This page was not yet optimized for use on mobile devices.
TCOS Passport Version 2.0 Release 2-EAC/SLE66CLX800PE
CSV information ?
Status | archived |
---|---|
Valid from | 12.08.2008 |
Valid until | 01.09.2019 |
Scheme | 🇩🇪 DE |
Manufacturer | T-Systems Enterprise Services GmbH |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | ADV_IMP.2, AVA_MSU.3, ALC_DVS.2, EAL4+, AVA_VLA.4 |
Maintenance updates | TCOS Passport Version 2.02-EAC/ SLE66CLX800PE (19.11.2008) Certification report Security target |
TCOS Passport Version 2.02-EAC/SLE66CLX800PE-a14 (11.11.2008) Certification report Security target |
Heuristics summary ?
Certificate ID: BSI-DSZ-CC-0528-2008
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
DES, Triple-DESAsymmetric Algorithms
RSA2048, ECCRandomness
RNGIC data groups
EF.DG3, EF.DG2, EF.DG14Vendor
Infineon, Infineon Technologies AG, PhilipsSecurity level
EAL 4, EAL4, EAL 1, EAL 7, EAL5+, EAL1, EAL3, EAL5, EAL7, EAL2, EAL6, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ADO_DEL, ADO_IGS, ADO_DEL.2, ADO_IGS.1, ADV_IMP.2, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ALC_LCD.1, ALC_TAT.1, ATE_FUN, ATE_IND, ATE_COV, ATE_DPT, AVA_MSU.3, AVA_VLA.4, AVA_VLA, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA.2, AVA_VLA.3, APE_DES, APE_ENV, APE_INT, APE_OBJ, APE_REQ, APE_SRE, ASE_DES, ASE_ENV, ASE_INT, ASE_OBJ, ASE_PPC, ASE_REQ, ASE_SRE, ASE_TSSProtection profiles
BSI-PP-0026, BSI-PP-0002-2001Certificates
BSI-DSZ-CC-0528-2008, BSI-DSZ-CC-0447-2008, BSI-DSZ-CC-482-2008, BSI-DSZ-CC-0482-2008, CC-0447-2008, CC-0482-2008Evaluation facilities
TÃœV InformationstechnikSide-channel analysis
JILCertification process
Version 2.0 Release 2-EAC, Evaluation Body for IT-Security of TÜV Informationstechnik GmbH (confidential document) [8] Machine Readable Travel Document with „ICAO Application", Extended Access Control, BSI-PP-0026, SLE66CLX800PE Secure Smart Card Controller, Version 2.0, 25.04.2008, TÜV Informationstechnik GmbH (confidential document) [14] Certification Report BSI-DSZ-CC-482-2008 for Infineon Secure Smart Card Controller, und TCOS Passport Version 2.0 Release 2-EAC/SLE66CLX800PE, Version 0.6, 30.05.2008, T-Systems (confidential document) [16] Administrator’s Guide for TCOS Passport Version 2.0 Release 2-EAC, Version 1.0, 19.06.2008Standards
AIS 34, AIS 25, AIS 26, AIS 31, AIS 32, AIS 35, AIS 36, AIS 38, ISO/IEC 15408:2005, ICAOTechnical reports
BSI 7125, BSI 7148, BSI 7149File metadata
Title | Certification Report BSI-DSZ-CC-0528-2008 |
---|---|
Subject | Certification Report BSI-DSZ-CC-0528-2008 |
Keywords | "Common Criteria, Certification, Zertifizierung, MRTD, EAC, TCOS" |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Creation date | D:20080827090808+02'00' |
Modification date | D:20080829082858+02'00' |
Pages | 34 |
Creator | Writer |
Producer | StarOffice 8 |
Frontpage
Certificate ID | BSI-DSZ-CC-0528-2008 |
---|---|
Certified item | TCOS Passport Version 2.0 Release 2- EAC/SLE66CLX800PE |
Certification lab | BSI |
Developer | T-Systems Enterprise Services GmbH |
References
Outgoing- BSI-DSZ-CC-0447-2008 - archived - TCOS Passport Version 2.0 Release 1/ SLE66CLX800PE
- BSI-DSZ-CC-0482-2008 - archived - Infineon Smart Card IC (Security Controller)SLE66CLX800PE / m1581-e13/a14, SLE66CLX800PEM / m1580-e13/a14, SLE66CLX800PES / m1582-e13/a14, SLE66CX800PE / m1599-e13/a14, SLE66CLX360PE / m1587-e13/a14, SLE66CLX360PEM / m1588-e13/a14, SLE66CLX360PES / m1589-e13/a14, SLE66CLX180PE / m2080-a14, SLE66CLX180PEM / m2081-a14, SLE66CLX120PE / m2082-a14, SLE66CLX120PEM / m2083-a14, all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software
- BSI-DSZ-CC-0568-2008 - archived - TCOS Passport Version 2.0 Release 2-ID1/SLE66CLX800PE
Security target ?
