IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration)
CSV information ?
Status | archived |
---|---|
Valid from | 19.11.2018 |
Valid until | 19.11.2023 |
Scheme | 🇳🇱 NL |
Manufacturer | Idemia |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | ALC_TAT.2, ATE_DPT.3, ADV_FSP.5, ALC_DVS.2, EAL4+, ADV_INT.2, ALC_CMS.5, ADV_TDS.4 |
Heuristics summary ?
Certificate ?
Extracted keywords
Security level
EAL2, EAL7Claims
O.MSecurity Assurance Requirements (SAR)
ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_DVS.2, ALC_CMS.5, ALC_TAT.2, ATE_DPT.3Certificates
CC-18-196231Evaluation facilities
BrightsightStandards
ISO/IEC 15408, ISO/IEC 18045, ICAOFile metadata
Title | BHC364e-20181119163400 |
---|---|
Creation date | D:20181119163400+01'00' |
Modification date | D:20181119163400+01'00' |
Pages | 1 |
Creator | BHC364e |
Producer | KONICA MINOLTA bizhub C364e |
Certification report ?
Extracted keywords
Hash functions
SHA-2Libraries
v1.02.013Vendor
Infineon, IDEMIASecurity level
EAL4, EAL4+, EAL 4, EAL4 augmented, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ADV_FSP.5, ADV_INT.2, ADV_TDS.4, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_CMS.5, ALC_TAT.2, ATE_DPT.3, AVA_VAN.5Protection profiles
BSI-CC-PP-0055Certificates
ANSSI-CC-2018/27, NSCIB-CC-196231-CR, CC-195748, CC-19-180045Evaluation facilities
Brightsight, CESTICertification process
out of scope, of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no security risk to the TOE. 2.5 Documentation The following documentation isSide-channel analysis
side channel, fault injection, JILVulnerabilities
ROCACertification process
out of scope, of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no security risk to the TOE. 2.5 Documentation The following documentation isStandards
ISO/IEC 18013, ICAOFile metadata
Title | Certification Report NSCIB-CC-196231-CR |
---|---|
Author | p646 |
Creation date | D:20181120153406+01'00' |
Modification date | D:20181120153406+01'00' |
Pages | 13 |
Creator | PDFCreator Version 1.2.0 |
Producer | GPL Ghostscript 9.0 |
Frontpage
Certificate ID | NSCIB-CC-196231-CR |
---|---|
Certified item | IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration |
Certification lab | Brightsight |
Developer | IDEMIA |
References
Outgoing- NSCIB-CC-195748-CR - archived - Ideal Pass v2.3-i JC with Privacy Protection (SAC/EAC/Polymorphic eMRTD Configuration)
- ANSSI-CC-2018/27 - active - IDeal Citiz v2.17-i on Infineon M7892 B11 Java Card Open Platform
Security target ?
Extracted keywords
Symmetric Algorithms
AES-, AES, AES-128, DES, 3DES, Triple-DES, KMAC, CMACAsymmetric Algorithms
ECDSA, ECCHash functions
SHA-1, SHA1, SHA-224, SHA-384, SHA-512, SHA224, SHA256, SHA384, SHA512, SHA-256, SHA-2Schemes
MACProtocols
PACE, PGPRandomness
RNDLibraries
v1.02.013Block cipher modes
CBCIC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG15, EF.DG13, EF.DG14, EF.COM, EF.SODVendor
Infineon, IDEMIASecurity level
EAL4, EAL5, EAL4 augmentedClaims
A.MRTD_, OE.AA_MRTD, OE.MRTD_Security Assurance Requirements (SAR)
ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ADV_SPM.1, ADV_ARC.1, AGD_PRE, AGD_OPE, ALC_DVS.2, ALC_CMS.5, ALC_TAT.2, ATE_DPT.3Security Functional Requirements (SFR)
