This page was not yet optimized for use on mobile devices.
Machine Readable Travel Document with [ICAO Application] Extended Access Control, Version 1.10
Web information ?
Status: archivedCertification date: 2009-05-07
Archived date: 2013-01-29
Scheme: 🇩🇪
Category: ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level: EAL4+
Certification report ?
Extracted keywords
Security level
EAL 4, EAL1, EAL3, EAL5, EAL7, EAL2, EAL4, EAL6, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.2, APE_ECD.1, APE_REQ.2, APE_OBJ.1, APE_REQ.1, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0056-2009Evaluation facilities
SRC Security Research & ConsultingCertification process
Profile Machine Readable Travel Document with „ICAO Application" Extended Access Control, SRC (confidential document) [6] Protection Profile — Machine Readable Travel Document with “ICAO Application” Extended AccessStandards
ICAOTechnical reports
BSI 7125, BSI 2, BSI 7148, BSI 7149File metadata
Title | Certification Report BSI-CC-PP-0056-2009 |
---|---|
Subject | Common Criteria Schutzprofile, Protection Profile |
Keywords | "Certification, Zertifizierung, Protection Profile, Schutzprofil, CC, CC3.1, MRTD, EAC" |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Creation date | D:20090512092749+02'00' |
Modification date | D:20090512094811+02'00' |
Pages | 26 |
Creator | Writer |
Producer | StarOffice 9 |
Profile ?
Extracted keywords
Symmetric Algorithms
AES, DES, Triple-DES, KMAC, CMACAsymmetric Algorithms
ECDH, ECDSA, Diffie-Hellman, DHHash functions
SHA-1, SHA-224, SHA-256, JHSchemes
MAC, Key AgreementIC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG14, EF.DG13, EF.COM, EF.SODSecurity level
EAL4, EAL4 augmentedClaims
A.MRTD_, OE.MRTD_, OE.BAC_PP, OE.BAC-PPSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.3, ADV_IMP.1, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, AVA_VAN.3, AVA_VAN.5, APE_SRESecurity Functional Requirements (SFR)
FAU_SAS, FAU_GEN, FAU_SAS.1, FAU_SAS.1.1, FCS_RND, FCS_CKM.1, FCS_RND.1, FCS_RND.1.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1.1, FCS_COP, FCS_CKM.4.1, FDP_ACF, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_UCT.1, FDP_IFC.1, FDP_UCT.1.1, FDP_UIT.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ITC, FIA_API, FIA_SOS.2, FIA_API.1, FIA_API.1.1, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MTD, FMT_MSA.3, FMT_MTD.3, FMT_SMF.1, FMT_SMR.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FMT_MTD.3.1, FMT_MSA.1, FPR_TST.1.1, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_FLS.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3.1, FPT_RVM.1, FPT_SEP.1, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-CC-PP-0056, BSI-PP-0002-2001, BSI-PP-0035-2007, BSI-PP-0055Side-channel analysis
physical probing, DPA, SPA, timing attacks, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineeringStandards
FIPS 180-2, PKCS#3, RFC 2631, RFC3369, ISO/IEC 7816-2, ISO/IEC 14443, ISO/IEC 7816-4, ISO/IEC 9796-2, ISO/IEC 15946-1, ISO/IEC 15946-2, ICAO, CCMB-2006-09-001, CCMB-2007-09-002, CCMB-2007-09-003, CCMB-2007-09-004Technical reports
BSI TR-03110, BSI 2006File metadata
Title | Common Criteria Protection Profile BSI-CC-PP-0056 |
---|---|
Subject | Machine Readable Travel Document with "ICAO Application", Extended Access Control |
Keywords | Common Criteria, Protection Proile, Travel Document |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Creation date | D:20090511083843+02'00' |
Modification date | D:20090512094943+02'00' |
Pages | 75 |
Creator | Writer |
Producer | StarOffice 9 |
References ?
