NXP IDentity Applet v4.0/PACE-EAC1 (eMRTD)/PACE-EAC2 (eIDAS) on NXP JCOP 4.5 P71

CSV information

Status active
Valid from 13.02.2026
Valid until 13.02.2031
Scheme 🇳🇱 NL
Manufacturer NXP Semiconductors Germany GmbH
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, EAL5+, ALC_DVS.2
Protection profiles

Heuristics summary

Certificate ID: NSCIB-CC-2400102-01-CR

Certificate

certificate file processing did not finish successfully.
Download pdf: OK
Convert pdf to text: OK
Extract keywords: ERROR

Extracted keywords

Protocols
PACE

Operating System name
JCOP 4
Vendor
NXP Semiconductors, NXP

Security level
EAL5, EAL2, EAL7, EAL5 augmented
Security Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.3, ALC_FLR, AVA_VAN.5
Protection profiles
BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0068-V2-2011-MA-01, BSI-CC-PP-0086-2015
Certificates
NSCIB-CC-2400102-01, NSCIB-2400102-01
Evaluation facilities
Riscure

Standards
ISO/IEC 15408-1, ISO/IEC 18045, ISO/IEC 18045:2008
Technical reports
BSI TR-03110

Certification report

Extracted keywords

Protocols
PACE
Randomness
RNG

Operating System name
JCOP 4
Vendor
NXP, NXP Semiconductors

Security level
EAL4, EAL5, EAL5+, EAL 5, EAL6+, EAL5 augmented, EAL 5 augmented
Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5
Protection profiles
BSI-CC-PP-0056-V2-, BSI-CC-PP-0068-V2-2011-MA-01, BSI-CC-PP-0086-2015
Certificates
BSI-DSZ-CC-1149-V4-2025, NSCIB-CC-2400102-01-CR, NSCIB-2400102-01, NSCIB-CC-2300127-02, NSCIB-CC-2300127-02-CR
Evaluation facilities
Riscure, TÜV Informationstechnik

Side-channel analysis
side-channel, JIL, JIL-AAPS, JHAS
Certification process
Software and Crypto Library (R1/R2/R3), Version 4, 2025-08-07, TÜV Informationstechnik GmbH. (confidential document) [HW-ST] Security Target Lite BSI-DSZ-CC-1149-V4-2025, NXP Secure Smart Card Controller N7122 with

Standards
ICAO
Technical reports
BSI TR-03110

File metadata

Title Certification Report
Author Valerie
Creation date D:20260219214920+00'00'
Modification date D:20260219214920+00'00'
Pages 12
Creator Microsoft® Word 2021
Producer Microsoft® Word 2021

Frontpage

Certificate ID NSCIB-CC-2400102-01-CR
Certified item IDentity Applet v4.0/PACE-EAC1 (eMRTD)/PACE-EAC2 (eIDAS) on NXP JCOP 4.5 P71
Certification lab Keysight Technologies Netherlands Riscure B.V.
Developer ID&Trust Kft

References

Outgoing

Security target

Extracted keywords

Symmetric Algorithms
AES, DES, TripleDES, 3DES, TDES, Triple-DES, KMAC, CMAC
Asymmetric Algorithms
RSA 2048, RSA-CRT, RSA-PSS, ECDH, ECDSA, ECC, DH, Diffie-Hellman
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
Schemes
MAC
Protocols
PACE
Randomness
RNG, RND
Engines
SmartMX3
Libraries
Crypto Library 287
Block cipher modes
CBC, CCM

Operating System name
JCOP 4
IC data groups
EF.DG15, EF.DG14, EF.SOD, EF.ChipSecurity
Vendor
NXP, NXP Semiconductors

