This page was not yet optimized for use on mobile
devices.
NXP Secure Smart Card Controller P60x080/052/040PVC(Y/Z/A)PVG with IC Dedicated Software
CSV information
| Status | archived |
|---|---|
| Valid from | 24.10.2014 |
| Valid until | 25.10.2019 |
| Scheme | 🇩🇪 DE |
| Manufacturer | NXP Semiconductors Germany GmbH Business Line Identification |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | EAL6+, ASE_TSS.2, ALC_FLR.1 |
| Protection profiles | |
| Maintenance updates | NXP Secure Smart Card Controller P60x080/052/040PVC(Y/Z/A)/PVG with IC Dedicated Software (15.06.2015) Certification report |
Heuristics summary
Certificate ID: BSI-DSZ-CC-0837-V2-2014
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
ERROR
Convert pdf to text:
ERROR
Extract keywords:
ERROR
Certification report
Extracted keywords
Symmetric Algorithms
AES, DES, Triple-DES, TDES, CMACSchemes
MACRandomness
RNGEngines
SmartMX2Block cipher modes
CBCVendor
NXP, NXP SemiconductorsSecurity level
EAL 6, EAL 5, EAL 4, EAL1, EAL4, EAL 2, EAL5, EAL5+, EAL6, EAL2, EAL3, EAL7, EAL 6 augmented, ITSEC EvaluationClaims
O.C, R.OSecurity Assurance Requirements (SAR)
ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.5, ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.6, ADV_IMP.1, ADV_INT.1, ADV_INT.2, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_FLR.1, ALC_FLR, ALC_CMC.5, ALC_CMS.5, ALC_DVS.2, ALC_TAT.3, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_COV.2, ATE_COV.1, ATE_DPT.1, ATE_DPT.2, ATE_DPT.4, ATE_FUN.1, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_TSS.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0035-2007Certificates
BSI-DSZ-CC-0837-V2-2014, BSI-DSZ-CC-0837-2013-MA-01Evaluation facilities
TÜV InformationstechnikSide-channel analysis
physical probing, fault injection, JILCertification process
NXP Secure Smart Card Controller P60x080/052/040PVC(Y/Z/A)/PVG Security Target, NXP Semiconductors (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8, 01 October 2014, EVALUATION TECHNICAL REPORT SUMMARY (ETR SUMMARY), TÜV Informationstechnik GmbH (confidential document) [10] ETR for composite evaluation according to AIS 36, Version 1, 02 September 2014, ETR FOR, EVALUATION (ETR-COMP), TÜV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE: 8 specifically • AIS 25, Version 8, Anwendung der CC auf, Configuration List, Version 01.50, 01 July 2014, NXP Semiconductors, Business Unit Identification (confidential document) and • NXP Secure Smart Card Controller P60x080/052/040PVC, Customer specific Appendix of the, List, Version 01.40, 01 July 2014, NXP Semiconductors, Business Unit Identification (confidential document) and • NXP Secure Smart Card Controller P60x080/052/040PVC, Appendix of the Configuration List for, evaluation, Version 01.40, 05 August 2014, NXP Semiconductors, Business Unit Identification (confidential document) [12] NXP Secure Smart Card Controller P60x040/052/080 VC/VG, Information on Guidance and Operation, and Operation Manual, Version 1.1, 26 June 2014, NXP Semiconductors, Business Unit Identification (confidential document) 23 / 36 Certification Report BSI-DSZ-CC-0837-V2-2014 This page is intentionally left blank. 24Standards
