Entrust Signature Activation Module, version 1.1.1

CSV information

Status active
Valid from 31.07.2025
Valid until 31.07.2030
Scheme 🇪🇸 ES
Manufacturer Entrust EU, SL
Category Other Devices and Systems
Security level ALC_FLR.2, EAL4+, AVA_VAN.5
Protection profiles

Heuristics summary

Certificate ID: 2024-1-INF-4589

Certificate

Extracted keywords

Security level
EAL 4, EAL 2, EAL4+
Claims
O.E, A.U
Security Assurance Requirements (SAR)
ALC_FLR, ALC_FLR.2, AVA_VAN.5

File metadata

Creation date D:20250714095541+02'00'
Modification date D:20250714095541+02'00'
Pages 2
Producer GPL Ghostscript 9.27

Certification report

Extracted keywords

Asymmetric Algorithms
DSA
Hash functions
SHA-256

Security level
EAL4, EAL 1, EAL 4, EAL 2, EAL2, ITSEC Evaluation
Claims
A.U
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_IMP.1, AGD_OPE.1, ALC_FLR.2, ALC_CMC.4, ALC_DEL.1, ALC_LCD.1, ALC_FLR, ATE_COV.2, ATE_FUN.1, AVA_VAN.5, ASE_CCL.1, ASE_INT.1, ASE_REQ.2
Security Functional Requirements (SFR)
FAU_GEN.1, FCS_CKM, FCS_CKM.3, FCS_COP, FCS_COP.1, FCS_RNG.1, FDP_ACC, FDP_ACF, FDP_ETC, FDP_IFC, FDP_IFF, FDP_ITC, FDP_UCT.1, FIA_UID.2, FIA_UAU, FIA_ATD.1, FMT_SMF.1, FMT_MSA, FMT_MSA.2, FMT_MTD.1, FPT_PHP.1, FPT_RPL.1, FPT_TDC.1, FPT_PHP.3, FTP_TRP, FTP_ITC
Certificates
2024-1-INF-4589- v1
Evaluation facilities
DEKRA Testing and Certification

Side-channel analysis
JIL

File metadata

Author 9308
Creation date D:20250805103528+02'00'
Modification date D:20250805103528+02'00'
Pages 15
Creator Microsoft® Word LTSC
Producer Microsoft® Word LTSC

Security target

Extracted keywords

Symmetric Algorithms
AES, HMAC
Asymmetric Algorithms
RSA-PSS, ECC, DSA
Hash functions
SHA-256, SHA256, SHA384, SHA512
Protocols
TLS
Randomness
RNG
Block cipher modes
CBC

