ID&Trust IDentity-J with SAC (BAC+PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52G 1.0.7052

CSV information ?

Status active
Valid from 28.08.2019
Valid until 24.12.2024
Scheme 🇯🇵 JP
Manufacturer Maxell, Ltd
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_DVS.2, EAL4+

Heuristics summary ?

Certificate ID: JISEC-CC-CRP-C0649-01-2019

Certificate ?

Extracted keywords

Security level
EAL2, EAL4
Security Assurance Requirements (SAR)
ALC_DVS.2
Certificates
JISEC-CC-CRP-C0649-01-2019
Evaluation facilities
TÜV Informationstechnik

File metadata

Creation date D:20191004103237+09'00'
Modification date D:20191004103345+09'00'
Pages 2
Creator Microsoft® Word 2010
Producer Microsoft® Word 2010

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES, CMAC
Asymmetric Algorithms
ECDH, ECDSA, DH, Diffie-Hellman
Hash functions
SHA-1, SHA-256, SHA-384
Schemes
MAC, Key agreement
Protocols
PACE
Elliptic Curves
P-256, P-384, NIST P-256, NIST P-384
Block cipher modes
CBC

IC data groups
EF.DG1, EF.DG2, EF.DG13, EF.DG14, EF.DG15, EF.COM, EF.CardAccess, EF.SOD
Vendor
Infineon, Infineon Technologies AG, Gemalto

Security level
EAL4, EAL6, EAL6+, EAL4 augmented, EAL6 augmented
Claims
A.PKI
Security Assurance Requirements (SAR)
ALC_DVS.2
Certificates
BSI-DSZ-CC-0869-V2-2019, BSI-DSZ-CC-0891-V3-2018, JISEC-CC-CRP-C0649-01-2019
Evaluation facilities
TÜV Informationstechnik, TÜViT

Side-channel analysis
physical probing, Side channel, physical tampering, malfunction, DFA, Fault Injection

Standards
AIS34, ISO/IEC 7816-4, ISO/IEC 11770-2, ISO/IEC 9797-1, ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Creation date D:20191113095642+09'00'
Modification date D:20191113095642+09'00'
Pages 49
Creator Microsoft® Word 2010
Producer Microsoft® Word 2010

References

Outgoing
  • BSI-DSZ-CC-0891-V3-2018 - archived - Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware and optional software
  • BSI-DSZ-CC-0869-V2-2019 - archived - Java Card Platform Implementation for Infineon on M7892 G12 (SLJ 52GxxyyyzC) V2.0

Security target ?

Extracted keywords

Symmetric Algorithms
AES, AES-128, AES-256, DES, TDES, CMAC
Asymmetric Algorithms
ECDH, ECDSA, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA-256, SHA-384
Schemes
MAC, Key agreement
Protocols
PACE
Randomness
RND
Block cipher modes
CBC

JavaCard versions
Java Card 3.0.1
IC data groups
EF.DG1, EF.DG2, EF.DG13, EF.DG14, EF.DG15, EF.COM, EF.CardAccess, EF.SOD
Vendor
Infineon

