Infineon Technologies AG Trusted Platform Module SLB9670_2.0 v7.40.2098.00

CSV information ?

Status archived
Valid from 28.01.2016
Valid until 28.02.2021
Scheme 🇩🇪 DE
Manufacturer Infineon Technologies AG
Category Trusted Computing
Security level ALC_FLR.1, AVA_VAN.4, EAL4+
Maintenance updates Infineon Technologies AG Trusted Platform Module SLB9670_2.0 v7.40.2098.00 and v7.41.2375.00 (31.05.2016) Certification report Security target

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0998-2016

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
AES
Asymmetric Algorithms
ECC
Hash functions
SHA-1, SHA-256
Schemes
MAC
Protocols
PGP
Randomness
RNG

Vendor
Infineon Technologies AG, Infineon Technologies, Infineon, Infineon AG

Security level
EAL 4, EAL 1, EAL 2, EAL 3, EAL 5, EAL 6, EAL 7, EAL 4 augmented, ITSEC Evaluation
Claims
O.C, R.O
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_FLR.1, ALC_FLR, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_DVS.2, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_FUN, ATE_COV.2, ATE_DPT.1, ATE_IND, ATE_COV.1, ATE_COV.3, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, AVA_VAN.4, AVA_VAN, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.5, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSS
Protection profiles
ANSSI-CC-PP-2015/07
Certificates
BSI-DSZ-CC-0998-2016, BSI-DSZ-CC-0965-2015
Evaluation facilities
TĂśV Informationstechnik
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, to the certified TOE Version v7.40.2098.00. TOE Delivery The delivery of the TOE related confidential documentation (No. 2 to 4 in Table 2) is done from the Infineon Technologies department AE at the site, Technical Report Summary, TÜV Informationtechnik GmbH – Evaluation Body for IT Security, (confidential document) [8] Protection Profile, TPM Library specification Family “2.0”, Level 0 Revision 1.16, December 10

Side-channel analysis
side channel, SPA, DPA, physical tampering, Fault Injection, JIL
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, to the certified TOE Version v7.40.2098.00. TOE Delivery The delivery of the TOE related confidential documentation (No. 2 to 4 in Table 2) is done from the Infineon Technologies department AE at the site, Technical Report Summary, TÜV Informationtechnik GmbH – Evaluation Body for IT Security, (confidential document) [8] Protection Profile, TPM Library specification Family “2.0”, Level 0 Revision 1.16, December 10

Standards
AIS20, AIS 25, AIS 26, AIS 20, AIS 31, AIS 32, AIS 38, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065
Technical reports
BSI TR-02102, BSI 7148

File metadata

Title Certification Report BSI-DSZ-CC-0998-2016
Subject BSI-DSZ-CC-0998-2016
Keywords "Common Criteria, Certification, Zertifizierung, TPM, Trusted Platform Module"
Author Bundesamt fĂĽr Sicherheit in der Informationstechnik
Creation date D:20160223154441+01'00'
Modification date D:20160225113948+01'00'
Pages 44
Creator Writer
Producer LibreOffice 4.2

Frontpage

Certificate ID BSI-DSZ-CC-0998-2016
Certified item Infineon Technologies AG Trusted Platform Module SLB9670_2.0, v7.40.2098.00
Certification lab BSI
Developer Infineon Technologies AG

References

Outgoing Incoming
  • BSI-DSZ-CC-1021-2016 - archived - Infineon Technologies AG Trusted Platform Module SLB9670_2.0 v7.60.2677.00

Security target ?

Extracted keywords

Symmetric Algorithms
AES, Triple-DES, HMAC
Asymmetric Algorithms
RSA-2048, RSA 1024, ECDH, ECDSA, ECC
Hash functions
SHA-1, SHA-256
Schemes
MAC, Key Agreement
Randomness
DRBG, RNG
Elliptic Curves
P-256, Curve P-256
Block cipher modes
CBC, CFB