Extracted keywords
Symmetric Algorithms
DES, 3DES, Triple-DES, KMACAsymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-HellmanHash functions
SHA-1, SHA-224, SHA-256Schemes
MACRandomness
RND, RNGBlock cipher modes
CBCIC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG14, EF.DG13, EF.DG15, EF.COM, EF.SODVendor
Infineon, Infineon Technologies AGSecurity level
EAL 5, EAL4, EAL 4, EAL4 augmented, EAL 4 augmentedClaims
O.RND, T.RND, OT.AC_PERSSecurity Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP, ACM_SCP.2, ADO_IGS, ADO_GEL, ADO_DEL.2, ADO_IGS.1, ADV_IMP.2, ADV_SPM.1, ADV_FSP, ADV_HLD, ADV_IMP, ADV_LLD, ADV_RCR, ADV_SPM, ADV_LLD.1, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ADV_IMP.1, ADV_FSP.2, AGD_ADM, AGD_USR, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_TAT.1, ALC_DVS, ALC_LCD, ALC_TAT, ALC_LCD.1, ATE_COV, ATE_DPT, ATE_FUN, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.3, AVA_VLA.4, AVA_MSU, AVA_SOF, AVA_VLA, AVA_SOF.1Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS.1.1, FAU_SAS, FCS_CKM.1, FCS_CKM, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_COP, FCS_RND, FCS_RND.1, FCS_RND.1.1, FDP_ITC.1, FDP_ITC.2, FDP_ACF.1, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_UCT.1, FDP_UCT, FDP_IFC.1, FDP_UIT, FDP_UIT.1, FDP_ITT.1, FDP_SDI.1, FDP_SDI.2, FDP_DAU.1, FDP_DAU, FDP_ACC, FDP_ACF, FIA_UAU, FIA_API, FIA_AFL.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_AFL.1.1, FIA_AFL.1.2, FIA_API.1, FIA_UID, FIA_AFL, FIA_API.1.1, FMT_MTD, FMT_MSA.2, FMT_MSA.3, FMT_SMR.1, FMT_MTD.3, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MTD.1, FMT_MTD.3.1, FMT_MSA.1, FMT_MDT.3, FMT_LIM, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_RVM.1, FPT_SEP.1, FPT_FLS.1.1, FPT_TST, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_AMT.1, FPT_PHP.3.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_ITT.1, FPT_TST.2, FPT_RVM, FPT_FLS, FPT_PHP, FPT_SEP, FRU_FLT.2, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-PP-0026, BSI-PP-0002Certificates
BSI-DSZ-CC-0528, BSI-DSZ-CC-0482-2007Evaluation facilities
T-Systems InternationalSide-channel analysis
Leak-Inherent, physical probing, Physical Probing, DPA, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineeringStandards
FIPS 180-214, FIPS 46-3, FIPS46, FIPS 180-2106, FIPS 180-2124, FIPS 180-2142, FIPS180, FIPS PUB 46-3, FIPS PUB 180-2, AIS36, AIS31, AIS 31, AIS 36, RFC3369, ISO/IEC 14443, ISO/IEC 7816-4, ICAO, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004File metadata
Title | TCOS Passport Version 2.0 Release 2_EAC SLE66CLX800PE |
---|---|
Subject | TCOS Passport Version 2.0 Release 2 EAC |
Keywords | Extended Access Control |
Author | T-Systems Enterprise Services GmbH |
Creation date | D:20080516020002Z |
Modification date | D:20080829082939+02'00' |
Pages | 131 |
Creator | T-Systems AFPL Ghostscript |
Producer | GPL Ghostscript 8.61 |
Heuristics ?
