NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.0.0)
CSV information ?
Status | active |
---|---|
Valid from | 22.10.2021 |
Valid until | 22.10.2026 |
Scheme | 🇫🇷 FR |
Manufacturer | Nuvoton Technology |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | ALC_DVS.2, EAL4+, AVA_VAN.4, ALC_FLR.1 |
Heuristics summary ?
Certificate ?
Extracted keywords
Security level
EAL4, EAL2Security Assurance Requirements (SAR)
ALC_FLR.1, ALC_DVS.2, AVA_VAN.4Certificates
ANSSI-CC-2021/51Evaluation facilities
SERMA, Serma Safety & SecurityFile metadata
Creation date | D:20211029114602+02'00' |
---|---|
Modification date | D:20211029114602+02'00' |
Pages | 2 |
Creator | PScript5.dll Version 5.2.2 |
Producer | Acrobat Distiller 11.0 (Windows) |
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, DES, HMACAsymmetric Algorithms
ECCHash functions
SHA-256, SHA-384Security level
EAL 4, EAL2, EAL7, ITSEC E6 ElevéClaims
O.C, R.OSecurity Assurance Requirements (SAR)
ALC_FLR.1, ALC_DVS.2, ALC_FLR, AVA_VAN.4, AVA_VANCertificates
ANSSI-CC-2021/51, ANSSI-CC-2020/21Evaluation facilities
SERMAStandards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
Creation date | D:20211029114119+02'00' |
---|---|
Modification date | D:20211029114119+02'00' |
Pages | 12 |
Creator | PScript5.dll Version 5.2.2 |
Producer | Acrobat Distiller 11.0 (Windows) |
References
Outgoing- ANSSI-CC-2020/21 - active - NPCT7xx TPM2.0 rev 1.38 (Hardware LAG019, Firmware 7.2.2.0)
- ANSSI-CC-2022/26 - active - NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.0.1)
- ANSSI-CC-2022/30 - active - NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.1.1)
Security target ?
Extracted keywords
Symmetric Algorithms
AES, AES-, AES-256, HMACAsymmetric Algorithms
RSA-3072, RSA 2048, ECDH, ECDSA, ECCHash functions
SHA-1, SHA-256, SHA-384Randomness
DRBG, RNG, RBGElliptic Curves
P-256, P-384, NIST P-384Block cipher modes
ECB, CTR, CFB, OFBVendor
MicrosoftSecurity level
EAL 4, EAL4, EAL 4 augmented, EAL4 augmentedClaims
O.C, O.DAC, R.OSecurity Assurance Requirements (SAR)
ALC_FLR.1, ALC_DVS.2, ALC_DVS.1, AVA_VAN.4Security Functional Requirements (SFR)
FCO_NRO, FCO_NRO.1, FCS_CKM, FCS_COP, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1, FCS_CKM.4.1, FDP_ACF.1, FDP_ACC.1, FDP_IFC.1, FDP_RIP.1, FDP_RIP.1.1, FDP_ITC.1, FDP_ITC.2, FDP_ITT.1, FDP_ITT.1.1, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_UIT, FDP_UIT.1, FDP_SDI.1, FDP_SDI.1.1, FDP_ETC, FDP_ETC.2, FDP_ITC, FDP_UCT, FDP_UCT.1, FDP_ETC.1, FIA_UID.1, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_AFL, FIA_UAU.1, FIA_AFL.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_UAU.6.1, FIA_USB.1, FIA_ATD.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_SOS.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA.2, FMT_MSA.1, FMT_MSA.2.1, FMT_MSA, FMT_MSA.4, FMT_MTD, FMT_MTD.1, FMT_MSA.3, FMT_MOF, FMT_MOF.1, FPT_STM.1, FPT_STM.1.1, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS, FPT_FLS.1, FPT_PHP.3, FPT_PHP.3.1, FPT_ITT.1, FPT_ITT.1.1, FPT_TDC.1, FTP_ITC.1, FTP_TRP.1, FTP_ITC, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3Protection profiles
ANSSI-CC-PP-2020/01Certificates
ANSSI-CC-PP-2020/01Side-channel analysis
physical probing, Physical Tampering, physical tampering, malfunction, MalfunctionStandards
FIPS140-2, FIPS 186-3, FIPS 140-2, FIPS 180-4, FIPS 198-1, FIPS186-4, FIPS180-4, FIPS PUB 186-4, FIPS198-1, FIPS 197, FIPS 180-1, PKCS#1, PKCS #1, AIS31, RFC 3447, ISO/IEC 15408, ISO/IEC 14888-3, ISO/IEC 9797-2, ISO/IEC 18033-3, ISO/IEC 15946-1, ISO/IEC 10116:2006, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
Title | Developer Document |
---|---|
Subject | Security Target |
Author | Karsten Grans |
Creation date | D:20210715184410+03'00' |
Modification date | D:20210715184410+03'00' |
Pages | 93 |
Creator | Microsoft® Word 2016 |
Producer | Microsoft® Word 2016 |
References
Incoming- ANSSI-CC-2022/30 - active - NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.1.1)
Heuristics ?
