This page was not yet optimized for use on mobile
devices.
STARCOS 3.6 ID Tachograph C1
This certificate has disappeared from the Common Criteria portal listing*.
However, there is a certificate
that matches this one in the current listing:
You can also examine other similar certificates below.
| G+D Mobile Security GmBH STARCOS 3.6 ID Tachograph C1 | NSCIB-CC-15-77633-CR | Compare |
CSV information
| Status | archived |
|---|---|
| Valid from | 16.09.2016 |
| Valid until | 16.09.2021 |
| Scheme | 🇳🇱 NL |
| Manufacturer | G+D Mobile Security GmbH |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | ATE_DPT.2, AVA_VAN.5, EAL4+ |
| Protection profiles |
Heuristics summary
Certificate ID: NSCIB-CC-15-77633-CR
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Symmetric Algorithms
TDESHash functions
SHA-1, SHA-2Randomness
RNGLibraries
v1.02.013Operating System name
STARCOS 3Vendor
Infineon, Giesecke & Devrient, G&DSecurity level
EAL4, EAL 4, EAL4+, EAL4 augmented, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ATE_DPT.2, AVA_VAN.5Protection profiles
BSI-CC-PP-0070Certificates
BSI-DSZ-CC-0782-V2-2015, BSI-DSZ-CC-S-0070-2016, BSI-DSZ-CC-S-0062-2016, NSCIB-CC-15-77633-CR, NSCIB-CC-15-77633Evaluation facilities
BrightsightSide-channel analysis
JIL-AM, JIL-COMP, JILStandards
ISO/IEC 7816File metadata
| Title | Certification Report NSCIB-CC-15-77633-CR |
|---|---|
| Author | p646 |
| Creation date | D:20160916133619+02'00' |
| Modification date | D:20160916133619+02'00' |
| Pages | 13 |
| Creator | PDFCreator Version 1.2.0 |
| Producer | GPL Ghostscript 9.0 |
Frontpage
| Certificate ID | NSCIB-CC-15-77633-CR |
|---|---|
| Certified item | STARCOS 3.6 ID Tachograph C1 |
| Certification lab | Brightsight |
| Developer | Giesecke & Devrient GmbH |
Security target
Extracted keywords
Symmetric Algorithms
DES, TDESHash functions
SHA-2Schemes
MACBlock cipher modes
CBCOperating System name
STARCOS 3Vendor
Infineon, Giesecke & Devrient, G&DSecurity level
EAL6+, EAL 6+, EAL4, EAL 4, EAL 6, EAL6, EAL4 augmented, EAL 4 augmented, EAL 6 augmented, EAL6 augmented, ITSEC E3 highSecurity Assurance Requirements (SAR)
ALC_FLR.1, ATE_DPT.2, AVA_VAN.5Security Functional Requirements (SFR)
FAU_SAA, FAU_SAA.1, FAU_GEN.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_SAS, FCO_NRO, FCO_NRO.1, FCO_NRO.1.1, FCO_NRO.1.2, FCO_NRO.1.3, FCS_CKM, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP, FCS_RNG.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC, FDP_ACC.2, FDP_ACC.1, FDP_ACF, FDP_ACF.1, FDP_DAU, FDP_DAU.1, FDP_DAU.1.1, FDP_ETC, FDP_ETC.1, FDP_IFC.1, FDP_ETC.1.1, FDP_ETC.1.2, FDP_ETC.2, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_ITC, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_RIP, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_SDI.1, FDP_ITT.1, FIA_UID.1, FIA_AFL, FIA_UAU.1, FIA_AFL.1, FIA_ATD, FIA_ATD.1, FIA_UAU, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.3, FIA_UAU.3.1, FIA_UAU.3.2, FIA_UAU.4.1, FIA_UID, FIA_UID.1.1, FIA_UID.1.2, FIA_USB, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_MSA, FMT_MSA.3, FMT_MSA.1, FMT_SMF.1, FMT_LIM.1, FMT_LIM.2, FPR_UNO, FPR_UNO.1, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS, FPT_FLS.1, FPT_PHP, FPT_PHP.3, FPT_PHP.3.1, FPT_TDC, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_TST.2, FRU_FLT.2, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3Protection profiles
BSI-CC-PP-0070Certificates
BSI-DSZ-CC-0782-V2-2015Side-channel analysis
Leak-Inherent, physical probing, physical tampering, Malfunction, JILStandards
ISO/IEC 7810, ISO/IEC 7816, ISO/IEC 10373, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
| Title | ASE Security Target Lite |
|---|---|
| Keywords | mainbook |
| Author | Helmut Scherzer |
| Creation date | D:20160826164905+01'00' |
| Modification date | D:20160829121236+02'00' |
| Pages | 55 |
| Creator | AH XSL Formatter V6.3 MR2 for Windows : 6.3.3.24511 (2016/05/17 13:57JST) |
| Producer | Antenna House PDF Output Library 6.3.795 (Windows) |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
NSCIB-CC-15-77633-CRExtracted SARs
ALC_FLR.1, ATE_DPT.2, AVA_VAN.5Similar certificates
| Name | Certificate ID | |
|---|---|---|
| G+D Mobile Security GmBH STARCOS 3.6 ID Tachograph C1 | NSCIB-CC-15-77633-CR | Compare |
| STARCOS 3.7 ID ePA C1, STARCOS 3.7 ID eAT C1, STARCOS 3.7 ID ePass C1 | BSI-DSZ-CC-1077-2020 | Compare |
References
No references are available for this certificate.
