This page was not yet optimized for use on mobile
devices.
Aventra MyEID PKI Smart Card, version 5.0.0
CSV information
| Status | active |
|---|---|
| Valid from | 25.02.2026 |
| Valid until | 25.02.2031 |
| Scheme | 🇩🇪 DE |
| Manufacturer | Aventra Oy |
| Category | Products for Digital Signatures |
| Security level | EAL4+, AVA_VAN.5 |
| Protection profiles |
Heuristics summary
Certificate ID: BSI-DSZ-CC-1200-2026
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Security level
EAL 4, EAL 5, EAL 2, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR, AVA_VAN.5Protection profiles
BSI-CC-PP-0059-2009-MA-02, BSI-CC-PP-0075-2012-MA-01Certificates
BSI-DSZ-CC-1200-2026Standards
ISO/IEC 15408, ISO/IEC 18045Certification report
Extracted keywords
Symmetric Algorithms
AES, CMACAsymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DSASchemes
MAC, Key Exchange, Key AgreementProtocols
TLSRandomness
RNGElliptic Curves
P-256, P-384, P-521, brainpoolP256r1, brainpoolP256t1, brainpoolP320r1, brainpoolP320t1, brainpoolP384r1, brainpoolP384t1, brainpoolP512r1, brainpoolP512t1Block cipher modes
ECB, CBCOperating System name
JCOP4, JCOP 4Vendor
NXP, NXP Semiconductors, MicrosoftSecurity level
EAL 4, EAL 5, EAL 2, EAL 1, EAL4+, EAL6+, EAL 4 augmentedSecurity Assurance Requirements (SAR)
AGD_OPE, AGD_PRE, ALC_FLR, ALC_CMS, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ALC_COMP.1, AVA_VAN.5, AVA_VANSecurity Functional Requirements (SFR)
FCS_CKM.1.1, FCS_COP.1, FCS_COP.1.1, FCS_CKM.1, FDP_UCT.1, FTP_ITC.1Protection profiles
BSI-CC-PP-0059-2009-MA-02, BSI-CC-PP-0075-2012-MA-01Certificates
BSI-DSZ-CC-1200-2026, BSI-DSZ-CC-1136-V5-2026, BSI-DSZ-CC-1200, NSCIB-CC-2300127-02, NSCIB-CC-2300172-02Evaluation facilities
SGS, SGS Brightsight, Brightsight, TÜV InformationstechnikSide-channel analysis
fault injection, JILCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, BSI-DSZ-CC-1200, Aventra MyEID PKI Smart Card, version 5.0.0, SGS Digital Trust Services GmbH, (confidential document). [7] EN 419211-2:2013 - Protection profiles for secure signature creation device - Part 2: DeviceStandards
FIPS 186-5, FIPS 197, FIPS PUB 186-5, PKCS#1, PKCS#7, AIS 26, AIS 46, AIS 37, AIS 36, AIS 1, AIS 14, AIS 19, AIS 23, AIS 32, RFC 5639, RFC8017, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, x.509Technical reports
BSI TR-02102-1File metadata
| Title | Certification Report BSI-DSZ-CC-1200-2026 |
|---|---|
| Subject | Common Criteria, Certification, Zertifizierung, Smartcard, SSCD, QSCD, eIDAS, Aventra, MyEID |
| Keywords | "Common Criteria, Certification, Zertifizierung, Smartcard, SSCD, QSCD, eIDAS, Aventra, MyEID" |
| Author | Federal Office for Information Security |
| Pages | 29 |
Frontpage
| Certificate ID | BSI-DSZ-CC-1200-2026 |
|---|---|
| Certified item | Aventra MyEID PKI Smart Card, version 5.0.0 |
| Certification lab | BSI |
| Developer | Aventra Oy |
References
Outgoing- NSCIB-CC-2300127-02-CR - active - NXP JCOP 4.5 P71
- BSI-DSZ-CC-1136-V5-2026 - active - NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4)
- NSCIB-CC-2300172-02-CR - active - NXP JCOP 4 P71 Versions: JCOP 4 P71 v4.7 R1.00.4, JCOP 4 P71 v4.7 R1.01.4, JCOP 4 P71 v4.7 R1.02.4, JCOP 4 SE050 v4.7 R2.00.11, JCOP 4 SE050 v4.7 R2.03.11
