SLB9635TT1.2 / m1566a13 HW a13 / FW 03.17.0008.00

CSV information ?

Status archived
Valid from 20.11.2009
Valid until 01.09.2019
Scheme 🇩🇪 DE
Manufacturer Infineon Technologies AG
Category Trusted Computing
Security level EAL4+
Protection profiles

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0573-2009

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES, HMAC
Asymmetric Algorithms
RSA2048
Hash functions
SHA-1
Schemes
MAC
Protocols
PGP
Randomness
RNG, RND
Block cipher modes
CBC, CTR

Vendor
Infineon Technologies AG, Infineon Technologies, Infineon, Microsoft

Security level
EAL 4, EAL 1, EAL 7, EAL4, EAL5+, EAL1, EAL3, EAL5, EAL7, EAL2, EAL6, EAL 4 augmented, EAL4 augmented
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_FLR.1, ALC_SCP, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_DVS.2, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_FUN, ATE_IND, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, AVA_VAN.4, AVA_VAN, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.5, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSS
Protection profiles
BSI-PP-0030-2008, BSI-CC-PP-0030-2008
Certificates
BSI-DSZ-CC-0573-2009, BSI-DSZ-CC-0573
Evaluation facilities
TÃœV Informationstechnik, TÃœViT

Side-channel analysis
physical probing, side channel, DPA, DFA, JIL
Certification process
Technical Report, Version 2, November 18, 2009, ETR Summary, TÃœV Informationstechnik GmbH (confidential document) [9] Configuration list for the TOE (confidential document): SLB9635TT1.2 / m1566a13, 19] Test Plan TPM 1.2 ROM3 3.17.0008.00, Version 1.2, September 24, 2009, Infineon Technologies AG (confidential document) [20] PKCS #1 v2.0: RSA Cryptography Standard, RSA Laboratories, October 1, 1998 [21] FIPS PUB 46-3

Standards
FIPS PUB 46-3, FIPS PUB 197, FIPS PUB 180-2, PKCS #1, AIS 34, AIS 20, AIS 25, AIS 26, AIS 31, AIS 32, AIS 35, AIS 36, AIS 38
Technical reports
BSI 7125, BSI 7148, BSI 7149

File metadata

Title Certification Report BSI-DSZ-CC-0573-2009
Subject Common Criteria Certification
Keywords "SLB9635TT1.2 / m1566a13 HW a13 / FW 03.17.0008.00, Infineon Technologies AG, Trusted Platform Module, BSI-PP-0030-2008, Schutzprofil PC Client Specific Trusted Platform Module TPM Family 1.2"
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20091127084232+01'00'
Modification date D:20091203114950+01'00'
Pages 42
Creator Writer
Producer StarOffice 9

Frontpage

Certificate ID BSI-DSZ-CC-0573-2009
Certified item SLB9635TT1.2 / m1566a13 HW a13 / FW 03.17.0008.00
Certification lab BSI
Developer Infineon Technologies AG

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, Triple-DES, 3DES, HMAC
Asymmetric Algorithms
RSA 2048, RSA2048, RSA 512, ECC
Hash functions
SHA-1
Schemes
MAC
Randomness
RNG, RND
Block cipher modes
CBC, CTR

Vendor
Infineon Technologies AG, Infineon, Infineon Technologies

Security level
EAL4, EAL4 augmented
Security Assurance Requirements (SAR)
ADV_VAN.4, ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS, ALC_FLR.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.4, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FCO_NRO, FCO_NRO.1, FCS_RNG.1, FCS_RNG, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1, FCS_CKM.4.1, FCS_COP, FDP_ITC.1, FDP_ITC.2, FDP_ACF, FDP_ACC.1, FDP_ACF.1, FDP_IFC.1, FDP_ACC, FDP_RIP.1, FDP_ETC.2, FDP_UCT, FDP_UIT, FDP_TDC.1, FDP_UCT.1, FDP_UIT.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.4, FIA_UAU.6, FIA_USB.1, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA.3, FMT_MSA, FMT_MSA.1, FMT_SMR.1, FMT_MSA.2, FMT_MTD, FMT_MTD.1, FPR_UNL.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_FLS.1, FPT_FLS.1.1, FPT_PHP.3, FPT_PHP.3.1, FPT_STM.1, FPT_TST.1
Protection profiles
BSI-PP-0030-2008

