This page was not yet optimized for use on mobile devices.
SafeSign IC PKI applet on JCOP 4 P71 eIDAS QSCD 3.0.1.12, 3.0.1.13 and 3.0.1.14
CSV information
Status | active |
---|---|
Valid from | 30.09.2024 |
Valid until | 30.09.2029 |
Scheme | 🇳🇱 NL |
Manufacturer | A.E.T. Europe B.V. |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | EAL4+, AVA_VAN.5 |
Protection profiles |
Heuristics summary
Certificate ID: NSCIB-CC-2400004-01-CR
Certificate
Extracted keywords
Operating System name
JCOP 4Security level
EAL4, EAL2, EAL7, EAL4 augmentedClaims
A.ESecurity Assurance Requirements (SAR)
ALC_FLR.3, ALC_FLR, AVA_VAN.5Protection profiles
BSI-CC-PP-0059-, BSI-CC-PP-0075-Certificates
NSCIB-CC-2400004-01, NSCIB-2400004-01, CC-21-0274076Evaluation facilities
RiscureStandards
ISO/IEC 15408-1, ISO/IEC 18045, ISO/IEC 18045:2008File metadata
Title | NSCIB Certificate |
---|---|
Author | Haak |
Creation date | D:20241013191320+01'00' |
Modification date | D:20241013191320+01'00' |
Pages | 1 |
Creator | Microsoft® Word 2021 |
Producer | Microsoft® Word 2021 |
Certification report
Extracted keywords
Asymmetric Algorithms
ECCOperating System name
JCOP 4Vendor
NXPSecurity level
EAL4, EAL4+, EAL 4, EAL6+, EAL4 augmented, EAL 4 augmentedClaims
A.ESecurity Assurance Requirements (SAR)
AVA_VAN.5Certificates
NSCIB-CC-2400004-01-CR, NSCIB-2400004-01, CC-21-0274076, NSCIB-CC-2300172-01Evaluation facilities
RiscureSide-channel analysis
JIL, JIL-AAPS, JHASStandards
PKCS#15File metadata
Title | Certification Report |
---|---|
Author | Haak |
Creation date | D:20241014092451+01'00' |
Modification date | D:20241014092451+01'00' |
Pages | 13 |
Creator | Microsoft® Word 2021 |
Producer | Microsoft® Word 2021 |
Frontpage
Certificate ID | NSCIB-CC-2400004-01-CR |
---|---|
Certified item | SafeSign IC PKI applet on JCOP 4 P71 eIDAS QSCD 3.0.1.12, 3.0.1.13 and 3.0.1.14 |
Certification lab | Riscure B.V. |
Developer | A.E.T. Europe B.V |
References
Outgoing- NSCIB-CC-2300172-01-CR - active - NXP JCOP 4 P71 v4.7 R1.00.4, JCOP 4 P71 v4.7 R1.01.4, JCOP 4 P71 v4.7 R1.02.4, JCOP 4 SE050 v4.7 R2.00.11, JCOP 4 SE050 v4.7 R2.03.11
Security target
Extracted keywords
Asymmetric Algorithms
ECDSA, ECCSchemes
MACRandomness
RNG, RNDJavaCard versions
Java Card 2.1.1, Java Card 2.2Operating System name
JCOP 4, JCOP4Vendor
NXP, MicrosoftSecurity level
EAL6, EAL4, EAL4 augmentedClaims
