SOMA-c018 Machine Readable Electronic Document - Basic Access Control version 2 (SOMA-c018_2)

CSV information ?

Status active
Valid from 13.10.2020
Valid until 13.10.2025
Scheme 🇪🇸 ES
Manufacturer HID Global
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_DVS.2, EAL4+

Heuristics summary ?

Certificate ID: 2017-62-INF-3233

Certificate ?

Extracted keywords

Security level
EAL 2, EAL4
Claims
O.E, T.I
Security Assurance Requirements (SAR)
ALC_FLR, ALC_DVS.2
Protection profiles
BSI-CC-PP-0055
Evaluation facilities
Applus Laboratories

File metadata

Pages 2

Certification report ?

Extracted keywords

Symmetric Algorithms
DES
Asymmetric Algorithms
ECC
Schemes
MAC
Randomness
DTRNG

IC data groups
EF.DG14, EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG13, EF.DG16, EF.DG15
Vendor
Samsung

Security level
EAL4, EAL4+, EAL6, EAL 1, EAL 4, EAL 2, EAL2, EAL6 augmented, ITSEC Evaluation
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCS.1, ALC_TAT.1, ALC_FLR, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1, ASE_TSS.2
Security Functional Requirements (SFR)
FAU_SAS.1, FCS_CKM, FCS_CKM.4, FCS_COP, FCS_RND.1, FDP_ACC.1, FDP_ACF.1, FDP_UCT.1, FDP_UIT.1, FIA_AFL, FIA_UAU.1, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FIA_UID.1, FMT_LIM.1, FMT_LIM.2, FMT_MTD, FMT_SMF.1, FMT_SMR.1, FPT_FLS.1, FPT_PHP.3, FPT_TST.1
Protection profiles
BSI-CC-PP-0055
Certificates
ANSSI-CC-2018/12, 2017-62-INF-3233-v1
Evaluation facilities
Applus Laboratories
Certification process
out of scope, These data are protected by means of Extended Access Control, which is out of scope of the Security Target, according to [CC_P1]. These data are protected by means of Extended Access Control, which is out of scope of the Security Target. 18/24 https://oc.ccn.cni.es [email protected] Application

Side-channel analysis
physical probing, DPA, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineering
Certification process
out of scope, These data are protected by means of Extended Access Control, which is out of scope of the Security Target, according to [CC_P1]. These data are protected by means of Extended Access Control, which is out of scope of the Security Target. 18/24 https://oc.ccn.cni.es [email protected] Application

Standards
ICAO

File metadata

Pages 24

References

Outgoing
  • ANSSI-CC-2018/12 - archived - S3D350A / S3D300A / S3D264A / S3D232A / S3D200A / S3K350A / S3K300A 32-bit RISC Microcontroller for Smart Card with optional AT1 Secure Libraries including specific IC Dedicated software

Security target ?

Extracted keywords

Symmetric Algorithms
AES-256, AES, DES, Triple-DES, TDES
Hash functions
SHA-1, SHA-256, SHA-224
Schemes
MAC
Protocols
PACE
Randomness
DTRNG, RND
Block cipher modes
CBC

IC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG15, EF.DG14, EF.DG13, EF.COM, EF.SOD
Vendor
Samsung