Side-channel analysis
physical probing, DPA, SPA, DFA

Standards
FIPS PUB 140-1, FIPS PUB 46-3, FIPS PUB 197, FIPS PUB 180-2, FIPS 46-3, FIPS 180-1, PKCS#1, PKCS #1, AIS20, AIS 20, RFC2104, RFC 2104, CCMB-2006-09-001, CCMB-2007-09-002, CCMB-2007-09-003, CCMB-2007-09-004

File metadata

Title 0573_pdf.pdf
Subject CC EAL4+ TPM 1.2 Security Target
Keywords "Security Target, Trusted Platform Module, Trusted Computing, TPM, TPM 1.2, public, document, moderate attack potential, EAL4+, EAL4 moderate, Infineon Technologies, Common Criteria, Trusted Computing Group Protection Profile BSI-PP-0030-2008"
Author Infineon Technologies AG
Creation date D:20091117160510+01'00'
Modification date D:20091126162310+01'00'
Pages 63
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 6.0 (Windows)

Heuristics ?

Certificate ID: BSI-DSZ-CC-0573-2009

Extracted SARs

ASE_CCL.1, ALC_DEL.1, AVA_VAN.4, ALC_CMC.4, ATE_FUN.1, ATE_IND.2, ADV_ARC.1, ASE_TSS.1, ADV_TDS.3, ASE_SPD.1, ASE_REQ.2, ALC_CMS.4, ALC_TAT.1, ADV_IMP.1, ATE_COV.2, APE_INT.1, AGD_OPE.1, ALC_DVS.1, APE_CCL.1, APE_REQ.2, APE_ECD.1, ASE_ECD.1, ADV_INT.3, ADV_SPM.1, ADV_FSP.4, ASE_INT.1, APE_OBJ.2, ADV_VAN.4, APE_SPD.1, AGD_PRE.1, ALC_LCD.1, ALC_FLR.1, ATE_DPT.2, ASE_OBJ.2

References ?

No references are available for this certificate.

Updates ?

