SAM 5000 build 4.12, BOS-V1 and RMS firmware with ID 80001141 CL97 Asymmetric Crypto Library for Crypto@2304T RSA/ECC/Toolbox v2.07.003, and Infineon Technologies Smart Card IC Security Controller M9900, design step A22 and G11, of the SLE97 family (smart card), or the SLI97 family (VQFN chip)

CSV information ?

Status archived
Valid from 28.08.2018
Valid until 28.08.2023
Scheme πŸ‡ΈπŸ‡ͺ SE
Manufacturer Kapsch TrafficCom S.r.l.
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL5

Heuristics summary ?

Certificate ID: CSEC2017020

Certificate ?

Extracted keywords

Vendor
Infineon Technologies

Security level
EAL 2, EAL 5
Security Assurance Requirements (SAR)
ALC_FLR
Evaluation facilities
Combitech AB

File metadata

Creation date D:20180828085843+02'00'
Modification date D:20180828093024+02'00'
Pages 1

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES
Asymmetric Algorithms
ECC, DH
Hash functions
SHA-1, SHA-256
Schemes
MAC
Randomness
RNG, RND

Vendor
Infineon Technologies, Infineon

Security level
EAL 5, EAL 2, EAL 4
Claims
T.RND
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.5, ADV_COMP.1, ADV_ARC, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.2, ALC_COMP.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_COMP.1, AVA_VAN.4, AVA_COMP.1, AVA_VAN, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1, ASE_COMP.1
Protection profiles
BSI-PP-0035
Certificates
BSI-DSZ-CC-0827-V7-2017, CSEC2017020
Evaluation facilities
Combitech AB

Side-channel analysis
Leak-Inherent, Physical Probing, Malfunction, JIL

Standards
ISO/IEC 17025, CCMB-2017-04-001, CCMB-2017-04-004

File metadata

Title Microsoft Word - Certification Report - SAM5000
Author hesve
Creation date D:20180828085420+02'00'
Modification date D:20180828104437+02'00'
Pages 17
Producer Microsoft: Print To PDF

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES, Triple-DES, TDES, CMAC
Asymmetric Algorithms
RSA 2048, RSA 1024, RSA 4096, ECDH, ECC, DH, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA-256, SHA256
Schemes
MAC
Randomness
TRNG, DRBG, RNG, RND
Elliptic Curves
P-256, P-521, NIST P-256, NIST P-521
Block cipher modes
ECB, CBC

Vendor
Infineon Technologies, Infineon, Infineon Technologies AG

Security level
EAL5
Claims
O.RND, T.RND
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP.4, ADV_TDS.3, ADV_ARC, ADV_INT, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.2, ALC_CMS.4, ALC_TAT.1, ALC_CMC, ALC_DEL, ALC_LCD, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_DPT.2, AVA_VAN.5, AVA_VAN.4, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_SAS.1, FCS_CKM, FCS_CKM.3, FCS_CKM.4, FCS_COP, FCS_CKM.1, FCS_COP.1, FCS_CKM.2, FCS_RNG.1, FDP_ACC.1, FDP_ACF.1, FDP_IFC.1, FDP_IFF.1, FDP_ETC.2, FDP_ITC.2, FDP_ITC.2.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITC.2.5, FDP_ITC.1, FDP_ITT.1, FDP_SDI.1, FDP_SDI.2, FIA_AFL, FIA_SOS.1, FIA_UAU.1, FIA_UAU.5, FIA_UAU.6, FIA_AFL.1, FIA_UAU.1.2, FIA_UAU.5.2, FMT_MSA.3, FMT_SMF.1, FMT_MSA.3.2, FMT_SMR.1, FMT_LIM.1, FMT_LIM.2, FMT_MSA.1, FPT_RPL.1, FPT_TEE.1, FPT_RPL.1.2, FPT_TEE.1.2, FPT_TDC.1, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FPT_TST.2, FRU_FLT.2, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-PP-035, BSI-PP-0035, BSI-PP- 0035
Certificates
BSI-DSZ-CC-0827-V6-2017
Evaluation facilities
Combitech AB