AIS 34, AIS 25, AIS 26, AIS 37, AIS 31, AIS 36, AIS 35, AIS 32, AIS 38, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065Technical reports
BSI TR-02102, BSI 7138, BSI 7125, BSI 7148File metadata
| Title | Certification Report BSI-DSZ-CC-0837-V2-2014 |
|---|---|
| Subject | Common Criteria Certification |
| Keywords | "Common Criteria, Certification, Zertifizierung, Smartcard" |
| Author | Bundesamt für Sicherheit in der Informationstechnik |
| Creation date | D:20141110104311+01'00' |
| Modification date | D:20141111083907+01'00' |
| Pages | 36 |
| Creator | Writer |
| Producer | LibreOffice 4.2 |
Frontpage
| Certificate ID | BSI-DSZ-CC-0837-V2-2014 |
|---|---|
| Certified item | NXP Secure Smart Card Controller P60x080/052/040PVC(Y/Z/A)/PVG with IC Dedicated Software |
| Certification lab | BSI |
| Developer | NXP Semiconductors Germany GmbH |
References
Incoming- ANSSI-CC-2015/79 - archived - ID-One ePass IDL Full EAC v2 en configuration BAP masqué sur les composants P60x080PVC/PVG
- ANSSI-CC-2015/04 - archived - Application eTravel EAC v2.1, en configurationBAC, sur la plateforme fermée MultiApp V3.1masquée sur le composant P60D080PVC(Version du patch : 1.4)
- ANSSI-CC-2016/35 - archived - ID-One ePass Full EAC v2 MRTD en configuration EAC et PACE avec AA masqué sur les composants P60x080PVC/PVG
- ANSSI-CC-2015/78 - archived - ID-One ePass IDL Full EAC v2 en configuration EAC masqué sur les composants P60x080PVC/PVG
- ANSSI-CC-2015/01 - archived - Application eTravel EAC v2.1, en configurationEAC et SAC, sur la plateforme ouverteMultiApp V3.1 masquée sur le composantP60D080PVC(Version du patch : 1.4)
- ANSSI-CC-2015/76 - archived - ID-One ePass IDL Full EAC v2 en configuration PACE masqué sur les composants P60x080PVC/PVG
- ANSSI-CC-2016/46 - archived - ID-One eIDL v1.0 en configuration EAC et PACE avec AA masqué sur les composants P60x080PVC/PVG
- ANSSI-CC-2016/37 - archived - ID-One ePass Full EAC v2 MRTD en configuration BAC avec AA et CA masqué sur les composants P60x080PVC/PVG
- ANSSI-CC-2015/63 - archived - ID-One ePass Full EAC v2 en configuration EAC et PACE masqué sur les composants P60x080PVC/PVG
- ANSSI-CC-2016/20 - archived - ID-One eIDAS v1.0 en configuration SSCD-5 sur les composants P60x080PVC/PVG
- ANSSI-CC-2016/47 - archived - ID-One eIDL v1.0 en configuration EAC avec BAP et AA masqué sur les composants P60x080PVC/PVG
- ANSSI-CC-2016/18 - archived - ID-One eIDAS v1.0 en configuration SSCD-3 sur les composants P60x080PVC/PVG
- ANSSI-CC-2016/28 - archived - ID-One eIDAS v1.0 en configuration SSCD-4 sur les composants P60x144PVA/PVE
- ANSSI-CC-2016/19 - archived - ID-One eIDAS v1.0 en configuration SSCD-4 sur les composants P60x080PVC/PVG
- ANSSI-CC-2016/48 - archived - ID-One eIDL v1.0 en configuration BAP avec AA et CA masqué sur les composants P60x080PVC/PVG
- ANSSI-CC-2015/77 - archived - ID-One ePass IDL Full EAC v2 en configuration EAC et PACE masqué sur les composants P60x080PVC/PVG
- ANSSI-CC-2015/64 - archived - ID-One ePass Full EAC v2 en configuration EAC masqué sur les composants P60x080PVC/PVG
- ANSSI-CC-2016/21 - archived - ID-One eIDAS v1.0 en configuration SSCD-6 sur les composants P60x080PVC/PVG
