This page was not yet optimized for use on mobile devices.
Entrust Signature Activation Module, version 1.1.1
CSV information
| Status | active |
|---|---|
| Valid from | 31.07.2025 |
| Valid until | 31.07.2030 |
| Scheme | 🇪🇸 ES |
| Manufacturer | Entrust EU, SL |
| Category | Other Devices and Systems |
| Security level | ALC_FLR.2, EAL4+, AVA_VAN.5 |
| Protection profiles |
Heuristics summary
Certificate ID: 2024-1-INF-4589
Certificate
Extracted keywords
Security level
EAL 4, EAL 2, EAL4+Claims
O.E, A.USecurity Assurance Requirements (SAR)
ALC_FLR, ALC_FLR.2, AVA_VAN.5File metadata
| Creation date | D:20250714095541+02'00' |
|---|---|
| Modification date | D:20250714095541+02'00' |
| Pages | 2 |
| Producer | GPL Ghostscript 9.27 |
Certification report
Extracted keywords
Asymmetric Algorithms
DSAHash functions
SHA-256Security level
EAL4, EAL 1, EAL 4, EAL 2, EAL2, ITSEC EvaluationClaims
A.USecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_IMP.1, AGD_OPE.1, ALC_FLR.2, ALC_CMC.4, ALC_DEL.1, ALC_LCD.1, ALC_FLR, ATE_COV.2, ATE_FUN.1, AVA_VAN.5, ASE_CCL.1, ASE_INT.1, ASE_REQ.2Security Functional Requirements (SFR)
FAU_GEN.1, FCS_CKM, FCS_CKM.3, FCS_COP, FCS_COP.1, FCS_RNG.1, FDP_ACC, FDP_ACF, FDP_ETC, FDP_IFC, FDP_IFF, FDP_ITC, FDP_UCT.1, FIA_UID.2, FIA_UAU, FIA_ATD.1, FMT_SMF.1, FMT_MSA, FMT_MSA.2, FMT_MTD.1, FPT_PHP.1, FPT_RPL.1, FPT_TDC.1, FPT_PHP.3, FTP_TRP, FTP_ITCCertificates
2024-1-INF-4589- v1Evaluation facilities
DEKRA Testing and CertificationSide-channel analysis
JILFile metadata
| Author | 9308 |
|---|---|
| Creation date | D:20250805103528+02'00' |
| Modification date | D:20250805103528+02'00' |
| Pages | 15 |
| Creator | Microsoft® Word LTSC |
| Producer | Microsoft® Word LTSC |
Security target
Extracted keywords
Symmetric Algorithms
AES, HMACAsymmetric Algorithms
RSA-PSS, ECC, DSAHash functions
SHA-256, SHA256, SHA384, SHA512Protocols
TLSRandomness
RNGBlock cipher modes
CBCSecurity level
EAL4, EAL4 augmentedClaims
T.ENROLMENT_SIGNER_IMPERSONATION, T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCLOSED, T.SVD_FORGERY, T.ADMIN_IMPERSONATION, T.MAINTENANCE_AUTHENTICATION_DISCLOSE, T.AUTHENTICATION_SIGNER_IMPERSONATION, T.SIGNER_AUTHENTICATION_DATA_MODIFIED, T.SAP_BYPASS, T.SAP_REPLAY, T.SAD_FORGERY, T.SIGNATURE_REQUEST_DISCLOSURE, T.DTBSR_FORGERY, T.SIGNATURE_FORGERY, T.PRIVILEGED_USER_INSERTION, T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DATA_MODIFICATION, T.AUTHORISATION_DATA_UPDATE, T.CONTEXT_ALTERATION, T.AUDIT_ALTERATION, T.RANDOM, T.SIGNATURE_REQUEST_DISCLOSE, T.SIGNER_AUTEHNTICATION_DATA_MODIFIED, T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DATA_MODIFIC, T.AUTHORISATION_DATA_DISCLOSE, T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCLOS, A.PRIVILEGED_USER, A.SIGNER_ENROLMENT, A.SIGNER_AUTHENTICATION_DATA_PROTECTION, A.SIGNER_DEVICE, A.CA, A.ACCESS_PROTECTED, A.AUTH_DATA, A.TSP_AUDITED, A.SEC_REQ, A.SIGNATURE_REQUEST_DISCLOSURE, R.SVD, R.SAD, R.TSF_DATA, R.AUDIT, R.RANDOM, OT.SIGNER_PROTECTION, OT.REFERENCE_SIGNER_AUTHENTICATION_DATA, OT.SIGNER_KEY_PAIR_GENERATION, OT.SVD, OT.PRIVILEGED_USER_MANAGEMENT, OT.PRIVILEGED_USER_AUTHENTICATION, OT.PRIVILEGED_USER_PROTECTION, OT.SIGNER_MANAGEMENT, OT.SAD_VERIFICATION, OT.SAP, OT.SIGNATURE_AUTHENTICATION_DATA_PROTECTION, OT.DTBSR_INTEGRITY, OT.SIGNATURE_INTEGRITY, OT.CRYPTO, OT.RANDOM, OT.SYSTEM_PROTECTION, OT.AUDIT_PROTECTION, OT.SIGNER_KEY_PAIR_GENERATI, OT.PRIVILEGED_USER_MANAGE, OT.PRIVILEGED_USER_AUTHEN, OT.PRIVILEGED_USER_PROTECT, OT.SIGNATURE_AUTHENTICATI, OE.SVD_AUTHENTICITY, OE.CA_REQUEST_CERTIFICATE, OE.CERTIFICATE_VERFICATION, OE.SIGNER_AUTHENTICATION_DATA, OE.DELEGATED_AUTHENTICATION, OE.DEVICE, OE.ENV, OE.CRYPTOMODULE_CERTIFIED, OE.SIGNER_AUTHENTICATION_, OSP.RANDOM, OSP.CRYPTO, OSP.TSP_AUDITEDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FCS_CKM.1, FCS_CKM.6, FCS_COP.1, FCS_CKM.1.1, FCS_RNG.1, FCS_CKM.3, FCS_CKM.3.1, FCS_CKM.6.1, FCS_CKM.6.2, FCS_COP.1.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.2, FCS_CKM.5, FCS_RBG.1, FDP_ITC, FDP_ETC, FDP_UIT.1, FDP_UCT.1, FDP_ACC, FDP_ACF, FDP_IFF, FDP_IFC, FDP_ACC.1, FDP_ACF.1, FDP_ETC.2, FDP_IFC.1, FDP_IFF.1, FDP_ITC.2, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ITC.1, FIA_ATD.1, FIA_USB.1, FIA_UID.2, FIA_UAU.1, FIA_UAU, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5, FIA_UID.2.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UID.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMF.1, FMT_SMF.2, FMT_MSA, FMT_MSA.2.1, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.2, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_SMR.1, FPT_PHP.1, FPT_PHP.3, FPT_TDC.1, FPT_ITC.2, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_RPL.1, FPT_RPL.1.1, FPT_RPL.1.2, FPT_STM.1, FPT_STM.1.1, FPT_TDC.1.1, FPT_TDC.1.2, FTP_TRP, FTP_TRP.1, FTP_ITC, FTP_ITC.1, FTP_TDC.1Side-channel analysis
side-channels, physical tamperingStandards
FIPS 186-5, FIPS 197, FIPS 180-4, FIPS 198-1, PKCS#1, AIS 31, AIS31, RFC 3447, ISO/IEC 19790, ISO/IEC 15408, ISO/IEC 19790:2012, X.509File metadata
| Title | Security Target |
|---|---|
| Subject | Entrust Signature Activation Module |
| Author | Entrust Datacard Europe |
| Creation date | D:20250505185828+02'00' |
| Modification date | D:20250505190035+02'00' |
| Pages | 91 |
| Creator | Acrobat PDFMaker 25 for Word |
| Producer | Adobe PDF Library 25.1.250 |
Heuristics
Certificate ID: 2024-1-INF-4589
Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.2, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Scheme data ?