Security level
EAL4+, EAL6+, EAL4, EAL6, EAL6 augmented
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_ARC, ADV_FSP, ADV_TDS, ADV_IMP, AGD_OPE.1, AGD_PRE.1, AGD_PRE, AGD_OPE, ALC_DVS.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ALC_DVS.1, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_LCD, ALC_TAT, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3, AVA_VAN, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_TSS.2
Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_GEN, FAU_SAS.1.1, FCS_RND, FCS_CKM, FCS_CKM.4, FCS_COP, FCS_RND.1, FCS_CKM.1, FCS_RND.1.1, FCS_CKM.2, FCS_COP.1, FCS_CMK.4, FDP_ACC.1, FDP_ACF.1, FDP_UCT.1, FDP_UIT.1, FDP_ACF, FDP_ITC.1, FDP_ITC.2, FDP_IFC.1, FDP_ACF.1.2, FDP_ACF.1.4, FDP_ITC, FIA_UID.1, FIA_UAU.1, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FIA_AFL, FIA_UAU.5.2, FIA_SOS.2, FIA_AFL.1, FMT_LIM, FMT_SMF.1, FMT_SMR.1, FMT_LIM.1, FMT_LIM.2, FMT_MTD, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.3, FMT_MTD.1, FMT_MSA.1, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_TST, FPT_TST.1.3, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP-0055, BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0068-V2-2011-MA-01, BSI-CC-PP-0084-2014
Certificates
ANSSI-CC-2018/12
Certification process
out of scope, These data are protected by means of Extended Access Control, which is out of scope of this ST, optional according to [R16]. These data are protected by means of Extended Access Control, which is out of scope of this ST. SOMA-c018 Security Target Basic Access Control Public Version ASE Version: 1.0 Date

Side-channel analysis
physical probing, side channels, DPA, SPA, timing attacks, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineering
Certification process
out of scope, These data are protected by means of Extended Access Control, which is out of scope of this ST, optional according to [R16]. These data are protected by means of Extended Access Control, which is out of scope of this ST. SOMA-c018 Security Target Basic Access Control Public Version ASE Version: 1.0 Date

Standards
FIPS 180-4, FIPS 180-2, FIPS 46-3, FIPS 197, FIPS PUB 46-3, FIPS PUB 180-4, FIPS PUB 197, AIS31, RFC 2119, RFC 3369, ISO/IEC 7816-2, ISO/IEC 14443, ISO/IEC 7816-4, ICAO
Technical reports
BSI TR-03110

File metadata

Pages 126

References

Outgoing
  • ANSSI-CC-2018/12 - archived - S3D350A / S3D300A / S3D264A / S3D232A / S3D200A / S3K350A / S3K300A 32-bit RISC Microcontroller for Smart Card with optional AT1 Secure Libraries including specific IC Dedicated software

Heuristics ?

Certificate ID: 2017-62-INF-3233

Extracted SARs

ALC_TAT.1, ADV_TDS.3, ALC_LCS.1, ALC_DVS.2, ALC_CMC.4, ASE_CCL.1, AVA_VAN.3, ALC_LCD.1, ATE_COV.2, ATE_FUN.1, ALC_CMS.4, ATE_DPT.1, AGD_OPE.1, ASE_OBJ.2, ALC_DEL.1, ATE_IND.2, ADV_IMP.1, ASE_INT.1, ASE_REQ.2, ADV_ARC.1, AGD_PRE.1, ASE_ECD.1, ASE_TSS.2, ASE_SPD.1, ADV_FSP.4

Scheme data ?

Product SOMA-c018 Machine Readable Electronic Document - Basic Access Control version 2 (SOMA-c018_2)
Product Link https://oc.ccn.cni.es/en/certified-products/certified-products/606-soma-c018-machine-readable-electronic-document-basic-access-control-version-2-soma-c018-2
Category Smart Cards and similiar devices
Manufacturer HID Global / Arjo Systems
Certification Date 13/10/2020

References ?

