Infineon Technologies Security Controller M9905 A11 with optional ACL v2.07.003 and v2.09.002

CSV information

Status active
Valid from 04.11.2025
Valid until 04.11.2030
Scheme 🇩🇪 DE
Manufacturer Infineon Technologies AG
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL5+, AVA_VAN.5, ALC_DVS.2
Protection profiles

Heuristics summary

Certificate ID: BSI-DSZ-CC-0827

Certificate

Extracted keywords

Vendor
Infineon Technologies, Infineon Technologies AG

Security level
EAL 5, EAL 2, EAL 5 augmented
Security Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR, AVA_VAN.5
Protection profiles
BSI-CC-PP-0035-2007

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Title Certificate BSI-DSZ-CC-0827-V10-2025
Subject Common Criteria, Certification, Zertifizierung
Keywords Common Criteria, Certification, Zertifizierung
Author Federal Office for Information Security
Pages 1

Certification report

Extracted keywords

Symmetric Algorithms
AES, Triple-DES, 3DES
Asymmetric Algorithms
ECDH, ECDSA, ECC
Schemes
Key Agreement
Randomness
RNG
Block cipher modes
ECB, CBC

Vendor
Infineon Technologies, Infineon Technologies AG, Infineon

Security level
EAL 5, EAL 2, EAL 1, EAL 4, EAL 2+, EAL5, EAL5+, EAL 5 augmented, EAL5 augmented
Security Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, AVA_VAN.5
Protection profiles
BSI-CC-PP-0035-2007
Certificates
BSI-DSZ-CC-0827-V9-2024
Evaluation facilities
TĂśV Informationstechnik

Side-channel analysis
physical probing, SPA, DPA, physical tampering, DFA
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Version 6.2, 2025-07-18, “Security Target M9905 with optional ACL Software Libraries”, Infineon (confidential document) [6] Evaluation Technical Report, BSI-DSZ-CC-0827-V10-2025, Version 3, 2025-09-26, “EVALUATION, REPORT SUMMARY (ETR SUMMARY)”, TÜV Informationstechnik GmbH, (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC- PP-0035-2007 [8, “EVALUATION TECHNICAL REPORT FOR COMPOSITE EVALUATION (ETR COMP)”, TÜV Informationstechnik GmbH (confidential document) [10] Configuration list for the TOE, Version 1.6, 2025-06-23, “Configuration Management Scope, including optional Software Libraries EC”, Infineon (confidential document) [11] “Site Technical Audit Report (STAR) Infineon Technologies IT Services GmbH, Klagenfurt, 2, 2025-09-26, TÜV Informationstechnik GmbH (confidential document) [12] “Site Technical Audit Report (STAR) DNP Photomask Europe S.p.A., Agrate, Italy”, version 1, TÜV Informationstechnik GmbH (confidential document) [13] “Impact Analysis for Common Criteria with Evaluation Assurance Level EAL5 augmented (EAL5+, Including optional Software Libraries – EC”, Version 2.2, 2025-10-21, Infineon (confidential document) 22 / 25 BSI-DSZ-CC-0827-V10-2025 Certification Report C. Excerpts from the Criteria For the

Standards
FIPS186-4, FIPS197, AIS 34, AIS 36, AIS31, AIS 35, RFC5639, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, ISO/IEC 7816-3
Technical reports
BSI TR-02102

File metadata

Title Certification Report BSI-DSZ-CC-0827-V10-2025
Subject Common Criteria, Certification, Zertifizierung
Keywords "Common Criteria, Certification, Zertifizierung"
Author Federal Office for Information Security
Pages 25

Frontpage

Certificate ID BSI-DSZ-CC-0827-V10-2025
Certified item Infineon Technologies Security Controller M9905 A11 with optional ACL v2.07.003 and v2.09.002
Certification lab BSI
Developer Infineon Technologies AG

References

Outgoing
  • BSI-DSZ-CC-0827-V9-2024 - archived - Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22, M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Base, SCL, HCL, PSL and with specific IC dedicated software
Incoming
  • BSI-DSZ-CC-0827-V8-2020 - archived - Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22, M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Base, SCL, HCL, PSL and with specific IC dedicated software