| Product | Entrust Signature Activation Module, version 1.1.1 | |
|---|---|---|
| Product Link | https://oc.ccn.cni.es/en/certified-products/certified-products/1059-entrust-signature-activation-module-version-1-1-1 | |
| Category | QSCD/SSCD | |
| Manufacturer | ENTRUST EU, S.L. | |
| Certification Date | 31.07.2025 | |
| Enhanced | ||
| Description | Entrust Signature Activation Module is a software component that interacts with the Cryptographic Module (CM) to implement a Signature Activation Module (SAM) according to the European Standard [CEN EN 419 241-2]. The main objective of the Entrust Signature Activation Module component is to ensure the signer the sole control of their signing keys, which is carried out authorizing the signature operation. The SAM activates the signing key within a CM, handling a Signature Activation Protocol (SAP) which requires that Signature Activation Data (SAD) be provided at the local environment. The SAD binds together the signer authentication with the signing key and the data to be signed. The SAM component uses the SAD in order to guarantee with a high level of confidence (SCAL 2) that the signing keys are used under sole control of the signer. SCAL 2 also requires the signing keys and the software of the SAM are protected by a tamper protected environment. Entrust Signature ActivationModule component uses a dedicated tamper protected environment according to the requirements of [CEN EN 419 241-2] standard. Entrust Signature Activation Module has been designed and conforms tothe European Standard [CEN EN 419 241-2] which is aimed to meet (together with the CM) the requirements of a QSCD as specified in Regulation (EU) No 910/2014 [eIDAS]. The major security features of the TOE are the following: Identification and authentication of TOE users. Secure creation of TOE users. Signer Key Pair generation and deletion. Supply DTBS/R. Signing/Sealing. Secure Audit. Secure communication between the TOE and the SSA. | |
| Category | QSCD/SSCD | |
| Manufacturer | ENTRUST EU, S.L. | |
| Type | Product | |
| Evaluation Facility | DEKRA Testing and Certification S.A.U. | |
| Status | Certified | |
| Certification Date | 31.07.2025 | |
| Cc Version | CC/CEM:2022 Release 1 | |
| Level | EAL4 + ALC_FLR.2 + AVA_VAN.5 | |
| Target Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2281 | |
| Cert Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2282 | |
| Report Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2283 | |
References
No references are available for this certificate.
Updates
-
20.10.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Entrust Signature Activation Module, version 1.1.1', 'product_link': 'https://oc.ccn.cni.es/en/certified-products/certified-products/1059-entrust-signature-activation-module-version-1-1-1', 'category': 'QSCD/SSCD', 'manufacturer': 'ENTRUST EU, S.L.', 'certification_date': '2025-07-31', 'enhanced': {'description': 'Entrust Signature Activation Module is a software component that interacts with the Cryptographic Module (CM) to implement a Signature Activation Module (SAM) according to the European Standard [CEN EN 419 241-2]. The main objective of the Entrust Signature Activation Module component is to ensure the signer the sole control of their signing keys, which is carried out authorizing the signature operation. The SAM activates the signing key within a CM, handling a Signature Activation Protocol (SAP) which requires that Signature Activation Data (SAD) be provided at the local environment. The SAD binds together the signer authentication with the signing key and the data to be signed. The SAM component uses the SAD in order to guarantee with a high level of confidence (SCAL 2) that the signing keys are used under sole control of the signer. SCAL 2 also requires the signing keys and the software of the SAM are protected by a tamper protected environment. Entrust Signature ActivationModule component uses a dedicated tamper protected environment according to the requirements of [CEN EN 419 241-2] standard. Entrust Signature Activation Module has been designed and conforms tothe European Standard [CEN EN 419 241-2] which is aimed to meet (together with the CM) the requirements of a QSCD as specified in Regulation (EU) No 910/2014 [eIDAS]. The major security features of the TOE are the following: Identification and authentication of TOE users. Secure creation of TOE users. Signer Key Pair generation and deletion. Supply DTBS/R. Signing/Sealing. Secure Audit. Secure communication between the TOE and the SSA.', 'category': 'QSCD/SSCD', 'manufacturer': 'ENTRUST EU, S.L.', 'type': 'Product', 'evaluation_facility': 'DEKRA Testing and Certification S.A.U.', 'status': 'Certified', 'certification_date': '2025-07-31', 'cc_version': 'CC/CEM:2022 Release 1', 'level': 'EAL4 + ALC_FLR.2 + AVA_VAN.5', 'target_link': 'https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2281', 'cert_link': 'https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2282', 'report_link': 'https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2283'}}.
