Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 03 with ACL version 2.22
CSV information ?
Status | archived |
---|---|
Valid from | 04.07.2007 |
Valid until | 01.09.2019 |
Scheme | 🇩🇪 DE |
Manufacturer | Renesas Technology Corporation |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_MSU.3, ALC_DVS.2, EAL4+, AVA_VLA.4, ADV_IMP.2 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
DES, 3DES, Triple-DESHash functions
SHA-1, SHA-256, SHA-384, SHA-512, RIPEMD-160Randomness
TRNG, PRNG, RNGBlock cipher modes
ECBVendor
Infineon Technologies, PhilipsSecurity level
EAL4, EAL 1, EAL 7, EAL 4, EAL4+, EAL1, EAL3, EAL5, EAL7, EAL2, EAL6, EAL4 augmentedSecurity Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL.2, ADO_IGS.1, ADO_DEL, ADO_IGS, ADV_IMP.2, ADV_FSP.2, ADV_HLD.2, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM.1, AGD_USR.1, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_VLA.4, AVA_SOF.1, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA, AVA_VLA.2, AVA_VLA.3, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS.1, FCS_COP.1, FCS_CKM.1, FCS_RND.1, FDP_ITT.1, FDP_IFC.1, FDP_ACC.1, FDP_ACF.1, FMT_LIM.1, FMT_LIM.2, FPT_FLS.1, FPT_SEP.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2Protection profiles
BSI-PP-0002-2001Certificates
BSI-DSZ-CC-0409-2007Side-channel analysis
Physical probing, physical probing, physical tampering, MalfunctionCertification process
HD65255C1) Version 03 with ACL version 2.22 Smartcard Security Target, Renesas Technology Corp. (confidential document) [7] Security Target BSI-DSZ-0409-2007, Revision 2.2, 30. March 2007, AE55C1 (HD65255C1) Version 03, Technical Report, Version 1.0, 17. April 2007, Evaluation Technical Report BSI-DSC-CC-0409-2007 (confidential document) [10] Renesas 32-bit Smart Card Microcomputer AE-5 Series User Guidance Manual, Rev. 5.30, Renesas, 13. July 2006 (confidential document) [11] FIPS PUB 46-3 Federal Information Processing Standards Publication Data Encryption Standard, Technical Report lite, Version 1.0, 06. June 2007, ETR-lite for composition according to AIS36 (confidential document) [17] Smartcard Integrated Circuit Platform Augmentations, v1.0, Atmel, Hitachi Europe, Infineon, HD65255C1) version 03 with ACL version 2.22 Smartcard Security Target, Renesas Technology Corp. (confidential document)). The evaluators verified, that the threats and the security objective for the life cycle phases 2Standards
FIPS PUB 46-3, FIPS PUB 180-2, FIPS PUB 180-1, AIS 34, AIS31, AIS20, AIS 20, AIS 25, AIS 26, AIS 31, AIS36, ISO/IEC 15408:2005, ISO/IEC15408: 2005Technical reports
BSI 7125, BSI 7148, BSI 7149File metadata
Title | Certification Report BSI-DSZ-CC-0409-2007 |
---|---|
Keywords | Common Criteria, Certification, Zertifizierung, Renesas Technology Corporation, Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 03 with ACL version 2.22, BSI-DSZ-CC-0409-2007 |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Creation date | D:20070706091625+02'00' |
Modification date | D:20070706092447+02'00' |
Pages | 44 |
Creator | Acrobat PDFMaker 8.1 für Word |
Producer | Acrobat Distiller 8.1.0 (Windows) |
Frontpage
Certificate ID | BSI-DSZ-CC-0409-2007 |
---|---|
Certified item | Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 03 with ACL version 2.22 |
Certification lab | BSI |
Developer | Renesas Technology Corp |
Security target ?
