SOMA-c007 Machine Readable Electronic Document EAC-PACE-AA version 4 (SOMA-c007_4)

CSV information ?

Status active
Valid from 15.09.2023
Valid until 15.09.2028
Scheme 🇪🇸 ES
Manufacturer HID Global
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, ALC_DVS.2, EAL5+
Protection profiles

Heuristics summary ?

Certificate ID: 2021-44-INF-4142

Certificate ?

Extracted keywords

Security level
EAL 2
Security Assurance Requirements (SAR)
ALC_FLR, ALC_DVS.2, AVA_VAN.5
Protection profiles
BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0068-V2-2011-MA-01
Evaluation facilities
Applus Laboratories

Standards
ICAO

File metadata

Creation date D:20230904141112+02'00'
Modification date D:20230904141112+02'00'
Pages 1
Producer GPL Ghostscript 9.27

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, Triple-DES
Hash functions
SHA-512
Protocols
PACE

Vendor
Infineon

Security level
EAL5, EAL5+, EAL6, EAL6+, EAL 1, EAL 4, EAL 2, EAL2, EAL6 augmented, ITSEC Evaluation
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_IMP.1, ADV_TDS.4, ADV_ARC, AGD_OPE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_TAT.2, ALC_FLR, ATE_COV.2, ATE_FUN.1, AVA_VAN.5, ASE_CCL.1, ASE_INT.1, ASE_REQ.2
Protection profiles
BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0068-V2-2011-MA-01, BSI-CC-PP-0068-V2
Certificates
BSI-DSZ-CC-0891-V6-2021, 2021-44-INF-4142- v1
Evaluation facilities
Applus Laboratories

Side-channel analysis
JIL

Standards
ICAO
Technical reports
BSI TR-03110

File metadata

Author 9308
Creation date D:20230918155842+02'00'
Modification date D:20230918155842+02'00'
Pages 17
Creator Microsoft® Word LTSC
Producer Microsoft® Word LTSC

References

Outgoing
  • BSI-DSZ-CC-0891-V6-2021 - active - Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE) Infineon Security Controller M7892 Design Steps D11 and G12, with the optional libraries RSA2048/4096 v2.03.008 or v2.07.003, EC v2.03.008 or v2.07.003, SHA-2 v1.01, Toolbox v2.03.008 or v2.07.003 and symmetric crypto library v2.02.010, as well as with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE)

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, Triple-DES, TDES, TDEA, KMAC, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DH
Hash functions
SHA-1, SHA-512, SHA-256, SHA-224, SHA-2
Schemes
MAC, Key Agreement
Protocols
PACE
Randomness
TRNG, RNG
Libraries
Crypto Library v2.02.010
Elliptic Curves
brainpoolP320r1, brainpoolP320t1
Block cipher modes
ECB, CBC

IC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG14, EF.DG15, EF.DG13, EF.COM, EF.CardAccess, EF.SOD
Trusted Execution Environments
SSC
Vendor
Infineon, Infineon Technologies AG

Security level
EAL5+, EAL6+, EAL 5, EAL5, EAL6, EAL6 augmented
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP.4, ADV_TDS.3, ADV_ARC, ADV_FSP, ADV_TDS, ADV_IMP, AGD_PRE.1, AGD_OPE.1, AGD_PRE, AGD_OPE, ALC_DVS.2, ALC_DEL.1, ALC_CMC.4, ALC_CMS.5, ALC_LCD.1, ALC_TAT.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_LCD, ALC_TAT, ALC_FLR.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_DPT.1, AVA_VAN.3, AVA_VAN.5, AVA_VAN, APE_SRE, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_GEN, FAU_SAS.1.1, FCS_RND, FCS_CKM, FCS_CKM.4, FCS_COP, FCS_RND.1, FCS_COP.1, FCS_CKM.1, FCS_RND.1.1, FCS_CKM.2, FCS_CKM.4.1, FDP_ACC, FDP_ACF, FDP_RIP.1, FDP_UCT, FDP_UIT, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.4, FDP_RIP.1.1, FDP_UCT.1, FDP_IFC.1, FDP_UIT.1, FDP_ITC, FIA_API, FIA_AFL, FIA_UID, FIA_UAU, FIA_UAU.5, FIA_SOS.2, FIA_API.1, FIA_API.1.1, FIA_UAU.4, FIA_UAU.6, FIA_AFL.1, FIA_UAU.1, FIA_UID.1, FIA_UAU.4.1, FIA_ACC.1.1, FMT_LIM, FMT_SMF.1, FMT_SMR, FMT_LIM.1, FMT_LIM.2, FMT_MTD, FMT_MTD.3, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.3, FMT_MSA.1, FMT_SMR.1, FMT_SMF.1.1, FMT_MTD.1, FMT_MTD.3.1, FPT_EMS, FPT_EMS.1, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_EMS.1.2, FPT_EMS.1.1, FPT_ITC, FPT_FLS, FPT_FLS.1.1, FPT_TST, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3.1, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0068-V2-2011-MA-01
Certificates
BSI-DSZ-CC-0891-V6-2021