T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS, T.SID, T.EXE-CODE, T.NATIVE, T.MODULE_EXEC, T.RESOURCES, T.UNAUTHORIZED_CARD_MNGT, T.COM_EXPLOIT, T.LIFE_CYCLE, T.OBJ-DELETION, T.PHYSICAL, T.OS_OPERATE, T.RND, T.CONFIG, T.SEC_BOX_BORDER, T.MODULE_REPLACEMENT, T.ATTACK_COUNTER, A.E, A.APPLET, A.VERIFICATION, A.USE_DIAG, A.SCA, A.USE_KEYS, A.CGA, A.CSP, A.APPS-PROVIDER, A.VERIFICATION-AUTHORITY, OT.SID, OT.SID_MODULE, OT.FIREWALL, OT.GLOBAL_ARRAYS_CONFID, OT.GLOBAL_ARRAYS_INTEG, OT.NATIVE, OT.OPERATE, OT.REALLOCATION, OT.RESOURCES, OT.SENSITIVE_RESULTS_INTEG, OT.ALARM, OT.CIPHER, OT.RNG, OT.KEY-MNGT, OT.PIN-MNGT, OT.TRANSACTION, OT.OBJ-DELETION, OT.APPLI-AUTH, OT.DOMAIN-RIGHTS, OT.COMM_AUTH, OT.COMM_INTEGRITY, OT.COMM_CONFIDENTIALITY, OT.EXT-MEM, OT.CARD-MANAGEMENT, OT.SCP, OT.IDENTIFICATION, OT.SEC_BOX_FW, OT.RND, OT.CARD-CONFIGURATION, OT.ATTACK-COUNTER, OT.RESTRICTED-MODE, OE.APPLET, OE.VERIFICATION, OE.CODE-EVIDENCE, OE.APPS-PROVIDER, OE.VERIFICATION-AUTHORITY, OE.KEY-CHANGE, OE.SECURITY-DOMAINS, OE.USE_DIAG, OE.USE_KEYS, OE.PROCESS_SEC_IC, OE.HID_VAD, OSP.VERIFICATION, OSP.PROCESS-TOE, OSP.KEY-CHANGE, OSP.SECURITY-DOMAINS, OSP.SECURE-BOXSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_SAS, FAU_GEN, FCO_NRO, FCS_CKM.1, FCS_CKM, FCS_CKM.4, FCS_COP.1, FCS_COP, FCS_RNG.1, FCS_RNG, FCS_CKM.2, FCS_CKM.3, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_ACC, FDP_ACF, FDP_IFC, FDP_IFF, FDP_RIP, FDP_RIP.1, FDP_ROL, FDP_SDI, FDP_UIT, FDP_ITC, FDP_ITC.1, FDP_ITC.2, FDP_ACF.1, FDP_ACC.1, FDP_IFC.1, FDP_UCT, FDP_UCT.1, FDP_RIP.1.1, FDP_SDI.1, FDP_SDI.2, FIA_ATD, FIA_UID, FIA_USB, FIA_UAU, FIA_AFL, FIA_AFL.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_AFL.1.1, FIA_AFL.1.2, FMT_MSA, FMT_MTD, FMT_SMR, FMT_SMF, FMT_MSA.3, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4, FMT_MSA.4.1, FMT_MTD.1, FMT_MOF, FPR_UNO.1, FPT_EMS, FPT_EMS.1, FPT_FLS.1, FPT_PHP.1, FPT_TDC.1, FPT_FLS, FPT_RCV, FPT_PHP.3, FPT_EMS.1.1, FPT_EMS.1.2, FPT_TST.1, FPT_FLS.1.1, FPT_TST, FPT_PHP, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTP_ITC, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-CC-PP-0059-2009-MA-02, BSI-CC-PP-0075-2012-MA-01, BSI-CC-PP-0059-2009-Certificates
NSCIB-CC-2300172-01Side-channel analysis
physical probing, side channel, SPA, DPA, timing attacks, physical tampering, fault injectionStandards
PKCS #11, PKCS#15, PKCS#1, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004Technical reports
BSI TR-02102-1File metadata
Keywords | for W2010 with macros |
---|---|
Author | Arjan Jeckmans |
Creation date | D:20240927164546+02'00' |
Modification date | D:20240927164546+02'00' |
Pages | 47 |
Creator | Microsoft® Word for Microsoft 365 |
Producer | Microsoft® Word for Microsoft 365 |
References
Outgoing- NSCIB-CC-2300172-01-CR - active - NXP JCOP 4 P71 v4.7 R1.00.4, JCOP 4 P71 v4.7 R1.01.4, JCOP 4 P71 v4.7 R1.02.4, JCOP 4 SE050 v4.7 R2.00.11, JCOP 4 SE050 v4.7 R2.03.11
Heuristics
Certificate ID: NSCIB-CC-2400004-01-CR
Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.2, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Similar certificates
Showing 5 out of 6.