  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Protection Profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PC Client Specific Trusted Platform Module Family 1.2; Level 2, Version 1.1', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0030b.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['BSI-CC-PP-030-2008']}}]}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f1840e2ef500d15093d5f552581bb9a972d757c30d157bcf45d7fbc7fdb4a745', 'txt_hash': '21533fe78646caab51b211558b4ff6a82a4cf909b0faa1aa5d81b1aa9870d24a'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '0a81c560fcdbfeee1165bf3c96d64fd3b07518a6bfdf33fb9f58f5cf29bb5779', 'txt_hash': '155dd5d49e53d403a117e5cfacab64afd1e150ceeeb4a84b76b6abde67dd1a09'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 868432, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 42, '/CreationDate': "D:20091127084232+01'00'", '/Subject': 'Common Criteria Certification', '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/Creator': 'Writer', '/Keywords': '"SLB9635TT1.2 / m1566a13 HW a13 / FW 03.17.0008.00, Infineon Technologies AG, Trusted Platform Module, BSI-PP-0030-2008, Schutzprofil PC Client Specific Trusted Platform Module TPM Family 1.2"', '/Producer': 'StarOffice 9', '/ModDate': "D:20091203114950+01'00'", '/Title': 'Certification Report BSI-DSZ-CC-0573-2009', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ietf.org/rfc/rfc2104.txt', 'http://www.bsi.bund.de/']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 226487, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 63, '/Author': 'Infineon Technologies AG', '/CreationDate': "D:20091117160510+01'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/Keywords': '"Security Target, Trusted Platform Module, Trusted Computing, TPM,\r\nTPM 1.2, public, document, moderate attack potential, EAL4+, EAL4 moderate, Infineon Technologies, Common Criteria, Trusted Computing Group Protection Profile BSI-PP-0030-2008" ', '/ModDate': "D:20091126162310+01'00'", '/Producer': 'Acrobat Distiller 6.0 (Windows)', '/Subject': 'CC EAL4+ TPM 1.2 Security Target', '/Title': '0573_pdf.pdf', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0573-2009', 'cert_item': 'SLB9635TT1.2 / m1566a13 HW a13 / FW 03.17.0008.00', 'developer': 'Infineon Technologies AG', 'cert_lab': 'BSI'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0573-2009': 20, 'BSI-DSZ-CC-0573': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0030-2008': 1, 'BSI-CC-PP-0030-2008': 3}}, 'cc_security_level': {'EAL': {'EAL 4': 7, 'EAL 1': 1, 'EAL 7': 1, 'EAL4': 8, 'EAL5+': 1, 'EAL1': 6, 'EAL3': 4, 'EAL5': 6, 'EAL7': 4, 'EAL2': 3, 'EAL6': 3, 'EAL 4 augmented': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.1': 1, 'ADV_FSP.2': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.5': 1, 'ADV_FSP.6': 1, 'ADV_IMP.1': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_INT.2': 1, 'ADV_INT.3': 1, 'ADV_SPM.1': 1, 'ADV_TDS.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.4': 1, 'ADV_TDS.5': 1, 'ADV_TDS.6': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.1': 7, 'ALC_SCP': 1, 'ALC_CMC.1': 1, 'ALC_CMC.2': 1, 'ALC_CMC.3': 1, 'ALC_CMC.4': 2, 'ALC_CMC.5': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 2, 'ALC_CMS.5': 1, 'ALC_DEL.1': 2, 'ALC_DVS.1': 2, 'ALC_DVS.2': 1, 'ALC_FLR.2': 1, 'ALC_FLR.3': 1, 'ALC_LCD.1': 2, 'ALC_LCD.2': 1, 'ALC_TAT.1': 2, 'ALC_TAT.2': 1, 'ALC_TAT.3': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_FUN': 2, 'ATE_IND': 2, 'ATE_COV.1': 1, 'ATE_COV.2': 1, 'ATE_COV.3': 1, 'ATE_DPT.1': 1, 'ATE_DPT.2': 1, 'ATE_DPT.3': 1, 'ATE_DPT.4': 1, 'ATE_FUN.1': 1, 'ATE_FUN.2': 1, 'ATE_IND.1': 1, 'ATE_IND.2': 1, 'ATE_IND.3': 1, 'ATE_COV': 1, 'ATE_DPT': 1}, 'AVA': {'AVA_VAN.4': 6, 'AVA_VAN': 3, 'AVA_VAN.1': 1, 'AVA_VAN.2': 1, 'AVA_VAN.3': 1, 'AVA_VAN.5': 1}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies AG': 18, 'Infineon Technologies': 8, 'Infineon': 3}, 'Microsoft': {'Microsoft': 1}}, 'eval_facility': {'TUV': {'TÃœV Informationstechnik': 3, 'TÃœViT': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 5}}, 'DES': {'DES': {'DES': 