Security target

Extracted keywords

Symmetric Algorithms
AES, DES, Triple-DES, 3DES, TDEA
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DSA
Schemes
Key Agreement
Randomness
TRNG, RNG, RND
Libraries
Crypto Library 38
Block cipher modes
ECB, CBC

Trusted Execution Environments
SSC
Vendor
Infineon Technologies, Infineon Technologies AG, Infineon

Security level
EAL5+, EAL5, EAL 5, EAL5 augmented
Claims
O.RND, T.RND
Security Assurance Requirements (SAR)
ADV_COMP.1, ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP, ADV_FSP.4, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS, ALC_DVS.2, ALC_TAT, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ALC_CMS, ALC_CMS.4, ALC_TAT.1, ALC_DVS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_DPT.2, ATE_DPT.1, AVA_VAN.5, AVA_VAN, ASE_INT, ASE_CCL, ASE_SPD, ASE_OBJ, ASE_ECD, ASE_REQ, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_GEN, FAU_SAS.1.1, FCS_RNG, FCS_COP.1, FCS_CKM.1, FCS_COP, FCS_CKM.4, FCS_CKM.6, FCS_CKM.5, FCS_CKM, FCS_CKM.2, FCS_RNG.1, FCS_RBG.1, FCS_RNG.1.1, FCS_RNG.1.2, FDP_ACC.1, FDP_ACF.1, FDP_SDI.1, FDP_SDI.2, FDP_ITT.1, FDP_IFC.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC.1, FDP_ITC.2, FDP_SDI.1.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_PHP.3, FMT_MSA, FMT_SMF, FMT_LIM.1, FMT_LIM.2, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_LIM, FMT_LIM.1.1, FMT_LIM.2.1, FMT_SMR.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1.1, FMT_SMF.1.1, FPT_TST, FPT_TST.2, FPT_TST.1, FPT_TST.2.1, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FPT_FLS, FRU_FLT.2
Protection profiles
BSI-PP- 0035, BSI-CC-PP-0035-2007, BSI-PP-0035
Certificates
CC-1, CC-2, CC-3, CC-4, CC-5

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, side channel, Side-channel, SPA, DPA, Timing Attack, Malfunction, malfunction, DFA, reverse engineering, JIL
Certification process
out of scope, 10 The Toolbox libraries are additionally supporting software which is out of scope of this 11 certification, ACL 9 Software Libraries . 10 The Toolbox libraries are additionally supporting software which is out of scope of this 11 certification. 12 6 6.2 2025-07-18 Security Target Lite M9905 with optional ACL

Standards
FIPS PUB 197, AIS31, RFC 5639, ISO/IEC 7816-3, ISO/IEC14443-3, CCMB-2022-11-001, CCMB-2022-11-002, CCMB-2022-11-003, CCMB-2022-11-004, CCMB-2022-11-005

