Infineon Technologies AG OPTIGA™ Trusted Platform Module SLB9672_2.0 v17 und SLB9673_2.0 v27; v17.10.16488.00, v17.12.16858.00, v17.13.17733.00, v27.10.16688.00 and v27.13.17770.00

CSV information ?

Status active
Valid from 27.07.2023
Valid until 27.07.2028
Scheme 🇩🇪 DE
Manufacturer Infineon Technologies AG
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_FLR.1, AVA_VAN.4, EAL4+

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-1179-V4-2023

Certificate ?

Extracted keywords

Vendor
Infineon Technologies AG

Security level
EAL 4, EAL 2, EAL 4 augmented
Security Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLR, AVA_VAN.4
Certificates
BSI-DSZ-CC-1179-V4-2023

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Title Certificate BSI-DSZ-CC-1179-V4-2023
Subject Common Criteria, Certification, Zertifizierung, Infineon Technologies AG OPTIGA™ TrustedPlatform Module SLB9672_2.0 v17 undSLB9673_2.0 v27, v17.10.16488.00, v17.12.16858.00, v17.13.17733.00, v27.10.16688.00 and v27.13.17770.00, Infineon Technologies AG
Keywords Common Criteria, Certification, Zertifizierung, Infineon Technologies AG OPTIGA™ TrustedPlatform Module SLB9672_2.0 v17 undSLB9673_2.0 v27; v17.10.16488.00, v17.12.16858.00, v17.13.17733.00, v27.10.16688.00 and v27.13.17770.00, Infineon Technologies AG
Author Federal Office for Information Security
Pages 1

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, HMAC, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC
Post-quantum Algorithms
XMSS
Hash functions
SHA-1, SHA-256, SHA-384, SHA-512
Schemes
MAC, Key Agreement
Randomness
DRBG, RNG
Block cipher modes
CFB

Vendor
Infineon Technologies AG, Infineon, Infineon Technologies

Security level
EAL 4, EAL 2, EAL 1, EAL 5+, EAL 6, EAL 4 augmented
Security Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLR, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_FUN, ATE_IND, AVA_VAN.4
Protection profiles
ANSSI-CC-PP-, ANSSI-CC-PP-2021/02
Certificates
BSI-DSZ-CC-1179-V4-2023, BSI-DSZ-CC-1179-V3-2022
Evaluation facilities
TÜV Informationstechnik
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Version 1, June 16, 2023, ”Evaluation Technical Report Summary”, TÜV Informationstechnik GmbH, (confidential document) 7 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie für, Standards Compliance Verification; Version 1, March 17, 2023, TÜV Informationstechnik GmbH, (confidential document) 24 / 33 BSI-DSZ-CC-1179-V4-2023 Certification Report C. Excerpts from the Criteria For the

Side-channel analysis
side-channel, SPA, DPA, Fault Injection, JIL
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Version 1, June 16, 2023, ”Evaluation Technical Report Summary”, TÜV Informationstechnik GmbH, (confidential document) 7 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie für, Standards Compliance Verification; Version 1, March 17, 2023, TÜV Informationstechnik GmbH, (confidential document) 24 / 33 BSI-DSZ-CC-1179-V4-2023 Certification Report C. Excerpts from the Criteria For the

Standards
FIPS180-4, FIPS186-4, FIPS PUB 186-4, FIPS186-5, FIPS PUB 186-5, AIS26, AIS 20, AIS 34, AIS 31, AIS 25, AIS 26, AIS 32, AIS 35, AIS 36, AIS 38, AIS20, RFC3447, RFC 3447, RFC8391, RFC 8391, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065
Technical reports
BSI TR-02102, BSI 7148