Scheme data ?
Cert Id | NSCIB-CC-2400004-01-CR | |
---|---|---|
Certification Date | 30.09.2024 | |
Status | Issued | |
Product | SafeSign IC PKI applet on JCOP 4 P71 eIDAS QSCD 3.0.1.12, 3.0.1.13 and 3.0.1.14 | |
Developer | A.E.T. Europe B.V. | |
Evaluation Facility | Riscure | |
Level | EAL4+ AVA_VAN.5 | |
Cert Link | https://trustcb.com/download/?wpdmdl=4513 | |
Report Link | https://trustcb.com/download/?wpdmdl=4514 | |
Target Link | https://trustcb.com/download/?wpdmdl=4515 |
References
Loading...
Updates
-
05.02.2025 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The st property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The cert property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data.
The computed heuristics were updated.
- The following values were inserted:
{'protection_profiles': {'_type': 'Set', 'elements': ['27abdb9c6ab375a7', 'd918b28fd7bb5d79']}, 'eal': 'EAL4+'}
. - The prev_certificates property was set to
None
. - The next_certificates property was set to
None
.
- The report property was updated, with the
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'product': 'SafeSign IC PKI applet on JCOP 4 P71 eIDAS QSCD 3.0.1.12, 3.0.1.13 and 3.0.1.14', 'cert_id': 'NSCIB-CC-2400004-01-CR', 'level': 'EAL4+ AVA_VAN.5', 'cert_link': 'https://trustcb.com/download/?wpdmdl=4513', 'report_link': 'https://trustcb.com/download/?wpdmdl=4514', 'target_link': 'https://trustcb.com/download/?wpdmdl=4515'}
data.
- The scheme_data property was updated, with the
-
30.10.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name SafeSign IC PKI applet on JCOP 4 P71 eIDAS QSCD 3.0.1.12, 3.0.1.13 and 3.0.1.14 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400004-01-Cert.pdf",
"dgst": "9b4f91dc748da889",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "NSCIB-CC-2400004-01-CR",
"cert_lab": [
""
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"3.0.1.14",
"3.0.1.13",
"3.0.1.12"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"27abdb9c6ab375a7",
"d918b28fd7bb5d79"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"NSCIB-CC-2300172-01-CR"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1136-2021",
"NSCIB-CC-2300172-01-CR",
"BSI-DSZ-CC-1136-V4-2024",
"BSI-DSZ-CC-1136-V3-2022",
"BSI-DSZ-CC-1136-V2-2022"
]
}
},
"scheme_data": {
"cert_id": "NSCIB-CC-2400004-01-CR",
"cert_link": "https://trustcb.com/download/?wpdmdl=4513",
"certification_date": "2024-09-30",
"developer": "A.E.T. Europe B.V.",
"evaluation_facility": "Riscure",
"level": "EAL4+ AVA_VAN.5",
"product": "SafeSign IC PKI applet on JCOP 4 P71 eIDAS QSCD 3.0.1.12, 3.0.1.13 and 3.0.1.14",
"report_link": "https://trustcb.com/download/?wpdmdl=4514",
"status": "Issued",
"target_link": "https://trustcb.com/download/?wpdmdl=4515"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"NSCIB-CC-2300172-01-CR"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1136-V4-2024",
"NSCIB-CC-2300172-01-CR"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "A.E.T. Europe B.V.",