File metadata

Keywords Infineon
Author Urian Rainer (IFAG CCS SQM PS)
Pages 67

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

BSI-DSZ-CC-0827

Extracted SARs

ADV_ARC.1, ADV_COMP.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5

Similar certificates

Name Certificate ID
Infineon Technologies Smart Card IC (Security Controller) M9900 A22/G11/C22/D22, M9905 A11, M9906 A11 with optional R... BSI-DSZ-CC-0827-V6-2017 Compare
Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013 or v2.07.003 or v2.09.002, EC v1.02.013 o... BSI-DSZ-CC-0782-V6-2024 Compare
Infineon smart card IC (Security Controller) IFX_CCI_000007h, 000009h, 00000Ah, 00000Bh, 000016h, 000017h, 000018h, 0... BSI-DSZ-CC-0961-V2-2018 Compare
Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware, including the Flash... BSI-DSZ-CC-0891-V6-2021 Compare
Infineon smart card IC (Security Controller) IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 0... BSI-DSZ-CC-0945-V2-2018 Compare
Infineon smart card IC (Security Controller) IFX_CCI_000007h, 000009h, 00000Ah, 00000Bh, 000016h, 000017h, 000018h, 0... BSI-DSZ-CC-0961-V4-2019 Compare
Infineon smart card IC (Security Controller) IFX_CCI_000011h, 00001Bh, 00001Eh, 000025h, design step G12 with optiona... BSI-DSZ-CC-1025-2018 Compare
Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013 or v2.07.003, EC v1.02.013 or v2.07.003, ... BSI-DSZ-CC-0782-V5-2020 Compare
Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013 or v2.07.003, EC v1.02.013 or v2.07.003, ... BSI-DSZ-CC-0782-V4-2018 Compare
Infineon Technologies Security Controller M7793 A12 and G12 with optional RSA2048/4096 v1.02.013 or v2.00.002, EC v1.... BSI-DSZ-CC-0926-V2-2017 Compare
Infineon Security Controller M5073 G11 with optional RSA2048/4096 v2.03.008 or v2.07.003, EC v2.03.008 or v2.07.003, ... BSI-DSZ-CC-0951-V3-2018 Compare
Infineon Security Controller M5073 G11 with optional RSA2048/4096 v2.03.008 or v2.07.003, EC v2.03.008 or v2.07.003, ... BSI-DSZ-CC-0951-V4-2019 Compare
Infineon Technologies Smart Card IC (Security Controller) M9900 A22/G11, M9905 A11, M9906 A11 with optional RSA v1.03... BSI-DSZ-CC-0827-V5-2017 Compare
Infineon Technologies Smart Card IC (Security Controller) M5072 with optional RSA v1.03.006/v2.06.003, EC v1.03.006/ ... BSI-DSZ-CC-0946-V3-2017 Compare
Infineon Technologies Security Controller M7794 A12 / G12 with optional RSA2048/4096v1.02.013 or v2.00.002, EC v1.02.... BSI-DSZ-CC-0964-V4-2019 Compare
Infineon Technologies Security Controller M7794 A12 / G12 with optional RSA2048/4096 v1.02.013 or v2.00.002, EC v1.02... BSI-DSZ-CC-0964-V3-2017 Compare
Infineon Technologies Security Controller M7794 A12 and G12 with optional RSA2048/4096 v1.02.013 or v2.00.002, EC v1.... BSI-DSZ-CC-0964-2015 Compare
Infineon Technologies Security Controller M7794 A12 and G12 with optional RSA2048/4096 v1.02.013 or v2.00.002, EC v1.... BSI-DSZ-CC-0917-2014 Compare
Infineon Technologies Security Controller M7793 A12 and G12 with optional RSA2048/4096 v1.02.010 or v1.02.013 or v2.0... BSI-DSZ-CC-0926-2014 Compare
Infineon smart card IC (Security Controller) M9900 A22 / C22 / D22 / G11, M9905 A11, M9906 A11 with optional Software... BSI-DSZ-CC-0827-V4-2016 Compare
Infineon IFX_CCI_00003Fh IFX_CCI_000059h IFX_CCI_00005Bh IFX_CCI_00003Ch IFX_CCI_00003Dh IFX_CCI_00005Ah design step ... NSCIB-CC-2200060-02-CR Compare
IFX_CCI_00004Fh, IFX_CCI_000050h, IFX_CCI_000051h, IFX_CCI_000052h, IFX_CCI_000053h, IFX_CCI_000054h, IFX_CCI_000055h... BSI-DSZ-CC-1156-V2-2021 Compare
IFX_CCI_00002Dh, IFX_CCI_000039h, IFX_CCI_00003Ah, IFX_CCI_000044h, IFX_CCI_000045h, IFX_CCI_000046h, IFX_CCI_000047h... BSI-DSZ-CC-1107-V2-2021 Compare
Infineon Technologies Security Controller IFX_CCI_001Fh, IFX_CCI_002Fh, IFX_CCI_0030h, IFX_CCI_0033h, IFX_CCI_0035h, ... BSI-DSZ-CC-1102-2019 Compare
Showing 5 out of 24.