Vendor
Infineon Technologies AG, Infineon Technologies, Infineon

Security level
EAL4, EAL4 augmented
Security Assurance Requirements (SAR)
ADV_VAN.4, ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS, ALC_FLR.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.4, ASE_INT, ASE_CCL, ASE_SPD, ASE_OBJ, ASE_ECD, ASE_REQ, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FCO_NRO, FCS_RNG.1, FCS_CKM, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1, FCS_CKM.4.1, FCS_COP, FCS_RNG, FCS_RNG.1.1, FCS_RNG.1.2, FDP_ACC.1, FDP_IFC.1, FDP_ITC.1, FDP_ITC.2, FDP_ACF, FDP_ACF.1, FDP_UIT, FDP_UIT.1, FDP_RIP.1, FDP_ACC, FDP_SDI.1, FDP_ETC, FDP_ITC, FDP_UCT, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_SOS.2, FIA_AFL, FIA_UAU.1, FIA_UAU.5, FIA_UAU.6, FIA_USB.1, FIA_MSA, FMT_MSA.2, FMT_MSA.1, FMT_SMR.1, FMT_MSA.2.1, FMT_MSA.3, FMT_MSA, FMT_MTD, FMT_SMF.1, FMT_MOF, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS, FPT_FLS.1, FPT_PHP.3, FPT_PHP.3.1, FPT_STM.1, FTP_ITC.1, FTP_TRP.1, FTP_ITC
Protection profiles
ANSSI-CC-PP-2014, ANSSI-CC-PP-2015/07

Side-channel analysis
physical probing, DPA, SPA, DFA

Standards
FIPS PUB 140-2, FIPS PUB 180-4, FIPS PUB 186-3, FIPS PUB 186-4, FIPS 180-2, SP 800-108, NIST SP 800-90A, PKCS#1, AIS20, RFC3447, RFC 3447, RFC 2104, ISO/IEC 15946-1, ISO/IEC 9797-2, ISO/IEC 14888-3, ISO/IEC 10118-3, ISO/IEC 10116:2006, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004

File metadata

Title CC EAL4+ moderate Certification Security Target
Subject Security Target SLB9670_2.0
Keywords Infineon, CCS, Security Target, EAL4+, moderate, SLB967x, SLB9670, SPI, Trusted Computing, TPM 2.0, Trusted Platform Module
Author JĂĽrgen Noller
Creation date D:20151106080724
Modification date D:20151106080724
Pages 59
Creator Microsoft® Office Word 2007
Producer Microsoft® Office Word 2007

Heuristics ?

Certificate ID: BSI-DSZ-CC-0998-2016

Extracted SARs

ALC_LCD.1, APE_INT.1, ALC_TAT.1, ASE_SPD.1, ASE_REQ.2, ADV_FSP.4, APE_SPD.1, ADV_IMP.1, ADV_SPM.1, ADV_VAN.4, ASE_INT.1, ADV_TDS.3, ASE_CCL.1, ALC_CMC.4, ALC_FLR.1, AGD_OPE.1, ALC_CMS.4, ALC_DVS.1, APE_REQ.2, ALC_DEL.1, ASE_TSS.1, ATE_DPT.1, ATE_FUN.1, ATE_COV.2, APE_OBJ.2, ADV_ARC.1, APE_ECD.1, ADV_INT.3, AGD_PRE.1, ATE_IND.2, APE_CCL.1, AVA_VAN.4, ASE_OBJ.2, ASE_ECD.1

References ?