File metadata

Title Certification Report BSI-DSZ-CC-1179-V4-2023
Subject Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-1179-V4-2023, Infineon Technologies AG OPTIGA™ TrustedPlatform Module SLB9672_2.0 v17 undSLB9673_2.0 v27, v17.10.16488.00, v17.12.16858.00, v17.13.17733.00, v27.10.16688.00and v27.13.17770.00, Infineon Technologies AG
Keywords Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-1179-V4-2023, Infineon Technologies AG OPTIGA™ TrustedPlatform Module SLB9672_2.0 v17 undSLB9673_2.0 v27; v17.10.16488.00, v17.12.16858.00, v17.13.17733.00, v27.10.16688.00and v27.13.17770.00, Infineon Technologies AG
Author Federal Office for Information Security
Pages 33

Frontpage

Certificate ID BSI-DSZ-CC-1179-V4-2023
Certified item Infineon Technologies AG OPTIGA™ Trusted Platform Module SLB9672_2.0 v17 und SLB9673_2.0 v27; v17.10.16488.00, v17.12.16858.00, v17.13.17733.00, v27.10.16688.00 and v27.13.17770.00
Certification lab BSI
Developer Infineon Technologies AG

Security target ?

Extracted keywords

Symmetric Algorithms
AES, HMAC
Asymmetric Algorithms
RSA 1024, ECDH, ECDSA, ECC
Hash functions
SHA-1, SHA-256, SHA-384
Schemes
MAC
Randomness
TRNG, DRBG, RNG
Elliptic Curves
P-256, NIST P-256
Block cipher modes
CFB

Vendor
Infineon Technologies AG, Infineon, Infineon Technologies, Cisco

Security level
EAL4, EAL4 augmented
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS, ALC_FLR.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.4, ASE_INT, ASE_CCL, ASE_SPD, ASE_OBJ, ASE_ECD, ASE_REQ, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FCO_NRO, FCS_RNG.1, FCS_CKM, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1, FCS_CKM.4.1, FCS_COP, FCS_RNG, FCS_RNG.1.1, FCS_RNG.1.2, FDP_ACC.1, FDP_IFC.1, FDP_ITC.1, FDP_ITC.2, FDP_ACF, FDP_ACF.1, FDP_UIT, FDP_UIT.1, FDP_RIP.1, FDP_ACC, FDP_SDI.1, FDP_ETC, FDP_ITC, FDP_UCT, FDP_ITT.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_SOS.2, FIA_AFL, FIA_UAU.1, FIA_UAU.5, FIA_UAU.6, FIA_USB.1, FIA_MSA, FMT_MSA.2, FMT_MSA.1, FMT_SMR.1, FMT_MSA.2.1, FMT_MSA, FMT_MSA.3, FMT_MTD, FMT_SMF.1, FMT_MOF, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS, FPT_FLS.1, FPT_PHP.3, FPT_PHP.3.1, FPT_STM.1, FPT_ITT.1, FTP_ITC.1, FTP_TRP.1, FTP_ITC
Protection profiles
ANSSI-CC-PP-2021/02

Side-channel analysis
physical probing, DPA, SPA, DFA

Standards
FIPS PUB 140-2, FIPS PUB 180-4, FIPS PUB 186-4, FIPS 180-4, SP 800-90A, NIST SP 800-90A, SP 800-133, PKCS#1, AIS20, RFC3447, RFC 3447, RFC 2104, ISO/IEC 9797-2, ISO/IEC 15946-1, ISO/IEC 14888-3, ISO/IEC 10118-3, ISO/IEC 10116:2006, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004
Technical reports
BSI TR-02102

File metadata

Title CC EAL4+ moderate Certification Security Target
Subject Security Target SLB9670_2.0
Keywords Infineon, CCS, Security Target, EAL4+, moderate, SLB967x, SLB9670, SPI, Trusted Computing, TPM 2.0, Trusted Platform Module
Author Jürgen Noller
Pages 63

Heuristics ?

