This page was not yet optimized for use on mobile
devices.
SOMA-c007 Machine Readable Electronic Document SSCD Application version 4
CSV information
| Status | active |
|---|---|
| Valid from | 15.09.2023 |
| Valid until | 15.09.2028 |
| Scheme | 🇪🇸 ES |
| Manufacturer | HID Global |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | EAL5+, ALC_DVS.2, AVA_VAN.5 |
| Protection profiles |
|
Heuristics summary
Certificate ID: 2018-20-INF-4155
Certificate
Extracted keywords
Security level
EAL 2, EAL5Claims
O.ESecurity Assurance Requirements (SAR)
ALC_FLR, ALC_DVS.2, AVA_VAN.5Protection profiles
BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0071-2012Evaluation facilities
Applus LaboratoriesFile metadata
| Creation date | D:20230904142226+02'00' |
|---|---|
| Modification date | D:20230904142226+02'00' |
| Pages | 2 |
| Producer | GPL Ghostscript 9.27 |
Certification report
Extracted keywords
Hash functions
SHA-512Vendor
InfineonSecurity level
EAL5, EAL5+, EAL6, EAL6+, EAL 1, EAL 4, EAL 2, EAL2, EAL6 augmented, ITSEC EvaluationSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_IMP.1, ADV_TDS.4, ADV_ARC, AGD_OPE.1, ALC_DVS.2, ALC_CMC.4, ALC_DEL.1, ALC_LCD.1, ALC_FLR, ATE_COV.2, ATE_FUN.1, AVA_VAN.5, ASE_CCL.1, ASE_INT.1, ASE_REQ.2Protection profiles
BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0071-2012, BSI-CC-PP-0072-2012Certificates
BSI-DSZ-CC-0891-V6-2021, 2018-20-INF-4155- v1Evaluation facilities
Applus LaboratoriesSide-channel analysis
JILStandards
ICAOFile metadata
| Author | 9308 |
|---|---|
| Creation date | D:20230918162101+02'00' |
| Modification date | D:20230918162101+02'00' |
| Pages | 17 |
| Creator | Microsoft® Word LTSC |
| Producer | Microsoft® Word LTSC |
References
Outgoing- BSI-DSZ-CC-0891-V6-2021 - active - Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE) Infineon Security Controller M7892 Design Steps D11 and G12, with the optional libraries RSA2048/4096 v2.03.008 or v2.07.003, EC v2.03.008 or v2.07.003, SHA-2 v1.01, Toolbox v2.03.008 or v2.07.003 and symmetric crypto library v2.02.010, as well as with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE)
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, TDEAAsymmetric Algorithms
ECC, Diffie-HellmanHash functions
SHA-256, SHA-2Schemes
MACProtocols
PACELibraries
Crypto Library v2.02.010Vendor
Infineon, Infineon Technologies AGSecurity level
EAL5+, EAL5, EAL6+, EAL4, EAL6, EAL5 augmented, EAL4 augmented, EAL6 augmentedClaims
A.CGA, A.SCA, OE.HID_VADSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP.4, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_DPT.1, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_CKM.2, FCS_CKM.1.1, FDP_ACC, FDP_ACF, FDP_RIP.1, FDP_SDI, FDP_DAU, FDP_UIT, FDP_ITC.1, FDP_ITC.2, FDP_ACF.1, FDP_ACC.1, FDP_SDI.1, FDP_SDI.2, FDP_DAU.1, FDP_DAU.2, FDP_IFC.1, FDP_UIT.1, FDP_AFC, FIA_API, FIA_UID.1, FIA_UAU.1, FIA_AFL, FIA_API.1, FIA_AFL.1, FIA_UID.1.1, FIA_UAU.1.1, FMT_LIM, FMT_SMR, FMT_SMF.1, FMT_MOF.1, FMT_MSA, FMT_MSA.2, FMT_MSA.3, FMT_MSA.4, FMT_MTD, FMT_LIM.1, FMT_LIM.2, FMT_SMR.1, FMT_MSA.1, FMT_MTD.1, FPT_EMS, FPT_EMS.1, FPT_FLS.1, FPT_PHP.1, FPT_PHP.3, FPT_TST.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_TST, FPT_PHP.3.1, FTP_ITC, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0071-2012, BSI-CC-PP-0072-2012, BSI-CC-PP-0068-V2-2011-MA-01Certificates
BSI-DSZ-CC-0891-V6-2021Side-channel analysis
side channels, SPA, DPA, timing attacks, physical tampering, DFA, fault injectionStandards
FIPS PUB 180-4, FIPS PUB 197, PKCS #15, PKCS #1, RFC 2119, ISO/IEC 7816-4, ISO/IEC 7816-9, ICAO, CCMB-2017-04-004Technical reports
BSI TR-03110File metadata
| Title | SOMA-c007 Machine Readable Electronic Document - Security Target SSCD Application - Recertification |
|---|---|
| Subject | SOMA-c007 Machine Readable Electronic Document |
| Author | Giovanni LICCARDO, Roberta SODANO |
| Creation date | D:20230308150403+01'00' |
| Modification date | D:20230308150403+01'00' |
| Pages | 131 |
| Creator | Microsoft® Word for Microsoft 365 |
| Producer | Microsoft® Word for Microsoft 365 |