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, Malfunction, malfunction

Standards
FIPS 140-2, FIPS PUB 180-4, FIPS PUB 186-2, PKCS #1, RFC 5639, ISO/IEC 15446, ISO/IEC 10116:2006, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003

File metadata

Title Microsoft Word - 902390D.docx
Author stgran
Creation date D:20180321144633+01'00'
Modification date D:20180828105702+02'00'
Pages 73
Producer Microsoft: Print To PDF

References

Outgoing
  • BSI-DSZ-CC-0827-V6-2017 - archived - Infineon Technologies Smart Card IC (Security Controller) M9900 A22/G11/C22/D22, M9905 A11, M9906 A11 with optional RSA v1.03.006/v2.05.005/v2.07.003, EC v1.03.006/v2.05.005/v2.07.003, Toolbox v1.03.006/v2.05.005/v2.07.003, Flash Translation Layer V1.01.0008, SCL v2.01.011/v2.02.010 and PSL v4.00.09 libraries with specific IC dedicated software

Heuristics ?

Certificate ID: CSEC2017020

Extracted SARs

ADV_COMP.1, ALC_LCD.1, ASE_SPD.1, ASE_REQ.2, ALC_CMS.5, ATE_COMP.1, ALC_COMP.1, ALC_TAT.2, ADV_IMP.1, ASE_INT.1, ALC_DVS.2, ADV_INT.2, ASE_COMP.1, ASE_CCL.1, ALC_CMC.4, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ATE_FUN.1, ATE_COV.2, ADV_ARC.1, AGD_PRE.1, ADV_TDS.4, ATE_IND.2, ATE_DPT.3, AVA_VAN.5, AVA_COMP.1, ASE_OBJ.2, ASE_ECD.1

References ?

