TCOS Smart Meter Security Module Version 1.0 Release 1/P60C144PVA
CSV information ?
Status | active |
---|---|
Valid from | 18.11.2016 |
Valid until | 18.11.2026 |
Scheme | 🇩🇪 DE |
Manufacturer | T-Systems International GMBH |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | EAL4+, AVA_VAN.5 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, CMACAsymmetric Algorithms
ECDSA, ECC, DH, Diffie-HellmanSchemes
MAC, Key Agreement, KAProtocols
TLS, PACERandomness
RNGEngines
SmartMX2Block cipher modes
CBCVendor
NXP, NXP SemiconductorsSecurity level
EAL 4, EAL 5, EAL 1, EAL 2, EAL 5+, EAL 6, EAL 3, EAL 7, EAL 4 augmented, ITSEC EvaluationSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_FLR, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_DVS.2, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSSecurity Functional Requirements (SFR)
FCS_COP, FCS_CKM, FCS_RNG.1, FIA_UID.1, FIA_UAU.4, FIA_UAU.5, FTP_ITC.1Protection profiles
BSI-CC-PP-0077-V2-2015Certificates
BSI-DSZ-CC-0957-V2-2016, BSI-DSZ-CC-0957-2015, BSI-DSZ-CC-0978-2016, BSI-DSZ-CC-0978Evaluation facilities
TÃœV Informationstechnik, SRC Security Research & Consulting, T-Systems InternationalSide-channel analysis
side channel, malfunction, fault injection, JILCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, 1.0 Release 2/P60C144PVE, Version 1.2, 27 October 2016, SRC Security Research & Consulting GmbH (confidential document) 9 specifically • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung, Version 1.0 Release 2/P60C144PVE, Version 1.3, 25 October 2016, T-Systems International GmbH (confidential document) [10] Guidance Documentation BSI-DSZ-CC-0957-V2-2016, Operational Guidance for users and, Y/B/X)/yVE, BSI-DSZ-CC-0978, Version 2, 17 December 2015, TÜV Informationstechnik GmbH (confidential document) [14] Product Data Sheet, SmartMX2 family P60x080/144 VA/VE, Secure high performance smart cardStandards
FIPS 180-2, FIPS 186, FIPS 197, AIS 34, AIS 36, AIS 26, AIS 25, AIS 20, AIS 1, AIS 31, AIS 32, AIS 46, RFC 5639, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065Technical reports
BSI TR-03109-2, BSI 7148File metadata
Title | Certification Report BSI-DSZ-CC-0957-V2-2016 |
---|---|
Subject | Common Criteria Certification |
Keywords | "Common Criteria, Certification, Zertifizierung, Smart Meter Security Module" |
Author | Bundesamt für Sicherheit ind er Informationstechnik |
Creation date | D:20161202073353+01'00' |
Modification date | D:20161202075632+01'00' |
Pages | 38 |
Creator | Writer |
Producer | LibreOffice 4.2 |
Frontpage
Certificate ID | BSI-DSZ-CC-0957-V2-2016 |
---|---|
Certified item | TCOS Smart Meter Security Module Version 1.0 Release 2/P60C144PVE |
Certification lab | BSI |
Developer | T-Systems International GmbH |
References
Outgoing- BSI-DSZ-CC-0978-2016 - archived - NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software
- BSI-DSZ-CC-0957-2015 - active - TCOS Smart Meter Security Module Version 1.0 Release 1/P60C144PVA
- BSI-DSZ-CC-1035-2017 - archived - TCOS Secure Crypto Module Version 1.0 Release 1/P60C144PVE
- BSI-DSZ-CC-0831-V7-2023 - archived - Smart Meter GatewaySMGWVersion 2.1
- BSI-DSZ-CC-0831-V6-2023 - active - Smart Meter GatewaySMGWVersion 1.3
- BSI-DSZ-CC-0919-V2-2021 - active - CASA 1.0
- BSI-DSZ-CC-0831-V4-2021 - active - SMGW Version 1.2
- BSI-DSZ-CC-0831-V3-2021 - active - SMGW, Version 1.1.1
- BSI-DSZ-CC-0918-V5-2023 - active - CONEXA 3.0 Version 1.4
- BSI-DSZ-CC-0831-V5-2022 - active - SMGW Version 2.0
- BSI-DSZ-CC-0918-V4-2022 - active - CONEXA 3.0 Version 1.3
- BSI-DSZ-CC-0831-V2-2020 - active - SMGW Version 1.1
- BSI-DSZ-CC-0918-V6-2024 - active - CONEXA 3.0, SW: v3.80.0-cc, HW V01.00 & V01.01
- BSI-DSZ-CC-0919-V3-2023 - active - CASA 1.0 and CASA 1.1
- BSI-DSZ-CC-0831-V8-2024 - active - SMGW Version 1.3.1
- BSI-DSZ-CC-0831-V9-2024 - active - SMGW Version 2.1.1
