This page was not yet optimized for use on mobile
devices.
JCLX80jTOP20ID : Java Trusted Open Platform IFX#v42, with patch version 2.0, emedded on SLE66CLX800PE or SLE66CLX360PE
CSV information
| Status | archived |
|---|---|
| Valid from | 27.10.2009 |
| Valid until | 01.09.2019 |
| Scheme | 🇫🇷 FR |
| Manufacturer | Trusted Logic / Infineon |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | EAL5+ |
Heuristics summary
Certificate ID: ANSSI-CC-2009/34
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Symmetric Algorithms
AES, DESAsymmetric Algorithms
RSA2048, ECCSchemes
Key AgreementRandomness
TRNGJavaCard versions
Java Card 2.2.1, GlobalPlatform 2.1.1Vendor
Infineon Technologies AG, Infineon Technologies, InfineonSecurity level
EAL 5, EAL4, EAL5, EAL7, EAL 1, EAL 3, EAL 7, EAL5+, ITSEC E6 etSecurity Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL, ADO_IGS, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_FLR, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VLA.4, AVA_MSU.3, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLAProtection profiles
BSI-PP-0002-2001Certificates
BSI-DSZ-CC-0482, BSI-DSZ-CC-0482-2008-MA-05, ANSSI-CC-2009/34Evaluation facilities
Serma TechnologiesStandards
AIS 34, AIS 31, AIS34, AIS31, ISO/IEC 15408:2005, ISO/IEC 18045:2005, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004File metadata
| Creation date | D:20091125155640+01'00' |
|---|---|
| Modification date | D:20091125155640+01'00' |
| Pages | 22 |
| Producer | Acrobat Distiller 8.0.0 (Windows) |
Frontpage
| Certificate ID | ANSSI-CC-2009/34 |
|---|---|
| Certified item | Carte à puce JCLX80jTOP20ID : Java Trusted Open Platform IFX#v42, avec patch en version 2.0, masquée sur composants SLE66CLX800PE et SLE66CLX360PE |
| Certification lab | Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Tél : +33 (0)5 57 26 08 75, mél : [email protected] |
| Developer | Trusted Logic 5 rue du Bailliage, 78000 VERSAILLES, FRANCE Infineon Technologies AG AIM CC SM PS - Am Campeon 1-12 - 85579 Neubiberg, GERMANY Commanditaire Trusted Logic 5 rue du Bailliage, 78000 VERSAILLES, FRANCE |
References
Incoming- ANSSI-CC-2009/35 - archived - Trusted Logic. Carte à puce JCLXxxjTOPyyIDv2 : applet de passeport électronique chargée sur la plate-forme JCLX80jTOP20IDv2 masquée sur le composant SLE66CLX800PE
Security target
Extracted keywords
Symmetric Algorithms
DESAsymmetric Algorithms
RSA2048, RSA-CRT, ECC, Diffie-HellmanSchemes
MACRandomness
RND, RNGBlock cipher modes
ECB, CBC, CCMJavaCard versions
Java Card 2.2.1, Java Card 2.2.2, GlobalPlatform 2.1.1Security level
EAL5, EAL5+, EAL5 augmentedClaims
D.APP-CODE, D.APP-INST, D.COMMAND, D.ISD-SESSION-KEYS, D.JCS_KEYS, D.ISD-, D.ISD-PERSO, D.GP-REGISTRY, D.CVM, O.REQUEST, O.INFO-ORIGIN, O.LOAD, O.INSTALL, O.INFO-INTEGRITY, O.INFO-CONFIDENTIALITY, O.NO-KEY-REUSE, O.DELETION, O.LIFE-CYCLE, O.IDENTIFICATION, O.GLOBAL-CVM, O.CVM-BLOCK, O.ERROR-COUNTERS, O.RECOVERY, O.LOCK, O.VERIFICATION, O.PROT-INF-LEAK, O.PROT-PHYS-TAMPER, O.ABUSE-FUNC, O.PROT-MALFUNCTION, O.PROT-, O.RND, O.OS-SUPPORT, O.IC-SUPPORT, O.KEY-MNGT, T.INSTALL, T.CRYPTO, T.CONFID-APPLI-DATA, T.CONFID-JCS-DATA, T.INTEG-, T.INTEG-JCS-DATA, T.DELETION, T.IMPERSONATE, T.INVALID-INPUT, T.INVALID-ORDER, T.FORCED-RESET, T.REPLAY, T.BRUTE-FORCE, T.LIFE-CYCLE, T.ABUSE-FUNC, T.PHYS-TAMPER, T.MALFUNCTION, T.INF-LEAK, T.RND, A.CARD-MANAGEMENT, A.NATIVE, OE.IC, OE.SCP, OE.RECOVERY, OE.SUPPORT, OE.CARD-MANAGEMENT, OE.SECRETS, OE.KEY-LENGTH, OSP, OSP.FILE-ORIGIN, OSP.SECRETS, OSP.KEY-LENGTH, OSP.NO-RMI-APPLETS, OSP.PERSONALIZATION, OSP.PROCESS-TOESecurity Assurance Requirements (SAR)
