This page was not yet optimized for use on mobile devices.
Protection profiles for secure signature creation device — Part 4: Extension for device with key generation and trusted communication with certificate generation application
Web information ?
Status: activeCertification date: 2012-12-12
Scheme: 🇩🇪
Category: Products for Digital Signatures
Security level: AVA_VAN.5, EAL4+
Certification report ?
Extracted keywords
Security level
EAL 4, EAL 1, EAL1, EAL3, EAL5, EAL7, EAL2, EAL4, EAL6, EAL 4 augmented, ITSEC EvaluationSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_DVS.2, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.2, APE_ECD.1, APE_REQ.2, APE_OBJ.1, APE_REQ.1, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0071-2012, BSI-CC-PP-0059-2009-MA-01Evaluation facilities
SRC Security Research & ConsultingCertification process
communication with certificate generation application”, SRC Security Research & Consulting GmbH (confidential document) [6] “Protection profiles for secure signature creation device - Part 4: Extension for device withStandards
AIS 32Technical reports
BSI 7125, BSI 2, BSI 7148, BSI 9File metadata
Title | Certification Report BSI-CC-PP-0071-2012 |
---|---|
Subject | Protection Profile |
Keywords | "Common Criteria, Certification, Zertifizierung, Protection Profile, Schutzprofil" |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Creation date | D:20121218161538+01'00' |
Modification date | D:20121218162055+01'00' |
Pages | 30 |
Creator | Writer |
Producer | LibreOffice 3.5 |
Profile ?
Extracted keywords
Security level
EAL 4+, EAL4, EAL4 augmentedClaims
A.CGA, A.SCA, OE.HID_VADSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_CKM.2, FDP_DAU, FDP_ACC, FDP_AFC, FDP_RIP.1, FDP_SDI, FDP_DAU.1, FDP_DAU.2, FDP_ACF, FDP_ITC.1, FDP_ITC.2, FDP_ACF.1, FDP_ACC.1, FDP_IFC.1, FIA_API, FIA_API.1, FIA_UAU.1, FIA_API.1.1, FIA_AFL.1, FIA_UID.1, FIA_UAU.1.1, FIA_UAU.1.2, FMT_MOF.1, FMT_MSA, FMT_MSA.2, FMT_MSA.3, FMT_MSA.4, FMT_MTD, FMT_SMR.1, FMT_SMF.1, FMT_MSA.1, FPT_EMS, FPT_EMS.1, FPT_FLS.1, FPT_PHP.1, FPT_PHP.3, FPT_TST.1, FPT_ITC, FPT_ITC.1, FTP_ITC, FTP_ITC.1, FTP_ITC.1.3Protection profiles
BSI-CC-PP-0071, BSI-PP-0006Evaluation facilities
TÜV InformationstechnikStandards
CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003File metadata
Title | Protection profiles for secure signature creation device — Part 4: Extension for device with key generation and trusted communication with certificate generation application |
---|---|
Subject | prEN 14169-4:2012 (E) / BSI-CC-PP-0071 |
Keywords | secure signature creation device, electronic signature, digital signature, key generation, trusted communication with certificate generation application |
Author | TÜV Informationstechnik GmbH |
Creation date | D:20130111120056+01'00' |
Modification date | D:20130111123911+01'00' |
Pages | 25 |
Creator | PScript5.dll Version 5.2.2 |
Producer | Acrobat Distiller 11.0 (Windows) |
References ?
