Aventra MyEID PKI Smart Card, version 5.0.0

CSV information

Status active
Valid from 25.02.2026
Valid until 25.02.2031
Scheme 🇩🇪 DE
Manufacturer Aventra Oy
Category Products for Digital Signatures
Security level EAL4+, AVA_VAN.5
Protection profiles

Heuristics summary

Certificate ID: BSI-DSZ-CC-1200-2026

Certificate

certificate file processing did not finish successfully.
Download pdf: OK
Convert pdf to text: OK
Extract keywords: ERROR

Extracted keywords

Security level
EAL 4, EAL 5, EAL 2, EAL 4 augmented
Security Assurance Requirements (SAR)
ALC_FLR, AVA_VAN.5
Protection profiles
BSI-CC-PP-0059-2009-MA-02, BSI-CC-PP-0075-2012-MA-01
Certificates
BSI-DSZ-CC-1200-2026

Standards
ISO/IEC 15408, ISO/IEC 18045

Certification report

Extracted keywords

Symmetric Algorithms
AES, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DSA
Schemes
MAC, Key Exchange, Key Agreement
Protocols
TLS
Randomness
RNG
Elliptic Curves
P-256, P-384, P-521, brainpoolP256r1, brainpoolP256t1, brainpoolP320r1, brainpoolP320t1, brainpoolP384r1, brainpoolP384t1, brainpoolP512r1, brainpoolP512t1
Block cipher modes
ECB, CBC

Operating System name
JCOP4, JCOP 4
Vendor
NXP, NXP Semiconductors, Microsoft

Security level
EAL 4, EAL 5, EAL 2, EAL 1, EAL4+, EAL6+, EAL 4 augmented
Security Assurance Requirements (SAR)
AGD_OPE, AGD_PRE, ALC_FLR, ALC_CMS, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ALC_COMP.1, AVA_VAN.5, AVA_VAN
Security Functional Requirements (SFR)
FCS_CKM.1.1, FCS_COP.1, FCS_COP.1.1, FCS_CKM.1, FDP_UCT.1, FTP_ITC.1
Protection profiles
BSI-CC-PP-0059-2009-MA-02, BSI-CC-PP-0075-2012-MA-01
Certificates
BSI-DSZ-CC-1200-2026, BSI-DSZ-CC-1136-V5-2026, BSI-DSZ-CC-1200, NSCIB-CC-2300127-02, NSCIB-CC-2300172-02
Evaluation facilities
SGS, SGS Brightsight, Brightsight, TÜV Informationstechnik

Side-channel analysis
fault injection, JIL
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, BSI-DSZ-CC-1200, Aventra MyEID PKI Smart Card, version 5.0.0, SGS Digital Trust Services GmbH, (confidential document). [7] EN 419211-2:2013 - Protection profiles for secure signature creation device - Part 2: Device

Standards
FIPS 186-5, FIPS 197, FIPS PUB 186-5, PKCS#1, PKCS#7, AIS 26, AIS 46, AIS 37, AIS 36, AIS 1, AIS 14, AIS 19, AIS 23, AIS 32, RFC 5639, RFC8017, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, x.509
Technical reports
BSI TR-02102-1

File metadata

Title Certification Report BSI-DSZ-CC-1200-2026
Subject Common Criteria, Certification, Zertifizierung, Smartcard, SSCD, QSCD, eIDAS, Aventra, MyEID
Keywords "Common Criteria, Certification, Zertifizierung, Smartcard, SSCD, QSCD, eIDAS, Aventra, MyEID"
Author Federal Office for Information Security
Pages 29

Frontpage

Certificate ID BSI-DSZ-CC-1200-2026
Certified item Aventra MyEID PKI Smart Card, version 5.0.0
Certification lab BSI
Developer Aventra Oy

References

Outgoing
  • NSCIB-CC-2300127-02-CR - active - NXP JCOP 4.5 P71
  • BSI-DSZ-CC-1136-V5-2026 - active - NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4)
  • NSCIB-CC-2300172-02-CR - active - NXP JCOP 4 P71 Versions: JCOP 4 P71 v4.7 R1.00.4, JCOP 4 P71 v4.7 R1.01.4, JCOP 4 P71 v4.7 R1.02.4, JCOP 4 SE050 v4.7 R2.00.11, JCOP 4 SE050 v4.7 R2.03.11