Side-channel analysis
physical probing, DPA, SPA, timing attacks, Physical Tampering, Physical tampering, physical tampering, Malfunction, malfunction, fault injection, reverse engineering

Standards
FIPS PUB 180-4, FIPS 46-3, FIPS 19747, FIPS 197, FIPS 186-4, FIPS 180-4, FIPS PUB 186-4, FIPS PUB 197, NIST SP 800-67, SP 800-38A, NIST SP 800-38A, PKCS#3, PKCS#1, PKCS #3, AIS 31, RFC2119, RFC 2631, RFC3369, ISO/IEC 7816-2, ISO/IEC 9796-, ISO/IEC 14443, ISO/IEC 7816-4, ICAO
Technical reports
BSI TR-03110, BSI TR-03111

File metadata

Title Security Target SOMA-c007 Machine Readable Electronic Document - ICAO Application - EAC-PACE-AA
Subject SOMA-c007 Machine Readable Electronic Document EAC-PACE-AA
Author Giovanni LICCARDO, Roberta SODANO
Creation date D:20230512120431+02'00'
Modification date D:20230512120431+02'00'
Pages 176
Creator Microsoft® Word per Microsoft 365
Producer Microsoft® Word per Microsoft 365

References

Outgoing
  • BSI-DSZ-CC-0891-V6-2021 - active - Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE) Infineon Security Controller M7892 Design Steps D11 and G12, with the optional libraries RSA2048/4096 v2.03.008 or v2.07.003, EC v2.03.008 or v2.07.003, SHA-2 v1.01, Toolbox v2.03.008 or v2.07.003 and symmetric crypto library v2.02.010, as well as with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE)

Heuristics ?

Certificate ID: 2021-44-INF-4142

Extracted SARs

ASE_CCL.1, ALC_DEL.1, ADV_FSP.5, ALC_CMC.4, ALC_CMS.5, ALC_DVS.2, AVA_VAN.5, ATE_FUN.1, ATE_IND.2, ALC_TAT.2, ASE_TSS.1, ADV_ARC.1, ASE_SPD.1, ASE_REQ.2, ADV_INT.2, ADV_IMP.1, ADV_TDS.4, ATE_COV.2, AGD_OPE.1, ASE_ECD.1, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ATE_DPT.3, ALC_FLR.1, ASE_OBJ.2

Scheme data ?

Product SOMA-c007 Machine Readable Electronic Document EAC-PACE-AA version 4 (SOMA-c007_4)
Product Link https://oc.ccn.cni.es/en/certified-products/certified-products/992-soma-c007-machine-readable-electronic-document-eac-pace-aa-version-4-soma-c007-4
Category Smart Cards and similiar devices
Manufacturer Hid Global
Certification Date 15.09.2023
Enhanced
Description The TOE is an electronic document representing a contactless/contact smart card programmed according to the “Password Authenticated Connection Establishment” mechanism described in the ICAO Doc 9303 8th edition 2021 Part 11, which means amongst others according to the Logical Data Structure (LDS) defined in, and additionally providing the Extended Access Control according to the ICAO Doc 9303-11 and BSI TR-03110. The communication between terminal and chip shall be protected by PACE using Standard Inspection Procedure with PACE (PACE PP), BSI-CC-PP-0068-V2. The TOE is composed of: the circuitry of the dual interface e-Document’s chip M7892 G12, the IC Dedicated Software with the parts IC Dedicated Test Software and IC Dedicated Support Software, smart card operating system SOMA-c007 version 4, an ICAO application LDS1 compliant with ICAO Doc 9303- and Doc 9303-11 providing the Extended Access Control, the associated guidance documentation.
Category Smart Cards and similiar devices
Manufacturer Hid Global
Type Product
Evaluation Facility Applus Laboratories
Status Certified
Certification Date 15.09.2023
Cc Version Common Criteria 3.1 release 5
Level EAL5 + ALC_DVS.2 + AVA_VAN.5
Target Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1827
Cert Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1828
Report Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1829

References ?