Security level
EAL4+, EAL5+, EAL4, EAL5, EAL4 augmented
Claims
O.OPERATE, O.RESOURCES, O.ALARM, O.CIPHER, O.BAC, O.KEY-MNGT, O.PIN-MNGT, O.RND, O.GLOBAL_ARRAYS_CONFID, O.TRANSACTION, O.REALLOCATION, O.IC_SUPPORT, O.RECOVERY, O.OS_SUPPORT, O.AA, O.PACE, T.CONFID-APPLI-DATA, T.CONFID-JCS-DATA, T.INTEG-APPLI-DATA, T.INTEG-JCS-DATA, T.RESOURCES, T.RND, T.PHYSICAL, T.LEAKAGE, T.FAULT, T.SID, A.PKI, A.APPLET, A.VERIFICATION, OE.PKI
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_IMP.1, AGD_OPE.1, ALC_DVS.2, ALC_DVS.1, ALC_CMC.4, ALC_DEL.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_IND.2, AVA_VAN.5, AVA_VAN.3, ASE_CCL.1, ASE_INT.1, ASE_REQ.2, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FCO_NRO, FCS_CKM, FCS_CKM.4, FCS_COP, FCS_RND.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_COP.1, FCS_RNG.1, FCS_RND.1.1, FCS_CKM.4.1, FDP_ACC, FDP_ACF, FDP_ITC.1, FDP_UCT, FDP_UIT, FDP_IFC, FDP_IFF, FDP_ITC, FDP_RIP, FDP_ROL, FDP_SDI.2, FDP_ITC.2, FDP_ACF.1, FDP_ACC.1, FDP_IFC.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_UCT.1, FDP_UIT.1, FIA_AFL, FIA_UAU.1, FIA_UAU.4, FIA_UAU.5, FIA_UID.1, FIA_ATD, FIA_UID, FIA_USB, FIA_AFL.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MOF.1, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA, FMT_MTD, FMT_SMF, FMT_SMR, FMT_MSA.3, FMT_MOF.1.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPR_UNO.1, FPT_PHP.3, FPT_FLS.1, FPT_FLS, FPT_RCV, FPT_TDC.1, FPT_PHP.3.1, FTP_ITC.1, FTP_ITC, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3

Side-channel analysis
side-channel, SPA, DPA, timing attack

Standards
SP 800-38B, BSI-AIS20, ISO/IEC 9797-1, ISO/IEC 10116, ICAO, CCMB-2017-04-002

File metadata

Title ID&Trust IDENTITY APPLET-J with SAC (BAC+PACE) and AA - Security Target Lite
Author LovaszD
Creation date D:20190726101540+02'00'
Modification date D:20190726101540+02'00'
Pages 66
Creator Microsoft® Word for Office 365
Producer Microsoft® Word for Office 365

Heuristics ?

Certificate ID: JISEC-CC-CRP-C0649-01-2019

Extracted SARs

ADV_ARC.1, ALC_DVS.2, ALC_DEL.1, ATE_DPT.1, ASE_INT.1, ASE_TSS.1, AVA_VAN.5, ALC_CMC.4, ALC_LCD.1, AGD_OPE.1, ATE_IND.2, ADV_IMP.1, ASE_REQ.2, ASE_CCL.1, ATE_COV.2

Similar certificates

Name Certificate ID
ID&Trust IDentity-J with SAC (PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52G v1.0.7052 JISEC-CC-CRP-C0648-01-2019 Compare

Scheme data ?

Cert Id C0649
Supplier Maxell, Ltd
Toe Overseas Name ID&Trust IDentity-J with SAC (BAC+PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52Gv1.0.7052
Expiration Date None
Claim EAL4+ ALC_DVS.2 PP
Certification Date 2019-08
Toe Overseas Link https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/c0649_it8679.html
Toe Japan Name ID&Trust IDentity-J with SAC (BAC+PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52Gv1.0.7052
Enhanced
Product ID&Trust IDentity-J with SAC (BAC+PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52G
Toe Version v1.0.7052
Product Type ICs for e-passports
Certification Date 2019-08-28
Cc Version 3.1 release5
Assurance Level EAL4 Augmented with ALC_DVS.2
Protection Profile Protection Profile for ePassport IC with SAC (BAC+PACE) and Active Authentication version 1.00 (Certification Identification : JISEC-C0500)
Vendor Maxell, Ltd
Evaluation Facility TÜV Informationstechnik GmbH, Evaluation Body for IT Security
Report Link https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/b9ck990000000o9u-att/C0649_erpt.pdf
Cert Link https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/b9ck990000000o9u-att/c0649_eimg.pdf
Target Link https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/b9ck990000000o9u-att/c0649_st.pdf
Description PRODUCT DESCRIPTION Description of TOE The TOE is an ePassport IC (including necessary software). This ePassport IC is IC chip hardware with the contactless communication interface, and basic software and ePassport application program. The operation of the security functions applied to contactless communication with the terminal comply with the BAC, PACE, and Active Authentication specifications defined by Part11 of “ICAO Doc 9303 Machine readable Travel Documents Seventh Edition”. TOE security functionality The main security functions of the TOE are to protect data stored in the TOE from illicit reading or writing. The TOE provides the main security functions, including: Basic Access Control function; Password Authenticated Connection Establishment function; Active Authentication function; Disable function of BAC function; Write protection function; Protection function in transport; and Tamper resistance.