Security target

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES, Triple-DES, TripleDES
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman
Schemes
Key Agreement, Key agreement
Protocols
TLS, PACE
Randomness
RNG, RND
Elliptic Curves
P-256, P-384, P-521, brainpoolP320r1, brainpoolP320t1, brainpoolP256r1, brainpoolP256t1, brainpoolP384r1, brainpoolP384t1, brainpoolP512r1, brainpoolP512t1
Block cipher modes
ECB, CBC, CCM

JavaCard versions
Java Card 3.0.5
Operating System name
JCOP4, JCOP 4
Trusted Execution Environments
SE
Vendor
NXP, Microsoft

Security level
EAL4+, EAL6+, EAL4, EAL6, EAL4 augmented
Claims
T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.MODULE_EXEC, T.RESOURCES, T.UNAUTHORIZED_CARD_MNGT, T.COM_EXPLOIT, T.LIFE_CYCLE, T.OBJ-DELETION, T.PHYSICAL, T.OS_OPERATE, T.RND, T.CONFIG, T.SEC_BOX_BORDER, T.MODULE_REPLACEMENT, T.ATTACK-COUNTER, A.CGA, A.SCA, A.CSP, A.APPLET, A.VERIFICATION, A.USE_DIAG, A.USE_KEYS, A.PROCESS-SEC-ID, A.APPS-PROVIDER, A.VERIFICATION-AUTHORITY, OT.SCD_AUTH_IMP, OE.HID_VAD, OE.APPLET, OE.VERIFICATION, OE.CODE-EVIDENCE, OE.APPS-PROVIDER, OE.VERIFICATION-, OE.KEY-CHANGE, OE.SECURITY-DOMAINS, OE.USE_DIAG, OE.USE_KEYS, OE.PROCESS_SEC_IC, OSP.VERIFICATION, OSP.PROCESS-TOE, OSP.KEY-CHANGE, OSP.SECURITY-DOMAINS, OSP.SECURE-BOX
Security Assurance Requirements (SAR)
ADV_ARC, ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, AVA_VAN, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FCO_NRO.2, FCS_CKM.4, FCS_COP.1.2, FCS_COP.1.1, FCS_CKM.6, FCS_COP.1, FCS_CKM.3, FCS_CKM.1, FCS_CKM.3.1, FCS_COP, FCS_RNG.1, FCS_CKM.2, FCS_CKM.5, FCS_RBG.1, FCS_CKM.1.1, FCS_CKM.6.1, FCS_CKM.6.2, FCS_CKM, FDP_ITC.1.3, FDP_ACF.1, FDP_ACC.2, FDP_IFC.1, FDP_IFF.1, FDP_RIP.1, FDP_ROL.1, FDP_SDI.2, FDP_SDI, FDP_RIP.1.1, FDP_UIT.1, FDP_ITC.2, FDP_ACC.1, FDP_MSA.3, FDP_IFC.2, FDP_ITC.1, FDP_ACC, FDP_ACF, FDP_SDI.1, FDP_ITC, FDP_UCT, FDP_UCT.1, FDP_AFC, FIA_UAU.1, FIA_UID.1, FIA_ATD.1, FIA_UID.2, FIA_USB.1, FIA_UAU.4, FIA_AFL.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_AFL.1.1, FIA_AFL.1.2, FMT_MSA.1, FMT_MSA.3, FMT_MSA.2, FMT_IFC.1, FMT_SMF.1, FMT_SMR.1, FMT_MTD.1, FMT_MTD.3, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4, FMT_MSA.4.1, FMT_MTD, FPR_UNO.1, FPT_PHP.3.1, FPT_FLS.1.1, FPT_EMS.1, FPT_FLS.1, FPT_TDC.1, FPT_RCV.3, FPT_PHP.3, FPT_TST.1, FPT_EMS.1.1, FPT_TST, FPT_PHP.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTP_ITC.1, FTP_TRP.1, FTP_ITC, FTP_ICT
Protection profiles
BSI-CC-PP-0059-2009-MA-02, BSI-CC-PP-0075-2012-MA-01
Certificates
NSCIB-CC-2300172-01-CR, NSCIB-CC-2300172-02, NSCIB-CC-2300172-02-CR, NSCIB-2300172-02

