SOMA-c007 Machine Readable Electronic Document SSCD Application version 4

CSV information ?

Status active
Valid from 15.09.2023
Valid until 15.09.2028
Scheme 🇪🇸 ES
Manufacturer HID Global
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, ALC_DVS.2, EAL5+

Heuristics summary ?

Certificate ID: 2018-20-INF-4155

Certificate ?

Extracted keywords

Security level
EAL 2, EAL5
Claims
O.E
Security Assurance Requirements (SAR)
ALC_FLR, ALC_DVS.2, AVA_VAN.5
Protection profiles
BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0071-2012
Evaluation facilities
Applus Laboratories

File metadata

Creation date D:20230904142226+02'00'
Modification date D:20230904142226+02'00'
Pages 2
Producer GPL Ghostscript 9.27

Certification report ?

Extracted keywords

Hash functions
SHA-512

Vendor
Infineon

Security level
EAL5, EAL5+, EAL6, EAL6+, EAL 1, EAL 4, EAL 2, EAL2, EAL6 augmented, ITSEC Evaluation
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_IMP.1, ADV_TDS.4, ADV_ARC, AGD_OPE.1, ALC_DVS.2, ALC_CMC.4, ALC_DEL.1, ALC_LCD.1, ALC_FLR, ATE_COV.2, ATE_FUN.1, AVA_VAN.5, ASE_CCL.1, ASE_INT.1, ASE_REQ.2
Protection profiles
BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0071-2012, BSI-CC-PP-0072-2012
Certificates
BSI-DSZ-CC-0891-V6-2021, 2018-20-INF-4155- v1
Evaluation facilities
Applus Laboratories

Side-channel analysis
JIL

Standards
ICAO

File metadata

Author 9308
Creation date D:20230918162101+02'00'
Modification date D:20230918162101+02'00'
Pages 17
Creator Microsoft® Word LTSC
Producer Microsoft® Word LTSC

References

Outgoing
  • BSI-DSZ-CC-0891-V6-2021 - active - Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE) Infineon Security Controller M7892 Design Steps D11 and G12, with the optional libraries RSA2048/4096 v2.03.008 or v2.07.003, EC v2.03.008 or v2.07.003, SHA-2 v1.01, Toolbox v2.03.008 or v2.07.003 and symmetric crypto library v2.02.010, as well as with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE)

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDES, TDEA
Asymmetric Algorithms
ECC, Diffie-Hellman
Hash functions
SHA-256, SHA-2
Schemes
MAC
Protocols
PACE
Libraries
Crypto Library v2.02.010

Vendor
Infineon, Infineon Technologies AG

Security level
EAL5+, EAL5, EAL6+, EAL4, EAL6, EAL5 augmented, EAL4 augmented, EAL6 augmented
Claims
A.CGA, A.SCA, OE.HID_VAD
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP.4, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_DPT.1, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_CKM.2, FCS_CKM.1.1, FDP_ACC, FDP_ACF, FDP_RIP.1, FDP_SDI, FDP_DAU, FDP_UIT, FDP_ITC.1, FDP_ITC.2, FDP_ACF.1, FDP_ACC.1, FDP_SDI.1, FDP_SDI.2, FDP_DAU.1, FDP_DAU.2, FDP_IFC.1, FDP_UIT.1, FDP_AFC, FIA_API, FIA_UID.1, FIA_UAU.1, FIA_AFL, FIA_API.1, FIA_AFL.1, FIA_UID.1.1, FIA_UAU.1.1, FMT_LIM, FMT_SMR, FMT_SMF.1, FMT_MOF.1, FMT_MSA, FMT_MSA.2, FMT_MSA.3, FMT_MSA.4, FMT_MTD, FMT_LIM.1, FMT_LIM.2, FMT_SMR.1, FMT_MSA.1, FMT_MTD.1, FPT_EMS, FPT_EMS.1, FPT_FLS.1, FPT_PHP.1, FPT_PHP.3, FPT_TST.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_TST, FPT_PHP.3.1, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0071-2012, BSI-CC-PP-0072-2012, BSI-CC-PP-0068-V2-2011-MA-01
Certificates
BSI-DSZ-CC-0891-V6-2021

