CELES-c001 Machine Readable Electronic Document ICAO Application - Basic Access Control, version 1 (CELES-c001_1)

CSV information ?

Status active
Valid from 11.07.2020
Valid until 11.07.2025
Scheme 🇪🇸 ES
Manufacturer HID Global
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_DVS.2, EAL4+

Heuristics summary ?

Certificate ID: 2017-17-INF-3169

Certificate ?

Extracted keywords

Claims
O.E, T.I
Evaluation facilities
Applus Laboratories

Standards
ICAO

File metadata

Pages 2

Certification report ?

Extracted keywords

Symmetric Algorithms
DES
Hash functions
SHA-2
Schemes
MAC
Libraries
Crypto Library v2.02.010

IC data groups
EF.DG14, EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG13, EF.DG16
Vendor
Infineon

Security level
EAL4+, EAL4, EAL6, EAL 1, EAL 4, EAL 2, EAL2, ITSEC Evaluation
Claims
A
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCS.1, ALC_TAT.1, ALC_FLR.1, ALC_FLR, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_SAS.1, FCS_CKM, FCS_CKM.4, FCS_COP, FCS_RND.1, FDP_ACC.1, FDP_ACF.1, FDP_UCT.1, FDP_UIT.1, FIA_AFL, FIA_UAU.1, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FIA_UID.1, FMT_LIM.1, FMT_LIM.2, FMT_MTD, FMT_SMF.1, FMT_SMR.1, FPT_FLS.1, FPT_PHP.3, FPT_TST.1
Certificates
BSI-DSZ-CC-0891-V3-2018, 2017-17-INF-3169-v1
Evaluation facilities
Applus Laboratories

Side-channel analysis
physical probing, DPA, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineering
Certification process
out of scope, These data are protected by means of Extended Access Control, which is out of scope of the Security Tarrget, according to [CC_P1]. These data are protected by means of Extended Access Control, which is out of scope of the Security Tarrget. 18/23 https://oc.ccn.cni.es [email protected] an

Standards
ICAO

File metadata

Creation date D:20200720132528+02'00'
Modification date D:20200720132528+02'00'
Pages 23
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

References

Outgoing
  • BSI-DSZ-CC-0891-V3-2018 - archived - Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware and optional software

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, Triple-DES, TDES
Hash functions
SHA-1, SHA-224, SHA-256, SHA-2
Schemes
MAC
Protocols
PACE
Randomness
TRNG, RND
Libraries
Crypto Library v2.02.010
Block cipher modes
CBC

IC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG15, EF.DG14, EF.DG13, EF.COM, EF.SOD
Vendor
Infineon, Infineon Technologies AG

Security level
EAL4+, EAL6+, EAL4, EAL6, EAL6 augmented
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_ARC, ADV_FSP, ADV_TDS, ADV_IMP, AGD_OPE.1, AGD_PRE.1, AGD_PRE, AGD_OPE, ALC_DVS.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ALC_DVS.1, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_LCD, ALC_TAT, ALC_FLR.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3, AVA_VAN, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_GEN, FAU_SAS.1.1, FCS_RND, FCS_CKM, FCS_CKM.4, FCS_COP, FCS_RND.1, FCS_CKM.1, FCS_RND.1.1, FCS_CKM.2, FCS_COP.1, FCS_CMK.4, FDP_ACC.1, FDP_ACF.1, FDP_UCT.1, FDP_UIT.1, FDP_ACF, FDP_ITC.1, FDP_ITC.2, FDP_IFC.1, FDP_ACF.1.2, FDP_ACF.1.4, FDP_ITC, FIA_UID.1, FIA_UAU.1, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FIA_AFL, FIA_UAU.5.2, FIA_SOS.2, FIA_AFL.1, FMT_LIM, FMT_SMF.1, FMT_SMR.1, FMT_LIM.1, FMT_MTD, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.3, FMT_MTD.1, FMT_MSA.1, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_TST, FPT_TST.1.3, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP-0055, BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0068-V2-2011-MA-01, BSI-CC-PP-0084-2014
Certificates
BSI-DSZ-CC-0891-V3-2018

