DocuSign Signature Appliance Software Version 9.1.9.10 Hardware Version 8.0

Link Link by certificate ID Link by certificate name

CSV information ?

Status active
Valid from 22.06.2020
Valid until 22.06.2025
Scheme 🇮🇹 IT
Manufacturer DocuSign, Inc.
Category Products for Digital Signatures
Security level AVA_VAN.5, ALC_FLR.1, EAL4+, ATE_DPT.2

Heuristics summary ?

Certificate ID: OCSI/CERT/IMQ/01/2019/RC

Certificate ?

Certification report ?

Extracted keywords

Asymmetric Algorithms
DSA
Protocols
SSL, TLS
Libraries
OpenSSL

Vendor
Samsung, Microsoft

Security level
EAL4+, EAL2, EAL4
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, AGD_PRE, AGD_OPE, ALC_FLR.1, ALC_FLR, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_DPT.2, ATE_COV.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Certificates
OCSI/CERT/IMQ/01/2019/RC, OCSI/CERT/IMQ/07/2017/RC
Evaluation facilities
IMQ/LPS

Standards
ISO/IEC 15408, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004

File metadata

Title Rapporto di Certificazione del prodotto "DocuSign Signature Appliance v9.1"
Subject ---
Author ocsi
Creation date D:20200622061418+00'00'
Modification date D:20200622103025+00'00'
Pages 32
Creator Microsoft Word
Producer Modified using InfoCert Dike

References

Outgoing

Security target ?

Extracted keywords

Symmetric Algorithms
AES-128, AES-256, AES, DES, Triple-DES
Asymmetric Algorithms
RSA 2048, RSA 3072, RSA 4096, DSA
Hash functions
SHA-1, SHA256, SHA-256, SHA-384, SHA-512, SHA-2
Schemes
MAC
Protocols
TLS, TLS v1.2
Randomness
DRBG, RNG
Block cipher modes
CBC
TLS cipher suites
TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA256

Security level
EAL4+, EAL4, EAL 4+, EAL4 augmented
Claims
A.CGA, A.SCA, A.BKP-USB, A.BKP-FILE, A.OTP-MGMT, A.NETWORK-MGMT, A.OTP-USER, OE.HID_VAD, OE.NETWORK-MGMT, OE.BKP-USB, OE.BKP-FILE, OE.OTP-CHAR, OE.NETWORK_MGMT, OE.BKP-
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_DPT.2, ATE_COV.2, ATE_IND.2, ATE_FUN.1, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_GEN.2.1, FCS_COP, FCS_CKM.4, FCS_CKM, FCS_CKM.1, FCS_CKM.4.1, FCS_COP.1, FDP_ACF.1, FDP_ACF, FDP_ITC, FDP_ACC, FDP_UIT, FDP_IFC, FDP_ACC.1, FDP_ETC, FDP_ETC.1, FDP_ETC.2, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_ITC.1, FDP_ITC.2, FDP_SDI, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_UCT, FDP_UCT.1, FDP_UIT.1, FIA_UAU.1, FIA_AFL.1, FIA_UAU.2, FIA_UAU.5, FIA_AFL, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD, FIA_ATD.1, FIA_ATD.1.1, FIA_UAU, FIA_UAU.1.1, FIA_UID.1, FIA_UAU.1.2, FIA_UAU.2.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID, FIA_UID.1.1, FIA_UID.1.2, FMT_SMR.1, FMT_MSA, FMT_REV, FMT_SMF.1, FMT_MOF.1, FMT_MOF, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_REV.1, FMT_SMF, FMT_SMF.1.1, FMT_SMR, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMT, FPT_PHP.2, FPT_PHP, FPT_PHP.2.1, FPT_PHP.2.2, FPT_PHP.2.3, FPT_PHP.3, FPT_PHP.3.1, FPT_STM, FPT_STM.1, FPT_STM.1.1, FPT_TDC, FPT_TDC.1, FPT_TST, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_TRP.1, FTP_TRP.1, FTP_ITC, FTP_ITC.1, FTP_TRP, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3

Side-channel analysis
timing attacks, physical tampering, malfunction

Standards
FIPS 140-2, FIPS PUB 186-4, NIST SP 800-90A, PKCS1, RFC 6238, RFC 2865, RFC 5246, CCMB-20012-09-003, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003

File metadata

Title Security Target for DocuSign Signature Appliance
Author DocuSign TLV team
Creation date D:20200619070940Z00'00'
Modification date D:20200619070940Z00'00'
Pages 165
Creator Microsoft® Word for Office 365
Producer Mac OS X 10.13.6 Quartz PDFContext

Heuristics ?