Certificate ID: BSI-DSZ-CC-0528-2008
Extracted SARs
ATE_COV.2, ADV_LLD.1, AVA_SOF.1, AGD_ADM.1, ADV_HLD.2, AVA_VLA.4, ADV_FSP.2, ALC_LCD.1, ATE_FUN.1, ALC_DVS.2, AGD_USR.1, ATE_DPT.1, ADV_RCR.1, ALC_TAT.1, AVA_MSU.3, ADV_SPM.1, ATE_IND.2, ADV_IMP.2Similar certificates
Name | Certificate ID | |
---|---|---|
TCOS Passport Version 1.0 Release 2 / P5CD072V0Q and TCOS Passport Version 1.0 Release 2 / SLE66CLX641P/m1522-a12 | BSI-DSZ-CC-0362-2006 | Compare |
TCOS Passport Version 1.0 Release 2 / P5CD072V0Q and TCOS Passport Version 1.0 Release 3 / SLE66CLX641P/m1522-a14 | BSI-DSZ-CC-0445-2007 | Compare |
TCOS Passport Version 2.0 Release 2/P5CD080V0B Extended Access Control Version 2.0.2.m2 | BSI-DSZ-CC-0567-2009 | Compare |
TCOS Passport Version 2.0 Release 2/P5CD080V0B Extended Access Control Version 2.0.2.m3 | BSI-DSZ-CC-0634-2009 | Compare |
TCOS Passport Version 2.0 Release 2-EAC/P5CD080V0B | BSI-DSZ-CC-0527-2008 | Compare |
TCOS Passport Version 2.0, Release 2-BAC/SLE66CLX800PE | BSI-DSZ-CC-0507-2008 | Compare |
TCOS Passport Version 2.0 Release 2-ID1/SLE66CLX800PE | BSI-DSZ-CC-0568-2008 | Compare |
Showing 5 out of 7.
References ?
Updates ?
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7e34cbaf6630898374db82e45158fee74e68df54ea2d0b30787a776edfac118b', 'txt_hash': '2252230ded48d26eb60006b9ec7a970b4189bab234dc91118467fc7c53fe6b1b'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '05b65d96637fc1d8b41587b428a5b7c4f972ceb06f30ff9c18794f382ab7e6a2', 'txt_hash': '3c0545b9213ae88c435795f32506faa12c685af2c590bc52ad3355df86d267bc'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 562979, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 34, '/CreationDate': "D:20080827090808+02'00'", '/Subject': 'Certification Report BSI-DSZ-CC-0528-2008', '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, MRTD, EAC, TCOS"', '/Producer': 'StarOffice 8', '/ModDate': "D:20080829082858+02'00'", '/Title': 'Certification Report BSI-DSZ-CC-0528-2008', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.bsi.bund.de/']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 721053, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 131, '/CreationDate': 'D:20080516020002Z', '/Subject': 'TCOS Passport Version 2.0 Release 2 EAC', '/Author': 'T-Systems Enterprise Services GmbH', '/Creator': 'T-Systems AFPL Ghostscript', '/Keywords': 'Extended Access Control', '/Producer': 'GPL Ghostscript 8.61', '/ModDate': "D:20080829082939+02'00'", '/Title': 'TCOS Passport Version 2.0 Release 2_EAC SLE66CLX800PE', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0528-2008', 'cert_item': 'TCOS Passport Version 2.0 Release 2- EAC/SLE66CLX800PE', 'developer': 'T-Systems Enterprise Services GmbH', 'cert_lab': 'BSI'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0528-2008': 20, 'BSI-DSZ-CC-0447-2008': 2, 'BSI-DSZ-CC-482-2008': 1, 'BSI-DSZ-CC-0482-2008': 1}, 'NL': {'CC-0447-2008': 1, 'CC-0482-2008': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0026': 4, 'BSI-PP-0002-2001': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 11, 'EAL4': 5, 'EAL 1': 1, 'EAL 7': 1, 'EAL5+': 1, 'EAL1': 5, 'EAL3': 4, 'EAL5': 6, 'EAL7': 4, 'EAL2': 3, 'EAL6': 3, 'EAL 4 augmented': 3}}, 'cc_sar': {'ACM': {'ACM_AUT': 2, 'ACM_CAP': 2, 'ACM_SCP': 2, 'ACM_AUT.1': 1, 'ACM_CAP.4': 1, 'ACM_SCP.2': 1}, 'ADO': {'ADO_DEL': 2, 'ADO_IGS': 2, 'ADO_DEL.2': 1, 'ADO_IGS.1': 1}, 'ADV': {'ADV_IMP.2': 5, 'ADV_FSP': 2, 'ADV_HLD': 2, 'ADV_IMP': 2, 'ADV_INT': 2, 'ADV_LLD': 2, 'ADV_RCR': 2, 'ADV_SPM': 2}, 'AGD': {'AGD_ADM': 2, 'AGD_USR': 2}, 'ALC': {'ALC_DVS.2': 6, 'ALC_DVS': 2, 'ALC_FLR': 2, 'ALC_LCD': 1, 'ALC_TAT': 2, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_FUN': 4, 'ATE_IND': 4, 'ATE_COV': 2, 'ATE_DPT': 2}, 'AVA': {'AVA_MSU.3': 5, 'AVA_VLA.4': 6, 'AVA_VLA': 5, 'AVA_CCA': 2, 'AVA_MSU': 2, 'AVA_SOF': 3, 'AVA_VLA.2': 1, 'AVA_VLA.3': 1}, 'APE': {'APE_DES': 1, 'APE_ENV': 1, 'APE_INT': 1, 'APE_OBJ': 1, 'APE_REQ': 1, 'APE_SRE': 1}, 'ASE': {'ASE_DES': 1, 'ASE_ENV': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_PPC': 1, 'ASE_REQ': 1, 'ASE_SRE': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon': 8, 'Infineon Technologies AG': 2}, 'Philips': {'Philips': 1}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 4}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 2}, '3DES': {'Triple-DES': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA2048': 1}, 'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'other': {'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI 7125': 2, 'BSI 7148': 1, 'BSI 7149': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG3': 6, 'EF.DG2': 2, 'EF.DG14': 2}}, 'standard_id': {'BSI': {'AIS 34': 3, 'AIS 25': 1, 'AIS 26': 1, 'AIS 31': 1, 'AIS 32': 1, 'AIS 35': 1, 'AIS 36': 2, 'AIS 38': 1}, 'ISO': {'ISO/IEC 15408:2005': 3}, 'ICAO': {'ICAO': 11}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'Version 2.0 Release 2-EAC, Evaluation Body for IT-Security of TÜV Informationstechnik GmbH (confidential document) [8] Machine Readable Travel Document with „ICAO Application", Extended Access Control, BSI-PP-0026': 1, 'SLE66CLX800PE Secure Smart Card Controller, Version 2.0, 25.04.2008, TÜV Informationstechnik GmbH (confidential document) [14] Certification Report BSI-DSZ-CC-482-2008 for Infineon Secure Smart Card Controller': 1, 'und TCOS Passport Version 2.0 Release 2-EAC/SLE66CLX800PE, Version 0.6, 30.05.2008, T-Systems (confidential document) [16] Administrator’s Guide for TCOS Passport Version 2.0 Release 2-EAC, Version 1.0, 19.06.2008': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0528': 1, 'BSI-DSZ-CC-0482-2007': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0026': 1, 'BSI-PP-0002': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 2, 'EAL4': 12, 'EAL 4': 24, 'EAL4 augmented': 2, 'EAL 4 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 2, 'ACM_CAP.4': 2, 'ACM_SCP': 1, 'ACM_SCP.2': 1}, 'ADO': {'ADO_IGS': 2, 'ADO_GEL': 1, 'ADO_DEL.2': 2, 'ADO_IGS.1': 2}, 'ADV': {'ADV_IMP.2': 10, 'ADV_SPM.1': 4, 'ADV_FSP': 4, 'ADV_HLD': 4, 'ADV_IMP': 2, 'ADV_LLD': 2, 'ADV_RCR': 2, 'ADV_SPM': 1, 'ADV_LLD.1': 3, 'ADV_RCR.1': 2, 'ADV_FSP.1': 2, 'ADV_HLD.2': 2, 'ADV_IMP.1': 1, 'ADV_FSP.2': 1}, 'AGD': {'AGD_ADM': 1, 'AGD_USR': 1, 'AGD_ADM.1': 3, 'AGD_USR.1': 3}, 'ALC': {'ALC_DVS.2': 9, 'ALC_TAT.1': 3, 'ALC_DVS': 2, 'ALC_LCD': 1, 'ALC_TAT': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_MSU.3': 7, 'AVA_VLA.4': 7, 'AVA_MSU': 1, 'AVA_SOF': 1, 'AVA_VLA': 1, 'AVA_SOF.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 13, 'FAU_SAS.1.1': 2, 'FAU_SAS': 4}, 'FCS': {'FCS_CKM.1': 50, 'FCS_CKM': 62, 'FCS_CKM.2': 10, 'FCS_COP.1': 30, 'FCS_CKM.4': 53, 'FCS_COP': 119, 'FCS_RND': 23, 'FCS_RND.1': 10, 'FCS_RND.1.1': 1}, 'FDP': {'FDP_ITC.1': 27, 'FDP_ITC.2': 28, 'FDP_ACF.1': 16, 'FDP_ACC.1': 25, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 2, 'FDP_UCT.1': 5, 'FDP_UCT': 16, 'FDP_IFC.1': 9, 'FDP_UIT': 16, 'FDP_UIT.1': 5, 'FDP_ITT.1': 1, 'FDP_SDI.1': 1, 'FDP_SDI.2': 1, 'FDP_DAU.1': 4, 'FDP_DAU': 7, 'FDP_ACC': 1, 'FDP_ACF': 2}, 'FIA': {'FIA_UAU': 72, 'FIA_API': 24, 'FIA_AFL.1': 8, 'FIA_UID.1': 15, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 12, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.4': 9, 'FIA_UAU.5': 7, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 2, 