Apple iOS 11 Safari

CSV information ?

Status archived
Valid from 09.11.2018
Valid until 09.11.2020
Scheme 🇺🇸 US
Manufacturer Apple Inc.
Category Other Devices and Systems
Security level

Heuristics summary ?

Certificate ID: CCEVS-VR-VID-10916-2018

Certificate ?

Extracted keywords

Certificates
CCEVS-VR-VID10916-2018
Evaluation facilities
Acumen Security

File metadata

Creation date D:20181113111202-05'00'
Modification date D:20181113111202-05'00'
Pages 1
Producer iText 2.1.0 (by lowagie.com)

Certification report ?

Extracted keywords

Schemes
MAC
Protocols
SSH

Trusted Execution Environments
SE

Claims
T.NETWORK_ATTACK, T.NETWORK_EAVESDROP, T.LOCAL_ATTACK, T.PHYSICAL_ACCESS, T.FLAWED_ADDON, T.SAME-ORIGIN_VIOLATION, A.PLATFORM, A.PROPER_USER, A.PROPER_ADMIN
Security Functional Requirements (SFR)
FDP_STR_EXT.1.1, FPT_TUD_EXT.1.4, FPT_DNL_EXT.1.2
Certificates
CCEVS-VR-VID10916-2018
Evaluation facilities
Acumen Security

Standards
X.509

File metadata

Creation date D:20181113115149-05'00'
Modification date D:20181113115149-05'00'
Pages 23

Frontpage

Certificate ID CCEVS-VR-VID10916-2018
Certified item for the Apple IOS 11 Safari on iPhone and iPad
Certification lab US NIAP

Security target ?

Extracted keywords

Asymmetric Algorithms
ECDHE, DHE
Protocols
SSL 2.0, SSL 3.0, TLS, TLS 1.2, TLS 1.0, TLS 1.1, PGP
Randomness
DRBG
Elliptic Curves
secp256r1, secp384r1
TLS cipher suites
TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384

Trusted Execution Environments
SE

Claims
O.INTEGRITY, O.QUALITY, O.MANAGEMENT, O.PROTECTED_STORAGE, O.PROTECTED_COMMS, O.DOMAIN_ISOLATION, O.ADDON_INTEGRITY, T.NETWORK_ATTACK, T.NETWORK_EAVESDROP, T.LOCAL_ATTACK, T.PHYSICAL_ACCESS, T.FLAWED_ADDON, T.SAME-ORIGIN_VIOLATION, A.PLATFORM, A.PROPER_USER, A.PROPER_ADMIN, OE.PLATFORM, OE.PROPER_USER, OE.PROPER_ADMIN
Security Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ALC_TSU_EXT.1, ATE_IND.1, AVA_VAN.1
Security Functional Requirements (SFR)
FCS_CKM.1, FCS_CKM.2, FCS_TLSS_EXT.1.3, FCS_TLSC_EXT.2, FCS_TLSC_EXT.1.2, FCS_TLSS_EXT.1, FCS_TLSC_EXT, FCS_TLSS_EXT.1.1, FCS_STO_EXT.1, FCS_RBG_EXT.1.1, FCS_TLSC_EXT.1.1, FCS_STO_EXT.1.1, FCS_CKM, FCS_RBG_EXT.1, FCS_TLSC_EXT.1, FCS_DTLS_EXT.1, FCS_TLSC_EXT.4, FCS_TLSC_EXT.1.3, FCS_TLSC_EXT.4.1, FDP_DAR_EXT.1, FDP_DEC_EXT.1, FDP_TRK_EXT.1, FDP_STR_EXT.1, FDP_ACF_EXT.1.1, FDP_SBX_EXT.1, FDP_SOP_EXT.1, FDP_ACF_EXT.1, FDP_COO_EXT.1, FDP_NET_EXT.1, FDP_COO_EXT.1.1, FDP_DEC_EXT.1.1, FDP_DEC_EXT.1.2, FDP_NET_EXT.1.1, FDP_DAR_EXT.1.1, FDP_SBX_EXT.1.1, FDP_SOP_EXT.1.1, FDP_SOP_EXT.1.2, FDP_STR_EXT.1.1, FDP_TRK_EXT.1.1, FMT_CFG_EXT.1.2, FMT_MEC_EXT.1, FMT_SMF.1.1, FMT_MEC_EXT.1.1, FMT_CFG_EXT.1, FMT_SMF.1, FMT_MOF_EXT.1, FMT_CFG_EXT.1.1, FMT_MOF_EXT.1.1, FMT_MEC_EXT, FMT_MOF_EXT, FPR_ANO_EXT.1, FPT_MCD_EXT.1.2, FPT_AEX_EXT.1.3, FPT_AEX_EXT.1.4, FPT_AEX_EXT.1, FPT_TUD_EXT.1, FPT_DNL_EXT.1, FPT_MCD_EXT.1, FPT_API_EXT.1, FPT_LIB_EXT.1, FPT_IDV_EXT.1, FPT_TUD_EXT.1.5, FPT_AON_EXT.1, FPT_API_EXT.1.1, FPT_AEX_EXT.1.1, FPT_AEX_EXT.1.2, FPT_AEX_EXT.1.5, FPT_DNL_EXT.1.1, FPT_DNL_EXT.1.2, FPT_MCD_EXT.1.1, FPT_AON_EXT.1.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_TUD_EXT.1.4, FPT_TUD_EXT.1.6, FPT_LIB_EXT.1.1, FTP_DIT_EXT.1, FTP_DIT_EXT.1.1
Evaluation facilities
Acumen Security