Certificate ID: OCSI/CERT/IMQ/01/2019/RC

Extracted SARs

AGD_OPE.1, ATE_COV.2, ADV_TDS.3, ALC_FLR.1, ASE_OBJ.2, ALC_DVS.1, ATE_FUN.1, ASE_CCL.1, ASE_TSS.1, ALC_CMC.4, AVA_VAN.5, ASE_ECD.1, ADV_IMP.1, ADV_ARC.1, ALC_LCD.1, ALC_CMS.4, ASE_INT.1, ATE_IND.2, ASE_REQ.2, ATE_DPT.2, ALC_TAT.1, ADV_FSP.4, ASE_SPD.1, ALC_DEL.1, AGD_PRE.1

Similar certificates

Name Certificate ID
Composite system comprised of ECI LightSoft Software Version 11.2 (build 04113) with fixes NSx1120_4113-100 10, NC1120_4113-100 10 EMS-APT Software Version 4.0 (build 20) with fixes BC0400-01 1, BC0400-02 1, BS0400-01 1, BS0400-02 1; NPT-1010 Software Version 4.0 (build 35); NPT-1020/1021 Software Version 4.0 (build 35); and NPT-1200 Software Version 4.0 (build 35) None Compare
Ricoh imagio MP C2201 SP with imagio FAX Unit Type28, and Ricoh imagio MP C2201 SPF Version: - Software version: System/Copy 1.01, Network Support 10.56, Scanner 01.05, Printer 1.01d, Fax 02.00.00, RemoteFax 02.00.00, Web Support 1.01, Web Uapl 1.02, NetworkDocBox 1.03, animation 0.01, RPCS 3.10.17, RPCS Font 1.00, Engine 1.07:03, OpePanel 1.02, LANG0 1.02, LANG1 1.02, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-22(WW) 02.00.00 JISEC-CC-CRP-C0323 Compare
Following MFP with FCU(Fax Option Type C5000) MFP: Ricoh Aficio MP C2800, Ricoh Aficio MP C2800G, Ricoh Aficio MP C3300, Ricoh Aficio MP C3300G, Savin C2828, Savin C2828G, Savin C3333, Savin C3333G, Lanier LD528C, Lanier LD528CG, Lanier LD533C, Lanier LD533CG, Lanier MP C2800, Lanier MP C3300, Gestetner MP C2800, Gestetner MP C3300, nashuatec MP C2800, nashuatec MP C3300, Rex-Rotary MP C2800, Rex-Rotary MP C3300, infotec MP C2800, infotec MP C3300 FCU: Fax Option Type C5000 MFP Software /Hardware Version : Software System/Copy 1.22 Network Support 8.27 Scanner 01.23 Printer 1.22 Fax 04.00.00 Web Support 1.10 Web Uapl 1.08 Network Doc Box 1.03 Hardware Ic Key 1100 Ic Ctlr 03 FCU Version : GWFCU3-13(WW) 04.04.00 JISEC-CC-CRP-C0266 Compare
Ricoh imagio MP C7501 SP/C6001 SP both with imagio FAX Unit Type23, imagio Security Card Type7, and imagio HDD Encryption Card Type7 Version: - Software version: System/Copy 1.03, Network Support 9.62, Scanner 01.05, Printer 1.03, Fax 02.00.00, RemoteFax 02.00.00, Web Support 1.04, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, RPCS 3.10.6, RPCS Font 1.00, Engine 1.07:06, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-18(WW) 02.00.00, Data Erase Opt 1.01x JISEC-CC-CRP-C0320 Compare
Ricoh Aficio MP C2051/C2551, Savin C9120/C9125, Lanier LD620C/LD625C, Lanier MP C2051/C2551, nashuatec MP C2051/C2551, Rex-Rotary MP C2051/C2551, Gestetner MP C2051/C2551, infotec MP C2051/C2551 all of above with Fax Option Type C2551 Version: - Software version: System/Copy 1.01, Network Support 10.56, Scanner 01.05, Printer 1.01e, Fax 02.00.00, RemoteFax 02.00.00, Web Support 1.01, Web Uapl 1.02, NetworkDocBox 1.03, animation 0.01, PCL 1.01, OptionPCLFont 1.02, Engine 1.07:03, OpePanel 1.02, LANG0 1.02, LANG1 1.02, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-22(WW) 02.00.00 JISEC-CC-CRP-C0325 Compare
NPCT6xx TPM 2.0 Hardware version FB5C85D and FB5C85E, Firmware version 1.3.0.1, 1.3.1.0 and 1.3.2.8 ANSSI-CC-2017/55 Compare

Scheme data ?