Side-channel analysis
side channels, SPA, DPA, timing attacks, physical tampering, DFA, fault injection

Standards
FIPS PUB 180-4, FIPS PUB 197, PKCS #15, PKCS #1, RFC 2119, ISO/IEC 7816-4, ISO/IEC 7816-9, ICAO, CCMB-2017-04-004
Technical reports
BSI TR-03110

File metadata

Title SOMA-c007 Machine Readable Electronic Document - Security Target SSCD Application - Recertification
Subject SOMA-c007 Machine Readable Electronic Document
Author Giovanni LICCARDO, Roberta SODANO
Creation date D:20230308150403+01'00'
Modification date D:20230308150403+01'00'
Pages 131
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

References

Outgoing
  • BSI-DSZ-CC-0891-V6-2021 - active - Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE) Infineon Security Controller M7892 Design Steps D11 and G12, with the optional libraries RSA2048/4096 v2.03.008 or v2.07.003, EC v2.03.008 or v2.07.003, SHA-2 v1.01, Toolbox v2.03.008 or v2.07.003 and symmetric crypto library v2.02.010, as well as with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE)

Heuristics ?

Certificate ID: 2018-20-INF-4155

Extracted SARs

ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5

Scheme data ?

Product SOMA-c007 Machine Readable Electronic Document SSCD Application version 4
Product Link https://oc.ccn.cni.es/en/certified-products/certified-products/991-soma-c007-machine-readable-electronic-document-sscd-application-version-4
Category QSCD/SSCD
Manufacturer Hid Global
Certification Date 15.09.2023
Enhanced
Description The TOE is a combination of hardware and software configured to securely create, use, and manage Signature Creation Data (SCD). The SSCD protects the SCD during its whole life cycle as to be used in a signature creation process solely by its Signatory. The TOE comprises all IT security functionality necessary to ensure the secrecy of the SCD and the security of the electronic signature. The TOE provides the following functions: to generate Signature Creation Data (SCD) and the corresponding Signature Verification Data (SVD), to export the SVD for certification to the CGA over a trusted channel, to prove the identity as SSCD to external entities, to, optionally, receive and store certificate info, to switch the SSCD from a non-operational state to an operational state, and if in an operational state, to create digital signatures for data with the following steps: select an SCD if multiple are present in the SSCD, authenticate the Signatory and determine its intent to sign, receive data to be signed or a unique representation thereof (DTBS/R) from the SCA over a trusted channel, apply an appropriate cryptographic signature creation function to the DTBS/R using the selected SCD.
Category QSCD/SSCD
Manufacturer Hid Global
Type Product
Evaluation Facility Applus Laboratories
Status Certified
Certification Date 15.09.2023
Cc Version Common Criteria 3.1 release 5
Level EAL5 + ALC_DVS.2 + AVA_VAN.5
Target Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1819
Cert Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1820
Report Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1821

References ?

Updates ?

