIv1.38a_DTRNGlibv2.0/3.0-Iv1.2_BLv2.1... ANSSI-CC-2017/16 Compare
eTravel Essential 1.3-2.0 – BAC, EAC and AA activated (Version 1.0) ANSSI-CC-2021/64 Compare
IDeal Citiz v2.3-n embedding ID.me 1.6-n application (ID.me 1.6-n / 2.1.6.0.0) ANSSI-CC-2019/32 Compare
IAS Classic V4.4 with MOC Server 1.1 on MultiApp V4(IAS version 4.4.0.A / MOC Server 1.1.1A) (ANSSI-CC-2017/22-R01) ANSSI-CC-2017/22-R01 Compare
IAS ECC v2, version 1.3, in configuration #4 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’a... ANSSI-CC-2020/53-R01 Compare
Digital Identity on MultiApp v4.0.1 platform with Filter Set 1.0 - PACE, EAC(version 1.0) (ANSSI-CC-2020/49-R01) ANSSI-CC-2020/49-R01 Compare
eTravel v2.2 EAC/SAC on MultiApp v4.0.1 platform with Filter Set 1.0 (version 1.0) (ANSSI-CC-2020/45-R01) ANSSI-CC-2020/45-R01 Compare
eTravel v2.2 EAC/BAC on MultiApp v4.0.1 platform with Filter Set 1.0 (version 1.0) (ANSSI-CC-2020/44-R01) ANSSI-CC-2020/44-R01 Compare
secunet konnektor 2.1.0, Version 4.1.3:2.1.0 BSI-DSZ-CC-1174-2021 Compare
NPCT6xx TPM 2.0 Hardware version FB5C85D and FB5C85E, Firmware version 1.3.0.1, 1.3.1.0 and 1.3.2.8 ANSSI-CC-2017/55 Compare
Connected eSE 5.3.4 Platform v1.1 (Revision 1.0) (ANSSI-CC-2024/33) ANSSI-CC-2024/33 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.2.2) (ANSSI-CC-2024/09) ANSSI-CC-2024/09 Compare
eTravel 3.1 BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/34 ) ANSSI-CC-2023/34 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.3.3) (ANSSI-CC-2025/12) ANSSI-CC-2025/12 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.3.3) (ANSSI-CC-2025/11) ANSSI-CC-2025/11 Compare
SafeSign IC PKI applet on JCOP 4 P71 eIDAS QSCD 3.0.1.12, 3.0.1.13 and 3.0.1.14 NSCIB-CC-2400004-01-CR Compare
SecureSwitch® Fiber Optic Switch Models 1:1, 2:1, 3:1, 4:1, 5:1, 6:1, 7:1, 8:1 Rev A 383-4-410 Compare
Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability... CCEVS-VR-VID-10443-2012 Compare
ID-One Cosmo v9.1 embedding VITALE application(version 2.1.4)(ANSSI-CC-2022/33-R01) ANSSI-CC-2022/33-R01 Compare
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH(Version 4.1.0.2)... ANSSI-CC-2023/30 Compare
ChipDoc v3 on JCOP 4 P71 in SSCD configuration ANSSI-CC-2020/11 Compare
ChipDoc v3 on JCOP 4 P71 in SSCD configuration ANSSI-CC-2020/73 Compare
Market Central SecureSwitch® Fiber Optic Switch Models: A, B, C, D, 1:1, 2:1, 3:1, 4:1, 5:1, 6:1, 7:1 and 8:1 383-4-506 Compare
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3... BSI-DSZ-CC-0772-2014 Compare
NXP JCOP 7.x with eUICC extension on SN300 B1.1 Secure Element, versions JCOP 7.0 R1.64.0.2, JCOP 7.0 R2.04.0.2, JCOP... NSCIB-CC-3110-2025-08-2500052-01-CR Compare
eTravel Essential 1.2 – PACE, EAC and AA activated(release ‘0300’) ANSSI-CC-2021/28 Compare
IAS ECC v2, version 1.3, in configuration #2 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’a... ANSSI-CC-2020/51-R01 Compare
IAS ECC v2, version 1.3, in configuration #1 on ID-One Cosmo v8.2 open platform on NXP P6022M VB (Identification de l... ANSSI-CC-2020/50-R01 Compare
Application eTravel EAC v2.1, en configuration "EAC on BAC", sur la plateforme ouverte ou fermée MultiApp V3.1 masqué... ANSSI-CC-2015/41 Compare
Application eTravel EAC v2.1, en configuration EAC et SAC, sur la plateforme ouverte ou fermée MultiApp V3.1 masquée ... ANSSI-CC-2015/39 Compare
MultiApp v4.1 Javacard Platform(version 4.1.0.4) (ANSSI-CC-2025/53) ANSSI-CC-2025/53 Compare
NPCT7xx TPM2.0 rev 1.59, configuration version 1.3.4.4 (EUCC-3090-2026-13) ANSSI-CC-PP-2021/02 Compare
Showing 5 out of 106.