Side-channel analysis
physical probing, side channels, DPA, SPA, timing attacks, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineering
Certification process
out of scope, These data are protected by means of Extended Access Control, which is out of scope of this ST, optional according to [R17]. These data are protected by means of Extended Access Control, which is out of scope of this ST. CELES-c001 Security Target Basic Access Control PUBLIC Version: 1.0 Date: 2020-03-10

Standards
FIPS 180-4, FIPS 180-2, FIPS 46-3, FIPS 197, FIPS PUB 46-3, FIPS PUB 180-4, FIPS PUB 197, PKCS #15, AIS31, RFC 2119, RFC 3369, ISO/IEC 7816-2, ISO/IEC 14443, ISO/IEC 7816-4, ICAO
Technical reports
BSI TR-03110

File metadata

Title Security Target Lite for CELES-c001 Machine Readable Electronic Document - ICAO Application - Basic Access Control
Subject CELES-c001 Machine Readable Electronic Document
Author Marco EVANGELISTA, Giovanni LICCARDO, Pasquale NOCE
Creation date D:20200310163734+01'00'
Modification date D:20200310163734+01'00'
Pages 121
Creator Microsoft® Word for Office 365
Producer Microsoft® Word for Office 365

References

Outgoing
  • BSI-DSZ-CC-0891-V3-2018 - archived - Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware and optional software

Heuristics ?

Certificate ID: 2017-17-INF-3169

Extracted SARs

ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ALC_LCD.1, ALC_LCS.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3

Similar certificates

Name Certificate ID
CELES-c001 Machine Readable Electronic Document ICAO Application - EAC-PACE-AA, version 1 (CELES-c001_1) 2017-18-INF-3170 Compare
CELES-c001 Machine Readable Electronic Document SSCD Application, version 1 (CELES-c001_1) 2017-19-INF-3171 Compare
CELES-c002 Machine Readable Electronic Document, ICAO Application - BAC, version 1 NSCIB-CC-0245762-CR Compare
CELES-c002 Machine Readable Electronic Document, ICAO Application - EAC-PACE-AA, version 1 NSCIB-CC-0245767-CR Compare
cv act ePasslet Suite v2.1 – Java Card applet configuration providing Machine Readable Travel Document with “ICAO Application”, Basic Access Control (BAC) BSI-DSZ-CC-0911-2014 Compare
Machine Readable Travel Document with „ICAO Application“, Basic Access Control based on National Operating System (NOS) NOS e-Passport (BAC) v.1.0-I BSI-DSZ-CC-0987-2019 Compare
SECORA™ ID X Applet Collection with ePasslet Suite v3.5 by cryptovision GmbH, version 1.0 – Java Card applet configuration providing Machine Readable Travel Document with „ICAO Application”, Extended Access Control with PACE NSCIB-CC-0189587-CR Compare
CELES-c002 Machine Readable Electronic Document, eIDAS QSCD Application, version 1 NSCIB-CC-0245771-CR Compare
SOMA-c007 Machine Readable Electronic Document Basic Access Control version 4 (SOMA-c007_4) 2021-43-INF-4154 Compare
SOMA-c018 Machine Readable Electronic Document - Basic Access Control version 2 (SOMA-c018_2) 2017-62-INF-3233 Compare
SOMA-c007 Machine Readable Electronic Document Basic Access Control (SOMA-c007_2) version 2 2016-30-INF-2094 Compare
cv act ePasslet Suite v2.1 – Java Card applet configuration providing Machine Readable Travel Document with „ICAO Application”, Extended Access Control with PACE BSI-DSZ-CC-0913-2014 Compare
cv act ePasslet Suite v2.1 – Java Card applet configuration providing Machine Readable Travel Document with “ICAO Application”, Extended Access Control (EAC) BSI-DSZ-CC-0912-2014 Compare
Veridos Suite v4.0 - cryptovision ePasslet Suite - Java Card applet configuration providing Machine-Readable Electronic Documents „ICAO Application”, Extended Access Control with PACE NSCIB-CC-2300087-01-CR Compare
Machine Readable e-Document with „ICAO Application”, Extended Access Control with PACE based on National Operating System (NOS) NOS e-Passport (EAC with PACE) v.1.01-I BSI-DSZ-CC-0985-2018 Compare
Showing 5 out of 15.