FAU_SAS, FAU_GEN, FAU_SAS.1, FAU_SAS.1.1, FCS_RND, FCS_COP, FCS_CKM.1, FCS_RND.1, FCS_RND.1.1, FCS_CKM.1.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.4.1, FCS_CKM, FDP_ACF.1, FDP_ACF, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_UCT.1, FDP_UIT.1, FDP_UCT.1.1, FDP_IFC.1, FDP_UIT, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ITC, FIA_API, FIA_SOS.2, FIA_API.1, FIA_API.1.1, FIA_UAU.5.2, FIA_UAU.4, FIA_UAU.6, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.6.1, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU, FMT_LIM, FMT_MTD, FMT_SMR.1, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.2, FMT_MSA.3, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FMT_MSA.1, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_FLS.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3.1, FPT_RVM.1, FPT_SEP.1, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-PP-0055, BSI-PP-0056, BSI-CC-PP- 0055-2009, BSI-CC-PP-0056-V2-2012-MA-02, BSI-PP-0035Certificates
ANSSI-CC-2018/27, CC-1, CC-2, CC-3Certification process
out of scope, of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no risk to the TOE security. Figure 1: TOE 1.4.2 TOE usage and security featuresSide-channel analysis
physical probing, DPA, SPA, timing attacks, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineeringCertification process
out of scope, of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no risk to the TOE security. Figure 1: TOE 1.4.2 TOE usage and security featuresStandards
FIPS 180-4, FIPS 46-3, FIPS46, FIPS PUB 197, AIS31, RFC3369, RFC-5639, RFC 5639, ISO/IEC 18013, ISO/IEC 7816-2, ISO/IEC 14443, ISO/IEC 7816-4, ISO/IEC15946-2, ICAO, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
Title | Security Target Lite IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration) |
---|---|
Subject | ASE Lite 2018_2000037746, v1.0, 2018-09-07 |
Keywords | NSCIB-CC-196231, ASE Lite, ICAO, ePassport, BAC |
Author | IDEMIA |
Creation date | D:20180907132327+02'00' |
Modification date | D:20180907132327+02'00' |
Pages | 102 |
Creator | Microsoft® Word 2016 |
Producer | Microsoft® Word 2016 |
References
Outgoing- ANSSI-CC-2018/27 - active - IDeal Citiz v2.17-i on Infineon M7892 B11 Java Card Open Platform
Heuristics ?
Extracted SARs
ADV_ARC.1, AVA_VAN.5, ADV_TDS.4, ALC_CMS.5, ADV_SPM.1, ALC_TAT.2, ATE_DPT.3, ADV_FSP.5, ALC_DVS.2, ADV_INT.2References ?
Updates ?
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e3b0534b1fda3edb8e85b8e67074226c5574000476637c2d16c1caae82aca7d6', 'txt_hash': '541a3cafe80ad85199954a277f4ad3c5bcf305e5f6c9ce2b9c23d85340d73221'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b52db9b83c21691e6ed5c422aa8ac1aea366b51a6d2f189f30085c68e37421a1', 'txt_hash': '4889220fca8cae085783a119f2299abbdf6450754046c0e99e4f4a5ff2aa65e8'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '85d2349952b6f2c642a503a4928d6a010bae6c523c598ec96a628e073a431952', 'txt_hash': '51f4cb96f7f6bbad728664cc6b0c6d117d958ca33ba51bf3c1517fb0f5cf5406'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 630780, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 13, '/Producer': 'GPL Ghostscript 9.0', '/CreationDate': "D:20181120153406+01'00'", '/ModDate': "D:20181120153406+01'00'", '/Title': 'Certification Report NSCIB-CC-196231-CR', '/Creator': 'PDFCreator Version 1.2.0', '/Author': 'p646', '/Keywords': '', '/Subject': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1486764, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 102, '/Title': 'Security Target Lite IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration)', '/Author': 'IDEMIA', '/Subject': 'ASE Lite 2018_2000037746, v1.0, 2018-09-07', '/Keywords': 'NSCIB-CC-196231, ASE Lite, ICAO, ePassport, BAC', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20180907132327+02'00'", '/ModDate': "D:20180907132327+02'00'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 202344, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Title': 'BHC364e-20181119163400', '/Creator': 'BHC364e', '/Producer': 'KONICA MINOLTA bizhub C364e', '/CreationDate': "D:20181119163400+01'00'", '/ModDate': "D:20181119163400+01'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'NL': {'cert_id': 'NSCIB-CC-196231-CR', 'cert_item': 'IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration', 'developer': 'IDEMIA', 'cert_lab': ' Brightsight'}}