Title DocuSign Signature Appliance Software Version 9.1.9.10 Hardware Version 8.0
Supplier DocuSign
Certification Date 22 giugno 2020
Report Link It https://www.ocsi.gov.it/documenti/certificazioni/docusign/rc_docusign_sa_91_v1.0.pdf
Target Link https://www.ocsi.gov.it/documenti/certificazioni/docusign/st_docusign_sa_91_v2.18.pdf

References ?

Updates ?

  • 30.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'title': 'DocuSign Signature Appliance Software Version 9.1.9.10 Hardware Version 8.0', 'supplier': ' DocuSign', 'certification_date': ' 22 giugno\n\t\t\t\t\t\t\t\t\t\t\t2020', 'report_link_it': 'https://www.ocsi.gov.it/documenti/certificazioni/docusign/rc_docusign_sa_91_v1.0.pdf', 'target_link': 'https://www.ocsi.gov.it/documenti/certificazioni/docusign/st_docusign_sa_91_v2.18.pdf'}.
  • 16.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4ad8887de855000526ed0a002d2b1a1d941c3006f539788ddd0cd3bc01bddb04', 'txt_hash': '553af2e1de169f5aa71f60c8205f997424f6bc26e98382b833341b06c5e44e3b'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'a0164781d5caa43a82ddf9783bd4704d309c219f4c27ff58bef01e544da0c072', 'txt_hash': '89f934ea6b28292f1659377c1151144ef6c483533cbbb4b06b168fc26607934c'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 771264, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 32, '/Title': 'Rapporto di Certificazione del prodotto "DocuSign Signature Appliance v9.1"', '/Author': 'ocsi', '/Creator': 'Microsoft Word', '/CreationDate': "D:20200622061418+00'00'", '/ModDate': "D:20200622103025+00'00'", '/Producer': 'Modified using InfoCert Dike', '/Subject': '---', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 2861492, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 165, '/Title': 'Security Target for DocuSign Signature Appliance', '/Author': 'DocuSign TLV team', '/Producer': 'Mac OS X 10.13.6 Quartz PDFContext', '/Creator': 'Microsoft® Word for Office 365', '/CreationDate': "D:20200619070940Z00'00'", '/ModDate': "D:20200619070940Z00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'IT': {'OCSI/CERT/IMQ/01/2019/RC': 32, 'OCSI/CERT/IMQ/07/2017/RC': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4+': 1, 'EAL2': 4, 'EAL4': 11}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_PRE': 1, 'AGD_OPE': 1}, 'ALC': {'ALC_FLR.1': 7, 'ALC_FLR': 1, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_DPT.2': 7, 'ATE_COV.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 7}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Samsung': {'Samsung': 1}, 'Microsoft': {'Microsoft': 1}}, 'eval_facility': {'IMQLPS': {'IMQ/LPS': 4}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {'FF': {'DSA': {'DSA': 8}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}, 'TLS': {'TLS': 3}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 1}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 6}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4+': 4, 'EAL4': 7, 'EAL 4+': 1, 'EAL4 augmented': 4}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 3, 'ADV_FSP.4': 2, 'ADV_IMP.1': 2, 'ADV_TDS.3': 3}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_FLR.1': 8, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_DPT.2': 9, 'ATE_COV.2': 1, 'ATE_IND.2': 1, 'ATE_FUN.1': 2}, 'AVA': {'AVA_VAN.5': 8}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1, 'FAU_GEN.1': 6, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2': 6, 'FAU_GEN.2.1': 1}, 'FCS': {'FCS_COP': 39, 'FCS_CKM.4': 16, 'FCS_CKM': 21, 'FCS_CKM.1': 4, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 10}, 'FDP': {'FDP_ACF.1': 95, 'FDP_ACF': 181, 'FDP_ITC': 49, 'FDP_ACC': 204, 'FDP_UIT': 36, 'FDP_IFC': 55, 'FDP_ACC.1': 24, 'FDP_ETC': 24, 'FDP_ETC.1': 7, 'FDP_ETC.2': 23, 'FDP_IFC.1': 6, 'FDP_IFF': 42, 'FDP_IFF.1': 26, 'FDP_ITC.1': 13, 'FDP_ITC.2': 16, 'FDP_SDI': 1, 'FDP_SDI.2': 10, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_UCT': 33, 'FDP_UCT.1': 5, 'FDP_UIT.1': 11}, 'FIA': {'FIA_UAU.1': 12, 'FIA_AFL.1': 9, 'FIA_UAU.2': 9, 'FIA_UAU.5': 10, 'FIA_AFL': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD': 