Certificate ID: BSI-DSZ-CC-1179-V4-2023

Extracted SARs

ALC_TAT.1, ADV_TDS.3, ALC_DVS.1, ALC_FLR.1, ALC_CMC.4, ASE_CCL.1, ASE_TSS.1, ALC_LCD.1, ATE_COV.2, ATE_FUN.1, ALC_CMS.4, ATE_DPT.1, AGD_OPE.1, ASE_OBJ.2, ALC_DEL.1, ATE_IND.2, AVA_VAN.4, ADV_IMP.1, ASE_INT.1, ASE_REQ.2, ADV_ARC.1, AGD_PRE.1, ASE_ECD.1, ASE_SPD.1, ADV_FSP.4

Similar certificates

Name Certificate ID
Infineon Technologies AG OPTIGA™ Trusted Platform Module SLB9672_2.0 v16 and SLB9673_2.0 v26, version v16.10.16488.00, v16.12.16858.00 and v26.10.16688.00 BSI-DSZ-CC-1178-V3-2022 Compare
Infineon Technologies AG OPTIGA™ Trusted Platform Module SLB9672_2.0 v16 and SLB9673_2.0 v26, version v16.10.16488.00, v16.12.16858.00 and v26.10.16688.00 BSI-DSZ-CC-1178-V4-2023 Compare
Infineon Technologies AG OPTIGA™ Trusted Platform Module SLB9672_2.0 v17.10.16488.00 and SLB9673_2.0 v27.10.16688.00 BSI-DSZ-CC-1179-V2-2022 Compare
Infineon Technologies AG OPTIGA™ Trusted Platform Module SLB9672_2.0 v16.10.16488.00 and SLB9673_2.0 v26.10.16688.00 BSI-DSZ-CC-1178-V2-2022 Compare
Infineon Technologies AG OPTIGA™ Trusted Platform Module SLB9672_2.0 v17.10.16488.00 BSI-DSZ-CC-1179-2021 Compare
Infineon Technologies AG OPTIGA™ Trusted Platform Module SLB9672_2.0 v16.10.16488.00 BSI-DSZ-CC-1178-2021 Compare
Infineon Technologies AG OPTIGA™ Trusted Platform Module SLB9672_2.0 v15.20.15686.00, v15.21.16430.00, v15.22.16832.00 und v15.23.17664.00 BSI-DSZ-CC-1113-V5-2023 Compare
Infineon Technologies AG OPTIGA™ Trusted Platform Module SLB9672_2.0, v15.20.15686.00, v15.21.16430.00, v15.22.16832.00 BSI-DSZ-CC-1113-V4-2022 Compare
Infineon Technologies AG OPTIGA™ Trusted Platform Module SLB9672_2.0, v15.20.15686.00 and v15.21.16430.00 BSI-DSZ-CC-1113-V3-2022 Compare
Infineon Technologies AG OPTIGA™ Trusted Platform Module SLB9672_2.0, v15.20.15686.00 and v15.21.16430.00 BSI-DSZ-CC-1113-V2-2021 Compare
Infineon Technologies AG OPTIGA™ Trusted Platform Module SLB9672_2.0 v15.20.15686.00 BSI-DSZ-CC-1113-2021 Compare
Infineon Technologies AG OPTIGA™ Trusted Platform Module SLI9670_2.0 and SLM9670_2.0 v13.11.4555.00 BSI-DSZ-CC-1100-2018 Compare
Infineon Technologies AG OPTIGA™ Trusted Platform Module SLB9670_2.0 v7.85.4555.00, v7.85.4567.00 BSI-DSZ-CC-1086-2018 Compare
Infineon Technologies AG Trusted Platform Module SLB9665_2.0 v5.63.3144.00, v5.63.3149.00, v5.63.3353.00, v5.63.3355.00 BSI-DSZ-CC-1056-2018 Compare
Infineon Technologies AG Trusted Platform Module SLB9670_2.0, v7.63.3144.00, v7.63.3149.00, v7.63.3353.00, v7.63.3355.00 BSI-DSZ-CC-1057-2018 Compare
Infineon Technologies AG Trusted Platform Module SLB9670_2.0 v7.62.3126.00, v7.62.3127.00 BSI-DSZ-CC-1021-V2-2017 Compare
Infineon Technologies AG Trusted Platform Module SLB9665_2.0 v5.62.3126.00, v5.62.3127.00 BSI-DSZ-CC-1020-V2-2017 Compare
Infineon Technologies AG Trusted Platform Module SLB9670_2.0 v7.60.2677.00 BSI-DSZ-CC-1021-2016 Compare
Infineon Technologies AG Trusted Platform Module SLB9665_2.0 v5.60.2677.00 BSI-DSZ-CC-1020-2016 Compare
Infineon Technologies AG Trusted Platform Module SLB9670_2.0 v7.40.2098.00 BSI-DSZ-CC-0998-2016 Compare
Infineon Technologies AG Trusted Platform Module SLB9670_1.2 v6.43.0243.00, v6.43.0244.00, v6.43.0245.00 and v6.43.0246.00 BSI-DSZ-CC-0958-V2-2017 Compare
Infineon Technologies AG Trusted Platform Module SLB96xx v4.43.0257.00, v4.43.0258.00 and v4.43.0259.00 BSI-DSZ-CC-0844-V2-2017 Compare
Showing 5 out of 22.