References ?

Updates ?

  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'cert_id': 'C0649', 'supplier': 'Maxell, Ltd', 'toe_overseas_name': 'ID&Trust IDentity-J with SAC (BAC+PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52Gv1.0.7052', 'expiration_date': None, 'claim': 'EAL4+\nALC_DVS.2\nPP', 'certification_date': '2019-08', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/c0649_it8679.html', 'toe_japan_name': 'ID&Trust IDentity-J with SAC (BAC+PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52Gv1.0.7052', 'enhanced': {'product': 'ID&Trust IDentity-J with SAC (BAC+PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52G', 'toe_version': 'v1.0.7052', 'product_type': 'ICs for e-passports', 'certification_date': '2019-08-28', 'cc_version': '3.1 release5', 'assurance_level': 'EAL4 Augmented with ALC_DVS.2', 'protection_profile': 'Protection Profile for ePassport IC with SAC (BAC+PACE) and Active Authentication version 1.00 (Certification Identification : JISEC-C0500)', 'vendor': 'Maxell, Ltd', 'evaluation_facility': 'TÜV Informationstechnik GmbH, Evaluation Body for IT Security', 'report_link': 'https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/b9ck990000000o9u-att/C0649_erpt.pdf', 'cert_link': 'https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/b9ck990000000o9u-att/c0649_eimg.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/b9ck990000000o9u-att/c0649_st.pdf', 'description': 'PRODUCT DESCRIPTION \n \n \n Description of TOE \n The TOE is an ePassport IC (including necessary software). This ePassport IC is IC chip hardware with the contactless communication interface, and basic software and ePassport application program. The operation of the security functions applied to contactless communication with the terminal comply with the BAC, PACE, and Active Authentication specifications defined by Part11 of “ICAO Doc 9303 Machine readable Travel Documents Seventh Edition”. \n \n \n \n TOE security functionality \n The main security functions of the TOE are to protect data stored in the TOE from illicit reading or writing. The TOE provides the main security functions, including: \n \n Basic Access Control function; \n Password Authenticated Connection Establishment function; \n Active Authentication function; \n Disable function of BAC function; \n Write protection function; \n Protection function in transport; and \n Tamper resistance.'}}.
  • 07.10.2024 The certificate data changed.
    Certificate changed

    The Status was updated.

    • The new value is active.

    The Valid until date was updated.

    • The new value is 2024-12-24.
  • 02.09.2024 The certificate data changed.
    Certificate changed

    The Status was updated.

    • The new value is archived.