Side-channel analysis
side-channel, Physical Tampering, physical tampering, DFA, fault injection
Certification process
out of scope, accordingly. - Removed 3DES C/R pins from description of SS.User Authentication. This is now out of scope of certification. - Corrected incomplete marking of a selection in FDP_ACF.1.2/SVD_Transfer 1.12, 1. The TOE frame and modules The blue dashed line is the boundary of the TOE. Other applets are out of scope of certification. The blue and grey boxes (Java Card OS, Crypto Library and Micro Controller and, *While Triple-DES based challenge/response authentication is supported by the TOE, this feature is out of scope of the certified functionality. This is mentioned in the user guidance

Standards
FIPS 186-5, FIPS197, FIPS PUB 197, SP 800-38A, PKCS#1, PKCS #7, PKCS11, PKCS #11, PKCS#11, PKCS#7, RFC 2437, RFC 3447, RFC 5652, RFC 1851, RFC 5639, ISO/IEC 15408, ISO/IEC 14888-3, x.509, CCMB-2022-11-002, CCMB-2022-11-003, CCMB-2022-11-004, CCMB-2022-11-005, CCMB-2022-11-006

File metadata

Title Aventra MyEID PKI Smart Card Security Target
Author MJ;HH
Pages 89

References

Outgoing
  • NSCIB-CC-2300172-02-CR - active - NXP JCOP 4 P71 Versions: JCOP 4 P71 v4.7 R1.00.4, JCOP 4 P71 v4.7 R1.01.4, JCOP 4 P71 v4.7 R1.02.4, JCOP 4 SE050 v4.7 R2.00.11, JCOP 4 SE050 v4.7 R2.03.11
  • NSCIB-CC-2300172-01-CR - active - NXP JCOP 4 P71 v4.7 R1.00.4, JCOP 4 P71 v4.7 R1.01.4, JCOP 4 P71 v4.7 R1.02.4, JCOP 4 SE050 v4.7 R2.00.11, JCOP 4 SE050 v4.7 R2.03.11

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

BSI-DSZ-CC-1200-2026

Extracted SARs

ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_COMP.1, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.2, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5

Scheme data

Cert Id BSI-DSZ-CC-1200-2026
Product Aventra MyEID PKI Smart Card, version 5.0.0
Vendor Aventra Oy
Certification Date 25.02.2026
Category Digital signature
Url https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Digitale_Signatur-Sichere_Signaturerstellungseinheiten/1200.html
Enhanced
Product Aventra MyEID PKI Smart Card, version 5.0.0
Applicant Aventra Oy Kutomotie 16 00380 Helsinki Finland
Evaluation Facility SGS Digital Trust Services GmbH
Assurance Level EAL4+,AVA_VAN.5
Protection Profile EN 419211-2:2013 - Protection profiles for secure signature creation device - Part 2: Device with key generation, 18 May 2013, BSI-CC-PP-0059-2009-MA-02EN 419211-3:2013 - Protection profiles for secure signature creation device - Part 3: Device with key import, 14 September 2013, BSI-CC-PP-0075-2012-MA-01
Certification Date 25.02.2026
Expiration Date 24.02.2031
Entries [frozendict({'id': 'EN'}), frozendict({'id': 'EN'})]
Cert Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1200c_pdf.pdf?__blob=publicationFile&v=4
Report Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1200a_pdf.pdf?__blob=publicationFile&v=4
Target Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1200b_pdf.pdf?__blob=publicationFile&v=3
Description The Target of evaluation (TOE) is the product „Aventra MyEID PKI Smart Card, version 5.0.0 “ by the vendor Aventra Oy. It is a composite product consisting of Aventra’s „MyEID“ Java Card applet version 5.0.0 running ontop of the Common Criteria certified NXP JCOP4 Java Card operating system JCOP 4 P71 v4.7 R1.01.4 and JCOP 4 P71 v4.7 R1.02.4 (NSCIB-CC-2300172-02) which itself comprises a Common Criteria certified NXP IC (BSI-DSZ-CC-1136-V5-2026). The TOE is primarily used for authenticating users or devices and ensuring confidentiality of data in public key infrastructure. The main features of the TOE are calculating digital signatures, deciphering data and storing cryptographic keys in a secure way.
Subcategory Secure Signature Creation Devices (SSCD)

References

Loading...