  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'certification_date': '2023-09-15'} data.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '69bb868cf76d9c30ea01c0b9bf64da1e33c49b8172233d89475b770d1c4042fd', 'txt_hash': '6abd53678fd8a331266100f69b328c91f35e8c264c1c73c63545373b9fd26a23'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '617eeee187cc49bea65f9a5582a21efffa8a565ab9df0b4f19db1c2b578e1fac', 'txt_hash': 'f5a2f8def7f954f44d015fd89f63e47a4583bac6b816e554f2656293b484f46b'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1875447, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 131, '/Title': 'SOMA-c007 Machine Readable Electronic Document - Security Target SSCD Application - Recertification', '/Author': 'Giovanni LICCARDO, Roberta SODANO', '/Subject': 'SOMA-c007 Machine Readable Electronic Document', '/Creator': 'Microsoft® Word for Microsoft 365', '/CreationDate': "D:20230308150403+01'00'", '/ModDate': "D:20230308150403+01'00'", '/Producer': 'Microsoft® Word for Microsoft 365', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 903551, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Producer': 'GPL Ghostscript 9.27', '/CreationDate': "D:20230904142226+02'00'", '/ModDate': "D:20230904142226+02'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0891-V6-2021': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0059-2009-MA-01': 2, 'BSI-CC-PP-0071-2012': 2, 'BSI-CC-PP-0072-2012': 2, 'BSI-CC-PP-0068-V2-2011-MA-01': 1}}, 'cc_security_level': {'EAL': {'EAL5+': 1, 'EAL5': 12, 'EAL6+': 2, 'EAL4': 1, 'EAL6': 1, 'EAL5 augmented': 5, 'EAL4 augmented': 1, 'EAL6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 2, 'ADV_FSP.5': 1, 'ADV_IMP.1': 2, 'ADV_INT.2': 1, 'ADV_TDS.4': 1, 'ADV_FSP.4': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_DVS.2': 9, 'ALC_CMC.4': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.2': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.3': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.5': 10}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FCS': {'FCS_CKM.1': 16, 'FCS_CKM.4': 13, 'FCS_COP.1': 11, 'FCS_CKM.2': 1, 'FCS_CKM.1.1': 1}, 'FDP': {'FDP_ACC': 27, 'FDP_ACF': 31, 'FDP_RIP.1': 8, 'FDP_SDI': 19, 'FDP_DAU': 8, 'FDP_UIT': 7, 'FDP_ITC.1': 4, 'FDP_ITC.2': 4, 'FDP_ACF.1': 18, 'FDP_ACC.1': 19, 'FDP_SDI.1': 2, 'FDP_SDI.2': 4, 'FDP_DAU.1': 1, 'FDP_DAU.2': 2, 'FDP_IFC.1': 10, 'FDP_UIT.1': 2, 'FDP_AFC': 1}, 'FIA': {'FIA_API': 4, 'FIA_UID.1': 26, 'FIA_UAU.1': 28, 'FIA_AFL': 40, 'FIA_API.1': 13, 'FIA_AFL.1': 12, 'FIA_UID.1.1': 1, 'FIA_UAU.1.1': 3}, 'FMT': {'FMT_LIM': 5, 'FMT_SMR': 37, 'FMT_SMF.1': 29, 'FMT_MOF.1': 9, 'FMT_MSA': 23, 'FMT_MSA.2': 10, 'FMT_MSA.3': 18, 'FMT_MSA.4': 10, 'FMT_MTD': 41, 'FMT_LIM.1': 25, 'FMT_LIM.2': 19, 'FMT_SMR.1': 28, 'FMT_MSA.1': 5, 'FMT_MTD.1': 5}, 'FPT': {'FPT_EMS': 6, 'FPT_EMS.1': 16, 'FPT_FLS.1': 9, 'FPT_PHP.1': 10, 'FPT_PHP.3': 9, 'FPT_TST.1': 14, 'FPT_EMS.1.1': 1, 'FPT_EMS.1.2': 1, 'FPT_TST': 1, 'FPT_PHP.3.1': 1}, 'FTP': {'FTP_ITC': 61, 'FTP_ITC.1': 20, 'FTP_TRP.1': 2}}, 'cc_claims': {'A': {'A.CGA': 7, 'A.SCA': 6}, 'OE': {'OE.HID_VAD': 7}}, 'vendor': {'Infineon': {'Infineon': 5, 'Infineon Technologies AG': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3}}, 'DES': {'DES': {'DES': 2}, '3DES': {'TDES': 3, 'TDEA': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 7}}, 'FF': {'DH': {'Diffie-Hellman': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 4, 'SHA-2': 3}}}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'PACE': {'PACE': 58}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Generic': {'Crypto Library v2.02.010': 2}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channels': 1, 'SPA': 3, 'DPA': 2, 'timing attacks': 2}, 'FI': {'physical tampering': 10, 'DFA': 2, 'fault injection': 1}}, 'technical_report_id': {'BSI': {'BSI TR-03110': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 180-4': 3, 'FIPS PUB 197': 1}, 'PKCS': {'PKCS #15': 9, 'PKCS #1': 5}, 'RFC': {'RFC 2119': 1}, 'ISO': {'ISO/IEC 7816-4': 1, 'ISO/IEC 7816-9': 1}, 'ICAO': {'ICAO': 18}, 'CC': {'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0059-2009-MA-01': 1, 'BSI-CC-PP-0071-2012': 1}}, 'cc_security_level': {'EAL': {'EAL 2': 1, 'EAL5': 1}}, 'cc_sar': {'ALC': {'ALC_FLR': 1, 'ALC_DVS.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.E': 1}}, 'vendor': {}, 'eval_facility': {'Applus': {'Applus Laboratories': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to 2018-20 ST_LITE.pdf.
    • The cert_filename property was set to 2018-20_Certificado.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V6-2021']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V6-2021']}} data.
    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-2015', 'BSI-DSZ-CC-0891-V3-2018', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0891-V2-2016']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}]} values added.
  • 19.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V4-2019']}}} data.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-20%20INF-4155.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-20%20ST_LITE.pdf.