Updates ?

  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'certification_date': '2023-09-15'} data.
  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Protection Profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP)', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0068_V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['MRTD_SAC_PACEV2_V1.0', 'EPASS_V1.0', 'EPASS_PACE_V1.0']}}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3', 'pp_eal': 'EAL4', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['MRTD_ICAO_EAC_V1.3', 'MRTD-PP_V1.10']}}]}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '3d6e8ef40408e0bfed169b0c782ae165c4eeb931ae3df031ead1d4c262286f4f', 'txt_hash': '2996a49669ce171d2272cdd3280905069a12261237f6aed11cd79c1409c69b1c'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '5eaa8af91641aa69d03ae45f5b6f77e46b9a1d79eb28dd03772ea14113f3d381', 'txt_hash': '2a4a62a8d09fdba3a19fcc2b4322b01afae95b343b6b3d4676cc6ed83632370d'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 2080137, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 176, '/Title': 'Security Target SOMA-c007 Machine Readable Electronic Document - ICAO Application - EAC-PACE-AA', '/Author': 'Giovanni LICCARDO, Roberta SODANO', '/Subject': 'SOMA-c007 Machine Readable Electronic Document EAC-PACE-AA', '/Creator': 'Microsoft® Word per Microsoft 365', '/CreationDate': "D:20230512120431+02'00'", '/ModDate': "D:20230512120431+02'00'", '/Producer': 'Microsoft® Word per Microsoft 365', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 509376, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Producer': 'GPL Ghostscript 9.27', '/CreationDate': "D:20230904141112+02'00'", '/ModDate': "D:20230904141112+02'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0891-V6-2021': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0056-V2-2012': 2, 'BSI-CC-PP-0068-V2-2011-MA-01': 2}}, 'cc_security_level': {'EAL': {'EAL5+': 3, 'EAL6+': 2, 'EAL 5': 1, 'EAL5': 5, 'EAL6': 2, 'EAL6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 4, 'ADV_FSP.5': 2, 'ADV_IMP.1': 3, 'ADV_INT.2': 2, 'ADV_TDS.4': 2, 'ADV_FSP.4': 1, 'ADV_TDS.3': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_TDS': 1, 'ADV_IMP': 1}, 'AGD': {'AGD_PRE.1': 4, 'AGD_OPE.1': 3, 'AGD_PRE': 1, 'AGD_OPE': 1}, 'ALC': {'ALC_DVS.2': 6, 'ALC_DEL.1': 3, 'ALC_CMC.4': 2, 'ALC_CMS.5': 2, 'ALC_LCD.1': 2, 'ALC_TAT.2': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1, 'ALC_FLR.1': 1}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.3': 2, 'ATE_FUN.1': 2, 'ATE_IND.2': 2, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.3': 2, 'AVA_VAN.5': 6, 'AVA_VAN': 1}, 'APE': {'APE_SRE': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS': 7, 'FAU_SAS.1': 14, 'FAU_GEN': 1, 'FAU_SAS.1.1': 2}, 'FCS': {'FCS_RND': 7, 'FCS_CKM': 61, 'FCS_CKM.4': 56, 'FCS_COP': 91, 'FCS_RND.1': 20, 'FCS_COP.1': 16, 'FCS_CKM.1': 24, 'FCS_RND.1.1': 2, 'FCS_CKM.2': 9, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ACC': 20, 'FDP_ACF': 21, 'FDP_RIP.1': 14, 'FDP_UCT': 10, 'FDP_UIT': 10, 'FDP_ITC.1': 16, 'FDP_ITC.2': 16, 'FDP_ACC.1': 9, 'FDP_ACF.1': 16, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.4': 1, 'FDP_RIP.1.1': 1, 'FDP_UCT.1': 3, 'FDP_IFC.1': 4, 'FDP_UIT.1': 4, 'FDP_ITC': 1}, 'FIA': {'FIA_API': 36, 'FIA_AFL': 32, 'FIA_UID': 23, 'FIA_UAU': 105, 'FIA_UAU.5': 10, 'FIA_SOS.2': 1, 'FIA_API.1': 7, 'FIA_API.1.1': 1, 'FIA_UAU.4': 6, 'FIA_UAU.6': 6, 'FIA_AFL.1': 9, 'FIA_UAU.1': 13, 'FIA_UID.1': 8, 'FIA_UAU.4.1': 2, 'FIA_ACC.1.1': 1}, 'FMT': {'FMT_LIM': 7, 'FMT_SMF.1': 49, 'FMT_SMR': 30, 'FMT_LIM.1': 25, 'FMT_LIM.2': 22, 'FMT_MTD': 91, 'FMT_MTD.3': 13, 'FMT_LIM.1.1': 3, 'FMT_LIM.2.1': 4, 'FMT_MSA.3': 4, 'FMT_MSA.1': 2, 'FMT_SMR.1': 21, 'FMT_SMF.1.1': 1, 'FMT_MTD.1': 18, 'FMT_MTD.3.1': 1}, 'FPT': {'FPT_EMS': 7, 'FPT_EMS.1': 16, 'FPT_FLS.1': 10, 'FPT_TST.1': 12, 'FPT_PHP.3': 13, 'FPT_EMS.1.2': 5, 'FPT_EMS.1.1': 4, 'FPT_ITC': 1, 'FPT_FLS': 1, 'FPT_FLS.1.1': 1, 