Panasonic Connect TOUGHBOOK Devices on Android 11

CSV information ?

Status active
Valid from 16.12.2022
Valid until 16.12.2024
Scheme 🇺🇸 US
Manufacturer Panasonic Connect of North America
Category Mobility
Security level
Protection profiles

Heuristics summary ?

Certificate ID: CCEVS-VR-11315-2022

Certificate ?

Extracted keywords

Protocols
TLS

Certificates
CCEVS-VR-VID11315-2022
Evaluation facilities
Gossamer Security

File metadata

Creation date D:20221220140031-05'00'
Modification date D:20221220140031-05'00'
Pages 1
Producer iText 2.1.0 (by lowagie.com)

Certification report ?

Extracted keywords

Symmetric Algorithms
AES
Protocols
TLS, IPsec, VPN
Libraries
BoringSSL

Trusted Execution Environments
TEE
Vendor
Qualcomm

Security Functional Requirements (SFR)
FAU_GEN.1
Certificates
CCEVS-VR-11315-2022
Evaluation facilities
Gossamer Security

File metadata

Author comptont
Creation date D:20221220135301-05'00'
Modification date D:20221220135301-05'00'
Pages 23
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

Frontpage

Certificate ID CCEVS-VR-11315-2022
Certified item Panasonic Connect TOUGHBOOK Devices on Android 11
Certification lab US NIAP

Security target ?

Extracted keywords

Symmetric Algorithms
AES, AES-256, AES-128, HMAC, HMAC-SHA-384, HMAC-SHA-256, HMAC-SHA-512, CMAC
Asymmetric Algorithms
ECDH, ECDHE, ECDSA, ECC
Hash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA256, scrypt
Schemes
MAC, Key Exchange
Protocols
TLS, TLS 1.2, TLS 1.0, TLS 1.1, IPsec, VPN
Randomness
DRBG, RBG
Libraries
BoringSSL
Elliptic Curves
P-384, P-256, P-521, secp256r1, secp384r1
Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XEX, XTS
TLS cipher suites
TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256

Trusted Execution Environments
TEE
Vendor
Qualcomm

Claims
OE.CONFIG, OE.DATA_PROPER_USER, OE.NO_TOE_BYPASS, OE.NOTIFY, OE.PRECAUTION, OE.TRUSTED_ADMIN
Security Assurance Requirements (SAR)
ADV_FSP, ADV_FSP.1, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_TSU_EXT, ALC_CMC, ALC_CMS, ALC_CMC.1, ALC_CMS.1, ALC_TSU_EXT.1, ATE_IND, ATE_IND.1, AVA_VAN, AVA_VAN.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_STG.4, FCS_TLSS_EXT.1.1, FCS_RBG_EXT.1, FCS_TLSC_EXT, FCS_CKM.1, FCS_CKM, FCS_CKM_EXT.1, FCS_CKM_EXT.2, FCS_CKM_EXT.3, FCS_CKM_EXT.4, FCS_CKM_EXT.5, FCS_CKM_EXT.6, FCS_CKM_EXT.7, FCS_COP, FCS_STG_EXT.1, FCS_STG_EXT.2, FCS_STG_EXT.3, FCS_TLS_EXT.1, FCS_TLSC_EXT.1, FCS_TLSC_EXT.2, FCS_TLSC_EXT.3, FCS_TLSC_EXT.5, FCS_COP.1, FCS_CKM_EXT.4.1, FCS_STG_EXT.2.1, FCS_CKM_EXT.8, FCS_CKM.2, FDP_ACC.1, FDP_IFC_EXT.1, FDP_ACF_EXT.1, FDP_BCK_EXT.1, FDP_DAR_EXT.1, FDP_DAR_EXT.2, FDP_STG_EXT.1, FDP_UPC_EXT, FIA_AFL_EXT.1, FIA_BLT_EXT.2, FIA_BLT_EXT.3, FIA_BLT_EXT.4, FIA_BLT_EXT.6, FIA_BLT_EXT.7, FIA_PAE_EXT.1, FIA_TRT_EXT.1, FIA_UAU.5, FIA_UAU.6, FIA_UAU_EXT.1, FIA_UAU_EXT.2, FIA_UAU.5.1, FIA_PMG_EXT.1, FIA_UAU_EXT.2.1, FMT_MOF_EXT.1, FMT_SMF_EXT.1, FMT_SMF_EXT, FMT_SMF_EXT.2, FMT_SMF_EXT.1.1, FMT_MOF_EXT.1.2, FPT_AEX_EXT.1, FPT_AEX_EXT.2, FPT_AEX_EXT.3, FPT_AEX_EXT.4, FPT_BBD_EXT.1, FPT_JTA_EXT.1, FPT_KST_EXT.1, FPT_KST_EXT.2, FPT_KST_EXT.3, FPT_NOT_EXT.1, FPT_STM.1, FPT_TST_EXT.1, FPT_TST_EXT, FPT_TUD_EXT.1, FPT_TUD_EXT.2, FTA_SSL_EXT.1, FTA_TAB.1, FTP_ITC_EXT, FTP_BLT_EXT.1, FTP_BLT_EXT.2, FTP_BLT_EXT, FTP_ITC_EXT.1

