Ascertia ADSS Server Signature Activation Module (SAM) v7.0.2

CSV information

Status active
Valid from 29.04.2022
Valid until 29.04.2027
Scheme 🇮🇹 IT
Manufacturer Ascertia Ltd.
Category Products for Digital Signatures
Security level AVA_VAN.5, EAL4+
Protection profiles
Maintenance updates OCSI/MNT/ASC/03/2024/RM (24.07.2025) Certification report Security target

Heuristics summary

Certificate ID: OCSI/CERT/CCL/11/2021/RC

Certificate

Extracted keywords

Security level
EAL4+, EAL2
Security Assurance Requirements (SAR)
AVA_VAN.5

Standards
ISO/IEC 15408

File metadata

Title C:\Users\t.inzerilli\AppData\LocalLow\SplE3E0.xps - Native
Author Tiziano Inzerilli
Creation date D:20250728203937+02'00'
Modification date D:20250728203937+02'00'
Pages 1
Producer Microsoft: Print To PDF

Certification report

Extracted keywords

Symmetric Algorithms
HMAC
Asymmetric Algorithms
ECC
Protocols
TLS

Vendor
Thales

Security level
EAL4+, EAL2, EAL4, EAL 2, EAL4 augmented
Claims
O.J
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Certificates
OCSI/CERT/CCL/11/2021/RC, OCSI/CERT/SYS/08/2017/RC
Evaluation facilities
CCLab Software Laboratory

Standards
FIPS 140-2, ISO/IEC 15408, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title Certification Report "Ascertia ADSS Server Signature Activation Module (SAM) v7.0.2"
Author OCSI
Creation date D:20220429060547+00'00'
Modification date D:20220429060547+00'00'
Pages 30
Creator Microsoft Word

References

Outgoing

Security target

Extracted keywords

Symmetric Algorithms
AES, HMAC, HMAC-SHA-512
Asymmetric Algorithms
RSA 2048, ECDSA
Hash functions
SHA-224, SHA256, SHA-384, SHA512, SHA224, SHA384, SHA-256, SHA3-224, SHA3-384, SHA3-512, SHA3-256, SHA-3
Protocols
TLS
Randomness
RNG
Elliptic Curves
P-256, P-384, P-521, NIST P-256, brainpoolP224r1, brainpoolP256r1, brainpoolP320r1, brainpoolP384r1, brainpoolP512r1, brainpoolP256t1, brainpoolP320t1, brainpoolP384t1, brainpoolP512t1