Extracted keywords
Symmetric Algorithms
DES, 3DES, Triple-DESHash functions
SHA-1, SHA-256, SHA-384, SHA-512, RIPEMD-160Randomness
TRNG, PRNG, RNG, RNDBlock cipher modes
ECB, CBCVendor
Infineon Technologies, PhilipsSecurity level
EAL4, EAL4 augmentedClaims
O.RND, T.RNDSecurity Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ADO_IGS, ADO_DEL, ADV_SPM.1, ADV_IMP.2, ADV_SPM, ADV_FSP, ADV_RCR, ADV_HLD, ADV_LLD, ADV_IMP, AGD_USR, AGD_ADM, ALC_DVS.2, ALC_DVS, ALC_LCD, ALC_TAT, AVA_MSU.3, AVA_VLA.4, AVA_SOF, AVA_MSU, AVA_VLASecurity Functional Requirements (SFR)
FAU_SAS.1, FAU_GEN.1, FAU_SAS.1.1, FCS_RND.1, FCS_COP.1, FCS_CKM.1, FCS_RND, FCS_RND.1.1, FCS_COP.1.1, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.4.1, FDP_ITT.1, FDP_IFC.1, FDP_ACC.1, FDP_ACF.1, FDP_ITT.1.1, FDP_IFC.1.1, FDP_IFF.1, FDP_ITC.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_SDI.1, FMT_LIM.1, FMT_LIM.2, FMT_LIM, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.2, FMT_MSA.3, FMT_MSA.2.1, FMT_MSA.1, FMT_SMR.1, FPT_FLS.1, FPT_SEP.1, FPT_PHP.3, FPT_ITT.1, FPT_FLS.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_PHP.3.1, FPT_ITT.1.1, FPT_AMT.1, FRU_FLT.2, FRU_FLT.1Protection profiles
BSI-PP-0002, BSI-PP- 0002Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, Physical probing, DPA, physical tampering, Malfunction, malfunction, DFAStandards
FIPS PUB 46-3, AIS31, AIS 31, AIS20, AIS 20, ISO/IEC7816-3, ISO/IEC 9796-2File metadata
Title | Microsoft Word - AE55C1-CC-ST-0006 r2.2.doc |
---|---|
Author | tstod |
Creation date | D:20070402115250+01'00' |
Modification date | D:20070402115647+01'00' |
Pages | 75 |
Creator | PScript5.dll Version 5.2.2 |
Producer | Acrobat Distiller 7.0 (Windows) |
Heuristics ?
Extracted SARs
ADV_FSP.2, ADV_HLD.2, ADV_IMP.2, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.3, AVA_SOF.1, AVA_VLA.4Similar certificates
Name | Certificate ID | |
---|---|---|
Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 02 with ACL version 1.43 | BSI-DSZ-CC-0329-2006 | Compare |
Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 02 with ACL version 1.43 and additional SHA-256 function | BSI-DSZ-CC-0379-2006 | Compare |
References ?
No references are available for this certificate.
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '8e2b7a776e450f2009a8126cf11961c8150ae5d5b02c6b20ab4d95048fe7fa57', 'txt_hash': '9c721627b74c36d44d86e87f2ae45c55d40c7c2c074f9c1b4523a66d9f5dd2d4'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '961b6f8a9f417dc8eea3840f7d7dc98e6f517300e8f7e53cfc36f98cec1e7643', 'txt_hash': '5ca653199e43bcf4a24bd0e5209b75c2b22765f70dc9637e861c0d7a9e41b03c'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 365162, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 44, '/CreationDate': "D:20070706091625+02'00'", '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/Creator': 'Acrobat PDFMaker 8.1 für Word', '/Keywords': 'Common Criteria, Certification, Zertifizierung, Renesas Technology Corporation, Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 03 with ACL version 2.22, BSI-DSZ-CC-0409-2007', '/Producer': 'Acrobat Distiller 8.1.0 (Windows)', '/ModDate': "D:20070706092447+02'00'", '/Company': 'BSI, Postfach 200363, 53133 Bonn', '/SourceModified': 'D:20070706071604', '/Title': 'Certification Report BSI-DSZ-CC-0409-2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 