Standards
FIPS PUB 186-4, FIPS PUB 197, FIPS 186-4, FIPS 197, FIPS 180-4, FIPS 198-1, SP 800-108, NIST SP 800-38A, NIST SP 800-38C, NIST SP 800-38F, SP 800-38A, SP 800-38E, SP 800-38B, SP 800-38F, SP 800-38C, SP 800-38D, NIST SP 800-57, SP 800-56A, SP 800-90A, RFC 8017, RFC 3394, RFC 2818, RFC 5246, RFC 5288, RFC 5289, RFC 6125, RFC 2246, RFC 4346, RFC 5216, RFC 5746, RFC 5280, RFC 6960, X.509

File metadata

Creation date D:20221220135411-05'00'
Modification date D:20221220135411-05'00'
Pages 67
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

Heuristics ?

Certificate ID: CCEVS-VR-11315-2022

Extracted SARs

ADV_FSP.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1, ATE_IND.1, AVA_VAN.1, ALC_CMC.1, ALC_TSU_EXT.1

Scheme data ?

Product Panasonic Connect TOUGHBOOK Devices on Android 11
Id CCEVS-VR-VID11315-2022
Url https://www.niap-ccevs.org/product/11315
Certification Date 16.12.2022
Expiration Date 16.12.2024
Category Mobility
Vendor Panasonic Connect of North America
Evaluation Facility Gossamer Security Solutions
Scheme US
Cert Link https://www.niap-ccevs.org/api/file/get_public_file/?file_id=25058
Target Link https://www.niap-ccevs.org/api/file/get_public_file/?file_id=25059
Report Link https://www.niap-ccevs.org/api/file/get_public_file/?file_id=25060

References ?

No references are available for this certificate.

Updates ?

  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'certification_date': '2022-12-16', 'expiration_date': '2024-12-16'} data.
  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Protection Profiles of the certificate were updated.