- The scheme_data property was set to
-
29.09.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None.
- The scheme_data property was set to
-
08.09.2025 The certificate data changed.
Certificate changed
The protection_profile_links was updated.
- The new value is
{'_type': 'Set', 'elements': ['https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-cc-pp-2018_02fr_pp.pdf']}.
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'enhanced': {'__update__': {'level': 'EAL4 + ALC_FLR.2 + AVA_VAN.5'}}}data. - The protection_profiles property was set to
{'_type': 'Set', 'elements': ['eabbd431e1f174cd']}.
- The new value is
-
11.08.2025 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Entrust Signature Activation Module, version 1.1.1 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2024-01_Certificado.pdf",
"dgst": "5fd518f95aefcf60",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "2024-1-INF-4589",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.1.1"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"eabbd431e1f174cd"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "QSCD/SSCD",
"certification_date": "2025-07-31",
"enhanced": {
"category": "QSCD/SSCD",
"cc_version": "CC/CEM:2022 Release 1",
"cert_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=2282",
"certification_date": "2025-07-31",
"description": "Entrust Signature Activation Module is a software component that interacts with the Cryptographic Module (CM) to implement a Signature Activation Module (SAM) according to the European Standard [CEN EN 419 241-2]. The main objective of the Entrust Signature Activation Module component is to ensure the signer the sole control of their signing keys, which is carried out authorizing the signature operation. The SAM activates the signing key within a CM, handling a Signature Activation Protocol (SAP) which requires that Signature Activation Data (SAD) be provided at the local environment. The SAD binds together the signer authentication with the signing key and the data to be signed. The SAM component uses the SAD in order to guarantee with a high level of confidence (SCAL 2) that the signing keys are used under sole control of the signer. SCAL 2 also requires the signing keys and the software of the SAM are protected by a tamper protected environment. Entrust Signature ActivationModule component uses a dedicated tamper protected environment according to the requirements of [CEN EN 419 241-2] standard. Entrust Signature Activation Module has been designed and conforms tothe European Standard [CEN EN 419 241-2] which is aimed to meet (together with the CM) the requirements of a QSCD as specified in Regulation (EU) No 910/2014 [eIDAS]. The major security features of the TOE are the following: Identification and authentication of TOE users. Secure creation of TOE users. Signer Key Pair generation and deletion. Supply DTBS/R. Signing/Sealing. Secure Audit. Secure communication between the TOE and the SSA.",
"evaluation_facility": "DEKRA Testing and Certification S.A.U.",
"level": "EAL4 + ALC_FLR.2 + AVA_VAN.5",
"manufacturer": "ENTRUST EU, S.L.",
