CARD STAR /memo3 FW-Version 4.0.6, HW-Versionen B00/B01

CSV information ?

Status archived
Valid from 25.06.2018
Valid until 25.06.2023
Scheme 🇩🇪 DE
Manufacturer CCV Deutschland GmbH
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, ADV_IMP.2, ADV_FSP.5, ALC_TAT.1, EAL3+, ADV_TDS.3

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0689-V2-2018

Certificate ?

Extracted keywords

Security level
EAL 3, EAL 4, EAL 2
Security Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.5
Protection profiles
BSI-CC-PP-0052-2015
Certificates
BSI-DSZ-CC-0689-V2-2018

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Title Zertifizierungsreport BSI-DSZ-CC-0689-V2-2018
Subject CARD STAR /memo3, FW-Version 4.0.6, HW-Version B00/B01
Keywords "Common Criteria, Certification, Zertifizierung, CCV Deutschland GmbH, Mobile Card Terminal for the German Healthcare System, MobCT"
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20180709113607+02'00'
Modification date D:20180709125752+02'00'
Pages 1
Creator Writer
Producer LibreOffice 5.2

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, HPC
Hash functions
SHA-256
Block cipher modes
GCM

Security level
EAL 3, EAL 4, EAL 2, EAL1, EAL4, EAL 5+, EAL 6
Security Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, ALC_FLR, AVA_VAN.5, AVA_VAN.3
Protection profiles
BSI-CC-PP-0052-2015, BSI-CC-PP-0052
Certificates
BSI-DSZ-CC-0689-V2-2018

Standards
FIPS 180-4, FIPS PUB 180-4, FIPS 197, NIST SP 800-38D, PKCS#1, PKCS #1, AIS 32, AIS 34, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065
Technical reports
BSI TR-02102, BSI 7148

File metadata

Title Zertifizierungsreport BSI-DSZ-CC-0689-V2-2018
Subject Common Criteria, Certification, CARD STAR /memo3, FW-Version 4.0.6, HW-Version B00/B01
Keywords "Common Criteria, Certification, Zertifizierung, CCV Deutschland GmbH, Mobile Card Terminal for the German Healthcare System, MobCT"
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20180706124801+02'00'
Modification date D:20180709112907+02'00'
Pages 28
Creator Writer
Producer LibreOffice 5.2

Frontpage

Certificate ID BSI-DSZ-CC-0689-V2-2018
Certified item CARD STAR /memo3, FW-Version 4.0.6, HW-Versionen B00/B01
Certification lab BSI
Developer CCV Deutschland GmbH

Security target ?

Extracted keywords

Symmetric Algorithms
AES, HPC
Hash functions
SHA-256

Security level
EAL3+, EAL 3, EAL3, EAL 3 augmented
Claims
O.PIN, O.RESIDUAL, O.SELFTESTS, O.PROTECTION, O.AUTH_STATE, O.MANAGEMENT, O.LOG_CARDS, O.LOG_DATA, O.TRANSFER, O.DMS_CONNECTION, O.TIME, O.SEALING, T.MAN_HW, T.DATA, T.ACCESS, T.AUTH_STATE, T.ADMIN_PIN, T.FIRMWARE, A.MEDIC, A.ADMIN, A.CARDS, A.DMS, A.PHYSICAL, A.ENVIRONMENT, OE.MEDIC, OE.ADMIN, OE.CARDS, OE.DMS, OE.PHYSICAL, OE.ENVIRONMENT, OE.DEVELOPER, OSP.LOG_CARDS, OSP.LOG_DATA, OSP.TRANSFER, OSP.DMS_CONNECTION, OSP.TIME, OSP.SEALING, OSP.SELFTESTS, OSP.EMERGENCY_DATA
Security Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_ARC.1, AGD_OPE.1, AGD_PRE.1, ALC_TAT.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5
Security Functional Requirements (SFR)
FAU_GEN, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM, FCS_CKM.4.1, FCS_COP, FCS_COP.1, FCS_CKM.4, FCS_CKM.2, FDP_SVR, FDP_SVR.1, FDP_SVR.1.1, FDP_SVR.1.2, FDP_SVR.1.3, FDP_ITC.1, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_RIP, FDP_RIP.1, FDP_SDI, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ICF, FDP_SDI.2, FDP_ITC.2, FIA_AFL, FIA_AFL.1.1, FIA_AFL.1.2, FIA_SOS.1, FIA_SOS.1.1, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.7, FIA_UAU.7.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_AFL.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_MTD.3, FMT_MTD.3.1, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FPT_STM.1.1, FPT_PHP.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTA_SSL.3.1, FTA_SSL.3, FTA_SSL.4, FTA_SSL.4.1, FTP_ITC.1
Protection profiles
BSI-CC-PP-0052, BSI-CC-PP-0032