"manufacturer_web": "https://aeteurope.com",
"name": "SafeSign IC PKI applet on JCOP 4 P71 eIDAS QSCD 3.0.1.12, 3.0.1.13 and 3.0.1.14",
"not_valid_after": "2029-09-30",
"not_valid_before": "2024-09-30",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "NSCIB-CC-2400004-01-Cert.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NL": {
"CC-21-0274076": 1,
"NSCIB-2400004-01": 1,
"NSCIB-CC-2400004-01": 1
}
},
"cc_claims": {
"A": {
"A.E": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0059-": 1,
"BSI-CC-PP-0075-": 1
}
},
"cc_sar": {
"ALC": {
"ALC_FLR": 1,
"ALC_FLR.3": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL4": 1,
"EAL4 augmented": 1,
"EAL7": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Riscure": {
"Riscure": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"JCOP": {
"JCOP 4": 1
}
},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408-1": 2,
"ISO/IEC 18045": 4,
"ISO/IEC 18045:2008": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "Haak",
"/CreationDate": "D:20241013191320+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2021",
"/ModDate": "D:20241013191320+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2021",
"/Title": "NSCIB Certificate",
"pdf_file_size_bytes": 89456,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.tuv-nederland.nl/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "NSCIB-CC-2400004-01-CR.pdf",
"report_frontpage": {
"NL": {
"cert_id": "NSCIB-CC-2400004-01-CR",
"cert_item": "SafeSign IC PKI applet on JCOP 4 P71 eIDAS QSCD 3.0.1.12, 3.0.1.13 and 3.0.1.14",
"cert_lab": " Riscure B.V.",
"developer": "A.E.T. Europe B.V"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
}
},
"cc_cert_id": {
"NL": {
"CC-21-0274076": 1,
"NSCIB-2400004-01": 1,
"NSCIB-CC-2300172-01": 1,
"NSCIB-CC-2400004-01-CR": 13
}
},
"cc_claims": {
"A": {
"A.E": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"AVA": {
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL4": 2,
"EAL4 augmented": 1,
"EAL4+": 1,
"EAL6+": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Riscure": {
"Riscure": 5
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"JCOP": {
"JCOP 4": 24
}
},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"other": {
"JHAS": 1,
"JIL": 2,
"JIL-AAPS": 1
}
},
"standard_id": {
"PKCS": {
"PKCS#15": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 2
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Haak",
"/CreationDate": "D:20241014092451+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2021",
"/ModDate": "D:20241014092451+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2021",
"/Title": "Certification Report",
"pdf_file_size_bytes": 307735,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]",
"https://nscib.nl/",
"https://www.sogis.eu/",
"http://www.commoncriteriaportal.org/",
"https://trustcb.com/common-criteria/nscib/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 13
},