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '46732ec4d32bcda3c4b8f0f938cea27e5b21b65feef8881c34c672cb17a05d71', 'txt_hash': 'a7a2cbf6af172a07837797474626f8ae7030842c70d0acc8c6c079241e9d6df4'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b9276dbfc87872c311c061f289a41bb8e9448187f0d627c5410252d03d4d11ca', 'txt_hash': 'cf982351b5d8419a997f679bfd3ca2df3fa99b6f2eee1717c581603538981129'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 1422506, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 44, '/Author': 'Bundesamt fĂĽr Sicherheit in der Informationstechnik', '/CreationDate': "D:20160223154441+01'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, TPM, Trusted Platform Module"', '/ModDate': "D:20160225113948+01'00'", '/Producer': 'LibreOffice 4.2', '/Subject': 'BSI-DSZ-CC-0998-2016', '/Title': 'Certification Report BSI-DSZ-CC-0998-2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.trustedcomputinggroup.org/', 'https://www.bsi.bund.de/zertifizierung', 'https://www.bsi.bund.de/', 'https://www.bsi.bund.de/zertifizierungsreporte', 'https://www.bsi.bund.de/AIS', 'http://www.commoncriteriaportal.org/', 'http://www.sogisportal.eu/']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 973191, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 59, '/Title': 'CC EAL4+ moderate Certification Security Target', '/Author': 'JĂĽrgen Noller', '/Subject': 'Security Target SLB9670_2.0', '/Keywords': 'Infineon, CCS, Security Target, EAL4+, moderate, SLB967x, SLB9670, SPI, Trusted Computing, TPM 2.0, Trusted Platform Module', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20151106080724', '/ModDate': 'D:20151106080724', '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.rsa.com/', 'http://www.bsi.bund.de/', 'http://www.infineon.com/']}}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0998-2016', 'cert_item': 'Infineon Technologies AG Trusted Platform Module SLB9670_2.0, v7.40.2098.00', 'developer': 'Infineon Technologies AG', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Protection Profile, TPM Library specification Family “2.0”, Level 0 Revision 1.16, December 10, 2014, Version 1.0, Trusted Computing Group', 'cc_version': 'PP conformant plus product specific extensions', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.1, AVA_VAN.4 SOGIS Recognition Agreement'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0998-2016': 24, 'BSI-DSZ-CC-0965-2015': 3}}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2015/07': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 13, 'EAL 1': 7, 'EAL 2': 4, 'EAL 3': 4, 'EAL 5': 6, 'EAL 6': 3, 'EAL 7': 4, 'EAL 4 augmented': 3}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.1': 1, 'ADV_FSP.2': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.5': 1, 'ADV_FSP.6': 1, 'ADV_IMP.1': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_INT.2': 1, 'ADV_INT.3': 1, 'ADV_SPM.1': 1, 'ADV_TDS.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.4': 1, 'ADV_TDS.5': 1, 'ADV_TDS.6': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.1': 7, 'ALC_FLR': 3, 'ALC_CMC.1': 1, 'ALC_CMC.2': 1, 'ALC_CMC.3': 1, 'ALC_CMC.4': 2, 'ALC_CMC.5': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 2, 'ALC_CMS.5': 1, 'ALC_DEL.1': 2, 'ALC_DVS.1': 2, 'ALC_DVS.2': 1, 'ALC_FLR.2': 1, 'ALC_FLR.3': 1, 'ALC_LCD.1': 2, 'ALC_LCD.2': 1, 'ALC_TAT.1': 2, 'ALC_TAT.2': 1, 'ALC_TAT.3': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_FUN': 3, 'ATE_COV.2': 2, 'ATE_DPT.1': 2, 'ATE_IND': 2, 'ATE_COV.1': 1, 'ATE_COV.3': 1, 'ATE_DPT.2': 1, 'ATE_DPT.3': 1, 'ATE_DPT.4': 1, 'ATE_FUN.1': 1, 'ATE_FUN.2': 1, 'ATE_IND.1': 1, 'ATE_IND.2': 1, 'ATE_IND.3': 1, 'ATE_COV': 1, 'ATE_DPT': 1}, 'AVA': {'AVA_VAN.4': 6, 'AVA_VAN': 3, 'AVA_VAN.1': 1, 'AVA_VAN.2': 1, 'AVA_VAN.3': 1, 'AVA_VAN.5': 1}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.C': 2}, 'R': {'R.O': 2}}, 'vendor': {'Infineon': {'Infineon Technologies AG': 19, 'Infineon Technologies': 10, 'Infineon': 5, 'Infineon AG': 1}}, 'eval_facility': {'TUV': {'TĂśV Informationstechnik': 2}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-256': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'PGP': {'PGP': 2}}, 'randomness': {'RNG': {'RNG': 2}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 1, 'SPA': 1, 'DPA': 1}, 'FI': {'physical tampering': 1, 'Fault Injection': 