'FIA_UAU.6': 8, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_API.1': 8, 'FIA_UID': 1, 'FIA_AFL': 1, 'FIA_API.1.1': 1}, 'FMT': {'FMT_MTD': 73, 'FMT_MSA.2': 37, 'FMT_MSA.3': 3, 'FMT_SMR.1': 28, 'FMT_MTD.3': 10, 'FMT_SMF.1': 27, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_LIM.1': 20, 'FMT_LIM.2': 18, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 2, 'FMT_MTD.1': 10, 'FMT_MTD.3.1': 1, 'FMT_MSA.1': 2, 'FMT_MDT.3': 1, 'FMT_LIM': 4}, 'FPT': {'FPT_FLS.1': 12, 'FPT_TST.1': 9, 'FPT_PHP.3': 11, 'FPT_RVM.1': 10, 'FPT_SEP.1': 11, 'FPT_FLS.1.1': 1, 'FPT_TST': 2, 'FPT_TST.1.1': 2, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 2, 'FPT_AMT.1': 1, 'FPT_PHP.3.1': 1, 'FPT_RVM.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_ITT.1': 1, 'FPT_TST.2': 1, 'FPT_RVM': 1, 'FPT_FLS': 1, 'FPT_PHP': 1, 'FPT_SEP': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC.1': 9, 'FTP_TRP.1': 8}}, 'cc_claims': {'O': {'O.RND': 2}, 'T': {'T.RND': 2}, 'OT': {'OT.AC_PERS': 2}}, 'vendor': {'Infineon': {'Infineon': 2, 'Infineon Technologies AG': 1}}, 'eval_facility': {'TSystems': {'T-Systems International': 2}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 11}, '3DES': {'3DES': 2, 'Triple-DES': 12}}, 'constructions': {'MAC': {'KMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 6}, 'ECDSA': {'ECDSA': 4}, 'ECC': {'ECC': 1}}, 'FF': {'DH': {'Diffie-Hellman': 3}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 9}, 'SHA2': {'SHA-224': 1, 'SHA-256': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 12}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RND': 8, 'RNG': 1}}, 'cipher_mode': {'CBC': {'CBC': 4}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 3, 'physical probing': 3, 'Physical Probing': 2, 'DPA': 1}, 'FI': {'Physical Tampering': 5, 'physical tampering': 2, 'Physical tampering': 1, 'Malfunction': 7, 'malfunction': 5, 'fault injection': 1}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 33, 'EF.DG2': 13, 'EF.DG3': 20, 'EF.DG4': 16, 'EF.DG5': 11, 'EF.DG16': 33, 'EF.DG14': 9, 'EF.DG13': 4, 'EF.DG15': 1, 'EF.COM': 15, 'EF.SOD': 9}}, 'standard_id': {'FIPS': {'FIPS 180-214': 1, 'FIPS 46-3': 3, 'FIPS46': 2, 'FIPS 180-2106': 1, 'FIPS 180-2124': 1, 'FIPS 180-2142': 1, 'FIPS180': 2, 'FIPS PUB 46-3': 1, 'FIPS PUB 180-2': 1}, 'BSI': {'AIS36': 4, 'AIS31': 7, 'AIS 31': 1, 'AIS 36': 1}, 'RFC': {'RFC3369': 1}, 'ISO': {'ISO/IEC 14443': 2, 'ISO/IEC 7816-4': 1}, 'ICAO': {'ICAO': 21}, 'CC': {'CCMB-2005-08-001': 1, 'CCMB-2005-08-002': 1, 'CCMB-2005-08-003': 1, 'CCMB-2005-08-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
0528a.pdf
. - The st_filename property was set to
0528b.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['BSI']
. - The cert_id property was set to
BSI-DSZ-CC-0528-2008
. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0568-2008']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0568-2008']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0447-2008', 'BSI-DSZ-CC-0482-2008']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0266-2005', 'BSI-DSZ-CC-0447-2008', 'BSI-DSZ-CC-0169-2002', 'BSI-DSZ-CC-0322-2005', 'BSI-DSZ-CC-0482-2008', 'BSI-DSZ-CC-0399-2007', 'BSI-DSZ-CC-0223-2003', 'BSI-DSZ-CC-0410-2007', 'BSI-DSZ-CC-0446-2007', 'BSI-DSZ-CC-0404-2007']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0528a.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0528b.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The report_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0266-2005', 'BSI-DSZ-CC-0169-2002', 'BSI-DSZ-CC-0322-2005', 'BSI-DSZ-CC-0223-2003', 'BSI-DSZ-CC-0410-2007', 'BSI-DSZ-CC-0446-2007', 'BSI-DSZ-CC-0404-2007']}}}
data.