448958, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 75, '/Author': 'tstod', '/CreationDate': "D:20070402115250+01'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20070402115647+01'00'", '/Producer': 'Acrobat Distiller 7.0 (Windows)', '/Title': 'Microsoft Word - AE55C1-CC-ST-0006 r2.2.doc', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0409-2007', 'cert_item': 'Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 03 with ACL version 2.22', 'developer': 'Renesas Technology Corp', 'cert_lab': 'BSI'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0409-2007': 22}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002-2001': 4}}, 'cc_security_level': {'EAL': {'EAL4': 14, 'EAL 1': 1, 'EAL 7': 1, 'EAL 4': 1, 'EAL4+': 1, 'EAL1': 5, 'EAL3': 4, 'EAL5': 6, 'EAL7': 4, 'EAL2': 3, 'EAL6': 3, 'EAL4 augmented': 3}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 2, 'ACM_CAP.4': 2, 'ACM_SCP.2': 2, 'ACM_AUT': 2, 'ACM_CAP': 2, 'ACM_SCP': 2}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 2, 'ADO_DEL': 2, 'ADO_IGS': 2}, 'ADV': {'ADV_IMP.2': 5, 'ADV_FSP.2': 1, 'ADV_HLD.2': 1, 'ADV_LLD.1': 1, 'ADV_RCR.1': 1, 'ADV_SPM.1': 1, 'ADV_FSP': 2, 'ADV_HLD': 2, 'ADV_IMP': 2, 'ADV_INT': 2, 'ADV_LLD': 2, 'ADV_RCR': 2, 'ADV_SPM': 2}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1, 'AGD_ADM': 2, 'AGD_USR': 2}, 'ALC': {'ALC_DVS.2': 6, 'ALC_LCD.1': 2, 'ALC_TAT.1': 2, 'ALC_DVS': 2, 'ALC_FLR': 2, 'ALC_LCD': 1, 'ALC_TAT': 2}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_COV': 2, 'ATE_DPT': 2, 'ATE_FUN': 2, 'ATE_IND': 2}, 'AVA': {'AVA_MSU.3': 5, 'AVA_VLA.4': 6, 'AVA_SOF.1': 1, 'AVA_CCA': 2, 'AVA_MSU': 2, 'AVA_SOF': 3, 'AVA_VLA': 3, 'AVA_VLA.2': 1, 'AVA_VLA.3': 1}, 'ASE': {'ASE_DES.1': 1, 'ASE_ENV.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.1': 1, 'ASE_PPC.1': 1, 'ASE_REQ.1': 1, 'ASE_SRE.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 1}, 'FCS': {'FCS_COP.1': 7, 'FCS_CKM.1': 1, 'FCS_RND.1': 2}, 'FDP': {'FDP_ITT.1': 2, 'FDP_IFC.1': 2, 'FDP_ACC.1': 2, 'FDP_ACF.1': 2}, 'FMT': {'FMT_LIM.1': 1, 'FMT_LIM.2': 1}, 'FPT': {'FPT_FLS.1': 1, 'FPT_SEP.1': 1, 'FPT_PHP.3': 1, 'FPT_ITT.1': 2}, 'FRU': {'FRU_FLT.2': 1}}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies': 1}, 'Philips': {'Philips': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 15}, '3DES': {'3DES': 4, 'Triple-DES': 3}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 2}, 'SHA2': {'SHA-256': 2, 'SHA-384': 2, 'SHA-512': 2}}, 'RIPEMD': {'RIPEMD-160': 1}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'PRNG': {'PRNG': 5}, 'RNG': {'RNG': 10}}, 'cipher_mode': {'ECB': {'ECB': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Physical probing': 1, 'physical probing': 1}, 'FI': {'physical tampering': 1, 'Malfunction': 1}}, 'technical_report_id': {'BSI': {'BSI 7125': 2, 'BSI 7148': 1, 'BSI 7149': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 3, 'FIPS PUB 180-2': 1, 'FIPS PUB 180-1': 1}, 'BSI': {'AIS 34': 1, 'AIS31': 1, 'AIS20': 1, 'AIS 20': 3, 'AIS 25': 2, 'AIS 26': 3, 'AIS 31': 3, 'AIS36': 1}, 'ISO': {'ISO/IEC 15408:2005': 3, 'ISO/IEC15408: 2005': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'HD65255C1) Version 03 with ACL version 2.22 Smartcard Security Target, Renesas Technology Corp. (confidential document) [7] Security Target