1}, 'other': {'JIL': 2}}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS20': 1, 'AIS 25': 2, 'AIS 26': 2, 'AIS 20': 2, 'AIS 31': 2, 'AIS 32': 1, 'AIS 38': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'to the certified TOE Version v7.40.2098.00. TOE Delivery The delivery of the TOE related confidential documentation (No. 2 to 4 in Table 2) is done from the Infineon Technologies department AE at the site': 1, 'Technical Report Summary, TĂśV Informationtechnik GmbH – Evaluation Body for IT Security, (confidential document) [8] Protection Profile, TPM Library specification Family “2.0”, Level 0 Revision 1.16, December 10': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2014': 1, 'ANSSI-CC-PP-2015/07': 1}}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_VAN.4': 1, 'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS': 1, 'ALC_FLR.1': 3, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.4': 2}, 'ASE': {'ASE_INT': 2, 'ASE_CCL': 2, 'ASE_SPD': 2, 'ASE_OBJ': 2, 'ASE_ECD': 2, 'ASE_REQ': 2, 'ASE_TSS': 2, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FCO': {'FCO_NRO': 6}, 'FCS': {'FCS_RNG.1': 12, 'FCS_CKM': 24, 'FCS_CKM.2': 6, 'FCS_COP.1': 16, 'FCS_CKM.4': 20, 'FCS_CKM.1': 17, 'FCS_CKM.4.1': 1, 'FCS_COP': 43, 'FCS_RNG': 1, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2}, 'FDP': {'FDP_ACC.1': 4, 'FDP_IFC.1': 2, 'FDP_ITC.1': 11, 'FDP_ITC.2': 11, 'FDP_ACF': 30, 'FDP_ACF.1': 8, 'FDP_UIT': 9, 'FDP_UIT.1': 2, 'FDP_RIP.1': 3, 'FDP_ACC': 28, 'FDP_SDI.1': 3, 'FDP_ETC': 7, 'FDP_ITC': 7, 'FDP_UCT': 7}, 'FIA': {'FIA_UID.1': 4, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_SOS.2': 3, 'FIA_AFL': 6, 'FIA_UAU.1': 3, 'FIA_UAU.5': 3, 'FIA_UAU.6': 3, 'FIA_USB.1': 3, 'FIA_MSA': 1}, 'FMT': {'FMT_MSA.2': 4, 'FMT_MSA.1': 1, 'FMT_SMR.1': 4, 'FMT_MSA.2.1': 1, 'FMT_MSA.3': 2, 'FMT_MSA': 64, 'FMT_MTD': 6, 'FMT_SMF.1': 3, 'FMT_MOF': 3}, 'FPT': {'FPT_TST.1': 6, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_FLS': 7, 'FPT_FLS.1': 1, 'FPT_PHP.3': 4, 'FPT_PHP.3.1': 1, 'FPT_STM.1': 3}, 'FTP': {'FTP_ITC.1': 1, 'FTP_TRP.1': 1, 'FTP_ITC': 3}}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies AG': 14, 'Infineon Technologies': 5, 'Infineon': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 22}}, 'DES': {'3DES': {'Triple-DES': 1}}, 'constructions': {'MAC': {'HMAC': 28}}}, 'asymmetric_crypto': {'RSA': {'RSA-2048': 1, 'RSA 1024': 1}, 'ECC': {'ECDH': {'ECDH': 3}, 'ECDSA': {'ECDSA': 6}, 'ECC': {'ECC': 25}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 21}, 'SHA2': {'SHA-256': 21}}}, 'crypto_scheme': {'MAC': {'MAC': 2}, 'KA': {'Key Agreement': 1}}, 'crypto_protocol': {}, 'randomness': {'PRNG': {'DRBG': 11}, 'RNG': {'RNG': 13}}, 'cipher_mode': {'CBC': {'CBC': 1}, 'CFB': {'CFB': 7}}, 'ecc_curve': {'NIST': {'P-256': 3, 'Curve P-256': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 2, 'DPA': 1, 'SPA': 1}, 'FI': {'DFA': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 140-2': 3, 'FIPS PUB 180-4': 1, 'FIPS PUB 186-3': 1, 'FIPS PUB 186-4': 1, 'FIPS 180-2': 2}, 'NIST': {'SP 800-108': 2, 'NIST SP 800-90A': 2}, 'PKCS': {'PKCS#1': 12}, 'BSI': {'AIS20': 1}, 'RFC': {'RFC3447': 42, 'RFC 3447': 1, 'RFC 2104': 1}, 'ISO': {'ISO/IEC 15946-1': 3, 'ISO/IEC 9797-2': 3, 'ISO/IEC 14888-3': 1, 'ISO/IEC 10118-3': 1, 'ISO/IEC 10116:2006': 2}, 'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 0998a_pdf.pdf.
    • The st_filename property was set to 0998b_pdf.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-0998-2016.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1021-2016']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1021-2016', 'BSI-DSZ-CC-1086-2018', 'BSI-DSZ-CC-1100-2018', 'BSI-DSZ-CC-1058-2018', 'BSI-DSZ-CC-1021-V2-2017', 'BSI-DSZ-CC-1057-2018']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0965-2015']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0965-2015']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_VAN', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0998a_pdf.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0998b_pdf.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_VAN', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Infineon Technologies AG Trusted Platform Module SLB9670_2.0 v7.40.2098.00 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Trusted Computing",
  "cert_link": null,