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'cce4754652822a8b8daf5e32a755c6fe6ebfff547d5e3d80f32d1c4117ba5385', 'txt_hash': 'ca4c1c4031f548a51dd9c12a369dd6a3f9d4409f8e02a6074a0a9ab8f2496bd4'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '3821b5ac12ec9530382fed5cf3843be80d1d93976353847785f9275ca0db0f9c', 'txt_hash': '5ad723b9bfabfa2713083580a6b50aea50301c249d188cdd91214f170bd3ec9e'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1235950, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 66, '/Title': 'ID&Trust IDENTITY APPLET-J with SAC (BAC+PACE) and AA - Security Target Lite', '/Author': 'LovaszD', '/Creator': 'Microsoft® Word for Office 365', '/CreationDate': "D:20190726101540+02'00'", '/ModDate': "D:20190726101540+02'00'", '/Producer': 'Microsoft® Word for Office 365', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 86383, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 2, '/CreationDate': "D:20191004103237+09'00'", '/Creator': 'Microsoft® Word 2010', '/ModDate': "D:20191004103345+09'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4+': 3, 'EAL5+': 1, 'EAL4': 4, 'EAL5': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_IMP.1': 1}, 'AGD': {'AGD_OPE.1': 1}, 'ALC': {'ALC_DVS.2': 10, 'ALC_DVS.1': 1, 'ALC_CMC.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 1, 'AVA_VAN.3': 2}, 'ASE': {'ASE_CCL.1': 1, 'ASE_INT.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 3}, 'FCO': {'FCO_NRO': 1}, 'FCS': {'FCS_CKM': 42, 'FCS_CKM.4': 52, 'FCS_COP': 131, 'FCS_RND.1': 12, 'FCS_CKM.1': 27, 'FCS_CKM.2': 7, 'FCS_CKM.3': 1, 'FCS_COP.1': 59, 'FCS_RNG.1': 7, 'FCS_RND.1.1': 2, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ACC': 37, 'FDP_ACF': 30, 'FDP_ITC.1': 41, 'FDP_UCT': 20, 'FDP_UIT': 21, 'FDP_IFC': 2, 'FDP_IFF': 2, 'FDP_ITC': 1, 'FDP_RIP': 9, 'FDP_ROL': 1, 'FDP_SDI.2': 2, 'FDP_ITC.2': 22, 'FDP_ACF.1': 18, 'FDP_ACC.1': 16, 'FDP_IFC.1': 10, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_UCT.1': 2, 'FDP_UIT.1': 4}, 'FIA': {'FIA_AFL': 24, 'FIA_UAU.1': 17, 'FIA_UAU.4': 10, 'FIA_UAU.5': 11, 'FIA_UID.1': 15, 'FIA_ATD': 1, 'FIA_UID': 3, 'FIA_USB': 1, 'FIA_AFL.1': 6, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.4.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MOF.1': 8, 'FMT_MTD.1': 11, 'FMT_SMF.1': 16, 'FMT_SMR.1': 12, 'FMT_MSA': 13, 'FMT_MTD': 2, 'FMT_SMF': 4, 'FMT_SMR': 4, 'FMT_MSA.3': 12, 'FMT_MOF.1.1': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPR': {'FPR_UNO.1': 1}, 'FPT': {'FPT_PHP.3': 13, 'FPT_FLS.1': 2, 'FPT_FLS': 3, 'FPT_RCV': 3, 'FPT_TDC.1': 1, 'FPT_PHP.3.1': 1}, 'FTP': {'FTP_ITC.1': 25, 'FTP_ITC': 1, 'FTP_TRP.1': 8, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.OPERATE': 1, 'O.RESOURCES': 1, 'O.ALARM': 1, 'O.CIPHER': 1, 'O.BAC': 12, 'O.KEY-MNGT': 1, 'O.PIN-MNGT': 1, 'O.RND': 1, 'O.GLOBAL_ARRAYS_CONFID': 1, 'O.TRANSACTION': 1, 'O.REALLOCATION': 1, 'O.IC_SUPPORT': 1, 'O.RECOVERY': 1, 'O.OS_SUPPORT': 1, 'O.AA': 8, 'O.PACE': 9}, 'T': {'T.CONFID-APPLI-DATA': 1, 'T.CONFID-JCS-DATA': 1, 'T.INTEG-APPLI-DATA': 1, 'T.INTEG-JCS-DATA': 1, 'T.RESOURCES': 1, 'T.RND': 1, 'T.PHYSICAL': 1, 'T.LEAKAGE': 1, 'T.FAULT': 1, 'T.SID': 1}, 'A': {'A.PKI': 5, 'A.APPLET': 1, 'A.VERIFICATION': 1}, 'OE': {'OE.PKI': 3}}, 'vendor': {'Infineon': {'Infineon': 7}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3, 'AES-128': 1, 'AES-256': 1}}, 'DES': {'DES': {'DES': 4}, '3DES': {'TDES': 1}}, 'constructions': {'MAC': {'CMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 3}, 'ECDSA': {'ECDSA': 5}}, 'FF': {'DH': {'Diffie-Hellman': 2}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 3}, 'SHA2': {'SHA-256': 4, 'SHA-384': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 6}, 'KA': {'Key agreement': 5}}, 'crypto_protocol': {'PACE': {'PACE': 99}}, 'randomness': {'RNG': {'RND': 2}}, 'cipher_mode': {'CBC': {'CBC': 5}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side-channel': 1, 'SPA': 1, 'DPA': 2, 'timing attack': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 9, 'EF.DG2': 9, 'EF.DG13': 9, 'EF.DG14': 9, 'EF.DG15': 10, 'EF.COM': 9, 'EF.CardAccess': 6, 'EF.SOD': 9}}, 'standard_id': {'NIST': {'SP 800-38B': 1}, 'BSI': {'BSI-AIS20': 2}, 'ISO': {'ISO/IEC 9797-1': 6, 'ISO/IEC 10116': 8}, 'ICAO': {'ICAO': 8}, 'CC': {'CCMB-2017-04-002': 1}}, 'javacard_version': {'JavaCard': {'Java Card 3.0.1': 3}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {'JP': {'JISEC-CC-CRP-C0649-01-2019': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1, 'EAL4': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to c0649_st.pdf.