'FPT_TST': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 2, 'FPT_PHP.3.1': 1}, 'FTP': {'FTP_ITC': 25, 'FTP_ITC.1': 11, 'FTP_TRP.1': 4}}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon': 13, 'Infineon Technologies AG': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 32}}, 'DES': {'DES': {'DES': 7}, '3DES': {'Triple-DES': 38, 'TDES': 1, 'TDEA': 1}}, 'constructions': {'MAC': {'KMAC': 3, 'CMAC': 6}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 20}, 'ECDSA': {'ECDSA': 10}, 'ECC': {'ECC': 2}}, 'FF': {'DH': {'Diffie-Hellman': 22, 'DH': 12}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 5}, 'SHA2': {'SHA-512': 1, 'SHA-256': 12, 'SHA-224': 1, 'SHA-2': 3}}}, 'crypto_scheme': {'MAC': {'MAC': 21}, 'KA': {'Key Agreement': 2}}, 'crypto_protocol': {'PACE': {'PACE': 228}}, 'randomness': {'TRNG': {'TRNG': 2}, 'RNG': {'RNG': 1}}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CBC': {'CBC': 8}}, 'ecc_curve': {'Brainpool': {'brainpoolP320r1': 3, 'brainpoolP320t1': 3}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Generic': {'Crypto Library v2.02.010': 2}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 3, 'DPA': 3, 'SPA': 2, 'timing attacks': 1}, 'FI': {'Physical Tampering': 3, 'Physical tampering': 2, 'physical tampering': 1, 'Malfunction': 4, 'malfunction': 6, 'fault injection': 2}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {'BSI': {'BSI TR-03110': 5, 'BSI TR-03111': 4}}, 'device_model': {}, 'tee_name': {'IBM': {'SSC': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 13, 'EF.DG2': 5, 'EF.DG3': 13, 'EF.DG4': 12, 'EF.DG5': 3, 'EF.DG16': 10, 'EF.DG14': 11, 'EF.DG15': 7, 'EF.DG13': 1, 'EF.COM': 1, 'EF.CardAccess': 1, 'EF.SOD': 6}}, 'standard_id': {'FIPS': {'FIPS PUB 180-4': 2, 'FIPS 46-3': 6, 'FIPS 19747': 1, 'FIPS 197': 1, 'FIPS 186-4': 1, 'FIPS 180-4': 1, 'FIPS PUB 186-4': 1, 'FIPS PUB 197': 1}, 'NIST': {'NIST SP 800-67': 3, 'SP 800-38A': 1, 'NIST SP 800-38A': 2}, 'PKCS': {'PKCS#3': 11, 'PKCS#1': 3, 'PKCS #3': 2}, 'BSI': {'AIS 31': 1}, 'RFC': {'RFC2119': 1, 'RFC 2631': 1, 'RFC3369': 1}, 'ISO': {'ISO/IEC 7816-2': 3, 'ISO/IEC 9796-': 1, 'ISO/IEC 14443': 4, 'ISO/IEC 7816-4': 1}, 'ICAO': {'ICAO': 65}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0056-V2-2012': 1, 'BSI-CC-PP-0068-V2-2011-MA-01': 1}}, 'cc_security_level': {'EAL': {'EAL 2': 1}}, 'cc_sar': {'ALC': {'ALC_FLR': 1, 'ALC_DVS.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Applus': {'Applus Laboratories': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ICAO': {'ICAO': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to 2021-44 ST_LITE.pdf.
    • The cert_filename property was set to 2021-44_Certificado.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V6-2021']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V6-2021']}} data.
    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V3-2018', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0891-V2-2016', 'BSI-DSZ-CC-0891-2015']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}]} values added.
  • 19.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V4-2019']}}} data.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-44%20INF-4142.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-44%20ST_LITE.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e22f9c622640cf465144615e778aecc6a0e24f7033e72836e075298563d9d6bf', 'txt_hash': 'c0dde2bddf764d4344c3c7f5c0d5cfdc725b0813c58d4baa7c6642d269dd54b5'} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 393202, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 17, '/Author': '9308', '/Creator': 'Microsoft® Word LTSC', '/CreationDate': "D:20230918155842+02'00'", '/ModDate': "D:20230918155842+02'00'", '/Producer': 'Microsoft® Word LTSC', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.sogis.eu/', 'http://www.commoncriteriaportal.org/']}}.