ACOS-IDv2.0 SSCD (A) CL-TC-Comm (v2.0 SSCD (A))

Certificate

Extracted keywords

Security level
EAL4, EAL2
Security Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.1, ALC_CMS.5, ALC_TAT.2, ATE_DPT.2, AVA_VAN.5
Protection profiles
BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012, BSI-CC-PP- 0072-2012, BSI-CC-PP- 0076-2013
Certificates
ANSSI-CC-2022/20
Evaluation facilities
SERMA

File metadata

Title Microsoft Word - certificat-CC-2022_20
Author mflament
Creation date D:20220613141106+02'00'
Modification date D:20220613141106+02'00'
Pages 2
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 21.0 (Windows)

Certification report

Extracted keywords

Symmetric Algorithms
DES

Vendor
Infineon, Infineon Technologies AG

Security level
EAL 4, EAL2, EAL7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.1, ALC_CMS.5, ALC_TAT.2, ALC_FLR, ATE_DPT.2, AVA_VAN.5, AVA_VAN
Protection profiles
BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012, BSI-CC-PP-0071-2012, BSI-CC-PP-0072-2012, BSI-CC-PP-0076-2013, BSI-PP-0084-2014, PP-SSCD-Part2, PP-SSCD-Part3, PP-SSCD-Part4, PP-SSCD-, PP-SSCD-Part6, PP-SSCD-Part5
Certificates
BSI-DSZ-CC-1110-V4-2021, ANSSI-CC-2022/20, ANSSI-CC-2022/08, ANSSI-CC-2022/07
Evaluation facilities
SERMA, CESTI

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Title Microsoft Word - ANSSI-CC-2022_20fr
Author mflament
Creation date D:20220613140948+02'00'
Modification date D:20220613140948+02'00'
Pages 16
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 21.0 (Windows)

References

Outgoing
  • ANSSI-CC-2022/07 - active - ACOS-IDv2.0 eMRTD (B) EAC/PACE Configuration (Version 2.0 eMRTD (B))
  • ANSSI-CC-2022/08 - active - ACOS-IDv2.0 eMRTD (B) BAC Configuration (Version 2.0 eMRTD (B))
  • BSI-DSZ-CC-1110-V4-2021 - active - Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h in the design step H13 and including optional software libraries and dedicated firmware in several versions
Incoming
  • ANSSI-CC-2022/65 - active - ACOS-IDv2.1 SSCD (A) CL-TC-Comm (Version 2.1 SSCD (A))

Security target

Extracted keywords

Symmetric Algorithms
AES, DES, TDES, 3DES, Triple-DES, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman
Schemes
MAC
Protocols
PACE
Randomness
RND
Elliptic Curves
P-256, P-384, P-521, NIST P-256, NIST P-384, NIST P-521
Block cipher modes
CBC

Vendor
Infineon Technologies AG, Infineon

Security level
EAL4+, EAL 6+, EAL4, EAL6, EAL6+, EAL4 augmented, EAL6 augmented
Claims
T.RND, A.CGA, A.SCA, A.CSP, OE.HID_VAD, OE.HI_VAD
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ADV_FUN.1, AGD_OPE.1, AGD_PRE.1, AGD_PRE, ALC_CMS.5, ALC_DVS.2, ALC_FLR.1, ALC_TAT.2, ATE_DPT.2, ATE_DPT.1, AVA_VAN.5, ASE_INT, ASE_CCL, ASE_SPD, ASE_ECD, ASE_REQ, ASE_TSS, ASE_COMP.1
Security Functional Requirements (SFR)
FAU_GEN, FAU_SAS.1, FCS_CKM, FCS_CKM.4, FCS_COP, FCS_CKM.1, FCS_COP.1, FCS_CKM.2, FCS_CKM.4.1, FCS_ITC, FCS_RNG.1, FDP_ACC, FDP_ACF, FDP_DAU, FDP_ITC, FDP_UCT, FDP_RIP.1, FDP_SDI, FDP_UIT, FDP_ITC.1, FDP_ITC.2, FDP_ACF.1, FDP_ACC.1, FDP_DAU.1, FDP_DAU.2, FDP_IFC.1, FDP_UCT.1, FDP_RIP.1.1, FDP_SDI.1, FDP_SDI.2, FDP_UIT.1, FDP_AFC, FDP_ITT.1, FIA_API, FIA_AFL, FIA_API.1, FIA_UID.1, FIA_UAU.1, FIA_API.1.1, FIA_AFL.1, FIA_AFL.1.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FMT_SMR.1, FMT_SMF.1, FMT_MOF.1, FMT_MSA, FMT_MSA.2, FMT_MTD, FMT_MSA.3, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1.1, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.2.1, FMT_MSA.4, FMT_MTD.1, FMT_LIM.1, FMT_LIM.2, FPT_EMS, FPT_FLS.1, FPT_PHP.1, FPT_PHP.3, FPT_TST.1, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1.1, FPT_TST, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS, FPT_ITT.1, FPT_TST.2, FRU_FLT.2, FTP_ITC, FTP_ITC.1, FTP_TRP.1, FTP_ICT
Protection profiles
BSI-CC-PP- 0059-2009-MA-01, BSI-CC-PP-0075, BSI-CC-PP-0084-2014, BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0071, BSI-CC-PP-0072, BSI-CC-PP-0076, BSI-CC-PP-0068, BSI-CC-PP- 0084-2014, BSI-CC-PP-0068-V2-2011-MA-01, BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0055-2009
Certificates
BSI-DSZ-CC-1110-V4-2021, BSI-DSZ-CC-S-0153