    • The cert_filename property was set to c0649_eimg.pdf.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V3-2018', 'BSI-DSZ-CC-0869-V2-2019']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0869-2015', 'BSI-DSZ-CC-0891-V3-2018', 'BSI-DSZ-CC-0891-V2-2016', 'BSI-DSZ-CC-0891-2015', 'BSI-DSZ-CC-0869-V2-2019', 'BSI-DSZ-CC-0782-2012']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}]} values added.
  • 19.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '8be723309de51cbbbb0984c6ed2027aea8852633edc4805f3e3ab38c71f69030', 'txt_hash': 'bd8fbee27cbb52b74dcdc66336877c4db9e131ee159d4f704ff26e25b5c6a407'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 585311, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 49, '/Producer': 'Microsoft® Word 2010', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20191113095642+09'00'", '/ModDate': "D:20191113095642+09'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://crypto-protocol.nict.go.jp/AKE_zoo/11770-2-6-epass/11770-2-6-epass_Main.html']}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0869-V2-2019': 2, 'BSI-DSZ-CC-0891-V3-2018': 1}, 'JP': {'JISEC-CC-CRP-C0649-01-2019': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 3, 'EAL6': 1, 'EAL6+': 1, 'EAL4 augmented': 2, 'EAL6 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 4}}, 'cc_sfr': {}, 'cc_claims': {'A': {'A.PKI': 3}}, 'vendor': {'Infineon': {'Infineon': 7, 'Infineon Technologies AG': 1}, 'Gemalto': {'Gemalto': 1}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 11, 'TÜViT': 7}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 10}}, 'DES': {'DES': {'DES': 6}}, 'constructions': {'MAC': {'CMAC': 2}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 5}, 'ECDSA': {'ECDSA': 6}}, 'FF': {'DH': {'DH': 1, 'Diffie-Hellman': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 3}, 'SHA2': {'SHA-256': 4, 'SHA-384': 3}}}, 'crypto_scheme': {'MAC': {'MAC': 3}, 'KA': {'Key agreement': 1}}, 'crypto_protocol': {'PACE': {'PACE': 47}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 4}}, 'ecc_curve': {'NIST': {'P-256': 1, 'P-384': 1, 'NIST P-256': 1, 'NIST P-384': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'Side channel': 1}, 'FI': {'physical tampering': 1, 'malfunction': 1, 'DFA': 3, 'Fault Injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 5, 'EF.DG2': 5, 'EF.DG13': 6, 'EF.DG14': 7, 'EF.DG15': 10, 'EF.COM': 5, 'EF.CardAccess': 8, 'EF.SOD': 5}}, 'standard_id': {'BSI': {'AIS34': 1}, 'ISO': {'ISO/IEC 7816-4': 4, 'ISO/IEC 11770-2': 1, 'ISO/IEC 9797-1': 1}, 'ICAO': {'ICAO': 12}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to c0649_erpt.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to JISEC-CC-CRP-C0649-01-2019.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0649_erpt.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0649_st.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0869-2015']}}} data.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name ID&Trust IDentity-J with SAC (BAC+PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52G 1.0.7052 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0649_eimg.pdf",
  "dgst": "abb304884762a560",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "JISEC-CC-CRP-C0649-01-2019",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.0",
        "1.0.7052"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0869-V2-2019",
          "BSI-DSZ-CC-0891-V3-2018"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0782-2012",
          "BSI-DSZ-CC-0869-V2-2019",
          "BSI-DSZ-CC-0891-V2-2016",
          "BSI-DSZ-CC-0869-2015",
          "BSI-DSZ-CC-0891-2015",
          "BSI-DSZ-CC-0891-V3-2018"
        ]
      }
    },
    "scheme_data": {
      "cert_id": "C0649",
      "certification_date": "2019-08",
      "claim": "EAL4+\nALC_DVS.2\nPP",
      "enhanced": {
        "assurance_level": "EAL4 Augmented with ALC_DVS.2",