Updates Feed

  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Products for Digital Signatures",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1200c_pdf.pdf",
  "dgst": "36eba6f8fe516013",
  "heuristics": {
    "_type": "sec_certs.sample.cc_eucc_common.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-1200-2026",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "5.0.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "27abdb9c6ab375a7",
        "d918b28fd7bb5d79"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1136-V5-2026",
          "NSCIB-CC-2300172-02-CR",
          "NSCIB-CC-2300127-02-CR"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2300127-02-CR",
          "BSI-DSZ-CC-1136-V4-2024",
          "BSI-DSZ-CC-1136-V3-2022",
          "BSI-DSZ-CC-1136-2021",
          "BSI-DSZ-CC-1149-V3-2023",
          "BSI-DSZ-CC-1136-V5-2026",
          "BSI-DSZ-CC-1149-V4-2025",
          "BSI-DSZ-CC-1149-2022",
          "BSI-DSZ-CC-1149-V2-2023",
          "BSI-DSZ-CC-1136-V2-2022",
          "NSCIB-CC-2300172-02-CR"
        ]
      }
    },
    "scheme_data": {
      "category": "Digital signature",
      "cert_id": "BSI-DSZ-CC-1200-2026",
      "certification_date": "2026-02-25",
      "enhanced": {
        "applicant": "Aventra Oy Kutomotie 16 00380 Helsinki Finland",
        "assurance_level": "EAL4+,AVA_VAN.5",
        "cert_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1200c_pdf.pdf?__blob=publicationFile\u0026v=4",
        "certification_date": "2026-02-25",
        "description": "The Target of evaluation (TOE) is the product \u201eAventra MyEID PKI Smart Card, version 5.0.0 \u201c by the vendor Aventra Oy. It is a composite product consisting of Aventra\u2019s \u201eMyEID\u201c Java Card applet version 5.0.0 running ontop of the Common Criteria certified NXP JCOP4 Java Card operating system JCOP 4 P71 v4.7 R1.01.4 and JCOP 4 P71 v4.7 R1.02.4 (NSCIB-CC-2300172-02) which itself comprises a Common Criteria certified NXP IC (BSI-DSZ-CC-1136-V5-2026). The TOE is primarily used for authenticating users or devices and ensuring confidentiality of data in public key infrastructure. The main features of the TOE are calculating digital signatures, deciphering data and storing cryptographic keys in a secure way.",
        "entries": [
          {
            "id": "EN"
          },
          {
            "id": "EN"
          }
        ],
        "evaluation_facility": "SGS Digital Trust Services GmbH",
        "expiration_date": "2031-02-24",
        "product": "Aventra MyEID PKI Smart Card, version 5.0.0",
        "protection_profile": "EN 419211-2:2013 - Protection profiles for secure signature creation device - Part 2: Device with key generation, 18 May 2013, BSI-CC-PP-0059-2009-MA-02EN 419211-3:2013 - Protection profiles for secure signature creation device - Part 3: Device with key import, 14 September 2013, BSI-CC-PP-0075-2012-MA-01",
        "report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1200a_pdf.pdf?__blob=publicationFile\u0026v=4",
        "target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1200b_pdf.pdf?__blob=publicationFile\u0026v=3"
      },
      "product": "Aventra MyEID PKI Smart Card, version 5.0.0",
      "subcategory": "Secure Signature Creation Devices (SSCD)",
      "url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Digitale_Signatur-Sichere_Signaturerstellungseinheiten/1200.html",
      "vendor": "Aventra Oy"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2300172-01-CR",
          "NSCIB-CC-2300172-02-CR"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2300172-01-CR",
          "BSI-DSZ-CC-1136-V4-2024",
          "NSCIB-CC-2300172-02-CR",
          "BSI-DSZ-CC-1136-V5-2026"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Aventra Oy",
  "manufacturer_web": "https://www.aventra.fi",
  "name": "Aventra MyEID PKI Smart Card, version 5.0.0",
  "not_valid_after": "2031-02-25",
  "not_valid_before": "2026-02-25",
  "pdf_data": {
    "_type": "sec_certs.sample.cc_eucc_common.PdfData",
    "cert_filename": "1200c_pdf.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1200-2026": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0059-2009-MA-02": 1,