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, Triple-DES, TDES, CMACAsymmetric Algorithms
ECDH, ECDSA, ECC, DH, Diffie-HellmanSchemes
MAC, Key AgreementProtocols
TLS, PACERandomness
RND, RNGElliptic Curves
P-256, P-384, NIST P-256, NIST P-384, secp256r1, secp384r1, brainpoolP256r1, brainpoolP384r1, brainpoolP512r1Block cipher modes
CBCVendor
NXP, NXP SemiconductorsSecurity level
EAL4, EAL 6+, EAL 4, EAL 6, EAL4 augmented, EAL 6 augmentedClaims
O.PACE, O.RND, O.HW_AES, O.MEM_ACCESS, O.SFR_ACCESS, O.FW_HW, T.RND, OE.PACE, OSP.SMSecurity Assurance Requirements (SAR)
ADV_TDS, ADV_ARC, ADV_FSP, ADV_IMP.1, ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, AGD_PRE.1, AGD_OPE.1, ALC_FLR.1, ALC_DEL.1, ALC_CMC.4, ALC_CMS.4, ALC_LCD.1, ALC_TAT.1, ALC_DVS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, AVA_VAN.5, ASE_TSS.2Security Functional Requirements (SFR)
FAU_SAS.1, FCS_RNG, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FCS_CKM.4, FCS_COP, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4.1, FDP_ACF, FDP_ACC.2, FDP_ACF.1, FDP_SDI.2, FDP_RIP.1, FDP_ETC.1, FDP_ITC.1, FDP_UCT.1, FDP_UIT.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_RIP.1.1, FDP_IFC, FDP_ETC.1.1, FDP_ETC.1.2, FDP_IFC.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_UIT.1.2, FDP_ITC, FDP_SDI, FDP_RIP, FDP_UIT, FDP_ITT.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU, FIA_UAU.4, FIA_UAU.5, FIA_UID.1, FIA_USB.1, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1, FIA_UAU.4.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_SOS, FIA_UID, FIA_USB, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMR, FMT_MSA.1, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1, FPT_PHP.3, FPT_TST.1, FPT_FLS.1.1, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS, FPT_PHP, FPT_TST, FPT_ITT.1, FRU_FLT.2, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_ICT.1, FTP_ITCProtection profiles
BSI-CC-PP-0077-V2-2015, BSI-CC-PP-0035-2007, BSI-CC-PP-0073-2014Certificates
BSI-DSZ-CC-0978-2016, BSI-DSZ-CC-0978Evaluation facilities
T-Systems InternationalSide-channel analysis
Leak-Inherent, Physical Probing, physical probing, side channels, side channel, side-channels, SPA, DPA, timing attacks, Physical tampering, physical tampering, Malfunction, malfunction, DFA, fault injectionCertification process
out of scope, entities. 72 As these external entities only indirectly interact with the TOE, these entities are out of scope for this ST. 73 During its pre-operational phases the TOE interacts with the Integrator and theStandards
FIPS186, FIPS197, FIPS PUB 186-4, AIS36, AIS 36, RFC5639, RFC 5639, ISO/IEC 7810:2003, X.509, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004Technical reports
BSI TR-03109File metadata
Title | Security Target TCOS Smart Meter Security Module (NXP) |
---|---|
Subject | TCOS Smart Meter Security Module Version 1.0 Release 1 |
Keywords | "TCOS Security Module, Sicherheitsmodul, Smart Meter" |
Author | T-Systems International GmbH |
Creation date | D:20161026142017+02'00' |
Modification date | D:20161026142017+02'00' |
Pages | 76 |
Creator | Microsoft® Office Word 2007 |
Producer | Microsoft® Office Word 2007 |
References
Outgoing- BSI-DSZ-CC-0978-2016 - archived - NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software
- BSI-DSZ-CC-0918-2020 - active - CONEXA 3.0 Version 1.0
- BSI-DSZ-CC-0918-V3-2022 - active - CONEXA 3.0 Version 1.2
- BSI-DSZ-CC-0822-V4-2023 - active - SMARTY IQ-GPRS / LTE, Version 1.2
- BSI-DSZ-CC-0919-V2-2021 - active - CASA 1.0
- BSI-DSZ-CC-0918-V5-2023 - active - CONEXA 3.0 Version 1.4
- BSI-DSZ-CC-0822-V5-2023 - active - SMARTY IQ-GPRS / LTE, Version 1.3
- BSI-DSZ-CC-0918-V4-2022 - active - CONEXA 3.0 Version 1.3
- BSI-DSZ-CC-0918-V6-2024 - active - CONEXA 3.0, SW: v3.80.0-cc, HW V01.00 & V01.01
- BSI-DSZ-CC-0918-V2-2021 - active - CONEXA 3.0 Version 1.1
- BSI-DSZ-CC-0919-V3-2023 - active - CASA 1.0 and CASA 1.1
Heuristics ?