Security level
EAL4, EAL4 augmented
Claims
T.ENROLMENT_SIGNER_IMPERSONATION, T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCLOSED, T.SVD_FORGERY, T.ADMIN_IMPERSONATION, T.MAINTENANCE_AUTHENTICATION_DISCLOSE, T.AUTHENTICATION_SIGNER_IMPERSONATION, T.SIGNER_AUTHENTICATION_DATA_MODIFIED, T.SAP_BYPASS, T.SAP_REPLAY, T.SAD_FORGERY, T.SIGNATURE_REQUEST_DISCLOSURE, T.DTBSR_FORGERY, T.SIGNATURE_FORGERY, T.PRIVILEGED_USER_INSERTION, T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DATA_MODIFICATION, T.AUTHORISATION_DATA_UPDATE, T.CONTEXT_ALTERATION, T.AUDIT_ALTERATION, T.RANDOM, T.SIGNATURE_REQUEST_DISCLOSE, T.SIGNER_AUTEHNTICATION_DATA_MODIFIED, T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DATA_MODIFIC, T.AUTHORISATION_DATA_DISCLOSE, T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCLOS, A.PRIVILEGED_USER, A.SIGNER_ENROLMENT, A.SIGNER_AUTHENTICATION_DATA_PROTECTION, A.SIGNER_DEVICE, A.CA, A.ACCESS_PROTECTED, A.AUTH_DATA, A.TSP_AUDITED, A.SEC_REQ, A.SIGNATURE_REQUEST_DISCLOSURE, R.SVD, R.SAD, R.TSF_DATA, R.AUDIT, R.RANDOM, OT.SIGNER_PROTECTION, OT.REFERENCE_SIGNER_AUTHENTICATION_DATA, OT.SIGNER_KEY_PAIR_GENERATION, OT.SVD, OT.PRIVILEGED_USER_MANAGEMENT, OT.PRIVILEGED_USER_AUTHENTICATION, OT.PRIVILEGED_USER_PROTECTION, OT.SIGNER_MANAGEMENT, OT.SAD_VERIFICATION, OT.SAP, OT.SIGNATURE_AUTHENTICATION_DATA_PROTECTION, OT.DTBSR_INTEGRITY, OT.SIGNATURE_INTEGRITY, OT.CRYPTO, OT.RANDOM, OT.SYSTEM_PROTECTION, OT.AUDIT_PROTECTION, OT.SIGNER_KEY_PAIR_GENERATI, OT.PRIVILEGED_USER_MANAGE, OT.PRIVILEGED_USER_AUTHEN, OT.PRIVILEGED_USER_PROTECT, OT.SIGNATURE_AUTHENTICATI, OE.SVD_AUTHENTICITY, OE.CA_REQUEST_CERTIFICATE, OE.CERTIFICATE_VERFICATION, OE.SIGNER_AUTHENTICATION_DATA, OE.DELEGATED_AUTHENTICATION, OE.DEVICE, OE.ENV, OE.CRYPTOMODULE_CERTIFIED, OE.SIGNER_AUTHENTICATION_, OSP.RANDOM, OSP.CRYPTO, OSP.TSP_AUDITED
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FCS_CKM.1, FCS_CKM.6, FCS_COP.1, FCS_CKM.1.1, FCS_RNG.1, FCS_CKM.3, FCS_CKM.3.1, FCS_CKM.6.1, FCS_CKM.6.2, FCS_COP.1.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.2, FCS_CKM.5, FCS_RBG.1, FDP_ITC, FDP_ETC, FDP_UIT.1, FDP_UCT.1, FDP_ACC, FDP_ACF, FDP_IFF, FDP_IFC, FDP_ACC.1, FDP_ACF.1, FDP_ETC.2, FDP_IFC.1, FDP_IFF.1, FDP_ITC.2, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ITC.1, FIA_ATD.1, FIA_USB.1, FIA_UID.2, FIA_UAU.1, FIA_UAU, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5, FIA_UID.2.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UID.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMF.1, FMT_SMF.2, FMT_MSA, FMT_MSA.2.1, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.2, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_SMR.1, FPT_PHP.1, FPT_PHP.3, FPT_TDC.1, FPT_ITC.2, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_RPL.1, FPT_RPL.1.1, FPT_RPL.1.2, FPT_STM.1, FPT_STM.1.1, FPT_TDC.1.1, FPT_TDC.1.2, FTP_TRP, FTP_TRP.1, FTP_ITC, FTP_ITC.1, FTP_TDC.1

Side-channel analysis
side-channels, physical tampering

Standards
FIPS 186-5, FIPS 197, FIPS 180-4, FIPS 198-1, PKCS#1, AIS 31, AIS31, RFC 3447, ISO/IEC 19790, ISO/IEC 15408, ISO/IEC 19790:2012, X.509

File metadata

Title Security Target
Subject Entrust Signature Activation Module
Author Entrust Datacard Europe
Creation date D:20250505185828+02'00'
Modification date D:20250505190035+02'00'
Pages 91
Creator Acrobat PDFMaker 25 for Word
Producer Adobe PDF Library 25.1.250

Heuristics

Certificate ID: 2024-1-INF-4589

Extracted SARs

ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.2, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5

Scheme data ?