Extracted SARs
ALC_DVS.2, ALC_FLR.1, AVA_VAN.4Similar certificates
Scheme data ?
Product | NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.0.0) | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/npct7xx-tpm20-rev-159-configuration-version-1300 | |
Description | Le produit évalué est « NPCT7xx TPM2.0 rev 1.59, configuration version 1.3.0.0 » développé par NUVOTON TECHNOLOGY CORPORATION. Ce produit est destiné à garantir l’intégrité matérielle et logicielle des plateformes de confiance (serveurs, ordinateurs, etc.) conformément aux spécifications fonctionnelles TPM2.0. | |
Sponsor | NUVOTON TECHNOLOGY CORPORATION | |
Developer | NUVOTON TECHNOLOGY CORPORATION | |
Cert Id | ANSSI-CC-2021/51 | |
Level | EAL4+ | |
Expiration Date | 22.10.2026 | |
Enhanced | ||
Cert Id | ANSSI-CC-2021/51 | |
Certification Date | 22.10.2021 | |
Expiration Date | 22.10.2026 | |
Category | Micro-circuits | |
Cc Version | Critères Communs version 3.1r5 | |
Developer | NUVOTON TECHNOLOGY CORPORATION | |
Sponsor | NUVOTON TECHNOLOGY CORPORATION | |
Evaluation Facility | SERMA SAFETY & SECURITY | |
Level | EAL4+ | |
Protection Profile | NA | |
Mutual Recognition | SOG-IS CCRA | |
Augmented | ALC_FLR.1, ALC_DVS.2, AVA_VAN.4 | |
Target Link | https://cyber.gouv.fr/sites/default/files/2021/11/anssi-cible-cc-2021_51en.pdf | |
Report Link | https://cyber.gouv.fr/sites/default/files/2021/11/anssi-cc-2021_51fr.pdf | |
Cert Link | https://cyber.gouv.fr/sites/default/files/2021/11/certificat-2021_51.pdf |
References ?
Updates ?
-
16.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.0.0)', 'url': 'https://cyber.gouv.fr/produits-certifies/npct7xx-tpm20-rev-159-configuration-version-1300', 'description': 'Le produit évalué est « NPCT7xx TPM2.0 rev 1.59, configuration version 1.3.0.0 » développé par NUVOTON TECHNOLOGY CORPORATION. Ce produit est destiné à garantir l’intégrité matérielle et logicielle des plateformes de confiance (serveurs, ordinateurs, etc.) conformément aux spécifications fonctionnelles TPM2.0.', 'sponsor': 'NUVOTON TECHNOLOGY CORPORATION', 'developer': 'NUVOTON TECHNOLOGY CORPORATION', 'cert_id': 'ANSSI-CC-2021/51', 'level': 'EAL4+', 'expiration_date': '2026-10-22', 'enhanced': {'cert_id': 'ANSSI-CC-2021/51', 'certification_date': '2021-10-22', 'expiration_date': '2026-10-22', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'NUVOTON TECHNOLOGY CORPORATION', 'sponsor': 'NUVOTON TECHNOLOGY CORPORATION', 'evaluation_facility': 'SERMA SAFETY & SECURITY', 'level': 'EAL4+', 'protection_profile': 'NA', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ALC_FLR.1, ALC_DVS.2, AVA_VAN.4', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2021/11/anssi-cible-cc-2021_51en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2021/11/anssi-cc-2021_51fr.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2021/11/certificat-2021_51.pdf'}}
.
- The scheme_data property was set to
-
09.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The st_keywords property was updated, with the
{'cc_cert_id': {'FR': {'ANSSI-CC-PP-2020/01': 2}}}
data.