Security level
EAL5+, EAL5, EAL6+, EAL 6+, EAL4, EAL 5, EAL 6, EAL5 augmented, EAL4 augmented, EAL 5 augmented
Claims
OT.ALARM, OT.CARD-CONFIGURATION, OT.CARD-MANAGEMENT, OT.CIPHER, OT.COMM_AUTH, OT.COMM_CONFIDENTIALITY, OT.COMM_INTEGRITY, OT.DOMAIN-RIGHTS, OT.GLOBAL_ARRAYS_CONFID, OT.TOE_IDENTIFICATION, OT.KEY-MNGT, OT.OPERATE, OT.PIN-MNGT, OT.REALLOCATION, OT.RESOURCES, OT.RND, OT.SCP, OT.SID_MODULE, OT.TRANSACTION, OT.APPLI-AUTH, OT.AUTH-LOAD-UPDATE-IMAGE, OT.BIO-MNGT, OT.CONFID-UPDATE-IMAGE, OT.FIREWALL, OT.GLOBAL_ARRAYS_INTEG, OT.NATIVE, OT.OBJ-DELETION, OT.SEC_BOX_FW, OT.SECURE_ACTIVATION_ADDITIONAL_CODE, OT.SECURE_LOAD_ACODE, OT.SENSITIVE_RESULT_INTEG, OT.SID, OE.APPLET, OE.APPS-PROVIDER, OE.CODE-EVIDENCE, OE.KEY-CHANGE, OE.PROCESS_SEC_IC, OE.SECURITY-, OE.USE_DIAG, OE.USE_KEYS, OE.VERIFICATION, OE.VERIFICATION-, OSP, OSP.VERIFICATION, OSP.PROCESS-TOE, OSP.KEY-CHANGE, OSP.SECURE-BOX, OSP.SECURITY-DOMAINS
Security Assurance Requirements (SAR)
ADV_SPM.1, ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, AGD_PRE.1, AGD_OPE.1, ALC_DVS.2, ALC_FLR.1, ALC_DEL.1, ATE_DPT.2, ATE_DPT.1, AVA_VAN.5, ASE_TSS.2
Security Functional Requirements (SFR)
FAU_SAS, FAU_ARP.1, FAU_SAS.1, FCO_NRO.2, FCS_CKM, FCS_COP, FCS_RND, FCS_CKM.1, FCS_COP.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.4, FCS_COP.1.1, FCS_CKM.1.1, FCS_RNG.1, FCS_RND.1, FDP_ACF, FDP_ACC, FDP_RIP, FDP_UCT, FDP_UIT, FDP_ACF.1, FDP_ACC.1, FDP_ACC.2, FDP_IFC.1, FDP_IFC.2, FDP_IFF.1, FDP_ITC.2, FDP_RIP.1, FDP_ROL.1, FDP_SDI.2, FDP_UIT.1, FDP_ITC.1, FDP_UCT.1, FIA_AFL, FIA_API, FIA_UID, FIA_UAU, FIA_API.1, FIA_AFL.1, FIA_ATD.1, FIA_UID.1, FIA_UID.2, FIA_USB.1, FIA_UAU.1, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FMT_MTD, FMT_SMF, FMT_SMR.1, FMT_LIM, FMT_MTD.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.3, FMT_SMF.1, FMT_LIM.1, FMT_LIM.2, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMR, FPR_UNO.1, FPT_EMS, FPT_FLS, FPT_TST, FPT_PHP, FPT_FLS.1, FPT_TDC.1, FPT_RCV.3, FPT_PHP.3, FPT_EMS.1, FPT_TST.1, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP-0055, BSI-CC-PP-0068-, BSI-CC-PP-0056-, BSI-CC-PP-0086-, BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0086, BSI-CC-PP-0068-V2-2011-MA-01, BSI-CC-PP-0086-2015, BSI-CC-PP-0068-V2-2011, BSI-CC-PP-0087
Certificates
BSI-DSZ-CC-1149-V4-2025, NSCIB-CC-2300127-02

Side-channel analysis
physical probing, physical tampering, Malfunction, malfunction
Certification process
out of scope, None EAC2 terminal none common user data EAC2 protected data Other terminals than the above are out of scope of this ST. In particular, terminals using Basic 244 Access Control (BAC) may be functionally, Applet v4.0/PACE-EAC1/EAC2 Security Target Page 40 of 162 cannot be mapped because these are out of scope. 687 The objectives for the operational environment can be mapped as follows: 688 Objective from