Extracted SARs
ASE_CCL.1, ALC_DEL.1, ALC_CMC.4, ATE_DPT.1, AVA_VAN.5, ATE_FUN.1, ADV_ARC.1, ADV_TDS.3, ASE_SPD.1, ASE_REQ.2, ALC_CMS.4, ADV_IMP.1, ALC_TAT.1, ASE_TSS.2, ATE_COV.2, APE_INT.1, AGD_OPE.1, ALC_DVS.1, APE_CCL.1, APE_REQ.2, ATE_IND.3, APE_ECD.1, ASE_ECD.1, ADV_INT.3, ADV_SPM.1, ADV_FSP.4, ASE_INT.1, APE_OBJ.2, AGD_PRE.1, APE_SPD.1, ALC_LCD.1, ALC_FLR.1, ASE_OBJ.2Similar certificates
Name | Certificate ID | |
---|---|---|
TCOS Smart Meter Security Module Version 1.0 Release 1/P60C144PVA | BSI-DSZ-CC-0957-2015 | Compare |
TCOS Secure Crypto Module Version 1.0 Release 1/P60C144PVE | BSI-DSZ-CC-1035-2017 | Compare |
TCOS Passport Version 1.0 Release 2 / P5CD072V0Q and TCOS Passport Version 1.0 Release 3 / SLE66CLX641P/m1522-a14 | BSI-DSZ-CC-0445-2007 | Compare |
TCOS Passport Version 1.0 Release 2 / P5CD072V0Q and TCOS Passport Version 1.0 Release 2 / SLE66CLX641P/m1522-a12 | BSI-DSZ-CC-0362-2006 | Compare |
Scheme data ?
Cert Id | BSI-DSZ-CC-0957-V2-2016 | |
---|---|---|
Product | TCOS Smart Meter Security Module Version 1.0 Release 2/P60C144PVE | |
Vendor | Deutsche Telekom Security GmbH | |
Certification Date | 18.11.2016 | |
Category | Intelligent measuring systems | |
Url | https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Smartmeter_Sicherheitsmodule/0957_0957V2_0957V2RA1.html | |
Enhanced | ||
Product | TCOS Smart Meter Security Module Version 1.0 Release 2/P60C144PVE | |
Applicant | Deutsche Telekom Security GmbH Untere Industriestraße 20 57250 Netphen | |
Evaluation Facility | SRC Security Research & Consulting GmbH | |
Assurance Level | EAL4+,AVA_VAN.5 | |
Protection Profile | Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP) - Schutzprofil für das Sicherheitsmodul der Kommunikationseinheit eines intelligenten Messsystems für Stoff- und Energiemengen Version 1.03, 11 December 2014, BSI-CC-PP-0077-V2-2015 | |
Certification Date | 18.11.2016 | |
Expiration Date | 17.11.2026 | |
Entries | [frozendict({'id': 'BSI-DSZ-CC-0957-V2-2016-RA-01 (Ausstellungsdatum / Certification Date 27.09.2021)', 'description': 'Re-Assessment'}), frozendict({'id': 'BSI-DSZ-CC-0957-V2-2016 (Ausstellungsdatum / Certification Date 18.11.2016, gültig bis / valid until 17.11.2026)', 'description': 'TCOS Smart Meter Security Module Version 1.0 Release 2/P60C144PVE'}), frozendict({'id': 'BSI-DSZ-CC-0957-2015 (Ausstellungsdatum / Certification Date 09.02.2015, gültig bis / valid until 09.02.2025)', 'description': 'Security Target'})] | |
Report Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0957V2a_pdf.pdf?__blob=publicationFile&v=1 | |
Target Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0957V2b_pdf.pdf?__blob=publicationFile&v=1 | |
Description | The Target of Evaluation (TOE) is the product TCOS Smart Meter Security Module Version 1.0 Release 1/P60C144PVA developed by T-Systems International GmbH. The TOE is a Smart Meter Security Module according to the Technical Guideline BSI TR-03109-2, Version 1.1 intended to be used by a Smart Meter Gateway in a Smart Metering System. The TOE serves as cryptographic service provider for the Smart Meter Gateway and supports the Smart Meter Gateway for its specific cryptographic needs. These cryptographic services cover the following issues: Digital Signature Generation, Digital Signature Verification, Key Agreement for TLS, Key Agreement for Content Data Encryption, Key Pair Generation, Random Number Generation, Component Authentication via the PACE Protocol with Negotiation of Session Keys, Secure Messaging, and Secure Storage of Key Material and further data relevant for the Gateway. | |
Subcategory | Security module for an Smart Metering Gateway |
References ?
Updates ?
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The report_references property was updated, with the
{'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0831-V8-2024', 'BSI-DSZ-CC-0831-V9-2024']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0831-V8-2024', 'BSI-DSZ-CC-0831-V9-2024']}}}
data. - The scheme_data property was updated, with the
{'certification_date': '2016-11-18', 'enhanced': {'__update__': {'applicant': 'Deutsche Telekom Security GmbH Untere Industriestraße 20 57250 Netphen', 'certification_date': '2016-11-18', 'expiration_date': '2026-11-17'}}}
data.