Trusted Execution Environments
SE

Security level
EAL 4+, EAL 4, EAL4+, EAL 4 augmented
Claims
T.ENROLMENT_SIGNER_IMPERSONATION, T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_, T.SVD_FORGERY, T.ADMIN_IMPERSONATION, T.MAINTENANCE_AUTHENTICATION_DISCLOSE, T.AUTHENTICATION_SIGNER_IMPERSONATION, T.SIGNER_AUTHENTICATION_DATA_MODIFIED, T.SAP_BYPASS, T.SAP_REPLAY, T.SAD_FORGERY, T.SIGNATURE_REQUEST_DISCLOSURE, T.DTBSR_FORGERY, T.SIGNATURE_FORGERY, T.PRIVILEGED_USER_INSERTION, T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_, T.AUTHORISATION_DATA_UPDATE, T.CONTEXT_ALTERATION, T.AUDIT_ALTERATION, T.RANDOM, T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCLOSED, T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DATA_MODIFICATION, T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCL, T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DA, T.AUTHORISATION_DATA_DISCLOSE, T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DIS, A.PRIVILEGED_USER, A.SIGNER_ENROLMENT, A.SIGNER_AUTHENTICATION_DATA_PROTECTION, A.SIGNER_DEVICE, A.CA, A.ACCESS_PROTECTED, A.AUTH_DATA, A.TSP_AUDITED, A.SEC_REQ, A.CERTIFICATION_AUTHORITY, A.SIGNER_AUTHENTICATION_DATA_PROTECTI, R.SVD, R.SAD, R.TSF_DATA, R.AUDIT, R.RANDOM, OT.SIGNER_PROTECTION, OT.REFERENCE_SIGNER_AUTHENTICATION_DATA, OT.SIGNER_KEY_PAIR_GENERATION, OT.SVD, OT.PRIVILEGED_USER_MANAGEMENT, OT.PRIVILEGED_USER_AUTHENTICATION, OT.PRIVILEGED_USER_PROTECTION, OT.SIGNER_MANAGEMENT, OT.SAD_VERIFICATION, OT.SAP, OT.SIGNATURE_AUTHENTICATION_DATA_PROTECTION, OT.DTBSR_INTEGRITY, OT.SIGNATURE_INTEGRITY, OT.CRYPTO, OT.RANDOM, OT.SYSTEM_PROTECTION, OT.AUDIT_PROTECTION, OT.REFERENCE_SIGNER, OE.SVD_AUTHENTICITY, OE.CA_REQUEST_CERTIFICATE, OE.CERTIFICATE_VERFICATION, OE.SIGNER_AUTHENTICATION_DATA, OE.DELEGATED_AUTHENTICATION, OE.DEVICE, OE.ENV, OE.CRYPTOMODULE_CERTIFIED, OE.CERTIFICATE_VERIFICATION, OSP.RANDOM, OSP.CRYPTO
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FCS_COP, FCS_RNG, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FCS_CKM.2, FCS_CKM.4.1, FDP_ACC, FDP_ACF, FDP_ETC, FDP_IFC, FDP_IFF, FDP_ITC, FDP_UCT.1, FDP_UIT.1, FDP_ITC.1, FDP_ITC.2, FDP_ACF.1, FDP_ACC.1, FDP_IFC.1, FDP_ETC.2, FDP_IFF.1, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FIA_AFL.1, FIA_ATD.1, FIA_UAU.1, FIA_UAU, FIA_UID.2, FIA_USB.1, FIA_AFL, FIA_UID.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5, FIA_UID.2.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UTD.1, FMT_MSA, FMT_MSA.2, FMT_MTD.1, FMT_SMF.1, FMT_SMR.2, FMT_MSA.1, FMT_MSA.3, FMT_SMR.1, FMT_MSA.2.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FPT_PHP.1, FPT_PHP.3, FPT_RPL.1, FPT_STM.1, FPT_TDC.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_RPL.1.1, FPT_RPL.1.2, FPT_STM.1.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TRP, FPT_ITC, FTP_TRP, FTP_ITC, FTP_ITC.1, FTP_TRP.1, FTP_TDC.1
Evaluation facilities
CCLab Software Laboratory

Side-channel analysis
physical tampering

Standards
FIPS 186-4, FIPS 140-2, FIPS 202, FIPS PUB 186-4, FIPS PUB 140-2, PKCS#1, AIS 20, AIS 31, RFC 2104, ISO/IEC 19790, ISO/IEC 15408, ISO/IEC 19790:2012, CCMB-2017-04-004, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Author Ascertia Limited
Creation date D:20220419152208+05'00'
Modification date D:20220419152208+05'00'
Pages 131
Creator Microsoft® Word 2019
Producer Microsoft® Word 2019

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

OCSI/CERT/CCL/11/2021/RC

Extracted SARs

ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5

Scheme data

Title Ascertia ADSS Server Signature Activation Module v7.0.2
Supplier Ascertia Ltd.
Level EAL4+
Certification Date 29.04.2022
Report Link It https://www.ocsi.gov.it/documenti/certificazioni/ascertia/adsssam70/rc_adss_sam_702_v1.0_it.pdf
Report Link En https://www.ocsi.gov.it/documenti/certificazioni/ascertia/adsssam70/cr_adss_sam_702_v1.0_en.pdf
Target Link https://www.ocsi.gov.it/documenti/certificazioni/ascertia/adsssam70/st_adss_sam_702_v8.pdf