ADV_HLD, ALC_DVS.2, AVA_VLA.4Security Functional Requirements (SFR)
FCS_RND, FCS_RND.1, FCS_COP, FCS_COP.1, FCS_CKM, FCS_CKM.3, FCS_CKM.1, FCS_RND.1.1, FDP_ACC, FDP_IFF, FDP_IFF.1, FDP_IFF.1.5, FDP_IFF.1.2, FDP_ITC, FDP_ITC.1, FDP_ROL, FDP_ROL.1, FDP_ACC.1, FDP_ACF, FDP_ACF.1, FDP_ACF.1.1, FDP_ITT, FDP_ITT.1, FDP_IFC, FDP_IFC.1, FDP_IFC.2, FDP_IFF.2, FIA_UAU, FIA_UAU.4, FIA_AFL, FIA_AFL.1, FMT_MSA, FMT_MSA.1, FMT_MSA.3, FMT_SMF, FMT_SMF.1, FMT_SMR, FMT_SMR.1, FMT_MSA.2, FPT_TST.2, FPT_TDC, FPT_TDC.1, FPT_RCV, FPT_RCV.3, FPT_FLS, FPT_FLS.1, FPT_TST, FPT_SEP, FPT_SEP.1, FPT_PHP, FPT_PHP.3, FPT_ITT, FPT_ITT.1, FPT_TST.2.1, FPT_AMT.1, FPT_TST.1, FRU_FLT, FRU_FLT.2, FRU_RSA, FRU_RSA.1Protection profiles
BSI-PP-0002Side-channel analysis
Leak-Inherent, physical probing, DPA, SPA, physical tampering, Physical tampering, malfunction, DFA, reverse engineeringStandards
FIPS PUB 46-3, FIPS 46-2, PKCS#1, PKCS#3, AIS34, ISO/IEC 15946-1, ISO/IEC 15946-3, ISO/IEC 15408:2005, SCP01, SCP02, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004File metadata
| Creation date | D:20091125155704+01'00' |
|---|---|
| Modification date | D:20091125155704+01'00' |
| Pages | 86 |
| Producer | GPL Ghostscript 8.54 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
ANSSI-CC-2009/34Extracted SARs
ALC_DVS.2, AVA_MSU.3, AVA_VLA.4References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "e35cd307ad95ed6d",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2009/34",
"cert_lab": [
"SERMA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL5+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2009/35"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2009/35"
]
},
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Trusted Logic / Infineon",
"manufacturer_web": "https://www.trusted-logic.com/",
"name": "JCLX80jTOP20ID : Java Trusted Open Platform IFX#v42, with patch version 2.0, emedded on SLE66CLX800PE or SLE66CLX360PE",
"not_valid_after": "2019-09-01",
"not_valid_before": "2009-10-27",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "anssi-cc_2009-34fr.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 5 augment\u00e9 ALC_DVS.2, AVA_VLA.4",
"cc_version": "Crit\u00e8res Communs version 2.3 conforme \u00e0 la norme ISO 15408:2005",
"cert_id": "ANSSI-CC-2009/34",
"cert_item": "Carte \u00e0 puce JCLX80jTOP20ID : Java Trusted Open Platform IFX#v42, avec patch en version 2.0, masqu\u00e9e sur composants SLE66CLX800PE et SLE66CLX360PE",
"cert_item_version": "Version plate-forme : IFX#v42 Version patch : 2.0",
"cert_lab": "Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France T\u00e9l : +33 (0)5 57 26 08 75, m\u00e9l : [email protected]",
"developer": "Trusted Logic 5 rue du Bailliage, 78000 VERSAILLES, FRANCE Infineon Technologies AG AIM CC SM PS - Am Campeon 1-12 - 85579 Neubiberg, GERMANY Commanditaire Trusted Logic 5 rue du Bailliage, 78000 VERSAILLES, FRANCE",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.+)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeur\\(s\\)(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "N\u00e9ant"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
