{"_id": "427731a692b0ac71", "_type": "sec_certs.sample.cc.CCCertificate", "dgst": "427731a692b0ac71", "status": "active", "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems", "name": "Infineon Technologies AG OPTIGA\u2122 Trusted Platform Module SLB9672_2.0 v16 and SLB9673_2.0 v26 v16.25.19774.00 and v26.25.19812.00", "manufacturer": "Infineon Technologies AG", "scheme": "DE", "security_level": {"_type": "Set", "elements": ["EAL4+", "AVA_VAN.4", "ALC_FLR.1"]}, "not_valid_before": "2026-02-23", "not_valid_after": "2031-02-23", "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1278a_pdf.pdf", "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1278b_pdf.pdf", "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1278c_pdf.pdf", "manufacturer_web": "https://www.infineon.com/", "protection_profile_links": {"_type": "Set", "elements": ["https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-cc-pp-2020_01_pp.pdf"]}, "maintenance_updates": {"_type": "Set", "elements": []}, "state": {"_type": "sec_certs.sample.cc_eucc_common.InternalState", "report": {"_type": "sec_certs.sample.document_state.DocumentState", "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "c96af0861e347fd1ec2f67674dacf0f1c216cd68ccc3469565820d66b4de644f", "txt_hash": "499e51b109d525286fd8f1010cbd186c1972ebfea12aa7971032c03d65dba19c", "json_hash": null}, "st": {"_type": "sec_certs.sample.document_state.DocumentState", "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "9ed72364595559e1b790cba61306a79aa50c99a9e412b0dd170523399e1fe5d8", "txt_hash": "39bbc3ebcd659e7d46b51cf2743bc4fbab044c765a444f90396129207f15d547", "json_hash": null}, "cert": {"_type": "sec_certs.sample.document_state.DocumentState", "download_ok": true, "convert_ok": true, "extract_ok": false, "pdf_hash": "63ddc6e79ff607e3132cc32baae2e668bb0e2739e5035d9d99370e8337f3f05d", "txt_hash": "fe3f55f59b66da5a0a8d057730b500b16504e82c8146d704f79c65ebb1061db8", "json_hash": null}}, "pdf_data": {"_type": "sec_certs.sample.cc_eucc_common.PdfData", "report_metadata": {"pdf_file_size_bytes": 474069, "pdf_is_encrypted": false, "pdf_number_of_pages": 32, "/Author": "Federal Office for Information Security", "/Keywords": "Common Criteria, Certification, Zertifizierung, TPM", "/Title": "Certification Report BSI-DSZ-CC-1278", "pdf_hyperlinks": {"_type": "Set", "elements": ["http://www.commoncriteriaportal.org/", "https://www.sogis.eu/", "https://www.iso.org/standard/72913.html", "https://www.bsi.bund.de/zertifizierung", "https://www.bsi.bund.de/AIS", "https://www.commoncriteriaportal.org/", "https://www.bsi.bund.de/dok/Zertifizierung-Gesamtlisten", "https://www.commoncriteriaportal.org/cc/index.cfm", "https://www.bsi.bund.de/", "https://www.iso.org/standard/72906.html", "https://www.iso.org/standard/72917.html", "https://www.iso.org/standard/72892.html", "https://www.iso.org/standard/72891.html", "https://standards.iso.org/ittf/PubliclyAvailableStandards/index.html"]}}, "st_metadata": {"pdf_file_size_bytes": 989201, "pdf_is_encrypted": false, "pdf_number_of_pages": 65, "/Author": "J\u00fcrgen