          "BSI-CC-PP-0075-2012-MA-01": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 4": 1,
          "EAL 4 augmented": 1,
          "EAL 5": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": null,
    "report_filename": "1200a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by AVA_VAN.5 valid until: 24 February 2031 SOGIS Recognition Agreement",
        "cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 conformant",
        "cert_id": "BSI-DSZ-CC-1200-2026",
        "cert_item": "Aventra MyEID PKI Smart Card, version 5.0.0",
        "cert_lab": "BSI",
        "developer": "Aventra Oy",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "EN 419211-2:2013 - Protection profiles for secure signature creation device - Part 2: Device with key generation, BSI-CC-PP-0059-2009-MA-02, EN 419211-3:2013 - Protection profiles for secure signature creation device - Part 3: Device with key import, BSI-CC-PP-0075-2012-MA-01"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 8
          },
          "ECDH": {
            "ECDH": 4
          },
          "ECDSA": {
            "ECDSA": 2
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 1
          },
          "DSA": {
            "DSA": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1136-V5-2026": 5,
          "BSI-DSZ-CC-1200": 1,
          "BSI-DSZ-CC-1200-2026": 16
        },
        "NL": {
          "NSCIB-CC-2300127-02": 3,
          "NSCIB-CC-2300172-02": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0059-2009-MA-02": 3,
          "BSI-CC-PP-0075-2012-MA-01": 3
        }
      },
      "cc_sar": {
        "AGD": {
          "AGD_OPE": 2,
          "AGD_PRE": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS": 1,
          "ALC_CMS.4": 1,
          "ALC_COMP.1": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR": 3,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 3,
          "EAL 4": 5,
          "EAL 4 augmented": 3,
          "EAL 5": 4,
          "EAL4+": 2,
          "EAL6+": 1
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM.1": 1,
          "FCS_CKM.1.1": 1,
          "FCS_COP.1": 3,
          "FCS_COP.1.1": 7
        },
        "FDP": {
          "FDP_UCT.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 2
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          "BSI-DSZ-CC-1200, Aventra MyEID PKI Smart Card, version 5.0.0, SGS Digital Trust Services GmbH, (confidential document). [7] EN 419211-2:2013 - Protection profiles for secure signature creation device - Part 2: Device": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "ECB": {
          "ECB": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 1
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        },
        "KEX": {
          "Key Exchange": 1
        },
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Brainpool": {
          "brainpoolP256r1": 3,
          "brainpoolP256t1": 3,
          "brainpoolP320r1": 3,
          "brainpoolP320t1": 3,
          "brainpoolP384r1": 3,
          "brainpoolP384t1": 3,
          "brainpoolP512r1": 3,
          "brainpoolP512t1": 3
        },
        "NIST": {
          "P-256": 6,
          "P-384": 6,
          "P-521": 6
        }
      },
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 1
        },
        "SGS": {
          "SGS": 4,
          "SGS Brightsight": 1
        },
        "TUV": {
          "T\u00dcV Informationstechnik": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 4": 19,
          "JCOP4": 1
        }
      },
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "fault injection": 1
        },
        "other": {
          "JIL": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 1": 1,
          "AIS 14": 1,
          "AIS 19": 1,
          "AIS 23": 1,
          "AIS 26": 3,
          "AIS 32": 1,
          "AIS 36": 2,
          "AIS 37": 2,
          "AIS 46": 3
        },
        "FIPS": {
          "FIPS 186-5": 3,
          "FIPS 197": 4,
          "FIPS PUB 186-5": 1
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        },
        "PKCS": {
          "PKCS#1": 9,