Standards
RFC5759, RFC5280, RFC 2818, RFC 5246, RFC 5289, RFC 6125, RFC 5280, RFC 2560, RFC 6454, RFC 6265, X.509

File metadata

Author Anthony Busciglio
Creation date D:20181107121109-05'00'
Modification date D:20181107121109-05'00'
Pages 28
Creator Microsoft® Word 2013
Producer Microsoft® Word 2013

Heuristics ?

Certificate ID: CCEVS-VR-VID-10916-2018

Extracted SARs

ALC_CMC.1, AGD_PRE.1, ATE_IND.1, ADV_FSP.1, ALC_TSU_EXT.1, ALC_CMS.1, AVA_VAN.1, AGD_OPE.1

Scheme data ?

Product Apple iOS 11
Id CCEVS-VR-VID10851
Url https://www.niap-ccevs.org/product/10851
Certification Date 2018-03-30T00:00:00Z
Expiration Date 2020-03-30T00:00:00Z
Category Mobility, Wireless LAN
Vendor Apple Inc.
Evaluation Facility atsec information security corporation
Scheme US

References ?

No references are available for this certificate.

Updates ?

  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Apple iOS 11 Safari was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10916-ci.pdf",
  "dgst": "62abbe3d7a3f0fcf",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CCEVS-VR-VID-10916-2018",
    "cert_lab": [
      "US"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TSU_EXT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "11"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "Mobility, Wireless LAN",
      "certification_date": "2018-03-30T00:00:00Z",
      "evaluation_facility": "atsec information security corporation",
      "expiration_date": "2020-03-30T00:00:00Z",
      "id": "CCEVS-VR-VID10851",
      "product": "Apple iOS 11",
      "scheme": "US",
      "url": "https://www.niap-ccevs.org/product/10851",
      "vendor": "Apple Inc."
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Apple Inc.",
  "manufacturer_web": "https://www.apple.com/",
  "name": "Apple iOS 11 Safari",
  "not_valid_after": "2020-11-09",
  "not_valid_before": "2018-11-09",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "st_vid10916-ci.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID10916-2018": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Acumen": {
          "Acumen Security": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20181113111202-05\u002700\u0027",
      "/ModDate": "D:20181113111202-05\u002700\u0027",
      "/Producer": "iText 2.1.0 (by lowagie.com)",
      "pdf_file_size_bytes": 181114,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "st_vid10916-vr.pdf",
    "report_frontpage": {
      "US": {
        "cert_id": "CCEVS-VR-VID10916-2018",
        "cert_item": "for the Apple IOS 11 Safari on iPhone and iPad",
        "cert_lab": "US NIAP"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID10916-2018": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.PLATFORM": 1,
          "A.PROPER_ADMIN": 1,
          "A.PROPER_USER": 1
        },
        "T": {
          "T.FLAWED_ADDON": 1,
          "T.LOCAL_ATTACK": 1,
          "T.NETWORK_ATTACK": 2,
          "T.NETWORK_EAVESDROP": 1,
          "T.PHYSICAL_ACCESS": 1,
          "T.SAME-ORIGIN_VIOLATION": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {},
      "cc_sfr": {
        "FDP": {
          "FDP_STR_EXT.1.1": 1
        },
        "FPT": {
          "FPT_DNL_EXT.1.2": 1,
          "FPT_TUD_EXT.1.4": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 1
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Acumen": {
          "Acumen Security": 4
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "X509": {
          "X.509": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20181113115149-05\u002700\u0027",
      "/ModDate": "D:20181113115149-05\u002700\u0027",