Updates Feed
-
The certificate became unavailable — it disappeared from the upstream listing.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "23f368ea38b8b63b",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "NSCIB-CC-15-77633-CR",
"cert_lab": [
""
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"3.6"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"366f39631e23f94e"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0782-V2-2015"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0782-2012",
"BSI-DSZ-CC-0782-V2-2015"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0782-V2-2015"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0782-V2-2015"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "G+D Mobile Security GmbH",
"manufacturer_web": "https://www.gi-de.com/de/de/mobile-security/",
"name": "STARCOS 3.6 ID Tachograph C1",
"not_valid_after": "2021-09-16",
"not_valid_before": "2016-09-16",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "[CR] NSCIB-CC-15-77633-CR.pdf",
"report_frontpage": {
"NL": {
"cert_id": "NSCIB-CC-15-77633-CR",
"cert_item": "STARCOS 3.6 ID Tachograph C1",
"cert_lab": " Brightsight",
"developer": "Giesecke \u0026 Devrient GmbH"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0782-V2-2015": 2,
"BSI-DSZ-CC-S-0062-2016": 1,
"BSI-DSZ-CC-S-0070-2016": 1
},
"NL": {
"NSCIB-CC-15-77633": 1,
"NSCIB-CC-15-77633-CR": 12
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0070": 2
}
},
"cc_sar": {
"ATE": {
"ATE_DPT.2": 2
},
"AVA": {
"AVA_VAN.5": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL4": 3,
"EAL4 augmented": 1,
"EAL4+": 2
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Infineon": {
"v1.02.013": 3
}
},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 2
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-2": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"STARCOS": {
"STARCOS 3": 39
}
},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"other": {
"JIL": 1,
"JIL-AM": 1,
"JIL-COMP": 2
}
},
"standard_id": {
"ISO": {
"ISO/IEC 7816": 2
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"TDES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"GD": {
"G\u0026D": 4,
"Giesecke \u0026 Devrient": 3
},
"Infineon": {
"Infineon": 5
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "p646",
"/CreationDate": "D:20160916133619+02\u002700\u0027",
"/Creator": "PDFCreator Version 1.2.0",
"/Keywords": "",
"/ModDate": "D:20160916133619+02\u002700\u0027",
"/Producer": "GPL Ghostscript 9.0",
"/Subject": "",
"/Title": "Certification Report NSCIB-CC-15-77633-CR",
"pdf_file_size_bytes": 763188,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 13
},
"st_filename": "[ST Lite] SecurityTargetLite STARCOS 3.6 ID Tachograph C1 v1.0.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0782-V2-2015": 3
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0070": 2
}
},
"cc_sar": {
"ALC": {
"ALC_FLR.1": 1
},
"ATE": {
"ATE_DPT.2": 3
},
"AVA": {
"AVA_VAN.5": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL 6": 1,
"EAL 6 augmented": 1,
"EAL 6+": 1,
"EAL4": 1,
"EAL4 augmented": 1,
"EAL6": 1,
"EAL6 augmented": 1,
"EAL6+": 2
},
"ITSEC": {
"ITSEC E3 high": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 1,
"FAU_SAA": 1,
"FAU_SAA.1": 1,
"FAU_SAA.1.1": 1,
"FAU_SAA.1.2": 1,
"FAU_SAS": 1
},
"FCO": {
"FCO_NRO": 1,
"FCO_NRO.1": 1,
"FCO_NRO.1.1": 1,
"FCO_NRO.1.2": 1,
"FCO_NRO.1.3": 1
},
"FCS": {
"FCS_CKM": 3,
"FCS_CKM.1": 5,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 2,
"FCS_CKM.4": 5,
"FCS_CKM.4.1": 2,
"FCS_COP": 9,
"FCS_COP.1": 4,
"FCS_RNG.1": 1
},