References
Outgoing- BSI-DSZ-CC-0891-V6-2021 - active - Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE) Infineon Security Controller M7892 Design Steps D11 and G12, with the optional libraries RSA2048/4096 v2.03.008 or v2.07.003, EC v2.03.008 or v2.07.003, SHA-2 v1.01, Toolbox v2.03.008 or v2.07.003 and symmetric crypto library v2.02.010, as well as with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE)
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
2018-20-INF-4155Extracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Similar certificates
Showing 5 out of 8.
Scheme data
| Product | SOMA-c007 Machine Readable Electronic Document SSCD Application version 4 | |
|---|---|---|
| Product Link | https://oc.ccn.cni.es/en/certified-products/certified-products/991-soma-c007-machine-readable-electronic-document-sscd-application-version-4 | |
| Category | QSCD/SSCD | |
| Manufacturer | Hid Global | |
| Certification Date | 15.09.2023 | |
| Enhanced | ||
| Description | The TOE is a combination of hardware and software configured to securely create, use, and manage Signature Creation Data (SCD). The SSCD protects the SCD during its whole life cycle as to be used in a signature creation process solely by its Signatory. The TOE comprises all IT security functionality necessary to ensure the secrecy of the SCD and the security of the electronic signature. The TOE provides the following functions: to generate Signature Creation Data (SCD) and the corresponding Signature Verification Data (SVD), to export the SVD for certification to the CGA over a trusted channel, to prove the identity as SSCD to external entities, to, optionally, receive and store certificate info, to switch the SSCD from a non-operational state to an operational state, and if in an operational state, to create digital signatures for data with the following steps: select an SCD if multiple are present in the SSCD, authenticate the Signatory and determine its intent to sign, receive data to be signed or a unique representation thereof (DTBS/R) from the SCA over a trusted channel, apply an appropriate cryptographic signature creation function to the DTBS/R using the selected SCD. | |
| Category | QSCD/SSCD | |
| Manufacturer | Hid Global | |
| Type | Product | |
| Evaluation Facility | Applus Laboratories | |
| Status | Certified | |
| Certification Date | 15.09.2023 | |
| Cc Version | Common Criteria 3.1 release 5 | |
| Level | EAL5 + ALC_DVS.2 + AVA_VAN.5 | |
| Target Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1819 | |
| Cert Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1820 | |
| Report Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1821 | |
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-20_Certificado.pdf",
"dgst": "1e59c2d790653fcf",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "2018-20-INF-4155",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL5+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"4"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"d918b28fd7bb5d79",
"d9553e7194783182",
"1f7ea2e05de5b88b"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0891-V6-2021"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0891-V2-2016",
"BSI-DSZ-CC-0891-V3-2018",
"BSI-DSZ-CC-0782-2012",
"BSI-DSZ-CC-0891-V4-2019",
"BSI-DSZ-CC-0891-V6-2021",
"BSI-DSZ-CC-0891-2015"
]
}
},
"scheme_data": {
"category": "QSCD/SSCD",
"certification_date": "2023-09-15",
"enhanced": {
"category": "QSCD/SSCD",
"cc_version": "Common Criteria 3.1 release 5",
"cert_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1820",
"certification_date": "2023-09-15",