. - The report_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2018/27': 1}, 'NL': {'NSCIB-CC-196231-CR': 12, 'CC-195748': 2, 'CC-19-180045': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0055': 1}}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL4+': 2, 'EAL 4': 1, 'EAL4 augmented': 1, 'EAL 4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.5': 2, 'ADV_INT.2': 2, 'ADV_TDS.4': 2}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_DVS.2': 2, 'ALC_CMS.5': 2, 'ALC_TAT.2': 2}, 'ATE': {'ATE_DPT.3': 2}, 'AVA': {'AVA_VAN.5': 2}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon': 3}, 'Idemia': {'IDEMIA': 6}}, 'eval_facility': {'BrightSight': {'Brightsight': 2}, 'CESTI': {'CESTI': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-2': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 4}}, 'vulnerability': {'ROCA': {'ROCA': 2}}, 'side_channel_analysis': {'SCA': {'side channel': 1}, 'FI': {'fault injection': 1}, 'other': {'JIL': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 18013': 2}, 'ICAO': {'ICAO': 6}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no security risk to the TOE. 2.5 Documentation The following documentation is': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2018/27': 2}, 'NL': {'CC-1': 6, 'CC-2': 3, 'CC-3': 3}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0055': 1, 'BSI-PP-0056': 1, 'BSI-CC-PP- 0055-2009': 1, 'BSI-CC-PP-0056-V2-2012-MA-02': 1, 'BSI-PP-0035': 1}}, 'cc_security_level': {'EAL': {'EAL4': 6, 'EAL5': 1, 'EAL4 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_FSP.5': 4, 'ADV_INT.2': 4, 'ADV_TDS.4': 4, 'ADV_SPM.1': 1, 'ADV_ARC.1': 1}, 'AGD': {'AGD_PRE': 9, 'AGD_OPE': 10}, 'ALC': {'ALC_DVS.2': 5, 'ALC_CMS.5': 4, 'ALC_TAT.2': 4}, 'ATE': {'ATE_DPT.3': 4}}, 'cc_sfr': {'FAU': {'FAU_SAS': 7, 'FAU_GEN': 1, 'FAU_SAS.1': 11, 'FAU_SAS.1.1': 2}, 'FCS': {'FCS_RND': 9, 'FCS_COP': 51, 'FCS_CKM.1': 30, 'FCS_RND.1': 13, 'FCS_RND.1.1': 2, 'FCS_CKM.1.1': 1, 'FCS_CKM.2': 2, 'FCS_COP.1': 9, 'FCS_CKM.4': 22, 'FCS_CKM.4.1': 1, 'FCS_CKM': 1}, 'FDP': {'FDP_ACF.1': 13, 'FDP_ACF': 1, 'FDP_ITC.1': 12, 'FDP_ITC.2': 12, 'FDP_ACC.1': 18, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 3, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 2, 'FDP_UCT.1': 11, 'FDP_UIT.1': 10, 'FDP_UCT.1.1': 1, 'FDP_IFC.1': 4, 'FDP_UIT': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ITC': 2}, 'FIA': {'FIA_API': 16, 'FIA_SOS.2': 1, 'FIA_API.1': 5, 'FIA_API.1.1': 1, 'FIA_UAU.5.2': 4, 'FIA_UAU.4': 16, 'FIA_UAU.6': 12, 'FIA_UID.1': 12, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 10, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.4.1': 1, 'FIA_UAU.5': 10, 'FIA_UAU.5.1': 1, 'FIA_UAU.6.1': 1, 'FIA_AFL.1': 8, 'FIA_AFL.1.1': 3, 'FIA_AFL.1.2': 3, 'FIA_UAU': 6}, 'FMT': {'FMT_LIM': 8, 'FMT_MTD': 35, 'FMT_SMR.1': 19, 'FMT_LIM.1': 18, 'FMT_LIM.2': 19, 'FMT_LIM.1.1': 3, 'FMT_LIM.2.1': 4, 'FMT_MSA.2': 1, 'FMT_MSA.3': 3, 'FMT_SMF.1': 18, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 3, 'FMT_SMR.1.2': 1, 'FMT_MTD.1': 5, 'FMT_MSA.1': 1}, 'FPT': {'FPT_EMS.1': 1, 'FPT_EMS.1.1': 1, 'FPT_EMS.1.2': 1, 'FPT_FLS.1': 10, 'FPT_TST.1': 9, 'FPT_PHP.3': 10, 'FPT_FLS.