        "cc_version": "3.1 release5",
        "cert_link": "https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/b9ck990000000o9u-att/c0649_eimg.pdf",
        "certification_date": "2019-08-28",
        "description": "PRODUCT DESCRIPTION \n    \n    \n    Description of TOE \n     The TOE is an ePassport IC (including necessary software). This ePassport IC is IC chip hardware with the contactless communication interface, and basic software and ePassport application program. The operation of the security functions applied to contactless communication with the terminal comply with the BAC, PACE, and Active Authentication specifications defined by Part11 of \u201cICAO Doc 9303 Machine readable Travel Documents Seventh Edition\u201d.  \n    \n    \n    \n    TOE security functionality \n     The main security functions of the TOE are to protect data stored in the TOE from illicit reading or writing. The TOE provides the main security functions, including:  \n     \n     Basic Access Control function;  \n     Password Authenticated Connection Establishment function;  \n     Active Authentication function;  \n     Disable function of BAC function;  \n     Write protection function;  \n     Protection function in transport; and  \n     Tamper resistance.",
        "evaluation_facility": "T\u00dcV Informationstechnik GmbH, Evaluation Body for IT Security",
        "product": "ID\u0026Trust IDentity-J with SAC (BAC+PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52G",
        "product_type": "ICs for e-passports",
        "protection_profile": "Protection Profile for ePassport IC with SAC (BAC+PACE) and Active Authentication version 1.00 (Certification Identification : JISEC-C0500)",
        "report_link": "https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/b9ck990000000o9u-att/C0649_erpt.pdf",
        "target_link": "https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/b9ck990000000o9u-att/c0649_st.pdf",
        "toe_version": "v1.0.7052",
        "vendor": "Maxell, Ltd"
      },
      "expiration_date": null,
      "supplier": "Maxell, Ltd",
      "toe_japan_name": "ID\u0026Trust IDentity-J with SAC (BAC+PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52Gv1.0.7052",
      "toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/c0649_it8679.html",
      "toe_overseas_name": "ID\u0026Trust IDentity-J with SAC (BAC+PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52Gv1.0.7052"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Maxell, Ltd",
  "manufacturer_web": "https://www.maxell.com/",
  "name": "ID\u0026Trust IDentity-J with SAC (BAC+PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52G 1.0.7052",
  "not_valid_after": "2024-12-24",
  "not_valid_before": "2019-08-28",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "c0649_eimg.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "JP": {
          "JISEC-CC-CRP-C0649-01-2019": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL4": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20191004103237+09\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/ModDate": "D:20191004103345+09\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "pdf_file_size_bytes": 86383,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 2
    },
    "report_filename": "c0649_erpt.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 5
          },
          "ECDSA": {
            "ECDSA": 6
          }
        },
        "FF": {
          "DH": {
            "DH": 1,
            "Diffie-Hellman": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0869-V2-2019": 2,
          "BSI-DSZ-CC-0891-V3-2018": 1
        },
        "JP": {
          "JISEC-CC-CRP-C0649-01-2019": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.PKI": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 3,
          "EAL4 augmented": 2,
          "EAL6": 1,
          "EAL6 augmented": 1,
          "EAL6+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 47
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key agreement": 1
        },
        "MAC": {
          "MAC": 3
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "NIST P-256": 1,
          "NIST P-384": 1,
          "P-256": 1,
          "P-384": 1