      "pdf_file_size_bytes": 854235,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.securityfocus.com/",
          "http://nvd.nist.gov/",
          "http://www.us-cert.gov/",
          "http://cve.mitre.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 23
    },
    "st_filename": "st_vid10916-st.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDHE": 1
          }
        },
        "FF": {
          "DH": {
            "DHE": 1
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.PLATFORM": 1,
          "A.PROPER_ADMIN": 1,
          "A.PROPER_USER": 1
        },
        "O": {
          "O.ADDON_INTEGRITY": 1,
          "O.DOMAIN_ISOLATION": 1,
          "O.INTEGRITY": 1,
          "O.MANAGEMENT": 1,
          "O.PROTECTED_COMMS": 1,
          "O.PROTECTED_STORAGE": 1,
          "O.QUALITY": 1
        },
        "OE": {
          "OE.PLATFORM": 1,
          "OE.PROPER_ADMIN": 1,
          "OE.PROPER_USER": 1
        },
        "T": {
          "T.FLAWED_ADDON": 1,
          "T.LOCAL_ATTACK": 1,
          "T.NETWORK_ATTACK": 2,
          "T.NETWORK_EAVESDROP": 1,
          "T.PHYSICAL_ACCESS": 1,
          "T.SAME-ORIGIN_VIOLATION": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.1": 2
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC.1": 2,
          "ALC_CMS.1": 2,
          "ALC_TSU_EXT.1": 2
        },
        "ATE": {
          "ATE_IND.1": 2
        },
        "AVA": {
          "AVA_VAN.1": 2
        }
      },
      "cc_security_level": {},
      "cc_sfr": {
        "FCS": {
          "FCS_CKM": 1,
          "FCS_CKM.1": 5,
          "FCS_CKM.2": 1,
          "FCS_DTLS_EXT.1": 1,
          "FCS_RBG_EXT.1": 5,
          "FCS_RBG_EXT.1.1": 2,
          "FCS_STO_EXT.1": 5,
          "FCS_STO_EXT.1.1": 2,
          "FCS_TLSC_EXT": 1,
          "FCS_TLSC_EXT.1": 5,
          "FCS_TLSC_EXT.1.1": 2,
          "FCS_TLSC_EXT.1.2": 2,
          "FCS_TLSC_EXT.1.3": 1,
          "FCS_TLSC_EXT.2": 2,
          "FCS_TLSC_EXT.4": 2,
          "FCS_TLSC_EXT.4.1": 1,
          "FCS_TLSS_EXT.1": 9,
          "FCS_TLSS_EXT.1.1": 3,
          "FCS_TLSS_EXT.1.3": 1
        },
        "FDP": {
          "FDP_ACF_EXT.1": 3,
          "FDP_ACF_EXT.1.1": 2,
          "FDP_COO_EXT.1": 3,
          "FDP_COO_EXT.1.1": 1,
          "FDP_DAR_EXT.1": 5,
          "FDP_DAR_EXT.1.1": 1,
          "FDP_DEC_EXT.1": 4,
          "FDP_DEC_EXT.1.1": 1,
          "FDP_DEC_EXT.1.2": 1,
          "FDP_NET_EXT.1": 3,
          "FDP_NET_EXT.1.1": 1,
          "FDP_SBX_EXT.1": 4,
          "FDP_SBX_EXT.1.1": 1,
          "FDP_SOP_EXT.1": 4,
          "FDP_SOP_EXT.1.1": 1,
          "FDP_SOP_EXT.1.2": 1,
          "FDP_STR_EXT.1": 4,
          "FDP_STR_EXT.1.1": 1,
          "FDP_TRK_EXT.1": 4,
          "FDP_TRK_EXT.1.1": 1
        },
        "FMT": {
          "FMT_CFG_EXT.1": 4,
          "FMT_CFG_EXT.1.1": 1,
          "FMT_CFG_EXT.1.2": 2,
          "FMT_MEC_EXT": 1,
          "FMT_MEC_EXT.1": 4,
          "FMT_MEC_EXT.1.1": 2,
          "FMT_MOF_EXT": 1,
          "FMT_MOF_EXT.1": 4,
          "FMT_MOF_EXT.1.1": 1,
          "FMT_SMF.1": 4,
          "FMT_SMF.1.1": 3
        },
        "FPR": {
          "FPR_ANO_EXT.1": 5
        },
        "FPT": {
          "FPT_AEX_EXT.1": 4,
          "FPT_AEX_EXT.1.1": 1,
          "FPT_AEX_EXT.1.2": 1,
          "FPT_AEX_EXT.1.3": 4,
          "FPT_AEX_EXT.1.4": 2,
          "FPT_AEX_EXT.1.5": 1,
          "FPT_AON_EXT.1": 4,
          "FPT_AON_EXT.1.1": 1,
          "FPT_API_EXT.1": 4,
          "FPT_API_EXT.1.1": 1,
          "FPT_DNL_EXT.1": 4,
          "FPT_DNL_EXT.1.1": 1,
          "FPT_DNL_EXT.1.2": 1,