Side-channel analysis
Leak-Inherent, physical probing, SPA, DPA, timing attacks, physical tampering, malfunction, Malfunction, DFA, fault injection
Certification process
out of scope, antenna and card body / booklet are irrelevant for the secure operation of the TOE and therefore out of scope. 2.3.6 TOE Components The TOE consists of the following components: Category Definition Secure Chip

Standards
FIPS 186-4, FIPS PUB 180-4, FIPS PUB 186-4, FIPS 197, PKCS#3, RFC 5639, RFC-5639, ISO/IEC7816-3, ISO/IEC14443, ISO/IEC 15408, ISO/IEC 7816-3, ISO/IEC 7816-4, ISO/IEC 7816-8, ISO/IEC 7816-9, ISO/IEC 18013, ISO/IEC 10116:2006, ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004
Technical reports
BSI TR-03111

File metadata

Title Security Target
Subject ACOS-IDv2.0 SSCD
Author Austria Card Ges.m.b.H. - Thomas Aichinger
Creation date D:20220511135157+02'00'
Modification date D:20220511135157+02'00'
Pages 94
Creator Microsoft® Word 2013
Producer Microsoft® Word 2013

References

Outgoing
  • BSI-DSZ-CC-1110-V4-2021 - active - Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h in the design step H13 and including optional software libraries and dedicated firmware in several versions

Heuristics

Certificate ID: ANSSI-CC-2022/20

Extracted SARs

ADV_ARC.1, ADV_FSP.4, ADV_FUN.1, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.5, ALC_DVS.2, ALC_FLR.1, ALC_TAT.2, ASE_COMP.1, ATE_DPT.2, AVA_VAN.5

Similar certificates

Name Certificate ID
ACOS-IDv2.0 SSCD (A) CB-Comm (v2.0 SSCD (A)) ANSSI-CC-2022/19 Compare

References

Loading...

Updates

  • 10.02.2025 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 05.02.2025 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.
    • The st property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.
    • The cert property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.

    The computed heuristics were updated.