Side-channel analysis
physical tampering
Certification process
out of scope, of the TOE Signature generation for emergency data on the eHC (done by an authorised card that is out of scope) 1.4.7 Physikalische Schutzmechanismen The TOE cannot counter physical attacks concerning

Standards
X.509

File metadata

Title Security Target für Common Criteria, EAL 3+
Subject CARD STAR /memo3
Keywords CC,Common Criteria,Security Target,Sicherheitsvorgaben,CARD STAR,Celectronic,Persicon
Author Tomas Müller
Creation date D:20180126124324+01'00'
Modification date D:20180126124324+01'00'
Pages 54
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

Heuristics ?

Certificate ID: BSI-DSZ-CC-0689-V2-2018

Extracted SARs

ATE_COV.2, AGD_OPE.1, ADV_ARC.1, ALC_DEL.1, ALC_DVS.1, ADV_FSP.5, AGD_PRE.1, ALC_CMC.3, ALC_LCD.1, ATE_DPT.1, ALC_CMS.3, ALC_TAT.1, AVA_VAN.5, ATE_FUN.1, ATE_IND.2, ADV_IMP.2, ADV_TDS.3

References ?

No references are available for this certificate.

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '25e8537d10b5e72e8322b235ce39e8a5616807f524f603a61a4bd645704f235e', 'txt_hash': 'f795b28ac0b53d47779c1a4526bb7a2b42b641c4a5d70fb04aa876c67e678174'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '6144af7c72ce7c111bb236f75412db1796ff4f2273fd38c972c3571dc658e09c', 'txt_hash': '12e9bfcd8aad1aa875a272e4299ba9520482c4d60d62016f6332d01e86d5b486'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ae1cea31f0f2fd3c989861fb31649e942c369a2bc845e260c0f6ffdfa052428b', 'txt_hash': '7fb5c36dbb02268cac199017f7d1cbc87214053f34c9fd643153e57bd8bbb4f4'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 1256328, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 28, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20180706124801+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, CCV Deutschland GmbH, Mobile Card Terminal for the German Healthcare System, MobCT"', '/ModDate': "D:20180709112907+02'00'", '/Producer': 'LibreOffice 5.2', '/Subject': 'Common Criteria, Certification, CARD STAR /memo3, FW-Version 4.0.6, HW-Version B00/B01', '/Title': 'Zertifizierungsreport BSI-DSZ-CC-0689-V2-2018', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/AIS', 'https://www.bsi.bund.de/zertifizierungsreporte']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1198182, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 54, '/Title': 'Security Target für Common Criteria, EAL 3+', '/Author': 'Tomas Müller', '/Subject': 'CARD STAR /memo3', '/Keywords': 'CC,Common Criteria,Security Target,Sicherheitsvorgaben,CARD STAR,Celectronic,Persicon', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20180126124324+01'00'", '/ModDate': "D:20180126124324+01'00'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 