References ?

No references are available for this certificate.

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '9910325254676f6fb389a06f960f9ca8b6ce4f98f7001f4fae8a509e9cbb1e04', 'txt_hash': '4fe7a85fc7a38b587e16cb65ab88096bd62c424d6725730e94c5fbd126bc6d91'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '46be00b1998f75fcc354009d03178e9a3f2f6acc95012efa2638b76a67183199', 'txt_hash': '2f647da575800b7d4cec5a4bb0fdd6c360819cf1a9fa988adf78c2155a58971b'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1338429, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 63, '/Author': 'Jürgen Noller', '/Keywords': 'Infineon, CCS, Security Target, EAL4+, moderate, SLB967x, SLB9670, SPI, Trusted Computing, TPM 2.0, Trusted Platform Module', '/Subject': 'Security Target SLB9670_2.0', '/Title': 'CC EAL4+ moderate Certification Security Target', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected];[email protected]?subject=Document%20question%20', 'http://www.bsi.bund.de/', 'http://www.rsa.com/', 'http://www.infineon.com/']}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 234148, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Federal Office for Information Security', '/Keywords': 'Common Criteria, Certification, Zertifizierung, Infineon Technologies AG OPTIGA™ TrustedPlatform Module SLB9672_2.0 v17 undSLB9673_2.0 v27; v17.10.16488.00, v17.12.16858.00, v17.13.17733.00, v27.10.16688.00 and v27.13.17770.00, Infineon Technologies AG', '/Subject': 'Common Criteria, Certification, Zertifizierung, Infineon Technologies AG OPTIGA™ TrustedPlatform Module SLB9672_2.0 v17 undSLB9673_2.0 v27, v17.10.16488.00, v17.12.16858.00, v17.13.17733.00, v27.10.16688.00 and v27.13.17770.00, Infineon Technologies AG', '/Title': 'Certificate BSI-DSZ-CC-1179-V4-2023', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2021/02': 3}}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS': 1, 'ALC_FLR.1': 3, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.4': 3}, 'ASE': {'ASE_INT': 2, 'ASE_CCL': 2, 'ASE_SPD': 2, 'ASE_OBJ': 2, 'ASE_ECD': 2, 'ASE_REQ': 2, 'ASE_TSS': 2, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FCO': {'FCO_NRO': 6}, 'FCS': {'FCS_RNG.1': 11, 'FCS_CKM': 37, 'FCS_CKM.2': 8, 'FCS_COP.1': 19, 'FCS_CKM.4': 22, 'FCS_CKM.1': 20, 'FCS_CKM.4.1': 1, 'FCS_COP': 47, 'FCS_RNG': 1, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2}, 'FDP': {'FDP_ACC.1': 4, 'FDP_IFC.1': 2, 'FDP_ITC.1': 11, 'FDP_ITC.2': 11, 'FDP_ACF': 30, 'FDP_ACF.1': 8, 'FDP_UIT': 9, 'FDP_UIT.1': 2, 'FDP_RIP.1': 3, 'FDP_ACC': 28, 'FDP_SDI.1': 3, 'FDP_ETC': 7, 'FDP_ITC': 7, 'FDP_UCT': 7, 'FDP_ITT.1': 1}, 'FIA': {'FIA_UID.1': 4, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_SOS.2': 3, 'FIA_AFL': 12, 'FIA_UAU.1': 3, 'FIA_UAU.5': 3, 'FIA_UAU.6': 3, 'FIA_USB.1': 3, 'FIA_MSA': 1}, 'FMT': {'FMT_MSA.2': 4, 'FMT_MSA.1': 1, 'FMT_SMR.1': 4, 'FMT_MSA.2.1': 1, 'FMT_MSA': 65, 'FMT_MSA.3': 2, 'FMT_MTD': 6, 'FMT_SMF.1': 3, 'FMT_MOF': 3}, 'FPT': {'FPT_TST.1': 6, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_FLS': 7, 'FPT_FLS.1': 1, 'FPT_PHP.3': 4, 'FPT_PHP.3.1': 1, 'FPT_STM.1': 3, 'FPT_ITT.1': 3}, 'FTP': {'FTP_ITC.1': 1, 'FTP_TRP.1': 1, 'FTP_ITC': 3}}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies AG': 20, 'Infineon': 6, 'Infineon Technologies': 6}, 'Cisco': {'Cisco': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 22}}, 'constructions': {'MAC': {'HMAC': 16}}}, 'asymmetric_crypto': {'RSA': {'RSA 1024': 1}, 'ECC': {'ECDH': {'ECDH': 3}, 'ECDSA': {'ECDSA': 5}, 'ECC': {'ECC': 36}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 9}, 'SHA2': {'SHA-256': 8, 'SHA-384': 8}}}, 'crypto_scheme': {'MAC': {'MAC': 