},
"RSA": {
"RSA2048": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0482": 1,
"BSI-DSZ-CC-0482-2008-MA-05": 1
},
"FR": {
"ANSSI-CC-2009/34": 23
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002-2001": 1
}
},
"cc_sar": {
"ACM": {
"ACM_AUT": 1,
"ACM_CAP": 1,
"ACM_SCP": 1
},
"ADO": {
"ADO_DEL": 1,
"ADO_IGS": 1
},
"ADV": {
"ADV_FSP": 1,
"ADV_HLD": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_LLD": 1,
"ADV_RCR": 1,
"ADV_SPM": 1
},
"AGD": {
"AGD_ADM": 1,
"AGD_USR": 1
},
"ALC": {
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_CCA": 1,
"AVA_MSU": 1,
"AVA_MSU.3": 1,
"AVA_SOF": 1,
"AVA_VLA": 1,
"AVA_VLA.4": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 5": 3,
"EAL 7": 1,
"EAL4": 3,
"EAL5": 1,
"EAL5+": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 et": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"Serma Technologies": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {
"GlobalPlatform": {
"GlobalPlatform 2.1.1": 4
},
"JavaCard": {
"Java Card 2.2.1": 3
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"TRNG": {
"TRNG": 3
}
},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 31": 2,
"AIS 34": 2,
"AIS31": 1,
"AIS34": 1
},
"CC": {
"CCMB-2005-08-001": 1,
"CCMB-2005-08-002": 1,
"CCMB-2005-08-003": 1,
"CCMB-2005-08-004": 1
},
"ISO": {
"ISO/IEC 15408:2005": 1,
"ISO/IEC 18045:2005": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
},
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 3,
"Infineon Technologies": 2,
"Infineon Technologies AG": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20091125155640+01\u002700\u0027",
"/Keywords": "",
"/ModDate": "D:20091125155640+01\u002700\u0027",
"/Producer": "Acrobat Distiller 8.0.0 (Windows)",
"pdf_file_size_bytes": 202613,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 22
},
"st_filename": "anssi-cible_2009-34en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
},
"FF": {
"DH": {
"Diffie-Hellman": 1
}
},
"RSA": {
"RSA-CRT": 1,
"RSA2048": 1
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CARD-MANAGEMENT": 1,
"A.NATIVE": 1
},
"D": {
"D.APP-CODE": 2,
"D.APP-INST": 2,
"D.COMMAND": 2,
"D.CVM": 2,
"D.GP-REGISTRY": 2,
"D.ISD-": 1,
"D.ISD-PERSO": 2,
"D.ISD-SESSION-KEYS": 2,
"D.JCS_KEYS": 1
},
"O": {
"O.ABUSE-FUNC": 2,
"O.CVM-BLOCK": 2,
"O.DELETION": 2,
"O.ERROR-COUNTERS": 2,
"O.GLOBAL-CVM": 2,
"O.IC-SUPPORT": 1,
"O.IDENTIFICATION": 3,
"O.INFO-CONFIDENTIALITY": 3,
"O.INFO-INTEGRITY": 4,
"O.INFO-ORIGIN": 3,
"O.INSTALL": 4,
"O.KEY-MNGT": 1,
"O.LIFE-CYCLE": 3,
"O.LOAD": 4,
"O.LOCK": 2,
"O.NO-KEY-REUSE": 2,
"O.OS-SUPPORT": 1,
"O.PROT-": 1,
"O.PROT-INF-LEAK": 4,
"O.PROT-MALFUNCTION": 3,
"O.PROT-PHYS-TAMPER": 4,
"O.RECOVERY": 3,
"O.REQUEST": 2,
"O.RND": 3,
"O.VERIFICATION": 3
},
"OE": {
"OE.CARD-MANAGEMENT": 1,
"OE.IC": 1,
"OE.KEY-LENGTH": 2,
"OE.RECOVERY": 1,
"OE.SCP": 2,
"OE.SECRETS": 2,
"OE.SUPPORT": 1
},
"OSP": {
"OSP": 2,
"OSP.FILE-ORIGIN": 2,
"OSP.KEY-LENGTH": 2,
"OSP.NO-RMI-APPLETS": 2,
"OSP.PERSONALIZATION": 2,
"OSP.PROCESS-TOE": 3,
"OSP.SECRETS": 2
},
"T": {
"T.ABUSE-FUNC": 1,
"T.BRUTE-FORCE": 2,
"T.CONFID-APPLI-DATA": 1,
"T.CONFID-JCS-DATA": 1,
"T.CRYPTO": 4,
"T.DELETION": 3,
"T.FORCED-RESET": 2,
"T.IMPERSONATE": 2,
"T.INF-LEAK": 2,
"T.INSTALL": 4,
"T.INTEG-": 1,