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'db3bc08d2a9c44d92f60eb6aeb941d63390f4c299faf694cd6f19962313f0f9d', 'txt_hash': '7c8839d2f933c637e7cd723adeb48611658a69ad9d68b5561189039df005ce48'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '278398ab53989633bda438718f51554f39c3f45ff98ca1b94d8cc5b7c9fa25bc', 'txt_hash': '5f0558cdbb2e0ed07f06d017c47a09722f67c0a3a34dc1269692bf57dac38f88'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1664826, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 126, '/Subject': '', '/Producer': '', '/Title': '', '/ModDate': '', '/Creator': '', '/Keywords': '', '/Trapped': '', '/Author': '', '/CreationDate': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 753717, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Title': '', '/CreationDate': '', '/Producer': '', '/ModDate': '', '/Trapped': '', '/Creator': '', '/Keywords': '', '/Author': '', '/Subject': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2018/12': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0055': 1, 'BSI-CC-PP-0056-V2-2012': 1, 'BSI-CC-PP-0068-V2-2011-MA-01': 1, 'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL4+': 3, 'EAL6+': 1, 'EAL4': 7, 'EAL6': 1, 'EAL6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 3, 'ADV_FSP.4': 2, 'ADV_IMP.1': 2, 'ADV_TDS.3': 2, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_TDS': 1, 'ADV_IMP': 1}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2, 'AGD_PRE': 1, 'AGD_OPE': 1}, 'ALC': {'ALC_DVS.2': 7, 'ALC_CMC.4': 2, 'ALC_CMS.4': 2, 'ALC_DEL.1': 2, 'ALC_LCD.1': 2, 'ALC_TAT.1': 2, 'ALC_DVS.1': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.1': 2, 'ATE_FUN.1': 2, 'ATE_IND.2': 2}, 'AVA': {'AVA_VAN.3': 2, 'AVA_VAN': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1, 'ASE_TSS.2': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS': 7, 'FAU_SAS.1': 10, 'FAU_GEN': 1, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_RND': 8, 'FCS_CKM': 36, 'FCS_CKM.4': 32, 'FCS_COP': 55, 'FCS_RND.1': 14, 'FCS_CKM.1': 20, 'FCS_RND.1.1': 1, 'FCS_CKM.2': 7, 'FCS_COP.1': 12, 'FCS_CMK.4': 1}, 'FDP': {'FDP_ACC.1': 22, 'FDP_ACF.1': 18, 'FDP_UCT.1': 12, 'FDP_UIT.1': 12, 'FDP_ACF': 1, 'FDP_ITC.1': 10, 'FDP_ITC.2': 10, 'FDP_IFC.1': 4, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.4': 1, 'FDP_ITC': 2}, 'FIA': {'FIA_UID.1': 15, 'FIA_UAU.1': 22, 'FIA_UAU.4': 20, 'FIA_UAU.5': 15, 'FIA_UAU.6': 12, 'FIA_AFL': 28, 'FIA_UAU.5.2': 1, 'FIA_SOS.2': 1, 'FIA_AFL.1': 9}, 'FMT': {'FMT_LIM': 8, 'FMT_SMF.1': 32, 'FMT_SMR.1': 32, 'FMT_LIM.1': 24, 'FMT_LIM.2': 20, 'FMT_MTD': 41, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 3, 'FMT_MSA.3': 3, 'FMT_MTD.1': 8, 'FMT_MSA.1': 1}, 'FPT': {'FPT_FLS.1': 13, 'FPT_TST.1': 12, 'FPT_PHP.3': 14, 'FPT_TST': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC.1': 5, 'FTP_TRP.1': 5}}, 'cc_claims': {}, 'vendor': {'Samsung': {'Samsung': 7}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES-256': 2, 'AES': 14}}, 'DES': {'DES': {'DES': 9}, '3DES': {'Triple-DES': 21, 'TDES': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}, 'SHA2': {'SHA-256': 3, 'SHA-224': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 13}}, 'crypto_protocol': {'PACE': {'PACE': 6}}, 'randomness': {'TRNG': {'DTRNG': 9}, 'RNG': {'RND': 1}}, 'cipher_mode': {'CBC': {'CBC': 5}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 3, 'side channels': 1, 'DPA': 3, 'SPA': 2, 'timing attacks': 1}, 'FI': {'Physical Tampering': 5, 'physical tampering': 2, 'Physical tampering': 1, 'Malfunction': 4, 'malfunction': 6, 'fault injection': 2}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {'BSI': {'BSI TR-03110': 2}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 30, 'EF.DG2': 10, 'EF.DG3': 8, 'EF.DG4': 7, 'EF.DG5': 8, 'EF.DG16': 26, 'EF.DG15': 7, 'EF.DG14': 11, 'EF.DG13': 7, 'EF.COM': 10, 'EF.SOD': 10}}, 'standard_id': {'FIPS': {'FIPS 180-4': 1, 'FIPS 180-2': 1, 'FIPS 46-3': 3, 'FIPS 197': 2, 'FIPS PUB 46-3': 1, 'FIPS PUB 180-4': 1, 'FIPS PUB 197': 1}, 'BSI': {'AIS31': 2}, 'RFC': {'RFC 2119': 1, 'RFC 3369': 1}, 'ISO': {'ISO/IEC 7816-2': 2, 'ISO/IEC 14443': 2, 'ISO/IEC 7816-4': 1}, 'ICAO': {'ICAO': 34}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, ' These data are protected by means of Extended Access Control, which is out of scope of this ST': 1, 'optional according to [R16]. These data are protected by means of Extended Access Control, which is out of scope of this ST. SOMA-c018 Security Target Basic Access Control Public Version ASE Version: 1.0 Date': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0055': 1}}, 'cc_security_level': {'EAL': {'EAL 2': 1, 'EAL4': 1}}, 'cc_sar': {'ALC': {'ALC_FLR': 1, 'ALC_DVS.2': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.E': 1}, 'T': {'T.I': 1}}, 'vendor': {}, 'eval_facility': {'Applus': {'Applus Laboratories': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to 2017-62 ST_lite.pdf.