          "FPT_IDV_EXT.1": 1,
          "FPT_LIB_EXT.1": 4,
          "FPT_LIB_EXT.1.1": 1,
          "FPT_MCD_EXT.1": 4,
          "FPT_MCD_EXT.1.1": 1,
          "FPT_MCD_EXT.1.2": 3,
          "FPT_TUD_EXT.1": 4,
          "FPT_TUD_EXT.1.1": 1,
          "FPT_TUD_EXT.1.2": 1,
          "FPT_TUD_EXT.1.3": 1,
          "FPT_TUD_EXT.1.4": 1,
          "FPT_TUD_EXT.1.5": 2,
          "FPT_TUD_EXT.1.6": 1
        },
        "FTP": {
          "FTP_DIT_EXT.1": 5,
          "FTP_DIT_EXT.1.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PGP": {
          "PGP": 2
        },
        "TLS": {
          "SSL": {
            "SSL 2.0": 1,
            "SSL 3.0": 1
          },
          "TLS": {
            "TLS": 22,
            "TLS 1.0": 1,
            "TLS 1.1": 1,
            "TLS 1.2": 4
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "secp256r1": 2,
          "secp384r1": 2
        }
      },
      "eval_facility": {
        "Acumen": {
          "Acumen Security": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "RFC": {
          "RFC 2560": 1,
          "RFC 2818": 2,
          "RFC 5246": 4,
          "RFC 5280": 3,
          "RFC 5289": 10,
          "RFC 6125": 2,
          "RFC 6265": 1,
          "RFC 6454": 1,
          "RFC5280": 1,
          "RFC5759": 1
        },
        "X509": {
          "X.509": 10
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 1
        }
      },
      "tls_cipher_suite": {
        "TLS": {
          "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256": 2,
          "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 2,
          "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384": 2,
          "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 2,
          "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 2,
          "TLS_RSA_WITH_AES_128_CBC_SHA256": 2,
          "TLS_RSA_WITH_AES_256_CBC_SHA256": 2
        }
      },
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Anthony Busciglio",
      "/CreationDate": "D:20181107121109-05\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2013",
      "/ModDate": "D:20181107121109-05\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2013",
      "pdf_file_size_bytes": 1165042,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=110",
          "https://support.apple.com/en-us/HT201214",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_tds.cfm"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 28
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_app_v1.2.pdf",
        "pp_name": "Protection Profile for Application Software, Version 1.2"
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_app_webbrowser_ep_v2.0.pdf",
        "pp_name": "Extended Package for Web Browsers v2.0"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/st_vid10916-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": []
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/st_vid10916-st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "c8f63d3100df944b659f64562148dd711f49ade3733b2483c50271d5aa0a537e",
      "txt_hash": "8f014f824d86d36b39b3d1d85465a69109ebb37fcaec83287d6c5ff3ce8f35e8"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "f2cdba1674a693ceaf1ee99e54c8c5336f741f520739f42adf601d32ce474652",
      "txt_hash": "b3cafeafc3f418fa1445937e6d9144acb6debd61fceaa79672a6e5d200a2dc8e"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "62e9c154f64e8a8f747fe05e0ec2173ebaeaebb2f954abeabe3786bdd7545c51",
      "txt_hash": "f99151139fb4d38dc9c23808c48f4ed31472562e4c15ededf55883fe1027d86f"
    }
  },
  "status": "archived"
}