This page was not yet optimized for use on mobile devices.
SpiFlash TrustME Secure Flash Memory W75F40W[W/R][I/J/W][B/C] & W75F40W[BY/Q3][I/J/W][C/B]G version AA
CSV information
Status | active |
---|---|
Valid from | 20.05.2025 |
Valid until | 20.05.2030 |
Scheme | 🇪🇸 ES |
Manufacturer | Winbond Electonics Corporation |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.5, ALC_DVS.2, EAL5 |
Heuristics summary
Certificate ID: 2023-6-INF-4552
Certificate
Extracted keywords
Security level
EAL 4, EAL 2, EAL5+Claims
O.ESecurity Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5Evaluation facilities
Applus LaboratoriesFile metadata
Creation date | D:20250509074311+02'00' |
---|---|
Modification date | D:20250509074311+02'00' |
Pages | 2 |
Producer | GPL Ghostscript 9.27 |
Certification report
Extracted keywords
Security level
EAL5, EAL 1, EAL 4, EAL 2, EAL2, ITSEC EvaluationSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_IMP.1, ADV_TDS.4, ADV_ARC, AGD_OPE.1, ALC_DVS.2, ALC_CMC.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ALC_FLR, ATE_COV.2, ATE_FUN.1, AVA_VAN.5, ASE_CCL.1, ASE_INT.1, ASE_REQ.2Security Functional Requirements (SFR)
FDP_SDC.1, FDP_ITT.1, FDP_IFC.1, FDP_UIT.1, FDP_RIP.1, FMT_LIM.1, FPT_FLS, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2, FTP_TRP.1Certificates
2023-6-INF-4552- v1Evaluation facilities
Applus LaboratoriesSide-channel analysis
JILFile metadata
Author | 9308 |
---|---|
Creation date | D:20250704120523+02'00' |
Modification date | D:20250704120523+02'00' |
Pages | 18 |
Creator | Microsoft® Word LTSC |
Producer | Microsoft® Word LTSC |
Security target
Extracted keywords
Schemes
MACSecurity level
EAL5, EAL5 augmentedClaims
O.C, R.OSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_ARC.1, ADV_FSP, ADV_FSP.5, ADV_IMP, ADV_IMP.1, ADV_INT, ADV_INT.2, ADV_TDS, ADV_TDS.4, ADV_FSP.1, ADV_TDS.1, ADV_TDS.3, ADV_FSP.2, ADV_FSP.4, AGD_OPE, AGD_OPE.1, AGD_PRE, AGD_PRE.1, ALC_DVS.2, ALC_CMC, ALC_CMC.4, ALC_CMS, ALC_CMS.5, ALC_DEL, ALC_DEL.1, ALC_DVS, ALC_LCD, ALC_LCD.1, ALC_TAT, ALC_TAT.2, ALC_TAT.1, ALC_CMS.1, ALC_DVS.1, ATE_COV, ATE_COV.2, ATE_DPT, ATE_DPT.3, ATE_FUN, ATE_FUN.1, ATE_IND, ATE_IND.2, ATE_COV.1, ATE_DPT.1, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_CCL.1, ASE_ECD, ASE_ECD.1, ASE_INT, ASE_INT.1, ASE_OBJ, ASE_OBJ.2, ASE_REQ, ASE_REQ.2, ASE_SPD, ASE_SPD.1, ASE_APD.1, ASE_TSS, ASE_TSS.1, ASE_REQ.1Security Functional Requirements (SFR)
FDP_SDC, FDP_ACF, FDP_SDC.1, FDP_SDI, FDP_SDC.1.1, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITT.1, FDP_ITT.1.1, FDP_IFC.1, FDP_IFC.1.1, FDP_UCT.1, FDP_UCT.1.1, FDP_UIT.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_RIP.1, FDP_RIP.1.1, FDP_ACC.1, FDP_IFF.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FPT_FLS, FPT_FLS.1, FPT_PHP.3, FPT_PHP.3.1, FPT_ITT.1, FPT_ITT.1.1, FRU_FLT.2, FRU_FLT.2.1, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3, FTP_ITC.1Protection profiles
BSI-PP-0084Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, physical tampering, Malfunction, malfunction, fault injection, Fault InjectionStandards
ISO/IEC 7816-3, CCMB-2017-04-004File metadata
Creation date | D:20240322084540+01'00' |
---|---|
Modification date | D:20240322084540+01'00' |
Pages | 65 |
Creator | Microsoft® Word 2016 |
Producer | Microsoft® Word 2016 |
Heuristics
Certificate ID: 2023-6-INF-4552
Extracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.2, ASE_APD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Scheme data ?