- ASapp-QSCD (OSB) v1.0 archived
- JPKI applet v1.0 on Sm@rtSIM CX Copernicus ST54J/K active
- ChipDoc v3.1 on JCOP 4 P71 in SSCD configuration active
- SOMA-c007 Machine Readable Electronic Document SSCD Application (SOMA-c007_2) version 2 archived
- ID-A v1.1 on ID-One Cosmo X active
- ACOS-IDv2.1 SSCD (A) CL-TC-Comm (Version 2.1 SSCD (A)) active
- JPKI applet v1.0 on JCOP 4.1 active
- MaskTech eSign Applet on Secora ID S v1.1 active
- ChipDoc v3 on JCOP 4 P71 in SSCD configuration active
- CELES-c001 Machine Readable Electronic Document SSCD Application, version 1 (CELES-c001_1) active
- SOMA-c016 Machine Readable Electronic Document eIDAS QSCD Application, version 3 active
- CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1 (code SAAAAR : 203523) active
- ID-One Cosmo X embedding VITALE application(version 2.1.5 archived
- Idemia CombICAO Applet in SSCD configuration on Cosmo V9 archived
- IDentity Applet v3.4-p1/QSCD on NXP JCOP 4 P71 active
- IAS ECC v2, version 1.3, in configuration #3 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’application : F0 02 02 13 (ANSSI-CC-2020/52-R01) active
- Veridos Suite v4.0 – cryptovision ePasslet Suite – Java Card applet configuration providing Secure Signature Creation Device with Key generation (SSCD) active
- IDeal Citiz v2.3-n embedding ID.me 1.6-n application (ID.me 1.6-n / 2.1.6.0.0) archived
- IAS ECC V2, Version 1.3 en configuration #4 sur la plateforme ID-One Cosmo v8.2 archived
- CardOS V6.0 ID R1.1 active
- DNIe version 4.0 active
- IDentity Applet v3.4/QSCD on NXP JCOP 4 P71 active
- IAS ECC V2, Version 1.3 en configuration #3 sur la plateforme ID-One Cosmo v8.2 archived
- ChipDoc v3.1 on JCOP 4 P71 in SSCD configuration (v2) active
- IAS ECC v2, version 1.3, in configuration #4 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’application : F0 02 02 13 (ANSSI-CC-2020/53-R01) active
- ID-A v1.0 on ID-ONE COSMO X Codes SAAAAR applet : 417692 et 417693 ; Code SAAAR du Common package : 417641 active
- IAS ECC V2, version 1.3 en configuration #1 sur la plateforme ID-One Cosmo v8.2 active
- MTCOS Pro 2.6 SSCD / P71D352 (N7121) active
- CardOS V6.0 ID R1.0 active
- ID-A v1.0 on ID-ONE COSMO X Code SAAAR de l’applet : 417692 Code SAAAR du Common package : 417641 archived
- JPKI applet v1.0 on Combo CE 4.2.3 ST54J/K active
- ID-One Cosmo v8.2 embedding VITALE application (Version 2.0.83) archived
- IAS Classic v5.2 on MultiApp V5.0 active
- ID-One Cosmo X embedding VITALE application version 2.1.5 active
- CardOS DI V5.4 QES Version 1.0 active
- ID-One Cosmo v9.1 embedding VITALE application version 2.1.4 active
- ChipDoc v3 on JCOP 4 P71 in SSCD configuration active
- IAS Classic v5.0 with MOC Server v3.0 on MultiApp v4.2 Version 5.0.0.A.C, version 3.0.1A active
- Idemia ID-One™ CNS V2 on Cosmo V9.1 active
- AKD eID Card 1.0 archived
- STMicroelectronics JSIGN4 V1.0.4 active
- CombICAO Applet v3 on ID-One Cosmo X (SSCD Configuration) SAAAAR : 203742 (ANSSI-CC-2023/51) active
- Permiso de Residencia versión 4.0 active
- ACOS-IDv2.1 SSCD (A) CB-Comm (Version 2.1 SSCD (A)) active
- ID-A v1.0 on ID-One Cosmo X Codes SAAAAR : 417692, 417693 active
- ACOS-IDv2.0 SSCD (A) CB-Comm (v2.0 SSCD (A)) active
- JPKI applet v1.0 on JCOP 6.2 active
- JPKI applet v1.0 on Connected eSE 5.3.4 ST54L active
- IAS ECC V2, version 1.3 en configuration #4 sur la plateforme ID-One Cosmo v8.2 active
- IAS ECC V2, version 1.3 en configuration #1 sur la plateforme ID-One Cosmo v8.2 archived
- CombICAO Applet v3 on ID-One Cosmo X (SSCD Configuration) SAAAAR : 203742 archived
- ChipDoc v3.1 on JCOP 4 P71 in SSCD configuration Version 3.1.6.52 archived
- Pasaporte electrónico versión 4.0 active
- IAS ECC V2, version 1.3 en configuration #3 sur la plateforme ID-One Cosmo v8.2 active
