STARCOS 3.7 COS GKV
CSV information ?
Status | archived |
---|---|
Valid from | 20.09.2018 |
Valid until | 20.09.2023 |
Scheme | 🇩🇪 DE |
Manufacturer | G+D Mobile Security GmbH |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.5, ALC_DVS.2, EAL4+, ATE_DPT.2 |
Protection profiles |
Heuristics summary ?
Certificate ?
Extracted keywords
Operating System name
STARCOS 3Vendor
Giesecke+DevrientSecurity level
EAL 4, EAL 5, EAL 2, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR, ATE_DPT.2, AVA_VAN.5Protection profiles
BSI-CC-PP-0082-V3-Certificates
BSI-DSZ-CC-0976-V2-2018Standards
ISO/IEC 15408, ISO/IEC 18045File metadata
Title | Certificate BSI-DSZ-CC-0976-V2-2018 |
---|---|
Subject | STARCOS 3.7 COS GKV |
Keywords | "Common Criteria, Certification, Zertifizierung, PP-0082-V3, G+D, STARCOS 3.7, eHealth" |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Creation date | D:20180924082539+02'00' |
Modification date | D:20181010074008+02'00' |
Pages | 1 |
Creator | Writer |
Producer | LibreOffice 5.2 |
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, HPC, DES, CMACAsymmetric Algorithms
RSA-OAEP, ECDH, ECDSA, ECC, Diffie-HellmanHash functions
SHA-256Schemes
Key AgreementProtocols
PACERandomness
PRNG, RNGBlock cipher modes
CBCOperating System name
STARCOS 3Vendor
Infineon, Infineon Technologies AG, Giesecke+Devrient, Giesecke & DevrientSecurity level
EAL 4, EAL 5, EAL 2, EAL 1, EAL 2+, EAL 5+, EAL 6, EAL 4 augmentedClaims
A.SSecurity Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ATE_DPT.2, AVA_VAN.5Security Functional Requirements (SFR)
FCS_COP, FCS_COP.1, FCS_CKM, FCS_RNG.1, FCS_RNG, FPT_ITE.1Protection profiles
BSI-CC-PP-0082-V3-, BSI-CC-PP-0082-V3-2018Certificates
BSI-DSZ-CC-0976-V2-2018, BSI-DSZ-CC-0976-2015, BSI-DSZ-CC-0945-, BSI-DSZ-CC-0945-V2-2018, BSI-DSZ-CC-S-0083-2017, BSI-DSZ-CC-S-0095-2018Evaluation facilities
TÃœV Informationstechnik, SRC Security Research & ConsultingSide-channel analysis
side channel, DPA, SPA, physical tampering, malfunction, DFA, fault injection, JILCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Target STARCOS 3.7 COS GKV, Version 1.7, 8 August 2018, Giesecke+Devrient Mobile Security GmbH (confidential document) [7] Security Target Lite BSI-DSZ-CC-0976-V2-2018, Security Target Lite STARCOS 3.7 COS GKV, for STARCOS 3.7 COS GKV, Version 2.4, 10 August 2018, SRC Security Research & Consulting GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-0976-V2-2018, Configuration List STARCOS 3.7 COS GKV, Version 1, 8 August 2018, Giesecke+Devrient Mobile Security GmbH (confidential document) [11] Guidance Documentation STARCOS 3.7 – Main Document, Version 1.0, 4 April 2018, procedure BSI-DSZ-CC-0945-V2-2018, Version 2.03, 4 April 2018, TÜV Informationstechnik GmbH (confidential document) [21] Einführung der Gesundheitskarte, Spezifikation des Card Operating System (COS), ElektrischeStandards
FIPS PUB 180-4, FIPS PUB 197, FIPS PUB 186-4, AIS 34, AIS 36, AIS 26, AIS 25, AIS 20, AIS 31, AIS 35, AIS 1, AIS 14, AIS 19, AIS 23, AIS 32, AIS 38, RFC 3447, RFC 5639, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065Technical reports
BSI TR-03116-1, BSI TR-03144, BSI TR-03143, BSI 7148File metadata
Title | Certification Report BSI-DSZ-CC-0976-V2-2018 |
---|---|
Subject | STARCOS 3.7 COS GKV |
Keywords | "Common Criteria, Certification, Zertifizierung, PP-0082-V3, G+D, STARCOS 3.7, eHealth" |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Creation date | D:20180924082509+02'00' |
Modification date | D:20180928152043+02'00' |
Pages | 36 |
Creator | Writer |
Producer | LibreOffice 5.2 |
Frontpage
Certificate ID | BSI-DSZ-CC-0976-V2-2018 |
---|---|
Certified item | STARCOS 3.7 COS GKV |
Certification lab | BSI |
Developer | Giesecke+Devrient Mobile Security GmbH |
References
Outgoing- BSI-DSZ-CC-0976-2015 - archived - STARCOS 3.6 COSGKV C1
- BSI-DSZ-CC-0945-V2-2018 - archived - Infineon smart card IC (Security Controller) IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 00022Dh, design step H13 with optional libraries CCL V2.0.0002, RSA2048/4096 V2.07.003 / V2.06.003, EC V2.07.003 / V2.06.003, Toolbox V2.07.003 / V2.06.003, HSL V02.01.6634 / V01.22.4346, MCS V02.02.3389 / V02.03.3446, SCL V2.02.010 and with specific IC dedicated software
- BSI-DSZ-CC-0976-V3-2019 - archived - STARCOS 3.7 COS GKV C2
Security target ?
