SafeSign IC PKI applet on JCOP 4 P71 eIDAS QSCD 3.0.1.12, 3.0.1.13 and 3.0.1.14

CSV information ?

Status active
Valid from 30.09.2024
Valid until 30.09.2029
Scheme 🇳🇱 NL
Manufacturer A.E.T. Europe B.V.
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL4+, AVA_VAN.5
Protection profiles

Heuristics summary ?

Certificate ID: NSCIB-CC-2400004-01-CR

Certificate ?

Extracted keywords

Operating System name
JCOP 4

Security level
EAL4, EAL2, EAL7, EAL4 augmented
Claims
A.E
Security Assurance Requirements (SAR)
ALC_FLR.3, ALC_FLR, AVA_VAN.5
Protection profiles
BSI-CC-PP-0059-, BSI-CC-PP-0075-
Certificates
NSCIB-CC-2400004-01, NSCIB-2400004-01, CC-21-0274076
Evaluation facilities
Riscure

Standards
ISO/IEC 15408-1, ISO/IEC 18045, ISO/IEC 18045:2008

File metadata

Title NSCIB Certificate
Author Haak
Creation date D:20241013191320+01'00'
Modification date D:20241013191320+01'00'
Pages 1
Creator Microsoft® Word 2021
Producer Microsoft® Word 2021

Certification report ?

Extracted keywords

Asymmetric Algorithms
ECC

Operating System name
JCOP 4
Vendor
NXP

Security level
EAL4, EAL4+, EAL 4, EAL6+, EAL4 augmented, EAL 4 augmented
Claims
A.E
Security Assurance Requirements (SAR)
AVA_VAN.5
Certificates
NSCIB-CC-2400004-01-CR, NSCIB-2400004-01, CC-21-0274076, NSCIB-CC-2300172-01
Evaluation facilities
Riscure

Side-channel analysis
JIL, JIL-AAPS, JHAS

Standards
PKCS#15

File metadata

Title Certification Report
Author Haak
Creation date D:20241014092451+01'00'
Modification date D:20241014092451+01'00'
Pages 13
Creator Microsoft® Word 2021
Producer Microsoft® Word 2021

Frontpage

Certificate ID NSCIB-CC-2400004-01-CR
Certified item SafeSign IC PKI applet on JCOP 4 P71 eIDAS QSCD 3.0.1.12, 3.0.1.13 and 3.0.1.14
Certification lab Riscure B.V.
Developer A.E.T. Europe B.V

References

Outgoing
  • NSCIB-CC-2300172-01-CR - active - NXP JCOP 4 P71 v4.7 R1.00.4, JCOP 4 P71 v4.7 R1.01.4, JCOP 4 P71 v4.7 R1.02.4, JCOP 4 SE050 v4.7 R2.00.11, JCOP 4 SE050 v4.7 R2.03.11

Security target ?

Extracted keywords

Asymmetric Algorithms
ECDSA, ECC
Schemes
MAC
Randomness
RNG, RND

JavaCard versions
Java Card 2.1.1, Java Card 2.2
Operating System name
JCOP 4, JCOP4
Vendor
NXP, Microsoft