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-PP-2018/03']}}}
data. - The scheme_data property was updated, with the
{'product': 'NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.0.0)', 'url': 'https://cyber.gouv.fr/produits-certifies/npct7xx-tpm20-rev-159-configuration-version-1300', 'description': 'Le produit évalué est « NPCT7xx TPM2.0 rev 1.59, configuration version 1.3.0.0 » développé par NUVOTON TECHNOLOGY CORPORATION. Ce produit est destiné à garantir l’intégrité matérielle et logicielle des plateformes de confiance (serveurs, ordinateurs, etc.) conformément aux spécifications fonctionnelles TPM2.0.', 'cert_id': 'ANSSI-CC-2021/51', 'expiration_date': '2026-10-22', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2021/51', 'certification_date': '2021-10-22', 'expiration_date': '2026-10-22', 'mutual_recognition': 'SOG-IS CCRA', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2021/11/certificat-2021_51.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2021/11/anssi-cible-cc-2021_51en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2021/11/anssi-cc-2021_51fr.pdf'}}}
data.
- The st_keywords property was updated, with the
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'NPCT7xx TPM2.0 rev 1.59 (configuration version 1.0.0.0)', 'url': 'https://cyber.gouv.fr/produits-certifies/npct7xx-tpm20-rev-159-configuration-version-1000', 'description': 'Le produit évalué est « NPCT7xx TPM2.0 rev 1.59, configuration version 1.0.0.0 » développé par\nNUVOTON TECHNOLOGY CORPORATION.\nCe produit est destiné à garantir l’intégrité matérielle et logicielle des plateformes de confiance\n(serveurs, ordinateurs, etc.) conformément aux spécifications fonctionnelles TPM2.0.', 'sponsor': 'NUVOTON TECHNOLOGY CORPORATION', 'developer': 'NUVOTON TECHNOLOGY CORPORATION', 'cert_id': '2021/49', 'level': 'EAL4+', 'expiration_date': '22 Octobre 2026', 'enhanced': {'cert_id': '2021/49', 'certification_date': '22/10/2021', 'expiration_date': '22/10/2026', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'NUVOTON TECHNOLOGY CORPORATION', 'sponsor': 'NUVOTON TECHNOLOGY CORPORATION', 'evaluation_facility': 'SERMA SAFETY & SECURITY', 'level': 'EAL4+', 'protection_profile': 'NA', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_FLR.1, ALC_DVS.2, AVA_VAN.4', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2021/11/certificat-2021_49.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2021/11/anssi-cible-cc-2021_49en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2021/11/anssi-cc-2021_49fr.pdf'}}
.
- The scheme_data property was set to
-
02.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '85e732d37c4de0f3755664b07168af84ad30349ef8c2784d978970078012d78b', 'txt_hash': 'cf344b9b5da4ece4dd2f5b31af0394d2e7522b780a6e26f813079dc70b033187'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'd928f1f4f1b318377271be5ad0b1e8a4dc11436812cc7aa3fa2f31c5afc837d7', 'txt_hash': 'a8ccb614a15789b9c41759ae82a934e955064561bac2554a93107f72f6e81221'}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 1717738, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 93, '/Title': 'Developer Document', '/Author': 'Karsten Grans', '/Subject': 'Security Target', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20210715184410+03'00'", '/ModDate': "D:20210715184410+03'00'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.nuvoton.com.tw/', 'file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FDP_ACF_1_States', 'file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FMT_MSA_2_States', 'file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23FDP_UCT_1_FW', 'http://www.rsa.com/', 'mailto:[email protected]', 'file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FPT_FLS_1_States', 'http://www.nuvoton.com/', 'https://www.trustedcomputinggroup.org/home']}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 279746, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Author': '', '/CreationDate': "D:20211029114602+02'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20211029114602+02'00'", '/Producer': 'Acrobat Distiller 11.0 (Windows)', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2020/01': 2}}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL4': 2, 'EAL 4 augmented': 1, 'EAL4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 3, 'ALC_DVS.2': 4, 'ALC_DVS.1': 1}, 'AVA': {'AVA_VAN.4': 3}}, 'cc_sfr': {'FCO': {'FCO_NRO': 6, 'FCO_NRO.1': 6}, 'FCS': {'FCS_CKM': 18, 'FCS_COP': 32, 'FCS_RNG.1': 4, 'FCS_RNG.1.1': 1, 'FCS_RNG.1.2': 1, 'FCS_CKM.2': 5, 'FCS_COP.1': 12, 'FCS_CKM.4': 