This page was not yet optimized for use on mobile
devices.
Smart-Ex 03
CSV information
| Status | active |
|---|---|
| Valid from | 07.03.2025 |
| Valid until | 07.03.2030 |
| Scheme | 🇲🇾 MY |
| Manufacturer | Pepperl+Fuchs SE |
| Category | Mobility |
| Security level | EAL2 |
Heuristics summary
Certificate ID: ISCB-5-RPT-C134-CR-v1
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Trusted Execution Environments
SESecurity level
EAL 2Certification report
Extracted keywords
Symmetric Algorithms
AESAsymmetric Algorithms
ECDSATrusted Execution Environments
SESecurity level
EAL2, EAL 2Claims
A.TOE_USER, A.NOEVIL, A.PASSWD, A.CONFIGSecurity Functional Requirements (SFR)
FAU_GEN.1, FAU_STG.1, FAU_SAA.1, FCS_CKM.1, FCS_COP.1, FDP_ACC.1, FDP_ITC.1, FDP_SDI.1, FIA_UAU.2, FIA_ATD.1, FIA_AFL.1, FIA_UAU.7, FIA_UAU.4, FMT_MOF.1, FMT_MSA.3, FMT_SMR.1, FPT_PHP.1, FPT_TST.1, FTA_TAB.1, FTA_SSL.1Certificates
ISCB-5-RPT-C134-CR-v1Side-channel analysis
physical tampering, Physical TamperingStandards
FIPS 140-2, FIPS 180-4, FIPS PUB 186-4, ISO/IEC15408, ISO/IEC 18045File metadata
| Title | ISCB-5-RPT-C134-CR-v1 |
|---|---|
| Creation date | D:20250312061753Z00'00' |
| Modification date | D:20250312061753Z00'00' |
| Pages | 38 |
| Creator | Word |
| Producer | macOS Version 15.3.1 (Build 24D70) Quartz PDFContext |
Security target
Extracted keywords
Symmetric Algorithms
AESAsymmetric Algorithms
ECDSAProtocols
VPNTrusted Execution Environments
SESecurity level
EAL2Claims
O.AUDIT, O.MGMT, O.PHY_PROTECT, O.THML_PROTECT, O.MANAGE, O.STORE, O.INTEGRITY, T.AUDIT, T.MGMT, T.PHYSICAL, T.THERMAL, T.ACCESS, T.MALWARE, A.TOE_USER, A.NOEVIL, A.PASSWD, A.CONFIG, A.NO_EVIL, OE.USER_GUIDANCE, OE.NO_EVIL, OE.CONFIGSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ALC_CMC.2, ALC_DEL.1, ATE_IND.2, ATE_FUN.1, ATE_COV.1, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_GEN.1, FAU_SAA.1, FAU_STG.1, FAU_STG.4, FAU_ARP.1.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAA.1.1, FAU_SAA.1.2, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3, FAU_STG.4.1, FCS_CKM.1, FCS_CKM.4, FCS_COP, FCS_CKM.2, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_ACC.1, FDP_ACF.1, FDP_ITC.1, FDP_SDI.1, FDP_SDI.2, FDP_IFF, FDP_ITC.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_SDI.1.1, FDP_SDI.2.1, FDP_SDI.2.2, FIA_AFL.1, FIA_ATD.1, FIA_SOS.2, FIA_UAU.2, FIA_UAU.4, FIA_UAU.6, FIA_UAU.7, FIA_UID.2, FIA_UID, FIA_UAU.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_UID.1, FIA_UAU.2.1, FIA_UAU.4.1, FIA_UAU.6.1, FIA_UAU.7.1, FIA_UID.2.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_PHP.1, FPT_PHP.3, FPT_STM.1, FPT_TST.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_STM.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTA_SSL.1, FTA_SSL.3, FTA_TAB.1, FTA_SSL.1.1, FTA_SSL.1.2, FTA_SSL.3.1, FTA_TAB.1.1Side-channel analysis
Physical Tampering, physical tampering, malfunctionStandards
FIPS 140-2, FIPS 180-4, FIPS PUB 186-4File metadata
| Title | EAL2-EE_ECOMS-SMARTEX03-ST-v1.1 |
|---|---|
| Creation date | D:20250302064336Z00'00' |
| Modification date | D:20250302064336Z00'00' |
| Pages | 78 |
| Creator | Word |
| Producer | macOS Version 15.3.1 (Build 24D70) Quartz PDFContext |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
ISCB-5-RPT-C134-CR-v1Extracted SARs
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2Similar certificates
| Name | Certificate ID | |
|---|---|---|