Security level
EAL6, EAL4, EAL4 augmented
Claims
T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS, T.SID, T.EXE-CODE, T.NATIVE, T.MODULE_EXEC, T.RESOURCES, T.UNAUTHORIZED_CARD_MNGT, T.COM_EXPLOIT, T.LIFE_CYCLE, T.OBJ-DELETION, T.PHYSICAL, T.OS_OPERATE, T.RND, T.CONFIG, T.SEC_BOX_BORDER, T.MODULE_REPLACEMENT, T.ATTACK_COUNTER, A.E, A.APPLET, A.VERIFICATION, A.USE_DIAG, A.SCA, A.USE_KEYS, A.CGA, A.CSP, A.APPS-PROVIDER, A.VERIFICATION-AUTHORITY, OT.SID, OT.SID_MODULE, OT.FIREWALL, OT.GLOBAL_ARRAYS_CONFID, OT.GLOBAL_ARRAYS_INTEG, OT.NATIVE, OT.OPERATE, OT.REALLOCATION, OT.RESOURCES, OT.SENSITIVE_RESULTS_INTEG, OT.ALARM, OT.CIPHER, OT.RNG, OT.KEY-MNGT, OT.PIN-MNGT, OT.TRANSACTION, OT.OBJ-DELETION, OT.APPLI-AUTH, OT.DOMAIN-RIGHTS, OT.COMM_AUTH, OT.COMM_INTEGRITY, OT.COMM_CONFIDENTIALITY, OT.EXT-MEM, OT.CARD-MANAGEMENT, OT.SCP, OT.IDENTIFICATION, OT.SEC_BOX_FW, OT.RND, OT.CARD-CONFIGURATION, OT.ATTACK-COUNTER, OT.RESTRICTED-MODE, OE.APPLET, OE.VERIFICATION, OE.CODE-EVIDENCE, OE.APPS-PROVIDER, OE.VERIFICATION-AUTHORITY, OE.KEY-CHANGE, OE.SECURITY-DOMAINS, OE.USE_DIAG, OE.USE_KEYS, OE.PROCESS_SEC_IC, OE.HID_VAD, OSP.VERIFICATION, OSP.PROCESS-TOE, OSP.KEY-CHANGE, OSP.SECURITY-DOMAINS, OSP.SECURE-BOX
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_SAS, FAU_GEN, FCO_NRO, FCS_CKM.1, FCS_CKM, FCS_CKM.4, FCS_COP.1, FCS_COP, FCS_RNG.1, FCS_RNG, FCS_CKM.2, FCS_CKM.3, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_ACC, FDP_ACF, FDP_IFC, FDP_IFF, FDP_RIP, FDP_RIP.1, FDP_ROL, FDP_SDI, FDP_UIT, FDP_ITC, FDP_ITC.1, FDP_ITC.2, FDP_ACF.1, FDP_ACC.1, FDP_IFC.1, FDP_UCT, FDP_UCT.1, FDP_RIP.1.1, FDP_SDI.1, FDP_SDI.2, FIA_ATD, FIA_UID, FIA_USB, FIA_UAU, FIA_AFL, FIA_AFL.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_AFL.1.1, FIA_AFL.1.2, FMT_MSA, FMT_MTD, FMT_SMR, FMT_SMF, FMT_MSA.3, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4, FMT_MSA.4.1, FMT_MTD.1, FMT_MOF, FPR_UNO.1, FPT_EMS, FPT_EMS.1, FPT_FLS.1, FPT_PHP.1, FPT_TDC.1, FPT_FLS, FPT_RCV, FPT_PHP.3, FPT_EMS.1.1, FPT_EMS.1.2, FPT_TST.1, FPT_FLS.1.1, FPT_TST, FPT_PHP, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP-0059-2009-MA-02, BSI-CC-PP-0075-2012-MA-01, BSI-CC-PP-0059-2009-
Certificates
NSCIB-CC-2300172-01

Side-channel analysis
physical probing, side channel, SPA, DPA, timing attacks, physical tampering, fault injection

Standards
PKCS #11, PKCS#15, PKCS#1, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004
Technical reports
BSI TR-02102-1

File metadata

Keywords for W2010 with macros
Author Arjan Jeckmans
Creation date D:20240927164546+02'00'
Modification date D:20240927164546+02'00'
Pages 47
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

References

Outgoing
  • NSCIB-CC-2300172-01-CR - active - NXP JCOP 4 P71 v4.7 R1.00.4, JCOP 4 P71 v4.7 R1.01.4, JCOP 4 P71 v4.7 R1.02.4, JCOP 4 SE050 v4.7 R2.00.11, JCOP 4 SE050 v4.7 R2.03.11

Heuristics ?

Certificate ID: NSCIB-CC-2400004-01-CR

Extracted SARs

ASE_CCL.1, ALC_DEL.1, ALC_CMC.4, ATE_DPT.1, AVA_VAN.5, ATE_FUN.1, ATE_IND.2, ADV_ARC.1, ADV_TDS.3, ASE_SPD.1, ASE_REQ.2, ALC_CMS.4, ADV_IMP.1, ALC_TAT.1, ASE_TSS.2, ATE_COV.2, AGD_OPE.1, ALC_DVS.1, ASE_ECD.1, ADV_FSP.4, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ALC_FLR.1, ASE_OBJ.2