18, 'FCS_CKM.1': 13, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ACF.1': 36, 'FDP_ACC.1': 35, 'FDP_IFC.1': 20, 'FDP_RIP.1': 3, 'FDP_RIP.1.1': 1, 'FDP_ITC.1': 12, 'FDP_ITC.2': 14, 'FDP_ITT.1': 3, 'FDP_ITT.1.1': 1, 'FDP_ACC': 21, 'FDP_ACC.2': 2, 'FDP_ACF': 23, 'FDP_UIT': 9, 'FDP_UIT.1': 4, 'FDP_SDI.1': 3, 'FDP_SDI.1.1': 1, 'FDP_ETC': 6, 'FDP_ETC.2': 4, 'FDP_ITC': 6, 'FDP_UCT': 7, 'FDP_UCT.1': 2, 'FDP_ETC.1': 2}, 'FIA': {'FIA_UID.1': 7, 'FIA_SOS.2': 3, 'FIA_SOS.2.1': 1, 'FIA_SOS.2.2': 1, 'FIA_AFL': 12, 'FIA_UAU.1': 7, 'FIA_AFL.1': 8, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.5': 3, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6': 3, 'FIA_UAU.6.1': 1, 'FIA_USB.1': 3, 'FIA_ATD.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_SOS.1': 1}, 'FMT': {'FMT_SMR.1': 21, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1': 13, 'FMT_SMF.1.1': 1, 'FMT_MSA.2': 4, 'FMT_MSA.1': 15, 'FMT_MSA.2.1': 1, 'FMT_MSA': 51, 'FMT_MSA.4': 3, 'FMT_MTD': 6, 'FMT_MTD.1': 2, 'FMT_MSA.3': 22, 'FMT_MOF': 3, 'FMT_MOF.1': 1}, 'FPT': {'FPT_STM.1': 2, 'FPT_STM.1.1': 1, 'FPT_TST.1': 5, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_FLS': 7, 'FPT_FLS.1': 2, 'FPT_PHP.3': 3, 'FPT_PHP.3.1': 1, 'FPT_ITT.1': 3, 'FPT_ITT.1.1': 1, 'FPT_TDC.1': 1}, 'FTP': {'FTP_ITC.1': 5, 'FTP_TRP.1': 5, 'FTP_ITC': 3, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.C': 11, 'O.DAC': 5}, 'R': {'R.O': 11}}, 'vendor': {'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 11, 'AES-': 1, 'AES-256': 2}}, 'constructions': {'MAC': {'HMAC': 31}}}, 'asymmetric_crypto': {'RSA': {'RSA-3072': 1, 'RSA 2048': 2}, 'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 2}, 'ECC': {'ECC': 25}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 8}, 'SHA2': {'SHA-256': 7, 'SHA-384': 9}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'PRNG': {'DRBG': 5}, 'RNG': {'RNG': 18, 'RBG': 1}}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CTR': {'CTR': 2}, 'CFB': {'CFB': 2}, 'OFB': {'OFB': 2}}, 'ecc_curve': {'NIST': {'P-256': 2, 'P-384': 3, 'NIST P-384': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1}, 'FI': {'Physical Tampering': 2, 'physical tampering': 2, 'malfunction': 2, 'Malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS140-2': 2, 'FIPS 186-3': 5, 'FIPS 140-2': 3, 'FIPS 180-4': 1, 'FIPS 198-1': 2, 'FIPS186-4': 2, 'FIPS180-4': 1, 'FIPS PUB 186-4': 1, 'FIPS198-1': 1, 'FIPS 197': 2, 'FIPS 180-1': 1}, 'PKCS': {'PKCS#1': 1, 'PKCS #1': 1}, 'BSI': {'AIS31': 1}, 'RFC': {'RFC 3447': 1}, 'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 14888-3': 1, 'ISO/IEC 9797-2': 1, 'ISO/IEC 18033-3': 1, 'ISO/IEC 15946-1': 1, 'ISO/IEC 10116:2006': 1}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {'com': {'com.tw': 1}}, 'certification_process': {}}
. - The cert_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2021/51': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 1, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 1, 'ALC_DVS.2': 1}, 'AVA': {'AVA_VAN.4': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Serma': {'SERMA': 1, 'Serma Safety & Security': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
anssi-cible-cc-2021_51en.pdf
. - The cert_filename property was set to
certificat-2021_51.pdf
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2022/30']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2022/30']}}
data. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2022/30', 'ANSSI-CC-2022/26']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2022/30', 'ANSSI-CC-2022/26']}, 'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/21']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/61', 'ANSSI-CC-2020/21']}}
data. - The scheme_data property was updated, with the
{'product': 'NPCT7xx TPM2.0 rev 1.59 (configuration version 1.0.0.0)', 'url': 'https://cyber.gouv.fr/produits-certifies/npct7xx-tpm20-rev-159-configuration-version-1000', 'description': 'Le produit évalué est « NPCT7xx TPM2.0 rev 1.59, configuration version 1.0.0.0 » développé par\nNUVOTON TECHNOLOGY CORPORATION.\nCe produit est destiné à garantir l’intégrité matérielle et logicielle des plateformes de confiance\n(serveurs, ordinateurs, etc.) conformément aux spécifications fonctionnelles TPM2.0.', 'cert_id': '2021/49', 'enhanced': {'__update__': {'cert_id': '2021/49', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2021/11/anssi-cible-cc-2021_49en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2021/11/anssi-cc-2021_49fr.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2021/11/certificat-2021_49.pdf'}}}
data.