BSI-DSZ-0409-2007, Revision 2.2, 30. March 2007, AE55C1 (HD65255C1) Version 03': 1, 'Technical Report, Version 1.0, 17. April 2007, Evaluation Technical Report BSI-DSC-CC-0409-2007 (confidential document) [10] Renesas 32-bit Smart Card Microcomputer AE-5 Series User Guidance Manual, Rev. 5.30, Renesas': 1, '13. July 2006 (confidential document) [11] FIPS PUB 46-3 Federal Information Processing Standards Publication Data Encryption Standard': 1, 'Technical Report lite, Version 1.0, 06. June 2007, ETR-lite for composition according to AIS36 (confidential document) [17] Smartcard Integrated Circuit Platform Augmentations, v1.0, Atmel, Hitachi Europe, Infineon': 1, 'HD65255C1) version 03 with ACL version 2.22 Smartcard Security Target, Renesas Technology Corp. (confidential document)). The evaluators verified, that the threats and the security objective for the life cycle phases 2': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002': 82, 'BSI-PP- 0002': 4}}, 'cc_security_level': {'EAL': {'EAL4': 6, 'EAL4 augmented': 2}}, 'cc_sar': {'ACM': {'ACM_AUT': 1, 'ACM_CAP': 1, 'ACM_SCP': 1}, 'ADO': {'ADO_IGS': 2, 'ADO_DEL': 2}, 'ADV': {'ADV_SPM.1': 4, 'ADV_IMP.2': 2, 'ADV_SPM': 1, 'ADV_FSP': 2, 'ADV_RCR': 1, 'ADV_HLD': 1, 'ADV_LLD': 1, 'ADV_IMP': 1}, 'AGD': {'AGD_USR': 3, 'AGD_ADM': 3}, 'ALC': {'ALC_DVS.2': 2, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'AVA': {'AVA_MSU.3': 2, 'AVA_VLA.4': 2, 'AVA_SOF': 8, 'AVA_MSU': 1, 'AVA_VLA': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 9, 'FAU_GEN.1': 1, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_RND.1': 16, 'FCS_COP.1': 79, 'FCS_CKM.1': 38, 'FCS_RND': 1, 'FCS_RND.1.1': 2, 'FCS_COP.1.1': 8, 'FCS_CKM.4': 27, 'FCS_CKM.1.1': 2, 'FCS_CKM.2': 3, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ITT.1': 23, 'FDP_IFC.1': 30, 'FDP_ACC.1': 31, 'FDP_ACF.1': 27, 'FDP_ITT.1.1': 1, 'FDP_IFC.1.1': 2, 'FDP_IFF.1': 3, 'FDP_ITC.1': 24, 'FDP_ACC.1.1': 3, 'FDP_ACF.1.1': 4, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_SDI.1': 1}, 'FMT': {'FMT_LIM.1': 10, 'FMT_LIM.2': 10, 'FMT_LIM': 1, 'FMT_LIM.1.1': 1, 'FMT_LIM.2.1': 1, 'FMT_MSA.2': 28, 'FMT_MSA.3': 9, 'FMT_MSA.2.1': 1, 'FMT_MSA.1': 2, 'FMT_SMR.1': 1}, 'FPT': {'FPT_FLS.1': 31, 'FPT_SEP.1': 12, 'FPT_PHP.3': 12, 'FPT_ITT.1': 21, 'FPT_FLS.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_PHP.3.1': 1, 'FPT_ITT.1.1': 2, 'FPT_AMT.1': 1}, 'FRU': {'FRU_FLT.2': 15, 'FRU_FLT.1': 1}}, 'cc_claims': {'O': {'O.RND': 5}, 'T': {'T.RND': 5}}, 'vendor': {'Infineon': {'Infineon Technologies': 1}, 'Philips': {'Philips': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 51}, '3DES': {'3DES': 18, 'Triple-DES': 3}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 19}, 'SHA2': {'SHA-256': 21, 'SHA-384': 17, 'SHA-512': 20}}, 'RIPEMD': {'RIPEMD-160': 12}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 8}, 'PRNG': {'PRNG': 12}, 'RNG': {'RNG': 20, 'RND': 10}}, 'cipher_mode': {'ECB': {'ECB': 3}, 'CBC': {'CBC': 2}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 16, 'Physical Probing': 2, 'physical probing': 4, 'Physical probing': 1, 'DPA': 2}, 'FI': {'physical tampering': 1, 'Malfunction': 15, 'malfunction': 5, 'DFA': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 4}, 'BSI': {'AIS31': 6, 'AIS 31': 1, 'AIS20': 4, 'AIS 20': 1}, 'ISO': {'ISO/IEC7816-3': 1, 'ISO/IEC 9796-2': 5}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