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0891-V6-2021': 1}, 'ES': {'2021-44-INF-4142- v1': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0056-V2-2012': 2, 'BSI-CC-PP-0068-V2-2011-MA-01': 2, 'BSI-CC-PP-0068-V2': 1}}, 'cc_security_level': {'EAL': {'EAL5': 8, 'EAL5+': 1, 'EAL6': 1, 'EAL6+': 1, 'EAL 1': 1, 'EAL 4': 2, 'EAL 2': 1, 'EAL2': 1, 'EAL6 augmented': 1}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_IMP.1': 1, 'ADV_TDS.4': 1, 'ADV_ARC': 1}, 'AGD': {'AGD_OPE.1': 1}, 'ALC': {'ALC_DVS.2': 9, 'ALC_CMC.4': 1, 'ALC_CMS.5': 1, 'ALC_TAT.2': 1, 'ALC_FLR': 3}, 'ATE': {'ATE_COV.2': 1, 'ATE_FUN.1': 1}, 'AVA': {'AVA_VAN.5': 9}, 'ASE': {'ASE_CCL.1': 1, 'ASE_INT.1': 1, 'ASE_REQ.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon': 1}}, 'eval_facility': {'Applus': {'Applus Laboratories': 7}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'3DES': {'Triple-DES': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-512': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'PACE': {'PACE': 10}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'other': {'JIL': 1}}, 'technical_report_id': {'BSI': {'BSI TR-03110': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ICAO': {'ICAO': 20}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to None.
    • The report_filename property was set to 2021-44 INF-4142.pdf.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to 2021-44-INF-4142.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V6-2021']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V6-2021']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The report_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name SOMA-c007 Machine Readable Electronic Document EAC-PACE-AA version 4 (SOMA-c007_4) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-44_Certificado.pdf",
  "dgst": "bc4d951be8b140b2",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "2021-44-INF-4142",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "4"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0891-V6-2021"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0891-V2-2016",
          "BSI-DSZ-CC-0891-2015",
          "BSI-DSZ-CC-0891-V4-2019",
          "BSI-DSZ-CC-0782-2012",
          "BSI-DSZ-CC-0891-V6-2021",
          "BSI-DSZ-CC-0891-V3-2018"
        ]
      }
    },
    "scheme_data": {
      "category": "Smart Cards and similiar devices",
      "certification_date": "2023-09-15",
      "enhanced": {
        "category": "Smart Cards and similiar devices",
        "cc_version": "Common Criteria 3.1 release 5",
        "cert_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1828",
        "certification_date": "2023-09-15",
        "description": "The TOE is an electronic document representing a contactless/contact smart card programmed according to the \u201cPassword Authenticated Connection Establishment\u201d mechanism described in the ICAO Doc 9303 8th edition 2021 Part 11, which means amongst others according to the Logical Data Structure (LDS) defined in, and additionally providing the Extended Access Control according to the ICAO Doc 9303-11 and BSI TR-03110. The communication between terminal and chip shall be protected by PACE using Standard Inspection Procedure with PACE (PACE PP), BSI-CC-PP-0068-V2. The TOE is composed of: the circuitry of the dual interface e-Document\u2019s chip M7892 G12, the IC Dedicated Software with the parts IC Dedicated Test Software and IC Dedicated Support Software, smart card operating system SOMA-c007 version 4, an ICAO application LDS1 compliant with ICAO Doc 9303- and Doc 9303-11 providing the Extended Access Control, the associated guidance documentation.",
        "evaluation_facility": "Applus Laboratories",
        "level": "EAL5 + ALC_DVS.2 + AVA_VAN.5",
        "manufacturer": "Hid Global",
        "report_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1829",
        "status": "Certified",
        "target_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1827",
        "type": "Product"
      },
      "manufacturer": "Hid Global",
      "product": "SOMA-c007 Machine Readable Electronic Document EAC-PACE-AA version 4 (SOMA-c007_4)",