Scheme data

Cert Id BSI-DSZ-CC-0827-V10-2025
Product Infineon Technologies Security Controller M9905 A11 with optional ACL v2.07.003 and v2.09.002
Vendor Infineon Technologies AG
Certification Date 04.11.2025
Category Smart Cards and similar devices
Url https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_IC_Cryptolib/0827.html
Enhanced
Product Infineon Technologies Security Controller M9905 A11 with optional ACL v2.07.003 and v2.09.002
Applicant Infineon Technologies AG Melli-Beese-Str. 9 86159 Augsburg
Evaluation Facility TĂśV Informationstechnik GmbH
Assurance Level EAL 5+,ALC_DVS.2,AVA_VAN.5
Protection Profile Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007
Certification Date 04.11.2025
Expiration Date 03.11.2030
Entries [frozendict({'id': 'BSI-DSZ-CC-0827-V10-2025', 'description': 'In comparison to the TOE forerunner, the CC version has been updated to version CC-2022. Moreover, the derivates M9900 A22/C22/D22/G11 and M9906 A11 were removed from the certification scope, and the scope of cryptographic functions has been reduced.'}), frozendict({'id': 'BSI-DSZ-CC-0827-V9-2024', 'description': 'In comparison to the TOE forerunner changes were conducted in TOE documentation (guidance), and the certification scope has been reduced.'}), frozendict({'id': 'BSI-DSZ-CC-0827-V8-2020 (Ausstellungsdatum / Certification Date 06.07.2020, gĂĽltig bis / valid until 05.07.2025)', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-0827-V7-2018 (Ausstellungsdatum / Certification Date 14.09.2018, gĂĽltig bis / valid until 13.09.2023)', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-0827-V6-2017 (Ausstellungsdatum / Certification Date 02.11.2017, gĂĽltig bis / valid until 01.11.2022)', 'description': 'forerunner, the changes comprise the addition of new software library versions and change of the respective guidance documentations.'}), frozendict({'id': 'BSI', 'description': 'design step. Furthermore, adjustments and changes in guidance documentations apply.'}), frozendict({'id': 'BSI-DSZ-CC-0827-V4-2016 (Ausstellungsdatum / Certification Date 23.11.2016, gĂĽltig bis / valid until 22.11.2021)', 'description': 'The changes, compared to the preceding certification, consist of addition of a new configuration as well as addition of optional software libraries.'}), frozendict({'id': 'BSI-DSZ-CC-0827-V3-2015 (Ausstellungsdatum / Certification Date 03.11.2015, gĂĽltig bis / valid until 02.11.2020)', 'description': 'Security Target'}), frozendict({'id': 'BSI-DSZ-CC-0827-V2-2014 (30.04.2014) Zertifizierungsreport / Certification Report Sicherheitsvorgaben / Security Target', 'description': 'in Taiwan.'}), frozendict({'id': 'BSI-DSZ-CC-0827-2013-MA-01 (19.06.2013)', 'description': 'dedicated software'}), frozendict({'id': 'BSI', 'description': 'Security Target'})]
Report Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte08/0827V10c_pdf.pdf?__blob=publicationFile&v=2
Target Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte08/0827V10b_pdf.pdf?__blob=publicationFile&v=2
Description The Target of Evaluation (TOE) is Infineon smart card IC (Security Controller) M9900 A21 with optional Software Libraries RSA2048 v1.03.006 – RSA4096 v1.03.006 – EC v1.03.006 – Toolbox v1.03.006 – FTL v1.01.0008 and with specific IC dedicated software. The TOE provides a real 32-bit CPU-architecture and is compatible to the ARMv7-M instruction set. The major components of the core system are the 32-bit CPU (Central Processing Unit), the Cache system, the MPU (Memory Protection Unit) and MED (Memory Encryption/Decryption Unit. The TOE consists of the hardware part, the firmware parts and the software parts. The software parts are differentiated into: the cryptographic libraries RSA and EC and the supporting libraries Toolbox, Base and FTL. RSA, EC, Toolbox, and FTL provide certain functionality to the Smartcard Embedded Software. This TOE is intended to be used in smart cards for particularly security relevant applications and for its previous use as developing platform for smart card operating systems. The term Smartcard Embedded Software is used in the following for all operating systems and applications stored and executed on the TOE. The TOE is the platform for the Smartcard Embedded Software.
Subcategory ICs, Cryptolib

References

Loading...

