This page was not yet optimized for use on mobile devices.
eUICC for Consumer and IoT Devices Protection Profile
Web information
Status: activeCertification date: 2025-05-06
Scheme: 🇩🇪
Category: ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level: EAL4+, AVA_VAN.5, ALC_DVS.2
Certification report
Extracted keywords
Security level
EAL 4, EAL 2, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ACE_INT.1, ACE_CCL.1, ACE_SPD.1, ACE_OBJ.2, ACE_ECD.1, ACE_REQ.2, ACE_MCO.1, ACE_CCO.1, ALC_DVS.2, ALC_FLR, ALC_FLR.2, AVA_VAN.5, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.2, APE_ECD.1, APE_REQ.2Protection profiles
BSI-CC-PP-0100-V2-2025, BSI-CC-PP-0100-2018Evaluation facilities
Deutsche Telekom SecurityCertification process
and IoT Devices Protection Profile, Version 1.0, Date: 08.04.2025, Deutsche Telekom Security GmbH (confidential document) 14 / 15 BSI-CC-PP-0100-V2-2025 Certification Report C Annexes List of annexes of thisStandards
ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065File metadata
Title | Certification Report BSI-CC-PP-0100-V2-2025 |
---|---|
Subject | Common Criteria, Certification, Zertifizierung, Protection Profile, Schutzprofil, GSMA |
Keywords | "Common Criteria, Certification, Zertifizierung, Protection Profile, Schutzprofil, GSMA" |
Author | Federal Office for Information Security |
Pages | 15 |
Profile
Extracted keywords
Symmetric Algorithms
AES, CMACAsymmetric Algorithms
ECDSA, ECC, DH, DSAHash functions
KeccakSchemes
MAC, Key Agreement, Key agreementProtocols
TLS, DTLSRandomness
RNGBlock cipher modes
CBCTrusted Execution Environments
SESecurity level
EAL4, EAL4+, EAL4 augmentedClaims
D.PK, D.PROFILE_CODE, D.PROFILE_NAA_PARAMS, D.PROFILE_RULES, D.PROFILE_IDENTITY, D.MNO_KEYS, D.PROFILE_USER_CODES, D.T, D.PLATFORM_DATA, D.TSF_CODE, D.DEVICE_INFO, D.PLATFORM_RAT, D.SK, D.CERT, D.EID, D.SECRETS, D.UPDATE_IMAGE, D.TOE_IDENTIFIER, D.OS-, D.TOE_IDENTIFICATION, O.PRE-PPI, O.SECURE-CHANNELS, O.PPE-PPI, O.INTERNAL-SECURE-CHANNELS, O.PROOF_OF_IDENTITY, O.OPERATE, O.API, O.DATA-CONFIDENTIALITY, O.DATA-INTEGRITY, O.ALGORITHMS, O.DATA-, O.INTERNAL-SECURE-, O.SECURE-, O.INTERNAL-, O.DATA-INTEGRITY-, O.SECURE_LOAD_ACODE, O.SECURE_AC_ACTIVATION, O.TOE_IDENTIFICATION, O.CONFID-UPDATE-IMAGE, O.AUTH-LOAD-UPDATE-IMAGE, O.CONFID-, O.AUTH-LOAD-UPDATE-, T.UNAUTHORIZED-PROFILE-MNG, T.UNAUTHORIZED-PLATFORM-MNG, T.UNAUTHORIZED-PROFILE-, T.PROFILE-MNG-INTERCEPTION, T.PROFILE-MNG-ELIGIBILITY, T.UNAUTHORIZED-IDENTITY-MNG, T.IDENTITY-INTERCEPTION, T.LOGICAL-ATTACK, T.PHYSICAL-ATTACK, T.UNAUTHORIZED-, T.UNAUTHORIZED-MOBILE-ACCESS, T.DELETION, T.INSTALL, T.CONFID-APPLI-DATA, T.INTEG-APPLI-DATA, T.CONFID-JCS-CODE, T.INTEG-JCS-, T.CONFID-JCS-DATA, T.INTEG-JCS-DATA, T.CONFID-, T.INTEG-APPLI-, T.INTEG-APPLI-CODE, T.SID, T.EXE-CODE, T.EXE-, T.NATIVE