  "dgst": "359a85057d8b2ff5",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0998-2016",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_VAN",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "7.40.2098.00",
        "2.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1021-2016"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0965-2015"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1021-V2-2017",
          "BSI-DSZ-CC-1021-2016",
          "BSI-DSZ-CC-1086-2018",
          "BSI-DSZ-CC-1057-2018",
          "BSI-DSZ-CC-1100-2018",
          "BSI-DSZ-CC-1058-2018"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0965-2015"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2016-05-31",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0998ma1a_pdf.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0998ma1b_pdf.pdf",
        "maintenance_title": "Infineon Technologies AG Trusted Platform Module SLB9670_2.0 v7.40.2098.00 and v7.41.2375.00"
      }
    ]
  },
  "manufacturer": "Infineon Technologies AG",
  "manufacturer_web": "https://www.infineon.com/",
  "name": "Infineon Technologies AG Trusted Platform Module SLB9670_2.0 v7.40.2098.00",
  "not_valid_after": "2021-02-28",
  "not_valid_before": "2016-01-28",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "0998a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.1, AVA_VAN.4 SOGIS Recognition Agreement",
        "cc_version": "PP conformant plus product specific extensions",
        "cert_id": "BSI-DSZ-CC-0998-2016",
        "cert_item": "Infineon Technologies AG Trusted Platform Module SLB9670_2.0, v7.40.2098.00",
        "cert_lab": "BSI",
        "developer": "Infineon Technologies AG",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Protection Profile, TPM Library specification Family \u201c2.0\u201d, Level 0 Revision 1.16, December 10, 2014, Version 1.0, Trusted Computing Group"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 4
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0965-2015": 3,
          "BSI-DSZ-CC-0998-2016": 24
        }
      },
      "cc_claims": {
        "O": {
          "O.C": 2
        },
        "R": {
          "R.O": 2
        }
      },
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-2015/07": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_FSP": 1,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 1,
          "ADV_FSP.3": 1,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 1,
          "ADV_FSP.6": 1,
          "ADV_IMP": 1,
          "ADV_IMP.1": 1,
          "ADV_IMP.2": 1,
          "ADV_INT": 1,
          "ADV_INT.1": 1,
          "ADV_INT.2": 1,
          "ADV_INT.3": 1,
          "ADV_SPM": 1,
          "ADV_SPM.1": 1,
          "ADV_TDS": 1,
          "ADV_TDS.1": 1,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 1,
          "ADV_TDS.4": 1,
          "ADV_TDS.5": 1,
          "ADV_TDS.6": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.1": 1,
          "ALC_CMC.2": 1,
          "ALC_CMC.3": 1,
          "ALC_CMC.4": 2,
          "ALC_CMC.5": 1,
          "ALC_CMS": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.2": 1,
          "ALC_CMS.3": 1,
          "ALC_CMS.4": 2,
          "ALC_CMS.5": 1,
          "ALC_DEL": 1,
          "ALC_DEL.1": 2,
          "ALC_DVS": 1,
          "ALC_DVS.1": 2,
          "ALC_DVS.2": 1,
          "ALC_FLR": 3,
          "ALC_FLR.1": 7,
          "ALC_FLR.2": 1,
          "ALC_FLR.3": 1,
          "ALC_LCD.1": 2,
          "ALC_LCD.2": 1,
          "ALC_TAT": 1,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 1,
          "ALC_TAT.3": 1
        },
        "APE": {
          "APE_CCL.1": 1,
          "APE_ECD.1": 1,
          "APE_INT.1": 1,
          "APE_OBJ.1": 1,
          "APE_OBJ.2": 1,
          "APE_REQ.1": 1,
          "APE_REQ.2": 1,
          "APE_SPD.1": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 1,
          "ASE_ECD": 1,
          "ASE_ECD.1": 1,
          "ASE_INT": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ": 1,
          "ASE_OBJ.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.1": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS": 1,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 1,
          "ATE_COV.2": 2,
          "ATE_COV.3": 1,
          "ATE_DPT": 1,
          "ATE_DPT.1": 2,
