SpiFlash TrustME Secure Flash Memory W75F40W[W/R][I/J/W][B/C] & W75F40W[BY/Q3][I/J/W][C/B]G version AA

CSV information

Status active
Valid from 20.05.2025
Valid until 20.05.2030
Scheme 🇪🇸 ES
Manufacturer Winbond Electonics Corporation
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, ALC_DVS.2, EAL5

Heuristics summary

Certificate ID: 2023-6-INF-4552

Certificate

Extracted keywords

Security level
EAL 4, EAL 2, EAL5+
Claims
O.E
Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5
Evaluation facilities
Applus Laboratories

File metadata

Creation date D:20250509074311+02'00'
Modification date D:20250509074311+02'00'
Pages 2
Producer GPL Ghostscript 9.27

Certification report

Extracted keywords

Security level
EAL5, EAL 1, EAL 4, EAL 2, EAL2, ITSEC Evaluation
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_IMP.1, ADV_TDS.4, ADV_ARC, AGD_OPE.1, ALC_DVS.2, ALC_CMC.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ALC_FLR, ATE_COV.2, ATE_FUN.1, AVA_VAN.5, ASE_CCL.1, ASE_INT.1, ASE_REQ.2
Security Functional Requirements (SFR)
FDP_SDC.1, FDP_ITT.1, FDP_IFC.1, FDP_UIT.1, FDP_RIP.1, FMT_LIM.1, FPT_FLS, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2, FTP_TRP.1
Certificates
2023-6-INF-4552- v1
Evaluation facilities
Applus Laboratories

Side-channel analysis
JIL

File metadata

Author 9308
Creation date D:20250704120523+02'00'
Modification date D:20250704120523+02'00'
Pages 18
Creator Microsoft® Word LTSC
Producer Microsoft® Word LTSC

Security target

Extracted keywords

Schemes
MAC

Security level
EAL5, EAL5 augmented
Claims
O.C, R.O
Security Assurance Requirements (SAR)
ADV_ARC, ADV_ARC.1, ADV_FSP, ADV_FSP.5, ADV_IMP, ADV_IMP.1, ADV_INT, ADV_INT.2, ADV_TDS, ADV_TDS.4, ADV_FSP.1, ADV_TDS.1, ADV_TDS.3, ADV_FSP.2, ADV_FSP.4, AGD_OPE, AGD_OPE.1, AGD_PRE, AGD_PRE.1, ALC_DVS.2, ALC_CMC, ALC_CMC.4, ALC_CMS, ALC_CMS.5, ALC_DEL, ALC_DEL.1, ALC_DVS, ALC_LCD, ALC_LCD.1, ALC_TAT, ALC_TAT.2, ALC_TAT.1, ALC_CMS.1, ALC_DVS.1, ATE_COV, ATE_COV.2, ATE_DPT, ATE_DPT.3, ATE_FUN, ATE_FUN.1, ATE_IND, ATE_IND.2, ATE_COV.1, ATE_DPT.1, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_CCL.1, ASE_ECD, ASE_ECD.1, ASE_INT, ASE_INT.1, ASE_OBJ, ASE_OBJ.2, ASE_REQ, ASE_REQ.2, ASE_SPD, ASE_SPD.1, ASE_APD.1, ASE_TSS, ASE_TSS.1, ASE_REQ.1
Security Functional Requirements (SFR)
FDP_SDC, FDP_ACF, FDP_SDC.1, FDP_SDI, FDP_SDC.1.1, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITT.1, FDP_ITT.1.1, FDP_IFC.1, FDP_IFC.1.1, FDP_UCT.1, FDP_UCT.1.1, FDP_UIT.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_RIP.1, FDP_RIP.1.1, FDP_ACC.1, FDP_IFF.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FPT_FLS, FPT_FLS.1, FPT_PHP.3, FPT_PHP.3.1, FPT_ITT.1, FPT_ITT.1.1, FRU_FLT.2, FRU_FLT.2.1, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3, FTP_ITC.1
Protection profiles
BSI-PP-0084

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, physical tampering, Malfunction, malfunction, fault injection, Fault Injection

Standards
ISO/IEC 7816-3, CCMB-2017-04-004

File metadata

Creation date D:20240322084540+01'00'
Modification date D:20240322084540+01'00'
Pages 65
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

Heuristics

Certificate ID: 2023-6-INF-4552

Extracted SARs

ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.2, ASE_APD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5

Scheme data ?