- ANSSI-CC-2016/17 - archived - ID-One eIDAS v1.0 en configuration SSCD-2 sur les composants P60x080PVC/PVG
- ANSSI-CC-2016/45 - archived - ID-One eIDL v1.0 en configuration PACE avec AA, CA et PACE CAM masqué sur les composants P60x080PVC/PVG
- ANSSI-CC-2015/65 - archived - ID-One ePass Full EAC v2 en configuration BAC masqué sur les composants P60x080PVC/PVG
- ANSSI-CC-2015/02 - archived - Application eTravel EAC v2.1, en configurationBAC, sur la plateforme ouverte MultiApp V3.1masquée sur le composant P60D080PVC(Version du patch : 1.4)
- ANSSI-CC-2016/34 - archived - ID-One ePass Full EAC v2 MRTD en configuration PACE avec AA, CA et PACE CAM masqué sur les composants P60x080PVC/PVG
- BSI-DSZ-CC-0892-V2-2015 - archived - MTCOS Pro 2.2 EAC with PACE / P60D080PVC - V2
- NSCIB-CC-12-36243-CR2 - archived - Crypto Library V1.0 on P60x080/052/040PVC(Y/Z/A)/PVG
- ANSSI-CC-2015/08 - archived - Application IAS V4.2 sur la plateformeJavaCard ouverte MultiApp V3.1 masquée surle composant P60D080PVC(version du patch : 1.4)
- ANSSI-CC-2016/30 - archived - ID-One eIDAS v1.0 en configuration SSCD-6 sur les composants P60x144PVA/PVE
- ANSSI-CC-2015/03 - archived - Application eTravel EAC v2.1, en configurationEAC et SAC, sur la plateforme ferméeMultiApp V3.1 masquée sur le composantP60D080PVC(Version du patch : 1.4)
- ANSSI-CC-2016/36 - archived - ID-One ePass Full EAC v2 MRTD en configuration EAC avec AA masqué sur les composants P60x080PVC/PVG
- ANSSI-CC-2016/63 - archived - NXP ASEPCOS-CNS v1.84 in SSCD Configuration on NXP P60D080PVG Dual Interface Microcontroller
- ANSSI-CC-2015/62 - archived - ID-One ePass Full EAC v2 en configuration PACE masqué sur les composants P60x080PVC/PVG
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, DEA, Triple-DES, TDEA, Triple-DEA, TDESAsymmetric Algorithms
ECCRandomness
TRNG, RND, RNGEngines
SmartMX2, SmartMXVendor
NXP, NXP Semiconductors, PhilipsSecurity level
EAL6, EAL4, EAL6+, EAL4+, EAL 6, EAL6 augmented, EAL4 augmentedClaims
O.RND, O.INTEGRITY_CHK, O.HW_AES, O.CUST_RECONFIG, O.EEPROM_INTEGRITY, O.FM_FW, O.MEM_ACCESS, O.SFR_ACCESS, T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ADV_SPM.1, ADV_ARC, ADV_FSP, ADV_IMP, ADV_FSP.4, ADV_SPM, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_FLR.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ALC_DEL, ALC_DVS, ALC_CMS, ALC_CMC, ALC_CMS.4, ALC_CMC.4, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, ATE_COV, AVA_VAN.5, AVA_VAN, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS.1.1, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_COP.1, FCS_COP.1.1, FCS_CKM.1, FCS_CKM.4, FDP_ITT, FDP_ITT.5, FDP_ITT.1, FDP_IFC.1, FDP_ITC.1, FDP_ITC.2, FDP_SDI.2, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_FLS.1, FMT_LIM.1, FMT_LIM.2, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1, FMT_SMR.1, FMT_MSA.1.1, FMT_SMF.1, FMT_SMF.1.1, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FPT_ITT.1.1, FRU_FLT.2Protection profiles
BSI-PP-0035Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, side channel, DPA, timing attacks, physical tampering, Malfunction, malfunction, fault injectionStandards