        }
      },
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 11,
          "T\u00dcViT": 7
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 3
          },
          "SHA2": {
            "SHA-256": 4,
            "SHA-384": 3
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.COM": 5,
          "EF.CardAccess": 8,
          "EF.DG1": 5,
          "EF.DG13": 6,
          "EF.DG14": 7,
          "EF.DG15": 10,
          "EF.DG2": 5,
          "EF.SOD": 5
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "DFA": 3,
          "Fault Injection": 1,
          "malfunction": 1,
          "physical tampering": 1
        },
        "SCA": {
          "Side channel": 1,
          "physical probing": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS34": 1
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "ICAO": {
          "ICAO": 12
        },
        "ISO": {
          "ISO/IEC 11770-2": 1,
          "ISO/IEC 7816-4": 4,
          "ISO/IEC 9797-1": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 10
          }
        },
        "DES": {
          "DES": {
            "DES": 6
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 1
        },
        "Infineon": {
          "Infineon": 7,
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20191113095642+09\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/ModDate": "D:20191113095642+09\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "pdf_file_size_bytes": 585311,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://crypto-protocol.nict.go.jp/AKE_zoo/11770-2-6-epass/11770-2-6-epass_Main.html"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 49
    },
    "st_filename": "c0649_st.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 3
          },
          "ECDSA": {
            "ECDSA": 5
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 2
          },
          "DSA": {
            "DSA": 1
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.APPLET": 1,
          "A.PKI": 5,
          "A.VERIFICATION": 1
        },
        "O": {
          "O.AA": 8,
          "O.ALARM": 1,
          "O.BAC": 12,
          "O.CIPHER": 1,
          "O.GLOBAL_ARRAYS_CONFID": 1,
          "O.IC_SUPPORT": 1,
          "O.KEY-MNGT": 1,
          "O.OPERATE": 1,
          "O.OS_SUPPORT": 1,
          "O.PACE": 9,
          "O.PIN-MNGT": 1,
          "O.REALLOCATION": 1,
          "O.RECOVERY": 1,
          "O.RESOURCES": 1,
          "O.RND": 1,
          "O.TRANSACTION": 1
        },
        "OE": {
          "OE.PKI": 3
        },
        "T": {
          "T.CONFID-APPLI-DATA": 1,
          "T.CONFID-JCS-DATA": 1,
          "T.FAULT": 1,
          "T.INTEG-APPLI-DATA": 1,
          "T.INTEG-JCS-DATA": 1,
          "T.LEAKAGE": 1,
          "T.PHYSICAL": 1,
          "T.RESOURCES": 1,
          "T.RND": 1,
          "T.SID": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_IMP.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 10,
          "ALC_LCD.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_INT.1": 1,
          "ASE_REQ.2": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.3": 2,
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 4,
          "EAL4 augmented": 1,
          "EAL4+": 3,
          "EAL5": 2,
          "EAL5+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 3
        },
        "FCO": {
          "FCO_NRO": 1
        },
        "FCS": {
          "FCS_CKM": 42,
          "FCS_CKM.1": 27,
          "FCS_CKM.2": 7,
          "FCS_CKM.3": 1,
          "FCS_CKM.4": 52,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 131,
          "FCS_COP.1": 59,
          "FCS_RND.1": 12,
          "FCS_RND.1.1": 2,
          "FCS_RNG.1": 7
        },
        "FDP": {
          "FDP_ACC": 37,
          "FDP_ACC.1": 16,
          "FDP_ACF": 30,
          "FDP_ACF.1": 18,
          "FDP_IFC": 2,
          "FDP_IFC.1": 10,
          "FDP_IFF": 2,
          "FDP_ITC": 1,
          "FDP_ITC.1": 41,
          "FDP_ITC.1.1": 1,
          "FDP_ITC.1.2": 1,
          "FDP_ITC.1.3": 1,
          "FDP_ITC.2": 22,
          "FDP_RIP": 9,
          "FDP_ROL": 1,
          "FDP_SDI.2": 2,
          "FDP_UCT": 20,
          "FDP_UCT.1": 2,
          "FDP_UIT": 21,