      "product_link": "https://oc.ccn.cni.es/en/certified-products/certified-products/992-soma-c007-machine-readable-electronic-document-eac-pace-aa-version-4-soma-c007-4"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0891-V6-2021"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0891-V6-2021"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "HID Global",
  "manufacturer_web": "https://www.hidglobal.com/",
  "name": "SOMA-c007 Machine Readable Electronic Document EAC-PACE-AA version 4 (SOMA-c007_4)",
  "not_valid_after": "2028-09-15",
  "not_valid_before": "2023-09-15",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "2021-44_Certificado.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0056-V2-2012": 1,
          "BSI-CC-PP-0068-V2-2011-MA-01": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1,
          "ALC_FLR": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Applus": {
          "Applus Laboratories": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ICAO": {
          "ICAO": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20230904141112+02\u002700\u0027",
      "/ModDate": "D:20230904141112+02\u002700\u0027",
      "/Producer": "GPL Ghostscript 9.27",
      "pdf_file_size_bytes": 509376,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "2021-44 INF-4142.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0891-V6-2021": 1
        },
        "ES": {
          "2021-44-INF-4142- v1": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0056-V2-2012": 2,
          "BSI-CC-PP-0068-V2": 1,
          "BSI-CC-PP-0068-V2-2011-MA-01": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.4": 1
        },
        "AGD": {
          "AGD_OPE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.5": 1,
          "ALC_DVS.2": 9,
          "ALC_FLR": 3,
          "ALC_TAT.2": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_INT.1": 1,
          "ASE_REQ.2": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_FUN.1": 1
        },
        "AVA": {
          "AVA_VAN.5": 9
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 1,
          "EAL 4": 2,
          "EAL2": 1,
          "EAL5": 8,
          "EAL5+": 1,
          "EAL6": 1,
          "EAL6 augmented": 1,
          "EAL6+": 1
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 10
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Applus": {
          "Applus Laboratories": 7
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "other": {
          "JIL": 1
        }
      },
      "standard_id": {
        "ICAO": {
          "ICAO": 20
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        },
        "DES": {
          "3DES": {
            "Triple-DES": 2
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03110": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "9308",
      "/CreationDate": "D:20230918155842+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word LTSC",
      "/ModDate": "D:20230918155842+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word LTSC",
      "pdf_file_size_bytes": 393202,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.sogis.eu/",
          "http://www.commoncriteriaportal.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 17
    },
    "st_filename": "2021-44 ST_LITE.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          },
          "ECDH": {
            "ECDH": 20
          },
          "ECDSA": {
            "ECDSA": 10
          }
        },
        "FF": {
          "DH": {
            "DH": 12,
            "Diffie-Hellman": 22
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0891-V6-2021": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0056-V2-2012": 2,
          "BSI-CC-PP-0068-V2-2011-MA-01": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 4,
          "ADV_FSP": 1,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 2,
          "ADV_IMP": 1,
          "ADV_IMP.1": 3,
          "ADV_INT.2": 2,