0409a.pdf
. - The st_filename property was set to
0409b.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['BSI']
. - The cert_id property was set to
BSI-DSZ-CC-0409-2007
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_PPC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_DES', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ENV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0409a.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0409b.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_PPC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_DES', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ENV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}
values discarded.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 03 with ACL version 2.22 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "01ba90299ef09d44",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0409-2007",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ENV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_PPC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_DES",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_LLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2.22"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Renesas Technology Corporation",
"manufacturer_web": "https://am.renesas.com/",
"name": "Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 03 with ACL version 2.22",
"not_valid_after": "2019-09-01",
"not_valid_before": "2007-07-04",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0409a.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-0409-2007",
"cert_item": "Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 03 with ACL version 2.22",
"cert_lab": "BSI",
"developer": "Renesas Technology Corp",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0409-2007": 22
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002-2001": 4
}
},
"cc_sar": {
"ACM": {
"ACM_AUT": 2,
"ACM_AUT.1": 2,
"ACM_CAP": 2,
"ACM_CAP.4": 2,
"ACM_SCP": 2,
"ACM_SCP.2": 2
},
"ADO": {
"ADO_DEL": 2,
"ADO_DEL.2": 2,
"ADO_IGS": 2,
"ADO_IGS.1": 2
},
"ADV": {
"ADV_FSP": 2,
"ADV_FSP.2": 1,
"ADV_HLD": 2,
"ADV_HLD.2": 1,
"ADV_IMP": 2,
"ADV_IMP.2": 5,
"ADV_INT": 2,
"ADV_LLD": 2,
"ADV_LLD.1": 1,
"ADV_RCR": 2,
"ADV_RCR.1": 1,
"ADV_SPM": 2,
"ADV_SPM.1": 1
},
"AGD": {
"AGD_ADM": 2,
"AGD_ADM.1": 1,
"AGD_USR": 2,
"AGD_USR.1": 1
},
"ALC": {
"ALC_DVS": 2,
"ALC_DVS.2": 6,
"ALC_FLR": 2,
"ALC_LCD": 1,
"ALC_LCD.1": 2,
"ALC_TAT": 2,
"ALC_TAT.1": 2
},
"ASE": {
"ASE_DES.1": 1,
"ASE_ENV.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.1": 1,
"ASE_PPC.1": 1,
"ASE_REQ.1": 1,
"ASE_SRE.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV": 2,
"ATE_COV.2": 1,
"ATE_DPT": 2,
"ATE_DPT.1": 1,
"ATE_FUN": 2,
"ATE_FUN.1": 1,
"ATE_IND": 2,
"ATE_IND.2": 1
},
"AVA": {
"AVA_CCA": 2,
"AVA_MSU": 2,
"AVA_MSU.3": 5,
"AVA_SOF": 3,
"AVA_SOF.1": 1,
"AVA_VLA": 3,
"AVA_VLA.2": 1,
"AVA_VLA.3": 1,
"AVA_VLA.4": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 4": 1,
"EAL 7": 1,
"EAL1": 5,
"EAL2": 3,
"EAL3": 4,
"EAL4": 14,
"EAL4 augmented": 3,
"EAL4+": 1,
"EAL5": 6,
"EAL6": 3,
"EAL7": 4
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 1
},
"FCS": {
"FCS_CKM.1": 1,
"FCS_COP.1": 7,
"FCS_RND.1": 2
},
"FDP": {
"FDP_ACC.1": 2,
"FDP_ACF.1": 2,