FIPS PUB 46-3, FIPS PUB 197, FIPS PUB 46, AIS31, ISO/IEC 7816, ISO/IEC 14443, ISO/IEC 7816-3, ISO/IEC 18092, CCMB-2012-09-001, CCMB-2012-09-004File metadata
| Title | Security Target Lite |
|---|---|
| Subject | P60x080/052/040PVC(Y/Z/A)/PVG |
| Keywords | CC Security Evaluation, Security Target, Functional Requirements, Security Functionality, Assurance Level EAL6+ |
| Author | NXP Semiconductors |
| Creation date | D:20140821152255+02'00' |
| Modification date | D:20140821154606+02'00' |
| Pages | 82 |
| Creator | Microsoft® Word 2010 |
| Producer | Microsoft® Word 2010 |
References
Incoming- ANSSI-CC-2015/79 - archived - ID-One ePass IDL Full EAC v2 en configuration BAP masqué sur les composants P60x080PVC/PVG
- ANSSI-CC-2016/35 - archived - ID-One ePass Full EAC v2 MRTD en configuration EAC et PACE avec AA masqué sur les composants P60x080PVC/PVG
- ANSSI-CC-2015/78 - archived - ID-One ePass IDL Full EAC v2 en configuration EAC masqué sur les composants P60x080PVC/PVG
- ANSSI-CC-2015/76 - archived - ID-One ePass IDL Full EAC v2 en configuration PACE masqué sur les composants P60x080PVC/PVG
- ANSSI-CC-2016/46 - archived - ID-One eIDL v1.0 en configuration EAC et PACE avec AA masqué sur les composants P60x080PVC/PVG
- ANSSI-CC-2016/37 - archived - ID-One ePass Full EAC v2 MRTD en configuration BAC avec AA et CA masqué sur les composants P60x080PVC/PVG
- ANSSI-CC-2015/63 - archived - ID-One ePass Full EAC v2 en configuration EAC et PACE masqué sur les composants P60x080PVC/PVG
- ANSSI-CC-2016/20 - archived - ID-One eIDAS v1.0 en configuration SSCD-5 sur les composants P60x080PVC/PVG
- ANSSI-CC-2016/47 - archived - ID-One eIDL v1.0 en configuration EAC avec BAP et AA masqué sur les composants P60x080PVC/PVG
- ANSSI-CC-2016/18 - archived - ID-One eIDAS v1.0 en configuration SSCD-3 sur les composants P60x080PVC/PVG
- ANSSI-CC-2016/28 - archived - ID-One eIDAS v1.0 en configuration SSCD-4 sur les composants P60x144PVA/PVE
- ANSSI-CC-2016/19 - archived - ID-One eIDAS v1.0 en configuration SSCD-4 sur les composants P60x080PVC/PVG
- ANSSI-CC-2016/48 - archived - ID-One eIDL v1.0 en configuration BAP avec AA et CA masqué sur les composants P60x080PVC/PVG
- ANSSI-CC-2015/77 - archived - ID-One ePass IDL Full EAC v2 en configuration EAC et PACE masqué sur les composants P60x080PVC/PVG
- ANSSI-CC-2015/64 - archived - ID-One ePass Full EAC v2 en configuration EAC masqué sur les composants P60x080PVC/PVG
- ANSSI-CC-2016/21 - archived - ID-One eIDAS v1.0 en configuration SSCD-6 sur les composants P60x080PVC/PVG
- ANSSI-CC-2016/17 - archived - ID-One eIDAS v1.0 en configuration SSCD-2 sur les composants P60x080PVC/PVG
- ANSSI-CC-2016/45 - archived - ID-One eIDL v1.0 en configuration PACE avec AA, CA et PACE CAM masqué sur les composants P60x080PVC/PVG
- ANSSI-CC-2015/65 - archived - ID-One ePass Full EAC v2 en configuration BAC masqué sur les composants P60x080PVC/PVG
- ANSSI-CC-2016/34 - archived - ID-One ePass Full EAC v2 MRTD en configuration PACE avec AA, CA et PACE CAM masqué sur les composants P60x080PVC/PVG
- ANSSI-CC-2016/36 - archived - ID-One ePass Full EAC v2 MRTD en configuration EAC avec AA masqué sur les composants P60x080PVC/PVG