          "ATE_DPT.2": 1,
          "ATE_DPT.3": 1,
          "ATE_DPT.4": 1,
          "ATE_FUN": 3,
          "ATE_FUN.1": 1,
          "ATE_FUN.2": 1,
          "ATE_IND": 2,
          "ATE_IND.1": 1,
          "ATE_IND.2": 1,
          "ATE_IND.3": 1
        },
        "AVA": {
          "AVA_VAN": 3,
          "AVA_VAN.1": 1,
          "AVA_VAN.2": 1,
          "AVA_VAN.3": 1,
          "AVA_VAN.4": 6,
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 7,
          "EAL 2": 4,
          "EAL 3": 4,
          "EAL 4": 13,
          "EAL 4 augmented": 3,
          "EAL 5": 6,
          "EAL 6": 3,
          "EAL 7": 4
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "Technical Report Summary, T\u00dcV Informationtechnik GmbH \u2013 Evaluation Body for IT Security, (confidential document) [8] Protection Profile, TPM Library specification Family \u201c2.0\u201d, Level 0 Revision 1.16, December 10": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
          "to the certified TOE Version v7.40.2098.00. TOE Delivery The delivery of the TOE related confidential documentation (No. 2 to 4 in Table 2) is done from the Infineon Technologies department AE at the site": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PGP": {
          "PGP": 2
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 2
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          },
          "SHA2": {
            "SHA-256": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Fault Injection": 1,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 1,
          "SPA": 1,
          "side channel": 1
        },
        "other": {
          "JIL": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 2,
          "AIS 25": 2,
          "AIS 26": 2,
          "AIS 31": 2,
          "AIS 32": 1,
          "AIS 38": 1,
          "AIS20": 1
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 2
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1,
          "BSI TR-02102": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 5,
          "Infineon AG": 1,
          "Infineon Technologies": 10,
          "Infineon Technologies AG": 19
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20160223154441+01\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, TPM, Trusted Platform Module\"",
      "/ModDate": "D:20160225113948+01\u002700\u0027",
      "/Producer": "LibreOffice 4.2",
      "/Subject": "BSI-DSZ-CC-0998-2016",
      "/Title": "Certification Report BSI-DSZ-CC-0998-2016",
      "pdf_file_size_bytes": 1422506,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/AIS",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/",
          "http://www.sogisportal.eu/",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "https://www.trustedcomputinggroup.org/",
          "https://www.bsi.bund.de/zertifizierung"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 44
    },
    "st_filename": "0998b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 25
          },
          "ECDH": {
            "ECDH": 3
          },
          "ECDSA": {
            "ECDSA": 6
          }
        },
        "RSA": {
          "RSA 1024": 1,
          "RSA-2048": 1
        }
      },
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-2014": 1,
          "ANSSI-CC-PP-2015/07": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1,
          "ADV_VAN.4": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR.1": 3,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL": 2,
          "ASE_CCL.1": 1,
          "ASE_ECD": 2,
          "ASE_ECD.1": 1,
          "ASE_INT": 2,
          "ASE_INT.1": 1,
          "ASE_OBJ": 2,
          "ASE_OBJ.2": 1,
          "ASE_REQ": 2,
          "ASE_REQ.2": 1,
          "ASE_SPD": 2,
          "ASE_SPD.1": 1,
          "ASE_TSS": 2,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.4": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 2,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {
        "FCO": {
          "FCO_NRO": 6
        },
        "FCS": {
          "FCS_CKM": 24,
          "FCS_CKM.1": 17,
          "FCS_CKM.2": 6,
          "FCS_CKM.4": 20,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 43,
          "FCS_COP.1": 16,
          "FCS_RNG": 1,
          "FCS_RNG.1": 12,
          "FCS_RNG.1.1": 2,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC": 28,
