This page was not yet optimized for use on mobile
devices.
Machine Readable Travel Document with [ICAO Application] Extended Access Control, Version 1.10
Web information
| Status | archived |
|---|---|
| Valid from | 07.05.2009 |
| Valid until | 29.01.2013 |
| Scheme | đ©đȘ DE |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | EAL4+ |
Certification report
Extracted keywords
Security level
EAL 4, EAL1, EAL3, EAL5, EAL7, EAL2, EAL4, EAL6, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.2, APE_ECD.1, APE_REQ.2, APE_OBJ.1, APE_REQ.1, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0056-2009Evaluation facilities
SRC Security Research & ConsultingCertification process
Profile Machine Readable Travel Document with âICAO Application" Extended Access Control, SRC (confidential document) [6] Protection Profile â Machine Readable Travel Document with âICAO Applicationâ Extended AccessStandards
ICAOTechnical reports
BSI 7125, BSI 2, BSI 7148, BSI 7149File metadata
| Title | Certification Report BSI-CC-PP-0056-2009 |
|---|---|
| Subject | Common Criteria Schutzprofile, Protection Profile |
| Keywords | "Certification, Zertifizierung, Protection Profile, Schutzprofil, CC, CC3.1, MRTD, EAC" |
| Author | Bundesamt fĂŒr Sicherheit in der Informationstechnik |
| Creation date | D:20090512092749+02'00' |
| Modification date | D:20090512094811+02'00' |
| Pages | 26 |
| Creator | Writer |
| Producer | StarOffice 9 |
Protection Profile
Extracted keywords
Symmetric Algorithms
AES, DES, Triple-DES, KMAC, CMACAsymmetric Algorithms
ECDH, ECDSA, Diffie-Hellman, DHHash functions
SHA-1, SHA-224, SHA-256, JHSchemes
MAC, Key AgreementIC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG14, EF.DG13, EF.COM, EF.SODSecurity level
EAL4, EAL4 augmentedClaims
A.MRTD_, OE.MRTD_, OE.BAC_PP, OE.BAC-PPSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.3, ADV_IMP.1, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, AVA_VAN.3, AVA_VAN.5, APE_SRESecurity Functional Requirements (SFR)
FAU_SAS, FAU_GEN, FAU_SAS.1, FAU_SAS.1.1, FCS_RND, FCS_CKM.1, FCS_RND.1, FCS_RND.1.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1.1, FCS_COP, FCS_CKM.4.1, FDP_ACF, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_UCT.1, FDP_IFC.1, FDP_UCT.1.1, FDP_UIT.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ITC, FIA_API, FIA_SOS.2, FIA_API.1, FIA_API.1.1, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MTD, FMT_MSA.3, FMT_MTD.3, FMT_SMF.1, FMT_SMR.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FMT_MTD.3.1, FMT_MSA.1, FPR_TST.1.1, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_FLS.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3.1, FPT_RVM.1, FPT_SEP.1, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-CC-PP-0056, BSI-PP-0002-2001, BSI-PP-0035-2007, BSI-PP-0055Side-channel analysis
physical probing, DPA, SPA, timing attacks, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineeringStandards
FIPS 180-2, PKCS#3, RFC 2631, RFC3369, ISO/IEC 7816-2, ISO/IEC 14443, ISO/IEC 7816-4, ISO/IEC 9796-2, ISO/IEC 15946-1, ISO/IEC 15946-2, ICAO, CCMB-2006-09-001, CCMB-2007-09-002, CCMB-2007-09-003, CCMB-2007-09-004Technical reports
BSI TR-03110, BSI 2006File metadata
| Title | Common Criteria Protection Profile BSI-CC-PP-0056 |
|---|---|
| Subject | Machine Readable Travel Document with "ICAO Application", Extended Access Control |
| Keywords | Common Criteria, Protection Proile, Travel Document |
| Author | Bundesamt fĂŒr Sicherheit in der Informationstechnik |
| Creation date | D:20090511083843+02'00' |
| Modification date | D:20090512094943+02'00' |
| Pages | 75 |
| Creator | Writer |
| Producer | StarOffice 9 |
References
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.- AKiS Pasaport v1.4n archived
- Application eTravel EAC 1.4 avec AA, configuration EAC avec AMD 113v3, masquée sur composants IFX M7820 A11 archived
- Application eTravel EAC 1.4 avec AA, configuration EAC avec AMD 113v4, masquée sur composants IFX M7820 A11 archived
- Application eTravel EAC v1.3 chargée sur la carte à puce MultiApp V2 SAC (PACE) masquée sur le composant SLE66CLX1440PE m2091/a13 archived
- Application eTravel EAC v2.0, en configuration "EACon BAC" sur la plateforme fermée MultiApp V3masquée sur le composant M7820 A11(Version du patch : 1.5) archived