Scheme data ?

Product SOMA-c007 Machine Readable Electronic Document Basic Access Control (SOMA-c007_2) version 2
Product Link https://oc.ccn.cni.es/en/certified-products/certified-products/253-soma-c007-machine-readable-electronic-document-basic-access-control-soma-c007-2-version-2
Category Network Access Control Devices
Manufacturer HID Global / Arjo Systems
Certification Date 28.11.2017
Enhanced
Description The physical TOE is comprised of the following parts:• the integrated circuit chip (microcontroller) programmed with the operating systemand with the ICAO application (Embedded Software).• the guidance documentation, composed by:o the Initialization Guidance for the Initialization Agent [AGDINI].o the Pre-personalization guidance for the Pre-personalization Agent [AGDPRE],o the Personalization Guidance for the Personalization Agent [AGDPERS], ando The Operational User Guidance for the User (Inspection System) [AGDOPE].The Embedded Software of the TOE comprises the following software componentsstored in the non-volatile memory units of the microcontroller:• operating system• file system• e-Document applications• security data objects
Category Network Access Control Devices
Manufacturer HID Global / Arjo Systems
Type Product
Evaluation Facility Applus Laboratories
Status Certified
Certification Date 28.11.2017
Cc Version Common Criteria 3.1 release 4
Level EAL4 + ALC_DVS.2
Report Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=510
Target Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=511
Cert Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=512

References ?

Updates ?