"FDP": {
"FDP_ACC": 3,
"FDP_ACC.1": 5,
"FDP_ACC.2": 4,
"FDP_ACF": 4,
"FDP_ACF.1": 3,
"FDP_DAU": 1,
"FDP_DAU.1": 1,
"FDP_DAU.1.1": 1,
"FDP_ETC": 1,
"FDP_ETC.1": 1,
"FDP_ETC.1.1": 1,
"FDP_ETC.1.2": 1,
"FDP_ETC.2": 1,
"FDP_ETC.2.1": 1,
"FDP_ETC.2.2": 1,
"FDP_ETC.2.3": 1,
"FDP_ETC.2.4": 1,
"FDP_IFC.1": 4,
"FDP_ITC": 1,
"FDP_ITC.1": 5,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_ITC.2": 4,
"FDP_ITT.1": 1,
"FDP_RIP": 1,
"FDP_RIP.1": 1,
"FDP_RIP.1.1": 1,
"FDP_SDI": 1,
"FDP_SDI.1": 1,
"FDP_SDI.2": 3,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1
},
"FIA": {
"FIA_AFL": 4,
"FIA_AFL.1": 3,
"FIA_ATD": 1,
"FIA_ATD.1": 2,
"FIA_UAU": 2,
"FIA_UAU.1": 3,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.3": 1,
"FIA_UAU.3.1": 1,
"FIA_UAU.3.2": 2,
"FIA_UAU.4.1": 1,
"FIA_UID": 1,
"FIA_UID.1": 4,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_USB": 1,
"FIA_USB.1": 1,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_LIM.1": 1,
"FMT_LIM.2": 1,
"FMT_MSA": 1,
"FMT_MSA.1": 1,
"FMT_MSA.3": 2,
"FMT_SMF.1": 1
},
"FPR": {
"FPR_UNO": 1,
"FPR_UNO.1": 4
},
"FPT": {
"FPT_EMS": 1,
"FPT_EMS.1": 4,
"FPT_EMS.1.1": 2,
"FPT_EMS.1.2": 2,
"FPT_FLS": 1,
"FPT_FLS.1": 3,
"FPT_PHP": 1,
"FPT_PHP.3": 3,
"FPT_PHP.3.1": 1,
"FPT_TDC": 1,
"FPT_TDC.1": 1,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST.1": 2,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1,
"FPT_TST.2": 1
},
"FRU": {
"FRU_FLT.2": 1
},
"FTP": {
"FTP_ITC": 1,
"FTP_ITC.1": 1,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-2": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"STARCOS": {
"STARCOS 3": 18
}
},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"Malfunction": 4,
"physical tampering": 1
},
"SCA": {
"Leak-Inherent": 4,
"physical probing": 2
},
"other": {
"JIL": 13
}
},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 2,
"CCMB-2012-09-002": 2,
"CCMB-2012-09-003": 2,
"CCMB-2012-09-004": 1
},
"ISO": {
"ISO/IEC 10373": 2,
"ISO/IEC 7810": 2,
"ISO/IEC 7816": 6
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"TDES": 6
},
"DES": {
"DES": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"GD": {
"G\u0026D": 1,
"Giesecke \u0026 Devrient": 32
},
"Infineon": {
"Infineon": 12
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Helmut Scherzer",
"/CreationDate": "D:20160826164905+01\u002700\u0027",
"/Creator": "AH XSL Formatter V6.3 MR2 for Windows : 6.3.3.24511 (2016/05/17 13:57JST)",
"/Keywords": "mainbook",
"/ModDate": "D:20160829121236+02\u002700\u0027",
"/Producer": "Antenna House PDF Output Library 6.3.795 (Windows)",
"/Title": "ASE Security Target Lite",
"/Trapped": "/False",
"pdf_file_size_bytes": 455405,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.sogis.org/",
"http://www.gi-de.com"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 55
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0070b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CR]%20NSCIB-CC-15-77633-CR.pdf",
"scheme": "NL",
"security_level": {
"_type": "Set",
"elements": [
"ATE_DPT.2",
"AVA_VAN.5",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST%20Lite]%20SecurityTargetLite%20STARCOS%203.6%20ID%20Tachograph%20C1%20v1.0.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "db801ee2957edd4e48f964fece59f1e43340d198d59fd64122ef63d6ea9e9d78",
"txt_hash": "915d019447a364ba9ca52921ea8251b558e6e0e46aa827719fa2c2cdda0eddf3"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "10dd374ea5120318ace721de1f39df23121cca0b7d78d3787514b4167c8bf3c8",
"txt_hash": "e8a71020f13cea36948523e716ecfb59bf0a5edd487348d9216e1be9f68005e9"
}
},
"status": "archived"
}