References

Loading...

Updates Feed

  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2021-19-R01v2-certificat.pdf",
  "dgst": "21d2f47e1840b620",
  "heuristics": {
    "_type": "sec_certs.sample.cc_eucc_common.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2021/19-R01v2",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL5+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "3.1.6.52",
        "3.1"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "a33327d40f253f46",
        "b380aabf93b29692"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2300172-01-CR",
          "BSI-DSZ-CC-1136-V4-2024"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1136-V2-2022",
          "BSI-DSZ-CC-1136-2021",
          "BSI-DSZ-CC-1136-V3-2022",
          "NSCIB-CC-2300172-01-CR",
          "BSI-DSZ-CC-1136-V4-2024"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2300172-01-CR",
          "BSI-DSZ-CC-1136-V4-2024"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2300172-01-CR",
          "BSI-DSZ-CC-1136-V4-2024"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "NXP Semiconductors Germany GmbH",
  "manufacturer_web": "https://www.nxp.com",
  "name": "ChipDoc v3.1 on JCOP 4 P71 in ICAO EAC(1\u00262) with PACE configurationVersion 3.1.6.52 (ANSSI-CC-2021/19-R01v2)",
  "not_valid_after": "2031-02-12",
  "not_valid_before": "2026-02-16",
  "pdf_data": {
    "_type": "sec_certs.sample.cc_eucc_common.PdfData",
    "cert_filename": "ANSSI-CC-2021-19-R01v2-certificat.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2021/19-R01v2": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0056-V2-2012-MA-02": 1,
          "BSI-CC-PP-0068-V2-2011-MA-01": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL5": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 3
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 4": 1
        }
      },
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ICAO": {
          "ICAO": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 2
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": null,
    "report_filename": "ANSSI-CC-2021-19-R01v2-rapport.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1136-V4-2024": 1
        },
        "FR": {
          "ANSSI-CC-2021/19-R01": 2,
          "ANSSI-CC-2021/19-R01v2": 3
        },
        "NL": {
          "NSCIB-CC-2300172-01": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0056-V2-2012-MA-02": 1,
          "BSI-CC-PP-0056-V2-2012-MA02": 1,
          "BSI-CC-PP-0068-V2-2011-MA-01": 2
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1,
          "ALC_FLR": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 2,
          "EAL5": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 14
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CESTI": {
          "CESTI": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 4": 11
        }
      },
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        },
        "ICAO": {
          "ICAO": 9
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 6
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20260212110725+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 25 pour Word",
      "/ModDate": "D:20260217085002+00\u002700\u0027",
      "/Producer": "PDFKit.NET 26.1.0.63468 DMV9",
      "pdf_file_size_bytes": 794358,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.ssi.gouv.fr/",
          "http://www.commoncriteriaportal.org/",
          "mailto:[email protected]",
          "http://www.sogis.eu/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 16
    },
    "st_filename": "ANSSI-CC-2021-19-R01v2-cible.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          },
          "ECDH": {
            "ECDH": 11
          },
          "ECDSA": {
            "ECDSA": 7
          }