Product Entrust Signature Activation Module, version 1.1.1
Product Link https://oc.ccn.cni.es/en/certified-products/certified-products/1059-entrust-signature-activation-module-version-1-1-1
Category QSCD/SSCD
Manufacturer ENTRUST EU, S.L.
Certification Date 31.07.2025
Enhanced
Description Entrust Signature Activation Module is a software component that interacts with the Cryptographic Module (CM) to implement a Signature Activation Module (SAM) according to the European Standard [CEN EN 419 241-2]. The main objective of the Entrust Signature Activation Module component is to ensure the signer the sole control of their signing keys, which is carried out authorizing the signature operation. The SAM activates the signing key within a CM, handling a Signature Activation Protocol (SAP) which requires that Signature Activation Data (SAD) be provided at the local environment. The SAD binds together the signer authentication with the signing key and the data to be signed. The SAM component uses the SAD in order to guarantee with a high level of confidence (SCAL 2) that the signing keys are used under sole control of the signer. SCAL 2 also requires the signing keys and the software of the SAM are protected by a tamper protected environment. Entrust Signature ActivationModule component uses a dedicated tamper protected environment according to the requirements of [CEN EN 419 241-2] standard. Entrust Signature Activation Module has been designed and conforms tothe European Standard [CEN EN 419 241-2] which is aimed to meet (together with the CM) the requirements of a QSCD as specified in Regulation (EU) No 910/2014 [eIDAS]. The major security features of the TOE are the following: Identification and authentication of TOE users. Secure creation of TOE users. Signer Key Pair generation and deletion. Supply DTBS/R. Signing/Sealing. Secure Audit. Secure communication between the TOE and the SSA.
Category QSCD/SSCD
Manufacturer ENTRUST EU, S.L.
Type Product
Evaluation Facility DEKRA Testing and Certification S.A.U.
Status Certified
Certification Date 31.07.2025
Cc Version CC/CEM:2022 Release 1
Level EAL4 + ALC_FLR.2 + AVA_VAN.5
Target Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2281
Cert Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2282
Report Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2283

References

No references are available for this certificate.

Updates

  • 20.10.2025 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Entrust Signature Activation Module, version 1.1.1', 'product_link': 'https://oc.ccn.cni.es/en/certified-products/certified-products/1059-entrust-signature-activation-module-version-1-1-1', 'category': 'QSCD/SSCD', 'manufacturer': 'ENTRUST EU, S.L.', 'certification_date': '2025-07-31', 'enhanced': {'description': 'Entrust Signature Activation Module is a software component that interacts with the Cryptographic Module (CM) to implement a Signature Activation Module (SAM) according to the European Standard [CEN EN 419 241-2]. The main objective of the Entrust Signature Activation Module component is to ensure the signer the sole control of their signing keys, which is carried out authorizing the signature operation. The SAM activates the signing key within a CM, handling a Signature Activation Protocol (SAP) which requires that Signature Activation Data (SAD) be provided at the local environment. The SAD binds together the signer authentication with the signing key and the data to be signed. The SAM component uses the SAD in order to guarantee with a high level of confidence (SCAL 2) that the signing keys are used under sole control of the signer. SCAL 2 also requires the signing keys and the software of the SAM are protected by a tamper protected environment. Entrust Signature ActivationModule component uses a dedicated tamper protected environment according to the requirements of [CEN EN 419 241-2] standard. Entrust Signature Activation Module has been designed and conforms tothe European Standard [CEN EN 419 241-2] which is aimed to meet (together with the CM) the requirements of a QSCD as specified in Regulation (EU) No 910/2014 [eIDAS]. The major security features of the TOE are the following: Identification and authentication of TOE users. Secure creation of TOE users. Signer Key Pair generation and deletion. Supply DTBS/R. Signing/Sealing. Secure Audit. Secure communication between the TOE and the SSA.', 'category': 'QSCD/SSCD', 'manufacturer': 'ENTRUST EU, S.L.', 'type': 'Product', 'evaluation_facility': 'DEKRA Testing and Certification S.A.U.', 'status': 'Certified', 'certification_date': '2025-07-31', 'cc_version': 'CC/CEM:2022 Release 1', 'level': 'EAL4 + ALC_FLR.2 + AVA_VAN.5', 'target_link': 'https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2281', 'cert_link': 'https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2282', 'report_link': 'https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2283'}}.
  • 29.09.2025 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 08.09.2025 The certificate data changed.
    Certificate changed

    The protection_profile_links was updated.