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'db08081085060c85cb23d2c597880562ffd4aa705874b93d435cf9476345454f', 'txt_hash': 'e3542744e01ae7e3be4b57e954bc29ac642262dae7ef92f8265b1f4db2739b89'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4e776525afd1088624c1b11aea368090679ea61933043c0eb98958d43b1ba311', 'txt_hash': '9fef3691df64d0fe4620d98a76ce3ae5db27aca945d51ba4727cd3064b05c15e'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4e9d9f14b64e48452c5a2ee5eb8fbd98e98d5105e9a7141696846f07ad81cd96', 'txt_hash': '534eb2bb06d7fc7125e0c49386e29ba765de1c4a6e7150ec0f654cbf2ef4a502'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 859066, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 17, '/Author': 'hesve', '/CreationDate': "D:20180828085420+02'00'", '/ModDate': "D:20180828104437+02'00'", '/Producer': 'Microsoft: Print To PDF', '/Title': 'Microsoft Word - Certification Report - SAM5000', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1184710, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 73, '/Author': 'stgran', '/CreationDate': "D:20180321144633+01'00'", '/ModDate': "D:20180828105702+02'00'", '/Producer': 'Microsoft: Print To PDF', '/Title': 'Microsoft Word - 902390D.docx', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 278986, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/CreationDate': "D:20180828085843+02'00'", '/ModDate': "D:20180828093024+02'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0827-V7-2017': 1}, 'SE': {'CSEC2017020': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 2}}, 'cc_security_level': {'EAL': {'EAL 5': 2, 'EAL 2': 1, 'EAL 4': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.5': 1, 'ADV_IMP.1': 1, 'ADV_INT.2': 1, 'ADV_TDS.5': 1, 'ADV_COMP.1': 1, 'ADV_ARC': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.4': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.2': 1, 'ALC_COMP.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.3': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_COMP.1': 1}, 'AVA': {'AVA_VAN.4': 1, 'AVA_COMP.1': 1, 'AVA_VAN': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_COMP.1': 1}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.RND': 1}}, 'vendor': {'Infineon': {'Infineon Technologies': 4, 'Infineon': 1}}, 'eval_facility': {'Combitech': {'Combitech AB': 5}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 6}}, 'DES': {'DES': {'DES': 6}, '3DES': {'3DES': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 4}}, 'FF': {'DH': {'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-256': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 2}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 1, 'RND': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 1, 'Physical Probing': 1}, 'FI': {'Malfunction': 2}, 'other': {'JIL': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 17025': 2}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0827-V6-2017': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-035': 11, 'BSI-PP-0035': 3, 'BSI-PP- 0035': 1}}, 'cc_security_level': {'EAL': {'EAL5': 6}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 3, 'ADV_FSP.5': 2, 'ADV_IMP.1': 3, 'ADV_INT.2': 2, 'ADV_TDS.4': 2, 'ADV_FSP.4': 1, 'ADV_TDS.3': 1, 'ADV_ARC': 1, 'ADV_INT': 1}, 'AGD': {'AGD_OPE.1': 3, 'AGD_PRE.1': 3}, 'ALC': {'ALC_DVS.2': 2, 'ALC_CMC.4': 3, 'ALC_CMS.5': 2, 'ALC_DEL.1': 3, 'ALC_DVS.1': 2, 'ALC_LCD.1': 3, 'ALC_TAT.2': 2, 'ALC_CMS.4': 1, 'ALC_TAT.1': 1, 'ALC_CMC': 1, 'ALC_DEL': 1, 'ALC_LCD': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_DPT.3': 2, 'ATE_FUN.1': 3, 'ATE_IND.2': 3, 'ATE_DPT.2': 1}, 'AVA': {'AVA_VAN.5': 2, 'AVA_VAN.4': 3}, 'ASE': {'ASE_CCL.1': 3, 'ASE_ECD.1': 3, 'ASE_INT.1': 3, 'ASE_OBJ.2': 3, 'ASE_REQ.2': 3, 'ASE_SPD.1': 3, 'ASE_TSS.1': 3}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 1}, 'FCS': {'FCS_CKM': 42, 'FCS_CKM.3': 7, 'FCS_CKM.4': 42, 'FCS_COP': 117, 'FCS_CKM.1': 19, 'FCS_COP.1': 17, 'FCS_CKM.2': 5, 'FCS_RNG.1': 1}, 'FDP': {'FDP_ACC.1': 13, 'FDP_ACF.1': 9, 'FDP_IFC.1': 15, 'FDP_IFF.1': 8, 'FDP_ETC.2': 12, 'FDP_ITC.2': 31, 'FDP_ITC.2.