- CombICAO Applet v3 on ID-One Cosmo X (SSCD Configuration) SAAAAR : 203742 active
- ASapp-QSCD v1.0 archived
- HID Global S.p.A. SOMA-c016 Machine Readable Electronic Document eIDAS QSCD Application, version 4 active
- IDentity Applet v3.4-p2/QSCD on NXP JCOP 4 P71 active
- ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration(Version 4.0.1.52) active
- JPKI applet v1.0 on JCOP 5.1 active
- IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A (ANSSI-CC-2023/57 ) active
- ACOS-IDv2.0 SSCD (A) CL-TC-Comm (v2.0 SSCD (A)) active
- ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52) (ANSSI-CC-2023/12-R01) active
- CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2 (code SAAAAR : 203523) active
- IAS ECC v2, version 1.3, in configuration #1 on ID-One Cosmo v8.2 open platform on NXP P6022M VB (Identification de l’application : F0 02 02 13) (ANSSI-CC-2020/50-R01) active
- MTCOS Pro 2.5 SSCD / P60D145VB_J (P6022y VB) archived
- ID-One CNS v2 archived
- MTCOS Pro 2.5 SSCD / SLE78CLFX400VPHM/BPHM/7PHM (M7892) archived
- SOMA-c007 Machine Readable Electronic Document SSCD Application version 4 active
- ID-A v1.0 on ID-One Cosmo J (SAAAAR : 417701, 418402 et 417652) active
- STMicroelectronics JSIGN3 V1.1.4 active
- ChipDoc v4.1 on JCOP 4.5 P71 in SSCD configuration Version 4.1.1.52 (ANSSI-CC-2023/69) active
- JPKI applet v1.0 on JCOP 5.2 active
- CardOS DI V5.4 QES Version 1.0 active
- TC-FNMT version 5.6 active
- AKD eID 2.0 SSCD active
- CardOS V6.0 ID R1.2 active
- MTCOS Pro 2.6 QSCD/SSCD / SLC37 (V11) active
- JPKI applet v1.0 on JCOP 8.9 active
Updates ?
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name Protection profiles for secure signature creation device — Part 4: Extension for device with key generation and trusted communication with certificate generation application was processed.
Raw data
{
"_id": "1f7ea2e05de5b88b",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "1f7ea2e05de5b88b",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "pp0071b_pdf.pdf",
"pp_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CGA": 3,
"A.SCA": 3
},
"OE": {
"OE.HID_VAD": 2
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0071": 1,
"BSI-PP-0006": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 3,
"ADV_FSP.4": 3,
"ADV_IMP.1": 3,
"ADV_TDS.3": 3
},
"AGD": {
"AGD_OPE.1": 3,
"AGD_PRE.1": 3
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 3,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 4+": 1,
"EAL4": 9,
"EAL4 augmented": 4
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM.1": 6,
"FCS_CKM.2": 1,
"FCS_CKM.4": 6,
"FCS_COP.1": 3
},
"FDP": {
"FDP_ACC": 19,
"FDP_ACC.1": 7,
"FDP_ACF": 4,
"FDP_ACF.1": 3,
"FDP_AFC": 6,
"FDP_DAU": 6,
"FDP_DAU.1": 1,
"FDP_DAU.2": 2,
"FDP_IFC.1": 4,
"FDP_ITC.1": 2,
"FDP_ITC.2": 2,
"FDP_RIP.1": 2,
"FDP_SDI": 6
},
"FIA": {
"FIA_AFL.1": 3,
"FIA_API": 5,
"FIA_API.1": 8,
"FIA_API.1.1": 3,
"FIA_UAU.1": 7,
"FIA_UAU.1.1": 3,
"FIA_UAU.1.2": 1,
"FIA_UID.1": 8
},
"FMT": {
"FMT_MOF.1": 3,
"FMT_MSA": 8,
"FMT_MSA.1": 2,
"FMT_MSA.2": 2,
"FMT_MSA.3": 8,
"FMT_MSA.4": 2,
"FMT_MTD": 5,
"FMT_SMF.1": 12,
"FMT_SMR.1": 13
},
"FPT": {
"FPT_EMS": 3,
"FPT_EMS.1": 4,
"FPT_FLS.1": 3,
"FPT_ITC": 2,
"FPT_ITC.1": 1,
"FPT_PHP.1": 3,
"FPT_PHP.3": 3,
"FPT_TST.1": 4
},
"FTP": {
"FTP_ITC": 6,
"FTP_ITC.1": 3,
"FTP_ITC.1.3": 2
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 2,
"CCMB-2012-09-002": 2,
"CCMB-2012-09-003": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "T\u00dcV Informationstechnik GmbH",
"/CreationDate": "D:20130111120056+01\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/Keywords": "secure signature creation device, electronic signature, digital signature, key generation, trusted communication with certificate generation application",