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Products for Digital Signatures",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/FP_cr_adss_sam_702_v1.0_en.pdf",
  "dgst": "bcd2b38afb5e78e8",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "OCSI/CERT/CCL/11/2021/RC",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "7.0.2"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "eabbd431e1f174cd"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "OCSI/CERT/SYS/08/2017/RC"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "OCSI/CERT/SYS/08/2017/RC"
        ]
      }
    },
    "scheme_data": {
      "certification_date": "2022-04-29",
      "level": "EAL4+",
      "report_link_en": "https://www.ocsi.gov.it/documenti/certificazioni/ascertia/adsssam70/cr_adss_sam_702_v1.0_en.pdf",
      "report_link_it": "https://www.ocsi.gov.it/documenti/certificazioni/ascertia/adsssam70/rc_adss_sam_702_v1.0_it.pdf",
      "supplier": "Ascertia Ltd.",
      "target_link": "https://www.ocsi.gov.it/documenti/certificazioni/ascertia/adsssam70/st_adss_sam_702_v8.pdf",
      "title": "Ascertia ADSS Server Signature Activation Module v7.0.2"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2025-07-24",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/mr_adss-sam-v.7.0.2_en_v.1.0.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_mnt_adss-sam-v.7.0.2_v12.pdf",
        "maintenance_title": "OCSI/MNT/ASC/03/2024/RM"
      }
    ]
  },
  "manufacturer": "Ascertia Ltd.",
  "manufacturer_web": "https://www.ascertia.com/",
  "name": "Ascertia ADSS Server Signature Activation Module (SAM) v7.0.2",
  "not_valid_after": "2027-04-29",
  "not_valid_before": "2022-04-29",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "FP_cr_adss_sam_702_v1.0_en.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL4+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Tiziano Inzerilli",
      "/CreationDate": "D:20250728203937+02\u002700\u0027",
      "/ModDate": "D:20250728203937+02\u002700\u0027",
      "/Producer": "Microsoft: Print To PDF",
      "/Title": "C:\\Users\\t.inzerilli\\AppData\\LocalLow\\SplE3E0.xps - Native",
      "pdf_file_size_bytes": 336002,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "cr_adss_sam_702_v1.0_en.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          }
        }
      },
      "cc_cert_id": {
        "IT": {
          "OCSI/CERT/CCL/11/2021/RC": 30,
          "OCSI/CERT/SYS/08/2017/RC": 1
        }
      },
      "cc_claims": {
        "O": {
          "O.J": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL2": 3,
          "EAL4": 11,
          "EAL4 augmented": 1,
          "EAL4+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 8
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CCLab": {
          "CCLab Software Laboratory": 5
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS 140-2": 1
        },
        "ISO": {
          "ISO/IEC 15408": 6
        }
      },
      "symmetric_crypto": {
        "constructions": {
          "MAC": {
            "HMAC": 3
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Thales": {
          "Thales": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "OCSI",
      "/CreationDate": "D:20220429060547+00\u002700\u0027",
      "/Creator": "Microsoft Word",
      "/ModDate": "D:20220429060547+00\u002700\u0027",
      "/Title": "Certification Report \"Ascertia ADSS Server Signature Activation Module (SAM) v7.0.2\"",
      "pdf_file_size_bytes": 779106,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 30
    },
    "st_filename": "st_adss_sam_702_v8.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDSA": {
            "ECDSA": 7
          }
        },
        "RSA": {
          "RSA 2048": 2
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ACCESS_PROTECTED": 4,
          "A.AUTH_DATA": 4,
          "A.CA": 4,
          "A.CERTIFICATION_AUTHORITY": 4,
          "A.PRIVILEGED_USER": 4,
          "A.SEC_REQ": 4,
          "A.SIGNER_AUTHENTICATION_DATA_PROTECTI": 1,
          "A.SIGNER_AUTHENTICATION_DATA_PROTECTION": 3,
          "A.SIGNER_DEVICE": 4,
          "A.SIGNER_ENROLMENT": 4,
          "A.TSP_AUDITED": 4
        },
        "OE": {
          "OE.CA_REQUEST_CERTIFICATE": 4,