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, 3DES, Triple-DES, TripleDESAsymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-HellmanSchemes
Key Agreement, Key agreementProtocols
TLS, PACERandomness
RNG, RNDElliptic Curves
P-256, P-384, P-521, brainpoolP320r1, brainpoolP320t1, brainpoolP256r1, brainpoolP256t1, brainpoolP384r1, brainpoolP384t1, brainpoolP512r1, brainpoolP512t1Block cipher modes
ECB, CBC, CCMJavaCard versions
Java Card 3.0.5Operating System name
JCOP4, JCOP 4Trusted Execution Environments
SEVendor
NXP, MicrosoftSecurity level
EAL4+, EAL6+, EAL4, EAL6, EAL4 augmentedClaims
T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.MODULE_EXEC, T.RESOURCES, T.UNAUTHORIZED_CARD_MNGT, T.COM_EXPLOIT, T.LIFE_CYCLE, T.OBJ-DELETION, T.PHYSICAL, T.OS_OPERATE, T.RND, T.CONFIG, T.SEC_BOX_BORDER, T.MODULE_REPLACEMENT, T.ATTACK-COUNTER, A.CGA, A.SCA, A.CSP, A.APPLET, A.VERIFICATION, A.USE_DIAG, A.USE_KEYS, A.PROCESS-SEC-ID, A.APPS-PROVIDER, A.VERIFICATION-AUTHORITY, OT.SCD_AUTH_IMP, OE.HID_VAD, OE.APPLET, OE.VERIFICATION, OE.CODE-EVIDENCE, OE.APPS-PROVIDER, OE.VERIFICATION-, OE.KEY-CHANGE, OE.SECURITY-DOMAINS, OE.USE_DIAG, OE.USE_KEYS, OE.PROCESS_SEC_IC, OSP.VERIFICATION, OSP.PROCESS-TOE, OSP.KEY-CHANGE, OSP.SECURITY-DOMAINS, OSP.SECURE-BOXSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, AVA_VAN, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FCO_NRO.2, FCS_CKM.4, FCS_COP.1.2, FCS_COP.1.1, FCS_CKM.6, FCS_COP.1, FCS_CKM.3, FCS_CKM.1, FCS_CKM.3.1, FCS_COP, FCS_RNG.1, FCS_CKM.2, FCS_CKM.5, FCS_RBG.1, FCS_CKM.1.1, FCS_CKM.6.1, FCS_CKM.6.2, FCS_CKM, FDP_ITC.1.3, FDP_ACF.1, FDP_ACC.2, FDP_IFC.1, FDP_IFF.1, FDP_RIP.1, FDP_ROL.1, FDP_SDI.2, FDP_SDI, FDP_RIP.1.1, FDP_UIT.1, FDP_ITC.2, FDP_ACC.1, FDP_MSA.3, FDP_IFC.2, FDP_ITC.1, FDP_ACC, FDP_ACF, FDP_SDI.1, FDP_ITC, FDP_UCT, FDP_UCT.1, FDP_AFC, FIA_UAU.1, FIA_UID.1, FIA_ATD.1, FIA_UID.2, FIA_USB.1, FIA_UAU.4, FIA_AFL.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_AFL.1.1, FIA_AFL.1.2, FMT_MSA.1, FMT_MSA.3, FMT_MSA.2, FMT_IFC.1, FMT_SMF.1, FMT_SMR.1, FMT_MTD.1, FMT_MTD.3, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4, FMT_MSA.4.1, FMT_MTD, FPR_UNO.1, FPT_PHP.3.1, FPT_FLS.1.1, FPT_EMS.1, FPT_FLS.1, FPT_TDC.1, FPT_RCV.3, FPT_PHP.3, FPT_TST.1, FPT_EMS.1.1, FPT_TST, FPT_PHP.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTP_ITC.1, FTP_TRP.1, FTP_ITC, FTP_ICTProtection profiles
BSI-CC-PP-0059-2009-MA-02, BSI-CC-PP-0075-2012-MA-01Certificates
NSCIB-CC-2300172-01-CR, NSCIB-CC-2300172-02, NSCIB-CC-2300172-02-CR, NSCIB-2300172-02Side-channel analysis
side-channel, Physical Tampering, physical tampering, DFA, fault injectionCertification process
out of scope, accordingly. - Removed 3DES C/R pins from description of SS.User Authentication. This is now out of scope of certification. - Corrected incomplete marking of a selection in FDP_ACF.1.2/SVD_Transfer 1.12, 1. The TOE frame and modules The blue dashed line is the boundary of the TOE. Other applets are out of scope of certification. The blue and grey boxes (Java Card OS, Crypto Library and Micro Controller and, *While Triple-DES based challenge/response authentication is supported by the TOE, this feature is out of scope of the certified functionality. This is mentioned in the user guidanceStandards