        },
        "FF": {
          "DH": {
            "DH": 8,
            "Diffie-Hellman": 13
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1136-V4-2024": 2
        },
        "NL": {
          "NSCIB-CC-2300172-01": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0056-V2-2012": 1,
          "BSI-CC-PP-0056-V2-2012-MA-02": 1,
          "BSI-CC-PP-0068-V2-2011-MA-01": 1,
          "BSI-CC-PP-0086": 3,
          "BSI-CC-PP-0087": 1,
          "BSI-CC-PP0055": 1,
          "BSI-CC-PP0068-V2-2011-MA-01": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 6,
          "ADV_FSP.2": 1,
          "ADV_FSP.5": 6,
          "ADV_IMP.1": 5,
          "ADV_INT.2": 2,
          "ADV_TDS.3": 1,
          "ADV_TDS.4": 8
        },
        "AGD": {
          "AGD_OPE.1": 5,
          "AGD_PRE.1": 6
        },
        "ALC": {
          "ALC_CMC.4": 2,
          "ALC_CMS.5": 1,
          "ALC_DEL.1": 3,
          "ALC_DVS": 1,
          "ALC_DVS.2": 9,
          "ALC_LCD": 1,
          "ALC_LCD.1": 3,
          "ALC_TAT.2": 4
        },
        "ASE": {
          "ASE_CCL.1": 2,
          "ASE_ECD": 1,
          "ASE_ECD.1": 1,
          "ASE_INT": 2,
          "ASE_INT.1": 4,
          "ASE_OBJ.2": 3,
          "ASE_REQ.2": 4,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 2
        },
        "ATE": {
          "ATE_COV.2": 4,
          "ATE_DPT.2": 2,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 4,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 8
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 2,
          "EAL 4 augmented": 2,
          "EAL 4+": 3,
          "EAL5": 9,
          "EAL5 augmented": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_SAS": 7,
          "FAU_SAS.1": 14,
          "FAU_SAS.1.1": 2
        },
        "FCS": {
          "FCS_CKM": 47,
          "FCS_CKM.1": 10,
          "FCS_CKM.2": 1,
          "FCS_CKM.4": 24,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 64,
          "FCS_COP.1": 12,
          "FCS_RND": 8,
          "FCS_RND.1": 19,
          "FCS_RND.1.1": 2
        },
        "FDP": {
          "FDP_ACC": 14,
          "FDP_ACC.1": 4,
          "FDP_ACF": 18,
          "FDP_ACF.1": 37,
          "FDP_ACF.1.1": 3,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.4": 1,
          "FDP_ITC": 1,
          "FDP_MTD": 1,
          "FDP_RIP": 11,
          "FDP_RIP.1": 10,
          "FDP_RIP.1.1": 3,
          "FDP_UCT": 7,
          "FDP_UCT.1": 3,
          "FDP_UIT": 7,
          "FDP_UIT.1": 4
        },
        "FIA": {
          "FIA_AFL": 16,
          "FIA_AFL.1": 6,
          "FIA_API": 36,
          "FIA_API.1": 13,
          "FIA_API.1.1": 1,
          "FIA_SOS.2": 1,
          "FIA_UAU": 90,
          "FIA_UAU.1": 6,
          "FIA_UAU.4": 5,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.5": 10,
          "FIA_UAU.6": 5,
          "FIA_UID": 26,
          "FIA_UID.1": 6
        },
        "FMT": {
          "FMT_LIM": 8,
          "FMT_LIM.1": 19,
          "FMT_LIM.1.1": 3,
          "FMT_LIM.2": 15,
          "FMT_LIM.2.1": 4,
          "FMT_MOF": 2,
          "FMT_MOF.1": 4,
          "FMT_MTD": 109,
          "FMT_MTD.1": 22,
          "FMT_MTD.3": 11,
          "FMT_MTD.3.1": 1,
          "FMT_SMF": 12,
          "FMT_SMF.1": 28,
          "FMT_SMF.1.1": 3,
          "FMT_SMR": 30,
          "FMT_SMR.1": 7,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_EMS.1.2": 1,
          "FPT_FLS": 3,
          "FPT_FLS.1": 7,
          "FPT_FLS.1.1": 1,
          "FPT_ITC": 1,
          "FPT_PHP.3": 7,
          "FPT_PHP.3.1": 1,
          "FPT_RVM.1": 1,
          "FPT_SEP.1": 1,
          "FPT_TST.1": 7,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 14,
          "FTP_ITC.1": 8
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 5
        }