          "OE.CERTIFICATE_VERFICATION": 2,
          "OE.CERTIFICATE_VERIFICATION": 4,
          "OE.CRYPTOMODULE_CERTIFIED": 6,
          "OE.DELEGATED_AUTHENTICATION": 4,
          "OE.DEVICE": 11,
          "OE.ENV": 8,
          "OE.SIGNER_AUTHENTICATION_DATA": 5,
          "OE.SVD_AUTHENTICITY": 5
        },
        "OSP": {
          "OSP.CRYPTO": 4,
          "OSP.RANDOM": 5
        },
        "OT": {
          "OT.AUDIT_PROTECTION": 5,
          "OT.CRYPTO": 6,
          "OT.DTBSR_INTEGRITY": 4,
          "OT.PRIVILEGED_USER_AUTHENTICATION": 6,
          "OT.PRIVILEGED_USER_MANAGEMENT": 11,
          "OT.PRIVILEGED_USER_PROTECTION": 10,
          "OT.RANDOM": 12,
          "OT.REFERENCE_SIGNER": 1,
          "OT.REFERENCE_SIGNER_AUTHENTICATION_DATA": 6,
          "OT.SAD_VERIFICATION": 10,
          "OT.SAP": 8,
          "OT.SIGNATURE_AUTHENTICATION_DATA_PROTECTION": 11,
          "OT.SIGNATURE_INTEGRITY": 10,
          "OT.SIGNER_KEY_PAIR_GENERATION": 11,
          "OT.SIGNER_MANAGEMENT": 5,
          "OT.SIGNER_PROTECTION": 12,
          "OT.SVD": 4,
          "OT.SYSTEM_PROTECTION": 11
        },
        "R": {
          "R.AUDIT": 2,
          "R.RANDOM": 2,
          "R.SAD": 25,
          "R.SVD": 37,
          "R.TSF_DATA": 13
        },
        "T": {
          "T.ADMIN_IMPERSONATION": 9,
          "T.AUDIT_ALTERATION": 8,
          "T.AUTHENTICATION_SIGNER_IMPERSONATION": 11,
          "T.AUTHORISATION_DATA_DISCLOSE": 2,
          "T.AUTHORISATION_DATA_UPDATE": 10,
          "T.CONTEXT_ALTERATION": 9,
          "T.DTBSR_FORGERY": 8,
          "T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_": 1,
          "T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DIS": 1,
          "T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCL": 1,
          "T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCLOSED": 3,
          "T.ENROLMENT_SIGNER_IMPERSONATION": 9,
          "T.MAINTENANCE_AUTHENTICATION_DISCLOSE": 4,
          "T.PRIVILEGED_USER_INSERTION": 9,
          "T.RANDOM": 9,
          "T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_": 1,
          "T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DA": 1,
          "T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DATA_MODIFICATION": 2,
          "T.SAD_FORGERY": 7,
          "T.SAP_BYPASS": 7,
          "T.SAP_REPLAY": 6,
          "T.SIGNATURE_FORGERY": 6,
          "T.SIGNATURE_REQUEST_DISCLOSURE": 6,
          "T.SIGNER_AUTHENTICATION_DATA_MODIFIED": 4,
          "T.SVD_FORGERY": 8
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 8
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 9,
          "EAL 4 augmented": 5,
          "EAL 4+": 1,
          "EAL4+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 9,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 7,
          "FAU_GEN.2.1": 1
        },
        "FCS": {
          "FCS_CKM": 20,
          "FCS_CKM.1": 16,
          "FCS_CKM.2": 6,
          "FCS_CKM.4": 30,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 35,
          "FCS_COP.1": 13,
          "FCS_RNG": 3,
          "FCS_RNG.1": 10,
          "FCS_RNG.1.1": 2,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC": 90,
          "FDP_ACC.1": 43,
          "FDP_ACF": 58,
          "FDP_ACF.1": 48,
          "FDP_ETC": 16,
          "FDP_ETC.2": 8,
          "FDP_IFC": 29,
          "FDP_IFC.1": 24,
          "FDP_IFF": 15,
          "FDP_IFF.1": 14,
          "FDP_ITC": 16,
          "FDP_ITC.1": 12,
          "FDP_ITC.2": 22,
          "FDP_UCT.1": 7,
          "FDP_UCT.1.1": 1,
          "FDP_UIT.1": 8,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1
        },
        "FIA": {
          "FIA_AFL": 11,
          "FIA_AFL.1": 3,
          "FIA_AFL.1.1": 2,
          "FIA_AFL.1.2": 2,
          "FIA_ATD.1": 12,
          "FIA_ATD.1.1": 1,
          "FIA_UAU": 15,
          "FIA_UAU.1": 12,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.5": 4,
          "FIA_UID.1": 5,
          "FIA_UID.2": 12,
          "FIA_UID.2.1": 1,
          "FIA_USB.1": 18,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 2,
          "FIA_USB.1.3": 1,
          "FIA_UTD.1": 1
        },
        "FMT": {
          "FMT_MSA": 38,