    • The following values were inserted: {'protection_profiles': {'_type': 'Set', 'elements': ['1f7ea2e05de5b88b', 'd918b28fd7bb5d79', '27abdb9c6ab375a7', 'd9553e7194783182', '4a814d0e3c9f9082']}, 'eal': 'EAL4+'}.
    • The prev_certificates property was set to None.
    • The next_certificates property was set to None.
    • The scheme_data property was set to {'product': 'ACOS-IDv2.0 SSCD (A) CL-TC-Comm (v2.0 SSCD (A))', 'url': 'https://cyber.gouv.fr/produits-certifies/acos-idv20-sscd-cl-tc-comm-v20-sscd', 'description': 'Le produit Ă©valuĂ© est  ACOS-IDv2.0 SSCD (A) CL-TC-Comm, v2.0 SSCD (A)  dĂ©veloppĂ© par AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H. et INFINEON TECHNOLOGIES AG. Ce produit est de type  carte Ă  puce  destinĂ© Ă  ĂŞtre utilisĂ© comme dispositif sĂ©curisĂ© de crĂ©ation de signature (SSCD1). Il peut ĂŞtre utilisĂ© dans diffĂ©rents types de documents (carte d’identitĂ©, perm', 'sponsor': 'AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H.', 'developer': 'AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H. / INFINEON TECHNOLOGIES AG', 'cert_id': 'ANSSI-CC-2022/20', 'level': 'EAL4+', 'expiration_date': '2027-06-07', 'enhanced': {'cert_id': 'ANSSI-CC-2022/20', 'certification_date': '2022-06-07', 'expiration_date': '2027-06-07', 'category': 'Cartes Ă  puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H. / INFINEON TECHNOLOGIES AG', 'sponsor': 'AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H.', 'evaluation_facility': 'SERMA SAFETY & SECURITY', 'level': 'EAL4+', 'protection_profile': 'Protection profiles for secure signature creation device:Part 2 : Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-01 ; Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012 ;Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012 ; Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012 ; Part 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013.', 'mutual_recognition': 'CCRA SOG-IS', 'augmented': 'ALC_DVS.2, ATE_DPT.2, AVA_VAN.5, ALC_FLR.1, ALC_CMS.5, ALC_TAT.2', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2022/06/certificat-cc-2022_20.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2022/06/anssi-cible-cc-2022_20en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2022/06/anssi-cc-2022_20fr.pdf'}}.
  • 03.02.2025 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 27.01.2025 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'ACOS-IDv2.0 SSCD (A) CL-TC-Comm (v2.0 SSCD (A))', 'url': 'https://cyber.gouv.fr/produits-certifies/acos-idv20-sscd-cl-tc-comm-v20-sscd', 'description': 'Le produit Ă©valuĂ© est  ACOS-IDv2.0 SSCD (A) CL-TC-Comm, v2.0 SSCD (A)  dĂ©veloppĂ© par AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H. et INFINEON TECHNOLOGIES AG. Ce produit est de type  carte Ă  puce  destinĂ© Ă  ĂŞtre utilisĂ© comme dispositif sĂ©curisĂ© de crĂ©ation de signature (SSCD1). Il peut ĂŞtre utilisĂ© dans diffĂ©rents types de documents (carte d’identitĂ©, perm', 'sponsor': 'AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H.', 'developer': 'AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H. / INFINEON TECHNOLOGIES AG', 'cert_id': 'ANSSI-CC-2022/20', 'level': 'EAL4+', 'expiration_date': '2027-06-07', 'enhanced': {'cert_id': 'ANSSI-CC-2022/20', 'certification_date': '2022-06-07', 'expiration_date': '2027-06-07', 'category': 'Cartes Ă  puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H. / INFINEON TECHNOLOGIES AG', 'sponsor': 'AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H.', 'evaluation_facility': 'SERMA SAFETY & SECURITY', 'level': 'EAL4+', 'protection_profile': 'Protection profiles for secure signature creation device:Part 2 : Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-01 ; Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012 ;Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012 ; Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012 ; Part 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013.', 'mutual_recognition': 'CCRA SOG-IS', 'augmented': 'ALC_DVS.2, ATE_DPT.2, AVA_VAN.5, ALC_FLR.1, ALC_CMS.5, ALC_TAT.2', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2022/06/certificat-cc-2022_20.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2022/06/anssi-cible-cc-2022_20en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2022/06/anssi-cc-2022_20fr.pdf'}}.
  • 06.01.2025 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 16.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'ACOS-IDv2.0 SSCD (A) CL-TC-Comm (v2.0 SSCD (A))', 'url': 'https://cyber.gouv.fr/produits-certifies/acos-idv20-sscd-cl-tc-comm-v20-sscd', 'description': 'Le produit Ă©valuĂ© est  ACOS-IDv2.0 SSCD (A) CL-TC-Comm, v2.0 SSCD (A)  dĂ©veloppĂ© par AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H. et INFINEON TECHNOLOGIES AG. Ce produit est de type  carte Ă  puce  destinĂ© Ă  ĂŞtre utilisĂ© comme dispositif sĂ©curisĂ© de crĂ©ation de signature (SSCD1). Il peut ĂŞtre utilisĂ© dans diffĂ©rents types de documents (carte d’identitĂ©, perm', 'sponsor': 'AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H.', 'developer': 'AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H. / INFINEON TECHNOLOGIES AG', 'cert_id': 'ANSSI-CC-2022/20', 'level': 'EAL4+', 'expiration_date': '2027-06-07', 'enhanced': {'cert_id': 'ANSSI-CC-2022/20', 'certification_date': '2022-06-07', 'expiration_date': '2027-06-07', 'category': 'Cartes Ă  puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H. / INFINEON TECHNOLOGIES AG', 'sponsor': 'AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H.', 'evaluation_facility': 'SERMA SAFETY & SECURITY', 'level': 'EAL4+', 'protection_profile': 'Protection profiles for secure signature creation device:Part 2 : Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-01 ; Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012 ;Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012 ; Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012 ; Part 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013.', 'mutual_recognition': 'CCRA SOG-IS', 'augmented': 'ALC_DVS.2, ATE_DPT.2, AVA_VAN.5, ALC_FLR.1, ALC_CMS.5, ALC_TAT.2', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2022/06/certificat-cc-2022_20.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2022/06/anssi-cible-cc-2022_20en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2022/06/anssi-cc-2022_20fr.pdf'}}.
  • 09.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'cert_id': 'ANSSI-CC-2022/20', 'expiration_date': '2027-06-07', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2022/20', 'certification_date': '2022-06-07', 'expiration_date': '2027-06-07', 'mutual_recognition': 'CCRA SOG-IS'}}} data.
  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Protection Profiles of the certificate were updated.

