BSI-CC-PP-0110-2020 - IoT Secure Communications Module Protection Profile (IoT-SCM-PP), Version 1.0.0

Web information

Status: active
Certification date: 2020-05-11
Scheme: 🇩🇪
Category: Other Devices and Systems
Security level: ALC_FLR.1, EAL2+

Certification report

Extracted keywords

Trusted Execution Environments
SE

Security level
EAL 2, EAL 4, EAL 2 augmented
Security Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLR, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.2, APE_ECD.1, APE_REQ.2
Protection profiles
BSI-CC-PP-0110-2020, BSI-CC-PP- 0110, BSI-CC-PP-0109-2020
Evaluation facilities
TÜV Informationstechnik

Certification process
Module Protection Profile (IoT-SCM-PP), Version 3, 06 January 2020, TÜV Informationstechnik GmbH (confidential document) [8] IoT Secure Element Protection Profile (IoT-SE-PP), BSI-CC-PP-0109-2020, Version 1.0.0, 19

Standards
AIS 32, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065
Technical reports
BSI 7148

File metadata

Title Certification Report BSI-CC-PP-0110-2020
Subject Secure Communications Module (SCM) to be used in an IoT device, e.g. a home appliance.
Keywords "IoT, IoT device, secure communications module, Protection Profile, IoT-SCM-PP, transmission security, connection control, hacking resistance"
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20200520111719+02'00'
Modification date D:20200520140354+02'00'
Pages 15
Creator Writer
Producer LibreOffice 6.2

Profile

Extracted keywords

Schemes
MAC
Protocols
TLS

Trusted Execution Environments
SE
Vendor
NXP Semiconductors, Infineon Technologies AG, STMicroelectronics

Security level
EAL2, EAL2 augmented
Claims
O.SCM, T.SCM, A.SCM, OE.SCM, OSP.SCM
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN, FCS_CKM.1, FCS_CKM.2, FCS_CKM.5, FCS_COP.1, FCS_CKM, FCS_CKM.4, FCS_CKM.5.1, FCS_COP.1.1, FDP_ACC, FDP_ACF.1, FDP_ACC.1, FDP_ACF, FDP_ITC.1, FDP_ITC.2, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FMT_MSA.3, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MTD.1, FMT_SMF, FMT_MTD.1.1, FMT_MDT.1.1, FMT_UID.1, FMT_UAU.1, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FTP_PRO, FTP_PRO.1, FTP_PRO.2, FTP_PRO.3, FTP_PRO.3.2, FTP_PRO.1.1, FTP_PRO.1.2, FTP_PRO.1.3, FTP_PRO.1.4, FTP_PRO.1.5, FTP_PRO.1.6, FTP_PRO.2.1, FTP_PRO.2.2, FTP_PRO.2.3, FTP_PRO.3.1, FTP_EMS.1.2
Protection profiles
BSI-CC-PP-0110

Side-channel analysis
timing attacks, JIL

Standards
NIST SP 800-57

File metadata

Title IoT Secure Communications Module Protection Profile (IoT-SCM-PP)
Subject Secure Communications Module (SCM) to be used in an IoT device, e.g. a home appliance.
Keywords IoT, IoT device, secure communications module, transmission security, connection control, hacking resistance
Author SCA IoT PP Working Group
Creation date D:20200316150501+01'00'
Modification date D:20200520090404+02'00'
Pages 41
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

References

No references are available for this protection profile.