FIPS 186-5, FIPS197, FIPS PUB 197, SP 800-38A, PKCS#1, PKCS #7, PKCS11, PKCS #11, PKCS#11, PKCS#7, RFC 2437, RFC 3447, RFC 5652, RFC 1851, RFC 5639, ISO/IEC 15408, ISO/IEC 14888-3, x.509, CCMB-2022-11-002, CCMB-2022-11-003, CCMB-2022-11-004, CCMB-2022-11-005, CCMB-2022-11-006File metadata
| Title | Aventra MyEID PKI Smart Card Security Target |
|---|---|
| Author | MJ;HH |
| Pages | 89 |
References
Outgoing- NSCIB-CC-2300172-02-CR - active - NXP JCOP 4 P71 Versions: JCOP 4 P71 v4.7 R1.00.4, JCOP 4 P71 v4.7 R1.01.4, JCOP 4 P71 v4.7 R1.02.4, JCOP 4 SE050 v4.7 R2.00.11, JCOP 4 SE050 v4.7 R2.03.11
- NSCIB-CC-2300172-01-CR - active - NXP JCOP 4 P71 v4.7 R1.00.4, JCOP 4 P71 v4.7 R1.01.4, JCOP 4 P71 v4.7 R1.02.4, JCOP 4 SE050 v4.7 R2.00.11, JCOP 4 SE050 v4.7 R2.03.11
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-1200-2026Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_COMP.1, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.2, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Scheme data
| Cert Id | BSI-DSZ-CC-1200-2026 | |
|---|---|---|
| Product | Aventra MyEID PKI Smart Card, version 5.0.0 | |
| Vendor | Aventra Oy | |
| Certification Date | 25.02.2026 | |
| Category | Digital signature | |
| Url | https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Digitale_Signatur-Sichere_Signaturerstellungseinheiten/1200.html | |
| Enhanced | ||
| Product | Aventra MyEID PKI Smart Card, version 5.0.0 | |
| Applicant | Aventra Oy Kutomotie 16 00380 Helsinki Finland | |
| Evaluation Facility | SGS Digital Trust Services GmbH | |
| Assurance Level | EAL4+,AVA_VAN.5 | |
| Protection Profile | EN 419211-2:2013 - Protection profiles for secure signature creation device - Part 2: Device with key generation, 18 May 2013, BSI-CC-PP-0059-2009-MA-02EN 419211-3:2013 - Protection profiles for secure signature creation device - Part 3: Device with key import, 14 September 2013, BSI-CC-PP-0075-2012-MA-01 | |
| Certification Date | 25.02.2026 | |
| Expiration Date | 24.02.2031 | |
| Entries | [frozendict({'id': 'EN'}), frozendict({'id': 'EN'})] | |
| Cert Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1200c_pdf.pdf?__blob=publicationFile&v=4 | |
| Report Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1200a_pdf.pdf?__blob=publicationFile&v=4 | |
| Target Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1200b_pdf.pdf?__blob=publicationFile&v=3 | |
| Description | The Target of evaluation (TOE) is the product „Aventra MyEID PKI Smart Card, version 5.0.0 “ by the vendor Aventra Oy. It is a composite product consisting of Aventra’s „MyEID“ Java Card applet version 5.0.0 running ontop of the Common Criteria certified NXP JCOP4 Java Card operating system JCOP 4 P71 v4.7 R1.01.4 and JCOP 4 P71 v4.7 R1.02.4 (NSCIB-CC-2300172-02) which itself comprises a Common Criteria certified NXP IC (BSI-DSZ-CC-1136-V5-2026). The TOE is primarily used for authenticating users or devices and ensuring confidentiality of data in public key infrastructure. The main features of the TOE are calculating digital signatures, deciphering data and storing cryptographic keys in a secure way. | |
| Subcategory | Secure Signature Creation Devices (SSCD) | |
References
Loading...