    • The following values were removed: {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Extended Package for Wireless Local Area Network (WLAN) Clients', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Functional Package for TLS Version 1.1', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf', 'pp_ids': None}]}.
    • The following values were added: {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Functional Package for TLS Version 1.1', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/PKG_TLS_V1.1.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PKG_TLS_V1.1']}}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Extended Package for Wireless Local Area Network (WLAN) Clients', 'pp_eal': 'EAL1', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_WLAN_CLI_EP_V1.0']}}]}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '0455608e36fbd3141b72e6969798271acb1679a6aa90cdda620b6881b55529b1', 'txt_hash': '9ba16d40e3bee4b729243aeeb33b29cb97b44900905c24eb5f4e285551306b43'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'bc6478927c168d8c747d08177a1b2b4e0f057e39aeb01e2cfb7e6e47d21cb962', 'txt_hash': '39682085081032f2377fa039b5d29fc0bc63623629482c1f3090aad76d18f7c6'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1298183, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 67, '/Producer': 'Microsoft® Word for Microsoft 365', '/Creator': 'Microsoft® Word for Microsoft 365', '/CreationDate': "D:20221220135411-05'00'", '/ModDate': "D:20221220135411-05'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://developer.android.com/reference/javax/net/ssl/SSLSocket', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=9458', 'http://www.globalplatform.org/mediaguidetee.asp', 'http://www.wi-fi.org/certification', 'https://na.panasonic.com/us/support/computers-tablets-handhelds-get-service-support', 'https://developer.android.com/reference/packages', 'https://source.android.com/devices/architecture/kernel/modular-kernels#core-kernel-requirements', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=9459', 'http://developer.android.com/reference/android/bluetooth/package-summary.html', 'https://developer.android.com/reference/android/app/admin/SecurityLog.SecurityEvent', 'https://developer.android.com/reference/android/app/admin/SecurityLog#constants_1', 'mailto:[email protected]', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=9411', 'https://source.android.com/setup/contribute/report-bugs', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=8370', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=9460', 'http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.ddi0487a.f/index.html', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=15047', 'https://na.panasonic.com/us/support/computers-tablets-handhelds-security-updates', 'https://developer.android.com/reference/javax/net/ssl/HttpsURLConnection', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35371', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=9410', 'mailto:[email protected]', 'https://source.android.com/devices/tech/security/index.html']}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 182708, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/ModDate': "D:20221220140031-05'00'", '/CreationDate': "D:20221220140031-05'00'", '/Producer': 'iText 2.1.0 (by lowagie.com)', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {'ADV': {'ADV_FSP': 1, 'ADV_FSP.1': 11}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 11, 'AGD_PRE.1': 7}, 'ALC': {'ALC_TSU_EXT': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_CMC.1': 5, 'ALC_CMS.1': 6, 'ALC_TSU_EXT.1': 2}, 'ATE': {'ATE_IND': 1, 'ATE_IND.1': 8}, 'AVA': {'AVA_VAN': 1, 'AVA_VAN.1': 9}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 2, 'FAU_SAR.1': 1, 'FAU_STG.4': 1}, 'FCS': {'FCS_TLSS_EXT.1.1': 1, 'FCS_RBG_EXT.1': 12, 'FCS_TLSC_EXT': 2, 'FCS_CKM.1': 3, 'FCS_CKM': 5, 'FCS_CKM_EXT.1': 1, 'FCS_CKM_EXT.2': 1, 'FCS_CKM_EXT.3': 2, 