1, 'FIA_ATD.1': 6, 'FIA_ATD.1.1': 1, 'FIA_UAU': 1, 'FIA_UAU.1.1': 1, 'FIA_UID.1': 13, 'FIA_UAU.1.2': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_SMR.1': 30, 'FMT_MSA': 108, 'FMT_REV': 10, 'FMT_SMF.1': 25, 'FMT_MOF.1': 10, 'FMT_MOF': 1, 'FMT_MOF.1.1': 1, 'FMT_MSA.1': 14, 'FMT_MSA.2': 9, 'FMT_MSA.3': 38, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_REV.1': 7, 'FMT_SMF': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMT': 1}, 'FPT': {'FPT_PHP.2': 8, 'FPT_PHP': 1, 'FPT_PHP.2.1': 1, 'FPT_PHP.2.2': 1, 'FPT_PHP.2.3': 1, 'FPT_PHP.3': 8, 'FPT_PHP.3.1': 1, 'FPT_STM': 1, 'FPT_STM.1': 7, 'FPT_STM.1.1': 1, 'FPT_TDC': 26, 'FPT_TDC.1': 7, 'FPT_TST': 1, 'FPT_TST.1': 7, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_TRP.1': 1}, 'FTP': {'FTP_TRP.1': 10, 'FTP_ITC': 61, 'FTP_ITC.1': 19, 'FTP_TRP': 1, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'A': {'A.CGA': 3, 'A.SCA': 3, 'A.BKP-USB': 3, 'A.BKP-FILE': 3, 'A.OTP-MGMT': 3, 'A.NETWORK-MGMT': 3, 'A.OTP-USER': 3}, 'OE': {'OE.HID_VAD': 6, 'OE.NETWORK-MGMT': 1, 'OE.BKP-USB': 8, 'OE.BKP-FILE': 4, 'OE.OTP-CHAR': 6, 'OE.NETWORK_MGMT': 2, 'OE.BKP-': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES-128': 3, 'AES-256': 1, 'AES': 13}}, 'DES': {'DES': {'DES': 2}, '3DES': {'Triple-DES': 3}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 1, 'RSA 3072': 1, 'RSA 4096': 1}, 'FF': {'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA256': 1, 'SHA-256': 1, 'SHA-384': 1, 'SHA-512': 1, 'SHA-2': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 8}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 37, 'TLS v1.2': 1}}}, 'randomness': {'PRNG': {'DRBG': 1}, 'RNG': {'RNG': 3}}, 'cipher_mode': {'CBC': {'CBC': 2}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_RSA_WITH_AES_128_CBC_SHA256': 1, 'TLS_RSA_WITH_AES_256_CBC_SHA256': 1}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'timing attacks': 1}, 'FI': {'physical tampering': 13, 'malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 1, 'FIPS PUB 186-4': 1}, 'NIST': {'NIST SP 800-90A': 1}, 'PKCS': {'PKCS1': 1}, 'RFC': {'RFC 6238': 1, 'RFC 2865': 1, 'RFC 5246': 1}, 'CC': {'CCMB-20012-09-003': 1, 'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to rc_docusign_sa_91_v1.0.pdf.
    • The st_filename property was set to st_docusign_sa_91_v2.18.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to OCSI/CERT/IMQ/01/2019/RC.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['OCSI/CERT/IMQ/07/2017/RC']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['OCSI/CERT/IMQ/03/2015/RC', 'OCSI/CERT/IMQ/07/2017/RC', 'OCSI/CERT/IMQ/01/2011/RC', 'OCSI/CERT/IMQ/04/2016/RC']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/rc_docusign_sa_91_v1.0.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_docusign_sa_91_v2.18.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name DocuSign Signature Appliance Software Version 9.1.9.10 Hardware Version 8.0 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Products for Digital Signatures",
  "cert_link": null,
  "dgst": "f9c5667c4c9915d2",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "OCSI/CERT/IMQ/01/2019/RC",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "8.0",
        "9.1.9.10"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "OCSI/CERT/IMQ/07/2017/RC"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "OCSI/CERT/IMQ/03/2015/RC",
          "OCSI/CERT/IMQ/01/2011/RC",
          "OCSI/CERT/IMQ/07/2017/RC",
          "OCSI/CERT/IMQ/04/2016/RC"
        ]
      }
    },
    "scheme_data": {
      "certification_date": " 22 giugno\n\t\t\t\t\t\t\t\t\t\t\t2020",
      "report_link_it": "https://www.ocsi.gov.it/documenti/certificazioni/docusign/rc_docusign_sa_91_v1.0.pdf",
      "supplier": " DocuSign",
      "target_link": "https://www.ocsi.gov.it/documenti/certificazioni/docusign/st_docusign_sa_91_v2.18.pdf",
      "title": "DocuSign Signature Appliance Software Version 9.1.9.10 Hardware Version 8.0"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "DocuSign, Inc.",
