Microcontrôleur sécurisé ATMEL AT91SC464384RCU

CSV information ?

Status archived
Valid from 17.12.2008
Valid until 01.09.2019
Scheme 🇫🇷 FR
Manufacturer ATMEL Secure Products Division
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_DVS.2, AVA_MSU.3, EAL4+, AVA_VLA.4, ADV_IMP.2
Maintenance updates Rapport de maintenance ANSSI-CC-2008/36-M01 (19.03.2010) Certification report

Heuristics summary ?

Certificate ID: ANSSI-CC-2008/36

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
DES, TDES
Asymmetric Algorithms
ECC, DSA
Hash functions
SHA-1
Randomness
RNG

Device models
ATMEL AT91SC464384RCU
Vendor
Infineon Technologies, Thales, Philips

Security level
EAL 4, EAL4, EAL7, EAL 1, EAL 3, EAL 5, EAL 7, EAL5+, ITSEC E6 et
Security Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL, ADO_IGS, ADV_IMP.2, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_FLR, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_VLA.4, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA
Protection profiles
BSI-PP-002-2001, BSI-PP-0002-2001
Certificates
DCSSI-2008/36
Evaluation facilities
CESTI

Standards
AIS 34, AIS34, ISO/IEC 15408:2005, ISO/IEC 18045:2005, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004

File metadata

Creation date D:20081218150123Z
Modification date D:20091110144948+01'00'
Pages 18
Creator PScript5.dll Version 5.2.2
Producer GPL Ghostscript 8.15

Security target ?

Extracted keywords

Symmetric Algorithms
DES, TDES
Asymmetric Algorithms
ECC, DSA
Hash functions
SHA-1
Schemes
MAC
Randomness
RNG, RND
Libraries
Atmel Toolbox 28, Atmel Toolbox 02.03.12.00

Vendor
Thales

Security level
EAL4, EAL4+, EAL4 augmented
Claims
D.CPU_ROM_DATA, D.CRYPTO_ROM_DATA, D.EEPROM_DATA, D.CPU_RAM_DATA, D.ADVX_RAM_DATA, D.PERIPH_DATA, D.CPU_ROM_SOFT, D.CRYPTO_ROM_SOFT, D.EEPROM_SOFT, D.CPU_ROM_DSOFT, D.CRYPTO_ROM_DSOFT, D.EEPROM_DSOFT, D.RNG_DATA, D.IC_SPEC, D.DESIGN, D.DEV_TOOLS, D.TECHNO, D.MASK, D.CRYPTO_RAM_DATA, O.RND, T.RND
Security Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ADO_DEL, ADO_IGS, ADO_DEL.2, ADO_IGS.1, ADV_IMP.2, ADV_SPM.1, ADV_FSP, ADV_HLD, ADV_IMP, ADV_LLD, ADV_RCR, ADV_SPM, ADV_FSP.2, ADV_HLD.2, ADV_LLD.1, ADV_RCR.2, ADV_SPM.2, AGD_ADM, AGD_USR, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ALC_LCD.2, ALC_TAT.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_VLA.4, AVA_MSU.3, AVA_MSU, AVA_SOF, AVA_VLA, AVA_CCA.1, AVA_SOF.1
Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS.1.1, FCS_RND.1, FCS_COP.1, FCS_RND.1.1, FCS_COP.1.1, FCS_CKM.1, FCS_CKM.4, FDP_ITT.1, FDP_IFC.1, FDP_ACC.2, FDP_ACF.1, FDP_ITT.1.1, FDP_ACC.1, FDP_IFC.1.1, FDP_IFF.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.2.1, FDP_ACC.2.2, FDP_AFC.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FIA_UID.1, FMT_LIM.1, FMT_LIM.2, FMT_SMR.1, FMT_MSA.1, FMT_MOF.1, FMT_MSA.3, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.2, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF.1.1, FMT_SMF.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FPT_FLS.1, FPT_SEP.1, FPT_ITT.1, FPT_PHP.3, FPT_FLS.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_ITT.1.1, FPT_PHP.3.1, FRU_FLT.2
Protection profiles
BSI-PP-002-2001, BSI-PP-002-, BSI-PP002-2001