    The state of the certificate object was updated.

    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The cert_metadata property was set to None.
    • The cert_keywords property was set to None.
    • The cert_filename property was set to None.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V3-2018', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0891-V4-2019', 'BSI-DSZ-CC-0891-2015', 'BSI-DSZ-CC-0891-V2-2016']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name SOMA-c007 Machine Readable Electronic Document SSCD Application version 4 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-20_Certificado.pdf",
  "dgst": "1e59c2d790653fcf",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "2018-20-INF-4155",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "4"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0891-V6-2021"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0891-V3-2018",
          "BSI-DSZ-CC-0891-V6-2021",
          "BSI-DSZ-CC-0782-2012",
          "BSI-DSZ-CC-0891-V4-2019",
          "BSI-DSZ-CC-0891-2015",
          "BSI-DSZ-CC-0891-V2-2016"
        ]
      }
    },
    "scheme_data": {
      "category": "QSCD/SSCD",
      "certification_date": "2023-09-15",
      "enhanced": {
        "category": "QSCD/SSCD",
        "cc_version": "Common Criteria 3.1 release 5",
        "cert_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1820",
        "certification_date": "2023-09-15",
        "description": "The TOE is a combination of hardware and software configured to securely create, use, and manage Signature Creation Data (SCD). The SSCD protects the SCD during its whole life cycle as to be used in a signature creation process solely by its Signatory. The TOE comprises all IT security functionality necessary to ensure the secrecy of the SCD and the security of the electronic signature. The TOE provides the following functions: to generate Signature Creation Data (SCD) and the corresponding Signature Verification Data (SVD), to export the SVD for certification to the CGA over a trusted channel, to prove the identity as SSCD to external entities, to, optionally, receive and store certificate info, to switch the SSCD from a non-operational state to an operational state, and if in an operational state, to create digital signatures for data with the following steps: select an SCD if multiple are present in the SSCD, authenticate the Signatory and determine its intent to sign, receive data to be signed or a unique representation thereof (DTBS/R) from the SCA over a trusted channel, apply an appropriate cryptographic signature creation function to the DTBS/R using the selected SCD.",
        "evaluation_facility": "Applus Laboratories",
        "level": "EAL5 + ALC_DVS.2 + AVA_VAN.5",
        "manufacturer": "Hid Global",
        "report_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1821",
        "status": "Certified",
        "target_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1819",
        "type": "Product"
      },
      "manufacturer": "Hid Global",
      "product": "SOMA-c007 Machine Readable Electronic Document SSCD Application version 4",
      "product_link": "https://oc.ccn.cni.es/en/certified-products/certified-products/991-soma-c007-machine-readable-electronic-document-sscd-application-version-4"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0891-V6-2021"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0891-V6-2021"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "HID Global",
  "manufacturer_web": "https://www.hidglobal.com/",
  "name": "SOMA-c007 Machine Readable Electronic Document SSCD Application version 4",
  "not_valid_after": "2028-09-15",
  "not_valid_before": "2023-09-15",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "2018-20_Certificado.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.E": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0059-2009-MA-01": 1,
          "BSI-CC-PP-0071-2012": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1,