- The st property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_51fr.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_51en.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The st_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The st_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The report_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}
data.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None}
data. - The report_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2022/30']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2022/30']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/61']}}}
data. - The scheme_data property was set to
{'product': 'NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.0.0)', 'url': 'https://cyber.gouv.fr/produits-certifies/npct7xx-tpm20-rev-159-configuration-version-1300', 'description': 'Le produit évalué est « NPCT7xx TPM2.0 rev 1.59, configuration version 1.3.0.0 » développé par\nNUVOTON TECHNOLOGY CORPORATION.\nCe produit est destiné à garantir l’intégrité matérielle et logicielle des plateformes de confiance\n(serveurs, ordinateurs, etc.) conformément aux spécifications fonctionnelles TPM2.0.', 'sponsor': 'NUVOTON TECHNOLOGY CORPORATION', 'developer': 'NUVOTON TECHNOLOGY CORPORATION', 'cert_id': '2021/51', 'level': 'EAL4+', 'expiration_date': '22 Octobre 2026', 'enhanced': {'cert_id': '2021/51', 'certification_date': '22/10/2021', 'expiration_date': '22/10/2026', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'NUVOTON TECHNOLOGY CORPORATION', 'sponsor': 'NUVOTON TECHNOLOGY CORPORATION', 'evaluation_facility': 'SERMA SAFETY & SECURITY', 'level': 'EAL4+', 'protection_profile': 'NA', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_FLR.1, ALC_DVS.2, AVA_VAN.4', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2021/11/anssi-cible-cc-2021_51en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2021/11/anssi-cc-2021_51fr.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2021/11/certificat-2021_51.pdf'}}
.
- The st_references property was updated, with the
-
31.07.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.0.0) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2021_51.pdf",
"dgst": "3ede911f5d966211",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2021/51",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 4
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.3.0.0",
"1.59",
"2.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2022/30",
"ANSSI-CC-2022/26"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2020/21"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2022/30",
"ANSSI-CC-2022/26"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2018/61",
"ANSSI-CC-2020/21",
"ANSSI-CC-PP-2018/03"
]
}
},
"scheme_data": {
"cert_id": "ANSSI-CC-2021/51",
"description": "Le produit \u00e9valu\u00e9 est \u00ab NPCT7xx TPM2.0 rev 1.59, configuration version 1.3.0.0 \u00bb d\u00e9velopp\u00e9 par NUVOTON TECHNOLOGY CORPORATION. Ce produit est destin\u00e9 \u00e0 garantir l\u2019int\u00e9grit\u00e9 mat\u00e9rielle et logicielle des plateformes de confiance (serveurs, ordinateurs, etc.) conform\u00e9ment aux sp\u00e9cifications fonctionnelles TPM2.0.",
"developer": "NUVOTON TECHNOLOGY CORPORATION",
"enhanced": {
"augmented": "ALC_FLR.1, ALC_DVS.2, AVA_VAN.4",
"category": "Micro-circuits",
"cc_version": "Crit\u00e8res Communs version 3.1r5",
"cert_id": "ANSSI-CC-2021/51",
"cert_link": "https://cyber.gouv.fr/sites/default/files/2021/11/certificat-2021_51.pdf",
"certification_date": "2021-10-22",
"developer": "NUVOTON TECHNOLOGY CORPORATION",
"evaluation_facility": "SERMA SAFETY \u0026 SECURITY",
"expiration_date": "2026-10-22",
"level": "EAL4+",
"mutual_recognition": "SOG-IS CCRA",
"protection_profile": "NA",
"report_link": "https://cyber.gouv.fr/sites/default/files/2021/11/anssi-cc-2021_51fr.pdf",