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, Physical probing, SPA, DPA, Malfunction, malfunction, reverse engineering

Standards
FIPS140-2, FIPS PUB 46-3, FIPS 140-2, ISO/IEC 3309

File metadata

Title Lightbird_ST.book
Author sc188jb
Creation date D:20081030162507Z
Modification date D:20081030163012Z
Pages 77
Creator FrameMaker 6.0
Producer Acrobat Distiller 8.1.0 (Windows)

Heuristics ?

Certificate ID: ANSSI-CC-2008/36

Extracted SARs

ADV_FSP.2, ADV_HLD.2, ADV_IMP.2, ADV_LLD.1, ADV_RCR.2, ADV_SPM.2, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_LCD.2, ALC_TAT.2, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_CCA.1, AVA_MSU.3, AVA_SOF.1, AVA_VLA.4

Scheme data ?

Product Microcontrôleurs sécurisés ATMEL AT91SC464384RCU (AT58U21) rév. B
Url https://cyber.gouv.fr/produits-certifies/microcontroleurs-securises-atmel-at91sc464384rcu-at58u21-rev-b
Description Le microcontrôleur sécurisé 32 bits, portant la référence commerciale AT91SC464384RCU, issu de la famille AT91SC des composants pour cartes à puce, correspond à la puce de référence AT58U21, en révision B, basée sur le coeur ARM SC100. Les microcontrôleurs AT91SC464384RCU sont plutôt destinés à des cartes à puce supportant des applications de types bancaire, transactions sécurisées, télévision à p
Sponsor Atmel SMS
Developer Atmel SMS
Cert Id ANSSI-CC-2008/36
Level EAL4+
Enhanced
Cert Id ANSSI-CC-2008/36
Certification Date 17.12.2008
Category Micro-circuits
Cc Version Critères Communs version 2.3
Developer Atmel SMS
Sponsor Atmel SMS
Evaluation Facility CEACI
Level EAL4+
Protection Profile BSI-PP-0002-2001
Mutual Recognition SOG-IS CCRA
Augmented ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4
Target Link https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2008-36en.pdf
Report Link https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2008-36fr.pdf

References ?

No references are available for this certificate.

Updates ?