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_ETC.2.2': 1, 'FDP_ETC.2.3': 1, 'FDP_ETC.2.4': 1, 'FDP_ITC.2.2': 1, 'FDP_ITC.2.3': 1, 'FDP_ITC.2.4': 1, 'FDP_ITC.2.5': 1, 'FDP_ITC.1': 15, 'FDP_ITT.1': 1, 'FDP_SDI.1': 1, 'FDP_SDI.2': 1}, 'FIA': {'FIA_AFL': 16, 'FIA_SOS.1': 8, 'FIA_UAU.1': 9, 'FIA_UAU.5': 8, 'FIA_UAU.6': 7, 'FIA_AFL.1': 4, 'FIA_UAU.1.2': 1, 'FIA_UAU.5.2': 1}, 'FMT': {'FMT_MSA.3': 14, 'FMT_SMF.1': 8, 'FMT_MSA.3.2': 1, 'FMT_SMR.1': 1, 'FMT_LIM.1': 1, 'FMT_LIM.2': 1, 'FMT_MSA.1': 1}, 'FPT': {'FPT_RPL.1': 8, 'FPT_TEE.1': 8, 'FPT_RPL.1.2': 1, 'FPT_TEE.1.2': 1, 'FPT_TDC.1': 2, 'FPT_FLS.1': 1, 'FPT_PHP.3': 1, 'FPT_ITT.1': 1, 'FPT_TST.2': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC.1': 1, 'FTP_TRP.1': 1}}, 'cc_claims': {'O': {'O.RND': 2}, 'T': {'T.RND': 1}}, 'vendor': {'Infineon': {'Infineon Technologies': 3, 'Infineon': 8, 'Infineon Technologies AG': 3}}, 'eval_facility': {'Combitech': {'Combitech AB': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 51}}, 'DES': {'DES': {'DES': 44}, '3DES': {'3DES': 2, 'Triple-DES': 1, 'TDES': 1}}, 'constructions': {'MAC': {'CMAC': 6}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 6, 'RSA 1024': 1, 'RSA 4096': 1}, 'ECC': {'ECDH': {'ECDH': 1}, 'ECC': {'ECC': 22}}, 'FF': {'DH': {'DH': 7, 'Diffie-Hellman': 7}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 8}, 'SHA2': {'SHA-256': 7, 'SHA256': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 36}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'PRNG': {'DRBG': 1}, 'RNG': {'RNG': 4, 'RND': 3}}, 'cipher_mode': {'ECB': {'ECB': 5}, 'CBC': {'CBC': 20}}, 'ecc_curve': {'NIST': {'P-256': 6, 'P-521': 2, 'NIST P-256': 2, 'NIST P-521': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 5, 'Physical Probing': 2, 'physical probing': 1}, 'FI': {'Malfunction': 5, 'malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 2, 'FIPS PUB 180-4': 1, 'FIPS PUB 186-2': 1}, 'PKCS': {'PKCS #1': 2}, 'RFC': {'RFC 5639': 1}, 'ISO': {'ISO/IEC 15446': 2, 'ISO/IEC 10116:2006': 1}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1, 'EAL 5': 1}}, 'cc_sar': {'ALC': {'ALC_FLR': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies': 1}}, 'eval_facility': {'Combitech': {'Combitech AB': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to Certification Report - SAM5000.pdf.
    • The st_filename property was set to SecurityTargetLite-KapschSAM5000-B.pdf.
    • The cert_filename property was set to Certifikat SAM 5000 - CCRA.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to CSEC2017020.
    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0827-V6-2017']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0827-V6-2017']}} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20-%20SAM5000.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SecurityTargetLite-KapschSAM5000-B.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was set to None.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The cert property was updated, with the {'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The cert_metadata property was set to None.
    • The cert_keywords property was set to None.
    • The cert_filename property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name SAM 5000 build 4.12, BOS-V1 and RMS firmware with ID 80001141 CL97 Asymmetric Crypto Library for Crypto@2304T RSA/ECC/Toolbox v2.07.003, and Infineon Technologies Smart Card IC Security Controller M9900, design step A22 and G11, of the SLE97 family (smart card), or the SLI97 family (VQFN chip) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certifikat%20SAM%205000%20-%20CCRA.pdf",
  "dgst": "471a372b97a0b9f4",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CSEC2017020",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.07.003",
        "4.12"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0827-V6-2017"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0827-V6-2017"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Kapsch TrafficCom S.r.l.",
  "manufacturer_web": "https://www.kapsch.net/",
  "name": "SAM 5000 build 4.12, BOS-V1 and RMS firmware with ID 80001141 CL97 Asymmetric Crypto Library for Crypto@2304T RSA/ECC/Toolbox v2.07.003, and Infineon Technologies Smart Card IC Security Controller M9900, design step A22 and G11, of the SLE97 family (smart card), or the SLI97 family (VQFN chip)",
  "not_valid_after": "2023-08-28",
  "not_valid_before": "2018-08-28",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "Certifikat SAM 5000 - CCRA.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 5": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Combitech": {
          "Combitech AB": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon Technologies": 1
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20180828085843+02\u002700\u0027",
      "/ModDate": "D:20180828093024+02\u002700\u0027",