Product SpiFlash TrustME Secure Flash Memory W75F40W[W/R][I/J/W][B/C] W75F40W[BY/Q3][I/J/W][C/B]G version AA
Product Link https://oc.ccn.cni.es/en/certified-products/certified-products/1039-spiflash-trustme-secure-flash-memory-w75f40w-w-r-i-j-w-b-c-w75f40w-by-q3-i-j-w-c-b-g-version-aa
Category Smart Cards and similiar devices
Manufacturer Winbond Electronics Corporation
Certification Date 20.05.2025
Enhanced
Description The TOE is a memory flash IC designed to be embedded into highly critical hardware devices such as smart card, secure element, USB token, secure micro SD, etc. These devices will embed secure applications such as financial, telecommunication, identity (e-Government), etc and will be working in a hostile environment. In particular, the TOE is dedicated to the secure storage of the code and data of critical applications. The security needs for the TOE consist in: Maintaining the integrity of the content of the memories and the confidentiality of the content of protected memory areas as required by the critical HW products (e.g. Security IC) the Memory Flash is built for. Providing a secure communication with the Host device that will embed the TOE in a secure HW product such as Security IC.
Category Smart Cards and similiar devices
Manufacturer Winbond Electronics Corporation
Type Product
Evaluation Facility Applus Laboratories
Status Archivied product
Certification Date 20.05.2025
Cc Version Common Criteria 3.1 release 5
Level EAL5 + ALC_DVS.2 + AVA_VAN.5
Target Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2155
Cert Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2156
Report Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2157

References

No references are available for this certificate.