4}, '3DES': {'3DES': 3}}, 'constructions': {'MAC': {'HMAC': 4}}}, 'asymmetric_crypto': {'RSA': {'RSA2048': 1}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}}}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'PGP': {'PGP': 2}}, 'randomness': {'RNG': {'RNG': 3, 'RND': 1}}, 'cipher_mode': {'CBC': {'CBC': 2}, 'CTR': {'CTR': 2}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'side channel': 1, 'DPA': 1}, 'FI': {'DFA': 1}, 'other': {'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI 7125': 2, 'BSI 7148': 1, 'BSI 7149': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 1, 'FIPS PUB 197': 1, 'FIPS PUB 180-2': 1}, 'PKCS': {'PKCS #1': 1}, 'BSI': {'AIS 34': 2, 'AIS 20': 1, 'AIS 25': 1, 'AIS 26': 1, 'AIS 31': 1, 'AIS 32': 1, 'AIS 35': 1, 'AIS 36': 1, 'AIS 38': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'Technical Report, Version 2, November 18, 2009, ETR Summary, TÃœV Informationstechnik GmbH (confidential document) [9] Configuration list for the TOE (confidential document): SLB9635TT1.2 / m1566a13': 1, '19] Test Plan TPM 1.2 ROM3 3.17.0008.00, Version 1.2, September 24, 2009, Infineon Technologies AG (confidential document) [20] PKCS #1 v2.0: RSA Cryptography Standard, RSA Laboratories, October 1, 1998 [21] FIPS PUB 46-3': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0030-2008': 1}}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_VAN.4': 1, 'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS': 1, 'ALC_FLR.1': 3, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.4': 2}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 3}, 'FCO': {'FCO_NRO': 4, 'FCO_NRO.1': 1}, 'FCS': {'FCS_RNG.1': 9, 'FCS_RNG': 3, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM': 8, 'FCS_CKM.2': 2, 'FCS_COP.1': 7, 'FCS_CKM.4': 11, 'FCS_CKM.1': 10, 'FCS_CKM.4.1': 1, 'FCS_COP': 22}, 'FDP': {'FDP_ITC.1': 6, 'FDP_ITC.2': 9, 'FDP_ACF': 25, 'FDP_ACC.1': 9, 'FDP_ACF.1': 29, 'FDP_IFC.1': 1, 'FDP_ACC': 18, 'FDP_RIP.1': 2, 'FDP_ETC.2': 3, 'FDP_UCT': 4, 'FDP_UIT': 4, 'FDP_TDC.1': 1, 'FDP_UCT.1': 1, 'FDP_UIT.1': 1}, 'FIA': {'FIA_UID.1': 5, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 5, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.5': 4, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_AFL.1': 4, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.4': 2, 'FIA_UAU.6': 3, 'FIA_USB.1': 3}, 'FMT': {'FMT_SMF.1': 4, 'FMT_SMF.1.1': 1, 'FMT_MSA.3': 17, 'FMT_MSA': 36, 'FMT_MSA.1': 7, 'FMT_SMR.1': 8, 'FMT_MSA.2': 5, 'FMT_MTD': 8, 'FMT_MTD.1': 1}, 'FPR': {'FPR_UNL.1': 3}, 'FPT': {'FPT_TDC.1': 3, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_FLS.1': 4, 'FPT_FLS.1.1': 1, 'FPT_PHP.3': 4, 'FPT_PHP.3.1': 1, 'FPT_STM.1': 3, 'FPT_TST.1': 3}}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies AG': 74, 'Infineon': 1, 'Infineon Technologies': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 10}}, 'DES': {'DES': {'DES': 9}, '3DES': {'Triple-DES': 8, '3DES': 9}}, 'constructions': {'MAC': {'HMAC': 9}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 1, 'RSA2048': 1, 'RSA 512': 5}, 'ECC': {'ECC': {'ECC': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 32}}}, 'crypto_scheme': {'MAC': {'MAC': 4}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 15, 'RND': 2}}, 'cipher_mode': {'CBC': {'CBC': 5}, 'CTR': {'CTR': 2}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 2, 'DPA': 2, 'SPA': 1}, 'FI': {'DFA': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 140-1': 3, 'FIPS PUB 46-3': 3, 'FIPS PUB 197': 3, 'FIPS PUB 180-2': 3, 'FIPS 46-3': 1, 'FIPS 180-1': 1}, 'PKCS': {'PKCS#1': 4, 'PKCS #1': 1}, 'BSI': {'AIS20': 6, 'AIS 20': 1}, 'RFC': {'RFC2104': 3, 'RFC 2104': 1}, 'CC': {'CCMB-2006-09-001': 2, 'CCMB-2007-09-002': 2, 'CCMB-2007-09-003': 2, 'CCMB-2007-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 0573a_pdf.pdf.