    • The following values were removed: {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': None}]}.
    • The following values were added: {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_SSCD_PART3_V1.0.2']}}]}.
  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'ACOS-IDv2.0 SSCD (A) CL-TC-Comm (v2.0 SSCD (A))', 'url': 'https://cyber.gouv.fr/produits-certifies/acos-idv20-sscd-cl-tc-comm-v20-sscd', 'description': 'Le produit Ă©valuĂ© est  ACOS-IDv2.0 SSCD (A) CL-TC-Comm, v2.0 SSCD (A)  dĂ©veloppĂ© par AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H. et INFINEON TECHNOLOGIES AG. Ce produit est de type  carte Ă  puce  destinĂ© Ă  ĂŞtre utilisĂ© comme dispositif sĂ©curisĂ© de crĂ©ation de signature (SSCD1). Il peut ĂŞtre utilisĂ© dans diffĂ©rents types de documents (carte d’identitĂ©, perm', 'sponsor': 'AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H.', 'developer': 'AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H. / INFINEON TECHNOLOGIES AG', 'cert_id': '2022/20', 'level': 'EAL4+', 'expiration_date': '7 Juin 2027', 'enhanced': {'cert_id': '2022/20', 'certification_date': '07/06/2022', 'expiration_date': '07/06/2027', 'category': 'Cartes Ă  puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H. / INFINEON TECHNOLOGIES AG', 'sponsor': 'AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H.', 'evaluation_facility': 'SERMA SAFETY & SECURITY', 'level': 'EAL4+', 'protection_profile': 'Protection profiles for secure signature creation device:Part 2 : Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-01 ; Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012 ;Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012 ; Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012 ; Part 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013.', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ALC_DVS.2, ATE_DPT.2, AVA_VAN.5, ALC_FLR.1, ALC_CMS.5, ALC_TAT.2', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2022/06/certificat-cc-2022_20.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2022/06/anssi-cible-cc-2022_20en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2022/06/anssi-cc-2022_20fr.pdf'}}.
  • 02.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ce95e5a2b7eef7c0757a6f6c4307f2fc4608e7f74474263e6ee57af287ea2769', 'txt_hash': 'f020022d21c8077ab9c4e4ee817b522999691762749347091151f97d7a758900'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '46a150eb5ba56ed431accadff74ef96290e8bc108b24491e25f3e3c3dc3b4f25', 'txt_hash': 'f864a8267f3d0c04dde3c99c22686497a8f4a6adeb821fd3bd771895b0c02dfe'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 3190425, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 94, '/Title': 'Security Target', '/Author': 'Austria Card Ges.m.b.H. - Thomas Aichinger', '/Subject': 'ACOS-IDv2.0 SSCD', '/Creator': 'Microsoft® Word 2013', '/CreationDate': "D:20220511135157+02'00'", '/ModDate': "D:20220511135157+02'00'", '/Producer': 'Microsoft® Word 2013', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 1554648, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Author': 'mflament', '/CreationDate': "D:20220613141106+02'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20220613141106+02'00'", '/Producer': 'Acrobat Distiller 21.0 (Windows)', '/Title': 'Microsoft Word - certificat-CC-2022_20', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1110-V4-2021': 2, 'BSI-DSZ-CC-S-0153': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP- 0059-2009-MA-01': 1, 'BSI-CC-PP-0075': 3, 'BSI-CC-PP-0084-2014': 2, 'BSI-CC-PP-0059-2009-MA-01': 2, 'BSI-CC-PP-0071': 2, 'BSI-CC-PP-0072': 2, 'BSI-CC-PP-0076': 2, 'BSI-CC-PP-0068': 3, 'BSI-CC-PP- 0084-2014': 1, 'BSI-CC-PP-0068-V2-2011-MA-01': 1, 'BSI-CC-PP-0056-V2-2012': 1, 'BSI-CC-PP-0055-2009': 1}}, 'cc_security_level': {'EAL': {'EAL4+': 1, 'EAL 6+': 1, 'EAL4': 16, 'EAL6': 2, 'EAL6+': 1, 'EAL4 augmented': 3, 'EAL6 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 7, 'ADV_FSP.4': 3, 'ADV_TDS.3': 6, 'ADV_IMP.1': 6, 'ADV_FUN.1': 3}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2, 'AGD_PRE': 1}, 'ALC': {'ALC_CMS.5': 7, 'ALC_DVS.2': 7, 'ALC_FLR.1': 8, 'ALC_TAT.2': 7}, 'ATE': {'ATE_DPT.2': 8, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.5': 6}, 'ASE': {'ASE_INT': 2, 'ASE_CCL': 2, 'ASE_SPD': 3, 'ASE_ECD': 2, 'ASE_REQ': 2, 'ASE_TSS': 2, 'ASE_COMP.