- The report_references property was updated, with the
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '998bd15748d1ca2359fcdbb3bb287968e27f6dad0982e89e20dccc1a6e8f6195', 'txt_hash': 'e374f5f87c0e498be7ed75904e3410f87e9b6a3a15ce2509a20df4ddf2ed7677'}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 1152948, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 76, '/Title': 'Security Target TCOS Smart Meter Security Module (NXP)', '/Author': 'T-Systems International GmbH', '/Subject': 'TCOS Smart Meter Security Module Version 1.0 Release 1', '/Keywords': '"TCOS Security Module, Sicherheitsmodul, Smart Meter"', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': "D:20161026142017+02'00'", '/ModDate': "D:20161026142017+02'00'", '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.phy.duke.edu/~rgb/General/dieharder/dieharder-3.31.0.tgz', 'http://csrc.nist.gov/groups/ST/toolkit/rng/documents/sts-2.1.1.zip']}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0978-2016': 1, 'BSI-DSZ-CC-0978': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0077-V2-2015': 2, 'BSI-CC-PP-0035-2007': 1, 'BSI-CC-PP-0073-2014': 1}}, 'cc_security_level': {'EAL': {'EAL4': 4, 'EAL 6+': 1, 'EAL 4': 5, 'EAL 6': 1, 'EAL4 augmented': 3, 'EAL 6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_TDS': 2, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP.1': 3, 'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_PRE.1': 3, 'AGD_OPE.1': 1}, 'ALC': {'ALC_FLR.1': 2, 'ALC_DEL.1': 3, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1, 'ALC_DVS.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1}, 'AVA': {'AVA_VAN.5': 10}, 'ASE': {'ASE_TSS.2': 2}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 1}, 'FCS': {'FCS_RNG': 6, 'FCS_RNG.1': 20, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM': 51, 'FCS_CKM.4': 45, 'FCS_COP': 59, 'FCS_CKM.1': 16, 'FCS_CKM.2': 8, 'FCS_COP.1': 15, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ACF': 2, 'FDP_ACC.2': 17, 'FDP_ACF.1': 9, 'FDP_SDI.2': 8, 'FDP_RIP.1': 7, 'FDP_ETC.1': 7, 'FDP_ITC.1': 20, 'FDP_UCT.1': 8, 'FDP_UIT.1': 7, 'FDP_ITC.2': 14, 'FDP_ACC.1': 13, 'FDP_ACC.2.1': 1, 'FDP_ACC.2.2': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_SDI.1': 1, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_RIP.1.1': 1, 'FDP_IFC': 1, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 1, 'FDP_IFC.1': 8, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_UIT.1.2': 1, 'FDP_ITC': 8, 'FDP_SDI': 1, 'FDP_RIP': 1, 'FDP_UIT': 1, 'FDP_ITT.1': 1}, 'FIA': {'FIA_ATD.1': 10, 'FIA_SOS.1': 3, 'FIA_UAU': 18, 'FIA_UAU.4': 6, 'FIA_UAU.5': 6, 'FIA_UID.1': 14, 'FIA_USB.1': 6, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.1': 5, 'FIA_UAU.4.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_SOS': 1, 'FIA_UID': 1, 'FIA_USB': 1}, 'FMT': {'FMT_LIM': 6, 'FMT_LIM.1': 25, 'FMT_LIM.2': 23, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 2, 'FMT_SMF.1': 10, 'FMT_SMR.1': 6, 'FMT_MSA.3': 6, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMR': 1, 'FMT_MSA.1': 2}, 'FPT': {'FPT_EMS': 6, 'FPT_EMS.1': 15, 'FPT_EMS.1.1': 2, 'FPT_EMS.1.2': 2, 'FPT_FLS.1': 11, 'FPT_PHP.3': 10, 'FPT_TST.1': 7, 'FPT_FLS.1.1': 1, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_FLS': 1, 'FPT_PHP': 1, 'FPT_TST': 1, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC.1': 10, 'FTP_TRP.1': 4, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_ICT.1': 4, 'FTP_ITC': 1}}, 'cc_claims': {'O': {'O.PACE': 5, 'O.RND': 3, 'O.HW_AES': 4, 'O.MEM_ACCESS': 3, 'O.SFR_ACCESS': 3, 'O.FW_HW': 1}, 'T': {'T.RND': 1}, 'OE': {'OE.PACE': 