    • The st_filename property was set to 0573b_pdf.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-0573-2009.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_VAN', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0573a_pdf.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0573b_pdf.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The extracted_sars property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name SLB9635TT1.2 / m1566a13 HW a13 / FW 03.17.0008.00 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Trusted Computing",
  "cert_link": null,
  "dgst": "44f677892bb84ce5",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0573-2009",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_VAN",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.2",
        "03.17.0008.00"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Infineon Technologies AG",
  "manufacturer_web": "https://www.infineon.com/",
  "name": "SLB9635TT1.2 / m1566a13 HW a13 / FW 03.17.0008.00",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2009-11-20",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "0573a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cert_id": "BSI-DSZ-CC-0573-2009",
        "cert_item": "SLB9635TT1.2 / m1566a13 HW a13 / FW 03.17.0008.00",
        "cert_lab": "BSI",
        "developer": "Infineon Technologies AG",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ]
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "RSA": {
          "RSA2048": 1
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0573": 1,
          "BSI-DSZ-CC-0573-2009": 20
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0030-2008": 3,
          "BSI-PP-0030-2008": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_FSP": 1,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 1,
          "ADV_FSP.3": 1,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 1,
          "ADV_FSP.6": 1,
          "ADV_IMP": 1,
          "ADV_IMP.1": 1,
          "ADV_IMP.2": 1,
          "ADV_INT": 1,
          "ADV_INT.1": 1,
          "ADV_INT.2": 1,
          "ADV_INT.3": 1,
          "ADV_SPM": 1,
          "ADV_SPM.1": 1,
          "ADV_TDS": 1,
          "ADV_TDS.1": 1,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 1,
          "ADV_TDS.4": 1,
          "ADV_TDS.5": 1,
          "ADV_TDS.6": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.1": 1,
          "ALC_CMC.2": 1,
          "ALC_CMC.3": 1,
          "ALC_CMC.4": 2,
          "ALC_CMC.5": 1,
          "ALC_CMS": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.2": 1,
          "ALC_CMS.3": 1,
          "ALC_CMS.4": 2,
          "ALC_CMS.5": 1,
          "ALC_DEL": 1,
          "ALC_DEL.1": 2,
          "ALC_DVS": 1,
          "ALC_DVS.1": 2,
          "ALC_DVS.2": 1,
          "ALC_FLR": 1,
          "ALC_FLR.1": 7,
          "ALC_FLR.2": 1,
          "ALC_FLR.3": 1,
          "ALC_LCD.1": 2,
          "ALC_LCD.2": 1,
          "ALC_SCP": 1,
          "ALC_TAT": 1,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 1,
          "ALC_TAT.3": 1
        },
        "APE": {
          "APE_CCL.1": 1,
          "APE_ECD.1": 1,
          "APE_INT.1": 1,
          "APE_OBJ.1": 1,
          "APE_OBJ.2": 1,
          "APE_REQ.1": 1,
          "APE_REQ.2": 1,
          "APE_SPD.1": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 1,
          "ASE_ECD": 1,
          "ASE_ECD.1": 1,
          "ASE_INT": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ": 1,
          "ASE_OBJ.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.1": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS": 1,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 1,
          "ATE_COV.2": 1,
          "ATE_COV.3": 1,
          "ATE_DPT": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.2": 1,
          "ATE_DPT.3": 1,
          "ATE_DPT.4": 1,
          "ATE_FUN": 2,
          "ATE_FUN.1": 1,
          "ATE_FUN.2": 1,
          "ATE_IND": 2,
          "ATE_IND.1": 1,
          "ATE_IND.2": 1,
          "ATE_IND.3": 1
        },
        "AVA": {
          "AVA_VAN": 3,
          "AVA_VAN.1": 1,
          "AVA_VAN.2": 1,
          "AVA_VAN.3": 1,
          "AVA_VAN.4": 6,
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 4": 7,
          "EAL 4 augmented": 2,
          "EAL 7": 1,
          "EAL1": 6,
          "EAL2": 3,