'FCS_CKM_EXT.4': 4, 'FCS_CKM_EXT.5': 1, 'FCS_CKM_EXT.6': 1, 'FCS_CKM_EXT.7': 1, 'FCS_COP': 9, 'FCS_STG_EXT.1': 1, 'FCS_STG_EXT.2': 3, 'FCS_STG_EXT.3': 1, 'FCS_TLS_EXT.1': 1, 'FCS_TLSC_EXT.1': 2, 'FCS_TLSC_EXT.2': 1, 'FCS_TLSC_EXT.3': 1, 'FCS_TLSC_EXT.5': 1, 'FCS_COP.1': 12, 'FCS_CKM_EXT.4.1': 1, 'FCS_STG_EXT.2.1': 1, 'FCS_CKM_EXT.8': 1, 'FCS_CKM.2': 1}, 'FDP': {'FDP_ACC.1': 3, 'FDP_IFC_EXT.1': 2, 'FDP_ACF_EXT.1': 1, 'FDP_BCK_EXT.1': 1, 'FDP_DAR_EXT.1': 2, 'FDP_DAR_EXT.2': 1, 'FDP_STG_EXT.1': 1, 'FDP_UPC_EXT': 2}, 'FIA': {'FIA_AFL_EXT.1': 2, 'FIA_BLT_EXT.2': 1, 'FIA_BLT_EXT.3': 1, 'FIA_BLT_EXT.4': 1, 'FIA_BLT_EXT.6': 1, 'FIA_BLT_EXT.7': 1, 'FIA_PAE_EXT.1': 1, 'FIA_TRT_EXT.1': 1, 'FIA_UAU.5': 1, 'FIA_UAU.6': 1, 'FIA_UAU_EXT.1': 1, 'FIA_UAU_EXT.2': 2, 'FIA_UAU.5.1': 2, 'FIA_PMG_EXT.1': 2, 'FIA_UAU_EXT.2.1': 3}, 'FMT': {'FMT_MOF_EXT.1': 2, 'FMT_SMF_EXT.1': 3, 'FMT_SMF_EXT': 2, 'FMT_SMF_EXT.2': 1, 'FMT_SMF_EXT.1.1': 1, 'FMT_MOF_EXT.1.2': 1}, 'FPT': {'FPT_AEX_EXT.1': 1, 'FPT_AEX_EXT.2': 1, 'FPT_AEX_EXT.3': 1, 'FPT_AEX_EXT.4': 1, 'FPT_BBD_EXT.1': 1, 'FPT_JTA_EXT.1': 1, 'FPT_KST_EXT.1': 1, 'FPT_KST_EXT.2': 1, 'FPT_KST_EXT.3': 1, 'FPT_NOT_EXT.1': 1, 'FPT_STM.1': 1, 'FPT_TST_EXT.1': 1, 'FPT_TST_EXT': 3, 'FPT_TUD_EXT.1': 1, 'FPT_TUD_EXT.2': 1}, 'FTA': {'FTA_SSL_EXT.1': 1, 'FTA_TAB.1': 1}, 'FTP': {'FTP_ITC_EXT': 1, 'FTP_BLT_EXT.1': 1, 'FTP_BLT_EXT.2': 1, 'FTP_BLT_EXT': 2, 'FTP_ITC_EXT.1': 1}}, 'cc_claims': {'OE': {'OE.CONFIG': 1, 'OE.DATA_PROPER_USER': 1, 'OE.NO_TOE_BYPASS': 1, 'OE.NOTIFY': 1, 'OE.PRECAUTION': 1, 'OE.TRUSTED_ADMIN': 1}}, 'vendor': {'Qualcomm': {'Qualcomm': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 28, 'AES-256': 15, 'AES-128': 1}}, 'constructions': {'MAC': {'HMAC': 6, 'HMAC-SHA-384': 2, 'HMAC-SHA-256': 3, 'HMAC-SHA-512': 1, 'CMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 5, 'ECDHE': 2}, 'ECDSA': {'ECDSA': 10}, 'ECC': {'ECC': 3}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 3}, 'SHA2': {'SHA-256': 8, 'SHA-384': 3, 'SHA-512': 3, 'SHA256': 1}}, 'scrypt': {'scrypt': 3}}, 'crypto_scheme': {'MAC': {'MAC': 6}, 'KEX': {'Key Exchange': 3}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 64, 'TLS 1.2': 2, 'TLS 1.0': 1, 'TLS 1.1': 1}}, 'IPsec': {'IPsec': 1}, 'VPN': {'VPN': 21}}, 'randomness': {'PRNG': {'DRBG': 12}, 'RNG': {'RBG': 10}}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CBC': {'CBC': 3}, 'CTR': {'CTR': 1}, 'CFB': {'CFB': 1}, 'OFB': {'OFB': 1}, 'GCM': {'GCM': 7}, 'CCM': {'CCM': 5}, 'XEX': {'XEX': 1}, 'XTS': {'XTS': 5}}, 'ecc_curve': {'NIST': {'P-384': 6, 'P-256': 8, 'P-521': 4, 'secp256r1': 3, 'secp384r1': 3}}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_RSA_WITH_AES_256_GCM_SHA384': 2, 'TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256': 2, 'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384': 2, 'TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256': 2, 'TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384': 2, 'TLS_RSA_WITH_AES_128_CBC_SHA': 1, 'TLS_RSA_WITH_AES_256_CBC_SHA': 1, 'TLS_RSA_WITH_AES_128_GCM_SHA256': 1}}, 'crypto_library': {'BoringSSL': {'BoringSSL': 24}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'other': {'TEE': 10}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186-4': 4, 'FIPS PUB 197': 2, 'FIPS 186-4': 6, 'FIPS 197': 4, 'FIPS 180-4': 3, 'FIPS 198-1': 3}, 'NIST': {'SP 800-108': 4, 'NIST SP 800-38A': 1, 'NIST SP 800-38C': 1, 'NIST SP 800-38F': 1, 'SP 800-38A': 6, 'SP 800-38E': 2, 'SP 800-38B': 1, 'SP 800-38F': 1, 'SP 800-38C': 2, 'SP 800-38D': 1, 'NIST SP 800-57': 1, 'SP 800-56A': 1, 'SP 800-90A': 2}, 'RFC': {'RFC 8017': 1, 'RFC 3394': 2, 'RFC 2818': 2, 'RFC 5246': 4, 'RFC 5288': 3, 'RFC 5289': 8, 'RFC 6125': 1, 'RFC 2246': 1, 'RFC 4346': 1, 'RFC 5216': 1, 'RFC 5746': 1, 'RFC 5280': 4, 'RFC 6960': 1}, 'X509': {'X.509': 15}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {'US': {'CCEVS-VR-VID11315-2022': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Gossamer': {'Gossamer Security': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to st_vid11315-st.pdf.