Extracted keywords
Symmetric Algorithms
AES, HPC, DES, CMACAsymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DH, DSAHash functions
SHA-1, SHA-224, SHA-384, SHA-256, SHA-512Schemes
MAC, Key agreement, Key AgreementProtocols
SSL, PACERandomness
TRNG, RND, RNGElliptic Curves
brainpoolP256r1, brainpoolP384r1, brainpoolP512r1Block cipher modes
CBCOperating System name
STARCOS 3Trusted Execution Environments
SEVendor
NXP Semiconductors, Infineon, Infineon Technologies AG, STMicroelectronics, Giesecke+DevrientSecurity level
EAL4, EAL 4, EAL 6, EAL4 augmentedClaims
O.RND, O.AES, T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_ARC, ADV_FSP, ADV_IMP, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ALC_DEL, ALC_DVS, ALC_CMS, ALC_CMC, ALC_FLR.1, ATE_FUN.1, ATE_IND.2, ATE_DPT.2, ATE_COV.2, ATE_COV, ATE_DPT.1, AVA_VAN.5, AVA_VAN, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_ECDSecurity Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FCS_RNG, FCS_RNG.1, FCS_COP, FCS_CKM, FCS_CKM.4, FCS_RNG.1.1, FCS_CKM.1, FCS_COP.1, FCS_CKM.2, FCS_COP.1.1, FCS_CKM.4.1, FDP_ITT, FDP_IFC, FDP_SDC, FDP_SDI, FDP_RIP.1, FDP_SDI.2, FDP_ACC, FDP_ACF, FDP_SDC.1, FDP_ITT.1, FDP_IFC.1, FDP_RIP.1.1, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ACF.1, FDP_ACC.1, FDP_ITC.1, FDP_ITC.2, FIA_API, FIA_AFL, FIA_ATD.1, FIA_SOS.1, FIA_UAU.1, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FIA_API.1, FIA_USB.1, FIA_UID.1, FIA_SOS.1.1, FIA_AFL.1, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6.1, FIA_UID.1.1, FIA_UID.1.2, FIA_API.1.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_LIM, FMT_SMR.1, FMT_MSA.3, FMT_SMF.1, FMT_MSA, FMT_MTD, FMT_SMR.1.1, FMT_SMF.1.1, FMT_LIM.1, FMT_LIM.2, FMT_SMR.1.2, FMT_MSA.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FPT_FLS, FPT_PHP, FPT_ITT, FPT_EMS, FPT_ITE, FPT_FLS.1, FPT_EMS.1, FPT_TDC.1, FPT_ITE.1, FPT_ITE.2, FPT_TST.1, FPT_PHP.3, FPT_ITT.1, FPT_FLS.1.1, FPT_TST, FPT_EMS.1.1, FPT_EMS.1.2, FPT_TDC.1.1, FPT_TDC.1.2, FPT_ITE.1.1, FPT_ITE.1.2, FPT_ITE.2.1, FPT_ITE.2.2, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FRU_FLT, FRU_FLT.2, FTP_ITC, FTP_ITE, FTP_ITC.1Protection profiles
BSI-PP-0084-2014, BSI-CC-PP-0084-2014, BSI-CC-PP- 0084-2014, BSI-CC-PP-0082-V3, BSI-CC-PP-0082-, BSI-CC-PP-0084-2007, BSI-CC-PP- 0082-V3, BSI-CC-PP-0084-, BSI-PP-0084-Certificates
BSI-DSZ-CC-0945-V2-2018Side-channel analysis
Leak-Inherent, Physical Probing, side channel, SPA, DPA, physical tampering, Malfunction, malfunction, DFA, Bleichenbacher attack, JILStandards
FIPS 180-4, FIPS 197, FIPS PUB 197, FIPS PUB 180-4, NIST SP 800-38B, PKCS1, PKCS #1, AIS31, AIS20, RFC5639, RFC 5639, ISO/IEC 7816, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004, CCMB-2017-05-001Technical reports
BSI TR-03143, BSI TR-03111File metadata
Title | G+D MS Security Target Lite to BSI-PP-0082-V2 |
---|---|
Subject | Security Target Lite STARCOS 3.7 COS GKV |
Keywords | Version 1.7, 08.08.2018 |
Author | Giesecke+Devrient Mobile Security GmbH |
Creation date | D:20180808112026+02'00' |
Modification date | D:20180808112215+02'00' |
Pages | 129 |
Creator | Acrobat PDFMaker 11 für Word |
Producer | Adobe PDF Library 11.0 |
References
Outgoing- BSI-DSZ-CC-0945-V2-2018 - archived - Infineon smart card IC (Security Controller) IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 00022Dh, design step H13 with optional libraries CCL V2.0.0002, RSA2048/4096 V2.07.003 / V2.06.003, EC V2.07.003 / V2.06.003, Toolbox V2.07.003 / V2.06.003, HSL V02.01.6634 / V01.22.4346, MCS V02.02.3389 / V02.03.3446, SCL V2.02.010 and with specific IC dedicated software
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Certificate versions
Name | Certificate ID | |
---|---|---|
Previous | ||
STARCOS 3.6 COSGKV C1 | BSI-DSZ-CC-0976-2015 | Compare |
Next | ||
STARCOS 3.7 COS GKV C2 | BSI-DSZ-CC-0976-V3-2019 | Compare |
STARCOS 3.7 COS HBA-SMC | BSI-DSZ-CC-0976-V4-2021 | Compare |
References ?