- The report_references property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name TCOS Passport Version 2.0 Release 2-EAC/SLE66CLX800PE was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "4eb1e023146d580b",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0528-2008",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_LLD",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2.0"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0568-2008"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0447-2008",
"BSI-DSZ-CC-0482-2008"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0568-2008"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0399-2007",
"BSI-DSZ-CC-0322-2005",
"BSI-DSZ-CC-0410-2007",
"BSI-DSZ-CC-0482-2008",
"BSI-DSZ-CC-0404-2007",
"BSI-DSZ-CC-0223-2003",
"BSI-DSZ-CC-0446-2007",
"BSI-DSZ-CC-0169-2002",
"BSI-DSZ-CC-0266-2005",
"BSI-DSZ-CC-0447-2008"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2008-11-11",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0528_ma1a.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0528_ma1b.pdf",
"maintenance_title": "TCOS Passport Version 2.02-EAC/SLE66CLX800PE-a14"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2008-11-19",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0528_ma2a.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0528_ma2b.pdf",
"maintenance_title": "TCOS Passport Version 2.02-EAC/ SLE66CLX800PE"
}
]
},
"manufacturer": "T-Systems Enterprise Services GmbH",
"manufacturer_web": "https://www.t-systems.de/",
"name": "TCOS Passport Version 2.0 Release 2-EAC/SLE66CLX800PE",
"not_valid_after": "2019-09-01",
"not_valid_before": "2008-08-12",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0528a.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-0528-2008",
"cert_item": "TCOS Passport Version 2.0 Release 2- EAC/SLE66CLX800PE",
"cert_lab": "BSI",
"developer": "T-Systems Enterprise Services GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
},
"RSA": {
"RSA2048": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0447-2008": 2,
"BSI-DSZ-CC-0482-2008": 1,
"BSI-DSZ-CC-0528-2008": 20,
"BSI-DSZ-CC-482-2008": 1
},
"NL": {
"CC-0447-2008": 1,
"CC-0482-2008": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002-2001": 1,
"BSI-PP-0026": 4
}
},
"cc_sar": {
"ACM": {
"ACM_AUT": 2,
"ACM_AUT.1": 1,
"ACM_CAP": 2,
"ACM_CAP.4": 1,
"ACM_SCP": 2,
"ACM_SCP.2": 1
},
"ADO": {
"ADO_DEL": 2,
"ADO_DEL.2": 1,
"ADO_IGS": 2,
"ADO_IGS.1": 1
},
"ADV": {
"ADV_FSP": 2,
"ADV_HLD": 2,
"ADV_IMP": 2,
"ADV_IMP.2": 5,
"ADV_INT": 2,
"ADV_LLD": 2,
"ADV_RCR": 2,
"ADV_SPM": 2
},
"AGD": {
"AGD_ADM": 2,
"AGD_USR": 2
},
"ALC": {
"ALC_DVS": 2,
"ALC_DVS.2": 6,
"ALC_FLR": 2,
"ALC_LCD": 1,
"ALC_LCD.1": 1,
"ALC_TAT": 2,
"ALC_TAT.1": 1
},
"APE": {
"APE_DES": 1,
"APE_ENV": 1,
"APE_INT": 1,
"APE_OBJ": 1,
"APE_REQ": 1,
"APE_SRE": 1
},
"ASE": {
"ASE_DES": 1,
"ASE_ENV": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_PPC": 1,
"ASE_REQ": 1,
"ASE_SRE": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 2,
"ATE_DPT": 2,
"ATE_FUN": 4,
"ATE_IND": 4
},
"AVA": {
"AVA_CCA": 2,
"AVA_MSU": 2,
"AVA_MSU.3": 5,
"AVA_SOF": 3,
"AVA_VLA": 5,
"AVA_VLA.2": 1,
"AVA_VLA.3": 1,
"AVA_VLA.4": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 4": 11,
"EAL 4 augmented": 3,
"EAL 7": 1,
"EAL1": 5,
"EAL2": 3,
"EAL3": 4,
"EAL4": 5,
"EAL5": 6,
"EAL5+": 1,
"EAL6": 3,
"EAL7": 4
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"SLE66CLX800PE Secure Smart Card Controller, Version 2.0, 25.04.2008, T\u00dcV Informationstechnik GmbH (confidential document) [14] Certification Report BSI-DSZ-CC-482-2008 for Infineon Secure Smart Card Controller": 1,