  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'certification_date': '2017-11-28'} data.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '6ca7f9d8aee433438bb95f2801c359e5811f770d9eb6d76626b43ef95059c7fd', 'txt_hash': 'bf43c692f348953c006ce5e004066d05c6aa27a218657707a6fc6fb3ace91845'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b066c20899f48308cee9a86933dc1ad58f7d97e15001b6d6d8b5fefc043c5041', 'txt_hash': 'b71824020d6c218524e9f728c5082ed7a41a8b60fb6c20bb84d571153b809715'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1020238, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 121, '/Title': 'Security Target Lite for CELES-c001 Machine Readable Electronic Document - ICAO Application - Basic Access Control', '/Author': 'Marco EVANGELISTA, Giovanni LICCARDO, Pasquale NOCE', '/Subject': 'CELES-c001 Machine Readable Electronic Document', '/Creator': 'Microsoft® Word for Office 365', '/CreationDate': "D:20200310163734+01'00'", '/ModDate': "D:20200310163734+01'00'", '/Producer': 'Microsoft® Word for Office 365', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 751883, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Trapped': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0891-V3-2018': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0055': 1, 'BSI-CC-PP-0056-V2-2012': 1, 'BSI-CC-PP-0068-V2-2011-MA-01': 1, 'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL4+': 3, 'EAL6+': 2, 'EAL4': 7, 'EAL6': 2, 'EAL6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 3, 'ADV_FSP.4': 2, 'ADV_IMP.1': 2, 'ADV_TDS.3': 2, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_TDS': 1, 'ADV_IMP': 1}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2, 'AGD_PRE': 1, 'AGD_OPE': 1}, 'ALC': {'ALC_DVS.2': 7, 'ALC_CMC.4': 2, 'ALC_CMS.4': 2, 'ALC_DEL.1': 2, 'ALC_LCD.1': 2, 'ALC_TAT.1': 2, 'ALC_DVS.1': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1, 'ALC_FLR.1': 1}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.1': 2, 'ATE_FUN.1': 2, 'ATE_IND.2': 2}, 'AVA': {'AVA_VAN.3': 2, 'AVA_VAN': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS': 7, 'FAU_SAS.1': 10, 'FAU_GEN': 1, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_RND': 8, 'FCS_CKM': 26, 'FCS_CKM.4': 26, 'FCS_COP': 51, 'FCS_RND.1': 14, 'FCS_CKM.1': 18, 'FCS_RND.1.1': 1, 'FCS_CKM.2': 4, 'FCS_COP.1': 9, 'FCS_CMK.4': 1}, 'FDP': {'FDP_ACC.1': 21, 'FDP_ACF.1': 17, 'FDP_UCT.1': 12, 'FDP_UIT.1': 12, 'FDP_ACF': 1, 'FDP_ITC.1': 10, 'FDP_ITC.2': 10, 'FDP_IFC.1': 4, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.4': 1, 'FDP_ITC': 2}, 'FIA': {'FIA_UID.1': 15, 'FIA_UAU.1': 19, 'FIA_UAU.4': 18, 'FIA_UAU.5': 14, 'FIA_UAU.6': 12, 'FIA_AFL': 21, 'FIA_UAU.5.2': 1, 'FIA_SOS.2': 1, 'FIA_AFL.1': 7}, 'FMT': {'FMT_LIM': 8, 'FMT_SMF.1': 28, 'FMT_SMR.1': 28, 'FMT_LIM.1': 24, 'FMT_MTD': 34, 'FMT_LIM.2': 18, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 3, 'FMT_MSA.3': 3, 'FMT_MTD.1': 7, 'FMT_MSA.1': 1}, 'FPT': {'FPT_FLS.1': 12, 'FPT_TST.1': 12, 'FPT_PHP.3': 13, 'FPT_TST': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC.1': 5, 'FTP_TRP.1': 5}}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon': 13, 'Infineon Technologies AG': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 5}}, 'DES': {'DES': {'DES': 6}, '3DES': {'Triple-DES': 20, 'TDES': 3}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 3}, 'SHA2': {'SHA-224': 1, 'SHA-256': 2, 'SHA-2': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 13}}, 'crypto_protocol': {'PACE': {'PACE': 7}}, 'randomness': {'TRNG': {'TRNG': 3}, 'RNG': {'RND': 1}}, 'cipher_mode': {'CBC': {'CBC': 4}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Generic': {'Crypto Library v2.02.010': 2}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 3, 'side channels': 1, 'DPA': 3, 'SPA': 2, 'timing attacks': 1}, 'FI': {'Physical Tampering': 5, 'physical tampering': 2, 'Physical tampering': 1, 'Malfunction': 4, 'malfunction': 6, 'fault injection': 2}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {'BSI': {'BSI TR-03110': 2}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 31, 'EF.DG2': 10, 'EF.DG3': 8, 'EF.DG4': 7, 'EF.DG5': 8, 'EF.DG16': 27, 'EF.DG15': 7, 'EF.DG14': 11, 'EF.DG13': 6, 'EF.COM': 10, 'EF.SOD': 10}}, 'standard_id': {'FIPS': {'FIPS 180-4': 1, 'FIPS 180-2': 1, 'FIPS 46-3': 3, 'FIPS 197': 1, 'FIPS PUB 46-3': 1, 'FIPS PUB 180-4': 1, 'FIPS PUB 197': 1}, 'PKCS': {'PKCS #15': 1}, 'BSI': {'AIS31': 2}, 