    • The cert_filename property was set to 2017-62 CCRA.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/12']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/12']}} data.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/12']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/11', 'ANSSI-CC-2017/53', 'ANSSI-CC-2018/12']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-62%20INF-3233.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-62%20ST_lite.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name SOMA-c018 Machine Readable Electronic Document - Basic Access Control version 2 (SOMA-c018_2) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-62%20CCRA.pdf",
  "dgst": "fe7a09506facd41c",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "2017-62-INF-3233",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCS",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2018/12"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2017/53",
          "ANSSI-CC-2017/11",
          "ANSSI-CC-2018/12"
        ]
      }
    },
    "scheme_data": {
      "category": "Smart Cards and similiar devices",
      "certification_date": "13/10/2020",
      "manufacturer": "HID Global / Arjo Systems",
      "product": "SOMA-c018 Machine Readable Electronic Document - Basic Access Control version 2 (SOMA-c018_2)",
      "product_link": "https://oc.ccn.cni.es/en/certified-products/certified-products/606-soma-c018-machine-readable-electronic-document-basic-access-control-version-2-soma-c018-2"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2018/12"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2018/12"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "HID Global",
  "manufacturer_web": "https://www.hidglobal.com/",
  "name": "SOMA-c018 Machine Readable Electronic Document - Basic Access Control version 2 (SOMA-c018_2)",
  "not_valid_after": "2025-10-13",
  "not_valid_before": "2020-10-13",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "2017-62 CCRA.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.E": 1
        },
        "T": {
          "T.I": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0055": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1,
          "ALC_FLR": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL4": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Applus": {
          "Applus Laboratories": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "",
      "/CreationDate": "",
      "/Creator": "",
      "/Keywords": "",
      "/ModDate": "",
      "/Producer": "",
      "/Subject": "",
      "/Title": "",
      "/Trapped": "",
      "pdf_file_size_bytes": 753717,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "2017-62 INF-3233.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          }
        }
      },
      "cc_cert_id": {
        "ES": {
          "2017-62-INF-3233-v1": 1
        },
        "FR": {
          "ANSSI-CC-2018/12": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0055": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 9,
          "ALC_FLR": 3,
          "ALC_LCS.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.3": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 1,
          "EAL 4": 2,
          "EAL2": 1,
          "EAL4": 7,
          "EAL4+": 1,
          "EAL6": 1,
          "EAL6 augmented": 1
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS.1": 1
        },
        "FCS": {
          "FCS_CKM": 3,
          "FCS_CKM.4": 1,
          "FCS_COP": 4,
          "FCS_RND.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 1,
          "FDP_ACF.1": 1,
          "FDP_UCT.1": 1,
          "FDP_UIT.1": 1
        },
        "FIA": {
          "FIA_AFL": 4,
          "FIA_UAU.1": 1,
          "FIA_UAU.4": 1,