Product | SpiFlash TrustME Secure Flash Memory W75F40W[W/R][I/J/W][B/C] W75F40W[BY/Q3][I/J/W][C/B]G version AA | |
---|---|---|
Product Link | https://oc.ccn.cni.es/en/certified-products/certified-products/1039-spiflash-trustme-secure-flash-memory-w75f40w-w-r-i-j-w-b-c-w75f40w-by-q3-i-j-w-c-b-g-version-aa | |
Category | Smart Cards and similiar devices | |
Manufacturer | Winbond Electronics Corporation | |
Certification Date | 20.05.2025 | |
Enhanced | ||
Description | The TOE is a memory flash IC designed to be embedded into highly critical hardware devices such as smart card, secure element, USB token, secure micro SD, etc. These devices will embed secure applications such as financial, telecommunication, identity (e-Government), etc and will be working in a hostile environment. In particular, the TOE is dedicated to the secure storage of the code and data of critical applications. The security needs for the TOE consist in: Maintaining the integrity of the content of the memories and the confidentiality of the content of protected memory areas as required by the critical HW products (e.g. Security IC) the Memory Flash is built for. Providing a secure communication with the Host device that will embed the TOE in a secure HW product such as Security IC. | |
Category | Smart Cards and similiar devices | |
Manufacturer | Winbond Electronics Corporation | |
Type | Product | |
Evaluation Facility | Applus Laboratories | |
Status | Archivied product | |
Certification Date | 20.05.2025 | |
Cc Version | Common Criteria 3.1 release 5 | |
Level | EAL5 + ALC_DVS.2 + AVA_VAN.5 | |
Target Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2155 | |
Cert Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2156 | |
Report Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2157 |
References
No references are available for this certificate.
Updates
-
07.07.2025 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name SpiFlash TrustME Secure Flash Memory W75F40W[W/R][I/J/W][B/C] & W75F40W[BY/Q3][I/J/W][C/B]G version AA was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2023-06%20Certificado.pdf",
"dgst": "2cc3a9053e988860",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "2023-6-INF-4552",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL5",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_APD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "Smart Cards and similiar devices",
"certification_date": "2025-05-20",
"enhanced": {
"category": "Smart Cards and similiar devices",
"cc_version": "Common Criteria 3.1 release 5",
"cert_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=2156",
"certification_date": "2025-05-20",
"description": "The TOE is a memory flash IC designed to be embedded into highly critical hardware devices such as smart card, secure element, USB token, secure micro SD, etc. These devices will embed secure applications such as financial, telecommunication, identity (e-Government), etc and will be working in a hostile environment. In particular, the TOE is dedicated to the secure storage of the code and data of critical applications. The security needs for the TOE consist in: Maintaining the integrity of the content of the memories and the confidentiality of the content of protected memory areas as required by the critical HW products (e.g. Security IC) the Memory Flash is built for. Providing a secure communication with the Host device that will embed the TOE in a secure HW product such as Security IC.",
"evaluation_facility": "Applus Laboratories",
"level": "EAL5 + ALC_DVS.2 + AVA_VAN.5",
"manufacturer": "Winbond Electronics Corporation",
"report_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=2157",
"status": "Archivied product",
"target_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=2155",
"type": "Product"
},
"manufacturer": "Winbond Electronics Corporation",
"product": "SpiFlash TrustME Secure Flash Memory W75F40W[W/R][I/J/W][B/C] W75F40W[BY/Q3][I/J/W][C/B]G version AA",
"product_link": "https://oc.ccn.cni.es/en/certified-products/certified-products/1039-spiflash-trustme-secure-flash-memory-w75f40w-w-r-i-j-w-b-c-w75f40w-by-q3-i-j-w-c-b-g-version-aa"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Winbond Electonics Corporation",
"manufacturer_web": "https://www.winbond.com/",
"name": "SpiFlash TrustME Secure Flash Memory W75F40W[W/R][I/J/W][B/C] \u0026 W75F40W[BY/Q3][I/J/W][C/B]G version AA",
"not_valid_after": "2030-05-20",
"not_valid_before": "2025-05-20",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "2023-06 Certificado.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.E": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 1,
"EAL5+": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Applus": {
"Applus Laboratories": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20250509074311+02\u002700\u0027",
"/ModDate": "D:20250509074311+02\u002700\u0027",
"/Producer": "GPL Ghostscript 9.27",
"pdf_file_size_bytes": 911283,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"report_filename": "2023-06 CERTIFICATION REPORT.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"ES": {
