This page was not yet optimized for use on mobile
devices.
Entrust nShield Solo XC Hardware Security Module v12.60.15
CSV information
| Status | archived |
|---|---|
| Valid from | 17.03.2021 |
| Valid until | 17.03.2026 |
| Scheme | 🇳🇱 NL |
| Manufacturer | Entrust, Inc. |
| Category | Products for Digital Signatures |
| Security level | ALC_FLR.2, EAL4+, AVA_VAN.5 |
| Protection profiles | |
| Maintenance updates | Assurance Continuity Maintenance Report (22.07.2021) Certification report Security target |
Heuristics summary
Certificate ID: NSCIB-CC-0368256-CR
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Security level
EAL2, EAL7, EAL4, EAL4 augmentedClaims
R.LSecurity Assurance Requirements (SAR)
ALC_FLR.3, ALC_FLR.2, AVA_VAN.5Protection profiles
ANSSI-CC-PP-2016/05-M01Certificates
ANSSI-CC-PP-2016/05-M01, CC-21-0368256Evaluation facilities
BrightsightStandards
ISO/IEC 15408-2, ISO/IEC 15408-3, ISO/IEC 18045Certification report
Extracted keywords
Symmetric Algorithms
AESAsymmetric Algorithms
ECDSA, ECCRandomness
TRNG, RNGLibraries
OpenSSLSecurity level
EAL4, EAL4+, EAL 4, EAL4 augmented, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.2, ATE_IND.2, AVA_VAN.5Security Functional Requirements (SFR)
FAU_GEN, FCS_COP, FTP_TRPProtection profiles
ANSSI-CC-PP-2016/05-M01Certificates
ANSSI-CC-PP-2016/05-M01, NSCIB-CC-0368256-CREvaluation facilities
BrightsightSide-channel analysis
physical tampering, JIL, JIL-AAPHD, JIL-AMHDStandards
ISO/IEC 19790:2012File metadata
| Title | Certification Report |
|---|---|
| Author | Denise Cater |
| Creation date | D:20210604161002+01'00' |
| Modification date | D:20210614122611+02'00' |
| Pages | 12 |
| Creator | Microsoft® Word 2010 |
| Producer | Microsoft® Word 2010 |
Frontpage
| Certificate ID | NSCIB-CC-0368256-CR |
|---|---|
| Certified item | nShield Solo XC Hardware Security Module v12.60.15 |
| Certification lab | Brightsight B.V |
| Developer | nCipher Security Limited (an Entrust company |
Security target
Extracted keywords
Symmetric Algorithms
AES, Triple-DES, TDEA, HMAC, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512, CMAC, CBC-MACAsymmetric Algorithms
ECDH, ECDSA, Diffie-Hellman, DH, DSAHash functions
SHA-1, SHA-224, SHA-384, SHA-512Randomness
DRBG, RNGElliptic Curves
P-192, P-224, P-256, P-384, P-521, NIST P-192, K-163, K-233, K-283, K-409, K-571, B-163, B-233, B-283, B-409, B-571, NIST P-224, brainpoolP160r1, brainpoolP192r1, brainpoolP224r1, brainpoolP256r1, brainpoolP320r1, brainpoolP384r1, brainpoolP512r1, brainpoolP192t1, brainpoolP224t1, brainpoolP256t1, brainpoolP320t1, brainpoolP384t1, brainpoolP512t1Block cipher modes
ECB, CBC, CTR, GCM, CCMVendor
Microsoft, Microsoft CorporationSecurity level
EAL4, EAL4 augmentedClaims
R.RAD, OT.RNG, OT.D, OT.ASecurity Assurance Requirements (SAR)
ALC_FLR.2, AVA_VAN.5Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_GEN.2.1, FAU_STG.2, FAU_STG.1, FAU_STG.2.1, FAU_STG.2.2, FAU_STG.2.3, FCS_CKM.1, FCS_COP.1, FCS_CKM.4, FCS_CKM.1.1, FCS_RNG, FCS_CKM.4.1, FCS_COP.1.1, FCS_RNG.1, FCS_CKM.2, FDP_IFC, FDP_IFF.1, FDP_IFC.1, FDP_IFF, FDP_ACC, FDP_ACF.1, FDP_ACC.1, FDP_ACF, FDP_SDI.2, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_RIP.1, FDP_RIP.1.1, FDP_ITC.1, FDP_ITC.2, FIA_UID.1, FIA_UID.1.1, FIA_UAU.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU, FIA_UAU.6, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FMT_MSA.3, FMT_MTD, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MTD.1, FMT_MSA, FMT_MSA.1, FPT_TST_EXT.1, FPT_STM.1, FPT_STM.1.1, FPT_TST_EXT.1.1, FPT_PHP.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3, FPT_PHP.3.1, FPT_FLS.1, FPT_FLS.1.1, FTP_TRP, FTP_TRP.1Protection profiles