Similar certificates

Name Certificate ID
A.E.T. SafeSign IC PKI applet on JCOP 4 P71 eIDAS QSCD v3.0.1.12 NSCIB-CC-0274076-CR Compare
A.E.T. SafeSign IC PKI applet on JCOP 3 P60 eIDAS QSCD v3.0.1.11 NSCIB-CC-224791-CR2 Compare
Ricoh imagio MP C5002A SP/C4002A SP all of above with Facsimile Function Version: - Software: System/Copy 1.05.4, Network Support 11.77, Fax 02.00.00, RemoteFax 02.00.00, NetworkDocBox 1.04, Web Support 1.07, Web Uapl 1.03, animation 1.00, Scanner 01.09, Printer 1.05.1, RPCS 3.12.23, RPCS Font 1.03, Data Erase Onb 1.01x, GWFCU3.5-4(WW) 01.00.04, Engine 0.16:02, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware: Ic Key 01020700, Ic Ctlr 03 JISEC-CC-CRP-C0354 Compare
Ricoh imagio MP C3302 SP/C3302 SPF/C2802 SP/C2802 SPF all of above with Facsimile Function Version: - Software: System/Copy 1.05.4, Network Support 11.77, Fax 02.00.00, RemoteFax 02.00.00, NetworkDocBox 1.04, Web Support 1.07, Web Uapl 1.03, animation 1.00, Scanner 01.09, Printer 1.05.1, RPCS 3.12.23, RPCS Font 1.03, Data Erase Onb 1.01x, GWFCU3.5-4(WW) 01.00.04, Engine 0.16:04, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware: Ic Key 01020700, Ic Ctlr 03 JISEC-CC-CRP-C0352 Compare
Ricoh imagio MP C5002 SP/C5002 SPF/C4002 SP/C4002 SPF all of above with Facsimile Function Version: - Software: System/Copy 1.05.4, Network Support 11.77, Fax 02.00.00, RemoteFax 02.00.00, NetworkDocBox 1.04, Web Support 1.07, Web Uapl 1.03, animation 1.00, Scanner 01.09, Printer 1.05.1, RPCS 3.12.23, RPCS Font 1.03, Data Erase Onb 1.01x, GWFCU3.5-4(WW) 01.00.04, Engine 0.16:04, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware: Ic Key 01020700, Ic Ctlr 03 JISEC-CC-CRP-C0356 Compare
ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52) (ANSSI-CC-2023/12-R01) ANSSI-CC-2023/12-R01 Compare
Showing 5 out of 6.

Scheme data ?

Cert Id NSCIB-CC-2400004-01-CR
Certification Date 30.09.2024
Status Issued
Product SafeSign IC PKI applet on JCOP 4 P71 eIDAS QSCD 3.0.1.12, 3.0.1.13 and 3.0.1.14
Developer A.E.T. Europe B.V.
Evaluation Facility Riscure
Level EAL4+ AVA_VAN.5
Cert Link https://trustcb.com/download/?wpdmdl=4513
Report Link https://trustcb.com/download/?wpdmdl=4514
Target Link https://trustcb.com/download/?wpdmdl=4515

References ?

Updates ?