"/ModDate": "D:20130111123911+01\u002700\u0027",
"/Producer": "Acrobat Distiller 11.0 (Windows)",
"/Subject": "prEN 14169-4:2012 (E) / BSI-CC-PP-0071",
"/Title": "Protection profiles for secure signature creation device \u2014 Part 4: Extension for device with key generation and trusted communication with certificate generation application",
"pdf_file_size_bytes": 741790,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://pda.etsi.org/pda/queryform.asp",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 25
},
"report_filename": "pp0071a_pdf.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0059-2009-MA-01": 1,
"BSI-CC-PP-0071-2012": 16
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 1,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 1,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 1,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 1,
"ALC_FLR": 1,
"ALC_FLR.1": 1,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 1,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 1,
"ALC_TAT.2": 1,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 2,
"APE_ECD.1": 2,
"APE_INT.1": 2,
"APE_OBJ.1": 1,
"APE_OBJ.2": 2,
"APE_REQ.1": 1,
"APE_REQ.2": 2,
"APE_SPD.1": 2
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_COV.3": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 1,
"ATE_DPT.4": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND": 1,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 4": 5,
"EAL 4 augmented": 2,
"EAL1": 6,
"EAL2": 3,
"EAL3": 4,
"EAL4": 4,
"EAL5": 6,
"EAL6": 3,
"EAL7": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"communication with certificate generation application\u201d, SRC Security Research \u0026 Consulting GmbH (confidential document) [6] \u201cProtection profiles for secure signature creation device - Part 4: Extension for device with": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"SRC": {
"SRC Security Research \u0026 Consulting": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 32": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {
"BSI": {
"BSI 2": 1,
"BSI 7125": 2,
"BSI 7148": 1,
"BSI 9": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20121218161538+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Protection Profile, Schutzprofil\"",
"/ModDate": "D:20121218162055+01\u002700\u0027",
"/Producer": "LibreOffice 3.5",
"/Subject": "Protection Profile",
"/Title": "Certification Report BSI-CC-PP-0071-2012",
"pdf_file_size_bytes": 816932,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"http://pda.etsi.org/pda/queryform.asp",
"https://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 30
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "dcca60e39ccbcaf5d5e5b547ada0e2ef5a313cca916abae963698b2334e28312",
"txt_hash": "3b4cc6f1679369577c7fe63a151868bf76634320cc9cf5195482a9f42c0d483f"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "2f80cba35abc142ff7385149bf601f29655ec12b8ef1a031f32abcc5b82f5636",
"txt_hash": "1c994ab8d6b68771ec20cf0d1ab886dfabc7786e75c069b9894ff1d846bc19fb"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Products for Digital Signatures",
"is_collaborative": false,
"maintenances": [
[
"2016-06-30",
"EN 419211-4:2013 - Protection profiles for secure signature creation device - Part 4: Extension for device with key generation and trusted channel to certificate generation application",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071_ma1a_pdf.pdf"
]
],
"name": "Protection profiles for secure signature creation device \u2014 Part 4: Extension for device with key generation and trusted communication with certificate generation application",
"not_valid_after": null,
"not_valid_before": "2012-12-12",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"EAL4+"
]
},
"status": "active",
"version": "Version 1.0.1"
}
}