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': ['BSI-DSZ-CC-0976-2015'], 'next_certificates': ['BSI-DSZ-CC-0976-V3-2019', 'BSI-DSZ-CC-0976-V4-2021']}
.
- The following values were inserted:
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Card Operating System Generation 2', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0082V3b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP COS G2']}}]}
.
- The new value is
-
30.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1243-2024']}}}
data.
- The report_references property was updated, with the
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'c72f20c4589fda67026e3457fadc0c4bf056a59ec54c01c1ec1850f5a62edf81', 'txt_hash': 'fb850278cecee9546454b31e5f81505b75869cd4d867fafa05879f7240e6e946'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7476054ad369e3ae80c9c5ac676920cd6f1a764469be5dd6aecdc205df307f80', 'txt_hash': '7bc6cf46e42271da3bcebf8dc47bf7f6be206dc5c2b8f06471c8cda6b40a31d8'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '502fc83144de0067e253463c8396e8d1877b41c39eb94b8d5b4f2e882840b43f', 'txt_hash': 'b4b1ccd407726cbfa1ccff726e66f26ae0472d4c60a71d3c017e48132238f554'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 954514, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 36, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20180924082509+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, PP-0082-V3, G+D, STARCOS 3.7, eHealth"', '/ModDate': "D:20180928152043+02'00'", '/Producer': 'LibreOffice 5.2', '/Subject': 'STARCOS 3.7 COS GKV', '/Title': 'Certification Report BSI-DSZ-CC-0976-V2-2018', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/', 'http://www.sogisportal.eu/', 'https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/zertifizierungsreporte', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/AIS']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1267620, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 129, '/Author': 'Giesecke+Devrient Mobile Security GmbH', '/Bearbeitet von': 'Alexander Summerer', '/Category': 'Security Target Lite to BSI-CC-PP-0082-V2', '/Company': 'Giesecke & Devrient', '/CreationDate': "D:20180808112026+02'00'", '/Creator': 'Acrobat PDFMaker 11 für Word', '/Eigentümer': 'G&D', '/Erstellt von': 'Alexander Summerer', '/Gegenstand': 'Common Criteria Protection Security Target', '/Keywords': 'Version 1.7, 08.08.2018', '/ModDate': "D:20180808112215+02'00'", '/Producer': 'Adobe PDF Library 11.0', '/SourceModified': 'D:20180808091919', '/Subject': 'Security Target Lite STARCOS 3.7 COS GKV', '/Title': 'G+D MS Security Target Lite to BSI-PP-0082-V2', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 356208, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20180924082539+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, PP-0082-V3, G+D, STARCOS 3.7, eHealth"', '/ModDate': "D:20181010074008+02'00'", '/Producer': 'LibreOffice 5.2', '/Subject': 'STARCOS 3.7 COS GKV', '/Title': 'Certificate BSI-DSZ-CC-0976-V2-2018', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0976-V2-2018', 'cert_item': 'STARCOS 3.7 COS GKV', 'developer': 'Giesecke+Devrient Mobile Security GmbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Card Operating System Generation 2 (PP COS G2), Version 2.0, 19 June 2018, BSI-CC-PP-0082-V3- 2018', 'cc_version': 'PP conformant Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0976-V2-2018': 24, 'BSI-DSZ-CC-0976-2015': 3, 'BSI-DSZ-CC-0945-': 1, 'BSI-DSZ-CC-0945-V2-2018': 6, 'BSI-DSZ-CC-S-0083-2017': 1, 'BSI-DSZ-CC-S-0095-2018': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0082-V3-': 1, 'BSI-CC-PP-0082-V3-2018': 3}}, 'cc_security_level': {'EAL': {'EAL 4': 5, 'EAL 5': 4, 'EAL 2': 2, 'EAL 1': 1, 'EAL 2+': 1, 'EAL 5+': 1, 'EAL 6': 1, 'EAL 4 augmented': 3}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 5, 'ALC_FLR': 3, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_DPT.2': 4}, 'AVA': {'AVA_VAN.5': 4}}, 'cc_sfr': {'FCS': {'FCS_COP': 22, 'FCS_COP.1': 1, 'FCS_CKM': 3, 'FCS_RNG.1': 1, 'FCS_RNG': 1}, 'FPT': {'FPT_ITE.1': 1}}, 'cc_claims': {'A': {'A.S': 1}}, 'vendor': {'Infineon': {'Infineon': 11, 'Infineon Technologies AG': 7}, 'GD': {'Giesecke+Devrient': 32, 'Giesecke & Devrient': 2}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 1}, 'SRC': {'SRC Security Research & Consulting': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 