Updates Feed
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Products for Digital Signatures",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1200c_pdf.pdf",
"dgst": "36eba6f8fe516013",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-1200-2026",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"5.0.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"27abdb9c6ab375a7",
"d918b28fd7bb5d79"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1136-V5-2026",
"NSCIB-CC-2300172-02-CR",
"NSCIB-CC-2300127-02-CR"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"NSCIB-CC-2300127-02-CR",
"BSI-DSZ-CC-1136-V4-2024",
"BSI-DSZ-CC-1136-V3-2022",
"BSI-DSZ-CC-1136-2021",
"BSI-DSZ-CC-1149-V3-2023",
"BSI-DSZ-CC-1136-V5-2026",
"BSI-DSZ-CC-1149-V4-2025",
"BSI-DSZ-CC-1149-2022",
"BSI-DSZ-CC-1149-V2-2023",
"BSI-DSZ-CC-1136-V2-2022",
"NSCIB-CC-2300172-02-CR"
]
}
},
"scheme_data": {
"category": "Digital signature",
"cert_id": "BSI-DSZ-CC-1200-2026",
"certification_date": "2026-02-25",
"enhanced": {
"applicant": "Aventra Oy Kutomotie 16 00380 Helsinki Finland",
"assurance_level": "EAL4+,AVA_VAN.5",
"cert_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1200c_pdf.pdf?__blob=publicationFile\u0026v=4",
"certification_date": "2026-02-25",
"description": "The Target of evaluation (TOE) is the product \u201eAventra MyEID PKI Smart Card, version 5.0.0 \u201c by the vendor Aventra Oy. It is a composite product consisting of Aventra\u2019s \u201eMyEID\u201c Java Card applet version 5.0.0 running ontop of the Common Criteria certified NXP JCOP4 Java Card operating system JCOP 4 P71 v4.7 R1.01.4 and JCOP 4 P71 v4.7 R1.02.4 (NSCIB-CC-2300172-02) which itself comprises a Common Criteria certified NXP IC (BSI-DSZ-CC-1136-V5-2026). The TOE is primarily used for authenticating users or devices and ensuring confidentiality of data in public key infrastructure. The main features of the TOE are calculating digital signatures, deciphering data and storing cryptographic keys in a secure way.",
"entries": [
{
"id": "EN"
},
{
"id": "EN"
}
],
"evaluation_facility": "SGS Digital Trust Services GmbH",
"expiration_date": "2031-02-24",
"product": "Aventra MyEID PKI Smart Card, version 5.0.0",
"protection_profile": "EN 419211-2:2013 - Protection profiles for secure signature creation device - Part 2: Device with key generation, 18 May 2013, BSI-CC-PP-0059-2009-MA-02EN 419211-3:2013 - Protection profiles for secure signature creation device - Part 3: Device with key import, 14 September 2013, BSI-CC-PP-0075-2012-MA-01",
"report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1200a_pdf.pdf?__blob=publicationFile\u0026v=4",
"target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1200b_pdf.pdf?__blob=publicationFile\u0026v=3"
},
"product": "Aventra MyEID PKI Smart Card, version 5.0.0",
"subcategory": "Secure Signature Creation Devices (SSCD)",
"url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Digitale_Signatur-Sichere_Signaturerstellungseinheiten/1200.html",
"vendor": "Aventra Oy"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"NSCIB-CC-2300172-01-CR",
"NSCIB-CC-2300172-02-CR"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"NSCIB-CC-2300172-01-CR",
"BSI-DSZ-CC-1136-V4-2024",
"NSCIB-CC-2300172-02-CR",