'RFC': {'RFC 2119': 1, 'RFC 3369': 1}, 'ISO': {'ISO/IEC 7816-2': 2, 'ISO/IEC 14443': 2, 'ISO/IEC 7816-4': 1}, 'ICAO': {'ICAO': 55}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, ' These data are protected by means of Extended Access Control, which is out of scope of this ST': 1, 'optional according to [R17]. These data are protected by means of Extended Access Control, which is out of scope of this ST. CELES-c001 Security Target Basic Access Control PUBLIC Version: 1.0 Date: 2020-03-10': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.E': 1}, 'T': {'T.I': 1}}, 'vendor': {}, 'eval_facility': {'Applus': {'Applus Laboratories': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ICAO': {'ICAO': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to 2017-17-ST_Lite.pdf.
    • The cert_filename property was set to 2017-17-CCRA.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V3-2018']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V3-2018', 'BSI-DSZ-CC-0891-V2-2016']}} data.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V3-2018']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-2015', 'BSI-DSZ-CC-0891-V3-2018', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0891-V2-2016']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]} values added.
  • 19.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b270ff94f885e5b66bb55fb42052c2703339831946408c06681bfb78a6dced84', 'txt_hash': '7715bcc425212881eccd0490d44513f88a2f2c24fcaf09977896d5f652df0034'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 953362, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 23, '/Producer': 'Microsoft® Word 2016', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20200720132528+02'00'", '/ModDate': "D:20200720132528+02'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.sogis./', 'http://www.commoncriteriaportal.org/']}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0891-V3-2018': 1}, 'ES': {'2017-17-INF-3169-v1': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4+': 1, 'EAL4': 4, 'EAL6': 1, 'EAL 1': 1, 'EAL 4': 2, 'EAL 2': 1, 'EAL2': 1}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS.2': 4, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCS.1': 1, 'ALC_TAT.1': 1, 'ALC_FLR.1': 1, 'ALC_FLR': 3}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.3': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 1}, 'FCS': {'FCS_CKM': 2, 'FCS_CKM.4': 1, 'FCS_COP': 4, 'FCS_RND.1': 1}, 'FDP': {'FDP_ACC.1': 1, 'FDP_ACF.1': 1, 'FDP_UCT.1': 1, 'FDP_UIT.1': 1}, 'FIA': {'FIA_AFL': 2, 'FIA_UAU.1': 1, 'FIA_UAU.4': 1, 'FIA_UAU.5': 1, 'FIA_UAU.6': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_LIM.1': 1, 'FMT_LIM.2': 1, 'FMT_MTD': 5, 'FMT_SMF.1': 1, 'FMT_SMR.1': 1}, 'FPT': {'FPT_FLS.1': 1, 'FPT_PHP.3': 1, 'FPT_TST.1': 1}}, 'cc_claims': {'A': {'A': 1}}, 'vendor': {'Infineon': {'Infineon': 2}}, 'eval_facility': {'Applus': {'Applus Laboratories': 4}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-2': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Generic': {'Crypto Library v2.02.010': 2}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'DPA': 1}, 'FI': {'Physical Tampering': 1, 'physical tampering': 1, 'Physical tampering': 1, 'Malfunction': 1, 'malfunction': 1, 'fault injection': 1}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG14': 2, 'EF.DG1': 3, 'EF.DG2': 2, 'EF.DG3': 2, 'EF.DG4': 2, 'EF.DG5': 2, 'EF.DG13': 1, 'EF.DG16': 3}}, 'standard_id': {'ICAO': {'ICAO': 23}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, ' These data are protected by means of Extended Access Control, which is out of scope of the Security Tarrget': 1, 'according to [CC_P1]. These data are protected by means of Extended Access Control, which is out of scope of the Security Tarrget. 18/23 https://oc.ccn.cni.es [email protected] an': 1}}}.
    • The report_filename property was set to 2017-17-INF-3169.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to 2017-17-INF-3169.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-17-INF-3169.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-17-ST_Lite.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The report_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name CELES-c001 Machine Readable Electronic Document ICAO Application - Basic Access Control, version 1 (CELES-c001_1) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-17-CCRA.pdf",