Updates

  • 22.04.2025 The protection profile data changed.
    Protection Profile changed

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 461887, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 15, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20200520111719+02'00'", '/Creator': 'Writer', '/Keywords': '"IoT, IoT device, secure communications module, Protection Profile, IoT-SCM-PP, transmission security, connection control, hacking resistance"', '/ModDate': "D:20200520140354+02'00'", '/Producer': 'LibreOffice 6.2', '/Subject': 'Secure Communications Module (SCM) to be used in an IoT device, e.g. a home appliance.', '/Title': 'Certification Report BSI-CC-PP-0110-2020', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/zertifizierung', 'https://www.sogis.eu/', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/']}}.
    • The pp_metadata property was set to {'pdf_file_size_bytes': 966852, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 41, '/Author': 'SCA IoT PP Working Group', '/CreationDate': "D:20200316150501+01'00'", '/Creator': 'Microsoft® Word 2016', '/Keywords': 'IoT, IoT device, secure communications module, transmission security, connection control, hacking resistance', '/ModDate': "D:20200520090404+02'00'", '/Producer': 'Microsoft® Word 2016', '/Subject': 'Secure Communications Module (SCM) to be used in an IoT device, e.g. a home appliance.', '/Title': 'IoT Secure Communications Module Protection Profile (IoT-SCM-PP)', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0110-2020': 7, 'BSI-CC-PP- 0110': 1, 'BSI-CC-PP-0109-2020': 1}}, 'cc_security_level': {'EAL': {'EAL 2': 3, 'EAL 4': 1, 'EAL 2 augmented': 2}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 2, 'ALC_FLR': 1}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 3}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 5}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 32': 1}, 'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'Module Protection Profile (IoT-SCM-PP), Version 3, 06 January 2020, TÜV Informationstechnik GmbH (confidential document) [8] IoT Secure Element Protection Profile (IoT-SE-PP), BSI-CC-PP-0109-2020, Version 1.0.0, 19': 1}}}.
    • The pp_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0110': 1}}, 'cc_security_level': {'EAL': {'EAL2': 5, 'EAL2 augmented': 4}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.1': 6, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 9}, 'ASE': {'ASE_CCL': 1, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 3}, 'FCS': {'FCS_CKM.1': 8, 'FCS_CKM.2': 6, 'FCS_CKM.5': 17, 'FCS_COP.1': 32, 'FCS_CKM': 1, 'FCS_CKM.4': 5, 'FCS_CKM.5.1': 2, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ACC': 10, 'FDP_ACF.1': 13, 'FDP_ACC.1': 6, 'FDP_ACF': 16, 'FDP_ITC.1': 4, 'FDP_ITC.2': 4}, 'FIA': {'FIA_UID.1': 7, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 3, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1}, 'FMT': {'FMT_MSA.3': 6, 'FMT_SMR.1': 5, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1': 5, 'FMT_SMF.1.1': 1, 'FMT_MTD.1': 5, 'FMT_SMF': 1, 'FMT_MTD.1.1': 1, 'FMT_MDT.1.1': 1, 'FMT_UID.1': 3, 'FMT_UAU.1': 3}, 'FPT': {'FPT_EMS': 1, 'FPT_EMS.1': 7, 'FPT_EMS.1.1': 3, 'FPT_EMS.1.2': 2}, 'FTP': {'FTP_PRO': 10, 'FTP_PRO.1': 32, 'FTP_PRO.2': 28, 'FTP_PRO.3': 19, 'FTP_PRO.3.2': 3, 'FTP_PRO.1.1': 2, 'FTP_PRO.1.2': 2, 'FTP_PRO.1.3': 2, 'FTP_PRO.1.4': 2, 'FTP_PRO.1.5': 4, 'FTP_PRO.1.6': 4, 'FTP_PRO.2.1': 2, 'FTP_PRO.2.2': 3, 'FTP_PRO.2.3': 2, 'FTP_PRO.3.1': 2, 'FTP_EMS.1.2': 1}}, 'cc_claims': {'O': {'O.SCM': 48}, 'T': {'T.SCM': 15}, 'A': {'A.SCM': 16}, 'OE': {'OE.SCM': 16}, 'OSP': {'OSP.SCM': 17}}, 'vendor': {'NXP': {'NXP Semiconductors': 2}, 'Infineon': {'Infineon Technologies AG': 2}, 'STMicroelectronics': {'STMicroelectronics': 2}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 11}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'timing attacks': 1}, 'other': {'JIL': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 94}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'NIST': {'NIST SP 800-57': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The state of the protection profile object was updated.