ANSSI-CC-PP-, ANSSI-CC-PP-2016/05-Side-channel analysis
side-channels, physical tampering, MalfunctionCertification process
out of scope, Impath, out of scope) with a remote Hardserver (typically on an application server or PC, for the TOE. The Hardserver instance in the Connect XC establishes a secure channel (Impath, out of scope) with a remote Hardserver (typically on an application server or PC), which also includes libraries, support higher level APIs, for example, but not limited to NFKM, PKCS#11, MSCAPI, etc. These are out of scope of the TOE. Figure 3 Configuration 1: TOE in Connect XC 8 of 55 nShield Solo XC HSM Security, support higher level APIs, for example, but not limited to, NFKM, PKCS#11, MSCAPI, etc. These are out of scope of the TOE. Figure 4 Configuration 2: TOE in host server 1.3.3 Usage and major security features ofStandards
FIPS 186-4, FIPS 140-2, FIPS 197, FIPS 180-4, FIPS 198-1, SP 800-90A, NIST SP 800-90A, SP 800-56A, NIST SP 800-22, SP 800-38A, SP 800-38B, SP 800-38C, SP 800-38D, SP 800-67, SP 800-38F, SP 800-108, PKCS#11, PKCS#1, PKCS #1, AIS 31, AIS 20, AIS31, RFC 8017, ISO/IEC 19790:2012, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
| Title | nShield Word Template |
|---|---|
| Author | Robert, Natalya |
| Creation date | D:20210309162209+01'00' |
| Modification date | D:20210309162209+01'00' |
| Pages | 55 |
| Creator | Microsoft® Word 2016 |
| Producer | Microsoft® Word 2016 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
NSCIB-CC-0368256-CRExtracted SARs
ALC_FLR.2, ATE_IND.2, AVA_VAN.5Similar certificates
| Name | Certificate ID | |
|---|---|---|
| nShield Solo XC Hardware Security Module v12.60.15 | CSA_CC_21008 | Compare |
| nShield Solo XC Hardware Security Module Version 12.60.15 | CSA_CC_21008 | Compare |
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Products for Digital Signatures",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-certificate%2021-0368256.pdf",
"dgst": "5267a9b98b878ef1",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "NSCIB-CC-0368256-CR",
"cert_lab": [
""
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"12.60.15"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"ee319f4a624019b0"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2021-07-22",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0368256_1m1-MA-1.0.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0368256_1m1-ST.pdf",
"maintenance_title": "Assurance Continuity Maintenance Report"
}
]
},
"manufacturer": "Entrust, Inc.",
"manufacturer_web": "https://www.entrust.com",
"name": "Entrust nShield Solo XC Hardware Security Module v12.60.15",
"not_valid_after": "2026-03-17",
"not_valid_before": "2021-03-17",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "NSCIB-certificate 21-0368256.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-PP-2016/05-M01": 1
},
"NL": {
"CC-21-0368256": 1
}
},
"cc_claims": {
"R": {
"R.L": 1
}
},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2016/05-M01": 1
}
},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 1,
"ALC_FLR.3": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL4": 1,
"EAL4 augmented": 1,
"EAL7": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408-2": 1,
"ISO/IEC 15408-3": 1,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "NSCIB-CC-0368256-CR-1.0.pdf",
"report_frontpage": {
"NL": {
"cert_id": "NSCIB-CC-0368256-CR",
"cert_item": "nShield Solo XC Hardware Security Module v12.60.15",
"cert_lab": " Brightsight B.V",
"developer": "nCipher Security Limited (an Entrust company"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDSA": {