"BSI-DSZ-CC-1136-V5-2026"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Aventra Oy",
"manufacturer_web": "https://www.aventra.fi",
"name": "Aventra MyEID PKI Smart Card, version 5.0.0",
"not_valid_after": "2031-02-25",
"not_valid_before": "2026-02-25",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "1200c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1200-2026": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0059-2009-MA-02": 1,
"BSI-CC-PP-0075-2012-MA-01": 1
}
},
"cc_sar": {
"ALC": {
"ALC_FLR": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL 5": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "1200a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by AVA_VAN.5 valid until: 24 February 2031 SOGIS Recognition Agreement",
"cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 conformant",
"cert_id": "BSI-DSZ-CC-1200-2026",
"cert_item": "Aventra MyEID PKI Smart Card, version 5.0.0",
"cert_lab": "BSI",
"developer": "Aventra Oy",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "EN 419211-2:2013 - Protection profiles for secure signature creation device - Part 2: Device with key generation, BSI-CC-PP-0059-2009-MA-02, EN 419211-3:2013 - Protection profiles for secure signature creation device - Part 3: Device with key import, BSI-CC-PP-0075-2012-MA-01"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 8
},
"ECDH": {
"ECDH": 4
},
"ECDSA": {
"ECDSA": 2
}
},
"FF": {
"DH": {
"Diffie-Hellman": 1
},
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1136-V5-2026": 5,
"BSI-DSZ-CC-1200": 1,
"BSI-DSZ-CC-1200-2026": 16
},
"NL": {
"NSCIB-CC-2300127-02": 3,
"NSCIB-CC-2300172-02": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0059-2009-MA-02": 3,
"BSI-CC-PP-0075-2012-MA-01": 3
}
},
"cc_sar": {
"AGD": {
"AGD_OPE": 2,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS": 1,
"ALC_CMS.4": 1,
"ALC_COMP.1": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR": 3,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 3,
"EAL 4": 5,
"EAL 4 augmented": 3,
"EAL 5": 4,
"EAL4+": 2,
"EAL6+": 1
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM.1": 1,
"FCS_CKM.1.1": 1,
"FCS_COP.1": 3,
"FCS_COP.1.1": 7
},
"FDP": {
"FDP_UCT.1": 1
},
"FTP": {
"FTP_ITC.1": 2
}
},
"certification_process": {
"ConfidentialDocument": {
"BSI-DSZ-CC-1200, Aventra MyEID PKI Smart Card, version 5.0.0, SGS Digital Trust Services GmbH, (confidential document). [7] EN 419211-2:2013 - Protection profiles for secure signature creation device - Part 2: Device": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"ECB": {
"ECB": 4
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 1
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"KEX": {
"Key Exchange": 1
},
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {
"Brainpool": {
"brainpoolP256r1": 3,
"brainpoolP256t1": 3,
"brainpoolP320r1": 3,
"brainpoolP320t1": 3,
"brainpoolP384r1": 3,
"brainpoolP384t1": 3,
"brainpoolP512r1": 3,
"brainpoolP512t1": 3
},
"NIST": {
"P-256": 6,
"P-384": 6,
"P-521": 6
}
},
"eval_facility": {
"BrightSight": {
"Brightsight": 1
},
"SGS": {
"SGS": 4,
"SGS Brightsight": 1
},
"TUV": {
"T\u00dcV Informationstechnik": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"JCOP": {
"JCOP 4": 19,
"JCOP4": 1
}