Standards
PKCS#3, AIS20, ISO/IEC 18013, ISO/IEC 14443, ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004
Technical reports
BSI TR-03117, BSI TR-03110, BSI 550

File metadata

Title IDENTITY APPLET V4.0/PACE-EAC1/EAC2 - SECURITY TARGET
Author David Lovasz
Creation date D:20260112213908+01'00'
Modification date D:20260112213908+01'00'
Pages 162
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

References

Outgoing

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

NSCIB-CC-2400102-01-CR

Extracted SARs

ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_SPM.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ASE_TSS.2, ATE_DPT.2, AVA_VAN.5

References

Loading...

Updates Feed

  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400102-01-Cert.pdf",
  "dgst": "73b12489d8d6d0cf",
  "heuristics": {
    "_type": "sec_certs.sample.cc_eucc_common.Heuristics",
    "annotated_references": null,
    "cert_id": "NSCIB-CC-2400102-01-CR",
    "cert_lab": [
      ""
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL5+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "4.5",
        "4.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "a33327d40f253f46",
        "b380aabf93b29692",
        "64065d44659bf9ef"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1149-V4-2025",
          "NSCIB-CC-2300127-02-CR"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1149-V3-2023",
          "BSI-DSZ-CC-1149-V4-2025",
          "BSI-DSZ-CC-1149-2022",
          "BSI-DSZ-CC-1149-V2-2023",
          "NSCIB-CC-2300127-02-CR"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1149-V4-2025",
          "NSCIB-CC-2300127-02-CR"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1149-V4-2025",
          "NSCIB-CC-2300127-02-CR"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "NXP Semiconductors Germany GmbH",
  "manufacturer_web": "https://www.nxp.com",
  "name": "NXP IDentity Applet v4.0/PACE-EAC1 (eMRTD)/PACE-EAC2 (eIDAS) on NXP JCOP 4.5 P71",
  "not_valid_after": "2031-02-13",
  "not_valid_before": "2026-02-13",
  "pdf_data": {
    "_type": "sec_certs.sample.cc_eucc_common.PdfData",
    "cert_filename": "NSCIB-CC-2400102-01-Cert.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "NL": {
          "NSCIB-2400102-01": 1,
          "NSCIB-CC-2400102-01": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0056-V2-2012": 1,
          "BSI-CC-PP-0068-V2-2011-MA-01": 1,
          "BSI-CC-PP-0086-2015": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1,
          "ALC_FLR": 1,
          "ALC_FLR.3": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL5": 1,
          "EAL5 augmented": 1,
          "EAL7": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 2
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Riscure": {
          "Riscure": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 4": 1
        }
      },
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408-1": 2,
          "ISO/IEC 18045": 4,
          "ISO/IEC 18045:2008": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {
        "BSI": {
          "BSI TR-03110": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 1,
          "NXP Semiconductors": 1
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": null,
    "report_filename": "NSCIB-CC-2400102-01-CR.pdf",
    "report_frontpage": {
      "NL": {
        "cert_id": "NSCIB-CC-2400102-01-CR",
        "cert_item": "IDentity Applet v4.0/PACE-EAC1 (eMRTD)/PACE-EAC2 (eIDAS) on NXP JCOP 4.5 P71",
        "cert_lab": " Keysight Technologies Netherlands Riscure B.V.",
        "developer": "ID\u0026Trust Kft"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1149-V4-2025": 3
        },
        "NL": {
          "NSCIB-2400102-01": 1,
          "NSCIB-CC-2300127-02": 1,
          "NSCIB-CC-2300127-02-CR": 1,
          "NSCIB-CC-2400102-01-CR": 12