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1, 'FAU_SAS.1': 1}, 'FCS': {'FCS_CKM': 55, 'FCS_CKM.4': 29, 'FCS_COP': 62, 'FCS_CKM.1': 14, 'FCS_COP.1': 12, 'FCS_CKM.2': 7, 'FCS_CKM.4.1': 1, 'FCS_ITC': 1, 'FCS_RNG.1': 1}, 'FDP': {'FDP_ACC': 59, 'FDP_ACF': 44, 'FDP_DAU': 9, 'FDP_ITC': 11, 'FDP_UCT': 9, 'FDP_RIP.1': 6, 'FDP_SDI': 19, 'FDP_UIT': 6, 'FDP_ITC.1': 19, 'FDP_ITC.2': 10, 'FDP_ACF.1': 31, 'FDP_ACC.1': 36, 'FDP_DAU.1': 2, 'FDP_DAU.2': 2, 'FDP_IFC.1': 21, 'FDP_UCT.1': 3, 'FDP_RIP.1.1': 1, 'FDP_SDI.1': 3, 'FDP_SDI.2': 5, 'FDP_UIT.1': 3, 'FDP_AFC': 1, 'FDP_ITT.1': 2}, 'FIA': {'FIA_API': 4, 'FIA_AFL': 15, 'FIA_API.1': 11, 'FIA_UID.1': 20, 'FIA_UAU.1': 17, 'FIA_API.1.1': 3, 'FIA_AFL.1': 5, 'FIA_AFL.1.1': 2, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1}, 'FMT': {'FMT_SMR.1': 36, 'FMT_SMF.1': 32, 'FMT_MOF.1': 7, 'FMT_MSA': 72, 'FMT_MSA.2': 6, 'FMT_MTD': 14, 'FMT_MSA.3': 21, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_MOF.1.1': 1, 'FMT_MSA.1': 14, 'FMT_MSA.2.1': 1, 'FMT_MSA.4': 2, 'FMT_MTD.1': 3, 'FMT_LIM.1': 1, 'FMT_LIM.2': 1}, 'FPT': {'FPT_EMS': 31, 'FPT_FLS.1': 13, 'FPT_PHP.1': 9, 'FPT_PHP.3': 16, 'FPT_TST.1': 12, 'FPT_EMS.1': 11, 'FPT_EMS.1.1': 2, 'FPT_EMS.1.2': 2, 'FPT_FLS.1.1': 1, 'FPT_TST': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3.1': 2, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_FLS': 1, 'FPT_ITT.1': 1, 'FPT_TST.2': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC': 51, 'FTP_ITC.1': 16, 'FTP_TRP.1': 4, 'FTP_ICT': 3}}, 'cc_claims': {'T': {'T.RND': 1}, 'A': {'A.CGA': 4, 'A.SCA': 4, 'A.CSP': 4}, 'OE': {'OE.HID_VAD': 12, 'OE.HI_VAD': 1}}, 'vendor': {'Infineon': {'Infineon Technologies AG': 1, 'Infineon': 12}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 20}}, 'DES': {'DES': {'DES': 4}, '3DES': {'TDES': 6, '3DES': 4, 'Triple-DES': 1}}, 'constructions': {'MAC': {'CMAC': 2}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 4}, 'ECDSA': {'ECDSA': 2}, 'ECC': {'ECC': 1}}, 'FF': {'DH': {'Diffie-Hellman': 4}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 4}}, 'crypto_protocol': {'PACE': {'PACE': 35}}, 'randomness': {'RNG': {'RND': 1}}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {'NIST': {'P-256': 1, 'P-384': 1, 'P-521': 1, 'NIST P-256': 1, 'NIST P-384': 1, 'NIST P-521': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2, 'physical probing': 1, 'SPA': 1, 'DPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 6, 'malfunction': 3, 'Malfunction': 2, 'DFA': 1, 'fault injection': 1}}, 'technical_report_id': {'BSI': {'BSI TR-03111': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 186-4': 1, 'FIPS PUB 180-4': 3, 'FIPS PUB 186-4': 1, 'FIPS 197': 1}, 'PKCS': {'PKCS#3': 2}, 'RFC': {'RFC 5639': 1, 'RFC-5639': 1}, 'ISO': {'ISO/IEC7816-3': 1, 'ISO/IEC14443': 2, 'ISO/IEC 15408': 2, 'ISO/IEC 7816-3': 1, 'ISO/IEC 7816-4': 1, 'ISO/IEC 7816-8': 1, 'ISO/IEC 7816-9': 1, 'ISO/IEC 18013': 2, 'ISO/IEC 10116:2006': 1}, 'ICAO': {'ICAO': 3}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'antenna and card body / booklet are irrelevant for the secure operation of the TOE and therefore out of scope. 2.3.6 TOE Components The TOE consists of the following components: Category Definition Secure Chip': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2022/20': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0059-2009-MA-01': 1, 'BSI-CC-PP-0075-2012': 1, 'BSI-CC-PP- 0072-2012': 1, 'BSI-CC-PP- 0076-2013': 1}}, 'cc_security_level': {'EAL': {'EAL4': 1, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1, 'ALC_FLR.1': 1, 'ALC_CMS.5': 1, 'ALC_TAT.2': 1}, 'ATE': {'ATE_DPT.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Serma': {'SERMA': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to anssi-cible-cc-2022_20en.pdf.
    • The cert_filename property was set to certificat-cc-2022_20.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V4-2021']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V4-2021']}} data.
    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0945-2017', 'BSI-DSZ-CC-1110-2019', 'BSI-DSZ-CC-0891-2015', 'BSI-DSZ-CC-0945-V2-2018', 'BSI-DSZ-CC-0945-V3-2018', 'BSI-DSZ-CC-0891-V2-2016', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-1110-V2-2019']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}]} values added.
  • 19.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V3-2020']}}} data.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_20fr.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_20en.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '586b3e01fa6e3e7629371351de5ed0f84649ad148a9a8085bc87dfe40e4813fa', 'txt_hash': '3749e71a1cfb31a21133b66e143fdd587f0aa3401589b16802a9144b21f26037'} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 307737, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 16, '/Author': 'mflament', '/CreationDate': "D:20220613140948+02'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20220613140948+02'00'", '/Producer': 'Acrobat Distiller 21.0 (Windows)', '/Title': 'Microsoft Word - ANSSI-CC-2022_20fr', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to {'FR': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1110-V4-2021': 1}, 'FR': {'ANSSI-CC-2022/20': 2, 'ANSSI-CC-2022/08': 2, 'ANSSI-CC-2022/07': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0059-2009-MA-01': 2, 'BSI-CC-PP-0075-2012': 2, 'BSI-CC-PP-0071-2012': 2, 'BSI-CC-PP-0072-2012': 2, 'BSI-CC-PP-0076-2013': 2, 'BSI-PP-0084-2014': 1}, 'other': {'PP-SSCD-Part2': 2, 'PP-SSCD-Part3': 2, 'PP-SSCD-Part4': 2, 'PP-SSCD-': 1, 'PP-SSCD-Part6': 2, 'PP-SSCD-Part5': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL2': 2, 'EAL7': 1}, 'ITSEC': {'ITSEC E6 ElevĂ©': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1, 'ALC_FLR.1': 1, 'ALC_CMS.5': 1, 'ALC_TAT.2': 1, 'ALC_FLR': 1}, 'ATE': {'ATE_DPT.2': 1}, 'AVA': {'AVA_VAN.5': 1, 'AVA_VAN': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon': 1, 'Infineon Technologies AG': 1}}, 'eval_facility': {'Serma': {'SERMA': 1}, 'CESTI': {'CESTI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to None.