- Athena IDPass ICAO EAC avec AA sur composant SB23YR48/80B avec librairie cryptographique NesLib v3.0 archived
- Athena IDProtect Duo v10 (in EAC Configuration) archived
- Athena IDProtect Duo v5 avec application IASECC en configuration ICAO EAC sur composant AT90SC28880RCFV archived
- Athena IDProtect/OS755 avec application ICAO EAC sur composants SB23YR48/80B archived
- CC IDeal Citiz SmartCard (on SB23YR48B) archived
- Carte CC IDeal Citiz (sur composants SB23YR80B et SB23YR48B) archived
- Carte à puce SLJ 52 Gxx yyy AL : application pour passeport électronique sur plateforme jTOP INFv#46 masquée sur composants Infineon SLE78CLX1600PM, SLE78CLX800P et SLE78CLX360PM archived
- ChipDoc v4.1 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration Version 4.1.1.52 ( ANSSI-CC-2023/68) active
- CombICAO Applet v3 on ID-One Cosmo X (BAC and CA Configuration) SAAAAR : 203742 active
- CombICAO Applet v3 on ID-One Cosmo X (EAC Configuration) SAAAAR : 203742 archived
- CombICAO Applet v3 on ID-One Cosmo X (EAC Configuration) SAAAAR : 203742 (ANSSI-CC-2023/48) active
- CombICAO Applet v3 on ID-One Cosmo X (EAC with PACE Configuration) SAAAAR : 203742 (ANSSI-CC-2023/49) active
- CombICAO Applet v3 on ID-One Cosmo X (EAC with PACE for French ID Configuration) SAAAAR : 203742 (ANSSI-CC-2023/50) active
- ID One ePass v2.2 en configuration EAC et AA sur composant ST23YR18A archived
- ID OneTM ePass v2.2 en configuration EAC et AA sur composants STMicroelectronics ST23YR80/48B archived
- ID-One ePass IDL Full EACv2 in EAC MRTD configuration on Infineon SLE77CLFX2400P and SLE77CLFX2407P active
- ID-OneTM ePass v2.2 en configuration EAC sur composant NXP P5CD081V1A archived
- IDmove v5 on SCR404U in EAC with PACE configuration and LDSv2, AA in optionOS Commercial Version : 0x098912 ; OS Unique Identifier : 0xB7BC0108 et E48C0108 ( ANSSI-CC-2023/65) active
- Idemia CombICAO Applet in EAC configuration on ID-ONE Cosmo V9 Essential archived
- KONA102 ePassport EAC, versiĂłn 1.0.1 archived
- KONA102J1 ePassport EAC, versiĂłn 1.1 archived
- KONA2 D2320N ePassport [EAC configuration] version 01 revision 03 patch 00 archived
- Kona102 ePassport [EAC configuration], Version 1 Revision 1 Update(patch) 2 archived
- LDS EAC Java Applet in EAC configuration with AA v2.2 archived
- MTCOS Pro 2.1 EAC / ST23YR80 archived
- MTCOS Pro 2.2 EAC / (SLE78CLX) M7820 archived
- MTCOS Pro 2.2 EAC / P5CD081 archived
- Morpho JC ePassport V2.0.0 (EAC) archived
- Morpho JC ePassport V2.0.1 (EAC) archived
- Morpho JC ePassport V3.0.0 (EAC) archived
- Morpho JC ePassport V3.0.1 (EAC) archived
- SOMA801NXP, version 1.0 archived
- SOMA801STM - application EAC, version 1.0 archived
- STARCOS 3.5 ID EAC+AA C1 archived
- Sagem Securite CC IDeal Pass Passport (on SB23YR48B), version 1.5.0 ICAO EAC application archived
- Sagem Securite CC IDeal Pass Passport (on SB23YR80B), version 1.5.0 ICAO EAC application archived
- Sagem Sécurité Carte CC IDeal Citiz (sur composant SB23YR80B), version 1.4.5 Application ICAO EAC archived
- TnD v5.1 on Cosmo J in EAC Configuration active
- TnD v5.1 on ID-One Cosmo X (EAC Configuration) active
- Trusted Logic. Carte à puce JCLXxxjTOPyyIDv2 : applet de passeport électronique chargée sur la plate-forme JCLX80jTOP20IDv2 masquée sur le composant SLE66CLX800PE archived
- cv act ePasslet Suite v2.1 â Java Card applet configuration providing Machine Readable Travel Document with âICAO Applicationâ, Extended Access Control (EAC) archived
- cv act ePasslet/EACv1 v1.8 archived
- ePass ICAO essential â configuration BAC and EAC ECC, Version 1.0 archived
- ePass ICAO essential â configuration BAC and EAC RSA, Version 1.0 archived
- ePass V3 TD sur composants P5CD081V1A, en configuration EAC sur SAC via PACE v2 et AA archived
- eTravel 2.5 EAC on BAC on MultiApp V5.0 active
- eTravel 2.5.A EAC on BAC on MultiApp V5.0.A (version 2.5.A.0.0) active
- eTravel 2.5.A EAC on BAC on MultiApp V5.0.A (version 2.5.A.0.0) active
- eTravel EAC on MultiApp v2 archived
- eTravel EAC version 1.1 avec AA (version 01 03), configuration EAC, sur composant P5CD080 archived
- eTravel Essential 1.1 (EACv1 and AA activated) active
- eTravel Essential 1.2 â BAC, EAC and AA activated (release â0300â) active
- eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/56) active
Updates Feed
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile was first processed.