    • The new value is {'_type': 'Set', 'elements': ['https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-cc-pp-2018_02fr_pp.pdf']}.

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'enhanced': {'__update__': {'level': 'EAL4 + ALC_FLR.2 + AVA_VAN.5'}}} data.
    • The protection_profiles property was set to {'_type': 'Set', 'elements': ['eabbd431e1f174cd']}.
  • 11.08.2025 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Entrust Signature Activation Module, version 1.1.1 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2024-01_Certificado.pdf",
  "dgst": "5fd518f95aefcf60",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "2024-1-INF-4589",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.1.1"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "eabbd431e1f174cd"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "QSCD/SSCD",
      "certification_date": "2025-07-31",
      "enhanced": {
        "category": "QSCD/SSCD",
        "cc_version": "CC/CEM:2022 Release 1",
        "cert_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=2282",
        "certification_date": "2025-07-31",
        "description": "Entrust Signature Activation Module is a software component that interacts with the Cryptographic Module (CM) to implement a Signature Activation Module (SAM) according to the European Standard [CEN EN 419 241-2]. The main objective of the Entrust Signature Activation Module component is to ensure the signer the sole control of their signing keys, which is carried out authorizing the signature operation. The SAM activates the signing key within a CM, handling a Signature Activation Protocol (SAP) which requires that Signature Activation Data (SAD) be provided at the local environment. The SAD binds together the signer authentication with the signing key and the data to be signed. The SAM component uses the SAD in order to guarantee with a high level of confidence (SCAL 2) that the signing keys are used under sole control of the signer. SCAL 2 also requires the signing keys and the software of the SAM are protected by a tamper protected environment. Entrust Signature ActivationModule component uses a dedicated tamper protected environment according to the requirements of [CEN EN 419 241-2] standard. Entrust Signature Activation Module has been designed and conforms tothe European Standard [CEN EN 419 241-2] which is aimed to meet (together with the CM) the requirements of a QSCD as specified in Regulation (EU) No 910/2014 [eIDAS]. The major security features of the TOE are the following: Identification and authentication of TOE users. Secure creation of TOE users. Signer Key Pair generation and deletion. Supply DTBS/R. Signing/Sealing. Secure Audit. Secure communication between the TOE and the SSA.",
        "evaluation_facility": "DEKRA Testing and Certification S.A.U.",
        "level": "EAL4 + ALC_FLR.2 + AVA_VAN.5",
        "manufacturer": "ENTRUST EU, S.L.",
        "report_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=2283",
        "status": "Certified",
        "target_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=2281",
        "type": "Product"
      },
      "manufacturer": "ENTRUST EU, S.L.",
      "product": "Entrust Signature Activation Module, version 1.1.1",
      "product_link": "https://oc.ccn.cni.es/en/certified-products/certified-products/1059-entrust-signature-activation-module-version-1-1-1"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Entrust EU, SL",
  "manufacturer_web": "https://www.entrust.com/",
  "name": "Entrust Signature Activation Module, version 1.1.1",
  "not_valid_after": "2030-07-31",
  "not_valid_before": "2025-07-31",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "2024-01_Certificado.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.U": 1