"FDP_IFC.1": 2,
"FDP_ITT.1": 2
},
"FMT": {
"FMT_LIM.1": 1,
"FMT_LIM.2": 1
},
"FPT": {
"FPT_FLS.1": 1,
"FPT_ITT.1": 2,
"FPT_PHP.3": 1,
"FPT_SEP.1": 1
},
"FRU": {
"FRU_FLT.2": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"13. July 2006 (confidential document) [11] FIPS PUB 46-3 Federal Information Processing Standards Publication Data Encryption Standard": 1,
"HD65255C1) Version 03 with ACL version 2.22 Smartcard Security Target, Renesas Technology Corp. (confidential document) [7] Security Target BSI-DSZ-0409-2007, Revision 2.2, 30. March 2007, AE55C1 (HD65255C1) Version 03": 1,
"HD65255C1) version 03 with ACL version 2.22 Smartcard Security Target, Renesas Technology Corp. (confidential document)). The evaluators verified, that the threats and the security objective for the life cycle phases 2": 1,
"Technical Report lite, Version 1.0, 06. June 2007, ETR-lite for composition according to AIS36 (confidential document) [17] Smartcard Integrated Circuit Platform Augmentations, v1.0, Atmel, Hitachi Europe, Infineon": 1,
"Technical Report, Version 1.0, 17. April 2007, Evaluation Technical Report BSI-DSC-CC-0409-2007 (confidential document) [10] Renesas 32-bit Smart Card Microcomputer AE-5 Series User Guidance Manual, Rev. 5.30, Renesas": 1
}
},
"cipher_mode": {
"ECB": {
"ECB": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"RIPEMD": {
"RIPEMD-160": 1
},
"SHA": {
"SHA1": {
"SHA-1": 2
},
"SHA2": {
"SHA-256": 2,
"SHA-384": 2,
"SHA-512": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"PRNG": 5
},
"RNG": {
"RNG": 10
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 1,
"physical tampering": 1
},
"SCA": {
"Physical probing": 1,
"physical probing": 1
}
},
"standard_id": {
"BSI": {
"AIS 20": 3,
"AIS 25": 2,
"AIS 26": 3,
"AIS 31": 3,
"AIS 34": 1,
"AIS20": 1,
"AIS31": 1,
"AIS36": 1
},
"FIPS": {
"FIPS PUB 180-1": 1,
"FIPS PUB 180-2": 1,
"FIPS PUB 46-3": 3
},
"ISO": {
"ISO/IEC 15408:2005": 3,
"ISO/IEC15408: 2005": 1
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"3DES": 4,
"Triple-DES": 3
},
"DES": {
"DES": 15
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7148": 1,
"BSI 7149": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon Technologies": 1
},
"Philips": {
"Philips": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/Company": "BSI, Postfach 200363, 53133 Bonn",
"/CreationDate": "D:20070706091625+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 8.1 f\u00fcr Word",
"/Keywords": "Common Criteria, Certification, Zertifizierung, Renesas Technology Corporation, Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 03 with ACL version 2.22, BSI-DSZ-CC-0409-2007",
"/ModDate": "D:20070706092447+02\u002700\u0027",
"/Producer": "Acrobat Distiller 8.1.0 (Windows)",
"/SourceModified": "D:20070706071604",
"/Title": "Certification Report BSI-DSZ-CC-0409-2007",
"pdf_file_size_bytes": 365162,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 44
},
"st_filename": "0409b.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.RND": 5
},
"T": {
"T.RND": 5
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP- 0002": 4,
"BSI-PP-0002": 82
}
},
"cc_sar": {
"ACM": {
"ACM_AUT": 1,
"ACM_CAP": 1,
"ACM_SCP": 1
},
"ADO": {
"ADO_DEL": 2,
"ADO_IGS": 2
},
"ADV": {
"ADV_FSP": 2,
"ADV_HLD": 1,
"ADV_IMP": 1,
"ADV_IMP.2": 2,
"ADV_LLD": 1,