2}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'PRNG': {'DRBG': 11}, 'RNG': {'RNG': 12}}, 'cipher_mode': {'CFB': {'CFB': 3}}, 'ecc_curve': {'NIST': {'P-256': 1, 'NIST P-256': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 2, 'DPA': 1, 'SPA': 1}, 'FI': {'DFA': 1}}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 140-2': 3, 'FIPS PUB 180-4': 2, 'FIPS PUB 186-4': 1, 'FIPS 180-4': 3}, 'NIST': {'SP 800-90A': 3, 'NIST SP 800-90A': 2, 'SP 800-133': 1}, 'PKCS': {'PKCS#1': 12}, 'BSI': {'AIS20': 1}, 'RFC': {'RFC3447': 35, 'RFC 3447': 1, 'RFC 2104': 1}, 'ISO': {'ISO/IEC 9797-2': 3, 'ISO/IEC 15946-1': 1, 'ISO/IEC 14888-3': 1, 'ISO/IEC 10118-3': 1, 'ISO/IEC 10116:2006': 2}, 'CC': {'CCMB-2017-04-001': 2, 'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1179-V4-2023': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL 2': 1, 'EAL 4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 1, 'ALC_FLR': 1}, 'AVA': {'AVA_VAN.4': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies AG': 2}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to 1179V4b_pdf.pdf.
    • The cert_filename property was set to 1179V4c_pdf.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}]} values added.
    • The scheme_data property was set to None.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1179V4a_pdf.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1179V4b_pdf.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The cert_metadata property was set to None.
    • The cert_keywords property was set to None.
    • The cert_filename property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Infineon Technologies AG OPTIGA™ Trusted Platform Module SLB9672_2.0 v17 und SLB9673_2.0 v27; v17.10.16488.00, v17.12.16858.00, v17.13.17733.00, v27.10.16688.00 and v27.13.17770.00 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1179V4c_pdf.pdf",
  "dgst": "cb89179fb13fe3c5",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-1179-V4-2023",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "17.12.16858.00",
        "17.13.17733.00",
        "2.0",
        "27.13.17770.00",
        "27.10.16688.00",
        "17.10.16488.00"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Infineon Technologies AG",
  "manufacturer_web": "https://www.infineon.com/",
  "name": "Infineon Technologies AG OPTIGA\u2122 Trusted Platform Module SLB9672_2.0 v17 und SLB9673_2.0 v27; v17.10.16488.00, v17.12.16858.00, v17.13.17733.00, v27.10.16688.00 and v27.13.17770.00",
  "not_valid_after": "2028-07-27",
  "not_valid_before": "2023-07-27",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "1179V4c_pdf.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1179-V4-2023": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 1,
          "ALC_FLR.1": 1
        },
        "AVA": {
          "AVA_VAN.4": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 4": 1,
          "EAL 4 augmented": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon Technologies AG": 2
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Federal Office for Information Security",
      "/Keywords": "Common Criteria, Certification, Zertifizierung, Infineon Technologies AG OPTIGA\u2122 TrustedPlatform Module SLB9672_2.0 v17 undSLB9673_2.0 v27; v17.10.16488.00, v17.12.16858.00, v17.13.17733.00, v27.10.16688.00 and v27.13.17770.00, Infineon Technologies AG",
      "/Subject": "Common Criteria, Certification, Zertifizierung, Infineon Technologies AG OPTIGA\u2122 TrustedPlatform Module SLB9672_2.0 v17 undSLB9673_2.0 v27, v17.10.16488.00, v17.12.16858.00, v17.13.17733.00, v27.10.16688.00 and v27.13.17770.00, Infineon Technologies AG",
      "/Title": "Certificate BSI-DSZ-CC-1179-V4-2023",