"T.INTEG-JCS-DATA": 1,
"T.INVALID-INPUT": 2,
"T.INVALID-ORDER": 2,
"T.LIFE-CYCLE": 3,
"T.MALFUNCTION": 2,
"T.PHYS-TAMPER": 2,
"T.REPLAY": 2,
"T.RND": 2
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002": 1
}
},
"cc_sar": {
"ADV": {
"ADV_HLD": 1
},
"ALC": {
"ALC_DVS.2": 2
},
"AVA": {
"AVA_VLA.4": 2
}
},
"cc_security_level": {
"EAL": {
"EAL5": 2,
"EAL5 augmented": 1,
"EAL5+": 1
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM": 8,
"FCS_CKM.1": 3,
"FCS_CKM.3": 1,
"FCS_COP": 22,
"FCS_COP.1": 11,
"FCS_RND": 6,
"FCS_RND.1": 6,
"FCS_RND.1.1": 1
},
"FDP": {
"FDP_ACC": 5,
"FDP_ACC.1": 2,
"FDP_ACF": 4,
"FDP_ACF.1": 8,
"FDP_ACF.1.1": 1,
"FDP_IFC": 6,
"FDP_IFC.1": 1,
"FDP_IFC.2": 2,
"FDP_IFF": 4,
"FDP_IFF.1": 6,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.5": 1,
"FDP_IFF.2": 7,
"FDP_ITC": 4,
"FDP_ITC.1": 3,
"FDP_ITT": 3,
"FDP_ITT.1": 1,
"FDP_ROL": 2,
"FDP_ROL.1": 2
},
"FIA": {
"FIA_AFL": 6,
"FIA_AFL.1": 6,
"FIA_UAU": 2,
"FIA_UAU.4": 1
},
"FMT": {
"FMT_MSA": 26,
"FMT_MSA.1": 6,
"FMT_MSA.2": 2,
"FMT_MSA.3": 10,
"FMT_SMF": 10,
"FMT_SMF.1": 5,
"FMT_SMR": 8,
"FMT_SMR.1": 8
},
"FPT": {
"FPT_AMT.1": 1,
"FPT_FLS": 4,
"FPT_FLS.1": 1,
"FPT_ITT": 2,
"FPT_ITT.1": 1,
"FPT_PHP": 2,
"FPT_PHP.3": 1,
"FPT_RCV": 2,
"FPT_RCV.3": 4,
"FPT_SEP": 2,
"FPT_SEP.1": 2,
"FPT_TDC": 2,
"FPT_TDC.1": 2,
"FPT_TST": 4,
"FPT_TST.1": 4,
"FPT_TST.2": 6,
"FPT_TST.2.1": 1
},
"FRU": {
"FRU_FLT": 2,
"FRU_FLT.2": 1,
"FRU_RSA": 2,
"FRU_RSA.1": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"CCM": {
"CCM": 1
},
"ECB": {
"ECB": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 12
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {
"GlobalPlatform": {
"GlobalPlatform 2.1.1": 10
},
"JavaCard": {
"Java Card 2.2.1": 4,
"Java Card 2.2.2": 1
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 5,
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"DFA": 2,
"Physical tampering": 1,
"malfunction": 7,
"physical tampering": 3
},
"SCA": {
"DPA": 3,
"Leak-Inherent": 1,
"SPA": 2,
"physical probing": 4
},
"other": {
"reverse engineering": 2
}
},
"standard_id": {
"BSI": {
"AIS34": 2
},
"CC": {
"CCMB-2005-08-001": 1,
"CCMB-2005-08-002": 1,
"CCMB-2005-08-003": 1,
"CCMB-2005-08-004": 1
},
"FIPS": {
"FIPS 46-2": 1,
"FIPS PUB 46-3": 6
},
"ISO": {
"ISO/IEC 15408:2005": 3,
"ISO/IEC 15946-1": 1,
"ISO/IEC 15946-3": 1
},
"PKCS": {
"PKCS#1": 2,
"PKCS#3": 1
},
"SCP": {
"SCP01": 3,
"SCP02": 6
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 29
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20091125155704+01\u002700\u0027",
"/Keywords": "",
"/ModDate": "D:20091125155704+01\u002700\u0027",
"/Producer": "GPL Ghostscript 8.54",
"pdf_file_size_bytes": 1470192,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 86
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc_2009-34fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"EAL5+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible_2009-34en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "99b2153ba59afc595d117eb9d9005a7451ab63793c82ea864d5096c05115ab66",
"txt_hash": "44a47fe677cf7d899763f8704a682338ba8d789cd701b4b5110db70835d556e5"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "19dbf74c170dfee557c7a3eeb619fb9fd7261eaa0ca319706e7a3498c58732a3",
"txt_hash": "b723e657bfd60695e1a168dcdbe52dcb394538d13b2c801754979dd27b9d4957"
}
},
"status": "archived"
}