"ADV_RCR": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 4
},
"AGD": {
"AGD_ADM": 3,
"AGD_USR": 3
},
"ALC": {
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_LCD": 1,
"ALC_TAT": 1
},
"AVA": {
"AVA_MSU": 1,
"AVA_MSU.3": 2,
"AVA_SOF": 8,
"AVA_VLA": 1,
"AVA_VLA.4": 2
}
},
"cc_security_level": {
"EAL": {
"EAL4": 6,
"EAL4 augmented": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 1,
"FAU_SAS.1": 9,
"FAU_SAS.1.1": 1
},
"FCS": {
"FCS_CKM.1": 38,
"FCS_CKM.1.1": 2,
"FCS_CKM.2": 3,
"FCS_CKM.4": 27,
"FCS_CKM.4.1": 1,
"FCS_COP.1": 79,
"FCS_COP.1.1": 8,
"FCS_RND": 1,
"FCS_RND.1": 16,
"FCS_RND.1.1": 2
},
"FDP": {
"FDP_ACC.1": 31,
"FDP_ACC.1.1": 3,
"FDP_ACF.1": 27,
"FDP_ACF.1.1": 4,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 2,
"FDP_IFC.1": 30,
"FDP_IFC.1.1": 2,
"FDP_IFF.1": 3,
"FDP_ITC.1": 24,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_ITT.1": 23,
"FDP_ITT.1.1": 1,
"FDP_SDI.1": 1
},
"FMT": {
"FMT_LIM": 1,
"FMT_LIM.1": 10,
"FMT_LIM.1.1": 1,
"FMT_LIM.2": 10,
"FMT_LIM.2.1": 1,
"FMT_MSA.1": 2,
"FMT_MSA.2": 28,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 9,
"FMT_SMR.1": 1
},
"FPT": {
"FPT_AMT.1": 1,
"FPT_FLS.1": 31,
"FPT_FLS.1.1": 1,
"FPT_ITT.1": 21,
"FPT_ITT.1.1": 2,
"FPT_PHP.3": 12,
"FPT_PHP.3.1": 1,
"FPT_SEP.1": 12,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1
},
"FRU": {
"FRU_FLT.1": 1,
"FRU_FLT.2": 15
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"ECB": {
"ECB": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"RIPEMD": {
"RIPEMD-160": 12
},
"SHA": {
"SHA1": {
"SHA-1": 19
},
"SHA2": {
"SHA-256": 21,
"SHA-384": 17,
"SHA-512": 20
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"PRNG": 12
},
"RNG": {
"RND": 10,
"RNG": 20
},
"TRNG": {
"TRNG": 8
}
},
"side_channel_analysis": {
"FI": {
"DFA": 2,
"Malfunction": 15,
"malfunction": 5,
"physical tampering": 1
},
"SCA": {
"DPA": 2,
"Leak-Inherent": 16,
"Physical Probing": 2,
"Physical probing": 1,
"physical probing": 4
}
},
"standard_id": {
"BSI": {
"AIS 20": 1,
"AIS 31": 1,
"AIS20": 4,
"AIS31": 6
},
"FIPS": {
"FIPS PUB 46-3": 4
},
"ISO": {
"ISO/IEC 9796-2": 5,
"ISO/IEC7816-3": 1
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"3DES": 18,
"Triple-DES": 3
},
"DES": {
"DES": 51
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon Technologies": 1
},
"Philips": {
"Philips": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "tstod",
"/CreationDate": "D:20070402115250+01\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20070402115647+01\u002700\u0027",
"/Producer": "Acrobat Distiller 7.0 (Windows)",
"/Title": "Microsoft Word - AE55C1-CC-ST-0006 r2.2.doc",
"pdf_file_size_bytes": 448958,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 75
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0409a.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ADV_IMP.2",
"AVA_MSU.3",
"AVA_VLA.4",
"EAL4+",
"ALC_DVS.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0409b.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "8e2b7a776e450f2009a8126cf11961c8150ae5d5b02c6b20ab4d95048fe7fa57",
"txt_hash": "9c721627b74c36d44d86e87f2ae45c55d40c7c2c074f9c1b4523a66d9f5dd2d4"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "961b6f8a9f417dc8eea3840f7d7dc98e6f517300e8f7e53cfc36f98cec1e7643",
"txt_hash": "5ca653199e43bcf4a24bd0e5209b75c2b22765f70dc9637e861c0d7a9e41b03c"
}
},
"status": "archived"
}