          "FIA_UAU.5": 1,
          "FIA_UAU.6": 1,
          "FIA_UID.1": 1
        },
        "FMT": {
          "FMT_LIM.1": 1,
          "FMT_LIM.2": 1,
          "FMT_MTD": 6,
          "FMT_SMF.1": 1,
          "FMT_SMR.1": 1
        },
        "FPT": {
          "FPT_FLS.1": 1,
          "FPT_PHP.3": 1,
          "FPT_TST.1": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          " These data are protected by means of Extended Access Control, which is out of scope of the Security Target": 1,
          "according to [CC_P1]. These data are protected by means of Extended Access Control, which is out of scope of the Security Target. 18/24 https://oc.ccn.cni.es [email protected] Application": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Applus": {
          "Applus Laboratories": 5
        }
      },
      "hash_function": {},
      "ic_data_group": {
        "EF": {
          "EF.DG1": 3,
          "EF.DG13": 1,
          "EF.DG14": 2,
          "EF.DG15": 1,
          "EF.DG16": 3,
          "EF.DG2": 2,
          "EF.DG3": 2,
          "EF.DG4": 2,
          "EF.DG5": 2
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "TRNG": {
          "DTRNG": 3
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 1,
          "Physical Tampering": 1,
          "Physical tampering": 1,
          "fault injection": 1,
          "malfunction": 1,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 1,
          "physical probing": 1
        },
        "other": {
          "reverse engineering": 1
        }
      },
      "standard_id": {
        "ICAO": {
          "ICAO": 9
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Samsung": {
          "Samsung": 3
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "",
      "/CreationDate": "",
      "/Creator": "",
      "/Keywords": "",
      "/ModDate": "",
      "/Producer": "",
      "/Subject": "",
      "/Title": "",
      "/Trapped": "",
      "pdf_file_size_bytes": 893804,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "https://www.sogis.eu/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 24
    },
    "st_filename": "2017-62 ST_lite.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2018/12": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0055": 1,
          "BSI-CC-PP-0056-V2-2012": 1,
          "BSI-CC-PP-0068-V2-2011-MA-01": 1,
          "BSI-CC-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 3,
          "ADV_FSP": 1,
          "ADV_FSP.4": 2,
          "ADV_IMP": 1,
          "ADV_IMP.1": 2,
          "ADV_TDS": 1,
          "ADV_TDS.3": 2
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 2,
          "AGD_PRE": 1,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.4": 2,
          "ALC_CMS": 1,
          "ALC_CMS.4": 2,
          "ALC_DEL": 1,
          "ALC_DEL.1": 2,
          "ALC_DVS": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 7,
          "ALC_LCD": 1,
          "ALC_LCD.1": 2,
          "ALC_TAT": 1,
          "ALC_TAT.1": 2
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV.2": 2,
          "ATE_DPT.1": 2,
          "ATE_FUN.1": 2,
          "ATE_IND.2": 2
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.3": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 7,
          "EAL4+": 3,
          "EAL6": 1,
          "EAL6 augmented": 1,
          "EAL6+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_SAS": 7,
          "FAU_SAS.1": 10,
          "FAU_SAS.1.1": 1
        },
        "FCS": {
          "FCS_CKM": 36,
          "FCS_CKM.1": 20,
          "FCS_CKM.2": 7,
          "FCS_CKM.4": 32,
          "FCS_CMK.4": 1,
          "FCS_COP": 55,
          "FCS_COP.1": 12,
          "FCS_RND": 8,
          "FCS_RND.1": 14,
          "FCS_RND.1.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 22,
          "FDP_ACF": 1,
          "FDP_ACF.1": 18,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 4,
          "FDP_ITC": 2,
          "FDP_ITC.1": 10,
          "FDP_ITC.2": 10,
          "FDP_UCT.1": 12,
          "FDP_UIT.1": 12
        },
        "FIA": {
          "FIA_AFL": 28,
          "FIA_AFL.1": 9,
          "FIA_SOS.2": 1,
          "FIA_UAU.1": 22,
          "FIA_UAU.4": 20,
          "FIA_UAU.5": 15,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6": 12,
          "FIA_UID.1": 15
        },
        "FMT": {