      "pdf_file_size_bytes": 234148,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "1179V4a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.1 and AVA_VAN.4 valid until: 26 July 2028",
        "cc_version": "PP conformant Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-1179-V4-2023",
        "cert_item": "Infineon Technologies AG OPTIGA\u2122 Trusted Platform Module SLB9672_2.0 v17 und SLB9673_2.0 v27; v17.10.16488.00, v17.12.16858.00, v17.13.17733.00, v27.10.16688.00 and v27.13.17770.00",
        "cert_lab": "BSI",
        "developer": "Infineon Technologies AG",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Protection Profile PC Client Specific TPM, TPM Library specification Family \u201c2.0\u201d, Level 0 Revision 1.59, Version: 1.3, Date: 2021-09-29, ANSSI-CC- PP-2021/02"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 8
          },
          "ECDH": {
            "ECDH": 1
          },
          "ECDSA": {
            "ECDSA": 2
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1179-V3-2022": 3,
          "BSI-DSZ-CC-1179-V4-2023": 19
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-": 1,
          "ANSSI-CC-PP-2021/02": 2
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR": 3,
          "ALC_FLR.1": 5,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ATE": {
          "ATE_FUN": 2,
          "ATE_IND": 2
        },
        "AVA": {
          "AVA_VAN.4": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 3,
          "EAL 4": 5,
          "EAL 4 augmented": 3,
          "EAL 5+": 1,
          "EAL 6": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "Standards Compliance Verification; Version 1, March 17, 2023, T\u00dcV Informationstechnik GmbH, (confidential document) 24 / 33 BSI-DSZ-CC-1179-V4-2023 Certification Report C. Excerpts from the Criteria For the": 1,
          "Version 1, June 16, 2023, \u201dEvaluation Technical Report Summary\u201d, T\u00dcV Informationstechnik GmbH, (confidential document) 7 specifically \u2022 AIS 20, Version 3, Funktionalit\u00e4tsklassen und Evaluationsmethodologie f\u00fcr": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
        }
      },
      "cipher_mode": {
        "CFB": {
          "CFB": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 3
        },
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 4
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 12
          },
          "SHA2": {
            "SHA-256": 15,
            "SHA-384": 13,
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {
        "XMSS": {
          "XMSS": 2
        }
      },
      "randomness": {
        "PRNG": {
          "DRBG": 1
        },
        "RNG": {
          "RNG": 3
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Fault Injection": 1
        },
        "SCA": {
          "DPA": 1,
          "SPA": 1,
          "side-channel": 1
        },
        "other": {
          "JIL": 4
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 3,
          "AIS 25": 1,
          "AIS 26": 1,
          "AIS 31": 2,
          "AIS 32": 1,
          "AIS 34": 2,
          "AIS 35": 1,
          "AIS 36": 1,
          "AIS 38": 1,
          "AIS20": 1,
          "AIS26": 1
        },
        "FIPS": {
          "FIPS PUB 186-4": 1,
          "FIPS PUB 186-5": 1,
          "FIPS180-4": 9,
          "FIPS186-4": 11,
          "FIPS186-5": 1
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        },
        "RFC": {
          "RFC 3447": 1,
          "RFC 8391": 1,
          "RFC3447": 16,
          "RFC8391": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 8
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 1,