"st_filename": "NSCIB-CC-2400004-01-ST_v1.23.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 8
},
"ECDSA": {
"ECDSA": 2
}
}
},
"cc_cert_id": {
"NL": {
"NSCIB-CC-2300172-01": 1
}
},
"cc_claims": {
"A": {
"A.APPLET": 1,
"A.APPS-PROVIDER": 1,
"A.CGA": 4,
"A.CSP": 4,
"A.E": 8,
"A.SCA": 4,
"A.USE_DIAG": 1,
"A.USE_KEYS": 1,
"A.VERIFICATION": 1,
"A.VERIFICATION-AUTHORITY": 1
},
"OE": {
"OE.APPLET": 1,
"OE.APPS-PROVIDER": 1,
"OE.CODE-EVIDENCE": 1,
"OE.HID_VAD": 3,
"OE.KEY-CHANGE": 1,
"OE.PROCESS_SEC_IC": 1,
"OE.SECURITY-DOMAINS": 1,
"OE.USE_DIAG": 1,
"OE.USE_KEYS": 1,
"OE.VERIFICATION": 1,
"OE.VERIFICATION-AUTHORITY": 1
},
"OSP": {
"OSP.KEY-CHANGE": 1,
"OSP.PROCESS-TOE": 1,
"OSP.SECURE-BOX": 1,
"OSP.SECURITY-DOMAINS": 1,
"OSP.VERIFICATION": 1
},
"OT": {
"OT.ALARM": 1,
"OT.APPLI-AUTH": 1,
"OT.ATTACK-COUNTER": 1,
"OT.CARD-CONFIGURATION": 1,
"OT.CARD-MANAGEMENT": 1,
"OT.CIPHER": 1,
"OT.COMM_AUTH": 1,
"OT.COMM_CONFIDENTIALITY": 1,
"OT.COMM_INTEGRITY": 1,
"OT.DOMAIN-RIGHTS": 1,
"OT.EXT-MEM": 1,
"OT.FIREWALL": 1,
"OT.GLOBAL_ARRAYS_CONFID": 1,
"OT.GLOBAL_ARRAYS_INTEG": 1,
"OT.IDENTIFICATION": 1,
"OT.KEY-MNGT": 1,
"OT.NATIVE": 1,
"OT.OBJ-DELETION": 1,
"OT.OPERATE": 1,
"OT.PIN-MNGT": 1,
"OT.REALLOCATION": 1,
"OT.RESOURCES": 1,
"OT.RESTRICTED-MODE": 1,
"OT.RND": 1,
"OT.RNG": 1,
"OT.SCP": 3,
"OT.SEC_BOX_FW": 1,
"OT.SENSITIVE_RESULTS_INTEG": 1,
"OT.SID": 1,
"OT.SID_MODULE": 1,
"OT.TRANSACTION": 1
},
"T": {
"T.ATTACK_COUNTER": 1,
"T.COM_EXPLOIT": 1,
"T.CONFID-APPLI-DATA": 1,
"T.CONFID-JCS-CODE": 1,
"T.CONFID-JCS-DATA": 1,
"T.CONFIG": 1,
"T.EXE-CODE": 2,
"T.INTEG-APPLI-CODE": 2,
"T.INTEG-APPLI-DATA": 2,
"T.INTEG-JCS": 1,
"T.INTEG-JCS-CODE": 1,
"T.LIFE_CYCLE": 1,
"T.MODULE_EXEC": 1,
"T.MODULE_REPLACEMENT": 1,
"T.NATIVE": 1,
"T.OBJ-DELETION": 1,
"T.OS_OPERATE": 1,
"T.PHYSICAL": 1,
"T.RESOURCES": 1,
"T.RND": 1,
"T.SEC_BOX_BORDER": 1,
"T.SID": 2,
"T.UNAUTHORIZED_CARD_MNGT": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0059-2009-": 1,
"BSI-CC-PP-0059-2009-MA-02": 1,
"BSI-CC-PP-0075-2012-MA-01": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR.1": 1,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL4": 4,
"EAL4 augmented": 3,
"EAL6": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 1,
"FAU_GEN": 1,
"FAU_SAS": 1
},
"FCO": {
"FCO_NRO": 1
},
"FCS": {
"FCS_CKM": 14,
"FCS_CKM.1": 4,
"FCS_CKM.1.1": 2,
"FCS_CKM.2": 3,
"FCS_CKM.3": 1,
"FCS_CKM.4": 8,
"FCS_CKM.4.1": 1,
"FCS_COP": 11,
"FCS_COP.1": 3,
"FCS_COP.1.1": 2,
"FCS_RNG": 1,
"FCS_RNG.1": 1
},
"FDP": {
"FDP_ACC": 26,
"FDP_ACC.1": 14,
"FDP_ACF": 26,
"FDP_ACF.1": 20,
"FDP_IFC": 4,
"FDP_IFC.1": 6,
"FDP_IFF": 4,
"FDP_ITC": 6,
"FDP_ITC.1": 6,
"FDP_ITC.2": 3,
"FDP_RIP": 9,
"FDP_RIP.1": 4,
"FDP_RIP.1.1": 1,
"FDP_ROL": 2,
"FDP_SDI": 12,
"FDP_SDI.1": 2,
"FDP_SDI.2": 4,
"FDP_UCT": 6,
"FDP_UCT.1": 1,
"FDP_UIT": 1
},
"FIA": {
"FIA_AFL": 4,
"FIA_AFL.1": 4,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD": 2,
"FIA_UAU": 5,
"FIA_UAU.1": 4,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UID": 7,