        },
        "O": {
          "O.E": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 2,
          "ALC_FLR.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 4": 1,
          "EAL4+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20250714095541+02\u002700\u0027",
      "/ModDate": "D:20250714095541+02\u002700\u0027",
      "/Producer": "GPL Ghostscript 9.27",
      "pdf_file_size_bytes": 865212,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "2024-01_INF-4589.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DSA": {
            "DSA": 1
          }
        }
      },
      "cc_cert_id": {
        "ES": {
          "2024-1-INF-4589- v1": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.U": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_IMP.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_DEL.1": 1,
          "ALC_FLR": 3,
          "ALC_FLR.2": 9,
          "ALC_LCD.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_INT.1": 1,
          "ASE_REQ.2": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_FUN.1": 1
        },
        "AVA": {
          "AVA_VAN.5": 9
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 1,
          "EAL 4": 2,
          "EAL2": 1,
          "EAL4": 8
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 1
        },
        "FCS": {
          "FCS_CKM": 3,
          "FCS_CKM.3": 1,
          "FCS_COP": 2,
          "FCS_COP.1": 1,
          "FCS_RNG.1": 1
        },
        "FDP": {
          "FDP_ACC": 8,
          "FDP_ACF": 8,
          "FDP_ETC": 2,
          "FDP_IFC": 2,
          "FDP_IFF": 2,
          "FDP_ITC": 2,
          "FDP_UCT.1": 1
        },
        "FIA": {
          "FIA_ATD.1": 1,
          "FIA_UAU": 2,
          "FIA_UID.2": 1
        },
        "FMT": {
          "FMT_MSA": 3,
          "FMT_MSA.2": 1,
          "FMT_MTD.1": 1,
          "FMT_SMF.1": 1
        },
        "FPT": {
          "FPT_PHP.1": 2,
          "FPT_PHP.3": 1,
          "FPT_RPL.1": 1,
          "FPT_TDC.1": 1
        },
        "FTP": {
          "FTP_ITC": 1,
          "FTP_TRP": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "DEKRA": {
          "DEKRA Testing and Certification": 3
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "other": {
          "JIL": 1
        }
      },
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "9308",
      "/CreationDate": "D:20250805103528+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word LTSC",
      "/ModDate": "D:20250805103528+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word LTSC",
      "pdf_file_size_bytes": 398577,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 15
    },
    "st_filename": "2024-01_ST.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          }
        },
        "FF": {
          "DSA": {
            "DSA": 4
          }
        },
        "RSA": {
          "RSA-PSS": 2
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ACCESS_PROTECTED": 3,
          "A.AUTH_DATA": 3,
          "A.CA": 3,
          "A.PRIVILEGED_USER": 3,
          "A.SEC_REQ": 3,
          "A.SIGNATURE_REQUEST_DISCLOSURE": 1,
          "A.SIGNER_AUTHENTICATION_DATA_PROTECTION": 3,
          "A.SIGNER_DEVICE": 3,
          "A.SIGNER_ENROLMENT": 3,
          "A.TSP_AUDITED": 3
        },
        "OE": {
          "OE.CA_REQUEST_CERTIFICATE": 3,
          "OE.CERTIFICATE_VERFICATION": 1,
          "OE.CRYPTOMODULE_CERTIFIED": 7,
          "OE.DELEGATED_AUTHENTICATION": 1,
          "OE.DEVICE": 10,
          "OE.ENV": 7,
          "OE.SIGNER_AUTHENTICATION_": 2,
          "OE.SIGNER_AUTHENTICATION_DATA": 4,
          "OE.SVD_AUTHENTICITY": 4