},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"fault injection": 1
},
"other": {
"JIL": 2
}
},
"standard_id": {
"BSI": {
"AIS 1": 1,
"AIS 14": 1,
"AIS 19": 1,
"AIS 23": 1,
"AIS 26": 3,
"AIS 32": 1,
"AIS 36": 2,
"AIS 37": 2,
"AIS 46": 3
},
"FIPS": {
"FIPS 186-5": 3,
"FIPS 197": 4,
"FIPS PUB 186-5": 1
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
},
"PKCS": {
"PKCS#1": 9,
"PKCS#7": 2
},
"RFC": {
"RFC 5639": 4,
"RFC8017": 5
},
"X509": {
"x.509": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 8
}
},
"constructions": {
"MAC": {
"CMAC": 1
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-02102-1": 2
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 1
},
"NXP": {
"NXP": 7,
"NXP Semiconductors": 2
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Federal Office for Information Security",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Smartcard, SSCD, QSCD, eIDAS, Aventra, MyEID\"",
"/Subject": "Common Criteria, Certification, Zertifizierung, Smartcard, SSCD, QSCD, eIDAS, Aventra, MyEID",
"/Title": "Certification Report BSI-DSZ-CC-1200-2026",
"pdf_file_size_bytes": 447357,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.sogis.eu/",
"https://www.iso.org/standard/72913.html",
"https://www.bsi.bund.de/zertifizierung",
"https://www.bsi.bund.de/AIS",
"https://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/dok/Zertifizierung-Gesamtlisten",
"https://www.commoncriteriaportal.org/cc/index.cfm",
"https://www.iso.org/standard/72889.html",
"https://www.iso.org/standard/72906.html",
"https://www.iso.org/standard/72917.html",
"https://www.iso.org/standard/72892.html",
"https://www.iso.org/standard/72891.html",
"https://standards.iso.org/ittf/PubliclyAvailableStandards/index.html"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 29
},
"st_filename": "1200b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 23
},
"ECDH": {
"ECDH": 11
},
"ECDSA": {
"ECDSA": 3
}
},
"FF": {
"DH": {
"Diffie-Hellman": 1
}
}
},
"cc_cert_id": {
"NL": {
"NSCIB-2300172-02": 1,
"NSCIB-CC-2300172-01-CR": 1,
"NSCIB-CC-2300172-02": 2,
"NSCIB-CC-2300172-02-CR": 1
}
},
"cc_claims": {
"A": {
"A.APPLET": 1,
"A.APPS-PROVIDER": 1,
"A.CGA": 4,
"A.CSP": 3,
"A.PROCESS-SEC-ID": 1,
"A.SCA": 4,
"A.USE_DIAG": 1,
"A.USE_KEYS": 1,
"A.VERIFICATION": 1,
"A.VERIFICATION-AUTHORITY": 1
},
"OE": {
"OE.APPLET": 1,
"OE.APPS-PROVIDER": 1,
"OE.CODE-EVIDENCE": 1,
"OE.HID_VAD": 4,
"OE.KEY-CHANGE": 1,
"OE.PROCESS_SEC_IC": 1,
"OE.SECURITY-DOMAINS": 1,
"OE.USE_DIAG": 1,
"OE.USE_KEYS": 1,
"OE.VERIFICATION": 1,
"OE.VERIFICATION-": 1
},
"OSP": {
"OSP.KEY-CHANGE": 1,
"OSP.PROCESS-TOE": 1,
"OSP.SECURE-BOX": 1,
"OSP.SECURITY-DOMAINS": 1,
"OSP.VERIFICATION": 1
},
"OT": {
"OT.SCD_AUTH_IMP": 1
},
"T": {
"T.ATTACK-COUNTER": 1,
"T.COM_EXPLOIT": 1,
"T.CONFID-APPLI-DATA": 1,
"T.CONFID-JCS-CODE": 1,
"T.CONFID-JCS-DATA": 1,
"T.CONFIG": 1,
"T.EXE-CODE": 2,
"T.INTEG-APPLI-CODE": 2,
"T.INTEG-APPLI-DATA": 2,
"T.INTEG-JCS-CODE": 1,
"T.INTEG-JCS-DATA": 1,
"T.LIFE_CYCLE": 1,
"T.MODULE_EXEC": 1,
"T.MODULE_REPLACEMENT": 1,
"T.NATIVE": 1,
"T.OBJ-DELETION": 1,
"T.OS_OPERATE": 1,
"T.PHYSICAL": 1,
"T.RESOURCES": 1,
"T.RND": 1,
"T.SEC_BOX_BORDER": 1,
"T.SID": 2,
"T.UNAUTHORIZED_CARD_MNGT": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0059-2009-MA-02": 2,