16}, 'HPC': {'HPC': 1}}, 'DES': {'DES': {'DES': 1}}, 'constructions': {'MAC': {'CMAC': 5}}}, 'asymmetric_crypto': {'RSA': {'RSA-OAEP': 1}, 'ECC': {'ECDH': {'ECDH': 2}, 'ECDSA': {'ECDSA': 12}, 'ECC': {'ECC': 9}}, 'FF': {'DH': {'Diffie-Hellman': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 2}}}, 'crypto_scheme': {'KA': {'Key Agreement': 2}}, 'crypto_protocol': {'PACE': {'PACE': 4}}, 'randomness': {'PRNG': {'PRNG': 1}, 'RNG': {'RNG': 4}}, 'cipher_mode': {'CBC': {'CBC': 2}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 1, 'DPA': 1, 'SPA': 1}, 'FI': {'physical tampering': 1, 'malfunction': 1, 'DFA': 1, 'fault injection': 1}, 'other': {'JIL': 6}}, 'technical_report_id': {'BSI': {'BSI TR-03116-1': 1, 'BSI TR-03144': 9, 'BSI TR-03143': 4, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {'STARCOS': {'STARCOS 3': 38}}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 180-4': 1, 'FIPS PUB 197': 1, 'FIPS PUB 186-4': 1}, 'BSI': {'AIS 34': 2, 'AIS 36': 5, 'AIS 26': 3, 'AIS 25': 2, 'AIS 20': 3, 'AIS 31': 3, 'AIS 35': 2, 'AIS 1': 1, 'AIS 14': 1, 'AIS 19': 1, 'AIS 23': 1, 'AIS 32': 1, 'AIS 38': 1}, 'RFC': {'RFC 3447': 1, 'RFC 5639': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Target STARCOS 3.7 COS GKV, Version 1.7, 8 August 2018, Giesecke+Devrient Mobile Security GmbH (confidential document) [7] Security Target Lite BSI-DSZ-CC-0976-V2-2018, Security Target Lite STARCOS 3.7 COS GKV': 1, 'for STARCOS 3.7 COS GKV, Version 2.4, 10 August 2018, SRC Security Research & Consulting GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-0976-V2-2018, Configuration List STARCOS 3.7 COS GKV, Version 1': 1, '8 August 2018, Giesecke+Devrient Mobile Security GmbH (confidential document) [11] Guidance Documentation STARCOS 3.7 – Main Document, Version 1.0, 4 April 2018': 1, 'procedure BSI-DSZ-CC-0945-V2-2018, Version 2.03, 4 April 2018, TÜV Informationstechnik GmbH (confidential document) [21] Einführung der Gesundheitskarte, Spezifikation des Card Operating System (COS), Elektrische': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0945-V2-2018': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0084-2014': 8, 'BSI-CC-PP-0084-2014': 54, 'BSI-CC-PP- 0084-2014': 10, 'BSI-CC-PP-0082-V3': 28, 'BSI-CC-PP-0082-': 1, 'BSI-CC-PP-0084-2007': 1, 'BSI-CC-PP- 0082-V3': 1, 'BSI-CC-PP-0084-': 3, 'BSI-PP-0084-': 2}}, 'cc_security_level': {'EAL': {'EAL4': 14, 'EAL 4': 2, 'EAL 6': 2, 'EAL4 augmented': 4}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 9, 'ADV_FSP.4': 6, 'ADV_IMP.1': 6, 'ADV_TDS.3': 3, 'ADV_ARC': 2, 'ADV_FSP': 2, 'ADV_IMP': 2}, 'AGD': {'AGD_OPE.1': 6, 'AGD_PRE.1': 2, 'AGD_OPE': 2, 'AGD_PRE': 2}, 'ALC': {'ALC_DVS.2': 12, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1, 'ALC_DEL': 2, 'ALC_DVS': 2, 'ALC_CMS': 2, 'ALC_CMC': 2, 'ALC_FLR.1': 1}, 'ATE': {'ATE_FUN.1': 6, 'ATE_IND.2': 5, 'ATE_DPT.2': 11, 'ATE_COV.2': 1, 'ATE_COV': 2, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.5': 10, 'AVA_VAN': 2}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1, 'ASE_ECD': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS': 9, 'FAU_SAS.1': 3}, 'FCS': {'FCS_RNG': 11, 'FCS_RNG.1': 17, 'FCS_COP': 104, 'FCS_CKM': 39, 'FCS_CKM.4': 42, 'FCS_RNG.1.1': 1, 'FCS_CKM.1': 24, 'FCS_COP.1': 17, 'FCS_CKM.2': 6, 'FCS_COP.1.1': 1, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ITT': 7, 'FDP_IFC': 7, 'FDP_SDC': 8, 'FDP_SDI': 7, 'FDP_RIP.1': 10, 'FDP_SDI.2': 11, 'FDP_ACC': 99, 'FDP_ACF': 88, 'FDP_SDC.1': 3, 'FDP_ITT.1': 3, 'FDP_IFC.1': 11, 'FDP_RIP.1.1': 1, 'FDP_SDI.1': 1, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ACF.1': 35, 'FDP_ACC.1': 36, 'FDP_ITC.1': 21, 'FDP_ITC.2': 21}, 'FIA': {'FIA_API': 1, 'FIA_AFL': 22, 'FIA_ATD.1': 10, 'FIA_SOS.1': 8, 'FIA_UAU.1': 15, 'FIA_UAU.4': 10, 'FIA_UAU.5': 15, 'FIA_UAU.6': 10, 'FIA_API.1': 13, 'FIA_USB.1': 19, 'FIA_UID.1': 13, 'FIA_SOS.1.1': 1, 'FIA_AFL.1': 4, 'FIA_ATD.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.4.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_API.1.