"report_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=2283",
"status": "Certified",
"target_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=2281",
"type": "Product"
},
"manufacturer": "ENTRUST EU, S.L.",
"product": "Entrust Signature Activation Module, version 1.1.1",
"product_link": "https://oc.ccn.cni.es/en/certified-products/certified-products/1059-entrust-signature-activation-module-version-1-1-1"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Entrust EU, SL",
"manufacturer_web": "https://www.entrust.com/",
"name": "Entrust Signature Activation Module, version 1.1.1",
"not_valid_after": "2030-07-31",
"not_valid_before": "2025-07-31",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "2024-01_Certificado.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.U": 1
},
"O": {
"O.E": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 2,
"ALC_FLR.2": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 1,
"EAL4+": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20250714095541+02\u002700\u0027",
"/ModDate": "D:20250714095541+02\u002700\u0027",
"/Producer": "GPL Ghostscript 9.27",
"pdf_file_size_bytes": 865212,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"report_filename": "2024-01_INF-4589.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {
"FF": {
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {
"ES": {
"2024-1-INF-4589- v1": 1
}
},
"cc_claims": {
"A": {
"A.U": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_IMP.1": 1
},
"AGD": {
"AGD_OPE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_DEL.1": 1,
"ALC_FLR": 3,
"ALC_FLR.2": 9,
"ALC_LCD.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_INT.1": 1,
"ASE_REQ.2": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_FUN.1": 1
},
"AVA": {
"AVA_VAN.5": 9
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 1,
"EAL 4": 2,
"EAL2": 1,
"EAL4": 8
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 1
},
"FCS": {
"FCS_CKM": 3,
"FCS_CKM.3": 1,
"FCS_COP": 2,
"FCS_COP.1": 1,
"FCS_RNG.1": 1
},
"FDP": {
"FDP_ACC": 8,
"FDP_ACF": 8,
"FDP_ETC": 2,
"FDP_IFC": 2,
"FDP_IFF": 2,
"FDP_ITC": 2,
"FDP_UCT.1": 1
},
"FIA": {
"FIA_ATD.1": 1,
"FIA_UAU": 2,
"FIA_UID.2": 1
},
"FMT": {
"FMT_MSA": 3,
"FMT_MSA.2": 1,
"FMT_MTD.1": 1,
"FMT_SMF.1": 1
},
"FPT": {
"FPT_PHP.1": 2,
"FPT_PHP.3": 1,
"FPT_RPL.1": 1,
"FPT_TDC.1": 1
},
"FTP": {
"FTP_ITC": 1,
"FTP_TRP": 2
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"DEKRA": {
"DEKRA Testing and Certification": 3
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"other": {
"JIL": 1
}
},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "9308",
"/CreationDate": "D:20250805103528+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word LTSC",
"/ModDate": "D:20250805103528+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word LTSC",
"pdf_file_size_bytes": 398577,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 15
},
"st_filename": "2024-01_ST.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
},
"FF": {
"DSA": {
"DSA": 4
}
},
"RSA": {
"RSA-PSS": 2
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ACCESS_PROTECTED": 3,