          "FMT_LIM": 8,
          "FMT_LIM.1": 24,
          "FMT_LIM.1.1": 2,
          "FMT_LIM.2": 20,
          "FMT_LIM.2.1": 3,
          "FMT_MSA.1": 1,
          "FMT_MSA.3": 3,
          "FMT_MTD": 41,
          "FMT_MTD.1": 8,
          "FMT_SMF.1": 32,
          "FMT_SMR.1": 32
        },
        "FPT": {
          "FPT_FLS.1": 13,
          "FPT_PHP.3": 14,
          "FPT_TST": 1,
          "FPT_TST.1": 12,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC.1": 5,
          "FTP_TRP.1": 5
        }
      },
      "certification_process": {
        "OutOfScope": {
          " These data are protected by means of Extended Access Control, which is out of scope of this ST": 1,
          "optional according to [R16]. These data are protected by means of Extended Access Control, which is out of scope of this ST. SOMA-c018 Security Target Basic Access Control Public Version ASE Version: 1.0 Date": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 5
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 6
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 13
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 4
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 3
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.COM": 10,
          "EF.DG1": 30,
          "EF.DG13": 7,
          "EF.DG14": 11,
          "EF.DG15": 7,
          "EF.DG16": 26,
          "EF.DG2": 10,
          "EF.DG3": 8,
          "EF.DG4": 7,
          "EF.DG5": 8,
          "EF.SOD": 10
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 1
        },
        "TRNG": {
          "DTRNG": 9
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 4,
          "Physical Tampering": 5,
          "Physical tampering": 1,
          "fault injection": 2,
          "malfunction": 6,
          "physical tampering": 2
        },
        "SCA": {
          "DPA": 3,
          "SPA": 2,
          "physical probing": 3,
          "side channels": 1,
          "timing attacks": 1
        },
        "other": {
          "reverse engineering": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 2
        },
        "FIPS": {
          "FIPS 180-2": 1,
          "FIPS 180-4": 1,
          "FIPS 197": 2,
          "FIPS 46-3": 3,
          "FIPS PUB 180-4": 1,
          "FIPS PUB 197": 1,
          "FIPS PUB 46-3": 1
        },
        "ICAO": {
          "ICAO": 34
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 7816-2": 2,
          "ISO/IEC 7816-4": 1
        },
        "RFC": {
          "RFC 2119": 1,
          "RFC 3369": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 14,
            "AES-256": 2
          }
        },
        "DES": {
          "3DES": {
            "TDES": 2,
            "Triple-DES": 21
          },
          "DES": {
            "DES": 9
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03110": 2
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Samsung": {
          "Samsung": 7
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "",
      "/CreationDate": "",
      "/Creator": "",
      "/Keywords": "",
      "/ModDate": "",
      "/Producer": "",
      "/Subject": "",
      "/Title": "",
      "/Trapped": "",
      "pdf_file_size_bytes": 1664826,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 126
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf",
        "pp_name": "Protection Profile for Machine Readable Travel Document with \u0027ICAO Application\u0027, Basic Acce..."
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-62%20INF-3233.pdf",
  "scheme": "ES",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_DVS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-62%20ST_lite.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "278398ab53989633bda438718f51554f39c3f45ff98ca1b94d8cc5b7c9fa25bc",
      "txt_hash": "5f0558cdbb2e0ed07f06d017c47a09722f67c0a3a34dc1269692bf57dac38f88"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "730262ca221d92b2e474d32916c5c9cab63139bb04e2637647ab684ba52ebc2d",
      "txt_hash": "bb21af4931a5e555cf49baee70a80caed1355f1cd57069fd410bb436c9e2426f"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "db3bc08d2a9c44d92f60eb6aeb941d63390f4c299faf694cd6f19962313f0f9d",
      "txt_hash": "7c8839d2f933c637e7cd723adeb48611658a69ad9d68b5561189039df005ce48"
    }
  },
  "status": "active"
}