Noller", "/Keywords": "Infineon, CCS, Security Target, EAL4+, moderate, SLB967x, SLB9670, SPI, Trusted Computing, TPM 2.0, Trusted Platform Module", "/Subject": "Security Target SLB9670_2.0", "/Title": "CC EAL4+ moderate Certification Security Target", "pdf_hyperlinks": {"_type": "Set", "elements": ["http://www.bsi.bund.de/", "mailto:erratum@infineon.com;ctdd@infineon.com?subject=Document%20question%20", "http://www.rsa.com/", "http://www.infineon.com/"]}}, "cert_metadata": null, "report_frontpage": {"DE": {"match_rules": ["(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"], "cert_id": "BSI-DSZ-CC-1278-2026", "cert_item": "Infineon Technologies AG OPTIGA\u2122 Trusted Platform Module SLB9672_2.0 v16 and SLB9673_2.0 v26 v16.25.19774.00 and v26.25.19812.00", "developer": "Infineon Technologies AG", "cert_lab": "BSI", "ref_protection_profiles": "Protection Profile PC Client Specific TPM, TPM Library specification Family \u201c2.0\u201d, Level 0 Revision 1.59, Version: 1.3, Date: 2021-09-29, ANSSI-CC- PP-2021/02", "cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 conformant", "cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.1 and AVA_VAN.4 valid until: 22 February 2031 SOGIS Recognition Agreement"}}, "st_frontpage": null, "cert_frontpage": null, "report_keywords": {"cc_cert_id": {"DE": {"BSI-DSZ-CC-1278-2026": 19, "BSI-DSZ-CC-1245-2024": 4}, "FR": {"ANSSI-CC-PP-2021/02": 2}}, "cc_protection_profile_id": {"ANSSI": {"ANSSI-CC-PP-2021/02": 2}}, "cc_security_level": {"EAL": {"EAL 4": 5, "EAL 2": 3, "EAL 1": 1, "EAL 5+": 1, "EAL 6": 1, "EAL 4 augmented": 3}}, "cc_sar": {"ALC": {"ALC_FLR.1": 5, "ALC_FLR": 3, "ALC_CMC.4": 1, "ALC_CMS.4": 1, "ALC_DEL.1": 1, "ALC_DVS.1": 1, "ALC_LCD.1": 1, "ALC_TAT.1": 1}, "ATE": {"ATE_FUN": 2, "ATE_IND": 2}, "AVA": {"AVA_VAN.4": 4}}, "cc_sfr": {}, "cc_claims": {}, "vendor": {"Infineon": {"Infineon Technologies AG": 13, "Infineon": 3}}, "eval_facility": {"TUV": {"T\u00dcV Informationstechnik": 4}}, "symmetric_crypto": {"AES_competition": {"AES": {"AES": 7}}, "constructions": {"MAC": {"HMAC": 10, "CMAC": 1}}}, "asymmetric_crypto": {"ECC": {"ECDH": {"ECDH": 1}, "ECDSA": {"ECDSA": 2}, "ECC": {"ECC": 5}}}, "pq_crypto": {"XMSS": {"XMSS": 2}}, "hash_function": {"SHA": {"SHA1": {"SHA-1": 11}, "SHA2": {"SHA-256": 14, "SHA-384": 12, "SHA-512": 1}}}, "crypto_scheme": {"MAC": {"MAC": 1}, "KA": {"Key Agreement": 3}}, "crypto_protocol": {}, "randomness": {"RNG": {"RNG": 3}}, "cipher_mode": {"CFB": {"CFB": 4}}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {"SCA": {"side-channel": 1, "SPA": 1, "DPA": 1}, "FI": {"Fault Injection": 1}, "other": {"JIL": 4}}, "technical_report_id": {"BSI": {"BSI TR-02102": 1}}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {"FIPS": {"FIPS180-4": 9, "FIPS186-4": 11, "FIPS PUB 186-4": 1, "FIPS186-5": 1, "FIPS PUB 186-5": 1}, "BSI": {"AIS26": 1, "AIS 20": 3, "AIS 34": 2, "AIS 31": 2, "AIS 25": 1, "AIS 26": 1, "AIS 32": 1, "AIS 35": 1, "AIS 36": 1, "AIS 38": 1, "AIS20": 1}, "RFC": {"RFC3447": 16, "RFC 3447": 1, "RFC8391": 1, "RFC 8391": 1}, "ISO": {"ISO/IEC 