Raw data
{
"_id": "78bcc246f0f43034",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "78bcc246f0f43034",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "pp0056b.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 2
},
"ECDSA": {
"ECDSA": 1
}
},
"FF": {
"DH": {
"DH": 2,
"Diffie-Hellman": 5
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.MRTD_": 1
},
"OE": {
"OE.BAC-PP": 3,
"OE.BAC_PP": 1,
"OE.MRTD_": 2
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0056": 2,
"BSI-PP-0002-2001": 1,
"BSI-PP-0035-2007": 1,
"BSI-PP-0055": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 3,
"ADV_FSP.2": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_DVS.2": 4
},
"APE": {
"APE_SRE": 1
},
"AVA": {
"AVA_VAN.3": 2,
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL4": 8,
"EAL4 augmented": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_SAS": 6,
"FAU_SAS.1": 10,
"FAU_SAS.1.1": 2
},
"FCS": {
"FCS_CKM.1": 28,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 2,
"FCS_CKM.4": 21,
"FCS_CKM.4.1": 1,
"FCS_COP": 29,
"FCS_COP.1": 8,
"FCS_RND": 7,
"FCS_RND.1": 11,
"FCS_RND.1.1": 2
},
"FDP": {
"FDP_ACC.1": 16,
"FDP_ACC.1.1": 1,
"FDP_ACF": 1,
"FDP_ACF.1": 10,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 3,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 2,
"FDP_IFC.1": 4,
"FDP_ITC": 1,
"FDP_ITC.1": 10,
"FDP_ITC.2": 10,
"FDP_UCT.1": 8,
"FDP_UCT.1.1": 1,
"FDP_UIT.1": 7,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_API": 6,
"FIA_API.1": 9,
"FIA_API.1.1": 2,
"FIA_SOS.2": 1,
"FIA_UAU.1": 7,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.4": 10,
"FIA_UAU.4.1": 1,
"FIA_UAU.5": 11,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 10,
"FIA_UAU.6.1": 1,
"FIA_UID.1": 12,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_LIM": 7,
"FMT_LIM.1": 21,
"FMT_LIM.1.1": 3,
"FMT_LIM.2": 18,
"FMT_LIM.2.1": 4,
"FMT_MSA.1": 1,
"FMT_MSA.3": 3,
"FMT_MTD": 37,
"FMT_MTD.1": 13,
"FMT_MTD.3": 7,
"FMT_MTD.3.1": 1,
"FMT_SMF.1": 31,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 31,
"FMT_SMR.1.1": 2,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_TST.1.1": 1
},
"FPT": {
"FPT_FLS.1": 8,
"FPT_FLS.1.1": 1,
"FPT_PHP.3": 8,
"FPT_PHP.3.1": 1,
"FPT_RVM.1": 1,
"FPT_SEP.1": 1,
"FPT_TST.1": 8,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 2
},
"FTP": {
"FTP_ITC.1": 5,
"FTP_TRP.1": 5
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"MAC": {
"MAC": 4
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"JH": {
"JH": 1
},
"SHA": {
"SHA1": {
"SHA-1": 3
},
"SHA2": {
"SHA-224": 3,
"SHA-256": 2
}
}
},
"ic_data_group": {
"EF": {
"EF.COM": 9,
"EF.DG1": 19,
"EF.DG13": 1,
"EF.DG14": 8,
"EF.DG16": 19,
"EF.DG2": 9,
"EF.DG3": 20,
"EF.DG4": 19,
"EF.DG5": 7,
"EF.SOD": 9
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"Malfunction": 3,
"Physical Tampering": 5,
"Physical tampering": 1,
"fault injection": 1,
"malfunction": 6,
"physical tampering": 2
},
"SCA": {
"DPA": 2,
"SPA": 1,
"physical probing": 4,
"timing attacks": 1
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"CC": {
"CCMB-2006-09-001": 2,
"CCMB-2007-09-002": 2,
"CCMB-2007-09-003": 2,
"CCMB-2007-09-004": 2
},
"FIPS": {
"FIPS 180-2": 1
},
"ICAO": {
"ICAO": 14
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 15946-1": 1,
"ISO/IEC 15946-2": 1,
"ISO/IEC 7816-2": 1,
"ISO/IEC 7816-4": 1,
"ISO/IEC 9796-2": 1
},
"PKCS": {
"PKCS#3": 2
},
"RFC": {
"RFC 2631": 1,
"RFC3369": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 5
}
},
"DES": {
"3DES": {
"Triple-DES": 7
},
"DES": {
"DES": 3
}
},