922451, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20180709113607+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, CCV Deutschland GmbH, Mobile Card Terminal for the German Healthcare System, MobCT"', '/ModDate': "D:20180709125752+02'00'", '/Producer': 'LibreOffice 5.2', '/Subject': 'CARD STAR /memo3, FW-Version 4.0.6, HW-Version B00/B01', '/Title': 'Zertifizierungsreport BSI-DSZ-CC-0689-V2-2018', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) zu (.+?) der (.*)'], 'cert_id': 'BSI-DSZ-CC-0689-V2-2018', 'cert_item': 'CARD STAR /memo3, FW-Version 4.0.6, HW-Versionen B00/B01', 'developer': 'CCV Deutschland GmbH', 'cert_lab': 'BSI'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0689-V2-2018': 14}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0052-2015': 2, 'BSI-CC-PP-0052': 1}}, 'cc_security_level': {'EAL': {'EAL 3': 4, 'EAL 4': 3, 'EAL 2': 3, 'EAL1': 1, 'EAL4': 1, 'EAL 5+': 1, 'EAL 6': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 4, 'ADV_IMP.1': 4, 'ADV_TDS.3': 4}, 'ALC': {'ALC_TAT.1': 4, 'ALC_FLR': 1}, 'AVA': {'AVA_VAN.5': 6, 'AVA_VAN.3': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 4}, 'HPC': {'HPC': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 6}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {'GCM': {'GCM': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 180-4': 2, 'FIPS PUB 180-4': 1, 'FIPS 197': 1}, 'NIST': {'NIST SP 800-38D': 2}, 'PKCS': {'PKCS#1': 2, 'PKCS #1': 1}, 'BSI': {'AIS 32': 1, 'AIS 34': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0052': 4, 'BSI-CC-PP-0032': 1}}, 'cc_security_level': {'EAL': {'EAL3+': 1, 'EAL 3': 4, 'EAL3': 1, 'EAL 3 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 4, 'ADV_IMP.1': 5, 'ADV_TDS.3': 5, 'ADV_ARC.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_TAT.1': 5, 'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 8}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1}, 'FCS': {'FCS_CKM.1': 16, 'FCS_CKM.1.1': 1, 'FCS_CKM': 1, 'FCS_CKM.4.1': 1, 'FCS_COP': 25, 'FCS_COP.1': 4, 'FCS_CKM.4': 15, 'FCS_CKM.2': 1}, 'FDP': {'FDP_SVR': 3, 'FDP_SVR.1': 11, 'FDP_SVR.1.1': 5, 'FDP_SVR.1.2': 3, 'FDP_SVR.1.3': 3, 'FDP_ITC.1': 16, 'FDP_ACC.1': 21, 'FDP_ACC.1.1': 1, 'FDP_ACF.1': 16, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 5, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 3, 'FDP_IFC': 28, 'FDP_IFC.1': 6, 'FDP_IFF': 33, 'FDP_IFF.1': 14, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_RIP': 13, 'FDP_RIP.1': 2, 'FDP_SDI': 1, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ICF': 2, 'FDP_SDI.2': 6, 'FDP_ITC.2': 5}, 'FIA': {'FIA_AFL': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_SOS.1': 