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_LIM': 15, 'FMT_SMR.1': 33, 'FMT_MSA.3': 33, 'FMT_SMF.1': 48, 'FMT_MSA': 60, 'FMT_MTD': 29, 'FMT_SMR.1.1': 2, 'FMT_SMF.1.1': 2, 'FMT_LIM.1': 3, 'FMT_LIM.2': 2, 'FMT_SMR.1.2': 1, 'FMT_MSA.1': 6, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1': 3}, 'FPT': {'FPT_FLS': 7, 'FPT_PHP': 7, 'FPT_ITT': 7, 'FPT_EMS': 1, 'FPT_ITE': 3, 'FPT_FLS.1': 16, 'FPT_EMS.1': 11, 'FPT_TDC.1': 10, 'FPT_ITE.1': 11, 'FPT_ITE.2': 11, 'FPT_TST.1': 11, 'FPT_PHP.3': 4, 'FPT_ITT.1': 3, 'FPT_FLS.1.1': 1, 'FPT_TST': 2, 'FPT_EMS.1.1': 1, 'FPT_EMS.1.2': 1, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_ITE.1.1': 1, 'FPT_ITE.1.2': 1, 'FPT_ITE.2.1': 3, 'FPT_ITE.2.2': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FRU': {'FRU_FLT': 7, 'FRU_FLT.2': 3}, 'FTP': {'FTP_ITC': 9, 'FTP_ITE': 1, 'FTP_ITC.1': 3}}, 'cc_claims': {'O': {'O.RND': 7, 'O.AES': 5}, 'T': {'T.RND': 5}}, 'vendor': {'NXP': {'NXP Semiconductors': 1}, 'Infineon': {'Infineon': 2, 'Infineon Technologies AG': 2}, 'STMicroelectronics': {'STMicroelectronics': 1}, 'GD': {'Giesecke+Devrient': 14}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 49}, 'HPC': {'HPC': 1}}, 'DES': {'DES': {'DES': 1}}, 'constructions': {'MAC': {'CMAC': 20}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 2}, 'ECDSA': {'ECDSA': 38}, 'ECC': {'ECC': 14}}, 'FF': {'DH': {'Diffie-Hellman': 1, 'DH': 1}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 3}, 'SHA2': {'SHA-224': 2, 'SHA-384': 6, 'SHA-256': 11, 'SHA-512': 4}}}, 'crypto_scheme': {'MAC': {'MAC': 12}, 'KA': {'Key agreement': 1, 'Key Agreement': 1}}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}}, 'PACE': {'PACE': 10}}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RND': 13, 'RNG': 9}}, 'cipher_mode': {'CBC': {'CBC': 2}}, 'ecc_curve': {'Brainpool': {'brainpoolP256r1': 2, 'brainpoolP384r1': 2, 'brainpoolP512r1': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 13, 'Physical Probing': 2, 'side channel': 1, 'SPA': 1, 'DPA': 1}, 'FI': {'physical tampering': 3, 'Malfunction': 15, 'malfunction': 1, 'DFA': 1}, 'other': {'Bleichenbacher attack': 1, 'JIL': 3}}, 'technical_report_id': {'BSI': {'BSI TR-03143': 2, 'BSI TR-03111': 3}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {'STARCOS': {'STARCOS 3': 149}}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 180-4': 1, 'FIPS 197': 2, 'FIPS PUB 197': 1, 'FIPS PUB 180-4': 1}, 'NIST': {'NIST SP 800-38B': 1}, 'PKCS': {'PKCS1': 2, 'PKCS #1': 1}, 'BSI': {'AIS31': 1, 'AIS20': 2}, 'RFC': {'RFC5639': 3, 'RFC 5639': 1}, 'ISO': {'ISO/IEC 7816': 2}, 'CC': {'CCMB-2017-04-001': 2, 'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2, 'CCMB-2017-04-004': 2, 'CCMB-2017-05-001': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The cert_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0976-V2-2018': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0082-V3-': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL 5': 1, 'EAL 2': 1, 'EAL 4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1, 'ALC_FLR': 1}, 'ATE': {'ATE_DPT.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'GD': {'Giesecke+Devrient': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {'STARCOS': {'STARCOS 3': 1}}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
0976V2a_pdf.pdf
. - The st_filename property was set to
0976V2b_pdf.pdf
. - The cert_filename property was set to
0976V2c_pdf.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['BSI']
. - The cert_id property was set to
BSI-DSZ-CC-0976-V2-2018
. - The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0945-V2-2018']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0945-V2-2018']}}
data. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0976-V3-2019']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0976-V3-2019', 'BSI-DSZ-CC-0976-V4-2021']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0945-V2-2018', 'BSI-DSZ-CC-0976-2015']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0945-V2-2018', 'BSI-DSZ-CC-0945-2017', 'BSI-DSZ-CC-0916-2015', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0782-V2-2015', 'BSI-DSZ-CC-0891-2015', 'BSI-DSZ-CC-0976-2015', 'BSI-DSZ-CC-0891-V2-2016', 'BSI-DSZ-CC-0879-2014']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0976V2a_pdf.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0976V2b_pdf.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The report_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The cert property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The cert_metadata property was set to
None
. - The cert_keywords property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0976-V4-2021']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012']}}}
data.