- ANSSI-CC-2016/63 - archived - NXP ASEPCOS-CNS v1.84 in SSCD Configuration on NXP P60D080PVG Dual Interface Microcontroller
- ANSSI-CC-2015/62 - archived - ID-One ePass Full EAC v2 en configuration PACE masqué sur les composants P60x080PVC/PVG
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-0837-V2-2014Extracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.5, AGD_OPE.1, AGD_PRE.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ALC_LCD.1, ALC_TAT.3, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.2, APE_SPD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.2, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, AVA_VAN.5Similar certificates
Showing 5 out of 78.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "a8b768bf10dd60b7",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0837-V2-2014",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL6+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 5
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"052"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"f6d23054061d72ba"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2015/63",
"ANSSI-CC-2016/36",
"ANSSI-CC-2015/65",
"ANSSI-CC-2015/62",
"ANSSI-CC-2016/20",
"ANSSI-CC-2016/46",
"ANSSI-CC-2015/04",
"ANSSI-CC-2015/64",
"ANSSI-CC-2016/17",
"ANSSI-CC-2015/76",
"ANSSI-CC-2016/30",
"ANSSI-CC-2015/78",
"NSCIB-CC-12-36243-CR2",
"ANSSI-CC-2016/45",
"ANSSI-CC-2016/48",
"ANSSI-CC-2016/18",
"ANSSI-CC-2016/21",
"BSI-DSZ-CC-0892-V2-2015",
"ANSSI-CC-2016/63",
"ANSSI-CC-2015/03",
"ANSSI-CC-2015/02",
"ANSSI-CC-2015/08",
"ANSSI-CC-2015/01",
"ANSSI-CC-2016/19",
"ANSSI-CC-2016/34",
"ANSSI-CC-2015/77",
"ANSSI-CC-2016/47",
"ANSSI-CC-2016/37",
"ANSSI-CC-2015/79",
"ANSSI-CC-2016/28",
"ANSSI-CC-2016/35"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2015/63",
"ANSSI-CC-2016/36",
"ANSSI-CC-2015/65",
"ANSSI-CC-2015/74",
"ANSSI-CC-2016/04",
"ANSSI-CC-2015/62",
"ANSSI-CC-2016/20",
"ANSSI-CC-2016/46",
"ANSSI-CC-2015/75",
"ANSSI-CC-2015/04",
"ANSSI-CC-2015/64",
"ANSSI-CC-2016/17",
"ANSSI-CC-2015/38",
"ANSSI-CC-2015/44",
"ANSSI-CC-2015/76",
"ANSSI-CC-2016/30",
"ANSSI-CC-2015/78",
"NSCIB-CC-12-36243-CR2",
"ANSSI-CC-2016/03",
"ANSSI-CC-2016/45",
"ANSSI-CC-2016/48",
"ANSSI-CC-2016/18",
"ANSSI-CC-2016/21",
"BSI-DSZ-CC-0892-V2-2015",
"ANSSI-CC-2016/63",
"ANSSI-CC-2015/03",
"ANSSI-CC-2015/02",
"ANSSI-CC-2015/08",
"ANSSI-CC-2015/37",
"ANSSI-CC-2015/01",
"ANSSI-CC-2016/19",
"ANSSI-CC-2016/34",
"ANSSI-CC-2015/77",
"ANSSI-CC-2016/47",
"ANSSI-CC-2016/37",
"ANSSI-CC-2015/79",
"ANSSI-CC-2016/28",
"ANSSI-CC-2016/35"
]
},
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2015/63",
"ANSSI-CC-2016/36",
"ANSSI-CC-2015/65",
"ANSSI-CC-2015/62",
"ANSSI-CC-2016/20",
"ANSSI-CC-2016/46",
"ANSSI-CC-2015/64",
"ANSSI-CC-2016/17",
"ANSSI-CC-2015/76",
"ANSSI-CC-2015/78",
"ANSSI-CC-2016/45",
"ANSSI-CC-2016/48",
"ANSSI-CC-2016/18",
"ANSSI-CC-2016/21",
"ANSSI-CC-2016/63",
"ANSSI-CC-2016/19",
"ANSSI-CC-2016/34",
"ANSSI-CC-2015/77",
"ANSSI-CC-2016/47",
"ANSSI-CC-2016/37",
"ANSSI-CC-2015/79",
"ANSSI-CC-2016/28",
"ANSSI-CC-2016/35"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2015/63",
"ANSSI-CC-2016/36",
"ANSSI-CC-2015/65",
"ANSSI-CC-2015/62",
"ANSSI-CC-2016/20",
"ANSSI-CC-2016/46",
"ANSSI-CC-2015/64",