, T.UNAUTHORIZE, T.PROFILE-, T.IDENTITY-, T.UNAUTHORIZED, T.PLATFORM-MNG-, T.PROFILE-MNG-, T.LOGICAL-, T.PHYSICAL-, T.CONFID-UPDATE-, T.INTEG-UPDATE-, T.UNAUTH-UPDATE-, T.INTERRUPT_OSU, T.CONFID-UPDATE-IMAGE, T.INTEG-UPDATE-IMAGE, T.UNAUTH-UPDATE-IMAGE, A.ACTORS, A.APPLICATIONS, A.TRUSTED-PATHS-, A.ACTORS-, OE.RE, OE.CI, OE.PERSONALIZER, OE.SM-DS, OE.MNO, OE.EIM, OE.IC, OE.SCP-SUPPORT, OE.APPLICATIONS, OE.VERIFICATION, OE.MNO-SD, OE.SM-, OE.CONFID_UPDATE_IMAGE, OE.CONFID-UPDATEIMAGE, SA.CONFID-UPDATE-IMAGE, SA.INTEG-UPDATE-IMAGE, SA.INTEG-UPDATEIMAGE, OSP.LIFE-CYCLESecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_ARC, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_FSP.1, ADV_TDS.1, ADV_FSP.2, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_FLR.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ALC_CMS.1, ALC_DVS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COV.1, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_REQ.1Security Functional Requirements (SFR)
FCS_COP, FCS_COP.1, FCS_CKM, FCS_CKM.1, FCS_CKM.2, FCS_CKM.6, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.5, FCS_RBG.1, FDP_ACF, FDP_ACC, FDP_IFC, FDP_IFF, FDP_UCT, FDP_UIT, FDP_IFC.1, FDP_IFF.1, FDP_ITC.2, FDP_ITC, FDP_UCT.1, FDP_UIT.1, FDP_ACC.1, FDP_ACF.1, FDP_SDI, FDP_RIP, FDP_SDI.1, FDP_RIP.1, FDP_ITC.1, FIA_UID, FIA_UID.1, FIA_UAU.1, FIA_UAU, FIA_USB.1, FIA_USB, FIA_UAU.4, FIA_ATD.1, FIA_API.1.1, FIA_ATD, FIA_API.1, FMT_MSA, FMT_MSA.3, FMT_SMR.1, FMT_SMF, FMT_MSA.1, FMT_SMF.1, FMT_SMR, FMT_MSA.3.1, FMT_MSA.3.2, FPT_TST.1, FPT_TDC, FPT_TDC.1, FPT_FLS, FPT_FLS.1, FPT_EMS, FPT_EMS.1, FTP_ITC, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-CC-PP-0099-2017, BSI-CC-PP-0084-2014, BSI-CC-PP-0117-2022, BSI-CC-PP-0117-v2-2023, ANSSI-CC-PP-2010/05Certificates
ANSSI-CC-PP-2010/05Side-channel analysis
side-channel, side channels, side channel, SPA, DPA, timing attacks, physical tampering, fault injection, JILCertification process
out of scope, authentication of this visited PMN to the Profile, except in 4G authentication. The RE code is out of scope of this Protection Profile. 1.2.2 TOE usage The eUICC will contain several MNO Profiles, each of, SGP.02 Enhanced interface compared to SGP.02 New interface compared to SGP02 Production interfaces (out of scope) End User interfaces (out of scope) Interface tunneled within other interfaces Figure 19 Remote SIMStandards
NIST SP 800-38B, SCP80, SCP81, SCP11File metadata
Title | eUICC for Consumer and IoT Devices Protection Profile |
---|---|
Subject | GSMA Protection Profile for eUICC Consumer and IoT |
Keywords | SGP.25 V2.1, PP-0100 V2.0 |
Author | GSMA |
Pages | 172 |
References
Updates
-
03.06.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name eUICC for Consumer and IoT Devices Protection Profile was processed.