      "pdf_file_size_bytes": 278986,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "Certification Report - SAM5000.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 4
          }
        },
        "FF": {
          "DH": {
            "DH": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0827-V7-2017": 1
        },
        "SE": {
          "CSEC2017020": 1
        }
      },
      "cc_claims": {
        "T": {
          "T.RND": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0035": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_COMP.1": 1,
          "ADV_FSP.5": 1,
          "ADV_IMP.1": 1,
          "ADV_INT.2": 1,
          "ADV_TDS.5": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.5": 1,
          "ALC_COMP.1": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.2": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_COMP.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COMP.1": 1,
          "ATE_COV.2": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_COMP.1": 1,
          "AVA_VAN": 1,
          "AVA_VAN.4": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 4": 1,
          "EAL 5": 2
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Combitech": {
          "Combitech AB": 5
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          },
          "SHA2": {
            "SHA-256": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 1,
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 2
        },
        "SCA": {
          "Leak-Inherent": 1,
          "Physical Probing": 1
        },
        "other": {
          "JIL": 2
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-004": 1
        },
        "ISO": {
          "ISO/IEC 17025": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 6
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1
          },
          "DES": {
            "DES": 6
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 1,
          "Infineon Technologies": 4
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "hesve",
      "/CreationDate": "D:20180828085420+02\u002700\u0027",
      "/ModDate": "D:20180828104437+02\u002700\u0027",
      "/Producer": "Microsoft: Print To PDF",
      "/Title": "Microsoft Word - Certification Report - SAM5000",
      "pdf_file_size_bytes": 859066,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 17
    },
    "st_filename": "SecurityTargetLite-KapschSAM5000-B.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 22
          },
          "ECDH": {
            "ECDH": 1
          }
        },
        "FF": {
          "DH": {
            "DH": 7,
            "Diffie-Hellman": 7
          },
          "DSA": {
            "DSA": 1
          }
        },
        "RSA": {
          "RSA 1024": 1,
          "RSA 2048": 6,
          "RSA 4096": 1
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0827-V6-2017": 1
        }
      },
      "cc_claims": {
        "O": {
          "O.RND": 2
        },
        "T": {
          "T.RND": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP- 0035": 1,
          "BSI-PP-0035": 3,
          "BSI-PP-035": 11
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 3,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 2,
          "ADV_IMP.1": 3,
          "ADV_INT": 1,
          "ADV_INT.2": 2,
          "ADV_TDS.3": 1,
          "ADV_TDS.4": 2
        },
        "AGD": {
          "AGD_OPE.1": 3,
          "AGD_PRE.1": 3
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.4": 3,
          "ALC_CMS.4": 1,
          "ALC_CMS.5": 2,
          "ALC_DEL": 1,
          "ALC_DEL.1": 3,
          "ALC_DVS.1": 2,
          "ALC_DVS.2": 2,
          "ALC_LCD": 1,
          "ALC_LCD.1": 3,
          "ALC_TAT.1": 1,
          "ALC_TAT.2": 2
        },
        "ASE": {
          "ASE_CCL.1": 3,
          "ASE_ECD.1": 3,
          "ASE_INT.1": 3,
          "ASE_OBJ.2": 3,
          "ASE_REQ.2": 3,
          "ASE_SPD.1": 3,
          "ASE_TSS.1": 3
        },
        "ATE": {
          "ATE_COV.2": 3,
          "ATE_DPT.2": 1,
          "ATE_DPT.3": 2,
          "ATE_FUN.1": 3,
          "ATE_IND.2": 3
        },
        "AVA": {
          "AVA_VAN.4": 3,
          "AVA_VAN.5": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL5": 6
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS.1": 1
        },
        "FCS": {
          "FCS_CKM": 42,
          "FCS_CKM.1": 19,
          "FCS_CKM.2": 5,
          "FCS_CKM.3": 7,
          "FCS_CKM.4": 42,
          "FCS_COP": 117,