          "PKCS#7": 2
        },
        "RFC": {
          "RFC 5639": 4,
          "RFC8017": 5
        },
        "X509": {
          "x.509": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 8
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 1
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-02102-1": 2
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 1
        },
        "NXP": {
          "NXP": 7,
          "NXP Semiconductors": 2
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Federal Office for Information Security",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, Smartcard, SSCD, QSCD, eIDAS, Aventra, MyEID\"",
      "/Subject": "Common Criteria, Certification, Zertifizierung, Smartcard, SSCD, QSCD, eIDAS, Aventra, MyEID",
      "/Title": "Certification Report BSI-DSZ-CC-1200-2026",
      "pdf_file_size_bytes": 447357,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "https://www.sogis.eu/",
          "https://www.iso.org/standard/72913.html",
          "https://www.bsi.bund.de/zertifizierung",
          "https://www.bsi.bund.de/AIS",
          "https://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/dok/Zertifizierung-Gesamtlisten",
          "https://www.commoncriteriaportal.org/cc/index.cfm",
          "https://www.iso.org/standard/72889.html",
          "https://www.iso.org/standard/72906.html",
          "https://www.iso.org/standard/72917.html",
          "https://www.iso.org/standard/72892.html",
          "https://www.iso.org/standard/72891.html",
          "https://standards.iso.org/ittf/PubliclyAvailableStandards/index.html"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 29
    },
    "st_filename": "1200b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 23
          },
          "ECDH": {
            "ECDH": 11
          },
          "ECDSA": {
            "ECDSA": 3
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 1
          }
        }
      },
      "cc_cert_id": {
        "NL": {
          "NSCIB-2300172-02": 1,
          "NSCIB-CC-2300172-01-CR": 1,
          "NSCIB-CC-2300172-02": 2,
          "NSCIB-CC-2300172-02-CR": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.APPLET": 1,
          "A.APPS-PROVIDER": 1,
          "A.CGA": 4,
          "A.CSP": 3,
          "A.PROCESS-SEC-ID": 1,
          "A.SCA": 4,
          "A.USE_DIAG": 1,
          "A.USE_KEYS": 1,
          "A.VERIFICATION": 1,
          "A.VERIFICATION-AUTHORITY": 1
        },
        "OE": {
          "OE.APPLET": 1,
          "OE.APPS-PROVIDER": 1,
          "OE.CODE-EVIDENCE": 1,
          "OE.HID_VAD": 4,
          "OE.KEY-CHANGE": 1,
          "OE.PROCESS_SEC_IC": 1,
          "OE.SECURITY-DOMAINS": 1,
          "OE.USE_DIAG": 1,
          "OE.USE_KEYS": 1,
          "OE.VERIFICATION": 1,
          "OE.VERIFICATION-": 1
        },
        "OSP": {
          "OSP.KEY-CHANGE": 1,
          "OSP.PROCESS-TOE": 1,
          "OSP.SECURE-BOX": 1,
          "OSP.SECURITY-DOMAINS": 1,
          "OSP.VERIFICATION": 1
        },
        "OT": {
          "OT.SCD_AUTH_IMP": 1
        },
        "T": {
          "T.ATTACK-COUNTER": 1,
          "T.COM_EXPLOIT": 1,
          "T.CONFID-APPLI-DATA": 1,
          "T.CONFID-JCS-CODE": 1,
          "T.CONFID-JCS-DATA": 1,
          "T.CONFIG": 1,
          "T.EXE-CODE": 2,
          "T.INTEG-APPLI-CODE": 2,
          "T.INTEG-APPLI-DATA": 2,
          "T.INTEG-JCS-CODE": 1,
          "T.INTEG-JCS-DATA": 1,
          "T.LIFE_CYCLE": 1,
          "T.MODULE_EXEC": 1,
          "T.MODULE_REPLACEMENT": 1,
          "T.NATIVE": 1,
          "T.OBJ-DELETION": 1,
          "T.OS_OPERATE": 1,
          "T.PHYSICAL": 1,
          "T.RESOURCES": 1,
          "T.RND": 1,
          "T.SEC_BOX_BORDER": 1,
          "T.SID": 2,
          "T.UNAUTHORIZED_CARD_MNGT": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0059-2009-MA-02": 2,
          "BSI-CC-PP-0075-2012-MA-01": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR.1": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 10,
          "EAL4 augmented": 5,
          "EAL4+": 3,
          "EAL6": 3,
          "EAL6+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 1