    • The report_filename property was set to anssi-cc-2022_20fr.pdf.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to ANSSI-CC-2022/20.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2022/65']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2022/65']}, 'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2022/07', 'ANSSI-CC-2022/08', 'BSI-DSZ-CC-1110-V4-2021']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2022/07', 'ANSSI-CC-2022/08', 'BSI-DSZ-CC-1110-V4-2021']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The report_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The scheme_data property was set to {'product': 'ACOS-IDv2.0 SSCD (A) CL-TC-Comm (v2.0 SSCD (A))', 'url': 'https://cyber.gouv.fr/produits-certifies/acos-idv20-sscd-cl-tc-comm-v20-sscd', 'description': 'Le produit Ă©valuĂ© est  ACOS-IDv2.0 SSCD (A) CL-TC-Comm, v2.0 SSCD (A)  dĂ©veloppĂ© par AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H. et INFINEON TECHNOLOGIES AG. Ce produit est de type  carte Ă  puce  destinĂ© Ă  ĂŞtre utilisĂ© comme dispositif sĂ©curisĂ© de crĂ©ation de signature (SSCD1). Il peut ĂŞtre utilisĂ© dans diffĂ©rents types de documents (carte d’identitĂ©, perm', 'sponsor': 'AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H.', 'developer': 'AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H. / INFINEON TECHNOLOGIES AG', 'cert_id': '2022/20', 'level': 'EAL4+', 'expiration_date': '7 Juin 2027', 'enhanced': {'cert_id': '2022/20', 'certification_date': '07/06/2022', 'expiration_date': '07/06/2027', 'category': 'Cartes Ă  puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H. / INFINEON TECHNOLOGIES AG', 'sponsor': 'AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H.', 'evaluation_facility': 'SERMA SAFETY & SECURITY', 'level': 'EAL4+', 'protection_profile': 'Protection profiles for secure signature creation device:Part 2 : Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-01 ; Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012 ;Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012 ; Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012 ; Part 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013.', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ALC_DVS.2, ATE_DPT.2, AVA_VAN.5, ALC_FLR.1, ALC_CMS.5, ALC_TAT.2', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2022/06/certificat-cc-2022_20.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2022/06/anssi-cible-cc-2022_20en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2022/06/anssi-cc-2022_20fr.pdf'}}.
  • 31.07.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name ACOS-IDv2.0 SSCD (A) CL-TC-Comm (v2.0 SSCD (A)) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2022_20.pdf",
  "dgst": "61a79deadb29fbcd",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2022/20",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "27abdb9c6ab375a7",
        "d918b28fd7bb5d79",
        "d9553e7194783182",
        "1f7ea2e05de5b88b",
        "4a814d0e3c9f9082"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2022/65"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2022/08",
          "BSI-DSZ-CC-1110-V4-2021",
          "ANSSI-CC-2022/07"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2022/65"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0945-2017",
          "BSI-DSZ-CC-1110-V4-2021",
          "BSI-DSZ-CC-1110-V3-2020",
          "BSI-DSZ-CC-0782-2012",
          "BSI-DSZ-CC-0891-V2-2016",
          "BSI-DSZ-CC-0945-V2-2018",
          "BSI-DSZ-CC-0945-V3-2018",
          "BSI-DSZ-CC-1110-2019",
          "BSI-DSZ-CC-0891-2015",
          "ANSSI-CC-2022/07",
          "BSI-DSZ-CC-1110-V2-2019",
          "ANSSI-CC-2022/08"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1110-V4-2021"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1110-V4-2021"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Austria Card plastikkarten und Ausweissysteme Gmbh",
  "manufacturer_web": "https://www.austriacard.at/",
  "name": "ACOS-IDv2.0 SSCD (A) CL-TC-Comm (v2.0 SSCD (A))",
  "not_valid_after": "2027-06-07",
  "not_valid_before": "2022-06-07",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "certificat-cc-2022_20.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2022/20": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0072-2012": 1,
          "BSI-CC-PP- 0076-2013": 1,
          "BSI-CC-PP-0059-2009-MA-01": 1,