"ANSSI-CC-2016/17",
"ANSSI-CC-2015/76",
"ANSSI-CC-2016/35",
"ANSSI-CC-2016/45",
"ANSSI-CC-2016/48",
"ANSSI-CC-2016/18",
"ANSSI-CC-2016/21",
"ANSSI-CC-2016/63",
"ANSSI-CC-2016/19",
"ANSSI-CC-2016/34",
"ANSSI-CC-2015/77",
"ANSSI-CC-2016/47",
"ANSSI-CC-2016/37",
"ANSSI-CC-2015/79",
"ANSSI-CC-2016/28",
"ANSSI-CC-2015/78"
]
},
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2015-06-15",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0837V2ma1a_pdf.pdf",
"maintenance_st_link": null,
"maintenance_title": "NXP Secure Smart Card Controller P60x080/052/040PVC(Y/Z/A)/PVG with IC Dedicated Software"
}
]
},
"manufacturer": "NXP Semiconductors Germany GmbH Business Line Identification",
"manufacturer_web": "https://www.nxp.com",
"name": "NXP Secure Smart Card Controller P60x080/052/040PVC(Y/Z/A)PVG with IC Dedicated Software",
"not_valid_after": "2019-10-25",
"not_valid_before": "2014-10-24",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0837V2a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1 and ASE_TSS.2 SOGIS Recognition Agreement",
"cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-0837-V2-2014",
"cert_item": "NXP Secure Smart Card Controller P60x080/052/040PVC(Y/Z/A)/PVG with IC Dedicated Software",
"cert_lab": "BSI",
"developer": "NXP Semiconductors Germany GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0837-2013-MA-01": 3,
"BSI-DSZ-CC-0837-V2-2014": 21
}
},
"cc_claims": {
"O": {
"O.C": 6
},
"R": {
"R.O": 6
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0035-2007": 4
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 2,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 2,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 1,
"ADV_INT.3": 2,
"ADV_SPM": 1,
"ADV_SPM.1": 2,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_TDS.5": 2,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 1,
"ALC_CMC.5": 3,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 3,
"ALC_DEL": 1,
"ALC_DEL.1": 2,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 3,
"ALC_FLR": 3,
"ALC_FLR.1": 6,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 2,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 1,
"ALC_TAT.2": 1,
"ALC_TAT.3": 3
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 6
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 2,
"ATE_COV.3": 2,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 3,
"ATE_DPT.4": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_FUN.2": 2,
"ATE_IND": 1,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 4,
"EAL 5": 3,
"EAL 6": 4,
"EAL 6 augmented": 3,
"EAL1": 7,
"EAL2": 3,
"EAL3": 4,
"EAL4": 6,
"EAL5": 7,
"EAL5+": 1,
"EAL6": 4,
"EAL7": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"01 October 2014, EVALUATION TECHNICAL REPORT SUMMARY (ETR SUMMARY), T\u00dcV Informationstechnik GmbH (confidential document) [10] ETR for composite evaluation according to AIS 36, Version 1, 02 September 2014, ETR FOR": 1,
"Configuration List, Version 01.50, 01 July 2014, NXP Semiconductors, Business Unit Identification (confidential document) and \u2022 NXP Secure Smart Card Controller P60x080/052/040PVC, Customer specific Appendix of the": 1,