"description": "The TOE is a combination of hardware and software configured to securely create, use, and manage Signature Creation Data (SCD). The SSCD protects the SCD during its whole life cycle as to be used in a signature creation process solely by its Signatory. The TOE comprises all IT security functionality necessary to ensure the secrecy of the SCD and the security of the electronic signature. The TOE provides the following functions: to generate Signature Creation Data (SCD) and the corresponding Signature Verification Data (SVD), to export the SVD for certification to the CGA over a trusted channel, to prove the identity as SSCD to external entities, to, optionally, receive and store certificate info, to switch the SSCD from a non-operational state to an operational state, and if in an operational state, to create digital signatures for data with the following steps: select an SCD if multiple are present in the SSCD, authenticate the Signatory and determine its intent to sign, receive data to be signed or a unique representation thereof (DTBS/R) from the SCA over a trusted channel, apply an appropriate cryptographic signature creation function to the DTBS/R using the selected SCD.",
"evaluation_facility": "Applus Laboratories",
"level": "EAL5 + ALC_DVS.2 + AVA_VAN.5",
"manufacturer": "Hid Global",
"report_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1821",
"status": "Certified",
"target_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1819",
"type": "Product"
},
"manufacturer": "Hid Global",
"product": "SOMA-c007 Machine Readable Electronic Document SSCD Application version 4",
"product_link": "https://oc.ccn.cni.es/en/certified-products/certified-products/991-soma-c007-machine-readable-electronic-document-sscd-application-version-4"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0891-V6-2021"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0891-V6-2021"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "HID Global",
"manufacturer_web": "https://www.hidglobal.com/",
"name": "SOMA-c007 Machine Readable Electronic Document SSCD Application version 4",
"not_valid_after": "2028-09-15",
"not_valid_before": "2023-09-15",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "2018-20_Certificado.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.E": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0059-2009-MA-01": 1,
"BSI-CC-PP-0071-2012": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1,
"ALC_FLR": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL5": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Applus": {
"Applus Laboratories": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20230904142226+02\u002700\u0027",
"/ModDate": "D:20230904142226+02\u002700\u0027",
"/Producer": "GPL Ghostscript 9.27",
"pdf_file_size_bytes": 903551,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"report_filename": "2018-20 INF-4155.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0891-V6-2021": 1
},
"ES": {
"2018-20-INF-4155- v1": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0059-2009-MA-01": 3,
"BSI-CC-PP-0071-2012": 3,
"BSI-CC-PP-0072-2012": 3
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_IMP.1": 1,
"ADV_TDS.4": 1
},
"AGD": {
"AGD_OPE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 8,
"ALC_FLR": 3,
"ALC_LCD.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_INT.1": 1,
"ASE_REQ.2": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_FUN.1": 1
},
"AVA": {
"AVA_VAN.5": 9
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 1,
"EAL 4": 2,
"EAL2": 1,
"EAL5": 8,
"EAL5+": 1,
"EAL6": 1,
"EAL6 augmented": 1,
"EAL6+": 1
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Applus": {
"Applus Laboratories": 4
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"other": {
"JIL": 1
}
},
"standard_id": {
"ICAO": {
"ICAO": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 2
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "9308",
"/CreationDate": "D:20230918162101+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word LTSC",
"/ModDate": "D:20230918162101+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word LTSC",
"pdf_file_size_bytes": 509192,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.sogis.eu/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 17
},
"st_filename": "2018-20 ST_LITE.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 7
}
},
"FF": {
"DH": {
"Diffie-Hellman": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0891-V6-2021": 2
}
},
"cc_claims": {
"A": {
"A.CGA": 7,
"A.SCA": 6