"2023-6-INF-4552- v1": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_IMP.1": 1,
"ADV_TDS.4": 1
},
"AGD": {
"AGD_OPE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 8,
"ALC_FLR": 3,
"ALC_LCD.1": 1,
"ALC_TAT.2": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_INT.1": 1,
"ASE_REQ.2": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_FUN.1": 1
},
"AVA": {
"AVA_VAN.5": 9
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 1,
"EAL 4": 2,
"EAL2": 1,
"EAL5": 8
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {
"FDP": {
"FDP_IFC.1": 1,
"FDP_ITT.1": 1,
"FDP_RIP.1": 1,
"FDP_SDC.1": 1,
"FDP_UIT.1": 1
},
"FMT": {
"FMT_LIM.1": 1
},
"FPT": {
"FPT_FLS": 2,
"FPT_ITT.1": 1,
"FPT_PHP.3": 1
},
"FRU": {
"FRU_FLT.2": 1
},
"FTP": {
"FTP_TRP.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Applus": {
"Applus Laboratories": 11
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"other": {
"JIL": 1
}
},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "9308",
"/CreationDate": "D:20250704120523+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word LTSC",
"/ModDate": "D:20250704120523+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word LTSC",
"pdf_file_size_bytes": 444427,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 18
},
"st_filename": "W75F40W_AA_ST_rev_I.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.C": 4
},
"R": {
"R.O": 4
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0084": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 2,
"ADV_ARC.1": 17,
"ADV_FSP": 1,
"ADV_FSP.1": 3,
"ADV_FSP.2": 3,
"ADV_FSP.4": 1,
"ADV_FSP.5": 23,
"ADV_IMP": 1,
"ADV_IMP.1": 17,
"ADV_INT": 1,
"ADV_INT.2": 9,
"ADV_TDS": 1,
"ADV_TDS.1": 2,
"ADV_TDS.3": 4,
"ADV_TDS.4": 24
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 17,
"AGD_PRE": 1,
"AGD_PRE.1": 13
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.4": 17,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.5": 8,
"ALC_DEL": 1,
"ALC_DEL.1": 7,
"ALC_DVS": 1,
"ALC_DVS.1": 2,
"ALC_DVS.2": 16,
"ALC_LCD": 1,
"ALC_LCD.1": 10,
"ALC_TAT": 1,
"ALC_TAT.1": 2,
"ALC_TAT.2": 13
},
"ASE": {
"ASE_APD.1": 1,
"ASE_CCL": 1,
"ASE_CCL.1": 16,
"ASE_ECD": 1,
"ASE_ECD.1": 15,
"ASE_INT": 1,
"ASE_INT.1": 18,
"ASE_OBJ": 1,
"ASE_OBJ.2": 14,
"ASE_REQ": 1,
"ASE_REQ.1": 2,
"ASE_REQ.2": 16,
"ASE_SPD": 1,
"ASE_SPD.1": 9,
"ASE_TSS": 1,
"ASE_TSS.1": 7
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 2,
"ATE_COV.2": 9,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.3": 8,
"ATE_FUN": 1,
"ATE_FUN.1": 15,
"ATE_IND": 1,
"ATE_IND.2": 8
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 18
}
},
"cc_security_level": {
"EAL": {
"EAL5": 6,
"EAL5 augmented": 2
}
},
"cc_sfr": {
"FDP": {
"FDP_ACC.1": 3,
"FDP_ACF": 1,
"FDP_IFC.1": 28,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 4,
"FDP_ITT.1": 14,
"FDP_ITT.1.1": 1,
"FDP_RIP.1": 9,
"FDP_RIP.1.1": 1,
"FDP_SDC": 4,
"FDP_SDC.1": 17,
"FDP_SDC.1.1": 2,
"FDP_SDI": 1,
"FDP_SDI.2": 12,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UCT.1": 9,
"FDP_UCT.1.1": 1,
"FDP_UIT.1": 9,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FMT": {
"FMT_LIM": 5,
"FMT_LIM.1": 23,
"FMT_LIM.1.1": 2,
"FMT_LIM.2": 21,
"FMT_LIM.2.1": 2
},
"FPT": {
"FPT_FLS": 26,
"FPT_FLS.1": 3,
"FPT_ITT.1": 13,
"FPT_ITT.1.1": 1,
"FPT_PHP.3": 15,
"FPT_PHP.3.1": 1
},
"FRU": {
"FRU_FLT.2": 13,
"FRU_FLT.2.1": 1
},
"FTP": {
"FTP_ITC.1": 2,
"FTP_TRP.1": 12,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"Fault Injection": 1,
"Malfunction": 19,
"fault injection": 2,
"malfunction": 3,
"physical tampering": 3
},
"SCA": {
"Leak-Inherent": 19,
"Physical Probing": 2,
"physical probing": 5
}
},
"standard_id": {
"CC": {
"CCMB-2017-04-004": 1
},
"ISO": {
"ISO/IEC 7816-3": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20240322084540+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/ModDate": "D:20240322084540+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"pdf_file_size_bytes": 1130067,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://en.wikipedia.org/wiki/Synchronous_circuit",
"http://en.wikipedia.org/wiki/De_facto_standard",
"http://en.wikipedia.org/wiki/Serial_communications",
"http://en.wikipedia.org/wiki/Full_duplex"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 65
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2023-06%20CERTIFICATION%20REPORT.pdf",
"scheme": "ES",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"AVA_VAN.5",
"EAL5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/W75F40W_AA_ST_rev_I.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "4c9fb109d1744b6c140f5327dc3f6b9cf7b00a1767b9daab89772fbcb4191bf2",
"txt_hash": "0e62dfc9188d21cec98478faa6a1183c48e966c5a561bbca9d34a5f276f71760"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ad09777918a72da6d35ff19db39fbfff00178964ae2b09555da6c5ab7688efef",
"txt_hash": "08ccbf56de6c63ecc7f1abebfc469c6c4868f9fe414d1d66c54c04a38dbcb397"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "a9d3bb551217bac5e8d3f03d1ff39c4ef864ac429662bd49dd6f52b4dbfc50c1",
"txt_hash": "831ab96193301fc0c626e93cbfe528f63e16cac738342c4463be9f83446981ab"
}
},
"status": "active"
}