"FIA_UID.1": 6,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_USB": 2
},
"FMT": {
"FMT_MOF": 1,
"FMT_MOF.1": 3,
"FMT_MOF.1.1": 1,
"FMT_MSA": 37,
"FMT_MSA.1": 5,
"FMT_MSA.2": 3,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 8,
"FMT_MSA.3.1": 2,
"FMT_MSA.3.2": 1,
"FMT_MSA.4": 3,
"FMT_MSA.4.1": 2,
"FMT_MTD": 12,
"FMT_MTD.1": 2,
"FMT_SMF": 10,
"FMT_SMF.1": 8,
"FMT_SMF.1.1": 1,
"FMT_SMR": 6,
"FMT_SMR.1": 10,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 1
},
"FPT": {
"FPT_EMS": 7,
"FPT_EMS.1": 10,
"FPT_EMS.1.1": 3,
"FPT_EMS.1.2": 3,
"FPT_FLS": 7,
"FPT_FLS.1": 5,
"FPT_FLS.1.1": 1,
"FPT_PHP": 6,
"FPT_PHP.1": 5,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_PHP.3": 4,
"FPT_PHP.3.1": 1,
"FPT_RCV": 1,
"FPT_TDC.1": 1,
"FPT_TST": 2,
"FPT_TST.1": 5,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC": 7,
"FTP_ITC.1": 4,
"FTP_TRP.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {
"JavaCard": {
"Java Card 2.1.1": 1,
"Java Card 2.2": 1
}
},
"os_name": {
"JCOP": {
"JCOP 4": 76,
"JCOP4": 2
}
},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 2,
"RNG": 5
}
},
"side_channel_analysis": {
"FI": {
"fault injection": 1,
"physical tampering": 5
},
"SCA": {
"DPA": 1,
"SPA": 1,
"physical probing": 2,
"side channel": 1,
"timing attacks": 1
}
},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
},
"PKCS": {
"PKCS #11": 2,
"PKCS#1": 2,
"PKCS#15": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {
"BSI": {
"BSI TR-02102-1": 8
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 1
},
"NXP": {
"NXP": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Arjan Jeckmans",
"/CreationDate": "D:20240927164546+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/Keywords": "for W2010 with macros",
"/MSIP_Label_01058f84-91de-4d5a-b21e-3d9ad6e73d65_Enabled": "True",
"/MSIP_Label_01058f84-91de-4d5a-b21e-3d9ad6e73d65_Method": "Privileged",
"/MSIP_Label_01058f84-91de-4d5a-b21e-3d9ad6e73d65_SiteId": "e0509b6d-dd1e-4bcc-b337-62dfde0e2112",
"/ModDate": "D:20240927164546+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"pdf_file_size_bytes": 919813,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.aeteurope.com/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 47
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400004-01-CR.pdf",
"scheme": "NL",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400004-01-ST_v1.23.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "dd9a7d62c33cad3e7f7d3e4a1c373f3c0528960354901888b0434abb42275fd9",
"txt_hash": "10962902ae503e7a0a71eb54be62efdd4850bc5cecfb5615eee04a8ff240ab2c"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "df79ba4115824efc771b378cd80a4c296c3a3f5d8ed200beb94c21c541a2fe13",
"txt_hash": "891ab6bff9f44e049f1a8dc8c9cc479b86242e888b1f35d12f0db8e87081ba73"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "454bd5e55d76dd2e3704071982f58bf612e4885086b2501cf3e7472aa47d335f",
"txt_hash": "d18585d6c4e65c9a7ad9d2b26b23f99abe1e4a3fef34566dfd5d44205982ed71"
}
},
"status": "active"
}