    • The cert_filename property was set to st_vid11315-ci.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TSU_EXT', 'level': 1}]}.
  • 19.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '6e8049dc61333b761a45c5fc71d194d88f635ef2fa8874776b049354c6758949', 'txt_hash': 'acb1011a11b74dea4cd1a3b1a36b2aa1eb92857696e506c13dd1eb0011ee8028'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 320589, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 23, '/Author': 'comptont', '/Creator': 'Microsoft® Word for Microsoft 365', '/CreationDate': "D:20221220135301-05'00'", '/ModDate': "D:20221220135301-05'00'", '/Producer': 'Microsoft® Word for Microsoft 365', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://web.nvd.nist.gov/view/vuln/search', 'http://www.kb.cert.org/vuls/']}}.
    • The report_frontpage property was set to {'US': {'cert_id': 'CCEVS-VR-11315-2022', 'cert_item': 'Panasonic Connect TOUGHBOOK Devices on Android 11', 'cert_lab': 'US NIAP'}}.
    • The report_keywords property was set to {'cc_cert_id': {'US': {'CCEVS-VR-11315-2022': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 1}}, 'cc_claims': {}, 'vendor': {'Qualcomm': {'Qualcomm': 1}}, 'eval_facility': {'Gossamer': {'Gossamer Security': 4}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 6}}, 'IPsec': {'IPsec': 1}, 'VPN': {'VPN': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'BoringSSL': {'BoringSSL': 1}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'other': {'TEE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to st_vid11315-vr.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['US'].
    • The cert_id property was set to CCEVS-VR-11315-2022.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11315-vr.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11315-st.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The report_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Panasonic Connect TOUGHBOOK Devices on Android 11 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Mobility",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11315-ci.pdf",
  "dgst": "29f8b0e8b53d064c",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CCEVS-VR-11315-2022",
    "cert_lab": [
      "US"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TSU_EXT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "11"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "Mobility",
      "cert_link": "https://www.niap-ccevs.org/api/file/get_public_file/?file_id=25058",
      "certification_date": "2022-12-16",
      "evaluation_facility": "Gossamer Security Solutions",
      "expiration_date": "2024-12-16",
      "id": "CCEVS-VR-VID11315-2022",
      "product": "Panasonic Connect TOUGHBOOK Devices on Android 11",
      "report_link": "https://www.niap-ccevs.org/api/file/get_public_file/?file_id=25060",
      "scheme": "US",
      "target_link": "https://www.niap-ccevs.org/api/file/get_public_file/?file_id=25059",
      "url": "https://www.niap-ccevs.org/product/11315",
      "vendor": "Panasonic Connect of North America"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Panasonic Connect of North America",
  "manufacturer_web": "https://www.panasonic.com",
  "name": "Panasonic Connect TOUGHBOOK Devices on Android 11",
  "not_valid_after": "2024-12-16",
  "not_valid_before": "2022-12-16",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "st_vid11315-ci.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID11315-2022": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 1
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Gossamer": {
          "Gossamer Security": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20221220140031-05\u002700\u0027",
      "/ModDate": "D:20221220140031-05\u002700\u0027",
      "/Producer": "iText 2.1.0 (by lowagie.com)",
      "pdf_file_size_bytes": 182708,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "st_vid11315-vr.pdf",