  • 16.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Microcontrôleurs sécurisés ATMEL AT91SC464384RCU (AT58U21) rév. B', 'url': 'https://cyber.gouv.fr/produits-certifies/microcontroleurs-securises-atmel-at91sc464384rcu-at58u21-rev-b', 'description': 'Le microcontrôleur sécurisé 32 bits, portant la référence commerciale AT91SC464384RCU, issu de la famille AT91SC des composants pour cartes à puce, correspond à la puce de référence AT58U21, en révision B, basée sur le coeur ARM SC100. Les microcontrôleurs AT91SC464384RCU sont plutôt destinés à des cartes à puce supportant des applications de types bancaire, transactions sécurisées, télévision à p', 'sponsor': 'Atmel SMS', 'developer': 'Atmel SMS', 'cert_id': 'ANSSI-CC-2008/36', 'level': 'EAL4+', 'enhanced': {'cert_id': 'ANSSI-CC-2008/36', 'certification_date': '2008-12-17', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 2.3', 'developer': 'Atmel SMS', 'sponsor': 'Atmel SMS', 'evaluation_facility': 'CEACI', 'level': 'EAL4+', 'protection_profile': 'BSI-PP-0002-2001', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2008-36en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2008-36fr.pdf'}}.
  • 09.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Microcontrôleurs sécurisés ATMEL AT91SC464384RCU (AT58U21) rév. B', 'url': 'https://cyber.gouv.fr/produits-certifies/microcontroleurs-securises-atmel-at91sc464384rcu-at58u21-rev-b', 'description': 'Le microcontrôleur sécurisé 32 bits, portant la référence commerciale AT91SC464384RCU, issu de la famille AT91SC des composants pour cartes à puce, correspond à la puce de référence AT58U21, en révision B, basée sur le coeur ARM SC100. Les microcontrôleurs AT91SC464384RCU sont plutôt destinés à des cartes à puce supportant des applications de types bancaire, transactions sécurisées, télévision à p', 'sponsor': 'Atmel SMS', 'developer': 'Atmel SMS', 'cert_id': 'ANSSI-CC-2008/36', 'level': 'EAL4+', 'enhanced': {'cert_id': 'ANSSI-CC-2008/36', 'certification_date': '2008-12-17', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 2.3', 'developer': 'Atmel SMS', 'sponsor': 'Atmel SMS', 'evaluation_facility': 'CEACI', 'level': 'EAL4+', 'protection_profile': 'BSI-PP-0002-2001', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2008-36en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2008-36fr.pdf'}}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '187e1c96c1cd626c3d1cfcfd4bd3ee2df79006e503cb4afe14553690940aa981', 'txt_hash': 'e17b5f8a29d3e6a98d5b777982d52e1f3f63023f33a186ce1510a76b2409aa92'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '3b0c35ea77d16bc6358e3edd44df02077817d03ed7e68a5d6715dba40b6cd595', 'txt_hash': 'd446e26a55adcaa93a5c21eaf20a6e06515b4e3b8fadca9f8d6ec7d3b7f7a1d3'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 307640, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 18, '/CreationDate': 'D:20081218150123Z', '/Creator': 'PScript5.dll Version 5.2.2', '/Producer': 'GPL Ghostscript 8.15', '/ModDate': "D:20091110144948+01'00'", '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 623015, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 77, '/Author': 'sc188jb', '/CreationDate': 'D:20081030162507Z', '/Creator': 'FrameMaker 6.0', '/ModDate': 'D:20081030163012Z', '/Producer': 'Acrobat Distiller 8.1.0 (Windows)', '/Title': 'Lightbird_ST.book', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'FR': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'DCSSI-2008/36': 19}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-002-2001': 2, 'BSI-PP-0002-2001': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 2, 'EAL4': 3, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 5': 1, 'EAL 7': 1, 'EAL5+': 1}, 'ITSEC': {'ITSEC E6 et': 1}}, 'cc_sar': {'ACM': {'ACM_AUT': 1, 'ACM_CAP': 1, 'ACM_SCP': 1}, 'ADO': {'ADO_DEL': 1, 'ADO_IGS': 1}, 'ADV': {'ADV_IMP.2': 2, 'ADV_FSP': 