          "BSI-CC-PP-0075-2012": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_CMS.5": 1,
          "ALC_DVS.2": 1,
          "ALC_FLR.1": 1,
          "ALC_TAT.2": 1
        },
        "ATE": {
          "ATE_DPT.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL4": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "SERMA": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "mflament",
      "/CreationDate": "D:20220613141106+02\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20220613141106+02\u002700\u0027",
      "/Producer": "Acrobat Distiller 21.0 (Windows)",
      "/Title": "Microsoft Word - certificat-CC-2022_20",
      "pdf_file_size_bytes": 1554648,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "anssi-cc-2022_20fr.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1110-V4-2021": 1
        },
        "FR": {
          "ANSSI-CC-2022/07": 1,
          "ANSSI-CC-2022/08": 2,
          "ANSSI-CC-2022/20": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0059-2009-MA-01": 2,
          "BSI-CC-PP-0071-2012": 2,
          "BSI-CC-PP-0072-2012": 2,
          "BSI-CC-PP-0075-2012": 2,
          "BSI-CC-PP-0076-2013": 2,
          "BSI-PP-0084-2014": 1
        },
        "other": {
          "PP-SSCD-": 1,
          "PP-SSCD-Part2": 2,
          "PP-SSCD-Part3": 2,
          "PP-SSCD-Part4": 2,
          "PP-SSCD-Part5": 1,
          "PP-SSCD-Part6": 2
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_CMS.5": 1,
          "ALC_DVS.2": 1,
          "ALC_FLR": 1,
          "ALC_FLR.1": 1,
          "ALC_TAT.2": 1
        },
        "ATE": {
          "ATE_DPT.2": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL2": 2,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CESTI": {
          "CESTI": 1
        },
        "Serma": {
          "SERMA": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 1,
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "mflament",
      "/CreationDate": "D:20220613140948+02\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20220613140948+02\u002700\u0027",
      "/Producer": "Acrobat Distiller 21.0 (Windows)",
      "/Title": "Microsoft Word - ANSSI-CC-2022_20fr",
      "pdf_file_size_bytes": 307737,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 16
    },
    "st_filename": "anssi-cible-cc-2022_20en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDH": {
            "ECDH": 4
          },
          "ECDSA": {
            "ECDSA": 2
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 4
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1110-V4-2021": 2,
          "BSI-DSZ-CC-S-0153": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.CGA": 4,
          "A.CSP": 4,
          "A.SCA": 4
        },
        "OE": {
          "OE.HID_VAD": 12,
          "OE.HI_VAD": 1
        },
        "T": {
          "T.RND": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0059-2009-MA-01": 1,
          "BSI-CC-PP- 0084-2014": 1,
          "BSI-CC-PP-0055-2009": 1,
          "BSI-CC-PP-0056-V2-2012": 1,
          "BSI-CC-PP-0059-2009-MA-01": 2,
          "BSI-CC-PP-0068": 3,
          "BSI-CC-PP-0068-V2-2011-MA-01": 1,
          "BSI-CC-PP-0071": 2,
          "BSI-CC-PP-0072": 2,
          "BSI-CC-PP-0075": 3,
          "BSI-CC-PP-0076": 2,
          "BSI-CC-PP-0084-2014": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 7,
          "ADV_FSP.4": 3,
          "ADV_FUN.1": 3,
          "ADV_IMP.1": 6,
          "ADV_TDS.3": 6
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE": 1,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMS.5": 7,
          "ALC_DVS.2": 7,
          "ALC_FLR.1": 8,
          "ALC_TAT.2": 7
        },
        "ASE": {
          "ASE_CCL": 2,
          "ASE_COMP.1": 1,
          "ASE_ECD": 2,
          "ASE_INT": 2,
          "ASE_REQ": 2,
          "ASE_SPD": 3,
          "ASE_TSS": 2
        },
        "ATE": {
          "ATE_DPT.1": 1,
          "ATE_DPT.2": 8
        },
        "AVA": {
          "AVA_VAN.5": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 6+": 1,
          "EAL4": 16,
          "EAL4 augmented": 3,
          "EAL4+": 1,
          "EAL6": 2,
          "EAL6 augmented": 2,
          "EAL6+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_SAS.1": 1
        },
        "FCS": {
          "FCS_CKM": 55,
          "FCS_CKM.1": 14,
          "FCS_CKM.2": 7,
          "FCS_CKM.4": 29,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 62,
          "FCS_COP.1": 12,
          "FCS_ITC": 1,
          "FCS_RNG.1": 1
        },
        "FDP": {
          "FDP_ACC": 59,
          "FDP_ACC.1": 36,
          "FDP_ACF": 44,
          "FDP_ACF.1": 31,
          "FDP_AFC": 1,
          "FDP_DAU": 9,
          "FDP_DAU.1": 2,
          "FDP_DAU.2": 2,
          "FDP_IFC.1": 21,
          "FDP_ITC": 11,
          "FDP_ITC.1": 19,
          "FDP_ITC.2": 10,
          "FDP_ITT.1": 2,
          "FDP_RIP.1": 6,
          "FDP_RIP.1.1": 1,