"sponsor": "NUVOTON TECHNOLOGY CORPORATION",
"target_link": "https://cyber.gouv.fr/sites/default/files/2021/11/anssi-cible-cc-2021_51en.pdf"
},
"expiration_date": "2026-10-22",
"level": "EAL4+",
"product": "NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.0.0)",
"sponsor": "NUVOTON TECHNOLOGY CORPORATION",
"url": "https://cyber.gouv.fr/produits-certifies/npct7xx-tpm20-rev-159-configuration-version-1300"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2022/30"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2022/30"
]
},
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Nuvoton Technology",
"manufacturer_web": null,
"name": "NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.0.0)",
"not_valid_after": "2026-10-22",
"not_valid_before": "2021-10-22",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "certificat-2021_51.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2021/51": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1,
"ALC_FLR.1": 1
},
"AVA": {
"AVA_VAN.4": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL4": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"SERMA": 1,
"Serma Safety \u0026 Security": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "",
"/CreationDate": "D:20211029114602+02\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20211029114602+02\u002700\u0027",
"/Producer": "Acrobat Distiller 11.0 (Windows)",
"/Title": "",
"pdf_file_size_bytes": 279746,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"report_filename": "anssi-cc-2021_51fr.pdf",
"report_frontpage": {
"FR": {}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
}
},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2020/21": 2,
"ANSSI-CC-2021/51": 2
}
},
"cc_claims": {
"O": {
"O.C": 2
},
"R": {
"R.O": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1,
"ALC_FLR": 1,
"ALC_FLR.1": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.4": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL2": 2,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"SERMA": 2
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 1,
"SHA-384": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
},
"DES": {
"DES": {
"DES": 1
}
},
"constructions": {
"MAC": {
"HMAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "",
"/CreationDate": "D:20211029114119+02\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20211029114119+02\u002700\u0027",
"/Producer": "Acrobat Distiller 11.0 (Windows)",
"/Title": "",
"pdf_file_size_bytes": 133176,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 12
},
"st_filename": "anssi-cible-cc-2021_51en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 25
},
"ECDH": {
"ECDH": 1
},
"ECDSA": {
"ECDSA": 2
}
},
"RSA": {
"RSA 2048": 2,
"RSA-3072": 1
}
},
"cc_cert_id": {
"FR": {
"ANSSI-CC-PP-2020/01": 2
}
},
"cc_claims": {
"O": {
"O.C": 11,
"O.DAC": 5
},
"R": {
"R.O": 11
}
},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2020/01": 2
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.1": 1,
"ALC_DVS.2": 4,
"ALC_FLR.1": 3
},
"AVA": {
"AVA_VAN.4": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL4": 2,
"EAL4 augmented": 1
}
},
"cc_sfr": {
"FCO": {
"FCO_NRO": 6,
"FCO_NRO.1": 6
},
"FCS": {
"FCS_CKM": 18,
"FCS_CKM.1": 13,
"FCS_CKM.2": 5,
"FCS_CKM.4": 18,
"FCS_CKM.4.1": 1,
"FCS_COP": 32,
"FCS_COP.1": 12,
"FCS_RNG.1": 4,
"FCS_RNG.1.1": 1,
"FCS_RNG.1.2": 1
},
"FDP": {
"FDP_ACC": 21,
"FDP_ACC.1": 35,
"FDP_ACC.2": 2,
"FDP_ACF": 23,
"FDP_ACF.1": 36,
"FDP_ETC": 6,
"FDP_ETC.1": 2,
"FDP_ETC.2": 4,
"FDP_IFC.1": 20,
"FDP_ITC": 6,
"FDP_ITC.1": 12,
"FDP_ITC.2": 14,
"FDP_ITT.1": 3,
"FDP_ITT.1.1": 1,
"FDP_RIP.1": 3,
"FDP_RIP.1.1": 1,
"FDP_SDI.1": 3,
"FDP_SDI.1.1": 1,
"FDP_UCT": 7,
"FDP_UCT.1": 2,
"FDP_UIT": 9,
"FDP_UIT.1": 4
},
"FIA": {
"FIA_AFL": 12,
"FIA_AFL.1": 8,
"FIA_ATD.1": 1,
"FIA_SOS.1": 1,
"FIA_SOS.2": 3,
"FIA_SOS.2.1": 1,