Updates

  • 07.07.2025 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name SpiFlash TrustME Secure Flash Memory W75F40W[W/R][I/J/W][B/C] & W75F40W[BY/Q3][I/J/W][C/B]G version AA was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2023-06%20Certificado.pdf",
  "dgst": "2cc3a9053e988860",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "2023-6-INF-4552",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL5",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_APD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "Smart Cards and similiar devices",
      "certification_date": "2025-05-20",
      "enhanced": {
        "category": "Smart Cards and similiar devices",
        "cc_version": "Common Criteria 3.1 release 5",
        "cert_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=2156",
        "certification_date": "2025-05-20",
        "description": "The TOE is a memory flash IC designed to be embedded into highly critical hardware devices such as smart card, secure element, USB token, secure micro SD, etc. These devices will embed secure applications such as financial, telecommunication, identity (e-Government), etc and will be working in a hostile environment. In particular, the TOE is dedicated to the secure storage of the code and data of critical applications. The security needs for the TOE consist in: Maintaining the integrity of the content of the memories and the confidentiality of the content of protected memory areas as required by the critical HW products (e.g. Security IC) the Memory Flash is built for. Providing a secure communication with the Host device that will embed the TOE in a secure HW product such as Security IC.",
        "evaluation_facility": "Applus Laboratories",
        "level": "EAL5 + ALC_DVS.2 + AVA_VAN.5",
        "manufacturer": "Winbond Electronics Corporation",
        "report_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=2157",
        "status": "Archivied product",
        "target_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=2155",
        "type": "Product"
      },
      "manufacturer": "Winbond Electronics Corporation",
      "product": "SpiFlash TrustME Secure Flash Memory W75F40W[W/R][I/J/W][B/C] W75F40W[BY/Q3][I/J/W][C/B]G version AA",
      "product_link": "https://oc.ccn.cni.es/en/certified-products/certified-products/1039-spiflash-trustme-secure-flash-memory-w75f40w-w-r-i-j-w-b-c-w75f40w-by-q3-i-j-w-c-b-g-version-aa"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Winbond Electonics Corporation",
  "manufacturer_web": "https://www.winbond.com/",
  "name": "SpiFlash TrustME Secure Flash Memory W75F40W[W/R][I/J/W][B/C] \u0026 W75F40W[BY/Q3][I/J/W][C/B]G version AA",
  "not_valid_after": "2030-05-20",
  "not_valid_before": "2025-05-20",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "2023-06 Certificado.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.E": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 4": 1,
          "EAL5+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Applus": {
          "Applus Laboratories": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20250509074311+02\u002700\u0027",
      "/ModDate": "D:20250509074311+02\u002700\u0027",
      "/Producer": "GPL Ghostscript 9.27",
      "pdf_file_size_bytes": 911283,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "2023-06 CERTIFICATION REPORT.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "ES": {
          "2023-6-INF-4552- v1": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.4": 1
        },
        "AGD": {
          "AGD_OPE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 8,
          "ALC_FLR": 3,
          "ALC_LCD.1": 1,
          "ALC_TAT.2": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_INT.1": 1,
          "ASE_REQ.2": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_FUN.1": 1
        },
        "AVA": {
          "AVA_VAN.5": 9
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 1,
          "EAL 4": 2,
          "EAL2": 1,
          "EAL5": 8
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {
        "FDP": {
          "FDP_IFC.1": 1,
          "FDP_ITT.1": 1,
          "FDP_RIP.1": 1,
          "FDP_SDC.1": 1,
          "FDP_UIT.1": 1
        },
        "FMT": {
          "FMT_LIM.1": 1
        },
        "FPT": {
          "FPT_FLS": 2,
          "FPT_ITT.1": 1,
          "FPT_PHP.3": 1
        },
        "FRU": {
          "FRU_FLT.2": 1
        },
        "FTP": {
          "FTP_TRP.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Applus": {
          "Applus Laboratories": 11
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "other": {
          "JIL": 1
        }
      },
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "9308",
      "/CreationDate": "D:20250704120523+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word LTSC",
      "/ModDate": "D:20250704120523+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word LTSC",
      "pdf_file_size_bytes": 444427,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 18
    },
    "st_filename": "W75F40W_AA_ST_rev_I.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.C": 4
        },
        "R": {
          "R.O": 4
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0084": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 2,
          "ADV_ARC.1": 17,
          "ADV_FSP": 1,
          "ADV_FSP.1": 3,
          "ADV_FSP.2": 3,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 23,
          "ADV_IMP": 1,
          "ADV_IMP.1": 17,
          "ADV_INT": 1,
          "ADV_INT.2": 9,
          "ADV_TDS": 1,
          "ADV_TDS.1": 2,
          "ADV_TDS.3": 4,
          "ADV_TDS.4": 24
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 17,
          "AGD_PRE": 1,
          "AGD_PRE.1": 13
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.4": 17,
          "ALC_CMS": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.5": 8,
          "ALC_DEL": 1,
          "ALC_DEL.1": 7,
          "ALC_DVS": 1,
          "ALC_DVS.1": 2,
          "ALC_DVS.2": 16,
          "ALC_LCD": 1,
          "ALC_LCD.1": 10,
          "ALC_TAT": 1,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 13
        },
        "ASE": {
          "ASE_APD.1": 1,
          "ASE_CCL": 1,
          "ASE_CCL.1": 16,
          "ASE_ECD": 1,
          "ASE_ECD.1": 15,
          "ASE_INT": 1,
          "ASE_INT.1": 18,
          "ASE_OBJ": 1,
          "ASE_OBJ.2": 14,
          "ASE_REQ": 1,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 16,
          "ASE_SPD": 1,
          "ASE_SPD.1": 9,
          "ASE_TSS": 1,
          "ASE_TSS.1": 7
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 2,
          "ATE_COV.2": 9,
          "ATE_DPT": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.3": 8,
          "ATE_FUN": 1,
          "ATE_FUN.1": 15,
          "ATE_IND": 1,
          "ATE_IND.2": 8
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 18
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL5": 6,
          "EAL5 augmented": 2
        }
      },
      "cc_sfr": {
        "FDP": {
          "FDP_ACC.1": 3,
          "FDP_ACF": 1,
          "FDP_IFC.1": 28,
          "FDP_IFC.1.1": 1,
          "FDP_IFF.1": 4,
          "FDP_ITT.1": 14,
          "FDP_ITT.1.1": 1,
          "FDP_RIP.1": 9,
          "FDP_RIP.1.1": 1,
          "FDP_SDC": 4,
          "FDP_SDC.1": 17,
          "FDP_SDC.1.1": 2,
          "FDP_SDI": 1,
          "FDP_SDI.2": 12,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1,
          "FDP_UCT.1": 9,
          "FDP_UCT.1.1": 1,
          "FDP_UIT.1": 9,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1
        },
        "FMT": {
          "FMT_LIM": 5,
          "FMT_LIM.1": 23,
          "FMT_LIM.1.1": 2,
          "FMT_LIM.2": 21,
          "FMT_LIM.2.1": 2
        },
        "FPT": {
          "FPT_FLS": 26,
          "FPT_FLS.1": 3,
          "FPT_ITT.1": 13,
          "FPT_ITT.1.1": 1,
          "FPT_PHP.3": 15,
          "FPT_PHP.3.1": 1
        },
        "FRU": {
          "FRU_FLT.2": 13,
          "FRU_FLT.2.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 2,
          "FTP_TRP.1": 12,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "Fault Injection": 1,
          "Malfunction": 19,
          "fault injection": 2,
          "malfunction": 3,
          "physical tampering": 3
        },
        "SCA": {
          "Leak-Inherent": 19,
          "Physical Probing": 2,
          "physical probing": 5
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2017-04-004": 1
        },
        "ISO": {
          "ISO/IEC 7816-3": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20240322084540+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20240322084540+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "pdf_file_size_bytes": 1130067,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://en.wikipedia.org/wiki/Synchronous_circuit",
          "http://en.wikipedia.org/wiki/De_facto_standard",
          "http://en.wikipedia.org/wiki/Serial_communications",
          "http://en.wikipedia.org/wiki/Full_duplex"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 65
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2023-06%20CERTIFICATION%20REPORT.pdf",
  "scheme": "ES",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_DVS.2",
      "AVA_VAN.5",
      "EAL5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/W75F40W_AA_ST_rev_I.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "4c9fb109d1744b6c140f5327dc3f6b9cf7b00a1767b9daab89772fbcb4191bf2",
      "txt_hash": "0e62dfc9188d21cec98478faa6a1183c48e966c5a561bbca9d34a5f276f71760"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "ad09777918a72da6d35ff19db39fbfff00178964ae2b09555da6c5ab7688efef",
      "txt_hash": "08ccbf56de6c63ecc7f1abebfc469c6c4868f9fe414d1d66c54c04a38dbcb397"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "a9d3bb551217bac5e8d3f03d1ff39c4ef864ac429662bd49dd6f52b4dbfc50c1",
      "txt_hash": "831ab96193301fc0c626e93cbfe528f63e16cac738342c4463be9f83446981ab"
    }
  },
  "status": "active"
}