- eTravel EAC on MultiApp v2 archived
- CombICAO Applet v3 on ID-One Cosmo X (EAC Configuration) SAAAAR : 203742 (ANSSI-CC-2023/48) active
- ID OneTM ePass v2.2 en configuration EAC et AA sur composants STMicroelectronics ST23YR80/48B archived
- Application eTravel EAC v1.3 chargée sur la carte à puce MultiApp V2 SAC (PACE) masquée sur le composant SLE66CLX1440PE m2091/a13 archived
- eTravel 2.5 EAC on BAC on MultiApp V5.0 active
- CombICAO Applet v3 on ID-One Cosmo X (BAC and CA Configuration) SAAAAR : 203742 active
- ChipDoc v4.1 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration Version 4.1.1.52 ( ANSSI-CC-2023/68) active
- TnD v5.1 on Cosmo J in EAC Configuration active
- eTravel 2.5.A EAC on BAC on MultiApp V5.0.A (version 2.5.A.0.0) active
- MTCOS Pro 2.2 EAC / (SLE78CLX) M7820 archived
- Application eTravel EAC 1.4 avec AA, configuration EAC avec AMD 113v3, masquée sur composants IFX M7820 A11 archived
- MTCOS Pro 2.2 EAC / P5CD081 archived
- IDmove v5 on SCR404U in EAC with PACE configuration and LDSv2, AA in optionOS Commercial Version : 0x098912 ; OS Unique Identifier : 0xB7BC0108 et E48C0108 ( ANSSI-CC-2023/65) active
- KONA102J1 ePassport EAC, versión 1.1 archived
- LDS EAC Java Applet in EAC configuration with AA v2.2 archived
- Athena IDProtect Duo v5 avec application IASECC en configuration ICAO EAC sur composant AT90SC28880RCFV archived
- CombICAO Applet v3 on ID-One Cosmo X (EAC with PACE Configuration) SAAAAR : 203742 (ANSSI-CC-2023/49) active
- MTCOS Pro 2.1 EAC / ST23YR80 archived
- KONA2 D2320N ePassport [EAC configuration] version 01 revision 03 patch 00 archived
- cv act ePasslet/EACv1 v1.8 archived
- ePass ICAO essential – configuration BAC and EAC RSA, Version 1.0 archived
- Carte à puce SLJ 52 Gxx yyy AL : application pour passeport électronique sur plateforme jTOP INFv#46 masquée sur composants Infineon SLE78CLX1600PM, SLE78CLX800P et SLE78CLX360PM archived
- ID One ePass v2.2 en configuration EAC et AA sur composant ST23YR18A archived
- Athena IDPass ICAO EAC avec AA sur composant SB23YR48/80B avec librairie cryptographique NesLib v3.0 archived
- Sagem Securite CC IDeal Pass Passport (on SB23YR48B), version 1.5.0 ICAO EAC application archived
- cv act ePasslet Suite v2.1 – Java Card applet configuration providing Machine Readable Travel Document with “ICAO Application”, Extended Access Control (EAC) archived
- Application eTravel EAC v2.0, en configuration "EACon BAC" sur la plateforme fermée MultiApp V3masquée sur le composant M7820 A11(Version du patch : 1.5) archived
- TnD v5.1 on ID-One Cosmo X (EAC Configuration) active
- ID-One ePass IDL Full EACv2 in EAC MRTD configuration on Infineon SLE77CLFX2400P and SLE77CLFX2407P active
- ID-OneTM ePass v2.2 en configuration EAC sur composant NXP P5CD081V1A archived
- eTravel EAC version 1.1 avec AA (version 01 03), configuration EAC, sur composant P5CD080 archived
- Idemia CombICAO Applet in EAC configuration on ID-ONE Cosmo V9 Essential archived
- STARCOS 3.5 ID EAC+AA C1 archived
- Athena IDProtect/OS755 avec application ICAO EAC sur composants SB23YR48/80B archived
- SOMA801NXP, version 1.0 archived
- Sagem Securite CC IDeal Pass Passport (on SB23YR80B), version 1.5.0 ICAO EAC application archived
- Morpho JC ePassport V3.0.0 (EAC) archived
- CC IDeal Citiz SmartCard (on SB23YR48B) archived
- eTravel Essential 1.1 (EACv1 and AA activated) active
- Sagem Sécurité Carte CC IDeal Citiz (sur composant SB23YR80B), version 1.4.5 Application ICAO EAC archived
- eTravel Essential 1.2 – BAC, EAC and AA activated (release ‘0300’) active
- eTravel 2.5.A EAC on BAC on MultiApp V5.0.A (version 2.5.A.0.0) active
- SOMA801STM - application EAC, version 1.0 archived
- Morpho JC ePassport V2.0.1 (EAC) archived
- ePass V3 TD sur composants P5CD081V1A, en configuration EAC sur SAC via PACE v2 et AA archived
- CombICAO Applet v3 on ID-One Cosmo X (EAC Configuration) SAAAAR : 203742 archived
- Carte CC IDeal Citiz (sur composants SB23YR80B et SB23YR48B) archived
- KONA102 ePassport EAC, versión 1.0.1 archived
- Kona102 ePassport [EAC configuration], Version 1 Revision 1 Update(patch) 2 archived
- Morpho JC ePassport V2.0.0 (EAC) archived
- CombICAO Applet v3 on ID-One Cosmo X (EAC with PACE for French ID Configuration) SAAAAR : 203742 (ANSSI-CC-2023/50) active
- Morpho JC ePassport V3.0.1 (EAC) archived
- Application eTravel EAC 1.4 avec AA, configuration EAC avec AMD 113v4, masquée sur composants IFX M7820 A11 archived
- eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/56) active
- Trusted Logic. Carte à puce JCLXxxjTOPyyIDv2 : applet de passeport électronique chargée sur la plate-forme JCLX80jTOP20IDv2 masquée sur le composant SLE66CLX800PE archived
- Athena IDProtect Duo v10 (in EAC Configuration) archived
- AKiS Pasaport v1.4n archived
- ePass ICAO essential – configuration BAC and EAC ECC, Version 1.0 archived
Updates ?