1, 'ADV_HLD': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_LLD': 1, 'ADV_RCR': 1, 'ADV_SPM': 1}, 'AGD': {'AGD_ADM': 1, 'AGD_USR': 1}, 'ALC': {'ALC_DVS.2': 2, 'ALC_FLR': 2, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_MSU.3': 2, 'AVA_VLA.4': 2, 'AVA_CCA': 1, 'AVA_MSU': 1, 'AVA_SOF': 1, 'AVA_VLA': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies': 1}, 'Thales': {'Thales': 1}, 'Philips': {'Philips': 1}}, 'eval_facility': {'CESTI': {'CESTI': 2}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 3}, '3DES': {'TDES': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}, 'FF': {'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {'ATMEL': {'ATMEL AT91SC464384RCU': 20}}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 34': 2, 'AIS34': 1}, 'ISO': {'ISO/IEC 15408:2005': 1, 'ISO/IEC 18045:2005': 1}, 'CC': {'CCMB-2005-08-001': 1, 'CCMB-2005-08-002': 1, 'CCMB-2005-08-003': 1, 'CCMB-2005-08-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-002-2001': 14, 'BSI-PP-002-': 1, 'BSI-PP002-2001': 1}}, 'cc_security_level': {'EAL': {'EAL4': 7, 'EAL4+': 1, 'EAL4 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_AUT': 1, 'ACM_CAP': 1, 'ACM_SCP': 1, 'ACM_AUT.1': 1, 'ACM_CAP.4': 1, 'ACM_SCP.2': 1}, 'ADO': {'ADO_DEL': 1, 'ADO_IGS': 1, 'ADO_DEL.2': 1, 'ADO_IGS.1': 1}, 'ADV': {'ADV_IMP.2': 2, 'ADV_SPM.1': 1, 'ADV_FSP': 1, 'ADV_HLD': 1, 'ADV_IMP': 1, 'ADV_LLD': 1, 'ADV_RCR': 1, 'ADV_SPM': 1, 'ADV_FSP.2': 1, 'ADV_HLD.2': 1, 'ADV_LLD.1': 1, 'ADV_RCR.2': 1, 'ADV_SPM.2': 1}, 'AGD': {'AGD_ADM': 1, 'AGD_USR': 1, 'AGD_ADM.1': 1, 'AGD_USR.1': 1}, 'ALC': {'ALC_DVS.2': 2, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1, 'ALC_LCD.2': 1, 'ALC_TAT.2': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1, 'ATE_COV.2': 1, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VLA.4': 2, 'AVA_MSU.3': 2, 'AVA_MSU': 1, 'AVA_SOF': 1, 'AVA_VLA': 1, 'AVA_CCA.1': 1, 'AVA_SOF.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 3, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_RND.1': 3, 'FCS_COP.1': 4, 'FCS_RND.1.1': 1, 'FCS_COP.1.1': 1, 'FCS_CKM.1': 1, 'FCS_CKM.4': 1}, 'FDP': {'FDP_ITT.1': 4, 'FDP_IFC.1': 6, 'FDP_ACC.2': 4, 'FDP_ACF.1': 4, 'FDP_ITT.1.1': 1, 'FDP_ACC.1': 4, 'FDP_IFC.1.1': 1, 'FDP_IFF.1': 1, 'FDP_ITC.1': 1, 'FDP_ITC.2': 1, 'FDP_ACC.2.1': 1, 'FDP_ACC.2.2': 1, 'FDP_AFC.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1}, 'FIA': {'FIA_UID.1': 1}, 'FMT': {'FMT_LIM.1': 4, 'FMT_LIM.2': 5, 'FMT_SMR.1': 7, 'FMT_MSA.1': 5, 'FMT_MOF.1': 4, 'FMT_MSA.3': 4, 'FMT_LIM.1.1': 1, 'FMT_LIM.2.1': 1, 'FMT_MSA.2': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MOF.1.1': 1, 'FMT_SMF.1': 2, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1}, 'FPT': {'FPT_FLS.1': 6, 'FPT_SEP.1': 3, 'FPT_ITT.1': 3, 'FPT_PHP.3': 3, 'FPT_FLS.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_ITT.1.1': 1, 'FPT_PHP.3.1': 1}, 'FRU': {'FRU_FLT.2': 6}}, 'cc_claims': {'D': {'D.CPU_ROM_DATA': 2, 'D.CRYPTO_ROM_DATA': 2, 'D.EEPROM_DATA': 2, 'D.CPU_RAM_DATA': 2, 'D.ADVX_RAM_DATA': 1, 'D.PERIPH_DATA': 2, 'D.CPU_ROM_SOFT': 2, 'D.CRYPTO_ROM_SOFT': 2, 'D.EEPROM_SOFT': 2, 'D.CPU_ROM_DSOFT': 2, 'D.CRYPTO_ROM_DSOFT': 2, 'D.EEPROM_DSOFT': 2, 'D.RNG_DATA': 2, 'D.IC_SPEC': 1, 'D.DESIGN': 1, 'D.DEV_TOOLS': 1, 'D.TECHNO': 1, 'D.MASK': 1, 'D.CRYPTO_RAM_DATA': 1}, 'O': {'O.RND': 2}, 'T': {'T.RND': 2}}, 'vendor': {'Thales': {'Thales': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 3}, '3DES': {'TDES': 6}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}, 'FF': {'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 8, 'RND': 4}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'AtmelToolbox': {'Atmel Toolbox 28': 1, 'Atmel Toolbox 02.03.12.00': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 5, 'Physical Probing': 3, 'physical probing': 5, 'Physical probing': 1, 'SPA': 2, 'DPA': 4}, 'FI': {'Malfunction': 9, 'malfunction': 4}, 'other': {'reverse engineering': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS140-2': 1, 'FIPS PUB 46-3': 1, 'FIPS 140-2': 1}, 'ISO': {'ISO/IEC 3309': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to dcssi_2008-36fr.pdf.