Updates Feed

  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V10c_pdf.pdf",
  "dgst": "bd1fa4fd97e8abad",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0827",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL5+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.09.002",
        "2.07.003"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "f6d23054061d72ba"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0827-V8-2020"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0827-V9-2024"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1158-V3-2025",
          "BSI-DSZ-CC-0827",
          "BSI-DSZ-CC-1158-V4-2025",
          "BSI-DSZ-CC-0827-V9-2024",
          "BSI-DSZ-CC-0827-V8-2020",
          "BSI-DSZ-CC-1158-V2-2023",
          "BSI-DSZ-CC-1158-2020"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0827-V6-2017",
          "BSI-DSZ-CC-0827-V5-2017",
          "BSI-DSZ-CC-0827-V3-2015",
          "BSI-DSZ-CC-0827",
          "BSI-DSZ-CC-0791-2012",
          "BSI-DSZ-CC-0827-V9-2024",
          "BSI-DSZ-CC-0827-V8-2020",
          "BSI-DSZ-CC-0827-V2-2014",
          "BSI-DSZ-CC-0827-V4-2016",
          "BSI-DSZ-CC-0827-2013",
          "BSI-DSZ-CC-0827-V7-2018"
        ]
      }
    },
    "scheme_data": {
      "category": "Smart Cards and similar devices",
      "cert_id": "BSI-DSZ-CC-0827-V10-2025",
      "certification_date": "2025-11-04",
      "enhanced": {
        "applicant": "Infineon Technologies AG Melli-Beese-Str. 9 86159 Augsburg",
        "assurance_level": "EAL 5+,ALC_DVS.2,AVA_VAN.5",
        "certification_date": "2025-11-04",
        "description": "The Target of Evaluation (TOE) is Infineon smart card IC (Security Controller) M9900 A21 with optional Software Libraries RSA2048 v1.03.006 \u2013 RSA4096 v1.03.006 \u2013 EC v1.03.006 \u2013 Toolbox v1.03.006 \u2013 FTL v1.01.0008 and with specific IC dedicated software. The TOE provides a real 32-bit CPU-architecture and is compatible to the ARMv7-M instruction set. The major components of the core system are the 32-bit CPU (Central Processing Unit), the Cache system, the MPU (Memory Protection Unit) and MED (Memory Encryption/Decryption Unit. The TOE consists of the hardware part, the firmware parts and the software parts. The software parts are differentiated into: the cryptographic libraries RSA and EC and the supporting libraries Toolbox, Base and FTL. RSA, EC, Toolbox, and FTL provide certain functionality to the Smartcard Embedded Software. This TOE is intended to be used in smart cards for particularly security relevant applications and for its previous use as developing platform for smart card operating systems. The term Smartcard Embedded Software is used in the following for all operating systems and applications stored and executed on the TOE. The TOE is the platform for the Smartcard Embedded Software.",
        "entries": [
          {
            "description": "In comparison to the TOE forerunner, the CC version has been updated to version CC-2022. Moreover, the derivates M9900 A22/C22/D22/G11 and M9906 A11 were removed from the certification scope, and the scope of cryptographic functions has been reduced.",
            "id": "BSI-DSZ-CC-0827-V10-2025"
          },
          {
            "description": "In comparison to the TOE forerunner changes were conducted in TOE documentation (guidance), and the certification scope has been reduced.",
            "id": "BSI-DSZ-CC-0827-V9-2024"
          },
          {
            "description": "Certificate",
            "id": "BSI-DSZ-CC-0827-V8-2020 (Ausstellungsdatum / Certification Date 06.07.2020, g\u00fcltig bis / valid until 05.07.2025)"
          },
          {
            "description": "Certificate",
            "id": "BSI-DSZ-CC-0827-V7-2018 (Ausstellungsdatum / Certification Date 14.09.2018, g\u00fcltig bis / valid until 13.09.2023)"
          },
          {
            "description": "forerunner, the changes comprise the addition of new software library versions and change of the respective guidance documentations.",
            "id": "BSI-DSZ-CC-0827-V6-2017 (Ausstellungsdatum / Certification Date 02.11.2017, g\u00fcltig bis / valid until 01.11.2022)"
          },
          {
            "description": "design step. Furthermore, adjustments and changes in guidance documentations apply.",
            "id": "BSI"
          },
          {
            "description": "The changes, compared to the preceding certification, consist of addition of a new configuration as well as addition of optional software libraries.",