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name Machine Readable Travel Document with [ICAO Application] Extended Access Control, Version 1.10 was processed.
Raw data
{
"_id": "78bcc246f0f43034",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "78bcc246f0f43034",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "pp0056b.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 2
},
"ECDSA": {
"ECDSA": 1
}
},
"FF": {
"DH": {
"DH": 2,
"Diffie-Hellman": 5
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.MRTD_": 1
},
"OE": {
"OE.BAC-PP": 3,
"OE.BAC_PP": 1,
"OE.MRTD_": 2
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0056": 2,
"BSI-PP-0002-2001": 1,
"BSI-PP-0035-2007": 1,
"BSI-PP-0055": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 3,
"ADV_FSP.2": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_DVS.2": 4
},
"APE": {
"APE_SRE": 1
},
"AVA": {
"AVA_VAN.3": 2,
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL4": 8,
"EAL4 augmented": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_SAS": 6,
"FAU_SAS.1": 10,
"FAU_SAS.1.1": 2
},
"FCS": {
"FCS_CKM.1": 28,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 2,
"FCS_CKM.4": 21,
"FCS_CKM.4.1": 1,
"FCS_COP": 29,
"FCS_COP.1": 8,
"FCS_RND": 7,
"FCS_RND.1": 11,
"FCS_RND.1.1": 2
},
"FDP": {
"FDP_ACC.1": 16,
"FDP_ACC.1.1": 1,
"FDP_ACF": 1,
"FDP_ACF.1": 10,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 3,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 2,
"FDP_IFC.1": 4,
"FDP_ITC": 1,
"FDP_ITC.1": 10,
"FDP_ITC.2": 10,
"FDP_UCT.1": 8,
"FDP_UCT.1.1": 1,
"FDP_UIT.1": 7,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_API": 6,
"FIA_API.1": 9,
"FIA_API.1.1": 2,
"FIA_SOS.2": 1,
"FIA_UAU.1": 7,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.4": 10,
"FIA_UAU.4.1": 1,
"FIA_UAU.5": 11,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 10,
"FIA_UAU.6.1": 1,
"FIA_UID.1": 12,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_LIM": 7,
"FMT_LIM.1": 21,
"FMT_LIM.1.1": 3,
"FMT_LIM.2": 18,
"FMT_LIM.2.1": 4,
"FMT_MSA.1": 1,
"FMT_MSA.3": 3,
"FMT_MTD": 37,
"FMT_MTD.1": 13,
"FMT_MTD.3": 7,
"FMT_MTD.3.1": 1,
"FMT_SMF.1": 31,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 31,
"FMT_SMR.1.1": 2,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_TST.1.1": 1
},
"FPT": {
"FPT_FLS.1": 8,
"FPT_FLS.1.1": 1,
"FPT_PHP.3": 8,
"FPT_PHP.3.1": 1,
"FPT_RVM.1": 1,
"FPT_SEP.1": 1,
"FPT_TST.1": 8,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 2
},
"FTP": {
"FTP_ITC.1": 5,
"FTP_TRP.1": 5
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"MAC": {
"MAC": 4
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"JH": {
"JH": 1
},
"SHA": {
"SHA1": {
"SHA-1": 3
},
"SHA2": {
"SHA-224": 3,
"SHA-256": 2
}
}
},
"ic_data_group": {
"EF": {
"EF.COM": 9,
"EF.DG1": 19,
"EF.DG13": 1,
"EF.DG14": 8,
"EF.DG16": 19,
"EF.DG2": 9,
"EF.DG3": 20,
"EF.DG4": 19,
"EF.DG5": 7,
"EF.SOD": 9
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"Malfunction": 3,
"Physical Tampering": 5,
"Physical tampering": 1,
"fault injection": 1,
"malfunction": 6,
"physical tampering": 2
},
"SCA": {
"DPA": 2,
"SPA": 1,
"physical probing": 4,
"timing attacks": 1
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"CC": {
"CCMB-2006-09-001": 2,
"CCMB-2007-09-002": 2,
"CCMB-2007-09-003": 2,
"CCMB-2007-09-004": 2
},
"FIPS": {
"FIPS 180-2": 1
},
"ICAO": {
"ICAO": 14
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 15946-1": 1,
"ISO/IEC 15946-2": 1,
"ISO/IEC 7816-2": 1,
"ISO/IEC 7816-4": 1,
"ISO/IEC 9796-2": 1
},
"PKCS": {
"PKCS#3": 2
},
"RFC": {
"RFC 2631": 1,
"RFC3369": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 5