"Version 2.0 Release 2-EAC, Evaluation Body for IT-Security of T\u00dcV Informationstechnik GmbH (confidential document) [8] Machine Readable Travel Document with \u201eICAO Application\", Extended Access Control, BSI-PP-0026": 1,
"und TCOS Passport Version 2.0 Release 2-EAC/SLE66CLX800PE, Version 0.6, 30.05.2008, T-Systems (confidential document) [16] Administrator\u2019s Guide for TCOS Passport Version 2.0 Release 2-EAC, Version 1.0, 19.06.2008": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 4
}
},
"hash_function": {},
"ic_data_group": {
"EF": {
"EF.DG14": 2,
"EF.DG2": 2,
"EF.DG3": 6
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"other": {
"JIL": 4
}
},
"standard_id": {
"BSI": {
"AIS 25": 1,
"AIS 26": 1,
"AIS 31": 1,
"AIS 32": 1,
"AIS 34": 3,
"AIS 35": 1,
"AIS 36": 2,
"AIS 38": 1
},
"ICAO": {
"ICAO": 11
},
"ISO": {
"ISO/IEC 15408:2005": 3
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"Triple-DES": 1
},
"DES": {
"DES": 2
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7148": 1,
"BSI 7149": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 8,
"Infineon Technologies AG": 2
},
"Philips": {
"Philips": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20080827090808+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, MRTD, EAC, TCOS\"",
"/ModDate": "D:20080829082858+02\u002700\u0027",
"/Producer": "StarOffice 8",
"/Subject": "Certification Report BSI-DSZ-CC-0528-2008",
"/Title": "Certification Report BSI-DSZ-CC-0528-2008",
"pdf_file_size_bytes": 562979,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 34
},
"st_filename": "0528b.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDH": {
"ECDH": 6
},
"ECDSA": {
"ECDSA": 4
}
},
"FF": {
"DH": {
"Diffie-Hellman": 3
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0482-2007": 1,
"BSI-DSZ-CC-0528": 1
}
},
"cc_claims": {
"O": {
"O.RND": 2
},
"OT": {
"OT.AC_PERS": 2
},
"T": {
"T.RND": 2
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002": 1,
"BSI-PP-0026": 1
}
},
"cc_sar": {
"ACM": {
"ACM_AUT.1": 2,
"ACM_CAP.4": 2,
"ACM_SCP": 1,
"ACM_SCP.2": 1
},
"ADO": {
"ADO_DEL.2": 2,
"ADO_GEL": 1,
"ADO_IGS": 2,
"ADO_IGS.1": 2
},
"ADV": {
"ADV_FSP": 4,
"ADV_FSP.1": 2,
"ADV_FSP.2": 1,
"ADV_HLD": 4,
"ADV_HLD.2": 2,
"ADV_IMP": 2,
"ADV_IMP.1": 1,
"ADV_IMP.2": 10,
"ADV_LLD": 2,
"ADV_LLD.1": 3,
"ADV_RCR": 2,
"ADV_RCR.1": 2,
"ADV_SPM": 1,
"ADV_SPM.1": 4
},
"AGD": {
"AGD_ADM": 1,
"AGD_ADM.1": 3,
"AGD_USR": 1,
"AGD_USR.1": 3
},
"ALC": {
"ALC_DVS": 2,
"ALC_DVS.2": 9,
"ALC_LCD": 1,
"ALC_LCD.1": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 3
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.2": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_MSU": 1,
"AVA_MSU.3": 7,
"AVA_SOF": 1,
"AVA_SOF.1": 1,
"AVA_VLA": 1,
"AVA_VLA.4": 7
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 24,
"EAL 4 augmented": 1,
"EAL 5": 2,
"EAL4": 12,
"EAL4 augmented": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS": 4,
"FAU_SAS.1": 13,
"FAU_SAS.1.1": 2
},
"FCS": {
"FCS_CKM": 62,
"FCS_CKM.1": 50,
"FCS_CKM.2": 10,
"FCS_CKM.4": 53,
"FCS_COP": 119,
"FCS_COP.1": 30,
"FCS_RND": 23,
"FCS_RND.1": 10,
"FCS_RND.1.1": 1
},
"FDP": {
"FDP_ACC": 1,
"FDP_ACC.1": 25,
"FDP_ACC.1.1": 1,
"FDP_ACF": 2,
"FDP_ACF.1": 16,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 2,
"FDP_DAU": 7,
"FDP_DAU.1": 4,
"FDP_IFC.1": 9,
"FDP_ITC.1": 27,
"FDP_ITC.2": 28,
"FDP_ITT.1": 1,
"FDP_SDI.1": 1,
"FDP_SDI.2": 1,
"FDP_UCT": 16,
"FDP_UCT.1": 5,
"FDP_UIT": 16,
"FDP_UIT.1": 5
},
"FIA": {
"FIA_AFL": 1,
"FIA_AFL.1": 8,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_API": 24,
"FIA_API.1": 8,
"FIA_API.1.1": 1,
"FIA_UAU": 72,
"FIA_UAU.1": 12,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.4": 9,