            "HMAC": 11
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1,
          "BSI TR-02102": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 3,
          "Infineon Technologies": 1,
          "Infineon Technologies AG": 14
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Federal Office for Information Security",
      "/Keywords": "Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-1179-V4-2023, Infineon Technologies AG OPTIGA\u2122 TrustedPlatform Module SLB9672_2.0 v17 undSLB9673_2.0 v27; v17.10.16488.00, v17.12.16858.00, v17.13.17733.00, v27.10.16688.00and v27.13.17770.00, Infineon Technologies AG",
      "/Subject": "Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-1179-V4-2023, Infineon Technologies AG OPTIGA\u2122 TrustedPlatform Module SLB9672_2.0 v17 undSLB9673_2.0 v27, v17.10.16488.00, v17.12.16858.00, v17.13.17733.00, v27.10.16688.00and v27.13.17770.00, Infineon Technologies AG",
      "/Title": "Certification Report BSI-DSZ-CC-1179-V4-2023",
      "pdf_file_size_bytes": 514163,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/AIS",
          "https://www.bsi.bund.de/zertifizierung",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "https://www.sogis.eu/",
          "https://www.commoncriteriaportal.org/",
          "http://www.commoncriteriaportal.org/cc/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 33
    },
    "st_filename": "1179V4b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 36
          },
          "ECDH": {
            "ECDH": 3
          },
          "ECDSA": {
            "ECDSA": 5
          }
        },
        "RSA": {
          "RSA 1024": 1
        }
      },
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-2021/02": 3
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR.1": 3,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL": 2,
          "ASE_CCL.1": 1,
          "ASE_ECD": 2,
          "ASE_ECD.1": 1,
          "ASE_INT": 2,
          "ASE_INT.1": 1,
          "ASE_OBJ": 2,
          "ASE_OBJ.2": 1,
          "ASE_REQ": 2,
          "ASE_REQ.2": 1,
          "ASE_SPD": 2,
          "ASE_SPD.1": 1,
          "ASE_TSS": 2,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.4": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 2,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {
        "FCO": {
          "FCO_NRO": 6
        },
        "FCS": {
          "FCS_CKM": 37,
          "FCS_CKM.1": 20,
          "FCS_CKM.2": 8,
          "FCS_CKM.4": 22,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 47,
          "FCS_COP.1": 19,
          "FCS_RNG": 1,
          "FCS_RNG.1": 11,
          "FCS_RNG.1.1": 2,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC": 28,
          "FDP_ACC.1": 4,
          "FDP_ACF": 30,
          "FDP_ACF.1": 8,
          "FDP_ETC": 7,
          "FDP_IFC.1": 2,
          "FDP_ITC": 7,
          "FDP_ITC.1": 11,
          "FDP_ITC.2": 11,
          "FDP_ITT.1": 1,
          "FDP_RIP.1": 3,
          "FDP_SDI.1": 3,
          "FDP_UCT": 7,
          "FDP_UIT": 9,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_AFL": 12,
          "FIA_MSA": 1,
          "FIA_SOS.2": 3,
          "FIA_UAU.1": 3,
          "FIA_UAU.5": 3,
          "FIA_UAU.6": 3,
          "FIA_UID.1": 4,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB.1": 3
        },
        "FMT": {
          "FMT_MOF": 3,
          "FMT_MSA": 65,
          "FMT_MSA.1": 1,
          "FMT_MSA.2": 4,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 2,
          "FMT_MTD": 6,
          "FMT_SMF.1": 3,
          "FMT_SMR.1": 4
        },
        "FPT": {
          "FPT_FLS": 7,
          "FPT_FLS.1": 1,