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 2, 'FPT_PHP.3.1': 1, 'FPT_RVM.1': 1, 'FPT_SEP.1': 1}, 'FTP': {'FTP_ITC.1': 5, 'FTP_TRP.1': 5}}, 'cc_claims': {'A': {'A.MRTD_': 1}, 'OE': {'OE.AA_MRTD': 6, 'OE.MRTD_': 2}}, 'vendor': {'Infineon': {'Infineon': 22}, 'Idemia': {'IDEMIA': 16}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES-': 1, 'AES': 11, 'AES-128': 1}}, 'DES': {'DES': {'DES': 4}, '3DES': {'3DES': 7, 'Triple-DES': 13}}, 'constructions': {'MAC': {'KMAC': 1, 'CMAC': 4}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 12}, 'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 3, 'SHA1': 1}, 'SHA2': {'SHA-224': 2, 'SHA-384': 2, 'SHA-512': 1, 'SHA224': 1, 'SHA256': 1, 'SHA384': 1, 'SHA512': 1, 'SHA-256': 1, 'SHA-2': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 24}}, 'crypto_protocol': {'PACE': {'PACE': 16}, 'PGP': {'PGP': 1}}, 'randomness': {'RNG': {'RND': 1}}, 'cipher_mode': {'CBC': {'CBC': 2}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 8}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 4, 'DPA': 2, 'SPA': 1, 'timing attacks': 1}, 'FI': {'Physical Tampering': 5, 'physical tampering': 1, 'Physical tampering': 1, 'Malfunction': 3, 'malfunction': 7, 'fault injection': 1}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 27, 'EF.DG2': 10, 'EF.DG3': 7, 'EF.DG4': 6, 'EF.DG5': 8, 'EF.DG16': 27, 'EF.DG15': 8, 'EF.DG13': 4, 'EF.DG14': 3, 'EF.COM': 9, 'EF.SOD': 9}}, 'standard_id': {'FIPS': {'FIPS 180-4': 2, 'FIPS 46-3': 2, 'FIPS46': 1, 'FIPS PUB 197': 1}, 'BSI': {'AIS31': 4}, 'RFC': {'RFC3369': 1, 'RFC-5639': 1, 'RFC 5639': 1}, 'ISO': {'ISO/IEC 18013': 6, 'ISO/IEC 7816-2': 1, 'ISO/IEC 14443': 6, 'ISO/IEC 7816-4': 1, 'ISO/IEC15946-2': 1}, 'ICAO': {'ICAO': 20}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1, 'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no risk to the TOE security. Figure 1: TOE 1.4.2 TOE usage and security features': 1}}}
. - The cert_keywords property was set to
{'cc_cert_id': {'NL': {'CC-18-196231': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1, 'EAL7': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.5': 1, 'ADV_INT.2': 1, 'ADV_TDS.4': 1}, 'ALC': {'ALC_DVS.2': 1, 'ALC_CMS.5': 1, 'ALC_TAT.2': 1}, 'ATE': {'ATE_DPT.3': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.M': 1}}, 'vendor': {}, 'eval_facility': {'BrightSight': {'Brightsight': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}, 'ICAO': {'ICAO': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
Certification Report NSCIB-CC-196231-CR.pdf
. - The st_filename property was set to
[ST-BAC-Lite] 2018_2000037746 - Security Target Lite IDeal Pass v2.3-i JC (BAC Configuration) (v1.0, 2018-09-07).pdf
. - The cert_filename property was set to
Signed certificate CC-18-196231.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['']
. - The cert_id property was set to
NSCIB-CC-196231-CR
. - The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/27']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-V4-2018', 'ANSSI-CC-2018/27']}}
data. - The report_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['NSCIB-CC-195748-CR', 'ANSSI-CC-2018/27']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0782-V2-2015', 'ANSSI-CC-2018/27', 'ANSSI-CC-2016/66', 'ANSSI-CC-2017/59', 'NSCIB-CC-195748-CR', 'BSI-DSZ-CC-0782-V3-2017', 'BSI-DSZ-CC-0782-V4-2018']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20NSCIB-CC-196231-CR.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST-BAC-Lite]%202018_2000037746%20-%20Security%20Target%20Lite%20IDeal%20Pass%20v2.3-i%20JC%20(BAC%20Configuration)%20(v1.0,%202018-09-07).pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The report_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The report_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The report_references property was updated, with the
{'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-195748-CR']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012', 'NSCIB-CC-195748-CR']}}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}]}
values discarded.