15408": 4, "ISO/IEC 18045": 4, "ISO/IEC 17065": 2}}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {"ConfidentialDocument": {"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1, "Version 1, Feb. 02, 2026, \u201dEvaluation Technical Report Summary\u201d, T\u00dcV Informationstechnik GmbH, (confidential document) [7] Protection Profile PC Client Specific TPM, TPM Library specification Family \u201c2.0\u201d, Level 0": 1, "Standards Compliance Verification; Version 1, Sep. 06, 2024, T\u00dcV Informationstechnik GmbH, (confidential document) 7 specifically \u2022 AIS 20, Version 3, Funktionalit\u00e4tsklassen und Evaluationsmethodologie f\u00fcr": 1}}}, "st_keywords": {"cc_cert_id": {"FR": {"ANSSI-CC-PP-2021/02": 3}}, "cc_protection_profile_id": {"ANSSI": {"ANSSI-CC-PP-2021/02": 3}}, "cc_security_level": {"EAL": {"EAL4": 2, "EAL4 augmented": 1}}, "cc_sar": {"ADV": {"ADV_COMP.1": 1, "ADV_ARC.1": 1, "ADV_FSP.4": 1, "ADV_IMP.1": 1, "ADV_TDS.3": 1}, "AGD": {"AGD_OPE.1": 1, "AGD_PRE.1": 1}, "ALC": {"ALC_DVS": 1, "ALC_FLR.1": 3, "ALC_TAT": 1, "ALC_CMC.4": 1, "ALC_CMS.4": 1, "ALC_DEL.1": 1, "ALC_DVS.1": 1, "ALC_LCD.1": 1, "ALC_TAT.1": 1}, "ATE": {"ATE_COV.2": 1, "ATE_DPT.1": 1, "ATE_FUN.1": 1, "ATE_IND.2": 1}, "AVA": {"AVA_VAN.4": 3, "AVA_VAN": 1}, "ASE": {"ASE_INT": 3, "ASE_CCL": 3, "ASE_SPD": 2, "ASE_OBJ": 2, "ASE_ECD": 2, "ASE_REQ": 3, "ASE_TSS": 2, "ASE_CCL.1": 1, "ASE_ECD.1": 1, "ASE_INT.1": 1, "ASE_OBJ.2": 1, "ASE_REQ.2": 1, "ASE_SPD.1": 1, "ASE_TSS.1": 1}}, "cc_sfr": {"FCO": {"FCO_NRO": 6}, "FCS": {"FCS_COP": 48, "FCS_CKM.4": 3, "FCS_CKM.6": 26, "FCS_CKM": 37, "FCS_CKM.2": 9, "FCS_COP.1": 20, "FCS_CKM.5": 20, "FCS_RBG.1": 9, "FCS_RNG.1": 19, "FCS_RNG": 1, "FCS_CKM.1": 20, "FCS_CKM.6.1": 2, "FCS_CKM.6.2": 1, "FCS_RNG.1.1": 2, "FCS_RNG.1.2": 2}, "FDP": {"FDP_ETC": 9, "FDP_ETC.2.4": 1, "FDP_ACC.1": 5, "FDP_IFC.1": 3, "FDP_ETC.2": 7, "FDP_ITC.1": 10, "FDP_ITC.2": 11, "FDP_ITC": 8, "FDP_ACF": 30, "FDP_ACF.1": 8, "FDP_UIT": 9, "FDP_UIT.1": 2, "FDP_RIP.1": 3, "FDP_ACC": 28, "FDP_SDI.1": 3, "FDP_UCT": 7, "FDP_ITT.1": 1}, "FIA": {"FIA_UID.1": 4, "FIA_UID.1.1": 1, "FIA_UID.1.2": 1, "FIA_SOS.2": 3, "FIA_AFL": 12, "FIA_UAU.1": 3, "FIA_UAU.5": 3, "FIA_UAU.6": 3, "FIA_USB.1": 3, "FIA_MSA": 1}, "FMT": {"FMT_MSA.2": 4, "FMT_MSA.1": 1, "FMT_SMR.1": 4, "FMT_MSA.2.1": 1, "FMT_MSA": 65, "FMT_MSA.3": 2, "FMT_MTD": 6, "FMT_SMF.1": 3, "FMT_MOF": 3}, "FPT": {"FPT_TST": 1, "FPT_TST.1.1": 2, "FPT_TST.1": 6, "FPT_TST.1.2": 1, "FPT_TST.1.3": 1, "FPT_FLS": 7, "FPT_FLS.1": 1, "FPT_PHP.3": 4, "FPT_PHP.3.1": 1, "FPT_STM.1": 3, "FPT_ITT.1": 3}, "FTP": {"FTP_ITC.1": 1, "FTP_TRP.1": 1, "FTP_ITC": 3}}, "cc_claims": {}, "vendor": {"Infineon": {"Infineon Technologies AG": 17, "Infineon": 7, "Infineon Technologies": 6}}, "eval_facility": {}, "symmetric_crypto": {"AES_competition": {"AES": {"AES": 24}}, "constructions": {"MAC": {"HMAC": 18}}}, "asymmetric_crypto": {"RSA": {"RSA 1024": 1}, "ECC": {"ECDH": {"ECDH": 3}, "ECDSA": {"ECDSA": 5}, "ECC": {"ECC": 38}}}, "pq_crypto": {}, "hash_function": {"SHA": {"SHA1": {"SHA-1": 9}, "SHA2": {"SHA-256": 8, "SHA-384": 