6, 'FIA_SOS.1.1': 1, 'FIA_UAU.1': 10, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.5': 10, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.7': 9, 'FIA_UAU.7.1': 1, 'FIA_UID.1': 11, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_AFL.1': 6}, 'FMT': {'FMT_MSA.1': 9, 'FMT_MSA.1.1': 1, 'FMT_MSA.3': 18, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1': 8, 'FMT_MTD.1.1': 1, 'FMT_MTD.3': 6, 'FMT_MTD.3.1': 1, 'FMT_SMF.1': 10, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 15, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 11, 'FPT_STM.1.1': 1, 'FPT_PHP.1': 6, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_TST.1': 6, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTA': {'FTA_SSL.3.1': 2, 'FTA_SSL.3': 8, 'FTA_SSL.4': 8, 'FTA_SSL.4.1': 1}, 'FTP': {'FTP_ITC.1': 1}}, 'cc_claims': {'O': {'O.PIN': 7, 'O.RESIDUAL': 6, 'O.SELFTESTS': 6, 'O.PROTECTION': 8, 'O.AUTH_STATE': 9, 'O.MANAGEMENT': 9, 'O.LOG_CARDS': 3, 'O.LOG_DATA': 6, 'O.TRANSFER': 3, 'O.DMS_CONNECTION': 6, 'O.TIME': 6, 'O.SEALING': 3}, 'T': {'T.MAN_HW': 3, 'T.DATA': 3, 'T.ACCESS': 3, 'T.AUTH_STATE': 3, 'T.ADMIN_PIN': 3, 'T.FIRMWARE': 3}, 'A': {'A.MEDIC': 3, 'A.ADMIN': 3, 'A.CARDS': 4, 'A.DMS': 3, 'A.PHYSICAL': 3, 'A.ENVIRONMENT': 3}, 'OE': {'OE.MEDIC': 9, 'OE.ADMIN': 10, 'OE.CARDS': 7, 'OE.DMS': 4, 'OE.PHYSICAL': 5, 'OE.ENVIRONMENT': 6, 'OE.DEVELOPER': 1}, 'OSP': {'OSP.LOG_CARDS': 3, 'OSP.LOG_DATA': 3, 'OSP.TRANSFER': 3, 'OSP.DMS_CONNECTION': 3, 'OSP.TIME': 3, 'OSP.SEALING': 3, 'OSP.SELFTESTS': 3, 'OSP.EMERGENCY_DATA': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 4}, 'HPC': {'HPC': 10}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 4}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'X509': {'X.509': 5}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'of the TOE Signature generation for emergency data on the eHC (done by an authorised card that is out of scope) 1.4.7 Physikalische Schutzmechanismen The TOE cannot counter physical attacks concerning': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0689-V2-2018': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0052-2015': 1}}, 'cc_security_level': {'EAL': {'EAL 3': 1, 'EAL 4': 1, 'EAL 2': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'ALC': {'ALC_TAT.1': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 0689V2a_pdf.pdf.
    • The st_filename property was set to 0689V2b_pdf.pdf.
    • The cert_filename property was set to 0689V2c_pdf.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-0689-V2-2018.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0689V2a_pdf.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0689V2b_pdf.pdf.