1}, 'OSP': {'OSP.SM': 1}}, 'vendor': {'NXP': {'NXP': 2, 'NXP Semiconductors': 1}}, 'eval_facility': {'TSystems': {'T-Systems International': 79}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 16}}, 'DES': {'DES': {'DES': 4}, '3DES': {'Triple-DES': 2, 'TDES': 3}}, 'constructions': {'MAC': {'CMAC': 4}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 19}, 'ECC': {'ECC': 11}}, 'FF': {'DH': {'DH': 13, 'Diffie-Hellman': 5}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 2}, 'KA': {'Key Agreement': 17}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 28}}, 'PACE': {'PACE': 66}}, 'randomness': {'RNG': {'RND': 4, 'RNG': 8}}, 'cipher_mode': {'CBC': {'CBC': 4}}, 'ecc_curve': {'NIST': {'P-256': 11, 'P-384': 15, 'NIST P-256': 1, 'NIST P-384': 1, 'secp256r1': 1, 'secp384r1': 1}, 'Brainpool': {'brainpoolP256r1': 2, 'brainpoolP384r1': 2, 'brainpoolP512r1': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 4, 'Physical Probing': 2, 'physical probing': 2, 'side channels': 1, 'side channel': 1, 'side-channels': 1, 'SPA': 2, 'DPA': 2, 'timing attacks': 1}, 'FI': {'Physical tampering': 1, 'physical tampering': 5, 'Malfunction': 12, 'malfunction': 3, 'DFA': 1, 'fault injection': 1}}, 'technical_report_id': {'BSI': {'BSI TR-03109': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS186': 10, 'FIPS197': 3, 'FIPS PUB 186-4': 1}, 'BSI': {'AIS36': 3, 'AIS 36': 1}, 'RFC': {'RFC5639': 11, 'RFC 5639': 1}, 'ISO': {'ISO/IEC 7810:2003': 1}, 'X509': {'X.509': 2}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'entities. 72 As these external entities only indirectly interact with the TOE, these entities are out of scope for this ST. 73 During its pre-operational phases the TOE interacts with the Integrator and the': 1}}}
. - The st_filename property was set to
0957V2b_pdf.pdf
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0919-V3-2023', 'BSI-DSZ-CC-0918-V5-2023', 'BSI-DSZ-CC-0918-V3-2022', 'BSI-DSZ-CC-0918-V2-2021', 'BSI-DSZ-CC-0918-2020', 'BSI-DSZ-CC-0918-V4-2022', 'BSI-DSZ-CC-0822-V4-2023', 'BSI-DSZ-CC-0919-V2-2021', 'BSI-DSZ-CC-0918-V6-2024', 'BSI-DSZ-CC-0822-V5-2023']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0919-V3-2023', 'BSI-DSZ-CC-0918-V5-2023', 'BSI-DSZ-CC-0918-V3-2022', 'BSI-DSZ-CC-0918-V2-2021', 'BSI-DSZ-CC-0918-2020', 'BSI-DSZ-CC-0918-V4-2022', 'BSI-DSZ-CC-0822-V4-2023', 'BSI-DSZ-CC-0919-V2-2021', 'BSI-DSZ-CC-0918-V6-2024', 'BSI-DSZ-CC-0822-V5-2023']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0978-2016']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0978-2016']}}
data. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0831-V6-2023', 'BSI-DSZ-CC-0919-V3-2023', 'BSI-DSZ-CC-0918-V5-2023', 'BSI-DSZ-CC-1035-2017', 'BSI-DSZ-CC-0831-V2-2020', 'BSI-DSZ-CC-0831-V3-2021', 'BSI-DSZ-CC-0831-V5-2022', 'BSI-DSZ-CC-0918-V4-2022', 'BSI-DSZ-CC-0919-V2-2021', 'BSI-DSZ-CC-0831-V7-2023', 'BSI-DSZ-CC-0831-V4-2021', 'BSI-DSZ-CC-0918-V6-2024']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0831-V6-2023', 'BSI-DSZ-CC-0919-V3-2023', 'BSI-DSZ-CC-0918-V5-2023', 'BSI-DSZ-CC-1035-2017', 'BSI-DSZ-CC-0831-V2-2020', 'BSI-DSZ-CC-0831-V3-2021', 'BSI-DSZ-CC-0831-V5-2022', 'BSI-DSZ-CC-0918-V4-2022', 'BSI-DSZ-CC-0919-V2-2021', 'BSI-DSZ-CC-0831-V7-2023', 'BSI-DSZ-CC-0831-V4-2021', 'BSI-DSZ-CC-0918-V6-2024']}, 'directly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0978-2016']}}, 'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0666-2012', 'BSI-DSZ-CC-0845-2012', 'BSI-DSZ-CC-0978-2016', 'BSI-DSZ-CC-0845-V2-2013']}}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}]}
values added.