        },
        "FCO": {
          "FCO_NRO.2": 1
        },
        "FCS": {
          "FCS_CKM": 2,
          "FCS_CKM.1": 30,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.2": 5,
          "FCS_CKM.3": 10,
          "FCS_CKM.3.1": 3,
          "FCS_CKM.4": 3,
          "FCS_CKM.5": 13,
          "FCS_CKM.6": 24,
          "FCS_CKM.6.1": 2,
          "FCS_CKM.6.2": 1,
          "FCS_COP": 4,
          "FCS_COP.1": 37,
          "FCS_COP.1.1": 8,
          "FCS_COP.1.2": 1,
          "FCS_RBG.1": 4,
          "FCS_RNG.1": 10
        },
        "FDP": {
          "FDP_ACC": 24,
          "FDP_ACC.1": 20,
          "FDP_ACC.2": 4,
          "FDP_ACF": 20,
          "FDP_ACF.1": 31,
          "FDP_AFC": 5,
          "FDP_IFC.1": 8,
          "FDP_IFC.2": 2,
          "FDP_IFF.1": 4,
          "FDP_ITC": 9,
          "FDP_ITC.1": 13,
          "FDP_ITC.1.3": 1,
          "FDP_ITC.2": 11,
          "FDP_MSA.3": 1,
          "FDP_RIP.1": 18,
          "FDP_RIP.1.1": 2,
          "FDP_ROL.1": 2,
          "FDP_SDI": 14,
          "FDP_SDI.1": 2,
          "FDP_SDI.2": 7,
          "FDP_UCT": 9,
          "FDP_UCT.1": 1,
          "FDP_UIT.1": 1
        },
        "FIA": {
          "FIA_AFL.1": 6,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD.1": 2,
          "FIA_UAU.1": 13,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.4": 1,
          "FIA_UID.1": 17,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_UID.2": 1,
          "FIA_USB.1": 2
        },
        "FMT": {
          "FMT_IFC.1": 1,
          "FMT_MOF.1": 6,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 12,
          "FMT_MSA.1": 15,
          "FMT_MSA.2": 8,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 25,
          "FMT_MSA.3.1": 2,
          "FMT_MSA.3.2": 1,
          "FMT_MSA.4": 7,
          "FMT_MSA.4.1": 2,
          "FMT_MTD": 11,
          "FMT_MTD.1": 3,
          "FMT_MTD.3": 1,
          "FMT_SMF.1": 19,
          "FMT_SMF.1.1": 2,
          "FMT_SMR.1": 20,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO.1": 1
        },
        "FPT": {
          "FPT_EMS.1": 10,
          "FPT_EMS.1.1": 3,
          "FPT_FLS.1": 14,
          "FPT_FLS.1.1": 2,
          "FPT_PHP.1": 6,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 16,
          "FPT_PHP.3.1": 2,
          "FPT_RCV.3": 1,
          "FPT_TDC.1": 1,
          "FPT_TST": 1,
          "FPT_TST.1": 8,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ICT": 2,
          "FTP_ITC": 4,
          "FTP_ITC.1": 6,
          "FTP_TRP.1": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "*While Triple-DES based challenge/response authentication is supported by the TOE, this feature is out of scope of the certified functionality. This is mentioned in the user guidance": 1,
          "1. The TOE frame and modules The blue dashed line is the boundary of the TOE. Other applets are out of scope of certification. The blue and grey boxes (Java Card OS, Crypto Library and Micro Controller and": 1,
          "accordingly. - Removed 3DES C/R pins from description of SS.User Authentication. This is now out of scope of certification. - Corrected incomplete marking of a selection in FDP_ACF.1.2/SVD_Transfer 1.12": 1,
          "out of scope": 3
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "CCM": {
          "CCM": 4
        },
        "ECB": {
          "ECB": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 1
        },
        "TLS": {
          "TLS": {
            "TLS": 1
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 2,
          "Key agreement": 1
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Brainpool": {
          "brainpoolP256r1": 2,
          "brainpoolP256t1": 2,
          "brainpoolP320r1": 3,
          "brainpoolP320t1": 3,
          "brainpoolP384r1": 2,
          "brainpoolP384t1": 2,
          "brainpoolP512r1": 2,
          "brainpoolP512t1": 2
        },
        "NIST": {
          "P-256": 4,
          "P-384": 2,
          "P-521": 4
        }
      },
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {
        "JavaCard": {
          "Java Card 3.0.5": 1
        }
      },