  "dgst": "bb451edc9c5eb8a2",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "2017-17-INF-3169",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0891-V3-2018"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0891-V3-2018",
          "BSI-DSZ-CC-0891-2015",
          "BSI-DSZ-CC-0891-V2-2016",
          "BSI-DSZ-CC-0782-2012"
        ]
      }
    },
    "scheme_data": {
      "category": "Network Access Control Devices",
      "certification_date": "2017-11-28",
      "enhanced": {
        "category": "Network Access Control Devices",
        "cc_version": "Common Criteria 3.1 release 4",
        "cert_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=512",
        "certification_date": "2017-11-28",
        "description": "The physical TOE is comprised of the following parts:\u2022 the integrated circuit chip (microcontroller) programmed with the operating systemand with the ICAO application (Embedded Software).\u2022 the guidance documentation, composed by:o the Initialization Guidance for the Initialization Agent [AGDINI].o the Pre-personalization guidance for the Pre-personalization Agent [AGDPRE],o the Personalization Guidance for the Personalization Agent [AGDPERS], ando The Operational User Guidance for the User (Inspection System) [AGDOPE].The Embedded Software of the TOE comprises the following software componentsstored in the non-volatile memory units of the microcontroller:\u2022 operating system\u2022 file system\u2022 e-Document applications\u2022 security data objects",
        "evaluation_facility": "Applus Laboratories",
        "level": "EAL4 + ALC_DVS.2",
        "manufacturer": "HID Global / Arjo Systems",
        "report_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=510",
        "status": "Certified",
        "target_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=511",
        "type": "Product"
      },
      "manufacturer": "HID Global / Arjo Systems",
      "product": "SOMA-c007 Machine Readable Electronic Document Basic Access Control (SOMA-c007_2) version 2",
      "product_link": "https://oc.ccn.cni.es/en/certified-products/certified-products/253-soma-c007-machine-readable-electronic-document-basic-access-control-soma-c007-2-version-2"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0891-V3-2018"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0891-V2-2016",
          "BSI-DSZ-CC-0891-V3-2018"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "HID Global",
  "manufacturer_web": "https://www.hidglobal.com/",
  "name": "CELES-c001 Machine Readable Electronic Document ICAO Application - Basic Access Control, version 1 (CELES-c001_1)",
  "not_valid_after": "2025-07-11",
  "not_valid_before": "2020-07-11",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "2017-17-CCRA.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.E": 1
        },
        "T": {
          "T.I": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Applus": {
          "Applus Laboratories": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ICAO": {
          "ICAO": 3
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Trapped": "",
      "pdf_file_size_bytes": 751883,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "2017-17-INF-3169.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0891-V3-2018": 1
        },
        "ES": {
          "2017-17-INF-3169-v1": 1
        }
      },
      "cc_claims": {
        "A": {
          "A": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 4,
          "ALC_FLR": 3,
          "ALC_FLR.1": 1,
          "ALC_LCS.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.3": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 1,
          "EAL 4": 2,
          "EAL2": 1,
          "EAL4": 4,
          "EAL4+": 1,
          "EAL6": 1
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS.1": 1
        },
        "FCS": {
          "FCS_CKM": 2,
          "FCS_CKM.4": 1,
          "FCS_COP": 4,
          "FCS_RND.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 1,
          "FDP_ACF.1": 1,
          "FDP_UCT.1": 1,
          "FDP_UIT.1": 1
        },
        "FIA": {
          "FIA_AFL": 2,
          "FIA_UAU.1": 1,
          "FIA_UAU.4": 1,
          "FIA_UAU.5": 1,
          "FIA_UAU.6": 1,
          "FIA_UID.1": 1
        },
        "FMT": {
          "FMT_LIM.1": 1,
          "FMT_LIM.2": 1,
          "FMT_MTD": 5,
          "FMT_SMF.1": 1,
          "FMT_SMR.1": 1