"BSI-CC-PP-0075-2012-MA-01": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR.1": 1,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL4": 10,
"EAL4 augmented": 5,
"EAL4+": 3,
"EAL6": 3,
"EAL6+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 1
},
"FCO": {
"FCO_NRO.2": 1
},
"FCS": {
"FCS_CKM": 2,
"FCS_CKM.1": 30,
"FCS_CKM.1.1": 2,
"FCS_CKM.2": 5,
"FCS_CKM.3": 10,
"FCS_CKM.3.1": 3,
"FCS_CKM.4": 3,
"FCS_CKM.5": 13,
"FCS_CKM.6": 24,
"FCS_CKM.6.1": 2,
"FCS_CKM.6.2": 1,
"FCS_COP": 4,
"FCS_COP.1": 37,
"FCS_COP.1.1": 8,
"FCS_COP.1.2": 1,
"FCS_RBG.1": 4,
"FCS_RNG.1": 10
},
"FDP": {
"FDP_ACC": 24,
"FDP_ACC.1": 20,
"FDP_ACC.2": 4,
"FDP_ACF": 20,
"FDP_ACF.1": 31,
"FDP_AFC": 5,
"FDP_IFC.1": 8,
"FDP_IFC.2": 2,
"FDP_IFF.1": 4,
"FDP_ITC": 9,
"FDP_ITC.1": 13,
"FDP_ITC.1.3": 1,
"FDP_ITC.2": 11,
"FDP_MSA.3": 1,
"FDP_RIP.1": 18,
"FDP_RIP.1.1": 2,
"FDP_ROL.1": 2,
"FDP_SDI": 14,
"FDP_SDI.1": 2,
"FDP_SDI.2": 7,
"FDP_UCT": 9,
"FDP_UCT.1": 1,
"FDP_UIT.1": 1
},
"FIA": {
"FIA_AFL.1": 6,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 2,
"FIA_UAU.1": 13,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.4": 1,
"FIA_UID.1": 17,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_UID.2": 1,
"FIA_USB.1": 2
},
"FMT": {
"FMT_IFC.1": 1,
"FMT_MOF.1": 6,
"FMT_MOF.1.1": 1,
"FMT_MSA": 12,
"FMT_MSA.1": 15,
"FMT_MSA.2": 8,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 25,
"FMT_MSA.3.1": 2,
"FMT_MSA.3.2": 1,
"FMT_MSA.4": 7,
"FMT_MSA.4.1": 2,
"FMT_MTD": 11,
"FMT_MTD.1": 3,
"FMT_MTD.3": 1,
"FMT_SMF.1": 19,
"FMT_SMF.1.1": 2,
"FMT_SMR.1": 20,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 1
},
"FPT": {
"FPT_EMS.1": 10,
"FPT_EMS.1.1": 3,
"FPT_FLS.1": 14,
"FPT_FLS.1.1": 2,
"FPT_PHP.1": 6,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_PHP.3": 16,
"FPT_PHP.3.1": 2,
"FPT_RCV.3": 1,
"FPT_TDC.1": 1,
"FPT_TST": 1,
"FPT_TST.1": 8,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ICT": 2,
"FTP_ITC": 4,
"FTP_ITC.1": 6,
"FTP_TRP.1": 1
}
},
"certification_process": {
"OutOfScope": {
"*While Triple-DES based challenge/response authentication is supported by the TOE, this feature is out of scope of the certified functionality. This is mentioned in the user guidance": 1,
"1. The TOE frame and modules The blue dashed line is the boundary of the TOE. Other applets are out of scope of certification. The blue and grey boxes (Java Card OS, Crypto Library and Micro Controller and": 1,
"accordingly. - Removed 3DES C/R pins from description of SS.User Authentication. This is now out of scope of certification. - Corrected incomplete marking of a selection in FDP_ACF.1.2/SVD_Transfer 1.12": 1,
"out of scope": 3
}
},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"CCM": {
"CCM": 4
},
"ECB": {
"ECB": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 1
},
"TLS": {
"TLS": {
"TLS": 1
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 2,
"Key agreement": 1
}
},
"device_model": {},
"ecc_curve": {
"Brainpool": {
"brainpoolP256r1": 2,
"brainpoolP256t1": 2,
"brainpoolP320r1": 3,
"brainpoolP320t1": 3,
"brainpoolP384r1": 2,
"brainpoolP384t1": 2,
"brainpoolP512r1": 2,
"brainpoolP512t1": 2
},
"NIST": {
"P-256": 4,
"P-384": 2,
"P-521": 4
}
},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {
"JavaCard": {
"Java Card 3.0.5": 1