- The st property was updated, with the
-
19.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'a81e03979b196966503ad66d6e000306e08490e0c2459ede7dafab345d272d87', 'txt_hash': 'a2ccef9d4f9794e51c870c876af68ced7cb8e6c0818d17a811994e87f324cacf'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 1139869, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 38, '/Author': 'Bundesamt für Sicherheit ind er Informationstechnik', '/CreationDate': "D:20161202073353+01'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, Smart Meter Security Module"', '/ModDate': "D:20161202075632+01'00'", '/Producer': 'LibreOffice 4.2', '/Subject': 'Common Criteria Certification', '/Title': 'Certification Report BSI-DSZ-CC-0957-V2-2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/', 'https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/', 'http://www.sogisportal.eu/', 'https://www.bsi.bund.de/AIS', 'https://www.bsi.bund.de/zertifizierungsreporte']}}
. - The report_frontpage property was set to
{'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0957-V2-2016', 'cert_item': 'TCOS Smart Meter Security Module Version 1.0 Release 2/P60C144PVE', 'developer': 'T-Systems International GmbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP) - Schutzprofil für das Sicherheitsmodul der Kommunikationseinheit eines intelligenten Messsystems für Stoff- und Energiemengen Version 1.03, 11 December 2014, BSI-CC-PP-0077-V2-2015', 'cc_version': 'PP conformant Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 4 augmented by AVA_VAN.5'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0957-V2-2016': 24, 'BSI-DSZ-CC-0957-2015': 3, 'BSI-DSZ-CC-0978-2016': 5, 'BSI-DSZ-CC-0978': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0077-V2-2015': 4}}, 'cc_security_level': {'EAL': {'EAL 4': 13, 'EAL 5': 10, 'EAL 1': 7, 'EAL 2': 4, 'EAL 5+': 1, 'EAL 6': 4, 'EAL 3': 4, 'EAL 7': 4, 'EAL 4 augmented': 3}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.1': 1, 'ADV_FSP.2': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.5': 1, 'ADV_FSP.6': 1, 'ADV_IMP.1': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_INT.2': 1, 'ADV_INT.3': 1, 'ADV_SPM.1': 1, 'ADV_TDS.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.4': 1, 'ADV_TDS.5': 1, 'ADV_TDS.6': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR': 3, 'ALC_CMC.1': 1, 'ALC_CMC.2': 1, 'ALC_CMC.3': 1, 'ALC_CMC.4': 2, 'ALC_CMC.5': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 2, 'ALC_CMS.5': 1, 'ALC_DEL.1': 2, 'ALC_DVS.1': 2, 'ALC_DVS.2': 1, 'ALC_FLR.1': 1, 'ALC_FLR.2': 1, 'ALC_FLR.3': 1, 'ALC_LCD.1': 2, 'ALC_LCD.2': 1, 'ALC_TAT.1': 2, 'ALC_TAT.2': 1, 'ALC_TAT.3': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_COV.2': 1, 'ATE_COV.3': 1, 'ATE_DPT.1': 1, 'ATE_DPT.2': 1, 'ATE_DPT.3': 1, 'ATE_DPT.4': 1, 'ATE_FUN.1': 1, 'ATE_FUN.2': 1, 'ATE_IND.1': 1, 'ATE_IND.2': 1, 'ATE_IND.3': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 6, 'AVA_VAN.1': 1, 'AVA_VAN.2': 1, 'AVA_VAN.3': 1, 'AVA_VAN.4': 1, 'AVA_VAN': 2}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {'FCS': {'FCS_COP': 6, 'FCS_CKM': 4, 'FCS_RNG.1': 1}, 'FIA': {'FIA_UID.1': 1, 'FIA_UAU.4': 1, 'FIA_UAU.5': 1}, 'FTP': {'FTP_ITC.1': 1}}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP': 11, 'NXP Semiconductors': 4}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 1}, 'SRC': {'SRC Security Research & Consulting': 3}, 'TSystems': {'T-Systems International': 13}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 6}}, 'constructions': {'MAC': {'CMAC': 3}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 6}, 'ECC': {'ECC': 3}}, 'FF': {'DH': {'DH': 2, 'Diffie-Hellman': 2}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 3}, 'KA': {'Key Agreement': 8, 'KA': 1}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 6}}, 'PACE': {'PACE': 7}}, 'randomness': {'RNG': {'RNG': 2}}, 'cipher_mode': {'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX2': 2}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 2}, 'FI': {'malfunction': 1, 'fault injection': 2}, 'other': {'JIL': 2}}, 'technical_report_id': {'BSI': {'BSI TR-03109-2': 1, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 180-2': 2, 'FIPS 186': 5, 'FIPS 197': 2}, 'BSI': {'AIS 34': 2, 'AIS 36': 5, 'AIS 26': 3, 'AIS 25': 1, 'AIS 20': 3, 'AIS 1': 1, 'AIS 31': 1, 'AIS 32': 1, 'AIS 46': 1}, 'RFC': {'RFC 5639': 5}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, '1.0 Release 2/P60C144PVE, Version 1.2, 27 October 2016, SRC Security Research & Consulting GmbH (confidential document) 9 specifically • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung': 1, 'Version 1.0 Release 2/P60C144PVE, Version 1.3, 25 October 2016, T-Systems International GmbH (confidential document) [10] Guidance Documentation BSI-DSZ-CC-0957-V2-2016, Operational Guidance for users and': 1, 'Y/B/X)/yVE, BSI-DSZ-CC-0978, Version 2, 17 December 2015, TÜV Informationstechnik GmbH (confidential document) [14] Product Data Sheet, SmartMX2 family P60x080/144 VA/VE, Secure high performance smart card': 1}}}