"EVALUATION (ETR-COMP), T\u00dcV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE: 8 specifically \u2022 AIS 25, Version 8, Anwendung der CC auf": 1,
"List, Version 01.40, 01 July 2014, NXP Semiconductors, Business Unit Identification (confidential document) and \u2022 NXP Secure Smart Card Controller P60x080/052/040PVC, Appendix of the Configuration List for": 1,
"NXP Secure Smart Card Controller P60x080/052/040PVC(Y/Z/A)/PVG Security Target, NXP Semiconductors (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8": 1,
"and Operation Manual, Version 1.1, 26 June 2014, NXP Semiconductors, Business Unit Identification (confidential document) 23 / 36 Certification Report BSI-DSZ-CC-0837-V2-2014 This page is intentionally left blank. 24 ": 1,
"evaluation, Version 01.40, 05 August 2014, NXP Semiconductors, Business Unit Identification (confidential document) [12] NXP Secure Smart Card Controller P60x040/052/080 VC/VG, Information on Guidance and Operation": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 1
}
},
"cplc_data": {},
"crypto_engine": {
"SmartMX": {
"SmartMX2": 6
}
},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 4
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 2
}
},
"side_channel_analysis": {
"FI": {
"fault injection": 1
},
"SCA": {
"physical probing": 1
},
"other": {
"JIL": 3
}
},
"standard_id": {
"BSI": {
"AIS 25": 2,
"AIS 26": 2,
"AIS 31": 2,
"AIS 32": 1,
"AIS 34": 2,
"AIS 35": 2,
"AIS 36": 2,
"AIS 37": 1,
"AIS 38": 1
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 4
}
},
"DES": {
"3DES": {
"TDES": 1,
"Triple-DES": 2
},
"DES": {
"DES": 3
}
},
"constructions": {
"MAC": {
"CMAC": 1
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7138": 2,
"BSI 7148": 1,
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 20,
"NXP Semiconductors": 22
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20141110104311+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Smartcard\"",
"/ModDate": "D:20141111083907+01\u002700\u0027",
"/Producer": "LibreOffice 4.2",
"/Subject": "Common Criteria Certification",
"/Title": "Certification Report BSI-DSZ-CC-0837-V2-2014",
"pdf_file_size_bytes": 783130,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/zertifizierung",
"https://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 36
},
"st_filename": "0837V2b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
}
},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.CUST_RECONFIG": 6,
"O.EEPROM_INTEGRITY": 4,
"O.FM_FW": 9,
"O.HW_AES": 7,
"O.INTEGRITY_CHK": 7,
"O.MEM_ACCESS": 9,
"O.RND": 3,
"O.SFR_ACCESS": 9
},
"T": {
"T.RND": 2
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0035": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 4,
"ADV_FSP.4": 3,
"ADV_FSP.5": 11,
"ADV_IMP": 1,
"ADV_IMP.2": 4,
"ADV_INT.3": 1,
"ADV_SPM": 2,
"ADV_SPM.1": 1,
"ADV_TDS.5": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 4,
"ALC_CMC.4": 3,
"ALC_CMC.5": 4,
"ALC_CMS": 4,
"ALC_CMS.4": 3,
"ALC_CMS.5": 5,
"ALC_DEL": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 1,
"ALC_FLR.1": 5,
"ALC_LCD.1": 1,
"ALC_TAT.3": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.2": 6
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.3": 4,
"ATE_DPT.3": 1,