},
"OE": {
"OE.HID_VAD": 7
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0059-2009-MA-01": 2,
"BSI-CC-PP-0068-V2-2011-MA-01": 1,
"BSI-CC-PP-0071-2012": 2,
"BSI-CC-PP-0072-2012": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 2,
"ADV_FSP.4": 1,
"ADV_FSP.5": 1,
"ADV_IMP.1": 2,
"ADV_INT.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1
},
"AGD": {
"AGD_OPE.1": 2,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 9,
"ALC_LCD.1": 1,
"ALC_TAT.2": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_DPT.3": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 10
}
},
"cc_security_level": {
"EAL": {
"EAL4": 1,
"EAL4 augmented": 1,
"EAL5": 12,
"EAL5 augmented": 5,
"EAL5+": 1,
"EAL6": 1,
"EAL6 augmented": 1,
"EAL6+": 2
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM.1": 16,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 1,
"FCS_CKM.4": 13,
"FCS_COP.1": 11
},
"FDP": {
"FDP_ACC": 27,
"FDP_ACC.1": 19,
"FDP_ACF": 31,
"FDP_ACF.1": 18,
"FDP_AFC": 1,
"FDP_DAU": 8,
"FDP_DAU.1": 1,
"FDP_DAU.2": 2,
"FDP_IFC.1": 10,
"FDP_ITC.1": 4,
"FDP_ITC.2": 4,
"FDP_RIP.1": 8,
"FDP_SDI": 19,
"FDP_SDI.1": 2,
"FDP_SDI.2": 4,
"FDP_UIT": 7,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_AFL": 40,
"FIA_AFL.1": 12,
"FIA_API": 4,
"FIA_API.1": 13,
"FIA_UAU.1": 28,
"FIA_UAU.1.1": 3,
"FIA_UID.1": 26,
"FIA_UID.1.1": 1
},
"FMT": {
"FMT_LIM": 5,
"FMT_LIM.1": 25,
"FMT_LIM.2": 19,
"FMT_MOF.1": 9,
"FMT_MSA": 23,
"FMT_MSA.1": 5,
"FMT_MSA.2": 10,
"FMT_MSA.3": 18,
"FMT_MSA.4": 10,
"FMT_MTD": 41,
"FMT_MTD.1": 5,
"FMT_SMF.1": 29,
"FMT_SMR": 37,
"FMT_SMR.1": 28
},
"FPT": {
"FPT_EMS": 6,
"FPT_EMS.1": 16,
"FPT_EMS.1.1": 1,
"FPT_EMS.1.2": 1,
"FPT_FLS.1": 9,
"FPT_PHP.1": 10,
"FPT_PHP.3": 9,
"FPT_PHP.3.1": 1,
"FPT_TST": 1,
"FPT_TST.1": 14
},
"FTP": {
"FTP_ITC": 61,
"FTP_ITC.1": 20,
"FTP_TRP.1": 2
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Generic": {
"Crypto Library v2.02.010": 2
}
},
"crypto_protocol": {
"PACE": {
"PACE": 58
}
},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-2": 3,
"SHA-256": 4
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"DFA": 2,
"fault injection": 1,
"physical tampering": 10
},
"SCA": {
"DPA": 2,
"SPA": 3,
"side channels": 1,
"timing attacks": 2
}
},
"standard_id": {
"CC": {
"CCMB-2017-04-004": 1
},
"FIPS": {
"FIPS PUB 180-4": 3,
"FIPS PUB 197": 1
},
"ICAO": {
"ICAO": 18
},
"ISO": {
"ISO/IEC 7816-4": 1,
"ISO/IEC 7816-9": 1
},
"PKCS": {
"PKCS #1": 5,
"PKCS #15": 9
},
"RFC": {
"RFC 2119": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3
}
},
"DES": {
"3DES": {
"TDEA": 1,
"TDES": 3
},
"DES": {
"DES": 2
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-03110": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 5,
"Infineon Technologies AG": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Giovanni LICCARDO, Roberta SODANO",
"/CreationDate": "D:20230308150403+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20230308150403+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"/Subject": "SOMA-c007 Machine Readable Electronic Document",
"/Title": "SOMA-c007 Machine Readable Electronic Document - Security Target SSCD Application - Recertification",
"pdf_file_size_bytes": 1875447,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 131
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-20%20INF-4155.pdf",
"scheme": "ES",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"AVA_VAN.5",
"EAL5+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-20%20ST_LITE.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "617eeee187cc49bea65f9a5582a21efffa8a565ab9df0b4f19db1c2b578e1fac",
"txt_hash": "f5a2f8def7f954f44d015fd89f63e47a4583bac6b816e554f2656293b484f46b"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "aed2e1af6a96da764f37d5b27ff062038d908d20173774185c3e78613a1468ce",
"txt_hash": "4a6cd0fe9329511b587762859727efafc2af16e8b1081bdb25cb38c424062f45"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "69bb868cf76d9c30ea01c0b9bf64da1e33c49b8172233d89475b770d1c4042fd",
"txt_hash": "6abd53678fd8a331266100f69b328c91f35e8c264c1c73c63545373b9fd26a23"
}
},
"status": "active"
}