"constructions": {
"MAC": {
"CMAC": 2,
"KMAC": 1
}
}
},
"technical_report_id": {
"BSI": {
"BSI 2006": 1,
"BSI TR-03110": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20090511083843+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "Common Criteria, Protection Proile, Travel Document",
"/ModDate": "D:20090512094943+02\u002700\u0027",
"/Producer": "StarOffice 9",
"/Subject": "Machine Readable Travel Document with \"ICAO Application\", Extended Access Control",
"/Title": "Common Criteria Protection Profile BSI-CC-PP-0056",
"pdf_file_size_bytes": 584921,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 75
},
"report_filename": "pp0056a.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0056-2009": 13
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 1,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 1,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 1,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 3,
"ALC_FLR": 1,
"ALC_FLR.1": 1,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 1,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 1,
"ALC_TAT.2": 1,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 2,
"APE_ECD.1": 2,
"APE_INT.1": 2,
"APE_OBJ.1": 1,
"APE_OBJ.2": 2,
"APE_REQ.1": 1,
"APE_REQ.2": 2,
"APE_SPD.1": 2
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_COV.3": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 1,
"ATE_DPT.4": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND": 1,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 4,
"EAL 4 augmented": 2,
"EAL1": 6,
"EAL2": 3,
"EAL3": 4,
"EAL4": 4,
"EAL5": 6,
"EAL6": 3,
"EAL7": 4
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"Profile Machine Readable Travel Document with \u201eICAO Application\" Extended Access Control, SRC (confidential document) [6] Protection Profile \u2014 Machine Readable Travel Document with \u201cICAO Application\u201d Extended Access": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"SRC": {
"SRC Security Research \u0026 Consulting": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ICAO": {
"ICAO": 11
}
},
"symmetric_crypto": {},
"technical_report_id": {
"BSI": {
"BSI 2": 1,
"BSI 7125": 2,
"BSI 7148": 1,
"BSI 7149": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20090512092749+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Certification, Zertifizierung, Protection Profile, Schutzprofil, CC, CC3.1, MRTD, EAC\"",
"/ModDate": "D:20090512094811+02\u002700\u0027",
"/Producer": "StarOffice 9",
"/Subject": "Common Criteria Schutzprofile, Protection Profile",
"/Title": "Certification Report BSI-CC-PP-0056-2009",
"pdf_file_size_bytes": 291537,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 26
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "3f5ccd23aae8ce48ed2ce0fb754f116675a42a597035f06bf028d0dcdfa3821a",
"txt_hash": "dc03710b4e6c44ca97e0927cf9ec516831767879b1150c4d8d4002eb656518ff"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "941ad77d72318daefa8c6f19b911430c571671efcda74ef9eee6ef5d5712a211",
"txt_hash": "8949c20d83c16e42ebc0090f43f7e34ba9acca712708cc5f139bf09047c5c4f9"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "Machine Readable Travel Document with [ICAO Application] Extended Access Control, Version 1.10",
"not_valid_after": "2013-01-29",
"not_valid_before": "2009-05-07",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056b.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056a.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+"
]
},
"status": "archived",
"version": "1.10"
}
}