Raw data
{
"_id": "fdb8a517d5d22602",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "fdb8a517d5d22602",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "pp0100V2b_pdf.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDSA": {
"ECDSA": 145
}
},
"FF": {
"DH": {
"DH": 1
},
"DSA": {
"DSA": 2
}
}
},
"cc_cert_id": {
"FR": {
"ANSSI-CC-PP-2010/05": 1
}
},
"cc_claims": {
"A": {
"A.ACTORS": 8,
"A.ACTORS-": 1,
"A.APPLICATIONS": 4,
"A.TRUSTED-PATHS-": 1
},
"D": {
"D.CERT": 13,
"D.DEVICE_INFO": 5,
"D.EID": 9,
"D.MNO_KEYS": 23,
"D.OS-": 1,
"D.PK": 28,
"D.PLATFORM_DATA": 12,
"D.PLATFORM_RAT": 9,
"D.PROFILE_CODE": 3,
"D.PROFILE_IDENTITY": 4,
"D.PROFILE_NAA_PARAMS": 16,
"D.PROFILE_RULES": 14,
"D.PROFILE_USER_CODES": 4,
"D.SECRETS": 28,
"D.SK": 12,
"D.T": 1,
"D.TOE_IDENTIFICATION": 1,
"D.TOE_IDENTIFIER": 2,
"D.TSF_CODE": 14,
"D.UPDATE_IMAGE": 9
},
"O": {
"O.ALGORITHMS": 5,
"O.API": 9,
"O.AUTH-LOAD-UPDATE-": 1,
"O.AUTH-LOAD-UPDATE-IMAGE": 1,
"O.CONFID-": 1,
"O.CONFID-UPDATE-IMAGE": 1,
"O.DATA-": 11,
"O.DATA-CONFIDENTIALITY": 6,
"O.DATA-INTEGRITY": 7,
"O.DATA-INTEGRITY-": 2,
"O.INTERNAL-": 6,
"O.INTERNAL-SECURE-": 6,
"O.INTERNAL-SECURE-CHANNELS": 7,
"O.OPERATE": 11,
"O.PPE-PPI": 1,
"O.PRE-PPI": 13,
"O.PROOF_OF_IDENTITY": 6,
"O.SECURE-": 6,
"O.SECURE-CHANNELS": 8,
"O.SECURE_AC_ACTIVATION": 2,
"O.SECURE_LOAD_ACODE": 4,
"O.TOE_IDENTIFICATION": 2
},
"OE": {
"OE.APPLICATIONS": 17,
"OE.CI": 5,
"OE.CONFID-UPDATEIMAGE": 1,
"OE.CONFID_UPDATE_IMAGE": 1,
"OE.EIM": 10,
"OE.IC": 26,
"OE.MNO": 7,
"OE.MNO-SD": 5,
"OE.PERSONALIZER": 1,
"OE.RE": 88,
"OE.SCP-SUPPORT": 1,
"OE.SM-": 1,
"OE.SM-DS": 12,
"OE.VERIFICATION": 1
},
"OSP": {
"OSP.LIFE-CYCLE": 3
},
"SA": {
"SA.CONFID-UPDATE-IMAGE": 2,
"SA.INTEG-UPDATE-IMAGE": 2,
"SA.INTEG-UPDATEIMAGE": 1
},
"T": {
"T.CONFID-": 1,
"T.CONFID-APPLI-DATA": 1,
"T.CONFID-JCS-CODE": 1,
"T.CONFID-JCS-DATA": 1,
"T.CONFID-UPDATE-": 1,
"T.CONFID-UPDATE-IMAGE": 1,
"T.DELETION": 1,
"T.EXE-": 1,
"T.EXE-CODE": 2,
"T.IDENTITY-": 1,
"T.IDENTITY-INTERCEPTION": 2,
"T.INSTALL": 1,
"T.INTEG-APPLI-": 1,
"T.INTEG-APPLI-CODE": 2,
"T.INTEG-APPLI-DATA": 2,
"T.INTEG-JCS-": 1,
"T.INTEG-JCS-DATA": 1,
"T.INTEG-UPDATE-": 1,
"T.INTEG-UPDATE-IMAGE": 1,
"T.INTERRUPT_OSU": 2,
"T.LOGICAL-": 2,
"T.LOGICAL-ATTACK": 4,
"T.NATIVE": 1,
"T.PHYSICAL-": 2,
"T.PHYSICAL-ATTACK": 4,
"T.PLATFORM-MNG-": 3,
"T.PROFILE-": 2,
"T.PROFILE-MNG-": 2,
"T.PROFILE-MNG-ELIGIBILITY": 3,
"T.PROFILE-MNG-INTERCEPTION": 3,
"T.SID": 2,
"T.UNAUTH-UPDATE-": 1,
"T.UNAUTH-UPDATE-IMAGE": 1,
"T.UNAUTHORIZE": 4,
"T.UNAUTHORIZED": 1,
"T.UNAUTHORIZED-": 3,
"T.UNAUTHORIZED-IDENTITY-MNG": 2,
"T.UNAUTHORIZED-MOBILE-ACCESS": 2,
"T.UNAUTHORIZED-PLATFORM-MNG": 2,
"T.UNAUTHORIZED-PROFILE-": 1,
"T.UNAUTHORIZED-PROFILE-MNG": 3
}
},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2010/05": 1
},
"BSI": {
"BSI-CC-PP-0084-2014": 1,
"BSI-CC-PP-0099-2017": 1,
"BSI-CC-PP-0117-2022": 1,
"BSI-CC-PP-0117-v2-2023": 3
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 5,
"ADV_ARC.1": 24,
"ADV_FSP.1": 4,
"ADV_FSP.2": 2,
"ADV_FSP.4": 10,
