FeliCa Contactless Smartcard IC RC-SA00/1 Series and RC-SA00/2 Series, version 1.0

CSV information

Status archived
Valid from 03.09.2012
Valid until 03.09.2022
Scheme 🇳🇱 NL
Manufacturer Sony Corporation
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ASE_TSS.2, EAL6+
Protection profiles
Maintenance updates Felica Contactless Smartcard IC RC-SA00/1 Series and RC-SA00/2 Series, version 1.01 (21.05.2014) Certification report Security target
Felica Contactless Smartcard IC RC-SA00/1 Series and RC-SA00/2 Series, version 1.01 (10.06.2016) Certification report

Heuristics summary

Certificate ID: NSCIB-CC-10-30075-CR

Certificate

certificate could not be downloaded, no link is available.

Certification report

Extracted keywords

Symmetric Algorithms
AES-, AES, DES

Security level
EAL4, EAL6, EAL5+, EAL6+, EAL6 augmented
Security Assurance Requirements (SAR)
ADV_TDS, ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.5, ADV_ARC, AGD_OPE.1, AGD_PRE.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ATE_IND, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, AVA_VAN.5, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1
Security Functional Requirements (SFR)
FPR_UNL.1
Protection profiles
BSI-PP-0035
Certificates
NSCIB-CC-10-30075-CR, NSCIB-CC-10-30075
Evaluation facilities
Brightsight

Side-channel analysis
JIL, JHAS

Standards
AIS20, AIS 20, AIS34, AIS 34, ISO/IEC 18092

File metadata

Creation date D:20120904125043+02'00'
Modification date D:20120904125043+02'00'
Pages 16
Creator pdfsam-console (Ver. 2.4.0e)
Producer iText 2.1.7 by 1T3XT

Frontpage

Certificate ID NSCIB-CC-10-30075-CR
Certified item FeliCa Contactless Smartcard IC RC-SA00/1 Series and RC- SA00/2 Series, version 1.0
Certification lab Brightsight
Developer Sony Corporation

References

Incoming
  • NSCIB-CC-12-36329-CR - archived - FeliCa Contactless Smartcard IC RC-SA01/1 Series and RC-SA01/2 Series, version 1.0
  • NSCIB-CC-13-37078-CR - archived - FeliCa Contactless Smartcard IC RC-SA04/1 Series, version 1.0

Security target

Extracted keywords

Symmetric Algorithms
AES, DES, Triple-DES, TDES
Randomness
RND, RNG

Security level
EAL6, EAL4, EAL6 augmented, EAL4 augmented
Claims
O.AC, O.SC, O.RND, T.RND
Security Assurance Requirements (SAR)
ADV_SPM.1, ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ADV_FSP, ADV_IMP, AGD_OPE.1, AGD_PRE.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ALC_CMC, ALC_CMS, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, ATE_COV, AVA_VAN.5, AVA_VAN.3, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS, FAU_SAS.1.1, FCS_RNG.1, FCS_RNG, FCS_RNG.1.1, FCS_RNG.1.2, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITT.1, FDP_IFC.1, FDP_IFF.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4, FIA_UAU.4.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.1.1, FMT_SMF.1, FMT_SMF.1.1, FMT_LIM.1, FMT_LIM.2, FMT_MSA.3, FPR_UNL.1, FPR_UNL.1.1, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2, FTP_ITC, FTP_ITC.1
Protection profiles
BSI-PP-0035, BSI-PP- 0035

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, Side-channel, side-channel, Malfunction, malfunction
Certification process
out of scope, the exchange of FeliCa commands, which are processed by the FeliCa OS. The antenna, which is out of scope of the TOE, provides the RF interface on the smart card. All components of the TOE including

Standards
ISO/IEC 18092

File metadata

Creation date D:20120830160455+09'00'
Modification date D:20120830160746+09'00'
Pages 46
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 9.5.2 (Windows)

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

NSCIB-CC-10-30075-CR

Extracted SARs

ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.5, AGD_OPE.1, AGD_PRE.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.2, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, AVA_VAN.5