    "report_frontpage": {
      "US": {
        "cert_id": "CCEVS-VR-11315-2022",
        "cert_item": "Panasonic Connect TOUGHBOOK Devices on Android 11",
        "cert_lab": "US NIAP"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-11315-2022": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {},
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "BoringSSL": {
          "BoringSSL": 1
        }
      },
      "crypto_protocol": {
        "IPsec": {
          "IPsec": 1
        },
        "TLS": {
          "TLS": {
            "TLS": 6
          }
        },
        "VPN": {
          "VPN": 1
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Gossamer": {
          "Gossamer Security": 4
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "other": {
          "TEE": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Qualcomm": {
          "Qualcomm": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "comptont",
      "/CreationDate": "D:20221220135301-05\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20221220135301-05\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 320589,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://web.nvd.nist.gov/view/vuln/search",
          "http://www.kb.cert.org/vuls/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 23
    },
    "st_filename": "st_vid11315-st.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          },
          "ECDH": {
            "ECDH": 5,
            "ECDHE": 2
          },
          "ECDSA": {
            "ECDSA": 10
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "OE": {
          "OE.CONFIG": 1,
          "OE.DATA_PROPER_USER": 1,
          "OE.NOTIFY": 1,
          "OE.NO_TOE_BYPASS": 1,
          "OE.PRECAUTION": 1,
          "OE.TRUSTED_ADMIN": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP": 1,
          "ADV_FSP.1": 11
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 11,
          "AGD_PRE": 1,
          "AGD_PRE.1": 7
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.1": 5,
          "ALC_CMS": 1,
          "ALC_CMS.1": 6,
          "ALC_TSU_EXT": 2,
          "ALC_TSU_EXT.1": 2
        },
        "ATE": {
          "ATE_IND": 1,
          "ATE_IND.1": 8
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.1": 9
        }
      },
      "cc_security_level": {},
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 2,
          "FAU_SAR.1": 1,
          "FAU_STG.4": 1
        },
        "FCS": {
          "FCS_CKM": 5,
          "FCS_CKM.1": 3,
          "FCS_CKM.2": 1,
          "FCS_CKM_EXT.1": 1,
          "FCS_CKM_EXT.2": 1,
          "FCS_CKM_EXT.3": 2,
          "FCS_CKM_EXT.4": 4,
          "FCS_CKM_EXT.4.1": 1,
          "FCS_CKM_EXT.5": 1,
          "FCS_CKM_EXT.6": 1,
          "FCS_CKM_EXT.7": 1,
          "FCS_CKM_EXT.8": 1,
          "FCS_COP": 9,
          "FCS_COP.1": 12,
          "FCS_RBG_EXT.1": 12,
          "FCS_STG_EXT.1": 1,
          "FCS_STG_EXT.2": 3,
          "FCS_STG_EXT.2.1": 1,
          "FCS_STG_EXT.3": 1,
          "FCS_TLSC_EXT": 2,
          "FCS_TLSC_EXT.1": 2,
          "FCS_TLSC_EXT.2": 1,
          "FCS_TLSC_EXT.3": 1,
          "FCS_TLSC_EXT.5": 1,
          "FCS_TLSS_EXT.1.1": 1,
          "FCS_TLS_EXT.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 3,
          "FDP_ACF_EXT.1": 1,
          "FDP_BCK_EXT.1": 1,
          "FDP_DAR_EXT.1": 2,
          "FDP_DAR_EXT.2": 1,
          "FDP_IFC_EXT.1": 2,
          "FDP_STG_EXT.1": 1,
          "FDP_UPC_EXT": 2
        },
        "FIA": {
          "FIA_AFL_EXT.1": 2,
          "FIA_BLT_EXT.2": 1,
          "FIA_BLT_EXT.3": 1,
          "FIA_BLT_EXT.4": 1,
          "FIA_BLT_EXT.6": 1,
          "FIA_BLT_EXT.7": 1,
          "FIA_PAE_EXT.1": 1,
          "FIA_PMG_EXT.1": 2,
          "FIA_TRT_EXT.1": 1,
          "FIA_UAU.5": 1,
          "FIA_UAU.5.1": 2,
          "FIA_UAU.6": 1,
          "FIA_UAU_EXT.1": 1,
          "FIA_UAU_EXT.2": 2,