      "os_name": {
        "JCOP": {
          "JCOP 4": 9,
          "JCOP4": 7
        }
      },
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 1,
          "RNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1,
          "Physical Tampering": 1,
          "fault injection": 1,
          "physical tampering": 8
        },
        "SCA": {
          "side-channel": 1
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2022-11-002": 2,
          "CCMB-2022-11-003": 2,
          "CCMB-2022-11-004": 2,
          "CCMB-2022-11-005": 2,
          "CCMB-2022-11-006": 1
        },
        "FIPS": {
          "FIPS 186-5": 4,
          "FIPS PUB 197": 1,
          "FIPS197": 3
        },
        "ISO": {
          "ISO/IEC 14888-3": 2,
          "ISO/IEC 15408": 2
        },
        "NIST": {
          "SP 800-38A": 2
        },
        "PKCS": {
          "PKCS #11": 1,
          "PKCS #7": 1,
          "PKCS#1": 8,
          "PKCS#11": 2,
          "PKCS#7": 1,
          "PKCS11": 2
        },
        "RFC": {
          "RFC 1851": 1,
          "RFC 2437": 1,
          "RFC 3447": 1,
          "RFC 5639": 4,
          "RFC 5652": 3
        },
        "X509": {
          "x.509": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 23
          }
        },
        "DES": {
          "3DES": {
            "3DES": 2,
            "Triple-DES": 3,
            "TripleDES": 1
          },
          "DES": {
            "DES": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 1
        },
        "NXP": {
          "NXP": 3
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "MJ;HH",
      "/Title": "Aventra MyEID PKI Smart Card Security Target",
      "pdf_file_size_bytes": 1517280,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://datatracker.ietf.org/doc/html/rfc2437",
          "https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-5.pdf",
          "https://csrc.nist.gov/pubs/sp/800/38/a/final",
          "https://www.iso.org/standard/76382.html",
          "https://globalplatform.org/wp-content/uploads/2018/05/GPC_CardSpecification_v2.3.1_PublicRelease_CC.pdf",
          "https://datatracker.ietf.org/doc/html/rfc8017",
          "https://csrc.nist.gov/pubs/sp/800/73/pt2/5/final",
          "https://csrc.nist.gov/publications/detail/sp/800-56a/rev-3/final",
          "https://www.rfc-editor.org/rfc/rfc5639",
          "https://csrc.nist.gov/pubs/sp/800/73/pt1/5/final",
          "https://datatracker.ietf.org/doc/html/rfc1851",
          "https://csrc.nist.gov/pubs/sp/800/186/final",
          "https://datatracker.ietf.org/doc/html/rfc3447",
          "https://datatracker.ietf.org/doc/html/rfc5652",
          "https://www.sogis.eu/documents/cc/crypto/SOGIS-Agreed-Cryptographic-Mechanisms-1.3.pdf",
          "https://certification.enisa.europa.eu/publications/security-evaluation-and-certification-qualified-electronic-signatureseal-creation-devices_en",
          "https://www.commoncriteriaportal.org/files/ccfiles/CC2022CEM2022TransitionPolicy.pdf",
          "mailto:[email protected]",
          "https://csrc.nist.gov/publications/detail/fips/197/final",
          "https://aventra.fi/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 89
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1200a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "AVA_VAN.5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1200b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc_eucc_common.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": false,
      "json_hash": null,
      "pdf_hash": "4a3b3173d12f327327da5fd470c2b28153eeb517877696dfdba2994bb7935f47",
      "txt_hash": "3bcceb2b4ee95d681148779e0d62de32b3d05ca96b0ac7420752d89551caa793"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "de83d557bde62eaceef0c9629ef51f0696dc4dfa8a61815b72b5a0c08410bd44",
      "txt_hash": "636b325f949d1de1a2abb7935ef2a0e1c3ea123bc817c221b03e4441790be603"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "c5afa14736e0d750bb87c6305ef21d780dac57707871ca9c1f9fcd3638f7d752",
      "txt_hash": "f4252bbcf4938aeaf4377c0e16d9eb79d711db1c26406579ec03464172139d79"
    }
  },
  "status": "active"
}