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "a4eaca06c34bdaba",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "NSCIB-CC-10-30075-CR",
    "cert_lab": [
      ""
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL6+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 5
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "f6d23054061d72ba"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-12-36329-CR",
          "NSCIB-CC-13-37078-CR"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-10-30076-CR",
          "NSCIB-CC-12-36329-CR",
          "NSCIB-CC-13-37078-CR"
        ]
      },
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2014-05-21",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Maintenance%20Report%20NSCIB-CC-10-30075-MA1.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/A00-STP-E01-41.pdf",
        "maintenance_title": "Felica Contactless Smartcard IC RC-SA00/1 Series and RC-SA00/2 Series, version 1.01"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2016-06-10",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[MA]%20NSCIB-CC-10-30075-MA2.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "Felica Contactless Smartcard IC RC-SA00/1 Series and RC-SA00/2 Series, version 1.01"
      }
    ]
  },
  "manufacturer": "Sony Corporation",
  "manufacturer_web": "https://www.sony.com/",
  "name": "FeliCa Contactless Smartcard IC RC-SA00/1 Series and RC-SA00/2 Series, version 1.0",
  "not_valid_after": "2022-09-03",
  "not_valid_before": "2012-09-03",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "[CR] NSCIB-CC-10-30075-CR.pdf",
    "report_frontpage": {
      "NL": {
        "cert_id": "NSCIB-CC-10-30075-CR",
        "cert_item": "FeliCa Contactless Smartcard IC RC-SA00/1 Series and RC- SA00/2 Series, version 1.0",
        "cert_lab": " Brightsight",
        "developer": "Sony Corporation"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "NL": {
          "NSCIB-CC-10-30075": 1,
          "NSCIB-CC-10-30075-CR": 15
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0035": 3
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_FSP.5": 1,
          "ADV_IMP.2": 1,
          "ADV_INT.3": 1,
          "ADV_SPM.1": 1,
          "ADV_TDS": 1,
          "ADV_TDS.5": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.5": 1,
          "ALC_CMS.5": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.3": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.2": 3
        },
        "ATE": {
          "ATE_COV.3": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN.2": 1,
          "ATE_IND": 2,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 4,
          "EAL5+": 1,
          "EAL6": 2,
          "EAL6 augmented": 2,
          "EAL6+": 1
        }
      },
      "cc_sfr": {
        "FPR": {
          "FPR_UNL.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "other": {
          "JHAS": 1,
          "JIL": 5
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 1,
          "AIS 34": 1,
          "AIS20": 1,
          "AIS34": 1
        },
        "ISO": {
          "ISO/IEC 18092": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 6,
            "AES-": 1
          }
        },
        "DES": {
          "DES": {
            "DES": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20120904125043+02\u002700\u0027",
      "/Creator": "pdfsam-console (Ver. 2.4.0e)",
      "/ModDate": "D:20120904125043+02\u002700\u0027",
      "/Producer": "iText 2.1.7 by 1T3XT",
      "pdf_file_size_bytes": 775806,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 16
    },
    "st_filename": "[ST] A00-STP-E01-40.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.AC": 14,
          "O.RND": 4,
          "O.SC": 9
        },
        "T": {
          "T.RND": 3
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP- 0035": 2,
          "BSI-PP-0035": 21
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 2,
          "ADV_FSP": 1,
          "ADV_FSP.5": 6,
          "ADV_IMP": 1,
          "ADV_IMP.2": 6,
          "ADV_INT.3": 2,
          "ADV_SPM.1": 9,
          "ADV_TDS.5": 2
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.5": 6,
          "ALC_CMS": 1,
          "ALC_CMS.5": 6,
          "ALC_DEL.1": 2,
          "ALC_DVS.2": 3,
          "ALC_LCD.1": 1,
          "ALC_TAT.3": 2
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 8
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.3": 6,
          "ATE_DPT.3": 2,
          "ATE_FUN.2": 2,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.3": 1,
          "AVA_VAN.5": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 10,
          "EAL4 augmented": 1,
          "EAL6": 8,
          "EAL6 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS": 1,
          "FAU_SAS.1": 5,
          "FAU_SAS.1.1": 1
        },
        "FCS": {
          "FCS_RNG": 1,
          "FCS_RNG.1": 6,
          "FCS_RNG.1.1": 1,
          "FCS_RNG.1.2": 1
        },
        "FDP": {
          "FDP_ACC.1": 12,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 7,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 9,
          "FDP_IFF.1": 1,
          "FDP_ITT.1": 7,
          "FDP_SDI.2": 4,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1
        },
        "FIA": {
          "FIA_UAU.1": 4,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.4": 4,
          "FIA_UAU.4.1": 1,
          "FIA_UID.1": 6,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_LIM.1": 5,
          "FMT_LIM.2": 5,
          "FMT_MOF.1": 5,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.1": 6,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 3,
          "FMT_SMF.1": 7,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 11,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNL.1": 5,
          "FPR_UNL.1.1": 1
        },
        "FPT": {
          "FPT_FLS.1": 8,
          "FPT_ITT.1": 7,
          "FPT_PHP.3": 8
        },
        "FRU": {
          "FRU_FLT.2": 7
        },
        "FTP": {
          "FTP_ITC": 12,
          "FTP_ITC.1": 7
        }
      },
      "certification_process": {
        "OutOfScope": {
          "out of scope": 1,
          "the exchange of FeliCa commands, which are processed by the FeliCa OS. The antenna, which is out of scope of the TOE, provides the RF interface on the smart card. All components of the TOE including": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 7,
          "RNG": 3
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 10,
          "malfunction": 2
        },
        "SCA": {
          "Leak-Inherent": 10,
          "Physical Probing": 2,
          "Side-channel": 1,
          "physical probing": 2,
          "side-channel": 1
        }
      },
      "standard_id": {
        "ISO": {
          "ISO/IEC 18092": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 8
          }
        },
        "DES": {
          "3DES": {
            "TDES": 1,
            "Triple-DES": 1
          },
          "DES": {
            "DES": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20120830160455+09\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20120830160746+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 9.5.2 (Windows)",
      "/Title": "",
      "pdf_file_size_bytes": 163161,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 46
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CR]%20NSCIB-CC-10-30075-CR.pdf",
  "scheme": "NL",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL6+",
      "ASE_TSS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST]%20A00-STP-E01-40.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "6179d42656459b4f0bd3540a5acceb3cb4a44cd66e48dbb304e902f906f7923d",
      "txt_hash": "19a6c4a2df85e803a801600809d0e247703e78da64cc72d75aa62069b0156d8f"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "78e90ba5bf421d77eebb88146ec03dba20320db38512b326bc81181bc832b3a1",
      "txt_hash": "21dc8b61d8e7cd8eba64b2cd065af9c8c7e88c01df3bc1677f9d47dff03249e5"
    }
  },
  "status": "archived"
}