| Smart-Ex® 03 | ISCB-5-RPT-C134-CR-v1 | Compare |
Scheme data
| Cert No | 2025-002-C134 | |
|---|---|---|
| Developer | Pepperl+Fuchs SE | |
| Level | EAL2 | |
| Product | Smart-Ex 03 | |
| Certification Date | 07.03.2025 | |
| Expiration Date | 07.03.2030 | |
| Recognition | CCRA | |
| Url | https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/417 | |
| Enhanced | ||
| Developer | Lilienthalstraße 20068307 MannheimGermanyTel: +49 621 776 - 0Website: https://www.pepperl-fuchs.com | |
| Status | Valid | |
| Scope | Smart-Ex 03 smartphone is a mobile phone designed and developed by Pepperl+Fuchs SE. The product is designed to be used in explosion hazardous locations and for heavy duty use in industrial environments. Smart-Ex 03 smartphone (herein after referred to as “Target of Evaluation” (TOE)) runs an Android OS. The TOE features a complex design of safety capabilities. Besides its intrinsically safe electronic design, embedded sensors inside the smartphone monitor thermal incidents that may impact the smartphone integrity. The scope of evaluation covers the smart battery sensors, physical protection of the device (smartphone casing and its sensor), TOE mobile applications, evaluated configuration of Android OS and evaluated configuration of the hardware components operated within the device. The scope of evaluation had excluded the following. User interface components which consist of capacitive touch display and hardware buttons Mobile applications installed by TOE user and that are not pre-installed by TOE Developer. Smartphone accessories including the protective case (Ex-protection) and peripherals. | |
| Cert Id | C134 | |
| Category | Other Devices and Systems | |
| Assurance Level | EAL2 | |
| Product | Smart-Ex 03 | |
| Certification Date | 07.03.2025 | |
| Expiration Date | 07.03.2030 | |
| Mutual Recognition | CCRA | |
| Target Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C134/EAL2-EE_ECOMS-SMARTEX03-ST-v1.1.pdf | |
| Report Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C134/ISCB-5-RPT-C134-CR-v1_.pdf | |
| Type | Mobility | |
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Mobility",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C134-CERTIFICATE-v2.pdf",
"dgst": "37e8ad13c246c13f",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "ISCB-5-RPT-C134-CR-v1",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL2",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"03"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_no": "2025-002-C134",
"certification_date": "2025-03-07",
"developer": "Pepperl+Fuchs SE",
"enhanced": {
"assurance_level": "EAL2",
"category": "Other Devices and Systems",
"cert_id": "C134",
"certification_date": "2025-03-07",
"developer": "Lilienthalstra\u00dfe 20068307 MannheimGermanyTel: +49 621 776 - 0Website: https://www.pepperl-fuchs.com",
"expiration_date": "2030-03-07",
"mutual_recognition": "CCRA",
"product": "Smart-Ex 03",
"report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C134/ISCB-5-RPT-C134-CR-v1_.pdf",