          "FDP_UIT.1": 4
        },
        "FIA": {
          "FIA_AFL": 24,
          "FIA_AFL.1": 6,
          "FIA_ATD": 1,
          "FIA_UAU.1": 17,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.4": 10,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.5": 11,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UID": 3,
          "FIA_UID.1": 15,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB": 1
        },
        "FMT": {
          "FMT_MOF.1": 8,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 13,
          "FMT_MSA.3": 12,
          "FMT_MTD": 2,
          "FMT_MTD.1": 11,
          "FMT_MTD.1.1": 1,
          "FMT_SMF": 4,
          "FMT_SMF.1": 16,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 4,
          "FMT_SMR.1": 12,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO.1": 1
        },
        "FPT": {
          "FPT_FLS": 3,
          "FPT_FLS.1": 2,
          "FPT_PHP.3": 13,
          "FPT_PHP.3.1": 1,
          "FPT_RCV": 3,
          "FPT_TDC.1": 1
        },
        "FTP": {
          "FTP_ITC": 1,
          "FTP_ITC.1": 25,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 8
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 5
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 99
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key agreement": 5
        },
        "MAC": {
          "MAC": 6
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 3
          },
          "SHA2": {
            "SHA-256": 4,
            "SHA-384": 2
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.COM": 9,
          "EF.CardAccess": 6,
          "EF.DG1": 9,
          "EF.DG13": 9,
          "EF.DG14": 9,
          "EF.DG15": 10,
          "EF.DG2": 9,
          "EF.SOD": 9
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {
        "JavaCard": {
          "Java Card 3.0.1": 3
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 2
        }
      },
      "side_channel_analysis": {
        "SCA": {
          "DPA": 2,
          "SPA": 1,
          "side-channel": 1,
          "timing attack": 1
        }
      },
      "standard_id": {
        "BSI": {
          "BSI-AIS20": 2
        },
        "CC": {
          "CCMB-2017-04-002": 1
        },
        "ICAO": {
          "ICAO": 8
        },
        "ISO": {
          "ISO/IEC 10116": 8,
          "ISO/IEC 9797-1": 6
        },
        "NIST": {
          "SP 800-38B": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 3,
            "AES-128": 1,
            "AES-256": 1
          }
        },
        "DES": {
          "3DES": {
            "TDES": 1
          },
          "DES": {
            "DES": 4
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 7
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "LovaszD",
      "/CreationDate": "D:20190726101540+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Office 365",
      "/ModDate": "D:20190726101540+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Office 365",
      "/Title": "ID\u0026Trust IDENTITY APPLET-J with SAC (BAC+PACE) and AA - Security Target Lite",
      "pdf_file_size_bytes": 1235950,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 66
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0500_epp.pdf",
        "pp_name": "Protection Profile for ePassport IC with SAC (BAC + PACE) and Active Authentication 1...."
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0649_erpt.pdf",
  "scheme": "JP",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_DVS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0649_st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "3821b5ac12ec9530382fed5cf3843be80d1d93976353847785f9275ca0db0f9c",
      "txt_hash": "5ad723b9bfabfa2713083580a6b50aea50301c249d188cdd91214f170bd3ec9e"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "8be723309de51cbbbb0984c6ed2027aea8852633edc4805f3e3ab38c71f69030",
      "txt_hash": "bd8fbee27cbb52b74dcdc66336877c4db9e131ee159d4f704ff26e25b5c6a407"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "cce4754652822a8b8daf5e32a755c6fe6ebfff547d5e3d80f32d1c4117ba5385",
      "txt_hash": "ca4c1c4031f548a51dd9c12a369dd6a3f9d4409f8e02a6074a0a9ab8f2496bd4"
    }
  },
  "status": "active"
}