- The st property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Signed%20certificate%20CC-18-196231.pdf",
"dgst": "ce867531085e33f8",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "NSCIB-CC-196231-CR",
"cert_lab": [
""
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2.3"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"NSCIB-CC-195748-CR",
"ANSSI-CC-2018/27"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"NSCIB-CC-195748-CR",
"ANSSI-CC-2017/59",
"BSI-DSZ-CC-0782-V4-2018",
"ANSSI-CC-2016/66",
"BSI-DSZ-CC-0782-V3-2017",
"BSI-DSZ-CC-0782-V2-2015",
"BSI-DSZ-CC-0782-2012",
"ANSSI-CC-2018/27"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2018/27"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0782-V4-2018",
"ANSSI-CC-2018/27"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Idemia",
"manufacturer_web": "https://www.idemia.com",
"name": "IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration)",
"not_valid_after": "2023-11-19",
"not_valid_before": "2018-11-19",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "Signed certificate CC-18-196231.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NL": {
"CC-18-196231": 1
}
},
"cc_claims": {
"O": {
"O.M": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.5": 1,
"ADV_INT.2": 1,
"ADV_TDS.4": 1
},
"ALC": {
"ALC_CMS.5": 1,
"ALC_DVS.2": 1,
"ALC_TAT.2": 1
},
"ATE": {
"ATE_DPT.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL7": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ICAO": {
"ICAO": 1
},
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20181119163400+01\u002700\u0027",
"/Creator": "BHC364e",
"/ModDate": "D:20181119163400+01\u002700\u0027",
"/Producer": "KONICA MINOLTA bizhub C364e",
"/Title": "BHC364e-20181119163400",
"pdf_file_size_bytes": 202344,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "Certification Report NSCIB-CC-196231-CR.pdf",
"report_frontpage": {
"NL": {
"cert_id": "NSCIB-CC-196231-CR",
"cert_item": "IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration",
"cert_lab": " Brightsight",
"developer": "IDEMIA"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2018/27": 1
},
"NL": {
"CC-19-180045": 1,
"CC-195748": 2,
"NSCIB-CC-196231-CR": 12
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0055": 1
}
},
"cc_sar": {
"ADV": {
"ADV_FSP.5": 2,
"ADV_INT.2": 2,
"ADV_TDS.4": 2
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMS.5": 2,
"ALC_DVS.2": 2,
"ALC_TAT.2": 2
},
"ATE": {
"ATE_DPT.3": 2
},
"AVA": {
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL4": 2,
"EAL4 augmented": 1,
"EAL4+": 2
}
},
"cc_sfr": {},
"certification_process": {
"OutOfScope": {
"of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no security risk to the TOE. 2.5 Documentation The following documentation is": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Infineon": {
"v1.02.013": 4
}
},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 2
},
"CESTI": {
"CESTI": 1
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-2": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"fault injection": 1
},
"SCA": {
"side channel": 1
},
"other": {
"JIL": 2
}
},
"standard_id": {
"ICAO": {
"ICAO": 6
},
"ISO": {
"ISO/IEC 18013": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 6
},
"Infineon": {
"Infineon": 3