"ADV_IMP.1": 6,
"ADV_TDS.1": 2,
"ADV_TDS.2": 1,
"ADV_TDS.3": 10
},
"AGD": {
"AGD_OPE.1": 7,
"AGD_PRE.1": 7
},
"ALC": {
"ALC_CMC.4": 2,
"ALC_CMS.1": 1,
"ALC_CMS.4": 2,
"ALC_DEL.1": 2,
"ALC_DVS.1": 2,
"ALC_DVS.2": 19,
"ALC_FLR.2": 12,
"ALC_LCD.1": 4,
"ALC_TAT.1": 4
},
"ASE": {
"ASE_CCL.1": 2,
"ASE_ECD.1": 5,
"ASE_INT.1": 6,
"ASE_OBJ.2": 4,
"ASE_REQ.1": 2,
"ASE_REQ.2": 3,
"ASE_SPD.1": 3,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 4,
"ATE_DPT.1": 3,
"ATE_FUN.1": 7,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 19
}
},
"cc_security_level": {
"EAL": {
"EAL4": 19,
"EAL4 augmented": 13,
"EAL4+": 1
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM": 80,
"FCS_CKM.1": 11,
"FCS_CKM.2": 7,
"FCS_CKM.5": 11,
"FCS_CKM.6": 20,
"FCS_COP": 10,
"FCS_COP.1": 39,
"FCS_RBG.1": 3,
"FCS_RNG.1": 13,
"FCS_RNG.1.1": 1,
"FCS_RNG.1.2": 1
},
"FDP": {
"FDP_ACC": 28,
"FDP_ACC.1": 17,
"FDP_ACF": 20,
"FDP_ACF.1": 12,
"FDP_IFC": 38,
"FDP_IFC.1": 22,
"FDP_IFF": 27,
"FDP_IFF.1": 27,
"FDP_ITC": 20,
"FDP_ITC.1": 8,
"FDP_ITC.2": 23,
"FDP_RIP": 21,
"FDP_RIP.1": 3,
"FDP_SDI": 21,
"FDP_SDI.1": 3,
"FDP_UCT": 21,
"FDP_UCT.1": 3,
"FDP_UIT": 21,
"FDP_UIT.1": 6
},
"FIA": {
"FIA_API.1": 5,
"FIA_API.1.1": 1,
"FIA_ATD": 19,
"FIA_ATD.1": 7,
"FIA_UAU": 22,
"FIA_UAU.1": 6,
"FIA_UAU.4": 3,
"FIA_UID": 26,
"FIA_UID.1": 14,
"FIA_USB": 15,
"FIA_USB.1": 12
},
"FMT": {
"FMT_MSA": 28,
"FMT_MSA.1": 5,
"FMT_MSA.3": 26,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_SMF": 21,
"FMT_SMF.1": 7,
"FMT_SMR": 21,
"FMT_SMR.1": 12
},
"FPT": {
"FPT_EMS": 21,
"FPT_EMS.1": 3,
"FPT_FLS": 14,
"FPT_FLS.1": 4,
"FPT_TDC": 24,
"FPT_TDC.1": 9,
"FPT_TST.1": 1
},
"FTP": {
"FTP_ITC": 29,
"FTP_ITC.1": 18,
"FTP_TRP.1": 9
}
},
"certification_process": {
"OutOfScope": {
"SGP.02 Enhanced interface compared to SGP.02 New interface compared to SGP02 Production interfaces (out of scope) End User interfaces (out of scope) Interface tunneled within other interfaces Figure 19 Remote SIM": 1,
"authentication of this visited PMN to the Profile, except in 4G authentication. The RE code is out of scope of this Protection Profile. 1.2.2 TOE usage The eUICC will contain several MNO Profiles, each of": 1,
"out of scope": 3
}
},
"cipher_mode": {
"CBC": {
"CBC": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"DTLS": {
"DTLS": 1
},
"TLS": {
"TLS": 39
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 3,
"Key agreement": 1
},
"MAC": {
"MAC": 7
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"Keccak": {
"Keccak": 1
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 3
}
},
"side_channel_analysis": {
"FI": {
"fault injection": 1,
"physical tampering": 6
},
"SCA": {
"DPA": 3,
"SPA": 3,
"side channel": 10,
"side channels": 11,
"side-channel": 1,
"timing attacks": 3
},
"other": {
"JIL": 1
}
},
"standard_id": {
"NIST": {
"NIST SP 800-38B": 1
},
"SCP": {
"SCP11": 2,
"SCP80": 8,
"SCP81": 7
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 6
}
},
"constructions": {
"MAC": {
"CMAC": 3
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 1
