{
"_id": "d90a82ee45f94fe0",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "d90a82ee45f94fe0",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "pp0090b_pdf.pdf",
"pp_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0068-V2-2011-MA-01": 1,
"BSI-CC-PP-0087-V2-2016-MA-01": 2,
"BSI-CC-PP-0087-V2-MA-01": 1,
"BSI-CC-PP-0090-2016": 22
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1
},
"ATE": {
"ATE_DPT.2": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL4": 3,
"EAL4 augmented": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS": 5,
"FAU_SAS.1": 3
},
"FCS": {
"FCS_CKM": 28,
"FCS_CKM.1": 8,
"FCS_CKM.2": 3,
"FCS_CKM.4": 9,
"FCS_COP": 24,
"FCS_COP.1": 7
},
"FDP": {
"FDP_ACC": 5,
"FDP_ACC.1": 3,
"FDP_ACF": 8,
"FDP_ACF.1": 5,
"FDP_IFC": 5,
"FDP_IFC.1": 2,
"FDP_IFF": 7,
"FDP_IFF.1": 6,
"FDP_ITC.1": 5,
"FDP_ITC.2": 5,
"FDP_RIP": 5,
"FDP_RIP.1": 6
},
"FIA": {
"FIA_AFL": 4,
"FIA_AFL.1": 2,
"FIA_UAU": 6,
"FIA_UAU.1": 3,
"FIA_UID": 6,
"FIA_UID.1": 4
},
"FMT": {
"FMT_FLS.1": 1,
"FMT_MSA.1": 2,
"FMT_MSA.3": 4,
"FMT_MTD": 10,
"FMT_MTD.1": 2,
"FMT_SMF": 7,
"FMT_SMF.1": 3,
"FMT_SMR": 7,
"FMT_SMR.1": 4,
"FMT_TST.1": 1
},
"FPT": {
"FPT_EMS": 9,
"FPT_EMS.1": 8,
"FPT_EMS.1.1": 1,
"FPT_EMS.1.2": 1,
"FPT_FLS": 4,
"FPT_TST": 4,
"FPT_TST.1": 3
},
"FTP": {
"FTP_ITC": 5,
"FTP_ITC.1": 3
}
},
"certification_process": {
"OutOfScope": {
"and supports this process by cryptographic means. In particular, the updated TOE software is out of scope of this PP module. No assumption is made on the quality and security of the update. To make the": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 3
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 2,
"CCMB-2012-09-002": 2,
"CCMB-2012-09-003": 2,
"CCMB-2012-09-004": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {
"BSI": {
"BSI TR-03110": 2
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20160914151817+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "Electronic Document; BSI TR 03110; Smartcards; Software Update; Official Document; MR. ED",
"/ModDate": "D:20160915102200+02\u002700\u0027",
"/Producer": "LibreOffice 4.2",
"/Title": "Machine Readable Electronic Documents - Optionales Nachladen (Optional Post-Emission Updates) [MR.ED-ON",
"pdf_file_size_bytes": 1053710,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 37
},
"report_filename": "pp0090a_pdf.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0087-V2-2016-MA-01": 2,
"BSI-CC-PP-0090-2016": 10
}
},
"cc_sar": {
"ACE": {
"ACE_CCO.1": 1,
"ACE_MCO.1": 1
},
"ALC": {
"ALC_DVS.2": 2,
"ALC_FLR": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"ATE": {
"ATE_DPT.2": 2
},
"AVA": {
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 4,
"EAL 4 augmented": 2
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"Version 1.3, 23.08.2016, Evaluation Technical Report BSI-CC-PP-0090-2016, T-Systems GEI GmbH (confidential document) [8] BSI: TR-03110-1 - Advanced Security Mechanisms for Machine Readable Travel Documents. Part 1 -": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 3
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 32": 1
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
}
},
"symmetric_crypto": {},
"technical_report_id": {
"BSI": {
"BSI 7148": 1,
"BSI TR-03110": 2,
"BSI TR-03110-1": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20160915135726+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Protection Profile, Schutzprof, MR.ED-ON-PP, Optionales Nachladen, Optional Post-Emission Updates, ID Card\"",
"/ModDate": "D:20160915152653+02\u002700\u0027",
"/Producer": "LibreOffice 4.2",
"/Subject": "Common Criteria Certification",
"/Title": "Certification Report BSI-CC-PP-0090-2016",
"pdf_file_size_bytes": 481052,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.sogisportal.eu/",
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 15
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "21c6827419a230ca4c436af21bdbad3d1200a8dff40da4f3db56ef974dde406b",
"txt_hash": "2c7338fc9a22b5157b23c568e617b0f5bec9ff751d56f52f8855426166bdb403"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "eec9e841a0da91e37428afa2a2269cb3cf4838f50777f737269a99af9f674d20",
"txt_hash": "844e8d5298239e5ef1cf88eeca478dc9ef48f36c5c1985929d6faa516ce5c97b"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "Common Criteria PP Configuration Machine Readable Electronic Documents - Optionales Nachladen (Optional Post-Emission Updates)",
"not_valid_after": null,
"not_valid_before": "2016-09-07",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0090b_pdf.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0090a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"ATE_DPT.2",
"EAL4+",
"AVA_VAN.5"
]
},
"status": "active",
"version": "0.9.2"
}
}