          "ALC_FLR": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL5": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Applus": {
          "Applus Laboratories": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20230904142226+02\u002700\u0027",
      "/ModDate": "D:20230904142226+02\u002700\u0027",
      "/Producer": "GPL Ghostscript 9.27",
      "pdf_file_size_bytes": 903551,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "2018-20 INF-4155.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0891-V6-2021": 1
        },
        "ES": {
          "2018-20-INF-4155- v1": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0059-2009-MA-01": 3,
          "BSI-CC-PP-0071-2012": 3,
          "BSI-CC-PP-0072-2012": 3
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.4": 1
        },
        "AGD": {
          "AGD_OPE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 8,
          "ALC_FLR": 3,
          "ALC_LCD.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_INT.1": 1,
          "ASE_REQ.2": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_FUN.1": 1
        },
        "AVA": {
          "AVA_VAN.5": 9
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 1,
          "EAL 4": 2,
          "EAL2": 1,
          "EAL5": 8,
          "EAL5+": 1,
          "EAL6": 1,
          "EAL6 augmented": 1,
          "EAL6+": 1
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Applus": {
          "Applus Laboratories": 4
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "other": {
          "JIL": 1
        }
      },
      "standard_id": {
        "ICAO": {
          "ICAO": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 2
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "9308",
      "/CreationDate": "D:20230918162101+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word LTSC",
      "/ModDate": "D:20230918162101+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word LTSC",
      "pdf_file_size_bytes": 509192,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.sogis.eu/",
          "http://www.commoncriteriaportal.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 17
    },
    "st_filename": "2018-20 ST_LITE.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 7
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0891-V6-2021": 2
        }
      },
      "cc_claims": {
        "A": {
          "A.CGA": 7,
          "A.SCA": 6
        },
        "OE": {
          "OE.HID_VAD": 7
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0059-2009-MA-01": 2,
          "BSI-CC-PP-0068-V2-2011-MA-01": 1,
          "BSI-CC-PP-0071-2012": 2,
          "BSI-CC-PP-0072-2012": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 2,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 1,
          "ADV_IMP.1": 2,
          "ADV_INT.2": 1,
          "ADV_TDS.3": 1,
          "ADV_TDS.4": 1
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.5": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 9,
          "ALC_LCD.1": 1,
          "ALC_TAT.2": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 10
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 1,
          "EAL4 augmented": 1,
          "EAL5": 12,
          "EAL5 augmented": 5,
          "EAL5+": 1,
          "EAL6": 1,
          "EAL6 augmented": 1,
          "EAL6+": 2
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM.1": 16,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 1,
          "FCS_CKM.4": 13,
          "FCS_COP.1": 11
        },
        "FDP": {
          "FDP_ACC": 27,
          "FDP_ACC.1": 19,
          "FDP_ACF": 31,
          "FDP_ACF.1": 18,
          "FDP_AFC": 1,
          "FDP_DAU": 8,
          "FDP_DAU.1": 1,
          "FDP_DAU.2": 2,
          "FDP_IFC.1": 10,
          "FDP_ITC.1": 4,
          "FDP_ITC.2": 4,
          "FDP_RIP.1": 8,
          "FDP_SDI": 19,
          "FDP_SDI.1": 2,
          "FDP_SDI.2": 4,
          "FDP_UIT": 7,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_AFL": 40,
          "FIA_AFL.1": 12,
          "FIA_API": 4,