  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'product': 'SafeSign IC PKI applet on JCOP 4 P71 eIDAS QSCD 3.0.1.12, 3.0.1.13 and 3.0.1.14', 'cert_id': 'NSCIB-CC-2400004-01-CR', 'level': 'EAL4+ AVA_VAN.5', 'cert_link': 'https://trustcb.com/download/?wpdmdl=4513', 'report_link': 'https://trustcb.com/download/?wpdmdl=4514', 'target_link': 'https://trustcb.com/download/?wpdmdl=4515'} data.
  • 30.10.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name SafeSign IC PKI applet on JCOP 4 P71 eIDAS QSCD 3.0.1.12, 3.0.1.13 and 3.0.1.14 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400004-01-Cert.pdf",
  "dgst": "9b4f91dc748da889",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "NSCIB-CC-2400004-01-CR",
    "cert_lab": [
      ""
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "3.0.1.13",
        "3.0.1.14",
        "3.0.1.12"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2300172-01-CR"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1136-2021",
          "BSI-DSZ-CC-1136-V3-2022",
          "BSI-DSZ-CC-1136-V2-2022",
          "NSCIB-CC-2300172-01-CR",
          "BSI-DSZ-CC-1136-V4-2024"
        ]
      }
    },
    "scheme_data": {
      "cert_id": "NSCIB-CC-2400004-01-CR",
      "cert_link": "https://trustcb.com/download/?wpdmdl=4513",
      "certification_date": "2024-09-30",
      "developer": "A.E.T. Europe B.V.",
      "evaluation_facility": "Riscure",
      "level": "EAL4+ AVA_VAN.5",
      "product": "SafeSign IC PKI applet on JCOP 4 P71 eIDAS QSCD 3.0.1.12, 3.0.1.13 and 3.0.1.14",
      "report_link": "https://trustcb.com/download/?wpdmdl=4514",
      "status": "Issued",
      "target_link": "https://trustcb.com/download/?wpdmdl=4515"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2300172-01-CR"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1136-V4-2024",
          "NSCIB-CC-2300172-01-CR"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "A.E.T. Europe B.V.",
  "manufacturer_web": "https://aeteurope.com",
  "name": "SafeSign IC PKI applet on JCOP 4 P71 eIDAS QSCD 3.0.1.12, 3.0.1.13 and 3.0.1.14",
  "not_valid_after": "2029-09-30",
  "not_valid_before": "2024-09-30",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "NSCIB-CC-2400004-01-Cert.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "NL": {
          "CC-21-0274076": 1,
          "NSCIB-2400004-01": 1,
          "NSCIB-CC-2400004-01": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.E": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0059-": 1,
          "BSI-CC-PP-0075-": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 1,
          "ALC_FLR.3": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL4": 1,
          "EAL4 augmented": 1,
          "EAL7": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Riscure": {
          "Riscure": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 4": 1
        }
      },
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408-1": 2,
          "ISO/IEC 18045": 4,
          "ISO/IEC 18045:2008": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Haak",
      "/CreationDate": "D:20241013191320+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2021",
      "/ModDate": "D:20241013191320+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2021",
      "/Title": "NSCIB Certificate",
      "pdf_file_size_bytes": 89456,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.tuv-nederland.nl/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "NSCIB-CC-2400004-01-CR.pdf",
    "report_frontpage": {
      "NL": {
        "cert_id": "NSCIB-CC-2400004-01-CR",
        "cert_item": "SafeSign IC PKI applet on JCOP 4 P71 eIDAS QSCD 3.0.1.12, 3.0.1.13 and 3.0.1.14",
        "cert_lab": " Riscure B.V.",
        "developer": "A.E.T. Europe B.V"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          }
        }
      },
      "cc_cert_id": {
        "NL": {
          "CC-21-0274076": 1,
          "NSCIB-2400004-01": 1,
          "NSCIB-CC-2300172-01": 1,
          "NSCIB-CC-2400004-01-CR": 13
        }
      },
      "cc_claims": {
        "A": {
          "A.E": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "AVA": {
          "AVA_VAN.5": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL 4 augmented": 1,
          "EAL4": 2,
          "EAL4 augmented": 1,
          "EAL4+": 1,
          "EAL6+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Riscure": {
          "Riscure": 5
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 4": 24
        }
      },
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "other": {
          "JHAS": 1,
          "JIL": 2,
          "JIL-AAPS": 1
        }
      },