}
},
"os_name": {
"JCOP": {
"JCOP 4": 9,
"JCOP4": 7
}
},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 1,
"RNG": 2
}
},
"side_channel_analysis": {
"FI": {
"DFA": 1,
"Physical Tampering": 1,
"fault injection": 1,
"physical tampering": 8
},
"SCA": {
"side-channel": 1
}
},
"standard_id": {
"CC": {
"CCMB-2022-11-002": 2,
"CCMB-2022-11-003": 2,
"CCMB-2022-11-004": 2,
"CCMB-2022-11-005": 2,
"CCMB-2022-11-006": 1
},
"FIPS": {
"FIPS 186-5": 4,
"FIPS PUB 197": 1,
"FIPS197": 3
},
"ISO": {
"ISO/IEC 14888-3": 2,
"ISO/IEC 15408": 2
},
"NIST": {
"SP 800-38A": 2
},
"PKCS": {
"PKCS #11": 1,
"PKCS #7": 1,
"PKCS#1": 8,
"PKCS#11": 2,
"PKCS#7": 1,
"PKCS11": 2
},
"RFC": {
"RFC 1851": 1,
"RFC 2437": 1,
"RFC 3447": 1,
"RFC 5639": 4,
"RFC 5652": 3
},
"X509": {
"x.509": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 23
}
},
"DES": {
"3DES": {
"3DES": 2,
"Triple-DES": 3,
"TripleDES": 1
},
"DES": {
"DES": 2
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 1
}
},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 1
},
"NXP": {
"NXP": 3
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "MJ;HH",
"/Title": "Aventra MyEID PKI Smart Card Security Target",
"pdf_file_size_bytes": 1517280,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://datatracker.ietf.org/doc/html/rfc2437",
"https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-5.pdf",
"https://csrc.nist.gov/pubs/sp/800/38/a/final",
"https://www.iso.org/standard/76382.html",
"https://globalplatform.org/wp-content/uploads/2018/05/GPC_CardSpecification_v2.3.1_PublicRelease_CC.pdf",
"https://datatracker.ietf.org/doc/html/rfc8017",
"https://csrc.nist.gov/pubs/sp/800/73/pt2/5/final",
"https://csrc.nist.gov/publications/detail/sp/800-56a/rev-3/final",
"https://www.rfc-editor.org/rfc/rfc5639",
"https://csrc.nist.gov/pubs/sp/800/73/pt1/5/final",
"https://datatracker.ietf.org/doc/html/rfc1851",
"https://csrc.nist.gov/pubs/sp/800/186/final",
"https://datatracker.ietf.org/doc/html/rfc3447",
"https://datatracker.ietf.org/doc/html/rfc5652",
"https://www.sogis.eu/documents/cc/crypto/SOGIS-Agreed-Cryptographic-Mechanisms-1.3.pdf",
"https://certification.enisa.europa.eu/publications/security-evaluation-and-certification-qualified-electronic-signatureseal-creation-devices_en",
"https://www.commoncriteriaportal.org/files/ccfiles/CC2022CEM2022TransitionPolicy.pdf",
"mailto:[email protected]",
"https://csrc.nist.gov/publications/detail/fips/197/final",
"https://aventra.fi/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 89
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1200a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1200b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "4a3b3173d12f327327da5fd470c2b28153eeb517877696dfdba2994bb7935f47",
"txt_hash": "3bcceb2b4ee95d681148779e0d62de32b3d05ca96b0ac7420752d89551caa793"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "de83d557bde62eaceef0c9629ef51f0696dc4dfa8a61815b72b5a0c08410bd44",
"txt_hash": "636b325f949d1de1a2abb7935ef2a0e1c3ea123bc817c221b03e4441790be603"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "c5afa14736e0d750bb87c6305ef21d780dac57707871ca9c1f9fcd3638f7d752",
"txt_hash": "f4252bbcf4938aeaf4377c0e16d9eb79d711db1c26406579ec03464172139d79"
}
},
"status": "active"
}