"ECDSA": 1
}
}
},
"cc_cert_id": {
"FR": {
"ANSSI-CC-PP-2016/05-M01": 1
},
"NL": {
"NSCIB-CC-0368256-CR": 12
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2016/05-M01": 1
}
},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 2
},
"ATE": {
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL4": 2,
"EAL4 augmented": 1,
"EAL4+": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1
},
"FCS": {
"FCS_COP": 1
},
"FTP": {
"FTP_TRP": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 1
}
},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"physical tampering": 1
},
"other": {
"JIL": 1,
"JIL-AAPHD": 1,
"JIL-AMHD": 1
}
},
"standard_id": {
"ISO": {
"ISO/IEC 19790:2012": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Denise Cater",
"/CreationDate": "D:20210604161002+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20210614122611+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"/Title": "Certification Report",
"pdf_file_size_bytes": 506174,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.tuv.com/nl",
"mailto:[email protected]",
"http://www.commoncriteriaportal.org/",
"http://www.sogisportal.eu/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 12
},
"st_filename": "NSCIB-CC-0368256-ST-1.1.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 1
},
"ECDSA": {
"ECDSA": 2
}
},
"FF": {
"DH": {
"DH": 1,
"Diffie-Hellman": 3
},
"DSA": {
"DSA": 2
}
}
},
"cc_cert_id": {},
"cc_claims": {
"OT": {
"OT.A": 1,
"OT.D": 2,
"OT.RNG": 3
},
"R": {
"R.RAD": 1
}
},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-": 1,
"ANSSI-CC-PP-2016/05-": 1
}
},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 58
},
"AVA": {
"AVA_VAN.5": 60
}
},
"cc_security_level": {
"EAL": {
"EAL4": 59,
"EAL4 augmented": 3
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 10,
"FAU_GEN.1.1": 2,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 5,
"FAU_GEN.2.1": 1,
"FAU_STG.1": 1,
"FAU_STG.2": 5,
"FAU_STG.2.1": 1,
"FAU_STG.2.2": 1,
"FAU_STG.2.3": 1
},
"FCS": {
"FCS_CKM.1": 11,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 1,
"FCS_CKM.4": 11,
"FCS_CKM.4.1": 1,
"FCS_COP.1": 10,
"FCS_COP.1.1": 1,
"FCS_RNG": 12,
"FCS_RNG.1": 5
},
"FDP": {
"FDP_ACC": 15,
"FDP_ACC.1": 10,
"FDP_ACF": 14,
"FDP_ACF.1": 12,
"FDP_IFC": 10,
"FDP_IFC.1": 7,
"FDP_IFF": 9,
"FDP_IFF.1": 10,
"FDP_ITC.1": 2,
"FDP_ITC.2": 2,
"FDP_RIP.1": 6,
"FDP_RIP.1.1": 1,
"FDP_SDI.1": 1,
"FDP_SDI.2": 6,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1
},
"FIA": {
"FIA_AFL.1": 6,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_UAU": 13,
"FIA_UAU.1": 9,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.6": 2,
"FIA_UID.1": 14,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MSA": 22,
"FMT_MSA.1": 5,
"FMT_MSA.3": 9,
"FMT_MTD": 12,
"FMT_MTD.1": 2,
"FMT_SMF.1": 11,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 18,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS.1": 6,
"FPT_FLS.1.1": 1,
"FPT_PHP.1": 4,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_PHP.3": 4,
"FPT_PHP.3.1": 1,
"FPT_STM.1": 7,
"FPT_STM.1.1": 1,
"FPT_TST_EXT.1": 9,
"FPT_TST_EXT.1.1": 1
},
"FTP": {
"FTP_TRP": 15,
"FTP_TRP.1": 3
}
},
"certification_process": {
"OutOfScope": {
"Impath, out of scope) with a remote Hardserver (typically on an application server or PC": 1,
"for the TOE. The Hardserver instance in the Connect XC establishes a secure channel (Impath, out of scope) with a remote Hardserver (typically on an application server or PC), which also includes libraries": 1,
"out of scope": 3,