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0056-V2-": 1,
          "BSI-CC-PP-0068-V2-2011-MA-01": 1,
          "BSI-CC-PP-0086-2015": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 2
        },
        "AVA": {
          "AVA_VAN.5": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL 5 augmented": 1,
          "EAL4": 1,
          "EAL5": 1,
          "EAL5 augmented": 1,
          "EAL5+": 1,
          "EAL6+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "Software and Crypto Library (R1/R2/R3), Version 4, 2025-08-07, T\u00dcV Informationstechnik GmbH. (confidential document) [HW-ST] Security Target Lite BSI-DSZ-CC-1149-V4-2025, NXP Secure Smart Card Controller N7122 with": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 3
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Riscure": {
          "Riscure": 2
        },
        "TUV": {
          "T\u00dcV Informationstechnik": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 4": 16
        }
      },
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "SCA": {
          "side-channel": 1
        },
        "other": {
          "JHAS": 1,
          "JIL": 4,
          "JIL-AAPS": 1
        }
      },
      "standard_id": {
        "ICAO": {
          "ICAO": 3
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {
        "BSI": {
          "BSI TR-03110": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 16,
          "NXP Semiconductors": 3
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Valerie",
      "/CreationDate": "D:20260219214920+00\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2021",
      "/ModDate": "D:20260219214920+00\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2021",
      "/Title": "Certification Report",
      "pdf_file_size_bytes": 418261,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "https://www.sogis.eu/",
          "https://trustcb.com/common-criteria/nscib/",
          "mailto:[email protected]",
          "https://nscib.nl/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 12
    },
    "st_filename": "NSCIB-CC-2400102-01-ST.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          },
          "ECDH": {
            "ECDH": 9
          },
          "ECDSA": {
            "ECDSA": 7
          }
        },
        "FF": {
          "DH": {
            "DH": 7,
            "Diffie-Hellman": 13
          }
        },
        "RSA": {
          "RSA 2048": 1,
          "RSA-CRT": 3,
          "RSA-PSS": 1
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1149-V4-2025": 1
        },
        "NL": {
          "NSCIB-CC-2300127-02": 1
        }
      },
      "cc_claims": {
        "OE": {
          "OE.APPLET": 1,
          "OE.APPS-PROVIDER": 1,
          "OE.CODE-EVIDENCE": 1,
          "OE.KEY-CHANGE": 1,
          "OE.PROCESS_SEC_IC": 1,
          "OE.SECURITY-": 1,
          "OE.USE_DIAG": 1,
          "OE.USE_KEYS": 1,
          "OE.VERIFICATION": 1,
          "OE.VERIFICATION-": 1
        },
        "OSP": {
          "OSP": 1,
          "OSP.KEY-CHANGE": 1,
          "OSP.PROCESS-TOE": 1,
          "OSP.SECURE-BOX": 1,
          "OSP.SECURITY-DOMAINS": 1,
          "OSP.VERIFICATION": 1
        },
        "OT": {
          "OT.ALARM": 1,
          "OT.APPLI-AUTH": 1,
          "OT.AUTH-LOAD-UPDATE-IMAGE": 1,
          "OT.BIO-MNGT": 1,
          "OT.CARD-CONFIGURATION": 1,
          "OT.CARD-MANAGEMENT": 1,
          "OT.CIPHER": 1,
          "OT.COMM_AUTH": 1,
          "OT.COMM_CONFIDENTIALITY": 1,
          "OT.COMM_INTEGRITY": 1,
          "OT.CONFID-UPDATE-IMAGE": 1,
          "OT.DOMAIN-RIGHTS": 1,
          "OT.FIREWALL": 1,
          "OT.GLOBAL_ARRAYS_CONFID": 1,
          "OT.GLOBAL_ARRAYS_INTEG": 1,
          "OT.KEY-MNGT": 1,
          "OT.NATIVE": 1,
          "OT.OBJ-DELETION": 1,
          "OT.OPERATE": 1,
          "OT.PIN-MNGT": 1,