. - The report_filename property was set to
0957V2a_pdf.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['BSI']
. - The cert_id property was set to
BSI-DSZ-CC-0957-V2-2016
. - The report_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0957-2015']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0957-2015']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}
values added. - The scheme_data property was set to
{'cert_id': 'BSI-DSZ-CC-0957-V2-2016', 'product': 'TCOS Smart Meter Security Module Version 1.0 Release 2/P60C144PVE', 'vendor': 'Deutsche Telekom Security GmbH', 'certification_date': '18.11.2016', 'category': 'Intelligent measuring systems', 'url': 'https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Smartmeter_Sicherheitsmodule/0957_0957V2_0957V2RA1.html', 'enhanced': {'product': 'TCOS Smart Meter Security Module Version 1.0 Release 2/P60C144PVE', 'applicant': 'Deutsche Telekom Security GmbH\nUntere Industriestraße 20\n57250 Netphen', 'evaluation_facility': 'SRC Security Research & Consulting GmbH', 'assurance_level': 'EAL4+,AVA_VAN.5', 'protection_profile': 'Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP) - Schutzprofil für das Sicherheitsmodul der Kommunikationseinheit eines intelligenten Messsystems für Stoff- und Energiemengen Version 1.03, 11 December 2014, BSI-CC-PP-0077-V2-2015', 'certification_date': '18.11.2016', 'expiration_date': '17.11.2026', 'entries': [{'id': 'BSI-DSZ-CC-0957-V2-2016-RA-01 (Ausstellungsdatum / Certification Date 27.09.2021)', 'description': 'Re-Assessment'}, {'id': 'BSI-DSZ-CC-0957-V2-2016 (Ausstellungsdatum / Certification Date 18.11.2016, gültig bis / valid until 17.11.2026)', 'description': 'TCOS Smart Meter Security Module Version 1.0 Release 2/P60C144PVE'}, {'id': 'BSI-DSZ-CC-0957-2015 (Ausstellungsdatum / Certification Date 09.02.2015, gültig bis / valid until 09.02.2025)', 'description': 'Security Target'}], 'report_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0957V2a_pdf.pdf?__blob=publicationFile&v=1', 'target_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0957V2b_pdf.pdf?__blob=publicationFile&v=1', 'description': 'The Target of Evaluation (TOE) is the product TCOS Smart Meter Security Module Version 1.0 Release 1/P60C144PVA developed by T-Systems International GmbH. The TOE is a Smart Meter Security Module according to the Technical Guideline BSI TR-03109-2, Version 1.1 intended to be used by a Smart Meter Gateway in a Smart Metering System. The TOE serves as cryptographic service provider for the Smart Meter Gateway and supports the Smart Meter Gateway for its specific cryptographic needs. These cryptographic services cover the following issues: Digital Signature Generation, Digital Signature Verification, Key Agreement for TLS, Key Agreement for Content Data Encryption, Key Pair Generation, Random Number Generation, Component Authentication via the PACE Protocol with Negotiation of Session Keys, Secure Messaging, and Secure Storage of Key Material and further data relevant for the Gateway.'}, 'subcategory': 'Security module for an Smart Metering Gateway'}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0957V2a_pdf.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0957V2b_pdf.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The st_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None}
data. - The report_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}
values discarded. - The scheme_data property was set to
None
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0918-V2-2021', 'BSI-DSZ-CC-0918-V5-2023']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0918-V2-2021', 'BSI-DSZ-CC-0918-V5-2023']}}, 'directly_referencing': None, 'indirectly_referencing': None}
data. - The report_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0831-V6-2023', 'BSI-DSZ-CC-0831-V5-2022', 'BSI-DSZ-CC-0831-V7-2023']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0831-V6-2023', 'BSI-DSZ-CC-0831-V5-2022', 'BSI-DSZ-CC-0831-V7-2023']}}, 'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0957-2015']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0666-2012', 'BSI-DSZ-CC-0845-2012', 'BSI-DSZ-CC-0957-2015', 'BSI-DSZ-CC-0845-V2-2013']}}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}]}
values added.