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "GSMA",
"/Keywords": "SGP.25 V2.1, PP-0100 V2.0",
"/Subject": "GSMA Protection Profile for eUICC Consumer and IoT",
"/Title": "eUICC for Consumer and IoT Devices Protection Profile",
"pdf_file_size_bytes": 3357379,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 172
},
"report_filename": "pp0100V2a_pdf.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0100-2018": 2,
"BSI-CC-PP-0100-V2-2025": 7
}
},
"cc_sar": {
"ACE": {
"ACE_CCL.1": 1,
"ACE_CCO.1": 1,
"ACE_ECD.1": 1,
"ACE_INT.1": 1,
"ACE_MCO.1": 1,
"ACE_OBJ.2": 1,
"ACE_REQ.2": 1,
"ACE_SPD.1": 1
},
"ALC": {
"ALC_DVS.2": 2,
"ALC_FLR": 1,
"ALC_FLR.2": 2
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"AVA": {
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 3,
"EAL 4 augmented": 2
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"and IoT Devices Protection Profile, Version 1.0, Date: 08.04.2025, Deutsche Telekom Security GmbH (confidential document) 14 / 15 BSI-CC-PP-0100-V2-2025 Certification Report C Annexes List of annexes of this": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"DeutscheTelekom": {
"Deutsche Telekom Security": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Federal Office for Information Security",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Protection Profile, Schutzprofil, GSMA\"",
"/Subject": "Common Criteria, Certification, Zertifizierung, Protection Profile, Schutzprofil, GSMA",
"/Title": "Certification Report BSI-CC-PP-0100-V2-2025",
"pdf_file_size_bytes": 330352,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.gesetze-im-internet.de/bsig_2009/index.html",
"http://www.gesetze-im-internet.de/bsizertv_2014/index.html",
"https://www.commoncriteriaportal.org/",
"https://www.iso.org/standard/72892.html",
"https://www.bsi.bund.de/",
"https://www.iso.org/standard/72891.html",
"https://www.sogis.eu/",
"https://www.bsi.bund.de/zertifizierung",
"https://www.iso.org/standard/72917.html",
"https://www.bsi.bund.de/Gebuehrenverordnung",
"https://www.iso.org/standard/72906.html",
"https://www.iso.org/standard/72889.html",
"https://www.iso.org/standard/72913.html"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 15
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "254e4a08177af8c496cb85951e43533b8ed7cc3c313cf353c35ae124951ce2d9",
"txt_hash": "7dd05d17197813d6aeb19de097a02d302bca18152357ce42aa492d17449b3cee"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "a1058193a0247d7ae7f6e01bb4f2db23e0c614487d2981c5fef4da6741bf426a",
"txt_hash": "65ba2e53a86a971f9b7164a12d1d02c21a47a62bc1b5fce00079db2941d9bea5"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "eUICC for Consumer and IoT Devices Protection Profile",
"not_valid_after": null,
"not_valid_before": "2025-05-06",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0100V2b_pdf.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0100V2a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+",
"AVA_VAN.5",
"ALC_DVS.2"
]
},
"status": "active",
"version": "2.1"
}
}