      "standard_id": {
        "PKCS": {
          "PKCS#15": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 2
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Haak",
      "/CreationDate": "D:20241014092451+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2021",
      "/ModDate": "D:20241014092451+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2021",
      "/Title": "Certification Report",
      "pdf_file_size_bytes": 307735,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:[email protected]",
          "https://nscib.nl/",
          "https://www.sogis.eu/",
          "https://trustcb.com/common-criteria/nscib/",
          "http://www.commoncriteriaportal.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 13
    },
    "st_filename": "NSCIB-CC-2400004-01-ST_v1.23.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 8
          },
          "ECDSA": {
            "ECDSA": 2
          }
        }
      },
      "cc_cert_id": {
        "NL": {
          "NSCIB-CC-2300172-01": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.APPLET": 1,
          "A.APPS-PROVIDER": 1,
          "A.CGA": 4,
          "A.CSP": 4,
          "A.E": 8,
          "A.SCA": 4,
          "A.USE_DIAG": 1,
          "A.USE_KEYS": 1,
          "A.VERIFICATION": 1,
          "A.VERIFICATION-AUTHORITY": 1
        },
        "OE": {
          "OE.APPLET": 1,
          "OE.APPS-PROVIDER": 1,
          "OE.CODE-EVIDENCE": 1,
          "OE.HID_VAD": 3,
          "OE.KEY-CHANGE": 1,
          "OE.PROCESS_SEC_IC": 1,
          "OE.SECURITY-DOMAINS": 1,
          "OE.USE_DIAG": 1,
          "OE.USE_KEYS": 1,
          "OE.VERIFICATION": 1,
          "OE.VERIFICATION-AUTHORITY": 1
        },
        "OSP": {
          "OSP.KEY-CHANGE": 1,
          "OSP.PROCESS-TOE": 1,
          "OSP.SECURE-BOX": 1,
          "OSP.SECURITY-DOMAINS": 1,
          "OSP.VERIFICATION": 1
        },
        "OT": {
          "OT.ALARM": 1,
          "OT.APPLI-AUTH": 1,
          "OT.ATTACK-COUNTER": 1,
          "OT.CARD-CONFIGURATION": 1,
          "OT.CARD-MANAGEMENT": 1,
          "OT.CIPHER": 1,
          "OT.COMM_AUTH": 1,
          "OT.COMM_CONFIDENTIALITY": 1,
          "OT.COMM_INTEGRITY": 1,
          "OT.DOMAIN-RIGHTS": 1,
          "OT.EXT-MEM": 1,
          "OT.FIREWALL": 1,
          "OT.GLOBAL_ARRAYS_CONFID": 1,
          "OT.GLOBAL_ARRAYS_INTEG": 1,
          "OT.IDENTIFICATION": 1,
          "OT.KEY-MNGT": 1,
          "OT.NATIVE": 1,
          "OT.OBJ-DELETION": 1,
          "OT.OPERATE": 1,
          "OT.PIN-MNGT": 1,
          "OT.REALLOCATION": 1,
          "OT.RESOURCES": 1,
          "OT.RESTRICTED-MODE": 1,
          "OT.RND": 1,
          "OT.RNG": 1,
          "OT.SCP": 3,
          "OT.SEC_BOX_FW": 1,
          "OT.SENSITIVE_RESULTS_INTEG": 1,
          "OT.SID": 1,
          "OT.SID_MODULE": 1,
          "OT.TRANSACTION": 1
        },
        "T": {
          "T.ATTACK_COUNTER": 1,
          "T.COM_EXPLOIT": 1,
          "T.CONFID-APPLI-DATA": 1,
          "T.CONFID-JCS-CODE": 1,
          "T.CONFID-JCS-DATA": 1,
          "T.CONFIG": 1,
          "T.EXE-CODE": 2,
          "T.INTEG-APPLI-CODE": 2,
          "T.INTEG-APPLI-DATA": 2,
          "T.INTEG-JCS": 1,
          "T.INTEG-JCS-CODE": 1,
          "T.LIFE_CYCLE": 1,
          "T.MODULE_EXEC": 1,
          "T.MODULE_REPLACEMENT": 1,
          "T.NATIVE": 1,
          "T.OBJ-DELETION": 1,
          "T.OS_OPERATE": 1,
          "T.PHYSICAL": 1,
          "T.RESOURCES": 1,
          "T.RND": 1,
          "T.SEC_BOX_BORDER": 1,
          "T.SID": 2,
          "T.UNAUTHORIZED_CARD_MNGT": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0059-2009-": 1,
          "BSI-CC-PP-0059-2009-MA-02": 1,
          "BSI-CC-PP-0075-2012-MA-01": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR.1": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 4,
          "EAL4 augmented": 3,
          "EAL6": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 1,
          "FAU_GEN": 1,
          "FAU_SAS": 1
        },
        "FCO": {
          "FCO_NRO": 1
        },
        "FCS": {
          "FCS_CKM": 14,
          "FCS_CKM.1": 4,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.2": 3,
          "FCS_CKM.3": 1,
          "FCS_CKM.4": 8,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 11,
          "FCS_COP.1": 3,
          "FCS_COP.1.1": 2,
          "FCS_RNG": 1,
          "FCS_RNG.1": 1
        },
        "FDP": {
          "FDP_ACC": 26,
          "FDP_ACC.1": 14,
          "FDP_ACF": 26,
          "FDP_ACF.1": 20,
          "FDP_IFC": 4,
          "FDP_IFC.1": 6,
          "FDP_IFF": 4,
          "FDP_ITC": 6,