}
},
"DES": {
"3DES": {
"Triple-DES": 7
},
"DES": {
"DES": 3
}
},
"constructions": {
"MAC": {
"CMAC": 2,
"KMAC": 1
}
}
},
"technical_report_id": {
"BSI": {
"BSI 2006": 1,
"BSI TR-03110": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20090511083843+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "Common Criteria, Protection Proile, Travel Document",
"/ModDate": "D:20090512094943+02\u002700\u0027",
"/Producer": "StarOffice 9",
"/Subject": "Machine Readable Travel Document with \"ICAO Application\", Extended Access Control",
"/Title": "Common Criteria Protection Profile BSI-CC-PP-0056",
"pdf_file_size_bytes": 584921,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 75
},
"report_filename": "pp0056a.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0056-2009": 13
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 1,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 1,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 1,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 3,
"ALC_FLR": 1,
"ALC_FLR.1": 1,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 1,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 1,
"ALC_TAT.2": 1,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 2,
"APE_ECD.1": 2,
"APE_INT.1": 2,
"APE_OBJ.1": 1,
"APE_OBJ.2": 2,
"APE_REQ.1": 1,
"APE_REQ.2": 2,
"APE_SPD.1": 2
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_COV.3": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 1,
"ATE_DPT.4": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND": 1,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 4,
"EAL 4 augmented": 2,
"EAL1": 6,
"EAL2": 3,
"EAL3": 4,
"EAL4": 4,
"EAL5": 6,
"EAL6": 3,
"EAL7": 4
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"Profile Machine Readable Travel Document with \u201eICAO Application\" Extended Access Control, SRC (confidential document) [6] Protection Profile \u2014 Machine Readable Travel Document with \u201cICAO Application\u201d Extended Access": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"SRC": {
"SRC Security Research \u0026 Consulting": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ICAO": {
"ICAO": 11
}
},
"symmetric_crypto": {},
"technical_report_id": {
"BSI": {
"BSI 2": 1,
"BSI 7125": 2,
"BSI 7148": 1,
"BSI 7149": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20090512092749+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Certification, Zertifizierung, Protection Profile, Schutzprofil, CC, CC3.1, MRTD, EAC\"",
"/ModDate": "D:20090512094811+02\u002700\u0027",
"/Producer": "StarOffice 9",
"/Subject": "Common Criteria Schutzprofile, Protection Profile",
"/Title": "Certification Report BSI-CC-PP-0056-2009",
"pdf_file_size_bytes": 291537,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 26
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "3f5ccd23aae8ce48ed2ce0fb754f116675a42a597035f06bf028d0dcdfa3821a",
"txt_hash": "dc03710b4e6c44ca97e0927cf9ec516831767879b1150c4d8d4002eb656518ff"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "941ad77d72318daefa8c6f19b911430c571671efcda74ef9eee6ef5d5712a211",
"txt_hash": "8949c20d83c16e42ebc0090f43f7e34ba9acca712708cc5f139bf09047c5c4f9"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "Machine Readable Travel Document with [ICAO Application] Extended Access Control, Version 1.10",
"not_valid_after": "2013-01-29",
"not_valid_before": "2009-05-07",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056b.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056a.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+"
]
},
"status": "archived",
"version": "1.10"
}
}