    • The st_filename property was set to dcssi-cible_2008-36en.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ANSSI-CC-2008/36.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_CCA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi_2008-36fr.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-cible_2008-36en.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_CCA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Microcontrôleur sécurisé ATMEL AT91SC464384RCU was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "a22678c29bb90ec4",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2008/36",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_CCA",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "ANSSI-CC-2008/36",
      "description": "Le microcontr\u00f4leur s\u00e9curis\u00e9 32 bits, portant la r\u00e9f\u00e9rence commerciale AT91SC464384RCU, issu de la famille AT91SC des composants pour cartes \u00e0 puce, correspond \u00e0 la puce de r\u00e9f\u00e9rence AT58U21, en r\u00e9vision B, bas\u00e9e sur le coeur ARM SC100. Les microcontr\u00f4leurs AT91SC464384RCU sont plut\u00f4t destin\u00e9s \u00e0 des cartes \u00e0 puce supportant des applications de types bancaire, transactions s\u00e9curis\u00e9es, t\u00e9l\u00e9vision \u00e0 p",
      "developer": "Atmel SMS",
      "enhanced": {
        "augmented": "ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4",
        "category": "Micro-circuits",
        "cc_version": "Crit\u00e8res Communs version 2.3",
        "cert_id": "ANSSI-CC-2008/36",
        "certification_date": "2008-12-17",
        "developer": "Atmel SMS",
        "evaluation_facility": "CEACI",
        "level": "EAL4+",
        "mutual_recognition": "SOG-IS CCRA",
        "protection_profile": "BSI-PP-0002-2001",
        "report_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2008-36fr.pdf",
        "sponsor": "Atmel SMS",
        "target_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2008-36en.pdf"
      },
      "level": "EAL4+",
      "product": "Microcontr\u00f4leurs s\u00e9curis\u00e9s ATMEL AT91SC464384RCU (AT58U21) r\u00e9v. B",
      "sponsor": "Atmel SMS",
      "url": "https://cyber.gouv.fr/produits-certifies/microcontroleurs-securises-atmel-at91sc464384rcu-at58u21-rev-b"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2010-03-19",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2008_36-M01fr.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "Rapport de maintenance ANSSI-CC-2008/36-M01"
      }
    ]
  },
  "manufacturer": "ATMEL Secure Products Division",
  "manufacturer_web": "https://www.atmel.com",
  "name": "Microcontr\u00f4leur s\u00e9curis\u00e9 ATMEL AT91SC464384RCU",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2008-12-17",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "dcssi_2008-36fr.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          }
        },
        "FF": {
          "DSA": {
            "DSA": 1
          }
        }
      },
      "cc_cert_id": {
        "FR": {
          "DCSSI-2008/36": 19
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0002-2001": 1,
          "BSI-PP-002-2001": 2
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 1,
          "ACM_CAP": 1,
          "ACM_SCP": 1
        },
        "ADO": {
          "ADO_DEL": 1,
          "ADO_IGS": 1
        },
        "ADV": {
          "ADV_FSP": 1,
          "ADV_HLD": 1,
          "ADV_IMP": 1,
          "ADV_IMP.2": 2,
          "ADV_INT": 1,
          "ADV_LLD": 1,
          "ADV_RCR": 1,
          "ADV_SPM": 1
        },
        "AGD": {
          "AGD_ADM": 1,