"scope": "Smart-Ex 03 smartphone is a mobile phone designed and developed by Pepperl+Fuchs SE. The product is designed to be used in explosion hazardous locations and for heavy duty use in industrial environments. Smart-Ex 03 smartphone (herein after referred to as \u201cTarget of Evaluation\u201d (TOE)) runs an Android OS. The TOE features a complex design of safety capabilities. Besides its intrinsically safe electronic design, embedded sensors inside the smartphone monitor thermal incidents that may impact the smartphone integrity. The scope of evaluation covers the smart battery sensors, physical protection of the device (smartphone casing and its sensor), TOE mobile applications, evaluated configuration of Android OS and evaluated configuration of the hardware components operated within the device. The scope of evaluation had excluded the following. User interface components which consist of capacitive touch display and hardware buttons Mobile applications installed by TOE user and that are not pre-installed by TOE Developer. Smartphone accessories including the protective case (Ex-protection) and peripherals.",
"status": "Valid",
"target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C134/EAL2-EE_ECOMS-SMARTEX03-ST-v1.1.pdf",
"type": "Mobility"
},
"expiration_date": "2030-03-07",
"level": "EAL2",
"product": "Smart-Ex 03",
"recognition": "CCRA",
"url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/417"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Pepperl+Fuchs SE",
"manufacturer_web": "https://www.pepperl-fuchs.com",
"name": "Smart-Ex 03",
"not_valid_after": "2030-03-07",
"not_valid_before": "2025-03-07",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "ISCB-5-CERT-C134-CERTIFICATE-v2.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL 2": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 1
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "ISCB-5-RPT-C134-CR-v1 .pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 4
}
}
},
"cc_cert_id": {
"MY": {
"ISCB-5-RPT-C134-CR-v1": 38
}
},
"cc_claims": {
"A": {
"A.CONFIG": 1,
"A.NOEVIL": 1,
"A.PASSWD": 1,
"A.TOE_USER": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL 2": 3,
"EAL2": 4
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 1,
"FAU_SAA.1": 1,
"FAU_STG.1": 1
},
"FCS": {
"FCS_CKM.1": 1,
"FCS_COP.1": 1
},
"FDP": {
"FDP_ACC.1": 1,
"FDP_ITC.1": 1,
"FDP_SDI.1": 1
},
"FIA": {
"FIA_AFL.1": 1,
"FIA_ATD.1": 1,
"FIA_UAU.2": 1,
"FIA_UAU.4": 1,
"FIA_UAU.7": 1
},
"FMT": {
"FMT_MOF.1": 1,
"FMT_MSA.3": 1,
"FMT_SMR.1": 1
},
"FPT": {
"FPT_PHP.1": 1,
"FPT_TST.1": 1
},
"FTA": {
"FTA_SSL.1": 1,
"FTA_TAB.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"Physical Tampering": 1,
"physical tampering": 3
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 2,
"FIPS 180-4": 1,
"FIPS PUB 186-4": 1
},
"ISO": {
"ISO/IEC 18045": 2,
"ISO/IEC15408": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 4
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 2
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20250312061753Z00\u002700\u0027",
"/Creator": "Word",
"/ModDate": "D:20250312061753Z00\u002700\u0027",
"/Producer": "macOS Version 15.3.1 (Build 24D70) Quartz PDFContext",
"/Title": "ISCB-5-RPT-C134-CR-v1 ",
"pdf_file_size_bytes": 1746875,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 38
},
"st_filename": "EAL2-EE_ECOMS-SMARTEX03-ST-v1.1.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 5
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONFIG": 3,
"A.NOEVIL": 1,
"A.NO_EVIL": 3,
"A.PASSWD": 4,
"A.TOE_USER": 5
},
"O": {
"O.AUDIT": 5,
"O.INTEGRITY": 4,
"O.MANAGE": 5,
"O.MGMT": 4,
"O.PHY_PROTECT": 4,
"O.STORE": 4,
"O.THML_PROTECT": 3
},
"OE": {
"OE.CONFIG": 3,
"OE.NO_EVIL": 3,
"OE.USER_GUIDANCE": 5
},
"T": {
"T.ACCESS": 5,
"T.AUDIT": 5,
"T.MALWARE": 4,
"T.MGMT": 4,
"T.PHYSICAL": 4,