    The state of the certificate object was updated.

    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The cert_metadata property was set to None.
    • The cert_keywords property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name CARD STAR /memo3 FW-Version 4.0.6, HW-Versionen B00/B01 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0689V2c_pdf.pdf",
  "dgst": "d671fdd55474d6e2",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0689-V2-2018",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "4.0.6"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "CCV Deutschland GmbH",
  "manufacturer_web": "https://www.ccv-deutschland.de",
  "name": "CARD STAR /memo3 FW-Version 4.0.6, HW-Versionen B00/B01",
  "not_valid_after": "2023-06-25",
  "not_valid_before": "2018-06-25",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "0689V2c_pdf.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0689-V2-2018": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0052-2015": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "ALC": {
          "ALC_TAT.1": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 3": 1,
          "EAL 4": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20180709113607+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, CCV Deutschland GmbH, Mobile Card Terminal for the German Healthcare System, MobCT\"",
      "/ModDate": "D:20180709125752+02\u002700\u0027",
      "/Producer": "LibreOffice 5.2",
      "/Subject": "CARD STAR /memo3, FW-Version 4.0.6, HW-Version B00/B01",
      "/Title": "Zertifizierungsreport BSI-DSZ-CC-0689-V2-2018",
      "pdf_file_size_bytes": 922451,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "0689V2a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cert_id": "BSI-DSZ-CC-0689-V2-2018",
        "cert_item": "CARD STAR /memo3, FW-Version 4.0.6, HW-Versionen B00/B01",
        "cert_lab": "BSI",
        "developer": "CCV Deutschland GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) zu (.+?) der (.*)"
        ]
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0689-V2-2018": 14
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0052": 1,
          "BSI-CC-PP-0052-2015": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_FSP.4": 4,
          "ADV_IMP.1": 4,
          "ADV_TDS.3": 4
        },
        "ALC": {
          "ALC_FLR": 1,
          "ALC_TAT.1": 4
        },
        "AVA": {
          "AVA_VAN.3": 1,
          "AVA_VAN.5": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 3,
          "EAL 3": 4,
          "EAL 4": 3,
          "EAL 5+": 1,
          "EAL 6": 1,
          "EAL1": 1,
          "EAL4": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {
        "GCM": {
          "GCM": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 6
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 32": 1,
          "AIS 34": 1
        },
        "FIPS": {
          "FIPS 180-4": 2,
          "FIPS 197": 1,
          "FIPS PUB 180-4": 1
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        },
        "NIST": {
          "NIST SP 800-38D": 2
        },
        "PKCS": {
          "PKCS #1": 1,
          "PKCS#1": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 4
          },
          "HPC": {
            "HPC": 1
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1,
          "BSI TR-02102": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20180706124801+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, CCV Deutschland GmbH, Mobile Card Terminal for the German Healthcare System, MobCT\"",
      "/ModDate": "D:20180709112907+02\u002700\u0027",
      "/Producer": "LibreOffice 5.2",
      "/Subject": "Common Criteria, Certification, CARD STAR /memo3, FW-Version 4.0.6, HW-Version B00/B01",
      "/Title": "Zertifizierungsreport BSI-DSZ-CC-0689-V2-2018",
      "pdf_file_size_bytes": 1256328,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/AIS",
          "https://www.bsi.bund.de/zertifizierung",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "http://www.commoncriteriaportal.org/cc/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 28
    },
    "st_filename": "0689V2b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ADMIN": 3,
          "A.CARDS": 4,
          "A.DMS": 3,
          "A.ENVIRONMENT": 3,
          "A.MEDIC": 3,
          "A.PHYSICAL": 3
        },
        "O": {
          "O.AUTH_STATE": 9,
          "O.DMS_CONNECTION": 6,
          "O.LOG_CARDS": 3,
          "O.LOG_DATA": 6,
          "O.MANAGEMENT": 9,
          "O.PIN": 7,
          "O.PROTECTION": 8,
          "O.RESIDUAL": 6,
          "O.SEALING": 3,
          "O.SELFTESTS": 6,
          "O.TIME": 6,
          "O.TRANSFER": 3
        },
        "OE": {
          "OE.ADMIN": 10,
          "OE.CARDS": 7,
          "OE.DEVELOPER": 1,
          "OE.DMS": 4,
          "OE.ENVIRONMENT": 6,
          "OE.MEDIC": 9,
          "OE.PHYSICAL": 5
        },
        "OSP": {
          "OSP.DMS_CONNECTION": 3,
          "OSP.EMERGENCY_DATA": 2,
          "OSP.LOG_CARDS": 3,
          "OSP.LOG_DATA": 3,