          "AGD_USR": 1
        },
        "ALC": {
          "ALC_DVS": 1,
          "ALC_DVS.2": 2,
          "ALC_FLR": 2,
          "ALC_TAT": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_CCA": 1,
          "AVA_MSU": 1,
          "AVA_MSU.3": 2,
          "AVA_SOF": 1,
          "AVA_VLA": 1,
          "AVA_VLA.4": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 1,
          "EAL 4": 2,
          "EAL 5": 1,
          "EAL 7": 1,
          "EAL4": 3,
          "EAL5+": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 et": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {
        "ATMEL": {
          "ATMEL AT91SC464384RCU": 20
        }
      },
      "ecc_curve": {},
      "eval_facility": {
        "CESTI": {
          "CESTI": 2
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 34": 2,
          "AIS34": 1
        },
        "CC": {
          "CCMB-2005-08-001": 1,
          "CCMB-2005-08-002": 1,
          "CCMB-2005-08-003": 1,
          "CCMB-2005-08-004": 1
        },
        "ISO": {
          "ISO/IEC 15408:2005": 1,
          "ISO/IEC 18045:2005": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "3DES": {
            "TDES": 1
          },
          "DES": {
            "DES": 3
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon Technologies": 1
        },
        "Philips": {
          "Philips": 1
        },
        "Thales": {
          "Thales": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20081218150123Z",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20091110144948+01\u002700\u0027",
      "/Producer": "GPL Ghostscript 8.15",
      "/Title": "",
      "pdf_file_size_bytes": 307640,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 18
    },
    "st_filename": "dcssi-cible_2008-36en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          }
        },
        "FF": {
          "DSA": {
            "DSA": 1
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "D": {
          "D.ADVX_RAM_DATA": 1,
          "D.CPU_RAM_DATA": 2,
          "D.CPU_ROM_DATA": 2,
          "D.CPU_ROM_DSOFT": 2,
          "D.CPU_ROM_SOFT": 2,
          "D.CRYPTO_RAM_DATA": 1,
          "D.CRYPTO_ROM_DATA": 2,
          "D.CRYPTO_ROM_DSOFT": 2,
          "D.CRYPTO_ROM_SOFT": 2,
          "D.DESIGN": 1,
          "D.DEV_TOOLS": 1,
          "D.EEPROM_DATA": 2,
          "D.EEPROM_DSOFT": 2,
          "D.EEPROM_SOFT": 2,
          "D.IC_SPEC": 1,
          "D.MASK": 1,
          "D.PERIPH_DATA": 2,
          "D.RNG_DATA": 2,
          "D.TECHNO": 1
        },
        "O": {
          "O.RND": 2
        },
        "T": {
          "T.RND": 2
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-002-": 1,
          "BSI-PP-002-2001": 14,
          "BSI-PP002-2001": 1
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 1,
          "ACM_AUT.1": 1,
          "ACM_CAP": 1,
          "ACM_CAP.4": 1,
          "ACM_SCP": 1,
          "ACM_SCP.2": 1
        },
        "ADO": {
          "ADO_DEL": 1,
          "ADO_DEL.2": 1,
          "ADO_IGS": 1,
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_FSP": 1,
          "ADV_FSP.2": 1,
          "ADV_HLD": 1,
          "ADV_HLD.2": 1,
          "ADV_IMP": 1,
          "ADV_IMP.2": 2,
          "ADV_LLD": 1,
          "ADV_LLD.1": 1,
          "ADV_RCR": 1,
          "ADV_RCR.2": 1,
          "ADV_SPM": 1,
          "ADV_SPM.1": 1,
          "ADV_SPM.2": 1
        },
        "AGD": {
          "AGD_ADM": 1,
          "AGD_ADM.1": 1,
          "AGD_USR": 1,
          "AGD_USR.1": 1
        },
        "ALC": {
          "ALC_DVS": 1,
          "ALC_DVS.2": 2,
          "ALC_FLR": 1,
          "ALC_LCD": 1,
          "ALC_LCD.2": 1,
          "ALC_TAT": 1,
          "ALC_TAT.2": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.2": 1,
          "ATE_DPT": 1,
          "ATE_DPT.2": 1,
          "ATE_FUN": 1,