          "ADV_TDS": 1,
          "ADV_TDS.3": 1,
          "ADV_TDS.4": 2
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 3,
          "AGD_PRE": 1,
          "AGD_PRE.1": 4
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.4": 2,
          "ALC_CMS": 1,
          "ALC_CMS.5": 2,
          "ALC_DEL": 1,
          "ALC_DEL.1": 3,
          "ALC_DVS": 1,
          "ALC_DVS.2": 6,
          "ALC_FLR.1": 1,
          "ALC_LCD": 1,
          "ALC_LCD.1": 2,
          "ALC_TAT": 1,
          "ALC_TAT.2": 2
        },
        "APE": {
          "APE_SRE": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 2,
          "ATE_DPT.1": 1,
          "ATE_DPT.3": 2,
          "ATE_FUN.1": 2,
          "ATE_IND.2": 2
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.3": 2,
          "AVA_VAN.5": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL5": 5,
          "EAL5+": 3,
          "EAL6": 2,
          "EAL6 augmented": 1,
          "EAL6+": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_SAS": 7,
          "FAU_SAS.1": 14,
          "FAU_SAS.1.1": 2
        },
        "FCS": {
          "FCS_CKM": 61,
          "FCS_CKM.1": 24,
          "FCS_CKM.2": 9,
          "FCS_CKM.4": 56,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 91,
          "FCS_COP.1": 16,
          "FCS_RND": 7,
          "FCS_RND.1": 20,
          "FCS_RND.1.1": 2
        },
        "FDP": {
          "FDP_ACC": 20,
          "FDP_ACC.1": 9,
          "FDP_ACF": 21,
          "FDP_ACF.1": 16,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 4,
          "FDP_ITC": 1,
          "FDP_ITC.1": 16,
          "FDP_ITC.2": 16,
          "FDP_RIP.1": 14,
          "FDP_RIP.1.1": 1,
          "FDP_UCT": 10,
          "FDP_UCT.1": 3,
          "FDP_UIT": 10,
          "FDP_UIT.1": 4
        },
        "FIA": {
          "FIA_ACC.1.1": 1,
          "FIA_AFL": 32,
          "FIA_AFL.1": 9,
          "FIA_API": 36,
          "FIA_API.1": 7,
          "FIA_API.1.1": 1,
          "FIA_SOS.2": 1,
          "FIA_UAU": 105,
          "FIA_UAU.1": 13,
          "FIA_UAU.4": 6,
          "FIA_UAU.4.1": 2,
          "FIA_UAU.5": 10,
          "FIA_UAU.6": 6,
          "FIA_UID": 23,
          "FIA_UID.1": 8
        },
        "FMT": {
          "FMT_LIM": 7,
          "FMT_LIM.1": 25,
          "FMT_LIM.1.1": 3,
          "FMT_LIM.2": 22,
          "FMT_LIM.2.1": 4,
          "FMT_MSA.1": 2,
          "FMT_MSA.3": 4,
          "FMT_MTD": 91,
          "FMT_MTD.1": 18,
          "FMT_MTD.3": 13,
          "FMT_MTD.3.1": 1,
          "FMT_SMF.1": 49,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 30,
          "FMT_SMR.1": 21
        },
        "FPT": {
          "FPT_EMS": 7,
          "FPT_EMS.1": 16,
          "FPT_EMS.1.1": 4,
          "FPT_EMS.1.2": 5,
          "FPT_FLS": 1,
          "FPT_FLS.1": 10,
          "FPT_FLS.1.1": 1,
          "FPT_ITC": 1,
          "FPT_PHP.3": 13,
          "FPT_PHP.3.1": 1,
          "FPT_TST": 1,
          "FPT_TST.1": 12,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 2
        },
        "FTP": {
          "FTP_ITC": 25,
          "FTP_ITC.1": 11,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 8
        },
        "ECB": {
          "ECB": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Generic": {
          "Crypto Library v2.02.010": 2
        }
      },
      "crypto_protocol": {
        "PACE": {
          "PACE": 228
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 2
        },
        "MAC": {
          "MAC": 21
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Brainpool": {
          "brainpoolP320r1": 3,
          "brainpoolP320t1": 3
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 5
          },
          "SHA2": {
            "SHA-2": 3,
            "SHA-224": 1,
            "SHA-256": 12,
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.COM": 1,
          "EF.CardAccess": 1,
          "EF.DG1": 13,
          "EF.DG13": 1,