"T.THERMAL": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 8
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 8,
"FAU_ARP.1.1": 1,
"FAU_GEN.1": 10,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAA.1": 8,
"FAU_SAA.1.1": 1,
"FAU_SAA.1.2": 1,
"FAU_STG.1": 8,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.3": 1,
"FAU_STG.4": 5,
"FAU_STG.4.1": 1
},
"FCS": {
"FCS_CKM.1": 18,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 3,
"FCS_CKM.4": 18,
"FCS_CKM.4.1": 1,
"FCS_COP": 19,
"FCS_COP.1": 2,
"FCS_COP.1.1": 3
},
"FDP": {
"FDP_ACC.1": 17,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 8,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 4,
"FDP_IFF": 2,
"FDP_ITC.1": 20,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_ITC.2": 8,
"FDP_SDI.1": 9,
"FDP_SDI.1.1": 1,
"FDP_SDI.2": 8,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1
},
"FIA": {
"FIA_AFL.1": 6,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 8,
"FIA_SOS.2": 6,
"FIA_SOS.2.1": 1,
"FIA_SOS.2.2": 1,
"FIA_UAU.1": 6,
"FIA_UAU.2": 11,
"FIA_UAU.2.1": 1,
"FIA_UAU.4": 7,
"FIA_UAU.4.1": 1,
"FIA_UAU.6": 6,
"FIA_UAU.6.1": 1,
"FIA_UAU.7": 7,
"FIA_UAU.7.1": 1,
"FIA_UID": 2,
"FIA_UID.1": 5,
"FIA_UID.2": 8,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF.1": 7,
"FMT_MOF.1.1": 1,
"FMT_MSA.1": 10,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 15,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_SMF.1": 13,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 16,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_PHP.1": 7,
"FPT_PHP.1.2": 2,
"FPT_PHP.3": 7,
"FPT_PHP.3.1": 1,
"FPT_STM.1": 9,
"FPT_STM.1.1": 1,
"FPT_TST.1": 8,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTA": {
"FTA_SSL.1": 6,
"FTA_SSL.1.1": 1,
"FTA_SSL.1.2": 1,
"FTA_SSL.3": 6,
"FTA_SSL.3.1": 1,
"FTA_TAB.1": 6,
"FTA_TAB.1.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"VPN": {
"VPN": 1
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"Physical Tampering": 5,
"malfunction": 6,
"physical tampering": 5
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 1,
"FIPS 180-4": 1,
"FIPS PUB 186-4": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 9
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 1
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20250302064336Z00\u002700\u0027",
"/Creator": "Word",
"/ModDate": "D:20250302064336Z00\u002700\u0027",
"/Producer": "macOS Version 15.3.1 (Build 24D70) Quartz PDFContext",
"/Title": "EAL2-EE_ECOMS-SMARTEX03-ST-v1.1",
"pdf_file_size_bytes": 984171,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 78
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C134-CR-v1%20.pdf",
"scheme": "MY",
"security_level": {
"_type": "Set",
"elements": [
"EAL2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EAL2-EE_ECOMS-SMARTEX03-ST-v1.1.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "73f786dcf873b83423911d83b7db6fc64012f35d2d6c83be9eea18b81eece5eb",
"txt_hash": "d0632cf875f497977f5ac63c26662d46d786acdb3a4b6e36c59a15536032f6df"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "300502eb00852046097bbd3f7ac53d993a1c27993eee5f890724814a95e15e7d",
"txt_hash": "5217f935315f596e5134d87d2783870a6ed50a5aa1e24fb6439a56e3eca5158b"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "9d20000a9c054f2e8f6dda9b0bac238ba9cff8b78ab114c30a77b95f1e4d3379",
"txt_hash": "8c6a63cee1308592949142fa9443b3b9773d7b1d4ee5c09e9ca996399bb2fcf9"
}
},
"status": "active"
}