        },
        "OSP": {
          "OSP.CRYPTO": 3,
          "OSP.RANDOM": 4,
          "OSP.TSP_AUDITED": 1
        },
        "OT": {
          "OT.AUDIT_PROTECTION": 5,
          "OT.CRYPTO": 8,
          "OT.DTBSR_INTEGRITY": 5,
          "OT.PRIVILEGED_USER_AUTHEN": 1,
          "OT.PRIVILEGED_USER_AUTHENTICATION": 5,
          "OT.PRIVILEGED_USER_MANAGE": 1,
          "OT.PRIVILEGED_USER_MANAGEMENT": 6,
          "OT.PRIVILEGED_USER_PROTECT": 1,
          "OT.PRIVILEGED_USER_PROTECTION": 3,
          "OT.RANDOM": 5,
          "OT.REFERENCE_SIGNER_AUTHENTICATION_DATA": 6,
          "OT.SAD_VERIFICATION": 4,
          "OT.SAP": 8,
          "OT.SIGNATURE_AUTHENTICATI": 1,
          "OT.SIGNATURE_AUTHENTICATION_DATA_PROTECTION": 4,
          "OT.SIGNATURE_INTEGRITY": 3,
          "OT.SIGNER_KEY_PAIR_GENERATI": 2,
          "OT.SIGNER_KEY_PAIR_GENERATION": 4,
          "OT.SIGNER_MANAGEMENT": 5,
          "OT.SIGNER_PROTECTION": 7,
          "OT.SVD": 5,
          "OT.SYSTEM_PROTECTION": 6
        },
        "R": {
          "R.AUDIT": 2,
          "R.RANDOM": 2,
          "R.SAD": 37,
          "R.SVD": 35,
          "R.TSF_DATA": 13
        },
        "T": {
          "T.ADMIN_IMPERSONATION": 9,
          "T.AUDIT_ALTERATION": 6,
          "T.AUTHENTICATION_SIGNER_IMPERSONATION": 11,
          "T.AUTHORISATION_DATA_DISCLOSE": 2,
          "T.AUTHORISATION_DATA_UPDATE": 9,
          "T.CONTEXT_ALTERATION": 11,
          "T.DTBSR_FORGERY": 5,
          "T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCLOS": 1,
          "T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCLOSED": 4,
          "T.ENROLMENT_SIGNER_IMPERSONATION": 10,
          "T.MAINTENANCE_AUTHENTICATION_DISCLOSE": 6,
          "T.PRIVILEGED_USER_INSERTION": 9,
          "T.RANDOM": 7,
          "T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DATA_MODIFIC": 1,
          "T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DATA_MODIFICATION": 2,
          "T.SAD_FORGERY": 7,
          "T.SAP_BYPASS": 7,
          "T.SAP_REPLAY": 5,
          "T.SIGNATURE_FORGERY": 8,
          "T.SIGNATURE_REQUEST_DISCLOSE": 1,
          "T.SIGNATURE_REQUEST_DISCLOSURE": 3,
          "T.SIGNER_AUTEHNTICATION_DATA_MODIFIED": 1,
          "T.SIGNER_AUTHENTICATION_DATA_MODIFIED": 3,
          "T.SVD_FORGERY": 7
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR.2": 3,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 5,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 8,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 6,
          "FAU_GEN.2.1": 1
        },
        "FCS": {
          "FCS_CKM.1": 16,
          "FCS_CKM.1.1": 3,
          "FCS_CKM.2": 1,
          "FCS_CKM.3": 11,
          "FCS_CKM.3.1": 1,
          "FCS_CKM.5": 3,
          "FCS_CKM.6": 8,
          "FCS_CKM.6.1": 2,
          "FCS_CKM.6.2": 1,
          "FCS_COP.1": 13,
          "FCS_COP.1.1": 4,
          "FCS_RBG.1": 1,
          "FCS_RNG.1": 10,
          "FCS_RNG.1.1": 1,
          "FCS_RNG.1.2": 1
        },
        "FDP": {
          "FDP_ACC": 90,
          "FDP_ACC.1": 27,
          "FDP_ACF": 59,
          "FDP_ACF.1": 40,
          "FDP_ETC": 15,
          "FDP_ETC.2": 7,
          "FDP_IFC": 28,
          "FDP_IFC.1": 13,
          "FDP_IFF": 14,
          "FDP_IFF.1": 12,
          "FDP_ITC": 15,
          "FDP_ITC.1": 3,
          "FDP_ITC.2": 14,
          "FDP_UCT.1": 7,
          "FDP_UCT.1.1": 1,
          "FDP_UIT.1": 7,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1
        },
        "FIA": {
          "FIA_ATD.1": 11,
          "FIA_ATD.1.1": 1,
          "FIA_UAU": 15,
          "FIA_UAU.1": 8,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.5": 5,
          "FIA_UID.1": 2,