          "FIA_UAU_EXT.2.1": 3
        },
        "FMT": {
          "FMT_MOF_EXT.1": 2,
          "FMT_MOF_EXT.1.2": 1,
          "FMT_SMF_EXT": 2,
          "FMT_SMF_EXT.1": 3,
          "FMT_SMF_EXT.1.1": 1,
          "FMT_SMF_EXT.2": 1
        },
        "FPT": {
          "FPT_AEX_EXT.1": 1,
          "FPT_AEX_EXT.2": 1,
          "FPT_AEX_EXT.3": 1,
          "FPT_AEX_EXT.4": 1,
          "FPT_BBD_EXT.1": 1,
          "FPT_JTA_EXT.1": 1,
          "FPT_KST_EXT.1": 1,
          "FPT_KST_EXT.2": 1,
          "FPT_KST_EXT.3": 1,
          "FPT_NOT_EXT.1": 1,
          "FPT_STM.1": 1,
          "FPT_TST_EXT": 3,
          "FPT_TST_EXT.1": 1,
          "FPT_TUD_EXT.1": 1,
          "FPT_TUD_EXT.2": 1
        },
        "FTA": {
          "FTA_SSL_EXT.1": 1,
          "FTA_TAB.1": 1
        },
        "FTP": {
          "FTP_BLT_EXT": 2,
          "FTP_BLT_EXT.1": 1,
          "FTP_BLT_EXT.2": 1,
          "FTP_ITC_EXT": 1,
          "FTP_ITC_EXT.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "CCM": {
          "CCM": 5
        },
        "CFB": {
          "CFB": 1
        },
        "CTR": {
          "CTR": 1
        },
        "ECB": {
          "ECB": 1
        },
        "GCM": {
          "GCM": 7
        },
        "OFB": {
          "OFB": 1
        },
        "XEX": {
          "XEX": 1
        },
        "XTS": {
          "XTS": 5
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "BoringSSL": {
          "BoringSSL": 24
        }
      },
      "crypto_protocol": {
        "IPsec": {
          "IPsec": 1
        },
        "TLS": {
          "TLS": {
            "TLS": 64,
            "TLS 1.0": 1,
            "TLS 1.1": 1,
            "TLS 1.2": 2
          }
        },
        "VPN": {
          "VPN": 21
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 3
        },
        "MAC": {
          "MAC": 6
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 8,
          "P-384": 6,
          "P-521": 4,
          "secp256r1": 3,
          "secp384r1": 3
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 3
          },
          "SHA2": {
            "SHA-256": 8,
            "SHA-384": 3,
            "SHA-512": 3,
            "SHA256": 1
          }
        },
        "scrypt": {
          "scrypt": 3
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 12
        },
        "RNG": {
          "RBG": 10
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 180-4": 3,
          "FIPS 186-4": 6,
          "FIPS 197": 4,
          "FIPS 198-1": 3,
          "FIPS PUB 186-4": 4,
          "FIPS PUB 197": 2
        },
        "NIST": {
          "NIST SP 800-38A": 1,
          "NIST SP 800-38C": 1,
          "NIST SP 800-38F": 1,
          "NIST SP 800-57": 1,
          "SP 800-108": 4,
          "SP 800-38A": 6,
          "SP 800-38B": 1,
          "SP 800-38C": 2,
          "SP 800-38D": 1,
          "SP 800-38E": 2,
          "SP 800-38F": 1,
          "SP 800-56A": 1,
          "SP 800-90A": 2
        },
        "RFC": {
          "RFC 2246": 1,
          "RFC 2818": 2,
          "RFC 3394": 2,
          "RFC 4346": 1,
          "RFC 5216": 1,
          "RFC 5246": 4,
          "RFC 5280": 4,
          "RFC 5288": 3,
          "RFC 5289": 8,
          "RFC 5746": 1,
          "RFC 6125": 1,
          "RFC 6960": 1,
          "RFC 8017": 1
        },
        "X509": {
          "X.509": 15
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 28,
            "AES-128": 1,
            "AES-256": 15
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 1,
            "HMAC": 6,
            "HMAC-SHA-256": 3,
            "HMAC-SHA-384": 2,
            "HMAC-SHA-512": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "other": {
          "TEE": 10
        }
      },
      "tls_cipher_suite": {
        "TLS": {
          "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 2,
          "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 2,