          "FIA_API.1": 13,
          "FIA_UAU.1": 28,
          "FIA_UAU.1.1": 3,
          "FIA_UID.1": 26,
          "FIA_UID.1.1": 1
        },
        "FMT": {
          "FMT_LIM": 5,
          "FMT_LIM.1": 25,
          "FMT_LIM.2": 19,
          "FMT_MOF.1": 9,
          "FMT_MSA": 23,
          "FMT_MSA.1": 5,
          "FMT_MSA.2": 10,
          "FMT_MSA.3": 18,
          "FMT_MSA.4": 10,
          "FMT_MTD": 41,
          "FMT_MTD.1": 5,
          "FMT_SMF.1": 29,
          "FMT_SMR": 37,
          "FMT_SMR.1": 28
        },
        "FPT": {
          "FPT_EMS": 6,
          "FPT_EMS.1": 16,
          "FPT_EMS.1.1": 1,
          "FPT_EMS.1.2": 1,
          "FPT_FLS.1": 9,
          "FPT_PHP.1": 10,
          "FPT_PHP.3": 9,
          "FPT_PHP.3.1": 1,
          "FPT_TST": 1,
          "FPT_TST.1": 14
        },
        "FTP": {
          "FTP_ITC": 61,
          "FTP_ITC.1": 20,
          "FTP_TRP.1": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Generic": {
          "Crypto Library v2.02.010": 2
        }
      },
      "crypto_protocol": {
        "PACE": {
          "PACE": 58
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-2": 3,
            "SHA-256": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "DFA": 2,
          "fault injection": 1,
          "physical tampering": 10
        },
        "SCA": {
          "DPA": 2,
          "SPA": 3,
          "side channels": 1,
          "timing attacks": 2
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS PUB 180-4": 3,
          "FIPS PUB 197": 1
        },
        "ICAO": {
          "ICAO": 18
        },
        "ISO": {
          "ISO/IEC 7816-4": 1,
          "ISO/IEC 7816-9": 1
        },
        "PKCS": {
          "PKCS #1": 5,
          "PKCS #15": 9
        },
        "RFC": {
          "RFC 2119": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 3
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "TDES": 3
          },
          "DES": {
            "DES": 2
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03110": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 5,
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Giovanni LICCARDO, Roberta SODANO",
      "/CreationDate": "D:20230308150403+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20230308150403+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "/Subject": "SOMA-c007 Machine Readable Electronic Document",
      "/Title": "SOMA-c007 Machine Readable Electronic Document - Security Target SSCD Application - Recertification",
      "pdf_file_size_bytes": 1875447,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 131
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf",
        "pp_name": "Protection profiles for secure signature creation device \u2014 Part 5: Extension for device with key gene..."
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf",
        "pp_name": "Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version..."
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf",
        "pp_name": "Protection profiles for secure signature creation device \u2014 Part 4: Extension for device with key gene..."
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-20%20INF-4155.pdf",
  "scheme": "ES",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL5+",
      "AVA_VAN.5",
      "ALC_DVS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-20%20ST_LITE.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "617eeee187cc49bea65f9a5582a21efffa8a565ab9df0b4f19db1c2b578e1fac",
      "txt_hash": "f5a2f8def7f954f44d015fd89f63e47a4583bac6b816e554f2656293b484f46b"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "aed2e1af6a96da764f37d5b27ff062038d908d20173774185c3e78613a1468ce",
      "txt_hash": "4a6cd0fe9329511b587762859727efafc2af16e8b1081bdb25cb38c424062f45"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "69bb868cf76d9c30ea01c0b9bf64da1e33c49b8172233d89475b770d1c4042fd",
      "txt_hash": "6abd53678fd8a331266100f69b328c91f35e8c264c1c73c63545373b9fd26a23"
    }
  },
  "status": "active"
}