          "FCS_COP.1": 17,
          "FCS_RNG.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 13,
          "FDP_ACF.1": 9,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_ETC.2": 12,
          "FDP_ETC.2.2": 1,
          "FDP_ETC.2.3": 1,
          "FDP_ETC.2.4": 1,
          "FDP_IFC.1": 15,
          "FDP_IFF.1": 8,
          "FDP_IFF.1.2": 1,
          "FDP_IFF.1.3": 1,
          "FDP_IFF.1.4": 1,
          "FDP_IFF.1.5": 1,
          "FDP_ITC.1": 15,
          "FDP_ITC.2": 31,
          "FDP_ITC.2.1": 1,
          "FDP_ITC.2.2": 1,
          "FDP_ITC.2.3": 1,
          "FDP_ITC.2.4": 1,
          "FDP_ITC.2.5": 1,
          "FDP_ITT.1": 1,
          "FDP_SDI.1": 1,
          "FDP_SDI.2": 1
        },
        "FIA": {
          "FIA_AFL": 16,
          "FIA_AFL.1": 4,
          "FIA_SOS.1": 8,
          "FIA_UAU.1": 9,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.5": 8,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6": 7
        },
        "FMT": {
          "FMT_LIM.1": 1,
          "FMT_LIM.2": 1,
          "FMT_MSA.1": 1,
          "FMT_MSA.3": 14,
          "FMT_MSA.3.2": 1,
          "FMT_SMF.1": 8,
          "FMT_SMR.1": 1
        },
        "FPT": {
          "FPT_FLS.1": 1,
          "FPT_ITT.1": 1,
          "FPT_PHP.3": 1,
          "FPT_RPL.1": 8,
          "FPT_RPL.1.2": 1,
          "FPT_TDC.1": 2,
          "FPT_TEE.1": 8,
          "FPT_TEE.1.2": 1,
          "FPT_TST.2": 1
        },
        "FRU": {
          "FRU_FLT.2": 1
        },
        "FTP": {
          "FTP_ITC.1": 1,
          "FTP_TRP.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 20
        },
        "ECB": {
          "ECB": 5
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 36
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "NIST P-256": 2,
          "NIST P-521": 2,
          "P-256": 6,
          "P-521": 2
        }
      },
      "eval_facility": {
        "Combitech": {
          "Combitech AB": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 8
          },
          "SHA2": {
            "SHA-256": 7,
            "SHA256": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 1
        },
        "RNG": {
          "RND": 3,
          "RNG": 4
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 5,
          "malfunction": 2
        },
        "SCA": {
          "Leak-Inherent": 5,
          "Physical Probing": 2,
          "physical probing": 1
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2012-09-001": 1,
          "CCMB-2012-09-002": 1,
          "CCMB-2012-09-003": 1
        },
        "FIPS": {
          "FIPS 140-2": 2,
          "FIPS PUB 180-4": 1,
          "FIPS PUB 186-2": 1
        },
        "ISO": {
          "ISO/IEC 10116:2006": 1,
          "ISO/IEC 15446": 2
        },
        "PKCS": {
          "PKCS #1": 2
        },
        "RFC": {
          "RFC 5639": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 51
          }
        },
        "DES": {
          "3DES": {
            "3DES": 2,
            "TDES": 1,
            "Triple-DES": 1
          },
          "DES": {
            "DES": 44
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 6
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 8,
          "Infineon Technologies": 3,
          "Infineon Technologies AG": 3
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "stgran",
      "/CreationDate": "D:20180321144633+01\u002700\u0027",
      "/ModDate": "D:20180828105702+02\u002700\u0027",
      "/Producer": "Microsoft: Print To PDF",
      "/Title": "Microsoft Word - 902390D.docx",
      "pdf_file_size_bytes": 1184710,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 73
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20-%20SAM5000.pdf",
  "scheme": "SE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SecurityTargetLite-KapschSAM5000-B.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "4e9d9f14b64e48452c5a2ee5eb8fbd98e98d5105e9a7141696846f07ad81cd96",
      "txt_hash": "534eb2bb06d7fc7125e0c49386e29ba765de1c4a6e7150ec0f654cbf2ef4a502"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "db08081085060c85cb23d2c597880562ffd4aa705874b93d435cf9476345454f",
      "txt_hash": "e3542744e01ae7e3be4b57e954bc29ac642262dae7ef92f8265b1f4db2739b89"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "4e776525afd1088624c1b11aea368090679ea61933043c0eb98958d43b1ba311",
      "txt_hash": "9fef3691df64d0fe4620d98a76ce3ae5db27aca945d51ba4727cd3064b05c15e"
    }
  },
  "status": "archived"
}