            "id": "BSI-DSZ-CC-0827-V4-2016 (Ausstellungsdatum / Certification Date 23.11.2016, g\u00fcltig bis / valid until 22.11.2021)"
          },
          {
            "description": "Security Target",
            "id": "BSI-DSZ-CC-0827-V3-2015 (Ausstellungsdatum / Certification Date 03.11.2015, g\u00fcltig bis / valid until 02.11.2020)"
          },
          {
            "description": "in Taiwan.",
            "id": "BSI-DSZ-CC-0827-V2-2014 (30.04.2014) Zertifizierungsreport / Certification Report Sicherheitsvorgaben / Security Target"
          },
          {
            "description": "dedicated software",
            "id": "BSI-DSZ-CC-0827-2013-MA-01 (19.06.2013)"
          },
          {
            "description": "Security Target",
            "id": "BSI"
          }
        ],
        "evaluation_facility": "T\u00dcV Informationstechnik GmbH",
        "expiration_date": "2030-11-03",
        "product": "Infineon Technologies Security Controller M9905 A11 with optional ACL v2.07.003 and v2.09.002",
        "protection_profile": "Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007",
        "report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte08/0827V10c_pdf.pdf?__blob=publicationFile\u0026v=2",
        "target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte08/0827V10b_pdf.pdf?__blob=publicationFile\u0026v=2"
      },
      "product": "Infineon Technologies Security Controller M9905 A11 with optional ACL v2.07.003 and v2.09.002",
      "subcategory": "ICs, Cryptolib",
      "url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_IC_Cryptolib/0827.html",
      "vendor": "Infineon Technologies AG"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Infineon Technologies AG",
  "manufacturer_web": "https://www.infineon.com/",
  "name": "Infineon Technologies Security Controller M9905 A11 with optional ACL v2.07.003 and v2.09.002",
  "not_valid_after": "2030-11-04",
  "not_valid_before": "2025-11-04",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "0827V10c_pdf.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0035-2007": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1,
          "ALC_FLR": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 5": 2,
          "EAL 5 augmented": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon Technologies": 1,
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Federal Office for Information Security",
      "/Keywords": "Common Criteria, Certification, Zertifizierung",
      "/Subject": "Common Criteria, Certification, Zertifizierung",
      "/Title": "Certificate BSI-DSZ-CC-0827-V10-2025",
      "pdf_file_size_bytes": 233413,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "0827V10a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5 valid until: 3 November 2030 SOGIS Recognition Agreement",
        "cc_version": "PP conformant Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-0827-V10-2025",
        "cert_item": "Infineon Technologies Security Controller M9905 A11 with optional ACL v2.07.003 and v2.09.002",
        "cert_lab": "BSI",
        "developer": "Infineon Technologies AG",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 4
          },
          "ECDH": {
            "ECDH": 1
          },
          "ECDSA": {
            "ECDSA": 2
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0827-V9-2024": 3
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0035-2007": 2
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.5": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 5,
          "ALC_FLR": 3,
          "ALC_LCD.1": 1,
          "ALC_TAT.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 2,
          "EAL 2+": 1,
          "EAL 4": 1,
          "EAL 5": 8,
          "EAL 5 augmented": 3,
          "EAL5": 1,
          "EAL5 augmented": 1,
          "EAL5+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "2, 2025-09-26, T\u00dcV Informationstechnik GmbH (confidential document) [12] \u201cSite Technical Audit Report (STAR) DNP Photomask Europe S.p.A., Agrate, Italy\u201d, version 1": 1,
          "Including optional Software Libraries \u2013 EC\u201d, Version 2.2, 2025-10-21, Infineon (confidential document) 22 / 25 BSI-DSZ-CC-0827-V10-2025 Certification Report C. Excerpts from the Criteria For the": 1,
          "REPORT SUMMARY (ETR SUMMARY)\u201d, T\u00dcV Informationstechnik GmbH, (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC- PP-0035-2007 [8": 1,