}
},
"vulnerability": {
"ROCA": {
"ROCA": 2
}
}
},
"report_metadata": {
"/Author": "p646",
"/CreationDate": "D:20181120153406+01\u002700\u0027",
"/Creator": "PDFCreator Version 1.2.0",
"/Keywords": "",
"/ModDate": "D:20181120153406+01\u002700\u0027",
"/Producer": "GPL Ghostscript 9.0",
"/Subject": "",
"/Title": "Certification Report NSCIB-CC-196231-CR",
"pdf_file_size_bytes": 630780,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 13
},
"st_filename": "[ST-BAC-Lite] 2018_2000037746 - Security Target Lite IDeal Pass v2.3-i JC (BAC Configuration) (v1.0, 2018-09-07).pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDSA": {
"ECDSA": 12
}
}
},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2018/27": 2
},
"NL": {
"CC-1": 6,
"CC-2": 3,
"CC-3": 3
}
},
"cc_claims": {
"A": {
"A.MRTD_": 1
},
"OE": {
"OE.AA_MRTD": 6,
"OE.MRTD_": 2
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0055-2009": 1,
"BSI-CC-PP-0056-V2-2012-MA-02": 1,
"BSI-PP-0035": 1,
"BSI-PP-0055": 1,
"BSI-PP-0056": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.5": 4,
"ADV_INT.2": 4,
"ADV_SPM.1": 1,
"ADV_TDS.4": 4
},
"AGD": {
"AGD_OPE": 10,
"AGD_PRE": 9
},
"ALC": {
"ALC_CMS.5": 4,
"ALC_DVS.2": 5,
"ALC_TAT.2": 4
},
"ATE": {
"ATE_DPT.3": 4
}
},
"cc_security_level": {
"EAL": {
"EAL4": 6,
"EAL4 augmented": 2,
"EAL5": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_SAS": 7,
"FAU_SAS.1": 11,
"FAU_SAS.1.1": 2
},
"FCS": {
"FCS_CKM": 1,
"FCS_CKM.1": 30,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 2,
"FCS_CKM.4": 22,
"FCS_CKM.4.1": 1,
"FCS_COP": 51,
"FCS_COP.1": 9,
"FCS_RND": 9,
"FCS_RND.1": 13,
"FCS_RND.1.1": 2
},
"FDP": {
"FDP_ACC.1": 18,
"FDP_ACC.1.1": 1,
"FDP_ACF": 1,
"FDP_ACF.1": 13,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 3,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 2,
"FDP_IFC.1": 4,
"FDP_ITC": 2,
"FDP_ITC.1": 12,
"FDP_ITC.2": 12,
"FDP_UCT.1": 11,
"FDP_UCT.1.1": 1,
"FDP_UIT": 1,
"FDP_UIT.1": 10,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL.1": 8,
"FIA_AFL.1.1": 3,
"FIA_AFL.1.2": 3,
"FIA_API": 16,
"FIA_API.1": 5,
"FIA_API.1.1": 1,
"FIA_SOS.2": 1,
"FIA_UAU": 6,
"FIA_UAU.1": 10,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.4": 16,
"FIA_UAU.4.1": 1,
"FIA_UAU.5": 10,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 4,
"FIA_UAU.6": 12,
"FIA_UAU.6.1": 1,
"FIA_UID.1": 12,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_LIM": 8,
"FMT_LIM.1": 18,
"FMT_LIM.1.1": 3,
"FMT_LIM.2": 19,
"FMT_LIM.2.1": 4,
"FMT_MSA.1": 1,
"FMT_MSA.2": 1,
"FMT_MSA.3": 3,
"FMT_MTD": 35,
"FMT_MTD.1": 5,
"FMT_SMF.1": 18,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 19,
"FMT_SMR.1.1": 3,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_EMS.1": 1,
"FPT_EMS.1.1": 1,
"FPT_EMS.1.2": 1,
"FPT_FLS.1": 10,
"FPT_FLS.1.1": 1,
"FPT_PHP.3": 10,
"FPT_PHP.3.1": 1,
"FPT_RVM.1": 1,
"FPT_SEP.1": 1,
"FPT_TST.1": 9,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 2
},
"FTP": {
"FTP_ITC.1": 5,
"FTP_TRP.1": 5
}
},
"certification_process": {
"OutOfScope": {
"of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no risk to the TOE security. Figure 1: TOE 1.4.2 TOE usage and security features": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Infineon": {
"v1.02.013": 8
}
},
"crypto_protocol": {
"PACE": {
"PACE": 16