      },
      "cplc_data": {},
      "crypto_engine": {
        "SmartMX": {
          "SmartMX3": 1
        }
      },
      "crypto_library": {
        "Generic": {
          "Crypto Library ............9": 1
        }
      },
      "crypto_protocol": {
        "PACE": {
          "PACE": 376
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 2
        },
        "MAC": {
          "MAC": 11
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 7
          },
          "SHA2": {
            "SHA-224": 6,
            "SHA-256": 5
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.COM": 6,
          "EF.CardAccess": 1,
          "EF.DG1": 13,
          "EF.DG13": 2,
          "EF.DG14": 9,
          "EF.DG15": 4,
          "EF.DG16": 12,
          "EF.DG2": 7,
          "EF.DG3": 17,
          "EF.DG4": 17,
          "EF.DG5": 6,
          "EF.SOD": 8
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 4": 18,
          "JCOP4": 122
        }
      },
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 3,
          "Physical Tampering": 3,
          "malfunction": 7
        },
        "SCA": {
          "DPA": 1,
          "SPA": 1,
          "physical probing": 4,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 1
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        },
        "FIPS": {
          "FIPS 180-2": 2,
          "FIPS 197": 2,
          "FIPS 46-3": 2,
          "FIPS PUB 180-2": 1,
          "FIPS PUB 46-3": 3
        },
        "ICAO": {
          "ICAO": 150,
          "ICAO-SAC": 2
        },
        "ISO": {
          "ISO/IEC 14443": 4,
          "ISO/IEC 7816": 2,
          "ISO/IEC 7816-2": 1,
          "ISO/IEC 7816-4": 1,
          "ISO/IEC 9796-2": 2
        },
        "PKCS": {
          "PKCS#1": 3,
          "PKCS#3": 5
        },
        "RFC": {
          "RFC 2631": 1,
          "RFC3369": 1
        },
        "SCP": {
          "SCP03": 10
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 19
          }
        },
        "DES": {
          "3DES": {
            "3DES": 2,
            "TDES": 12
          },
          "DES": {
            "DES": 6
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 8,
            "KMAC": 4
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 2006": 1,
          "BSI TR-03110": 3,
          "BSI TR-03110-2": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 134,
          "NXP Semiconductors": 28
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "David Herrgesell",
      "/CreationDate": "D:20251125140100+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20251125140100+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 2065357,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.nxp.com/",
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 123
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2021-19-R01v2-rapport.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_VAN.5",
      "EAL5+",
      "ALC_DVS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2021-19-R01v2-cible.pdf",
  "state": {
    "_type": "sec_certs.sample.cc_eucc_common.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": false,
      "json_hash": null,
      "pdf_hash": "da40e44569bdc47782555cac8285a591c79cbf9acabc55a6fb6c499849507a6a",
      "txt_hash": "77906bd93d54e4618ce0ee5bc584b290ccf7042ae635c9f2ac203808665b2be5"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "b315748cf5967498c3b0c051bf8e87c1edfad1a264e9cf245b1b74a5c5408917",
      "txt_hash": "8fb3cccabfc3a92211a9f37d6432939def007389f6e6646435a8401843056a76"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "53883a37cf0014712d835f17173faa1c5e5705db291a6cf217aaa56dac2065b8",
      "txt_hash": "9cdfbe68cf5924860d81a5b0ca841c96f94b34c9a52a7fc945a426e287907963"
    }
  },
  "status": "active"
}