"support higher level APIs, for example, but not limited to NFKM, PKCS#11, MSCAPI, etc. These are out of scope of the TOE. Figure 3 Configuration 1: TOE in Connect XC 8 of 55 nShield Solo XC HSM Security": 1,
"support higher level APIs, for example, but not limited to, NFKM, PKCS#11, MSCAPI, etc. These are out of scope of the TOE. Figure 4 Configuration 2: TOE in host server 1.3.3 Usage and major security features of": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"CCM": {
"CCM": 1
},
"CTR": {
"CTR": 1
},
"ECB": {
"ECB": 2
},
"GCM": {
"GCM": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {
"Brainpool": {
"brainpoolP160r1": 1,
"brainpoolP192r1": 1,
"brainpoolP192t1": 1,
"brainpoolP224r1": 3,
"brainpoolP224t1": 1,
"brainpoolP256r1": 3,
"brainpoolP256t1": 3,
"brainpoolP320r1": 3,
"brainpoolP320t1": 3,
"brainpoolP384r1": 3,
"brainpoolP384t1": 3,
"brainpoolP512r1": 3,
"brainpoolP512t1": 3
},
"NIST": {
"B-163": 1,
"B-233": 3,
"B-283": 3,
"B-409": 3,
"B-571": 3,
"K-163": 1,
"K-233": 3,
"K-283": 3,
"K-409": 3,
"K-571": 3,
"NIST P-192": 1,
"NIST P-224": 2,
"P-192": 1,
"P-224": 4,
"P-256": 6,
"P-384": 6,
"P-521": 6
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 2
},
"SHA2": {
"SHA-224": 1,
"SHA-384": 1,
"SHA-512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 3
},
"RNG": {
"RNG": 31
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 2,
"physical tampering": 2
},
"SCA": {
"side-channels": 1
}
},
"standard_id": {
"BSI": {
"AIS 20": 1,
"AIS 31": 9,
"AIS31": 2
},
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
},
"FIPS": {
"FIPS 140-2": 6,
"FIPS 180-4": 1,
"FIPS 186-4": 2,
"FIPS 197": 2,
"FIPS 198-1": 1
},
"ISO": {
"ISO/IEC 19790:2012": 1
},
"NIST": {
"NIST SP 800-22": 1,
"NIST SP 800-90A": 3,
"SP 800-108": 1,
"SP 800-38A": 1,
"SP 800-38B": 1,
"SP 800-38C": 1,
"SP 800-38D": 1,
"SP 800-38F": 1,
"SP 800-56A": 2,
"SP 800-67": 1,
"SP 800-90A": 3
},
"PKCS": {
"PKCS #1": 1,
"PKCS#1": 2,
"PKCS#11": 2
},
"RFC": {
"RFC 8017": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 8
}
},
"DES": {
"3DES": {
"TDEA": 1,
"Triple-DES": 4
}
},
"constructions": {
"MAC": {
"CBC-MAC": 2,
"CMAC": 3,
"HMAC": 2,
"HMAC-SHA-224": 1,
"HMAC-SHA-256": 1,
"HMAC-SHA-384": 1,
"HMAC-SHA-512": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 1,
"Microsoft Corporation": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Robert, Natalya",
"/CreationDate": "D:20210309162209+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/ModDate": "D:20210309162209+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"/Title": "nShield Word Template",
"pdf_file_size_bytes": 1463778,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.entrust.com/",
"mailto:[email protected]",
"https://nshieldsupport.entrust.com/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 55
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-PP-2016_05 PP.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0368256-CR-1.0.pdf",
"scheme": "NL",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.2",
"EAL4+",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0368256-ST-1.1.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "52438c5795337a55cc5b471c2f654cdec5fdab6095250da5910fe38ead46524f",
"txt_hash": "89d4acaad3bece11dd2aade40def05d7a2767e79a1834b21ee3e4dba616a0f8a"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "30b448fefb2c731b5a164f67396d5afe599ec1824f72f55c98e981dd8d236ab6",
"txt_hash": "e57c11fe9fc4fa6a1f6cf3418a62202f81243fea956aaf3adb0882baa1b97c87"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "1625edea8f3774d9a73246e3f470e43d65a24cd3131a89586c93ca76629e5aab",
"txt_hash": "7efdc5fed5d64568b21216151f21de070883dc81d47ec4ab6b6300698cae1f48"
}
},
"status": "archived"
}