          "OT.REALLOCATION": 1,
          "OT.RESOURCES": 1,
          "OT.RND": 1,
          "OT.SCP": 3,
          "OT.SECURE_ACTIVATION_ADDITIONAL_CODE": 1,
          "OT.SECURE_LOAD_ACODE": 1,
          "OT.SEC_BOX_FW": 1,
          "OT.SENSITIVE_RESULT_INTEG": 1,
          "OT.SID": 1,
          "OT.SID_MODULE": 1,
          "OT.TOE_IDENTIFICATION": 1,
          "OT.TRANSACTION": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0055": 1,
          "BSI-CC-PP-0056-": 2,
          "BSI-CC-PP-0056-V2-2012": 1,
          "BSI-CC-PP-0068-": 1,
          "BSI-CC-PP-0068-V2-2011": 1,
          "BSI-CC-PP-0068-V2-2011-MA-01": 1,
          "BSI-CC-PP-0086": 1,
          "BSI-CC-PP-0086-": 1,
          "BSI-CC-PP-0086-2015": 1,
          "BSI-CC-PP-0087": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 2,
          "ADV_FSP.4": 2,
          "ADV_IMP.1": 2,
          "ADV_SPM.1": 1,
          "ADV_TDS.3": 2
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 4
        },
        "ALC": {
          "ALC_DEL.1": 2,
          "ALC_DVS.2": 11,
          "ALC_FLR.1": 3
        },
        "ASE": {
          "ASE_TSS.2": 3
        },
        "ATE": {
          "ATE_DPT.1": 1,
          "ATE_DPT.2": 4
        },
        "AVA": {
          "AVA_VAN.5": 11
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 2,
          "EAL 5 augmented": 1,
          "EAL 6": 2,
          "EAL 6+": 1,
          "EAL4": 3,
          "EAL4 augmented": 3,
          "EAL5": 12,
          "EAL5 augmented": 3,
          "EAL5+": 1,
          "EAL6+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 2,
          "FAU_SAS": 18,
          "FAU_SAS.1": 4
        },
        "FCO": {
          "FCO_NRO.2": 1
        },
        "FCS": {
          "FCS_CKM": 132,
          "FCS_CKM.1": 24,
          "FCS_CKM.1.1": 3,
          "FCS_CKM.2": 10,
          "FCS_CKM.3": 1,
          "FCS_CKM.4": 22,
          "FCS_COP": 114,
          "FCS_COP.1": 40,
          "FCS_COP.1.1": 23,
          "FCS_RND": 21,
          "FCS_RND.1": 3,
          "FCS_RNG.1": 5
        },
        "FDP": {
          "FDP_ACC": 25,
          "FDP_ACC.1": 5,
          "FDP_ACC.2": 4,
          "FDP_ACF": 35,
          "FDP_ACF.1": 32,
          "FDP_IFC.1": 4,
          "FDP_IFC.2": 6,
          "FDP_IFF.1": 6,
          "FDP_ITC.1": 12,
          "FDP_ITC.2": 14,
          "FDP_RIP": 23,
          "FDP_RIP.1": 14,
          "FDP_ROL.1": 2,
          "FDP_SDI.2": 3,
          "FDP_UCT": 20,
          "FDP_UCT.1": 1,
          "FDP_UIT": 20,
          "FDP_UIT.1": 3
        },
        "FIA": {
          "FIA_AFL": 45,
          "FIA_AFL.1": 10,
          "FIA_API": 63,
          "FIA_API.1": 8,
          "FIA_ATD.1": 2,
          "FIA_UAU": 148,
          "FIA_UAU.1": 12,
          "FIA_UAU.4": 5,
          "FIA_UAU.5": 11,
          "FIA_UAU.6": 3,
          "FIA_UID": 43,
          "FIA_UID.1": 15,
          "FIA_UID.2": 1,
          "FIA_USB.1": 2
        },
        "FMT": {
          "FMT_LIM": 41,
          "FMT_LIM.1": 5,
          "FMT_LIM.2": 5,
          "FMT_MSA.1": 12,
          "FMT_MSA.2": 1,
          "FMT_MSA.3": 13,
          "FMT_MTD": 237,
          "FMT_MTD.1": 22,
          "FMT_MTD.3": 3,
          "FMT_SMF": 38,
          "FMT_SMF.1": 31,
          "FMT_SMR": 25,
          "FMT_SMR.1": 45,
          "FMT_SMR.1.1": 2,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO.1": 1
        },
        "FPT": {
          "FPT_EMS": 27,
          "FPT_EMS.1": 11,
          "FPT_FLS": 16,
          "FPT_FLS.1": 10,
          "FPT_PHP": 18,
          "FPT_PHP.3": 3,
          "FPT_RCV.3": 1,
          "FPT_TDC.1": 1,
          "FPT_TST": 20,
          "FPT_TST.1": 4
        },
        "FTP": {
          "FTP_ITC": 32,
          "FTP_ITC.1": 13,
          "FTP_TRP.1": 2
        }
      },
      "certification_process": {
        "OutOfScope": {