          "OSP.SEALING": 3,
          "OSP.SELFTESTS": 3,
          "OSP.TIME": 3,
          "OSP.TRANSFER": 3
        },
        "T": {
          "T.ACCESS": 3,
          "T.ADMIN_PIN": 3,
          "T.AUTH_STATE": 3,
          "T.DATA": 3,
          "T.FIRMWARE": 3,
          "T.MAN_HW": 3
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0032": 1,
          "BSI-CC-PP-0052": 4
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 4,
          "ADV_IMP.1": 5,
          "ADV_TDS.3": 5
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.3": 1,
          "ALC_CMS.3": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 5
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 8
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 3": 4,
          "EAL 3 augmented": 2,
          "EAL3": 1,
          "EAL3+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1
        },
        "FCS": {
          "FCS_CKM": 1,
          "FCS_CKM.1": 16,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 1,
          "FCS_CKM.4": 15,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 25,
          "FCS_COP.1": 4
        },
        "FDP": {
          "FDP_ACC.1": 21,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 16,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 5,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 3,
          "FDP_ICF": 2,
          "FDP_IFC": 28,
          "FDP_IFC.1": 6,
          "FDP_IFF": 33,
          "FDP_IFF.1": 14,
          "FDP_ITC.1": 16,
          "FDP_ITC.1.1": 1,
          "FDP_ITC.1.2": 1,
          "FDP_ITC.1.3": 1,
          "FDP_ITC.2": 5,
          "FDP_RIP": 13,
          "FDP_RIP.1": 2,
          "FDP_SDI": 1,
          "FDP_SDI.2": 6,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1,
          "FDP_SVR": 3,
          "FDP_SVR.1": 11,
          "FDP_SVR.1.1": 5,
          "FDP_SVR.1.2": 3,
          "FDP_SVR.1.3": 3
        },
        "FIA": {
          "FIA_AFL": 1,
          "FIA_AFL.1": 6,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_SOS.1": 6,
          "FIA_SOS.1.1": 1,
          "FIA_UAU.1": 10,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.5": 10,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.7": 9,
          "FIA_UAU.7.1": 1,
          "FIA_UID.1": 11,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_MSA.1": 9,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 18,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 8,
          "FMT_MTD.1.1": 1,
          "FMT_MTD.3": 6,
          "FMT_MTD.3.1": 1,
          "FMT_SMF.1": 10,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 15,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_PHP.1": 6,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_STM.1": 11,
          "FPT_STM.1.1": 1,
          "FPT_TST.1": 6,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTA": {
          "FTA_SSL.3": 8,
          "FTA_SSL.3.1": 2,
          "FTA_SSL.4": 8,
          "FTA_SSL.4.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "of the TOE  Signature generation for emergency data on the eHC (done by an authorised card that is out of scope) 1.4.7 Physikalische Schutzmechanismen The TOE cannot counter physical attacks concerning": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 4
        }
      },
      "standard_id": {
        "X509": {
          "X.509": 5
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 4
          },
          "HPC": {
            "HPC": 10
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Tomas M\u00fcller",
      "/CreationDate": "D:20180126124324+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/Keywords": "CC,Common Criteria,Security Target,Sicherheitsvorgaben,CARD STAR,Celectronic,Persicon",
      "/ModDate": "D:20180126124324+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Subject": "CARD STAR /memo3",
      "/Title": "Security Target f\u00fcr Common Criteria, EAL 3+",
      "pdf_file_size_bytes": 1198182,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 54
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0052b_pdf.pdf",
        "pp_name": "Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System (MobCT\u0026..."
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0689V2a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL3+",
      "AVA_VAN.5",
      "ADV_FSP.5",
      "ADV_TDS.3",
      "ALC_TAT.1",
      "ADV_IMP.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0689V2b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "ae1cea31f0f2fd3c989861fb31649e942c369a2bc845e260c0f6ffdfa052428b",
      "txt_hash": "7fb5c36dbb02268cac199017f7d1cbc87214053f34c9fd643153e57bd8bbb4f4"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "25e8537d10b5e72e8322b235ce39e8a5616807f524f603a61a4bd645704f235e",
      "txt_hash": "f795b28ac0b53d47779c1a4526bb7a2b42b641c4a5d70fb04aa876c67e678174"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "6144af7c72ce7c111bb236f75412db1796ff4f2273fd38c972c3571dc658e09c",
      "txt_hash": "12e9bfcd8aad1aa875a272e4299ba9520482c4d60d62016f6332d01e86d5b486"
    }
  },
  "status": "archived"
}