          "FDP_SDI": 19,
          "FDP_SDI.1": 3,
          "FDP_SDI.2": 5,
          "FDP_UCT": 9,
          "FDP_UCT.1": 3,
          "FDP_UIT": 6,
          "FDP_UIT.1": 3
        },
        "FIA": {
          "FIA_AFL": 15,
          "FIA_AFL.1": 5,
          "FIA_AFL.1.1": 2,
          "FIA_API": 4,
          "FIA_API.1": 11,
          "FIA_API.1.1": 3,
          "FIA_UAU.1": 17,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UID.1": 20,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_LIM.1": 1,
          "FMT_LIM.2": 1,
          "FMT_MOF.1": 7,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 72,
          "FMT_MSA.1": 14,
          "FMT_MSA.2": 6,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 21,
          "FMT_MSA.4": 2,
          "FMT_MTD": 14,
          "FMT_MTD.1": 3,
          "FMT_SMF.1": 32,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 36,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_EMS": 31,
          "FPT_EMS.1": 11,
          "FPT_EMS.1.1": 2,
          "FPT_EMS.1.2": 2,
          "FPT_FLS": 1,
          "FPT_FLS.1": 13,
          "FPT_FLS.1.1": 1,
          "FPT_ITT.1": 1,
          "FPT_PHP.1": 9,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 16,
          "FPT_PHP.3.1": 2,
          "FPT_TST": 1,
          "FPT_TST.1": 12,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1,
          "FPT_TST.2": 1
        },
        "FRU": {
          "FRU_FLT.2": 1
        },
        "FTP": {
          "FTP_ICT": 3,
          "FTP_ITC": 51,
          "FTP_ITC.1": 16,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {
        "OutOfScope": {
          "antenna and card body / booklet are irrelevant for the secure operation of the TOE and therefore out of scope. 2.3.6 TOE Components The TOE consists of the following components: Category Definition Secure Chip": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 35
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 4
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "NIST P-256": 1,
          "NIST P-384": 1,
          "NIST P-521": 1,
          "P-256": 1,
          "P-384": 1,
          "P-521": 1
        }
      },
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1,
          "Malfunction": 2,
          "fault injection": 1,
          "malfunction": 3,
          "physical tampering": 6
        },
        "SCA": {
          "DPA": 1,
          "Leak-Inherent": 2,
          "SPA": 1,
          "physical probing": 1,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS 186-4": 1,
          "FIPS 197": 1,
          "FIPS PUB 180-4": 3,
          "FIPS PUB 186-4": 1
        },
        "ICAO": {
          "ICAO": 3
        },
        "ISO": {
          "ISO/IEC 10116:2006": 1,
          "ISO/IEC 15408": 2,
          "ISO/IEC 18013": 2,
          "ISO/IEC 7816-3": 1,
          "ISO/IEC 7816-4": 1,
          "ISO/IEC 7816-8": 1,
          "ISO/IEC 7816-9": 1,
          "ISO/IEC14443": 2,
          "ISO/IEC7816-3": 1
        },
        "PKCS": {
          "PKCS#3": 2
        },
        "RFC": {
          "RFC 5639": 1,
          "RFC-5639": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 20
          }
        },
        "DES": {
          "3DES": {
            "3DES": 4,
            "TDES": 6,
            "Triple-DES": 1
          },
          "DES": {
            "DES": 4
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 2
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03111": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 12,
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Austria Card Ges.m.b.H. - Thomas Aichinger",
      "/CreationDate": "D:20220511135157+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2013",
      "/ModDate": "D:20220511135157+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2013",
      "/Subject": "ACOS-IDv2.0 SSCD",
      "/Title": "Security Target",
      "pdf_file_size_bytes": 3190425,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 94
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_20fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ATE_DPT.2",
      "ALC_CMS.5",
      "ALC_DVS.2",
      "EAL4+",
      "ALC_TAT.2",
      "ALC_FLR.1",
      "AVA_VAN.5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_20en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "46a150eb5ba56ed431accadff74ef96290e8bc108b24491e25f3e3c3dc3b4f25",
      "txt_hash": "f864a8267f3d0c04dde3c99c22686497a8f4a6adeb821fd3bd771895b0c02dfe"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "586b3e01fa6e3e7629371351de5ed0f84649ad148a9a8085bc87dfe40e4813fa",
      "txt_hash": "3749e71a1cfb31a21133b66e143fdd587f0aa3401589b16802a9144b21f26037"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "ce95e5a2b7eef7c0757a6f6c4307f2fc4608e7f74474263e6ee57af287ea2769",
      "txt_hash": "f020022d21c8077ab9c4e4ee817b522999691762749347091151f97d7a758900"
    }
  },
  "status": "active"
}