          "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 2,
          "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 2,
          "TLS_RSA_WITH_AES_128_CBC_SHA": 1,
          "TLS_RSA_WITH_AES_128_GCM_SHA256": 1,
          "TLS_RSA_WITH_AES_256_CBC_SHA": 1,
          "TLS_RSA_WITH_AES_256_GCM_SHA384": 2
        }
      },
      "vendor": {
        "Qualcomm": {
          "Qualcomm": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20221220135411-05\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20221220135411-05\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 1298183,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://developer.android.com/reference/android/bluetooth/package-summary.html",
          "https://developer.android.com/reference/android/app/admin/SecurityLog#constants_1",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=15047",
          "https://developer.android.com/reference/packages",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=9458",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=8370",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=9460",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35371",
          "https://source.android.com/devices/architecture/kernel/modular-kernels#core-kernel-requirements",
          "https://source.android.com/setup/contribute/report-bugs",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=9410",
          "http://www.wi-fi.org/certification",
          "https://na.panasonic.com/us/support/computers-tablets-handhelds-get-service-support",
          "mailto:[email protected]",
          "https://na.panasonic.com/us/support/computers-tablets-handhelds-security-updates",
          "https://developer.android.com/reference/javax/net/ssl/HttpsURLConnection",
          "http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.ddi0487a.f/index.html",
          "http://www.globalplatform.org/mediaguidetee.asp",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=9411",
          "https://source.android.com/devices/tech/security/index.html",
          "https://developer.android.com/reference/javax/net/ssl/SSLSocket",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=9459",
          "mailto:[email protected]",
          "https://developer.android.com/reference/android/app/admin/SecurityLog.SecurityEvent"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 67
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_MDF_V3.2.pdf",
        "pp_name": "Protection Profile for Mobile Device Fundamentals Version 3.2"
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_BT_V1.0.pdf",
        "pp_name": "PP-Module for Bluetooth Version 1.0"
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "PKG_TLS_V1.1"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/PKG_TLS_V1.1.pdf",
        "pp_name": "Functional Package for TLS Version 1.1"
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL1",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "PP_WLAN_CLI_EP_V1.0"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf",
        "pp_name": "Extended Package for Wireless Local Area Network (WLAN) Clients"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11315-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": []
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11315-st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "bc6478927c168d8c747d08177a1b2b4e0f057e39aeb01e2cfb7e6e47d21cb962",
      "txt_hash": "39682085081032f2377fa039b5d29fc0bc63623629482c1f3090aad76d18f7c6"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "6e8049dc61333b761a45c5fc71d194d88f635ef2fa8874776b049354c6758949",
      "txt_hash": "acb1011a11b74dea4cd1a3b1a36b2aa1eb92857696e506c13dd1eb0011ee8028"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "0455608e36fbd3141b72e6969798271acb1679a6aa90cdda620b6881b55529b1",
      "txt_hash": "9ba16d40e3bee4b729243aeeb33b29cb97b44900905c24eb5f4e285551306b43"
    }
  },
  "status": "active"
}