},
"PGP": {
"PGP": 1
}
},
"crypto_scheme": {
"MAC": {
"MAC": 24
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 3,
"SHA1": 1
},
"SHA2": {
"SHA-2": 2,
"SHA-224": 2,
"SHA-256": 1,
"SHA-384": 2,
"SHA-512": 1,
"SHA224": 1,
"SHA256": 1,
"SHA384": 1,
"SHA512": 1
}
}
},
"ic_data_group": {
"EF": {
"EF.COM": 9,
"EF.DG1": 27,
"EF.DG13": 4,
"EF.DG14": 3,
"EF.DG15": 8,
"EF.DG16": 27,
"EF.DG2": 10,
"EF.DG3": 7,
"EF.DG4": 6,
"EF.DG5": 8,
"EF.SOD": 9
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 1
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 3,
"Physical Tampering": 5,
"Physical tampering": 1,
"fault injection": 1,
"malfunction": 7,
"physical tampering": 1
},
"SCA": {
"DPA": 2,
"SPA": 1,
"physical probing": 4,
"timing attacks": 1
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"BSI": {
"AIS31": 4
},
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1,
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
},
"FIPS": {
"FIPS 180-4": 2,
"FIPS 46-3": 2,
"FIPS PUB 197": 1,
"FIPS46": 1
},
"ICAO": {
"ICAO": 20
},
"ISO": {
"ISO/IEC 14443": 6,
"ISO/IEC 18013": 6,
"ISO/IEC 7816-2": 1,
"ISO/IEC 7816-4": 1,
"ISO/IEC15946-2": 1
},
"RFC": {
"RFC 5639": 1,
"RFC-5639": 1,
"RFC3369": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 11,
"AES-": 1,
"AES-128": 1
}
},
"DES": {
"3DES": {
"3DES": 7,
"Triple-DES": 13
},
"DES": {
"DES": 4
}
},
"constructions": {
"MAC": {
"CMAC": 4,
"KMAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 16
},
"Infineon": {
"Infineon": 22
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "IDEMIA",
"/CreationDate": "D:20180907132327+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/Keywords": "NSCIB-CC-196231, ASE Lite, ICAO, ePassport, BAC",
"/ModDate": "D:20180907132327+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"/Subject": "ASE Lite 2018_2000037746, v1.0, 2018-09-07",
"/Title": "Security Target Lite IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration)",
"pdf_file_size_bytes": 1486764,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 102
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf",
"pp_name": "Protection Profile for Machine Readable Travel Document with \u0027ICAO Application\u0027, Basic Acce..."
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20NSCIB-CC-196231-CR.pdf",
"scheme": "NL",
"security_level": {
"_type": "Set",
"elements": [
"ALC_TAT.2",
"ALC_CMS.5",
"ALC_DVS.2",
"ADV_FSP.5",
"ATE_DPT.3",
"EAL4+",
"ADV_INT.2",
"ADV_TDS.4"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST-BAC-Lite]%202018_2000037746%20-%20Security%20Target%20Lite%20IDeal%20Pass%20v2.3-i%20JC%20(BAC%20Configuration)%20(v1.0,%202018-09-07).pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "85d2349952b6f2c642a503a4928d6a010bae6c523c598ec96a628e073a431952",
"txt_hash": "51f4cb96f7f6bbad728664cc6b0c6d117d958ca33ba51bf3c1517fb0f5cf5406"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "e3b0534b1fda3edb8e85b8e67074226c5574000476637c2d16c1caae82aca7d6",
"txt_hash": "541a3cafe80ad85199954a277f4ad3c5bcf305e5f6c9ce2b9c23d85340d73221"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b52db9b83c21691e6ed5c422aa8ac1aea366b51a6d2f189f30085c68e37421a1",
"txt_hash": "4889220fca8cae085783a119f2299abbdf6450754046c0e99e4f4a5ff2aa65e8"
}
},
"status": "archived"
}