        },
        "FPT": {
          "FPT_FLS.1": 1,
          "FPT_PHP.3": 1,
          "FPT_TST.1": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          " These data are protected by means of Extended Access Control, which is out of scope of the Security Tarrget": 1,
          "according to [CC_P1]. These data are protected by means of Extended Access Control, which is out of scope of the Security Tarrget. 18/23 https://oc.ccn.cni.es [email protected]  an": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Generic": {
          "Crypto Library v2.02.010": 2
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Applus": {
          "Applus Laboratories": 4
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-2": 2
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.DG1": 3,
          "EF.DG13": 1,
          "EF.DG14": 2,
          "EF.DG16": 3,
          "EF.DG2": 2,
          "EF.DG3": 2,
          "EF.DG4": 2,
          "EF.DG5": 2
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 1,
          "Physical Tampering": 1,
          "Physical tampering": 1,
          "fault injection": 1,
          "malfunction": 1,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 1,
          "physical probing": 1
        },
        "other": {
          "reverse engineering": 1
        }
      },
      "standard_id": {
        "ICAO": {
          "ICAO": 23
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 2
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20200720132528+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20200720132528+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "pdf_file_size_bytes": 953362,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.sogis./",
          "http://www.commoncriteriaportal.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 23
    },
    "st_filename": "2017-17-ST_Lite.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0891-V3-2018": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0055": 1,
          "BSI-CC-PP-0056-V2-2012": 1,
          "BSI-CC-PP-0068-V2-2011-MA-01": 1,
          "BSI-CC-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 3,
          "ADV_FSP": 1,
          "ADV_FSP.4": 2,
          "ADV_IMP": 1,
          "ADV_IMP.1": 2,
          "ADV_TDS": 1,
          "ADV_TDS.3": 2
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 2,
          "AGD_PRE": 1,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.4": 2,
          "ALC_CMS": 1,
          "ALC_CMS.4": 2,
          "ALC_DEL": 1,
          "ALC_DEL.1": 2,
          "ALC_DVS": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 7,
          "ALC_FLR.1": 1,
          "ALC_LCD": 1,
          "ALC_LCD.1": 2,
          "ALC_TAT": 1,
          "ALC_TAT.1": 2
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 2,
          "ATE_DPT.1": 2,
          "ATE_FUN.1": 2,
          "ATE_IND.2": 2
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.3": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 7,
          "EAL4+": 3,
          "EAL6": 2,
          "EAL6 augmented": 1,
          "EAL6+": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_SAS": 7,
          "FAU_SAS.1": 10,
          "FAU_SAS.1.1": 1
        },
        "FCS": {
          "FCS_CKM": 26,
          "FCS_CKM.1": 18,
          "FCS_CKM.2": 4,
          "FCS_CKM.4": 26,
          "FCS_CMK.4": 1,
          "FCS_COP": 51,
          "FCS_COP.1": 9,
          "FCS_RND": 8,
          "FCS_RND.1": 14,
          "FCS_RND.1.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 21,
          "FDP_ACF": 1,
          "FDP_ACF.1": 17,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 4,
          "FDP_ITC": 2,
          "FDP_ITC.1": 10,
          "FDP_ITC.2": 10,
          "FDP_UCT.1": 12,
          "FDP_UIT.1": 12
        },
        "FIA": {
          "FIA_AFL": 21,
          "FIA_AFL.1": 7,
          "FIA_SOS.2": 1,
          "FIA_UAU.1": 19,
          "FIA_UAU.4": 18,
          "FIA_UAU.5": 14,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6": 12,
          "FIA_UID.1": 15
        },
        "FMT": {
          "FMT_LIM": 8,
          "FMT_LIM.1": 24,
          "FMT_LIM.1.1": 2,
          "FMT_LIM.2": 18,
          "FMT_LIM.2.1": 3,
          "FMT_MSA.1": 1,
          "FMT_MSA.3": 3,
          "FMT_MTD": 34,
          "FMT_MTD.1": 7,
          "FMT_SMF.1": 28,
          "FMT_SMR.1": 28
        },
        "FPT": {