- The cert property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name STARCOS 3.7 COS GKV was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0976V2c_pdf.pdf",
"dgst": "ab8ff147e1138090",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0976-V2-2018",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"3.7"
]
},
"indirect_transitive_cves": null,
"next_certificates": [
"BSI-DSZ-CC-0976-V3-2019",
"BSI-DSZ-CC-0976-V4-2021"
],
"prev_certificates": [
"BSI-DSZ-CC-0976-2015"
],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0976-V3-2019"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0976-2015",
"BSI-DSZ-CC-0945-V2-2018"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0976-V3-2019",
"BSI-DSZ-CC-0976-V4-2021",
"BSI-DSZ-CC-1243-2024"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0976-2015",
"BSI-DSZ-CC-0782-V2-2015",
"BSI-DSZ-CC-0945-2017",
"BSI-DSZ-CC-0879-2014",
"BSI-DSZ-CC-0891-2015",
"BSI-DSZ-CC-0945-V2-2018",
"BSI-DSZ-CC-0782-2012",
"BSI-DSZ-CC-0891-V2-2016",
"BSI-DSZ-CC-0916-2015"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0945-V2-2018"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0945-V2-2018"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "G+D Mobile Security GmbH",
"manufacturer_web": "https://www.gi-de.com/de/de/mobile-security/",
"name": "STARCOS 3.7 COS GKV",
"not_valid_after": "2023-09-20",
"not_valid_before": "2018-09-20",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "0976V2c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0976-V2-2018": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0082-V3-": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1,
"ALC_FLR": 1
},
"ATE": {
"ATE_DPT.2": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL 5": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"STARCOS": {
"STARCOS 3": 1
}
},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"GD": {
"Giesecke+Devrient": 1
}
},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20180924082539+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, PP-0082-V3, G+D, STARCOS 3.7, eHealth\"",
"/ModDate": "D:20181010074008+02\u002700\u0027",
"/Producer": "LibreOffice 5.2",
"/Subject": "STARCOS 3.7 COS GKV",
"/Title": "Certificate BSI-DSZ-CC-0976-V2-2018",
"pdf_file_size_bytes": 356208,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "0976V2a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5",
"cc_version": "PP conformant Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-0976-V2-2018",
"cert_item": "STARCOS 3.7 COS GKV",
"cert_lab": "BSI",
"developer": "Giesecke+Devrient Mobile Security GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "Card Operating System Generation 2 (PP COS G2), Version 2.0, 19 June 2018, BSI-CC-PP-0082-V3- 2018"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 9
},
"ECDH": {
"ECDH": 2
},
"ECDSA": {
"ECDSA": 12
}
},
"FF": {
"DH": {
"Diffie-Hellman": 2
}
},
"RSA": {
"RSA-OAEP": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0945-": 1,
"BSI-DSZ-CC-0945-V2-2018": 6,
"BSI-DSZ-CC-0976-2015": 3,
"BSI-DSZ-CC-0976-V2-2018": 24,
"BSI-DSZ-CC-S-0083-2017": 1,
"BSI-DSZ-CC-S-0095-2018": 2
}
},
"cc_claims": {
"A": {
"A.S": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0082-V3-": 1,
"BSI-CC-PP-0082-V3-2018": 3
}
},
"cc_sar": {
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 5,
"ALC_FLR": 3,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ATE": {
"ATE_DPT.2": 4
},
"AVA": {
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 2,
"EAL 2+": 1,
"EAL 4": 5,
"EAL 4 augmented": 3,
"EAL 5": 4,
"EAL 5+": 1,
"EAL 6": 1
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM": 3,
"FCS_COP": 22,
"FCS_COP.1": 1,
"FCS_RNG": 1,
"FCS_RNG.1": 1
},
"FPT": {
"FPT_ITE.1": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"8 August 2018, Giesecke+Devrient Mobile Security GmbH (confidential document) [11] Guidance Documentation STARCOS 3.7 \u2013 Main Document, Version 1.0, 4 April 2018": 1,
"Target STARCOS 3.7 COS GKV, Version 1.7, 8 August 2018, Giesecke+Devrient Mobile Security GmbH (confidential document) [7] Security Target Lite BSI-DSZ-CC-0976-V2-2018, Security Target Lite STARCOS 3.7 COS GKV": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
"for STARCOS 3.7 COS GKV, Version 2.4, 10 August 2018, SRC Security Research \u0026 Consulting GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-0976-V2-2018, Configuration List STARCOS 3.7 COS GKV, Version 1": 1,