          "FMT_MSA.1": 10,
          "FMT_MSA.2": 9,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 26,
          "FMT_MTD.1": 6,
          "FMT_MTD.1.1": 1,
          "FMT_SMF.1": 10,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 10,
          "FMT_SMR.2": 13,
          "FMT_SMR.2.1": 1,
          "FMT_SMR.2.2": 1,
          "FMT_SMR.2.3": 1
        },
        "FPT": {
          "FPT_ITC": 1,
          "FPT_PHP.1": 11,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 9,
          "FPT_PHP.3.1": 1,
          "FPT_RPL.1": 7,
          "FPT_RPL.1.1": 1,
          "FPT_RPL.1.2": 1,
          "FPT_STM.1": 8,
          "FPT_STM.1.1": 1,
          "FPT_TDC.1": 13,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 1,
          "FPT_TRP": 2
        },
        "FTP": {
          "FTP_ITC": 7,
          "FTP_ITC.1": 11,
          "FTP_TDC.1": 2,
          "FTP_TRP": 25,
          "FTP_TRP.1": 15
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 23
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {
        "Brainpool": {
          "brainpoolP224r1": 2,
          "brainpoolP256r1": 2,
          "brainpoolP256t1": 2,
          "brainpoolP320r1": 2,
          "brainpoolP320t1": 2,
          "brainpoolP384r1": 2,
          "brainpoolP384t1": 2,
          "brainpoolP512r1": 2,
          "brainpoolP512t1": 2
        },
        "NIST": {
          "NIST P-256": 2,
          "P-256": 2,
          "P-384": 2,
          "P-521": 4
        }
      },
      "eval_facility": {
        "CCLab": {
          "CCLab Software Laboratory": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-224": 2,
            "SHA-256": 1,
            "SHA-384": 2,
            "SHA224": 2,
            "SHA256": 6,
            "SHA384": 4,
            "SHA512": 5
          },
          "SHA3": {
            "SHA-3": 1,
            "SHA3-224": 2,
            "SHA3-256": 1,
            "SHA3-384": 2,
            "SHA3-512": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 9
        }
      },
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 4
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 3,
          "AIS 31": 1
        },
        "CC": {
          "CCMB-2017-04-001": 2,
          "CCMB-2017-04-002": 2,
          "CCMB-2017-04-003": 2,
          "CCMB-2017-04-004": 3
        },
        "FIPS": {
          "FIPS 140-2": 1,
          "FIPS 186-4": 5,
          "FIPS 202": 3,
          "FIPS PUB 140-2": 1,
          "FIPS PUB 186-4": 1
        },
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 19790": 8,
          "ISO/IEC 19790:2012": 1
        },
        "PKCS": {
          "PKCS#1": 6
        },
        "RFC": {
          "RFC 2104": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 5
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 20,
            "HMAC-SHA-512": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 2
        }
      },
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Ascertia Limited",
      "/CreationDate": "D:20220419152208+05\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2019",
      "/ModDate": "D:20220419152208+05\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2019",
      "pdf_file_size_bytes": 1927804,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 131
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-cc-pp-2018_02fr_pp.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_adss_sam_702_v1.0_en.pdf",
  "scheme": "IT",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "AVA_VAN.5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_adss_sam_702_v8.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "ac577c6b68bccd33c0937c53dcc062688990ee55a5eb6be062bd5e9813e7ed4b",
      "txt_hash": "9480e492ef41b3ac28382a3bf8d77402ff0949f08d2c08bdc7312081be13f6c0"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "0e9693c47955c4205cbc55ad30dd0716a8769bbe120fcb4727459f1dc6e4be60",
      "txt_hash": "155c417aae95bb16a6a04d83e5525b734bc170a7e6022f6e02be8c998d94bb66"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "aba1601957c697164028a3e64e3fa699c8c6bfe4ec69d9243aa20128923bfde3",
      "txt_hash": "37f417293479f1d31c84373886682f62c79c48d62cbbb2f27399e941acb45424"
    }
  },
  "status": "active"
}