          "FIA_UID.2": 13,
          "FIA_UID.2.1": 1,
          "FIA_USB.1": 16,
          "FIA_USB.1.1": 2,
          "FIA_USB.1.2": 3,
          "FIA_USB.1.3": 2
        },
        "FMT": {
          "FMT_MSA": 40,
          "FMT_MSA.1": 7,
          "FMT_MSA.2": 10,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 17,
          "FMT_MTD.1": 5,
          "FMT_MTD.1.1": 1,
          "FMT_SMF.1": 6,
          "FMT_SMF.1.1": 1,
          "FMT_SMF.2": 1,
          "FMT_SMR.1": 3,
          "FMT_SMR.2": 12,
          "FMT_SMR.2.1": 1,
          "FMT_SMR.2.2": 1,
          "FMT_SMR.2.3": 1
        },
        "FPT": {
          "FPT_ITC.2": 1,
          "FPT_PHP.1": 10,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 7,
          "FPT_PHP.3.1": 1,
          "FPT_RPL.1": 6,
          "FPT_RPL.1.1": 1,
          "FPT_RPL.1.2": 1,
          "FPT_STM.1": 6,
          "FPT_STM.1.1": 1,
          "FPT_TDC.1": 12,
          "FPT_TDC.1.1": 2,
          "FPT_TDC.1.2": 1
        },
        "FTP": {
          "FTP_ITC": 7,
          "FTP_ITC.1": 8,
          "FTP_TDC.1": 2,
          "FTP_TRP": 26,
          "FTP_TRP.1": 11
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 25
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 1,
            "SHA256": 1,
            "SHA384": 1,
            "SHA512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 6
        }
      },
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 4
        },
        "SCA": {
          "side-channels": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 31": 2,
          "AIS31": 3
        },
        "FIPS": {
          "FIPS 180-4": 1,
          "FIPS 186-5": 4,
          "FIPS 197": 1,
          "FIPS 198-1": 1
        },
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 19790": 8,
          "ISO/IEC 19790:2012": 1
        },
        "PKCS": {
          "PKCS#1": 5
        },
        "RFC": {
          "RFC 3447": 3
        },
        "X509": {
          "X.509": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 4
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Entrust Datacard Europe",
      "/Company": "Entrust Datacard",
      "/ContentTypeId": "0x0101007CCD96C794530F4DB6CBCB835BCC20A7",
      "/CreationDate": "D:20250505185828+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 25 for Word",
      "/Keywords": "",
      "/ModDate": "D:20250505190035+02\u002700\u0027",
      "/Producer": "Adobe PDF Library 25.1.250",
      "/SourceModified": "",
      "/Subject": "Entrust Signature Activation Module",
      "/Title": "Security Target",
      "pdf_file_size_bytes": 1071745,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://trustedcare.entrust.com/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 91
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-cc-pp-2018_02fr_pp.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2024-01_INF-4589.pdf",
  "scheme": "ES",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "AVA_VAN.5",
      "ALC_FLR.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2024-01_ST.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "23fee587f58b23cab3446c6f7e582a1964bfc6c42b3916963af522816e4aefd8",
      "txt_hash": "81663a7e5bbd08c0f08a3621d305613a4599f2d01b36e65f4fbec5b2d70f1992"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "1e563fde5534061dca1ca93c3d089998763bf8f9ffe0ac74ba417bb79ec090fe",
      "txt_hash": "43a795b91dcc3b51e2d29a68a53e8d6e9c3f0496861d7de98587b71c3ded9372"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "0c40c18f11023d4c7d1781d1ae775b1396adf2d53fb8960531d2d17dcc75bfdb",
      "txt_hash": "0f273eab97672681136d7d50e228eebc97b9e571267eeacca8f6e91426b294bb"
    }
  },
  "status": "active"
}