"procedure BSI-DSZ-CC-0945-V2-2018, Version 2.03, 4 April 2018, T\u00dcV Informationstechnik GmbH (confidential document) [21] Einf\u00fchrung der Gesundheitskarte, Spezifikation des Card Operating System (COS), Elektrische": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 4
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"SRC": {
"SRC Security Research \u0026 Consulting": 3
},
"TUV": {
"T\u00dcV Informationstechnik": 1
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"STARCOS": {
"STARCOS 3": 38
}
},
"pq_crypto": {},
"randomness": {
"PRNG": {
"PRNG": 1
},
"RNG": {
"RNG": 4
}
},
"side_channel_analysis": {
"FI": {
"DFA": 1,
"fault injection": 1,
"malfunction": 1,
"physical tampering": 1
},
"SCA": {
"DPA": 1,
"SPA": 1,
"side channel": 1
},
"other": {
"JIL": 6
}
},
"standard_id": {
"BSI": {
"AIS 1": 1,
"AIS 14": 1,
"AIS 19": 1,
"AIS 20": 3,
"AIS 23": 1,
"AIS 25": 2,
"AIS 26": 3,
"AIS 31": 3,
"AIS 32": 1,
"AIS 34": 2,
"AIS 35": 2,
"AIS 36": 5,
"AIS 38": 1
},
"FIPS": {
"FIPS PUB 180-4": 1,
"FIPS PUB 186-4": 1,
"FIPS PUB 197": 1
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
},
"RFC": {
"RFC 3447": 1,
"RFC 5639": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 16
},
"HPC": {
"HPC": 1
}
},
"DES": {
"DES": {
"DES": 1
}
},
"constructions": {
"MAC": {
"CMAC": 5
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7148": 1,
"BSI TR-03116-1": 1,
"BSI TR-03143": 4,
"BSI TR-03144": 9
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"GD": {
"Giesecke \u0026 Devrient": 2,
"Giesecke+Devrient": 32
},
"Infineon": {
"Infineon": 11,
"Infineon Technologies AG": 7
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20180924082509+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, PP-0082-V3, G+D, STARCOS 3.7, eHealth\"",
"/ModDate": "D:20180928152043+02\u002700\u0027",
"/Producer": "LibreOffice 5.2",
"/Subject": "STARCOS 3.7 COS GKV",
"/Title": "Certification Report BSI-DSZ-CC-0976-V2-2018",
"pdf_file_size_bytes": 954514,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.bsi.bund.de/",
"https://www.bsi.bund.de/zertifizierung",
"http://www.sogisportal.eu/",
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/zertifizierungsreporte",
"https://www.bsi.bund.de/AIS",
"http://www.commoncriteriaportal.org/cc/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 36
},
"st_filename": "0976V2b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 14
},
"ECDH": {
"ECDH": 2
},
"ECDSA": {
"ECDSA": 38
}
},
"FF": {
"DH": {
"DH": 1,
"Diffie-Hellman": 1
},
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0945-V2-2018": 2
}
},
"cc_claims": {
"O": {
"O.AES": 5,
"O.RND": 7
},
"T": {
"T.RND": 5
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0082-V3": 1,
"BSI-CC-PP- 0084-2014": 10,
"BSI-CC-PP-0082-": 1,
"BSI-CC-PP-0082-V3": 28,
"BSI-CC-PP-0084-": 3,
"BSI-CC-PP-0084-2007": 1,
"BSI-CC-PP-0084-2014": 54,
"BSI-PP-0084-": 2,
"BSI-PP-0084-2014": 8
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 2,
"ADV_ARC.1": 9,
"ADV_FSP": 2,
"ADV_FSP.4": 6,
"ADV_IMP": 2,
"ADV_IMP.1": 6,
"ADV_TDS.3": 3
},
"AGD": {
"AGD_OPE": 2,
"AGD_OPE.1": 6,
"AGD_PRE": 2,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC": 2,
"ALC_CMC.4": 1,
"ALC_CMS": 2,
"ALC_CMS.4": 1,
"ALC_DEL": 2,
"ALC_DEL.1": 1,
"ALC_DVS": 2,
"ALC_DVS.2": 12,
"ALC_FLR.1": 1,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV": 2,
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 11,
"ATE_FUN.1": 6,
"ATE_IND.2": 5
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 10
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 2,
"EAL 6": 2,
"EAL4": 14,
"EAL4 augmented": 4
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS": 9,
"FAU_SAS.1": 3
},
"FCS": {
"FCS_CKM": 39,
"FCS_CKM.1": 24,
"FCS_CKM.2": 6,
"FCS_CKM.4": 42,
"FCS_CKM.4.1": 1,
"FCS_COP": 104,
"FCS_COP.1": 17,
"FCS_COP.1.1": 1,
"FCS_RNG": 11,
"FCS_RNG.1": 17,
"FCS_RNG.1.1": 1
},
"FDP": {
"FDP_ACC": 99,
"FDP_ACC.1": 36,
"FDP_ACF": 88,
"FDP_ACF.1": 35,
"FDP_IFC": 7,
"FDP_IFC.1": 11,
"FDP_ITC.1": 21,
"FDP_ITC.2": 21,
"FDP_ITT": 7,
"FDP_ITT.1": 3,
"FDP_RIP.1": 10,
"FDP_RIP.1.1": 1,
"FDP_SDC": 8,
"FDP_SDC.1": 3,
"FDP_SDI": 7,
"FDP_SDI.1": 1,
"FDP_SDI.2": 11,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1
},
"FIA": {
"FIA_AFL": 22,
"FIA_AFL.1": 4,
"FIA_API": 1,
"FIA_API.1": 13,
"FIA_API.1.1": 1,
"FIA_ATD.1": 10,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 8,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 15,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.4": 10,
"FIA_UAU.4.1": 1,
"FIA_UAU.5": 15,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 10,
"FIA_UAU.6.1": 1,