          "EAL3": 4,
          "EAL4": 8,
          "EAL4 augmented": 1,
          "EAL5": 6,
          "EAL5+": 1,
          "EAL6": 3,
          "EAL7": 4
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "19] Test Plan TPM 1.2 ROM3 3.17.0008.00, Version 1.2, September 24, 2009, Infineon Technologies AG (confidential document) [20] PKCS #1 v2.0: RSA Cryptography Standard, RSA Laboratories, October 1, 1998 [21] FIPS PUB 46-3": 1,
          "Technical Report, Version 2, November 18, 2009, ETR Summary, T\u00dcV Informationstechnik GmbH (confidential document) [9] Configuration list for the TOE (confidential document): SLB9635TT1.2 / m1566a13": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "CTR": {
          "CTR": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PGP": {
          "PGP": 2
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 3,
          "T\u00dcViT": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 1,
          "RNG": 3
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1
        },
        "SCA": {
          "DPA": 1,
          "physical probing": 1,
          "side channel": 1
        },
        "other": {
          "JIL": 4
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 1,
          "AIS 25": 1,
          "AIS 26": 1,
          "AIS 31": 1,
          "AIS 32": 1,
          "AIS 34": 2,
          "AIS 35": 1,
          "AIS 36": 1,
          "AIS 38": 1
        },
        "FIPS": {
          "FIPS PUB 180-2": 1,
          "FIPS PUB 197": 1,
          "FIPS PUB 46-3": 1
        },
        "PKCS": {
          "PKCS #1": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 5
          }
        },
        "DES": {
          "3DES": {
            "3DES": 3
          },
          "DES": {
            "DES": 4
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 4
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7125": 2,
          "BSI 7148": 1,
          "BSI 7149": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 3,
          "Infineon Technologies": 8,
          "Infineon Technologies AG": 18
        },
        "Microsoft": {
          "Microsoft": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20091127084232+01\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"SLB9635TT1.2 / m1566a13 HW a13 / FW 03.17.0008.00, Infineon Technologies AG, Trusted Platform Module, BSI-PP-0030-2008, Schutzprofil PC Client Specific Trusted Platform Module TPM Family 1.2\"",
      "/ModDate": "D:20091203114950+01\u002700\u0027",
      "/Producer": "StarOffice 9",
      "/Subject": "Common Criteria Certification",
      "/Title": "Certification Report BSI-DSZ-CC-0573-2009",
      "pdf_file_size_bytes": 868432,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.ietf.org/rfc/rfc2104.txt",
          "http://www.bsi.bund.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 42
    },
    "st_filename": "0573b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          }
        },
        "RSA": {
          "RSA 2048": 1,
          "RSA 512": 5,
          "RSA2048": 1
        }
      },
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0030-2008": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1,
          "ADV_VAN.4": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR.1": 3,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.2": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.4": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 2,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 3
        },
        "FCO": {
          "FCO_NRO": 4,
          "FCO_NRO.1": 1
        },
        "FCS": {
          "FCS_CKM": 8,
          "FCS_CKM.1": 10,
          "FCS_CKM.2": 2,
          "FCS_CKM.4": 11,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 22,
          "FCS_COP.1": 7,
          "FCS_RNG": 3,
          "FCS_RNG.1": 9,
          "FCS_RNG.1.1": 2,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC": 18,
          "FDP_ACC.1": 9,
          "FDP_ACF": 25,
          "FDP_ACF.1": 29,
          "FDP_ETC.2": 3,
          "FDP_IFC.1": 1,
          "FDP_ITC.1": 6,