8}}}, "crypto_scheme": {"MAC": {"MAC": 2}}, "crypto_protocol": {}, "randomness": {"TRNG": {"TRNG": 1}, "PRNG": {"DRBG": 11}, "RNG": {"RNG": 12}}, "cipher_mode": {"CFB": {"CFB": 3}}, "ecc_curve": {"NIST": {"P-256": 1, "P-384": 1, "NIST P-256": 1, "NIST P-384": 1}}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {"SCA": {"physical probing": 2, "DPA": 1, "SPA": 1}, "FI": {"DFA": 1}}, "technical_report_id": {"BSI": {"BSI TR-02102": 1}}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {"FIPS": {"FIPS PUB 140-2": 3, "FIPS PUB 180-4": 2, "FIPS PUB 186-4": 1, "FIPS 180-4": 3}, "NIST": {"SP 800-90A": 3, "NIST SP 800-90A": 2, "SP 800-133": 1}, "PKCS": {"PKCS#1": 12}, "BSI": {"AIS20": 1}, "RFC": {"RFC3447": 35, "RFC 3447": 1, "RFC 2104": 1}, "ISO": {"ISO/IEC 9797-2": 3, "ISO/IEC 15946-1": 1, "ISO/IEC 14888-3": 1, "ISO/IEC 10118-3": 1, "ISO/IEC 10116:2006": 2}, "CC": {"CCMB-2022-11-001": 2, "CCMB-2022-11-002": 2, "CCMB-2022-11-003": 2, "CCMB-2022-11-004": 2, "CCMB-2022-11-005": 2, "CCMB-2022-11-006": 2}}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {}}, "cert_keywords": {"cc_cert_id": {"DE": {"BSI-DSZ-CC-1278-2026": 1}}, "cc_protection_profile_id": {}, "cc_security_level": {"EAL": {"EAL 4": 1, "EAL 2": 1, "EAL 4 augmented": 1}}, "cc_sar": {"ALC": {"ALC_FLR.1": 1, "ALC_FLR": 1}, "AVA": {"AVA_VAN.4": 1}}, "cc_sfr": {}, "cc_claims": {}, "vendor": {"Infineon": {"Infineon Technologies AG": 2}}, "eval_facility": {}, "symmetric_crypto": {}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {"ISO": {"ISO/IEC 15408": 2, "ISO/IEC 18045": 2}}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {}}, "report_filename": "1278a_pdf.pdf", "st_filename": "1278b_pdf.pdf", "cert_filename": "1278c_pdf.pdf"}, "heuristics": {"_type": "sec_certs.sample.cc_eucc_common.Heuristics", "extracted_versions": {"_type": "Set", "elements": ["16.25.19774.00", "2.0", "26.25.19812.00"]}, "cpe_matches": null, "verified_cpe_matches": null, "related_cves": null, "cert_lab": ["BSI"], "cert_id": "BSI-DSZ-CC-1278-2026", "prev_certificates": null, "next_certificates": null, "st_references": {"_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": {"_type": "Set", "elements": ["ANSSI-CC-PP-2021/02"]}, "indirectly_referencing": {"_type": "Set", "elements": ["ANSSI-CC-PP-2021/02"]}}, "report_references": {"_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": {"_type": "Set", "elements": ["ANSSI-CC-PP-2021/02", "BSI-DSZ-CC-1245-2024"]}, "indirectly_referencing": {"_type": "Set", "elements": ["ANSSI-CC-PP-2021/02", "BSI-DSZ-CC-1245-2024"]}}, "annotated_references": null, "extracted_sars": {"_type": "Set", "elements": [{"_type": "sec_certs.sample.sar.SAR", "family": "ALC_DEL", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ATE_FUN", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMS", "level": 4}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_TDS", "level": 3}, {"_type": "sec_certs.sample.sar.SAR", "family": "AVA_VAN", "level": 