          "FDP_ITC.1": 6,
          "FDP_ITC.2": 3,
          "FDP_RIP": 9,
          "FDP_RIP.1": 4,
          "FDP_RIP.1.1": 1,
          "FDP_ROL": 2,
          "FDP_SDI": 12,
          "FDP_SDI.1": 2,
          "FDP_SDI.2": 4,
          "FDP_UCT": 6,
          "FDP_UCT.1": 1,
          "FDP_UIT": 1
        },
        "FIA": {
          "FIA_AFL": 4,
          "FIA_AFL.1": 4,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD": 2,
          "FIA_UAU": 5,
          "FIA_UAU.1": 4,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UID": 7,
          "FIA_UID.1": 6,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB": 2
        },
        "FMT": {
          "FMT_MOF": 1,
          "FMT_MOF.1": 3,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 37,
          "FMT_MSA.1": 5,
          "FMT_MSA.2": 3,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 8,
          "FMT_MSA.3.1": 2,
          "FMT_MSA.3.2": 1,
          "FMT_MSA.4": 3,
          "FMT_MSA.4.1": 2,
          "FMT_MTD": 12,
          "FMT_MTD.1": 2,
          "FMT_SMF": 10,
          "FMT_SMF.1": 8,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 6,
          "FMT_SMR.1": 10,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO.1": 1
        },
        "FPT": {
          "FPT_EMS": 7,
          "FPT_EMS.1": 10,
          "FPT_EMS.1.1": 3,
          "FPT_EMS.1.2": 3,
          "FPT_FLS": 7,
          "FPT_FLS.1": 5,
          "FPT_FLS.1.1": 1,
          "FPT_PHP": 6,
          "FPT_PHP.1": 5,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 4,
          "FPT_PHP.3.1": 1,
          "FPT_RCV": 1,
          "FPT_TDC.1": 1,
          "FPT_TST": 2,
          "FPT_TST.1": 5,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 7,
          "FTP_ITC.1": 4,
          "FTP_TRP.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {
        "JavaCard": {
          "Java Card 2.1.1": 1,
          "Java Card 2.2": 1
        }
      },
      "os_name": {
        "JCOP": {
          "JCOP 4": 76,
          "JCOP4": 2
        }
      },
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 2,
          "RNG": 5
        }
      },
      "side_channel_analysis": {
        "FI": {
          "fault injection": 1,
          "physical tampering": 5
        },
        "SCA": {
          "DPA": 1,
          "SPA": 1,
          "physical probing": 2,
          "side channel": 1,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "PKCS": {
          "PKCS #11": 2,
          "PKCS#1": 2,
          "PKCS#15": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {
        "BSI": {
          "BSI TR-02102-1": 8
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 1
        },
        "NXP": {
          "NXP": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Arjan Jeckmans",
      "/CreationDate": "D:20240927164546+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/Keywords": "for W2010 with macros",
      "/MSIP_Label_01058f84-91de-4d5a-b21e-3d9ad6e73d65_Enabled": "True",
      "/MSIP_Label_01058f84-91de-4d5a-b21e-3d9ad6e73d65_Method": "Privileged",
      "/MSIP_Label_01058f84-91de-4d5a-b21e-3d9ad6e73d65_SiteId": "e0509b6d-dd1e-4bcc-b337-62dfde0e2112",
      "/ModDate": "D:20240927164546+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 919813,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.aeteurope.com/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 47
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "PP_SSCD_PART3_V1.0.2"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf",
        "pp_name": "Protection profiles for secure signature creation device - Part 3: Device with key import"
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf",
        "pp_name": "Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version..."
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400004-01-CR.pdf",
  "scheme": "NL",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_VAN.5",
      "EAL4+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400004-01-ST_v1.23.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "dd9a7d62c33cad3e7f7d3e4a1c373f3c0528960354901888b0434abb42275fd9",
      "txt_hash": "10962902ae503e7a0a71eb54be62efdd4850bc5cecfb5615eee04a8ff240ab2c"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "df79ba4115824efc771b378cd80a4c296c3a3f5d8ed200beb94c21c541a2fe13",
      "txt_hash": "891ab6bff9f44e049f1a8dc8c9cc479b86242e888b1f35d12f0db8e87081ba73"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "454bd5e55d76dd2e3704071982f58bf612e4885086b2501cf3e7472aa47d335f",
      "txt_hash": "d18585d6c4e65c9a7ad9d2b26b23f99abe1e4a3fef34566dfd5d44205982ed71"
    }
  },
  "status": "active"
}