          "FDP_ITC.2": 9,
          "FDP_RIP.1": 2,
          "FDP_TDC.1": 1,
          "FDP_UCT": 4,
          "FDP_UCT.1": 1,
          "FDP_UIT": 4,
          "FDP_UIT.1": 1
        },
        "FIA": {
          "FIA_AFL.1": 4,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_UAU.1": 5,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.4": 2,
          "FIA_UAU.5": 4,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6": 3,
          "FIA_UID.1": 5,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB.1": 3
        },
        "FMT": {
          "FMT_MSA": 36,
          "FMT_MSA.1": 7,
          "FMT_MSA.2": 5,
          "FMT_MSA.3": 17,
          "FMT_MTD": 8,
          "FMT_MTD.1": 1,
          "FMT_SMF.1": 4,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 8
        },
        "FPR": {
          "FPR_UNL.1": 3
        },
        "FPT": {
          "FPT_FLS.1": 4,
          "FPT_FLS.1.1": 1,
          "FPT_PHP.3": 4,
          "FPT_PHP.3.1": 1,
          "FPT_STM.1": 3,
          "FPT_TDC.1": 3,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 1,
          "FPT_TST.1": 3
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 5
        },
        "CTR": {
          "CTR": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 4
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 32
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 2,
          "RNG": 15
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1
        },
        "SCA": {
          "DPA": 2,
          "SPA": 1,
          "physical probing": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 1,
          "AIS20": 6
        },
        "CC": {
          "CCMB-2006-09-001": 2,
          "CCMB-2007-09-002": 2,
          "CCMB-2007-09-003": 2,
          "CCMB-2007-09-004": 1
        },
        "FIPS": {
          "FIPS 180-1": 1,
          "FIPS 46-3": 1,
          "FIPS PUB 140-1": 3,
          "FIPS PUB 180-2": 3,
          "FIPS PUB 197": 3,
          "FIPS PUB 46-3": 3
        },
        "PKCS": {
          "PKCS #1": 1,
          "PKCS#1": 4
        },
        "RFC": {
          "RFC 2104": 1,
          "RFC2104": 3
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 10
          }
        },
        "DES": {
          "3DES": {
            "3DES": 9,
            "Triple-DES": 8
          },
          "DES": {
            "DES": 9
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 9
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 1,
          "Infineon Technologies": 1,
          "Infineon Technologies AG": 74
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Infineon Technologies AG",
      "/CreationDate": "D:20091117160510+01\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/Keywords": "\"Security Target, Trusted Platform Module, Trusted Computing, TPM,\r\nTPM 1.2, public, document, moderate attack potential, EAL4+, EAL4 moderate, Infineon Technologies, Common Criteria, Trusted Computing Group Protection Profile BSI-PP-0030-2008\" ",
      "/ModDate": "D:20091126162310+01\u002700\u0027",
      "/Producer": "Acrobat Distiller 6.0 (Windows)",
      "/Subject": "CC EAL4+ TPM 1.2 Security Target",
      "/Title": "0573_pdf.pdf",
      "pdf_file_size_bytes": 226487,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 63
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "BSI-CC-PP-030-2008"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0030b.pdf",
        "pp_name": "PC Client Specific Trusted Platform Module Family 1.2; Level 2, Version 1.1"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0573a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0573b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "f1840e2ef500d15093d5f552581bb9a972d757c30d157bcf45d7fbc7fdb4a745",
      "txt_hash": "21533fe78646caab51b211558b4ff6a82a4cf909b0faa1aa5d81b1aa9870d24a"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "0a81c560fcdbfeee1165bf3c96d64fd3b07518a6bfdf33fb9f58f5cf29bb5779",
      "txt_hash": "155dd5d49e53d403a117e5cfacab64afd1e150ceeeb4a84b76b6abde67dd1a09"
    }
  },
  "status": "archived"
}