"FIA_UID.1": 13,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_USB.1": 19,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_LIM": 15,
"FMT_LIM.1": 3,
"FMT_LIM.2": 2,
"FMT_MSA": 60,
"FMT_MSA.1": 6,
"FMT_MSA.3": 33,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD": 29,
"FMT_MTD.1": 3,
"FMT_SMF.1": 48,
"FMT_SMF.1.1": 2,
"FMT_SMR.1": 33,
"FMT_SMR.1.1": 2,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_EMS": 1,
"FPT_EMS.1": 11,
"FPT_EMS.1.1": 1,
"FPT_EMS.1.2": 1,
"FPT_FLS": 7,
"FPT_FLS.1": 16,
"FPT_FLS.1.1": 1,
"FPT_ITE": 3,
"FPT_ITE.1": 11,
"FPT_ITE.1.1": 1,
"FPT_ITE.1.2": 1,
"FPT_ITE.2": 11,
"FPT_ITE.2.1": 3,
"FPT_ITE.2.2": 1,
"FPT_ITT": 7,
"FPT_ITT.1": 3,
"FPT_PHP": 7,
"FPT_PHP.3": 4,
"FPT_TDC.1": 10,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST": 2,
"FPT_TST.1": 11,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FRU": {
"FRU_FLT": 7,
"FRU_FLT.2": 3
},
"FTP": {
"FTP_ITC": 9,
"FTP_ITC.1": 3,
"FTP_ITE": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 10
},
"TLS": {
"SSL": {
"SSL": 1
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 1,
"Key agreement": 1
},
"MAC": {
"MAC": 12
}
},
"device_model": {},
"ecc_curve": {
"Brainpool": {
"brainpoolP256r1": 2,
"brainpoolP384r1": 2,
"brainpoolP512r1": 2
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 3
},
"SHA2": {
"SHA-224": 2,
"SHA-256": 11,
"SHA-384": 6,
"SHA-512": 4
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"STARCOS": {
"STARCOS 3": 149
}
},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 13,
"RNG": 9
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"DFA": 1,
"Malfunction": 15,
"malfunction": 1,
"physical tampering": 3
},
"SCA": {
"DPA": 1,
"Leak-Inherent": 13,
"Physical Probing": 2,
"SPA": 1,
"side channel": 1
},
"other": {
"Bleichenbacher attack": 1,
"JIL": 3
}
},
"standard_id": {
"BSI": {
"AIS20": 2,
"AIS31": 1
},
"CC": {
"CCMB-2017-04-001": 2,
"CCMB-2017-04-002": 2,
"CCMB-2017-04-003": 2,
"CCMB-2017-04-004": 2,
"CCMB-2017-05-001": 1
},
"FIPS": {
"FIPS 180-4": 1,
"FIPS 197": 2,
"FIPS PUB 180-4": 1,
"FIPS PUB 197": 1
},
"ISO": {
"ISO/IEC 7816": 2
},
"NIST": {
"NIST SP 800-38B": 1
},
"PKCS": {
"PKCS #1": 1,
"PKCS1": 2
},
"RFC": {
"RFC 5639": 1,
"RFC5639": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 49
},
"HPC": {
"HPC": 1
}
},
"DES": {
"DES": {
"DES": 1
}
},
"constructions": {
"MAC": {
"CMAC": 20
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-03111": 3,
"BSI TR-03143": 2
}
},
"tee_name": {
"IBM": {
"SE": 1
}
},
"tls_cipher_suite": {},
"vendor": {
"GD": {
"Giesecke+Devrient": 14
},
"Infineon": {
"Infineon": 2,
"Infineon Technologies AG": 2
},
"NXP": {
"NXP Semiconductors": 1
},
"STMicroelectronics": {
"STMicroelectronics": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Giesecke+Devrient Mobile Security GmbH",
"/Bearbeitet von": "Alexander Summerer",
"/Category": "Security Target Lite to BSI-CC-PP-0082-V2",
"/Company": "Giesecke \u0026 Devrient",
"/CreationDate": "D:20180808112026+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 11 f\u00fcr Word",
"/Eigent\u00fcmer": "G\u0026D",
"/Erstellt von": "Alexander Summerer",
"/Gegenstand": "Common Criteria Protection Security Target",
"/Keywords": "Version 1.7, 08.08.2018",
"/ModDate": "D:20180808112215+02\u002700\u0027",
"/Producer": "Adobe PDF Library 11.0",
"/SourceModified": "D:20180808091919",
"/Subject": "Security Target Lite STARCOS 3.7 COS GKV",
"/Title": "G+D MS Security Target Lite to BSI-PP-0082-V2",
"pdf_file_size_bytes": 1267620,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 129
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL4+",
"pp_ids": {
"_type": "Set",
"elements": [
"PP COS G2"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0082V3b_pdf.pdf",
"pp_name": "Card Operating System Generation 2"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0976V2a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"ATE_DPT.2",
"EAL4+",
"ALC_DVS.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0976V2b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "502fc83144de0067e253463c8396e8d1877b41c39eb94b8d5b4f2e882840b43f",
"txt_hash": "b4b1ccd407726cbfa1ccff726e66f26ae0472d4c60a71d3c017e48132238f554"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "c72f20c4589fda67026e3457fadc0c4bf056a59ec54c01c1ec1850f5a62edf81",
"txt_hash": "fb850278cecee9546454b31e5f81505b75869cd4d867fafa05879f7240e6e946"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "7476054ad369e3ae80c9c5ac676920cd6f1a764469be5dd6aecdc205df307f80",
"txt_hash": "7bc6cf46e42271da3bcebf8dc47bf7f6be206dc5c2b8f06471c8cda6b40a31d8"
}
},
"status": "archived"
}