"ATE_FUN.2": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 6": 2,
"EAL4": 3,
"EAL4 augmented": 1,
"EAL4+": 1,
"EAL6": 36,
"EAL6 augmented": 3,
"EAL6+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 7,
"FAU_SAS.1.1": 1
},
"FCS": {
"FCS_CKM.1": 5,
"FCS_CKM.4": 3,
"FCS_COP.1": 23,
"FCS_COP.1.1": 2,
"FCS_RNG.1": 9,
"FCS_RNG.1.1": 3,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC.1": 35,
"FDP_ACC.1.1": 2,
"FDP_ACF.1": 32,
"FDP_ACF.1.1": 2,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 2,
"FDP_FLS.1": 1,
"FDP_IFC.1": 10,
"FDP_ITC.1": 5,
"FDP_ITC.2": 5,
"FDP_ITT": 1,
"FDP_ITT.1": 6,
"FDP_ITT.5": 11,
"FDP_SDI.1": 1,
"FDP_SDI.2": 7,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1
},
"FMT": {
"FMT_LIM.1": 3,
"FMT_LIM.2": 4,
"FMT_MSA.1": 25,
"FMT_MSA.1.1": 2,
"FMT_MSA.3": 20,
"FMT_MSA.3.1": 2,
"FMT_MSA.3.2": 2,
"FMT_SMF.1": 19,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 7
},
"FPT": {
"FPT_FLS.1": 7,
"FPT_ITT.1": 14,
"FPT_ITT.1.1": 1,
"FPT_PHP.3": 7
},
"FRU": {
"FRU_FLT.2": 7
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {
"SmartMX": {
"SmartMX": 1,
"SmartMX2": 18
}
},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 5,
"RNG": 14
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 13,
"fault injection": 3,
"malfunction": 3,
"physical tampering": 1
},
"SCA": {
"DPA": 2,
"Leak-Inherent": 13,
"Physical Probing": 2,
"physical probing": 1,
"side channel": 1,
"timing attacks": 2
}
},
"standard_id": {
"BSI": {
"AIS31": 1
},
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-004": 2
},
"FIPS": {
"FIPS PUB 197": 3,
"FIPS PUB 46": 1,
"FIPS PUB 46-3": 3
},
"ISO": {
"ISO/IEC 14443": 20,
"ISO/IEC 18092": 2,
"ISO/IEC 7816": 22,
"ISO/IEC 7816-3": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 33
}
},
"DES": {
"3DES": {
"TDEA": 3,
"TDES": 1,
"Triple-DEA": 1,
"Triple-DES": 9
},
"DES": {
"DEA": 2,
"DES": 16
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 116,
"NXP Semiconductors": 33
},
"Philips": {
"Philips": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "NXP Semiconductors",
"/CreationDate": "D:20140821152255+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/Keywords": "CC Security Evaluation, Security Target, Functional Requirements, Security Functionality, Assurance Level EAL6+",
"/ModDate": "D:20140821154606+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"/Subject": "P60x080/052/040PVC(Y/Z/A)/PVG",
"/Title": "Security Target Lite",
"pdf_file_size_bytes": 929678,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.nxp.com/",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 82
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0837V2a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.1",
"EAL6+",
"ASE_TSS.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0837V2b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "2e9c386081f33c38cafdf428134b3313da4d274ff844b6b4ebc2f7ec229f4fa9",
"txt_hash": "f928de4c57a718736e8023cff5ba1d44d7ea79d1897150f7daf9bf508a2cb849"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "0af6f30c5d233c24c1b767b6f5f8b0d403eb8e8fab4f79ba905a9371f9c0979a",
"txt_hash": "4d72fa48ba30935617d1a193c3d5cf580bb9a86488b7c0b6037f37203b8a8273"
}
},
"status": "archived"
}