  "manufacturer_web": "https://www.docusign.com/",
  "name": "DocuSign Signature Appliance Software Version 9.1.9.10 Hardware Version 8.0",
  "not_valid_after": "2025-06-22",
  "not_valid_before": "2020-06-22",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "rc_docusign_sa_91_v1.0.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DSA": {
            "DSA": 8
          }
        }
      },
      "cc_cert_id": {
        "IT": {
          "OCSI/CERT/IMQ/01/2019/RC": 32,
          "OCSI/CERT/IMQ/07/2017/RC": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR": 1,
          "ALC_FLR.1": 7,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.2": 7,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 4,
          "EAL4": 11,
          "EAL4+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 1
        }
      },
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 3
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "IMQLPS": {
          "IMQ/LPS": 4
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2012-09-001": 1,
          "CCMB-2012-09-002": 1,
          "CCMB-2012-09-003": 1,
          "CCMB-2012-09-004": 1
        },
        "ISO": {
          "ISO/IEC 15408": 6
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 1
        },
        "Samsung": {
          "Samsung": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "ocsi",
      "/CreationDate": "D:20200622061418+00\u002700\u0027",
      "/Creator": "Microsoft Word",
      "/ModDate": "D:20200622103025+00\u002700\u0027",
      "/Producer": "Modified using InfoCert Dike",
      "/Subject": "---",
      "/Title": "Rapporto di Certificazione del prodotto \"DocuSign Signature Appliance v9.1\"",
      "pdf_file_size_bytes": 771264,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 32
    },
    "st_filename": "st_docusign_sa_91_v2.18.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DSA": {
            "DSA": 1
          }
        },
        "RSA": {
          "RSA 2048": 1,
          "RSA 3072": 1,
          "RSA 4096": 1
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.BKP-FILE": 3,
          "A.BKP-USB": 3,
          "A.CGA": 3,
          "A.NETWORK-MGMT": 3,
          "A.OTP-MGMT": 3,
          "A.OTP-USER": 3,
          "A.SCA": 3
        },
        "OE": {
          "OE.BKP-": 2,
          "OE.BKP-FILE": 4,
          "OE.BKP-USB": 8,
          "OE.HID_VAD": 6,
          "OE.NETWORK-MGMT": 1,
          "OE.NETWORK_MGMT": 2,
          "OE.OTP-CHAR": 6
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 3,
          "ADV_FSP.4": 2,
          "ADV_IMP.1": 2,
          "ADV_TDS.3": 3
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR.1": 8,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.2": 9,
          "ATE_FUN.1": 2,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 8
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4+": 1,
          "EAL4": 7,
          "EAL4 augmented": 4,
          "EAL4+": 4
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_GEN.1": 6,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 6,
          "FAU_GEN.2.1": 1
        },
        "FCS": {
          "FCS_CKM": 21,
          "FCS_CKM.1": 4,
          "FCS_CKM.4": 16,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 39,
          "FCS_COP.1": 10
        },
        "FDP": {
          "FDP_ACC": 204,
          "FDP_ACC.1": 24,
          "FDP_ACF": 181,
          "FDP_ACF.1": 95,
          "FDP_ETC": 24,
          "FDP_ETC.1": 7,
          "FDP_ETC.2": 23,
          "FDP_IFC": 55,
          "FDP_IFC.1": 6,
          "FDP_IFF": 42,
          "FDP_IFF.1": 26,
          "FDP_ITC": 49,
          "FDP_ITC.1": 13,
          "FDP_ITC.2": 16,
          "FDP_SDI": 1,
          "FDP_SDI.2": 10,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1,
          "FDP_UCT": 33,
          "FDP_UCT.1": 5,
          "FDP_UIT": 36,
          "FDP_UIT.1": 11
        },
        "FIA": {
          "FIA_AFL": 1,
          "FIA_AFL.1": 9,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD": 1,
          "FIA_ATD.1": 6,
          "FIA_ATD.1.1": 1,