          "FDP_ACC.1": 4,
          "FDP_ACF": 30,
          "FDP_ACF.1": 8,
          "FDP_ETC": 7,
          "FDP_IFC.1": 2,
          "FDP_ITC": 7,
          "FDP_ITC.1": 11,
          "FDP_ITC.2": 11,
          "FDP_RIP.1": 3,
          "FDP_SDI.1": 3,
          "FDP_UCT": 7,
          "FDP_UIT": 9,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_AFL": 6,
          "FIA_MSA": 1,
          "FIA_SOS.2": 3,
          "FIA_UAU.1": 3,
          "FIA_UAU.5": 3,
          "FIA_UAU.6": 3,
          "FIA_UID.1": 4,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB.1": 3
        },
        "FMT": {
          "FMT_MOF": 3,
          "FMT_MSA": 64,
          "FMT_MSA.1": 1,
          "FMT_MSA.2": 4,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 2,
          "FMT_MTD": 6,
          "FMT_SMF.1": 3,
          "FMT_SMR.1": 4
        },
        "FPT": {
          "FPT_FLS": 7,
          "FPT_FLS.1": 1,
          "FPT_PHP.3": 4,
          "FPT_PHP.3.1": 1,
          "FPT_STM.1": 3,
          "FPT_TST.1": 6,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 3,
          "FTP_ITC.1": 1,
          "FTP_TRP.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        },
        "CFB": {
          "CFB": 7
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        },
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "Curve P-256": 1,
          "P-256": 3
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 21
          },
          "SHA2": {
            "SHA-256": 21
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 11
        },
        "RNG": {
          "RNG": 13
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1
        },
        "SCA": {
          "DPA": 1,
          "SPA": 1,
          "physical probing": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS20": 1
        },
        "CC": {
          "CCMB-2012-09-001": 2,
          "CCMB-2012-09-002": 2,
          "CCMB-2012-09-003": 2,
          "CCMB-2012-09-004": 1
        },
        "FIPS": {
          "FIPS 180-2": 2,
          "FIPS PUB 140-2": 3,
          "FIPS PUB 180-4": 1,
          "FIPS PUB 186-3": 1,
          "FIPS PUB 186-4": 1
        },
        "ISO": {
          "ISO/IEC 10116:2006": 2,
          "ISO/IEC 10118-3": 1,
          "ISO/IEC 14888-3": 1,
          "ISO/IEC 15946-1": 3,
          "ISO/IEC 9797-2": 3
        },
        "NIST": {
          "NIST SP 800-90A": 2,
          "SP 800-108": 2
        },
        "PKCS": {
          "PKCS#1": 12
        },
        "RFC": {
          "RFC 2104": 1,
          "RFC 3447": 1,
          "RFC3447": 42
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 22
          }
        },
        "DES": {
          "3DES": {
            "Triple-DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 28
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 2,
          "Infineon Technologies": 5,
          "Infineon Technologies AG": 14
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "J\u00fcrgen Noller",
      "/CreationDate": "D:20151106080724",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/Keywords": "Infineon, CCS, Security Target, EAL4+, moderate, SLB967x, SLB9670, SPI, Trusted Computing, TPM 2.0, Trusted Platform Module",
      "/ModDate": "D:20151106080724",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Subject": "Security Target SLB9670_2.0",
      "/Title": "CC EAL4+ moderate Certification Security Target",
      "pdf_file_size_bytes": 973191,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.infineon.com/",
          "http://www.rsa.com/",
          "http://www.bsi.bund.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 59
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0998a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_FLR.1",
      "AVA_VAN.4"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0998b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "46732ec4d32bcda3c4b8f0f938cea27e5b21b65feef8881c34c672cb17a05d71",
      "txt_hash": "a7a2cbf6af172a07837797474626f8ae7030842c70d0acc8c6c079241e9d6df4"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "b9276dbfc87872c311c061f289a41bb8e9448187f0d627c5410252d03d4d11ca",
      "txt_hash": "cf982351b5d8419a997f679bfd3ca2df3fa99b6f2eee1717c581603538981129"
    }
  },
  "status": "archived"
}