          "EF.DG14": 11,
          "EF.DG15": 7,
          "EF.DG16": 10,
          "EF.DG2": 5,
          "EF.DG3": 13,
          "EF.DG4": 12,
          "EF.DG5": 3,
          "EF.SOD": 6
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 1
        },
        "TRNG": {
          "TRNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 4,
          "Physical Tampering": 3,
          "Physical tampering": 2,
          "fault injection": 2,
          "malfunction": 6,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 3,
          "SPA": 2,
          "physical probing": 3,
          "timing attacks": 1
        },
        "other": {
          "reverse engineering": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 31": 1
        },
        "FIPS": {
          "FIPS 180-4": 1,
          "FIPS 186-4": 1,
          "FIPS 197": 1,
          "FIPS 19747": 1,
          "FIPS 46-3": 6,
          "FIPS PUB 180-4": 2,
          "FIPS PUB 186-4": 1,
          "FIPS PUB 197": 1
        },
        "ICAO": {
          "ICAO": 65
        },
        "ISO": {
          "ISO/IEC 14443": 4,
          "ISO/IEC 7816-2": 3,
          "ISO/IEC 7816-4": 1,
          "ISO/IEC 9796-": 1
        },
        "NIST": {
          "NIST SP 800-38A": 2,
          "NIST SP 800-67": 3,
          "SP 800-38A": 1
        },
        "PKCS": {
          "PKCS #3": 2,
          "PKCS#1": 3,
          "PKCS#3": 11
        },
        "RFC": {
          "RFC 2631": 1,
          "RFC2119": 1,
          "RFC3369": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 32
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "TDES": 1,
            "Triple-DES": 38
          },
          "DES": {
            "DES": 7
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 6,
            "KMAC": 3
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03110": 5,
          "BSI TR-03111": 4
        }
      },
      "tee_name": {
        "IBM": {
          "SSC": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 13,
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Giovanni LICCARDO, Roberta SODANO",
      "/CreationDate": "D:20230512120431+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word per Microsoft 365",
      "/ModDate": "D:20230512120431+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word per Microsoft 365",
      "/Subject": "SOMA-c007 Machine Readable Electronic Document EAC-PACE-AA",
      "/Title": "Security Target SOMA-c007 Machine Readable Electronic Document - ICAO Application - EAC-PACE-AA",
      "pdf_file_size_bytes": 2080137,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 176
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "MRTD_SAC_PACEV2_V1.0",
            "EPASS_PACE_V1.0",
            "EPASS_V1.0"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0068_V2b_pdf.pdf",
        "pp_name": "Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP)"
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "MRTD_ICAO_EAC_V1.3",
            "MRTD-PP_V1.10"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf",
        "pp_name": "Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-44%20INF-4142.pdf",
  "scheme": "ES",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL5+",
      "ALC_DVS.2",
      "AVA_VAN.5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-44%20ST_LITE.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "5eaa8af91641aa69d03ae45f5b6f77e46b9a1d79eb28dd03772ea14113f3d381",
      "txt_hash": "2a4a62a8d09fdba3a19fcc2b4322b01afae95b343b6b3d4676cc6ed83632370d"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e22f9c622640cf465144615e778aecc6a0e24f7033e72836e075298563d9d6bf",
      "txt_hash": "c0dde2bddf764d4344c3c7f5c0d5cfdc725b0813c58d4baa7c6642d269dd54b5"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "3d6e8ef40408e0bfed169b0c782ae165c4eeb931ae3df031ead1d4c262286f4f",
      "txt_hash": "2996a49669ce171d2272cdd3280905069a12261237f6aed11cd79c1409c69b1c"
    }
  },
  "status": "active"
}