          "FPT_ITT.1": 3,
          "FPT_PHP.3": 4,
          "FPT_PHP.3.1": 1,
          "FPT_STM.1": 3,
          "FPT_TST.1": 6,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 3,
          "FTP_ITC.1": 1,
          "FTP_TRP.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CFB": {
          "CFB": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "NIST P-256": 1,
          "P-256": 1
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 9
          },
          "SHA2": {
            "SHA-256": 8,
            "SHA-384": 8
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 11
        },
        "RNG": {
          "RNG": 12
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1
        },
        "SCA": {
          "DPA": 1,
          "SPA": 1,
          "physical probing": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS20": 1
        },
        "CC": {
          "CCMB-2017-04-001": 2,
          "CCMB-2017-04-002": 2,
          "CCMB-2017-04-003": 2,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS 180-4": 3,
          "FIPS PUB 140-2": 3,
          "FIPS PUB 180-4": 2,
          "FIPS PUB 186-4": 1
        },
        "ISO": {
          "ISO/IEC 10116:2006": 2,
          "ISO/IEC 10118-3": 1,
          "ISO/IEC 14888-3": 1,
          "ISO/IEC 15946-1": 1,
          "ISO/IEC 9797-2": 3
        },
        "NIST": {
          "NIST SP 800-90A": 2,
          "SP 800-133": 1,
          "SP 800-90A": 3
        },
        "PKCS": {
          "PKCS#1": 12
        },
        "RFC": {
          "RFC 2104": 1,
          "RFC 3447": 1,
          "RFC3447": 35
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 22
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 16
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-02102": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 1
        },
        "Infineon": {
          "Infineon": 6,
          "Infineon Technologies": 6,
          "Infineon Technologies AG": 20
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "J\u00fcrgen Noller",
      "/Keywords": "Infineon, CCS, Security Target, EAL4+, moderate, SLB967x, SLB9670, SPI, Trusted Computing, TPM 2.0, Trusted Platform Module",
      "/Subject": "Security Target SLB9670_2.0",
      "/Title": "CC EAL4+ moderate Certification Security Target",
      "pdf_file_size_bytes": 1338429,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.infineon.com/",
          "http://www.rsa.com/",
          "mailto:[email protected];[email protected]?subject=Document%20question%20",
          "http://www.bsi.bund.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 63
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-profil-pp-2021_02en.pdf",
        "pp_name": "Protection Profile PC Client Specific Trusted Platform Module Specification Family 2.0; Level 0; Revi..."
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1179V4a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_FLR.1",
      "AVA_VAN.4"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1179V4b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "46be00b1998f75fcc354009d03178e9a3f2f6acc95012efa2638b76a67183199",
      "txt_hash": "2f647da575800b7d4cec5a4bb0fdd6c360819cf1a9fa988adf78c2155a58971b"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "6184cb6997acf399109a43cd9d565356ed8cab19275b14e1e900ba766fb8b60e",
      "txt_hash": "ae5994f4420ead9abd77ee73a898939a4f5ebd2829c29f4f6606c61c4ac364cb"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "9910325254676f6fb389a06f960f9ca8b6ce4f98f7001f4fae8a509e9cbb1e04",
      "txt_hash": "4fe7a85fc7a38b587e16cb65ab88096bd62c424d6725730e94c5fbd126bc6d91"
    }
  },
  "status": "active"
}