          "ATE_FUN.1": 1,
          "ATE_IND": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_CCA.1": 1,
          "AVA_MSU": 1,
          "AVA_MSU.3": 2,
          "AVA_SOF": 1,
          "AVA_SOF.1": 1,
          "AVA_VLA": 1,
          "AVA_VLA.4": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 7,
          "EAL4 augmented": 1,
          "EAL4+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS.1": 3,
          "FAU_SAS.1.1": 1
        },
        "FCS": {
          "FCS_CKM.1": 1,
          "FCS_CKM.4": 1,
          "FCS_COP.1": 4,
          "FCS_COP.1.1": 1,
          "FCS_RND.1": 3,
          "FCS_RND.1.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 4,
          "FDP_ACC.2": 4,
          "FDP_ACC.2.1": 1,
          "FDP_ACC.2.2": 1,
          "FDP_ACF.1": 4,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_AFC.1": 1,
          "FDP_IFC.1": 6,
          "FDP_IFC.1.1": 1,
          "FDP_IFF.1": 1,
          "FDP_ITC.1": 1,
          "FDP_ITC.2": 1,
          "FDP_ITT.1": 4,
          "FDP_ITT.1.1": 1
        },
        "FIA": {
          "FIA_UID.1": 1
        },
        "FMT": {
          "FMT_LIM.1": 4,
          "FMT_LIM.1.1": 1,
          "FMT_LIM.2": 5,
          "FMT_LIM.2.1": 1,
          "FMT_MOF.1": 4,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.1": 5,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.2": 1,
          "FMT_MSA.3": 4,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_SMF.1": 2,
          "FMT_SMR.1": 7,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FLS.1": 6,
          "FPT_FLS.1.1": 1,
          "FPT_ITT.1": 3,
          "FPT_ITT.1.1": 1,
          "FPT_PHP.3": 3,
          "FPT_PHP.3.1": 1,
          "FPT_SEP.1": 3,
          "FPT_SEP.1.1": 1,
          "FPT_SEP.1.2": 1
        },
        "FRU": {
          "FRU_FLT.2": 6
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "AtmelToolbox": {
          "Atmel Toolbox 02.03.12.00": 1,
          "Atmel Toolbox 28": 1
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 4,
          "RNG": 8
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 9,
          "malfunction": 4
        },
        "SCA": {
          "DPA": 4,
          "Leak-Inherent": 5,
          "Physical Probing": 3,
          "Physical probing": 1,
          "SPA": 2,
          "physical probing": 5
        },
        "other": {
          "reverse engineering": 2
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 1,
          "FIPS PUB 46-3": 1,
          "FIPS140-2": 1
        },
        "ISO": {
          "ISO/IEC 3309": 2
        }
      },
      "symmetric_crypto": {
        "DES": {
          "3DES": {
            "TDES": 6
          },
          "DES": {
            "DES": 3
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Thales": {
          "Thales": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "sc188jb",
      "/CreationDate": "D:20081030162507Z",
      "/Creator": "FrameMaker 6.0",
      "/ModDate": "D:20081030163012Z",
      "/Producer": "Acrobat Distiller 8.1.0 (Windows)",
      "/Title": "Lightbird_ST.book",
      "pdf_file_size_bytes": 623015,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 77
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi_2008-36fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_DVS.2",
      "AVA_MSU.3",
      "ADV_IMP.2",
      "AVA_VLA.4",
      "EAL4+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-cible_2008-36en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "187e1c96c1cd626c3d1cfcfd4bd3ee2df79006e503cb4afe14553690940aa981",
      "txt_hash": "e17b5f8a29d3e6a98d5b777982d52e1f3f63023f33a186ce1510a76b2409aa92"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "3b0c35ea77d16bc6358e3edd44df02077817d03ed7e68a5d6715dba40b6cd595",
      "txt_hash": "d446e26a55adcaa93a5c21eaf20a6e06515b4e3b8fadca9f8d6ec7d3b7f7a1d3"
    }
  },
  "status": "archived"
}