          "FPT_FLS.1": 12,
          "FPT_PHP.3": 13,
          "FPT_TST": 1,
          "FPT_TST.1": 12,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC.1": 5,
          "FTP_TRP.1": 5
        }
      },
      "certification_process": {
        "OutOfScope": {
          " These data are protected by means of Extended Access Control, which is out of scope of this ST": 1,
          "optional according to [R17]. These data are protected by means of Extended Access Control, which is out of scope of this ST. CELES-c001 Security Target Basic Access Control PUBLIC Version: 1.0 Date: 2020-03-10": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Generic": {
          "Crypto Library v2.02.010": 2
        }
      },
      "crypto_protocol": {
        "PACE": {
          "PACE": 7
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 13
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 3
          },
          "SHA2": {
            "SHA-2": 2,
            "SHA-224": 1,
            "SHA-256": 2
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.COM": 10,
          "EF.DG1": 31,
          "EF.DG13": 6,
          "EF.DG14": 11,
          "EF.DG15": 7,
          "EF.DG16": 27,
          "EF.DG2": 10,
          "EF.DG3": 8,
          "EF.DG4": 7,
          "EF.DG5": 8,
          "EF.SOD": 10
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 1
        },
        "TRNG": {
          "TRNG": 3
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 4,
          "Physical Tampering": 5,
          "Physical tampering": 1,
          "fault injection": 2,
          "malfunction": 6,
          "physical tampering": 2
        },
        "SCA": {
          "DPA": 3,
          "SPA": 2,
          "physical probing": 3,
          "side channels": 1,
          "timing attacks": 1
        },
        "other": {
          "reverse engineering": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 2
        },
        "FIPS": {
          "FIPS 180-2": 1,
          "FIPS 180-4": 1,
          "FIPS 197": 1,
          "FIPS 46-3": 3,
          "FIPS PUB 180-4": 1,
          "FIPS PUB 197": 1,
          "FIPS PUB 46-3": 1
        },
        "ICAO": {
          "ICAO": 55
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 7816-2": 2,
          "ISO/IEC 7816-4": 1
        },
        "PKCS": {
          "PKCS #15": 1
        },
        "RFC": {
          "RFC 2119": 1,
          "RFC 3369": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 5
          }
        },
        "DES": {
          "3DES": {
            "TDES": 3,
            "Triple-DES": 20
          },
          "DES": {
            "DES": 6
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03110": 2
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 13,
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Marco EVANGELISTA, Giovanni LICCARDO, Pasquale NOCE",
      "/CreationDate": "D:20200310163734+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Office 365",
      "/ModDate": "D:20200310163734+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Office 365",
      "/Subject": "CELES-c001 Machine Readable Electronic Document",
      "/Title": "Security Target Lite for CELES-c001 Machine Readable Electronic Document - ICAO Application - Basic Access Control",
      "pdf_file_size_bytes": 1020238,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 121
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf",
        "pp_name": "Protection Profile for Machine Readable Travel Document with \u0027ICAO Application\u0027, Basic Acce..."
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-17-INF-3169.pdf",
  "scheme": "ES",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_DVS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-17-ST_Lite.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "b066c20899f48308cee9a86933dc1ad58f7d97e15001b6d6d8b5fefc043c5041",
      "txt_hash": "b71824020d6c218524e9f728c5082ed7a41a8b60fb6c20bb84d571153b809715"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "b270ff94f885e5b66bb55fb42052c2703339831946408c06681bfb78a6dced84",
      "txt_hash": "7715bcc425212881eccd0490d44513f88a2f2c24fcaf09977896d5f652df0034"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "6ca7f9d8aee433438bb95f2801c359e5811f770d9eb6d76626b43ef95059c7fd",
      "txt_hash": "bf43c692f348953c006ce5e004066d05c6aa27a218657707a6fc6fb3ace91845"
    }
  },
  "status": "active"
}