"A.AUTH_DATA": 3,
"A.CA": 3,
"A.PRIVILEGED_USER": 3,
"A.SEC_REQ": 3,
"A.SIGNATURE_REQUEST_DISCLOSURE": 1,
"A.SIGNER_AUTHENTICATION_DATA_PROTECTION": 3,
"A.SIGNER_DEVICE": 3,
"A.SIGNER_ENROLMENT": 3,
"A.TSP_AUDITED": 3
},
"OE": {
"OE.CA_REQUEST_CERTIFICATE": 3,
"OE.CERTIFICATE_VERFICATION": 1,
"OE.CRYPTOMODULE_CERTIFIED": 7,
"OE.DELEGATED_AUTHENTICATION": 1,
"OE.DEVICE": 10,
"OE.ENV": 7,
"OE.SIGNER_AUTHENTICATION_": 2,
"OE.SIGNER_AUTHENTICATION_DATA": 4,
"OE.SVD_AUTHENTICITY": 4
},
"OSP": {
"OSP.CRYPTO": 3,
"OSP.RANDOM": 4,
"OSP.TSP_AUDITED": 1
},
"OT": {
"OT.AUDIT_PROTECTION": 5,
"OT.CRYPTO": 8,
"OT.DTBSR_INTEGRITY": 5,
"OT.PRIVILEGED_USER_AUTHEN": 1,
"OT.PRIVILEGED_USER_AUTHENTICATION": 5,
"OT.PRIVILEGED_USER_MANAGE": 1,
"OT.PRIVILEGED_USER_MANAGEMENT": 6,
"OT.PRIVILEGED_USER_PROTECT": 1,
"OT.PRIVILEGED_USER_PROTECTION": 3,
"OT.RANDOM": 5,
"OT.REFERENCE_SIGNER_AUTHENTICATION_DATA": 6,
"OT.SAD_VERIFICATION": 4,
"OT.SAP": 8,
"OT.SIGNATURE_AUTHENTICATI": 1,
"OT.SIGNATURE_AUTHENTICATION_DATA_PROTECTION": 4,
"OT.SIGNATURE_INTEGRITY": 3,
"OT.SIGNER_KEY_PAIR_GENERATI": 2,
"OT.SIGNER_KEY_PAIR_GENERATION": 4,
"OT.SIGNER_MANAGEMENT": 5,
"OT.SIGNER_PROTECTION": 7,
"OT.SVD": 5,
"OT.SYSTEM_PROTECTION": 6
},
"R": {
"R.AUDIT": 2,
"R.RANDOM": 2,
"R.SAD": 37,
"R.SVD": 35,
"R.TSF_DATA": 13
},
"T": {
"T.ADMIN_IMPERSONATION": 9,
"T.AUDIT_ALTERATION": 6,
"T.AUTHENTICATION_SIGNER_IMPERSONATION": 11,
"T.AUTHORISATION_DATA_DISCLOSE": 2,
"T.AUTHORISATION_DATA_UPDATE": 9,
"T.CONTEXT_ALTERATION": 11,
"T.DTBSR_FORGERY": 5,
"T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCLOS": 1,
"T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCLOSED": 4,
"T.ENROLMENT_SIGNER_IMPERSONATION": 10,
"T.MAINTENANCE_AUTHENTICATION_DISCLOSE": 6,
"T.PRIVILEGED_USER_INSERTION": 9,
"T.RANDOM": 7,
"T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DATA_MODIFIC": 1,
"T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DATA_MODIFICATION": 2,
"T.SAD_FORGERY": 7,
"T.SAP_BYPASS": 7,
"T.SAP_REPLAY": 5,
"T.SIGNATURE_FORGERY": 8,
"T.SIGNATURE_REQUEST_DISCLOSE": 1,
"T.SIGNATURE_REQUEST_DISCLOSURE": 3,
"T.SIGNER_AUTEHNTICATION_DATA_MODIFIED": 1,
"T.SIGNER_AUTHENTICATION_DATA_MODIFIED": 3,
"T.SVD_FORGERY": 7
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR.2": 3,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL4": 5,
"EAL4 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 8,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 6,
"FAU_GEN.2.1": 1
},
"FCS": {
"FCS_CKM.1": 16,
"FCS_CKM.1.1": 3,
"FCS_CKM.2": 1,
"FCS_CKM.3": 11,
"FCS_CKM.3.1": 1,
"FCS_CKM.5": 3,
"FCS_CKM.6": 8,
"FCS_CKM.6.1": 2,
"FCS_CKM.6.2": 1,
"FCS_COP.1": 13,
"FCS_COP.1.1": 4,
"FCS_RBG.1": 1,
"FCS_RNG.1": 10,
"FCS_RNG.1.1": 1,
"FCS_RNG.1.2": 1
},
"FDP": {
"FDP_ACC": 90,
"FDP_ACC.1": 27,
"FDP_ACF": 59,
"FDP_ACF.1": 40,
"FDP_ETC": 15,
"FDP_ETC.2": 7,
"FDP_IFC": 28,
"FDP_IFC.1": 13,
"FDP_IFF": 14,
"FDP_IFF.1": 12,
"FDP_ITC": 15,
"FDP_ITC.1": 3,
"FDP_ITC.2": 14,
"FDP_UCT.1": 7,
"FDP_UCT.1.1": 1,
"FDP_UIT.1": 7,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_ATD.1": 11,
"FIA_ATD.1.1": 1,
"FIA_UAU": 15,