4}, {"_type": "sec_certs.sample.sar.SAR", "family": "ATE_IND", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "ATE_DPT", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ATE_COV", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_INT", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ALC_FLR", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_FSP", "level": 4}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_REQ", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_ECD", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_OBJ", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_CCL", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_ARC", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ALC_TAT", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "AGD_OPE", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ALC_DVS", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMC", "level": 4}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_COMP", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ALC_LCD", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "AGD_PRE", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_TSS", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_IMP", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_SPD", "level": 1}]}, "direct_transitive_cves": null, "indirect_transitive_cves": null, "scheme_data": {"cert_id": "BSI-DSZ-CC-1278-2026", "product": "Infineon Technologies AG OPTIGA\u2122 Trusted Platform Module SLB9672_2.0 v16 and SLB9673_2.0 v26 v16.25.19774.00 and \u2026", "vendor": "Infineon Technologies AG", "certification_date": "2026-02-23", "category": "Smart Cards and similar devices", "url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_IC_Cryptolib/1278.html", "enhanced": {"product": "Infineon Technologies AG OPTIGA\u2122 Trusted Platform Module SLB9672_2.0 v16 and SLB9673_2.0 v26 v16.25.19774.00 and v26.25.19812.00", "applicant": "Infineon Technologies AG Am Campeon 1-15 85579 Neubiberg", "evaluation_facility": "T\u00dcV Informationstechnik GmbH", "assurance_level": "EAL4+,ALC_FLR.1,AVA_VAN.4", "protection_profile": "Protection Profile PC Client Specific TPM, TPM Library specification Family \u201c2.0\u201d, Level 0 Revision 1.59, Version: 1.3, Date: 2021-09-29, ANSSI-CC-PP-2021/02", "certification_date": "2026-02-23", "expiration_date": "2031-02-22", "report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1278a_pdf.pdf?__blob=publicationFile&v=2", "target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1278b_pdf.pdf?__blob=publicationFile&v=2", "cert_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1278c_pdf.pdf?__blob=publicationFile&v=2", "description": "The current evaluation is a re-certification, based on the TPM Protection Profile for the TPM specification revision 1.59. Two HW-variants exist (with either \"Serial Peripheral Interface\" or \"Inter Integrated Circuit Interface\"), the certificate exclusively comprises the new FW-versions v16.25.19774.00 or v26.25.19812.00, including optimizations and bugfixes."}, "subcategory": "ICs, Cryptolib"}, "protection_profiles": {"_type": "Set", "elements": ["dcc6f443e1f31677"]}, "eal": "EAL4+"}}