    • The pp property was updated, with the {'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '501a8b6f618e894b631e8e37e10103368c8946df5ca95723d92c810c73c3dc7c', 'txt_hash': '3bb44235e2011016ee735fdc50b4858a7a18a602152cf80f21a13c25f853306b'} data.
    • The report property was updated, with the {'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7d49c363cbec58c614438ff4f6211db02d2ee2f7ceaefab3b1423712eaeb0369', 'txt_hash': '5715b0dcc6211ca51a3ba7cd30bb46ce243d3dfd9fd03363f081c5f118cf757e'} data.
  • 14.04.2025 The protection profile data changed.
    Protection Profile changed

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The pp_metadata property was set to None.
    • The report_keywords property was set to None.
    • The pp_keywords property was set to None.

    The state of the protection profile object was updated.

    • The pp property was updated, with the {'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None} data.
    • The report property was updated, with the {'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None} data.
  • 04.02.2025 The protection profile was first processed.
    New Protection Profile

    A new Protection Profile with the name BSI-CC-PP-0110-2020 - IoT Secure Communications Module Protection Profile (IoT-SCM-PP), Version 1.0.0 was processed.

Raw data

{
  "_id": "06c78e77253bb722",
  "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
  "dgst": "06c78e77253bb722",
  "heuristics": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
  },
  "pdf_data": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
    "pp_filename": "pp0110b_pdf.pdf",
    "pp_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.SCM": 16
        },
        "O": {
          "O.SCM": 48
        },
        "OE": {
          "OE.SCM": 16
        },
        "OSP": {
          "OSP.SCM": 17
        },
        "T": {
          "T.SCM": 15
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0110": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.2": 1,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMS.2": 1,
          "ALC_DEL.1": 1,
          "ALC_FLR.1": 6
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 9
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 5,
          "EAL2 augmented": 4
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 3
        },
        "FCS": {
          "FCS_CKM": 1,
          "FCS_CKM.1": 8,
          "FCS_CKM.2": 6,
          "FCS_CKM.4": 5,
          "FCS_CKM.5": 17,
          "FCS_CKM.5.1": 2,
          "FCS_COP.1": 32,
          "FCS_COP.1.1": 1
        },
        "FDP": {
          "FDP_ACC": 10,
          "FDP_ACC.1": 6,
          "FDP_ACF": 16,
          "FDP_ACF.1": 13,
          "FDP_ITC.1": 4,
          "FDP_ITC.2": 4
        },
        "FIA": {
          "FIA_UAU.1": 3,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UID.1": 7,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_MDT.1.1": 1,
          "FMT_MSA.3": 6,
          "FMT_MTD.1": 5,
          "FMT_MTD.1.1": 1,
          "FMT_SMF": 1,
          "FMT_SMF.1": 5,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 5,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1,
          "FMT_UAU.1": 3,
          "FMT_UID.1": 3
        },
        "FPT": {
          "FPT_EMS": 1,
          "FPT_EMS.1": 7,
          "FPT_EMS.1.1": 3,
          "FPT_EMS.1.2": 2
        },
        "FTP": {
          "FTP_EMS.1.2": 1,
          "FTP_PRO": 10,
          "FTP_PRO.1": 32,
          "FTP_PRO.1.1": 2,
          "FTP_PRO.1.2": 2,
          "FTP_PRO.1.3": 2,
          "FTP_PRO.1.4": 2,
          "FTP_PRO.1.5": 4,
          "FTP_PRO.1.6": 4,
          "FTP_PRO.2": 28,
          "FTP_PRO.2.1": 2,
          "FTP_PRO.2.2": 3,
          "FTP_PRO.2.3": 2,
          "FTP_PRO.3": 19,
          "FTP_PRO.3.1": 2,
          "FTP_PRO.3.2": 3
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 1
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 11
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "SCA": {
          "timing attacks": 1
        },
        "other": {
          "JIL": 1