"FIA_UAU.1": 8,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.5": 5,
"FIA_UID.1": 2,
"FIA_UID.2": 13,
"FIA_UID.2.1": 1,
"FIA_USB.1": 16,
"FIA_USB.1.1": 2,
"FIA_USB.1.2": 3,
"FIA_USB.1.3": 2
},
"FMT": {
"FMT_MSA": 40,
"FMT_MSA.1": 7,
"FMT_MSA.2": 10,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 17,
"FMT_MTD.1": 5,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 6,
"FMT_SMF.1.1": 1,
"FMT_SMF.2": 1,
"FMT_SMR.1": 3,
"FMT_SMR.2": 12,
"FMT_SMR.2.1": 1,
"FMT_SMR.2.2": 1,
"FMT_SMR.2.3": 1
},
"FPT": {
"FPT_ITC.2": 1,
"FPT_PHP.1": 10,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_PHP.3": 7,
"FPT_PHP.3.1": 1,
"FPT_RPL.1": 6,
"FPT_RPL.1.1": 1,
"FPT_RPL.1.2": 1,
"FPT_STM.1": 6,
"FPT_STM.1.1": 1,
"FPT_TDC.1": 12,
"FPT_TDC.1.1": 2,
"FPT_TDC.1.2": 1
},
"FTP": {
"FTP_ITC": 7,
"FTP_ITC.1": 8,
"FTP_TDC.1": 2,
"FTP_TRP": 26,
"FTP_TRP.1": 11
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 25
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 1,
"SHA256": 1,
"SHA384": 1,
"SHA512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 6
}
},
"side_channel_analysis": {
"FI": {
"physical tampering": 4
},
"SCA": {
"side-channels": 1
}
},
"standard_id": {
"BSI": {
"AIS 31": 2,
"AIS31": 3
},
"FIPS": {
"FIPS 180-4": 1,
"FIPS 186-5": 4,
"FIPS 197": 1,
"FIPS 198-1": 1
},
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 19790": 8,
"ISO/IEC 19790:2012": 1
},
"PKCS": {
"PKCS#1": 5
},
"RFC": {
"RFC 3447": 3
},
"X509": {
"X.509": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 4
}
},
"constructions": {
"MAC": {
"HMAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Entrust Datacard Europe",
"/Company": "Entrust Datacard",
"/ContentTypeId": "0x0101007CCD96C794530F4DB6CBCB835BCC20A7",
"/CreationDate": "D:20250505185828+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 25 for Word",
"/Keywords": "",
"/ModDate": "D:20250505190035+02\u002700\u0027",
"/Producer": "Adobe PDF Library 25.1.250",
"/SourceModified": "",
"/Subject": "Entrust Signature Activation Module",
"/Title": "Security Target",
"pdf_file_size_bytes": 1071745,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://trustedcare.entrust.com/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 91
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-cc-pp-2018_02fr_pp.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2024-01_INF-4589.pdf",
"scheme": "ES",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+",
"AVA_VAN.5",
"ALC_FLR.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2024-01_ST.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "23fee587f58b23cab3446c6f7e582a1964bfc6c42b3916963af522816e4aefd8",
"txt_hash": "81663a7e5bbd08c0f08a3621d305613a4599f2d01b36e65f4fbec5b2d70f1992"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "1e563fde5534061dca1ca93c3d089998763bf8f9ffe0ac74ba417bb79ec090fe",
"txt_hash": "43a795b91dcc3b51e2d29a68a53e8d6e9c3f0496861d7de98587b71c3ded9372"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "0c40c18f11023d4c7d1781d1ae775b1396adf2d53fb8960531d2d17dcc75bfdb",
"txt_hash": "0f273eab97672681136d7d50e228eebc97b9e571267eeacca8f6e91426b294bb"
}
},
"status": "active"
}