          "T\u00dcV Informationstechnik GmbH (confidential document) [13] \u201cImpact Analysis for Common Criteria with Evaluation Assurance Level EAL5 augmented (EAL5+": 1,
          "Version 6.2, 2025-07-18, \u201cSecurity Target M9905 with optional ACL Software Libraries\u201d, Infineon (confidential document) [6] Evaluation Technical Report, BSI-DSZ-CC-0827-V10-2025, Version 3, 2025-09-26, \u201cEVALUATION": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
          "including optional Software Libraries EC\u201d, Infineon (confidential document) [11] \u201cSite Technical Audit Report (STAR) Infineon Technologies IT Services GmbH, Klagenfurt": 1,
          "\u201cEVALUATION TECHNICAL REPORT FOR COMPOSITE EVALUATION (ETR COMP)\u201d, T\u00dcV Informationstechnik GmbH (confidential document) [10] Configuration list for the TOE, Version 1.6, 2025-06-23, \u201cConfiguration Management Scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "ECB": {
          "ECB": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 6
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 1,
          "SPA": 1,
          "physical probing": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 34": 1,
          "AIS 35": 1,
          "AIS 36": 1,
          "AIS31": 1
        },
        "FIPS": {
          "FIPS186-4": 6,
          "FIPS197": 1
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4,
          "ISO/IEC 7816-3": 1
        },
        "RFC": {
          "RFC5639": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 3
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1,
            "Triple-DES": 2
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-02102": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 5,
          "Infineon Technologies": 9,
          "Infineon Technologies AG": 8
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Federal Office for Information Security",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung\"",
      "/Subject": "Common Criteria, Certification, Zertifizierung",
      "/Title": "Certification Report BSI-DSZ-CC-0827-V10-2025",
      "pdf_file_size_bytes": 392203,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 25
    },
    "st_filename": "0827V10b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 43
          },
          "ECDH": {
            "ECDH": 5
          },
          "ECDSA": {
            "ECDSA": 12
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 6
          },
          "DSA": {
            "DSA": 2
          }
        }
      },
      "cc_cert_id": {
        "NL": {
          "CC-1": 4,
          "CC-2": 17,
          "CC-3": 3,
          "CC-4": 2,
          "CC-5": 2
        }
      },
      "cc_claims": {
        "O": {
          "O.RND": 1
        },
        "T": {
          "T.RND": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0035-2007": 1,
          "BSI-PP- 0035": 1,
          "BSI-PP-0035": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 2,
          "ADV_COMP.1": 1,
          "ADV_FSP": 1,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 2,
          "ADV_IMP.1": 2,
          "ADV_INT.2": 2,
          "ADV_TDS.3": 1,
          "ADV_TDS.4": 2
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS": 1,
          "ALC_CMS.4": 1,
          "ALC_CMS.5": 3,
          "ALC_DEL.1": 1,
          "ALC_DVS": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 9,
          "ALC_LCD.1": 1,
          "ALC_TAT": 2,
          "ALC_TAT.1": 1,
          "ALC_TAT.2": 3
        },
        "ASE": {
          "ASE_CCL": 3,
          "ASE_CCL.1": 1,
          "ASE_ECD": 2,
          "ASE_ECD.1": 1,
          "ASE_INT": 3,
          "ASE_INT.1": 1,
          "ASE_OBJ": 2,
          "ASE_OBJ.2": 1,
          "ASE_REQ": 3,
          "ASE_REQ.2": 1,
          "ASE_SPD": 2,
          "ASE_SPD.1": 1,
          "ASE_TSS": 2,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.2": 1,
          "ATE_DPT.3": 4,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 11
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 4,
          "EAL5": 6,
          "EAL5 augmented": 2,
          "EAL5+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_SAS": 5,
          "FAU_SAS.1": 8,
          "FAU_SAS.1.1": 1
        },
        "FCS": {
          "FCS_CKM": 8,
          "FCS_CKM.1": 21,
          "FCS_CKM.2": 4,
          "FCS_CKM.4": 3,
          "FCS_CKM.5": 17,
          "FCS_CKM.6": 19,
          "FCS_COP": 32,
          "FCS_COP.1": 23,
          "FCS_RBG.1": 4,
          "FCS_RNG": 4,
          "FCS_RNG.1": 13,