          "Applet v4.0/PACE-EAC1/EAC2 Security Target Page 40 of 162 cannot be mapped because these are out of scope. 687 The objectives for the operational environment can be mapped as follows: 688 Objective from": 1,
          "None EAC2 terminal none common user data EAC2 protected data Other terminals than the above are out of scope of this ST. In particular, terminals using Basic 244 Access Control (BAC) may be functionally": 1,
          "out of scope": 2
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "CCM": {
          "CCM": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {
        "SmartMX": {
          "SmartMX3": 1
        }
      },
      "crypto_library": {
        "Generic": {
          "Crypto Library 287": 1
        }
      },
      "crypto_protocol": {
        "PACE": {
          "PACE": 184
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 8
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 6
          },
          "SHA2": {
            "SHA-224": 3,
            "SHA-256": 7,
            "SHA-384": 2,
            "SHA-512": 2
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.ChipSecurity": 1,
          "EF.DG14": 1,
          "EF.DG15": 1,
          "EF.SOD": 1
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 4": 9
        }
      },
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 1,
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 1,
          "malfunction": 1,
          "physical tampering": 1
        },
        "SCA": {
          "physical probing": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS20": 1
        },
        "CC": {
          "CCMB-2017-04-001": 2,
          "CCMB-2017-04-002": 2,
          "CCMB-2017-04-003": 2,
          "CCMB-2017-04-004": 1
        },
        "ICAO": {
          "ICAO": 13
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 18013": 2
        },
        "PKCS": {
          "PKCS#3": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 35
          }
        },
        "DES": {
          "3DES": {
            "3DES": 8,
            "TDES": 3,
            "Triple-DES": 8,
            "TripleDES": 5
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 4,
            "KMAC": 1
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 550": 1,
          "BSI TR-03110": 3,
          "BSI TR-03117": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 10,
          "NXP Semiconductors": 2
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "David Lovasz",
      "/CreationDate": "D:20260112213908+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20260112213908+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "/Title": "IDENTITY APPLET V4.0/PACE-EAC1/EAC2 - SECURITY TARGET",
      "pdf_file_size_bytes": 1595190,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 162
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0086b_pdf.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400102-01-CR.pdf",
  "scheme": "NL",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_VAN.5",
      "EAL5+",
      "ALC_DVS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400102-01-ST.pdf",
  "state": {
    "_type": "sec_certs.sample.cc_eucc_common.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": false,
      "json_hash": null,
      "pdf_hash": "cd577959a765774ed6415c07848ec6f033682f7d1948be466e5f9a692ab99682",
      "txt_hash": "3b345f6aa2fe24a14fec0a5e13239d919f8e73e834c27436b375b56f0b612426"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "5641cb6dd482373a65568725e34a89a03d60b5e05998c3c3c2ed1308c532519e",
      "txt_hash": "ed7c16dec50c6a72aa2a55a0a6b6975210790f6477b8586edb1d7a1fe809f518"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "d9e8ef6a7378586c5529ec217c1104ff99e22162945748d813cad3cfa7c46239",
      "txt_hash": "0d97f8658b50b43f12a52b70f574729624e0fd607e88fa1f841311b174a71ab2"
    }
  },
  "status": "active"
}