          "FIA_UAU": 1,
          "FIA_UAU.1": 12,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.2": 9,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.5": 10,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UID": 1,
          "FIA_UID.1": 13,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_MOF": 1,
          "FMT_MOF.1": 10,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 108,
          "FMT_MSA.1": 14,
          "FMT_MSA.2": 9,
          "FMT_MSA.3": 38,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_REV": 10,
          "FMT_REV.1": 7,
          "FMT_SMF": 2,
          "FMT_SMF.1": 25,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 1,
          "FMT_SMR.1": 30,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1,
          "FMT_SMT": 1
        },
        "FPT": {
          "FPT_PHP": 1,
          "FPT_PHP.2": 8,
          "FPT_PHP.2.1": 1,
          "FPT_PHP.2.2": 1,
          "FPT_PHP.2.3": 1,
          "FPT_PHP.3": 8,
          "FPT_PHP.3.1": 1,
          "FPT_STM": 1,
          "FPT_STM.1": 7,
          "FPT_STM.1.1": 1,
          "FPT_TDC": 26,
          "FPT_TDC.1": 7,
          "FPT_TRP.1": 1,
          "FPT_TST": 1,
          "FPT_TST.1": 7,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 61,
          "FTP_ITC.1": 19,
          "FTP_TRP": 1,
          "FTP_TRP.1": 10,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 37,
            "TLS v1.2": 1
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 8
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          },
          "SHA2": {
            "SHA-2": 1,
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA-512": 1,
            "SHA256": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 1
        },
        "RNG": {
          "RNG": 3
        }
      },
      "side_channel_analysis": {
        "FI": {
          "malfunction": 1,
          "physical tampering": 13
        },
        "SCA": {
          "timing attacks": 1
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-20012-09-003": 1,
          "CCMB-2012-09-001": 1,
          "CCMB-2012-09-002": 1,
          "CCMB-2012-09-003": 1
        },
        "FIPS": {
          "FIPS 140-2": 1,
          "FIPS PUB 186-4": 1
        },
        "NIST": {
          "NIST SP 800-90A": 1
        },
        "PKCS": {
          "PKCS1": 1
        },
        "RFC": {
          "RFC 2865": 1,
          "RFC 5246": 1,
          "RFC 6238": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 13,
            "AES-128": 3,
            "AES-256": 1
          }
        },
        "DES": {
          "3DES": {
            "Triple-DES": 3
          },
          "DES": {
            "DES": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {
        "TLS": {
          "TLS_RSA_WITH_AES_128_CBC_SHA256": 1,
          "TLS_RSA_WITH_AES_256_CBC_SHA256": 1
        }
      },
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "DocuSign TLV team",
      "/CreationDate": "D:20200619070940Z00\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Office 365",
      "/ModDate": "D:20200619070940Z00\u002700\u0027",
      "/Producer": "Mac OS X 10.13.6 Quartz PDFContext",
      "/Title": "Security Target for DocuSign Signature Appliance",
      "pdf_file_size_bytes": 2861492,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 165
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/rc_docusign_sa_91_v1.0.pdf",
  "scheme": "IT",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.1",
      "EAL4+",
      "AVA_VAN.5",
      "ATE_DPT.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_docusign_sa_91_v2.18.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "4ad8887de855000526ed0a002d2b1a1d941c3006f539788ddd0cd3bc01bddb04",
      "txt_hash": "553af2e1de169f5aa71f60c8205f997424f6bc26e98382b833341b06c5e44e3b"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "a0164781d5caa43a82ddf9783bd4704d309c219f4c27ff58bef01e544da0c072",
      "txt_hash": "89f934ea6b28292f1659377c1151144ef6c483533cbbb4b06b168fc26607934c"
    }
  },
  "status": "active"
}