"FIA_UAU.5": 7,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 2,
"FIA_UAU.6": 8,
"FIA_UID": 1,
"FIA_UID.1": 15,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_LIM": 4,
"FMT_LIM.1": 20,
"FMT_LIM.1.1": 2,
"FMT_LIM.2": 18,
"FMT_LIM.2.1": 2,
"FMT_MDT.3": 1,
"FMT_MSA.1": 2,
"FMT_MSA.2": 37,
"FMT_MSA.3": 3,
"FMT_MTD": 73,
"FMT_MTD.1": 10,
"FMT_MTD.3": 10,
"FMT_MTD.3.1": 1,
"FMT_SMF.1": 27,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 28,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_AMT.1": 1,
"FPT_FLS": 1,
"FPT_FLS.1": 12,
"FPT_FLS.1.1": 1,
"FPT_ITT.1": 1,
"FPT_PHP": 1,
"FPT_PHP.3": 11,
"FPT_PHP.3.1": 1,
"FPT_RVM": 1,
"FPT_RVM.1": 10,
"FPT_RVM.1.1": 1,
"FPT_SEP": 1,
"FPT_SEP.1": 11,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1,
"FPT_TST": 2,
"FPT_TST.1": 9,
"FPT_TST.1.1": 2,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 2,
"FPT_TST.2": 1
},
"FRU": {
"FRU_FLT.2": 1
},
"FTP": {
"FTP_ITC.1": 9,
"FTP_TRP.1": 8
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 4
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 12
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TSystems": {
"T-Systems International": 2
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 9
},
"SHA2": {
"SHA-224": 1,
"SHA-256": 1
}
}
},
"ic_data_group": {
"EF": {
"EF.COM": 15,
"EF.DG1": 33,
"EF.DG13": 4,
"EF.DG14": 9,
"EF.DG15": 1,
"EF.DG16": 33,
"EF.DG2": 13,
"EF.DG3": 20,
"EF.DG4": 16,
"EF.DG5": 11,
"EF.SOD": 9
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 8,
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 7,
"Physical Tampering": 5,
"Physical tampering": 1,
"fault injection": 1,
"malfunction": 5,
"physical tampering": 2
},
"SCA": {
"DPA": 1,
"Leak-Inherent": 3,
"Physical Probing": 2,
"physical probing": 3
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"BSI": {
"AIS 31": 1,
"AIS 36": 1,
"AIS31": 7,
"AIS36": 4
},
"CC": {
"CCMB-2005-08-001": 1,
"CCMB-2005-08-002": 1,
"CCMB-2005-08-003": 1,
"CCMB-2005-08-004": 1
},
"FIPS": {
"FIPS 180-2106": 1,
"FIPS 180-2124": 1,
"FIPS 180-214": 1,
"FIPS 180-2142": 1,
"FIPS 46-3": 3,
"FIPS PUB 180-2": 1,
"FIPS PUB 46-3": 1,
"FIPS180": 2,
"FIPS46": 2
},
"ICAO": {
"ICAO": 21
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 7816-4": 1
},
"RFC": {
"RFC3369": 1
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"3DES": 2,
"Triple-DES": 12
},
"DES": {
"DES": 11
}
},
"constructions": {
"MAC": {
"KMAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 2,
"Infineon Technologies AG": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "T-Systems Enterprise Services GmbH",
"/CreationDate": "D:20080516020002Z",
"/Creator": "T-Systems AFPL Ghostscript",
"/Keywords": "Extended Access Control",
"/ModDate": "D:20080829082939+02\u002700\u0027",
"/Producer": "GPL Ghostscript 8.61",
"/Subject": "TCOS Passport Version 2.0 Release 2 EAC",
"/Title": "TCOS Passport Version 2.0 Release 2_EAC SLE66CLX800PE",
"pdf_file_size_bytes": 721053,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 131
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0528a.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VLA.4",
"ALC_DVS.2",
"AVA_MSU.3",
"EAL4+",
"ADV_IMP.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0528b.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "7e34cbaf6630898374db82e45158fee74e68df54ea2d0b30787a776edfac118b",
"txt_hash": "2252230ded48d26eb60006b9ec7a970b4189bab234dc91118467fc7c53fe6b1b"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "05b65d96637fc1d8b41587b428a5b7c4f972ceb06f30ff9c18794f382ab7e6a2",
"txt_hash": "3c0545b9213ae88c435795f32506faa12c685af2c590bc52ad3355df86d267bc"
}
},
"status": "archived"
}