          "FCS_RNG.1.1": 1,
          "FCS_RNG.1.2": 1
        },
        "FDP": {
          "FDP_ACC.1": 23,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 19,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 14,
          "FDP_ITC.1": 11,
          "FDP_ITC.2": 11,
          "FDP_ITT.1": 11,
          "FDP_PHP.3": 1,
          "FDP_SDI.1": 17,
          "FDP_SDI.1.1": 1,
          "FDP_SDI.2": 14,
          "FDP_SDI.2.1": 2,
          "FDP_SDI.2.2": 2
        },
        "FMT": {
          "FMT_LIM": 2,
          "FMT_LIM.1": 13,
          "FMT_LIM.1.1": 1,
          "FMT_LIM.2": 12,
          "FMT_LIM.2.1": 1,
          "FMT_MSA": 2,
          "FMT_MSA.1": 16,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 18,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_SMF": 1,
          "FMT_SMF.1": 14,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 6
        },
        "FPT": {
          "FPT_FLS": 1,
          "FPT_FLS.1": 18,
          "FPT_ITT.1": 13,
          "FPT_PHP.3": 14,
          "FPT_TST": 5,
          "FPT_TST.1": 12,
          "FPT_TST.2": 36,
          "FPT_TST.2.1": 2
        },
        "FRU": {
          "FRU_FLT.2": 8
        }
      },
      "certification_process": {
        "OutOfScope": {
          " 10 The Toolbox libraries are additionally supporting software which is out of scope of this 11 certification": 1,
          "ACL 9 Software Libraries . 10 The Toolbox libraries are additionally supporting software which is out of scope of this 11 certification. 12 6 6.2 2025-07-18 Security Target Lite M9905 with optional ACL": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        },
        "ECB": {
          "ECB": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Generic": {
          "Crypto Library 38": 1
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 3
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 2,
          "RNG": 11
        },
        "TRNG": {
          "TRNG": 14
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 5,
          "Malfunction": 12,
          "malfunction": 1
        },
        "SCA": {
          "DPA": 5,
          "Leak-Inherent": 10,
          "Physical Probing": 2,
          "SPA": 4,
          "Side-channel": 1,
          "Timing Attack": 1,
          "physical probing": 1,
          "side channel": 5
        },
        "other": {
          "JIL": 2,
          "reverse engineering": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 6
        },
        "CC": {
          "CCMB-2022-11-001": 2,
          "CCMB-2022-11-002": 2,
          "CCMB-2022-11-003": 2,
          "CCMB-2022-11-004": 2,
          "CCMB-2022-11-005": 1
        },
        "FIPS": {
          "FIPS PUB 197": 1
        },
        "ISO": {
          "ISO/IEC 7816-3": 1,
          "ISO/IEC14443-3": 1
        },
        "RFC": {
          "RFC 5639": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 20
          }
        },
        "DES": {
          "3DES": {
            "3DES": 12,
            "TDEA": 1,
            "Triple-DES": 3
          },
          "DES": {
            "DES": 5
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SSC": 4
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 7,
          "Infineon Technologies": 7,
          "Infineon Technologies AG": 13
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Urian Rainer (IFAG CCS SQM PS)",
      "/Keywords": "Infineon",
      "pdf_file_size_bytes": 1052345,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.ietf.org/rfc/rfc5639.txt",
          "mailto:[email protected]",
          "http://www.infineon.com/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 67
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V10a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_DVS.2",
      "EAL5+",
      "AVA_VAN.5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V10b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "dbb14609a0d775b418e30e7c9d7b964cc4a9222b01a01398a24a510f34fe1168",
      "txt_hash": "1a844fa4e426e9f61a787b12ea6289af3df1efd951ec2782ce9989456de9e491"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "b8e2360d48cf99b5c2e824f67b0139eb92efa2c92924815ed0e8766be50f2284",
      "txt_hash": "d39163bf6b98024af9d08e4c2480f7f4dd24192f18075fcabbb5033eb4f18528"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "0e99a00d91fa2cdf07e760b288bdaee474d94cf2bec21dd90e6af9dbe0953227",
      "txt_hash": "9e15bafb0daceab4dae8d79af7c803e6b0f853d6d1427807c9df35806cb26ed6"
    }
  },
  "status": "active"
}