"FIA_SOS.2.2": 1,
"FIA_UAU.1": 7,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.5": 3,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 3,
"FIA_UAU.6.1": 1,
"FIA_UID.1": 7,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_USB.1": 3,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MOF": 3,
"FMT_MOF.1": 1,
"FMT_MSA": 51,
"FMT_MSA.1": 15,
"FMT_MSA.2": 4,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 22,
"FMT_MSA.4": 3,
"FMT_MTD": 6,
"FMT_MTD.1": 2,
"FMT_SMF.1": 13,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 21,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS": 7,
"FPT_FLS.1": 2,
"FPT_ITT.1": 3,
"FPT_ITT.1.1": 1,
"FPT_PHP.3": 3,
"FPT_PHP.3.1": 1,
"FPT_STM.1": 2,
"FPT_STM.1.1": 1,
"FPT_TDC.1": 1,
"FPT_TST.1": 5,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC": 3,
"FTP_ITC.1": 5,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 5
}
},
"certification_process": {},
"cipher_mode": {
"CFB": {
"CFB": 2
},
"CTR": {
"CTR": 2
},
"ECB": {
"ECB": 1
},
"OFB": {
"OFB": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {
"NIST": {
"NIST P-384": 1,
"P-256": 2,
"P-384": 3
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 8
},
"SHA2": {
"SHA-256": 7,
"SHA-384": 9
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {
"com": {
"com.tw": 1
}
},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 5
},
"RNG": {
"RBG": 1,
"RNG": 18
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 2,
"Physical Tampering": 2,
"malfunction": 2,
"physical tampering": 2
},
"SCA": {
"physical probing": 1
}
},
"standard_id": {
"BSI": {
"AIS31": 1
},
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
},
"FIPS": {
"FIPS 140-2": 3,
"FIPS 180-1": 1,
"FIPS 180-4": 1,
"FIPS 186-3": 5,
"FIPS 197": 2,
"FIPS 198-1": 2,
"FIPS PUB 186-4": 1,
"FIPS140-2": 2,
"FIPS180-4": 1,
"FIPS186-4": 2,
"FIPS198-1": 1
},
"ISO": {
"ISO/IEC 10116:2006": 1,
"ISO/IEC 14888-3": 1,
"ISO/IEC 15408": 2,
"ISO/IEC 15946-1": 1,
"ISO/IEC 18033-3": 1,
"ISO/IEC 9797-2": 1
},
"PKCS": {
"PKCS #1": 1,
"PKCS#1": 1
},
"RFC": {
"RFC 3447": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 11,
"AES-": 1,
"AES-256": 2
}
},
"constructions": {
"MAC": {
"HMAC": 31
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Karsten Grans",
"/CreationDate": "D:20210715184410+03\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/ModDate": "D:20210715184410+03\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"/Subject": "Security Target",
"/Title": "Developer Document",
"pdf_file_size_bytes": 1717738,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.rsa.com/",
"http://www.nuvoton.com/",
"https://www.trustedcomputinggroup.org/home",
"file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23FDP_UCT_1_FW",
"file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FMT_MSA_2_States",
"file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FDP_ACF_1_States",
"file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FPT_FLS_1_States",
"http://www.nuvoton.com.tw/",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 93
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_51fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"ALC_FLR.1",
"AVA_VAN.4",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_51en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "d928f1f4f1b318377271be5ad0b1e8a4dc11436812cc7aa3fa2f31c5afc837d7",
"txt_hash": "a8ccb614a15789b9c41759ae82a934e955064561bac2554a93107f72f6e81221"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "9eff88520ed99f484e388370e54248f5a727dbe6d38d0f5aa86f98a3f4c6f2bb",
"txt_hash": "967647d5235a4a91b6730fc5291e9f8a5ef84ca4d9f625008d10f46bc7c9ba96"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "85e732d37c4de0f3755664b07168af84ad30349ef8c2784d978970078012d78b",
"txt_hash": "cf344b9b5da4ece4dd2f5b31af0394d2e7522b780a6e26f813079dc70b033187"
}
},
"status": "active"
}