        }
      },
      "standard_id": {
        "NIST": {
          "NIST SP 800-57": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 94
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon Technologies AG": 2
        },
        "NXP": {
          "NXP Semiconductors": 2
        },
        "STMicroelectronics": {
          "STMicroelectronics": 2
        }
      },
      "vulnerability": {}
    },
    "pp_metadata": {
      "/Author": "SCA IoT PP Working Group",
      "/CreationDate": "D:20200316150501+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/Keywords": "IoT, IoT device, secure communications module, transmission security, connection control, hacking resistance",
      "/ModDate": "D:20200520090404+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Subject": "Secure Communications Module (SCM) to be used in an IoT device, e.g. a home appliance.",
      "/Title": "IoT Secure Communications Module Protection Profile (IoT-SCM-PP)",
      "pdf_file_size_bytes": 966852,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 41
    },
    "report_filename": "pp0110a_pdf.pdf",
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0110": 1,
          "BSI-CC-PP-0109-2020": 1,
          "BSI-CC-PP-0110-2020": 7
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 1,
          "ALC_FLR.1": 2
        },
        "APE": {
          "APE_CCL.1": 1,
          "APE_ECD.1": 1,
          "APE_INT.1": 1,
          "APE_OBJ.2": 1,
          "APE_REQ.2": 1,
          "APE_SPD.1": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 3,
          "EAL 2 augmented": 2,
          "EAL 4": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "Module Protection Profile (IoT-SCM-PP), Version 3, 06 January 2020, T\u00dcV Informationstechnik GmbH (confidential document) [8] IoT Secure Element Protection Profile (IoT-SE-PP), BSI-CC-PP-0109-2020, Version 1.0.0, 19": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 3
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 32": 1
        },
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1
        }
      },
      "tee_name": {
        "IBM": {
          "SE": 5
        }
      },
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20200520111719+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"IoT, IoT device, secure communications module, Protection Profile, IoT-SCM-PP, transmission security, connection control, hacking resistance\"",
      "/ModDate": "D:20200520140354+02\u002700\u0027",
      "/Producer": "LibreOffice 6.2",
      "/Subject": "Secure Communications Module (SCM) to be used in an IoT device, e.g. a home appliance.",
      "/Title": "Certification Report BSI-CC-PP-0110-2020",
      "pdf_file_size_bytes": 461887,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/zertifizierung",
          "https://www.sogis.eu/",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 15
    }
  },
  "state": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
    "pp": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "501a8b6f618e894b631e8e37e10103368c8946df5ca95723d92c810c73c3dc7c",
      "txt_hash": "3bb44235e2011016ee735fdc50b4858a7a18a602152cf80f21a13c25f853306b"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "7d49c363cbec58c614438ff4f6211db02d2ee2f7ceaefab3b1423712eaeb0369",
      "txt_hash": "5715b0dcc6211ca51a3ba7cd30bb46ce243d3dfd9fd03363f081c5f118cf757e"
    }
  },
  "web_data": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
    "category": "Other Devices and Systems",
    "is_collaborative": false,
    "maintenances": [],
    "name": "BSI-CC-PP-0110-2020 - IoT Secure Communications Module Protection Profile (IoT-SCM-PP), Version 1.0.0",
    "not_valid_after": null,
    "not_valid_before": "2020-05-11",
    "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0110b_pdf.pdf",
    "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0110a_pdf.pdf",
    "scheme": "DE",
    "security_level": {
      "_type": "Set",
      "elements": [
        "EAL2+",
        "ALC_FLR.1"
      ]
    },
    "status": "active",
    "version": "Version 1.0.0"
  }
}