- The st property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name TCOS Smart Meter Security Module Version 1.0 Release 1/P60C144PVA was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "6c674f76d69001ee",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0957-V2-2016",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.0"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0918-V4-2022",
"BSI-DSZ-CC-0919-V2-2021",
"BSI-DSZ-CC-0831-V9-2024",
"BSI-DSZ-CC-0831-V5-2022",
"BSI-DSZ-CC-0831-V3-2021",
"BSI-DSZ-CC-0831-V7-2023",
"BSI-DSZ-CC-0831-V4-2021",
"BSI-DSZ-CC-1035-2017",
"BSI-DSZ-CC-0831-V8-2024",
"BSI-DSZ-CC-0831-V2-2020",
"BSI-DSZ-CC-0831-V6-2023",
"BSI-DSZ-CC-0918-V5-2023",
"BSI-DSZ-CC-0918-V6-2024",
"BSI-DSZ-CC-0919-V3-2023"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0957-2015",
"BSI-DSZ-CC-0978-2016"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0918-V4-2022",
"BSI-DSZ-CC-0919-V2-2021",
"BSI-DSZ-CC-0831-V9-2024",
"BSI-DSZ-CC-0831-V5-2022",
"BSI-DSZ-CC-0831-V3-2021",
"BSI-DSZ-CC-0831-V7-2023",
"BSI-DSZ-CC-0831-V4-2021",
"BSI-DSZ-CC-1035-2017",
"BSI-DSZ-CC-0831-V8-2024",
"BSI-DSZ-CC-0831-V2-2020",
"BSI-DSZ-CC-0831-V6-2023",
"BSI-DSZ-CC-0918-V5-2023",
"BSI-DSZ-CC-0918-V6-2024",
"BSI-DSZ-CC-0919-V3-2023"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0845-V2-2013",
"BSI-DSZ-CC-0666-2012",
"BSI-DSZ-CC-0978-2016",
"BSI-DSZ-CC-0957-2015",
"BSI-DSZ-CC-0845-2012"
]
}
},
"scheme_data": {
"category": "Intelligent measuring systems",
"cert_id": "BSI-DSZ-CC-0957-V2-2016",
"certification_date": "2016-11-18",
"enhanced": {
"applicant": "Deutsche Telekom Security GmbH Untere Industriestra\u00dfe 20 57250 Netphen",
"assurance_level": "EAL4+,AVA_VAN.5",
"certification_date": "2016-11-18",
"description": "The Target of Evaluation (TOE) is the product TCOS Smart Meter Security Module Version 1.0 Release 1/P60C144PVA developed by T-Systems International GmbH. The TOE is a Smart Meter Security Module according to the Technical Guideline BSI TR-03109-2, Version 1.1 intended to be used by a Smart Meter Gateway in a Smart Metering System. The TOE serves as cryptographic service provider for the Smart Meter Gateway and supports the Smart Meter Gateway for its specific cryptographic needs. These cryptographic services cover the following issues: Digital Signature Generation, Digital Signature Verification, Key Agreement for TLS, Key Agreement for Content Data Encryption, Key Pair Generation, Random Number Generation, Component Authentication via the PACE Protocol with Negotiation of Session Keys, Secure Messaging, and Secure Storage of Key Material and further data relevant for the Gateway.",
"entries": [
{
"description": "Re-Assessment",
"id": "BSI-DSZ-CC-0957-V2-2016-RA-01 (Ausstellungsdatum / Certification Date 27.09.2021)"
},
{
"description": "TCOS Smart Meter Security Module Version 1.0 Release 2/P60C144PVE",
"id": "BSI-DSZ-CC-0957-V2-2016 (Ausstellungsdatum / Certification Date 18.11.2016, g\u00fcltig bis / valid until 17.11.2026)"
},
{
"description": "Security Target",
"id": "BSI-DSZ-CC-0957-2015 (Ausstellungsdatum / Certification Date 09.02.2015, g\u00fcltig bis / valid until 09.02.2025)"
}
],
"evaluation_facility": "SRC Security Research \u0026 Consulting GmbH",
"expiration_date": "2026-11-17",
"product": "TCOS Smart Meter Security Module Version 1.0 Release 2/P60C144PVE",
"protection_profile": "Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP) - Schutzprofil f\u00fcr das Sicherheitsmodul der Kommunikationseinheit eines intelligenten Messsystems f\u00fcr Stoff- und Energiemengen Version 1.03, 11 December 2014, BSI-CC-PP-0077-V2-2015",
"report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0957V2a_pdf.pdf?__blob=publicationFile\u0026v=1",
"target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0957V2b_pdf.pdf?__blob=publicationFile\u0026v=1"
},
"product": "TCOS Smart Meter Security Module Version 1.0 Release 2/P60C144PVE",
"subcategory": "Security module for an Smart Metering Gateway",
"url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Smartmeter_Sicherheitsmodule/0957_0957V2_0957V2RA1.html",
"vendor": "Deutsche Telekom Security GmbH"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0918-V3-2022",
"BSI-DSZ-CC-0918-V4-2022",
"BSI-DSZ-CC-0919-V2-2021",
"BSI-DSZ-CC-0918-V2-2021",
"BSI-DSZ-CC-0822-V5-2023",
"BSI-DSZ-CC-0822-V4-2023",
"BSI-DSZ-CC-0918-V5-2023",
"BSI-DSZ-CC-0918-V6-2024",
"BSI-DSZ-CC-0919-V3-2023",
"BSI-DSZ-CC-0918-2020"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0978-2016"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0918-V3-2022",
"BSI-DSZ-CC-0918-V4-2022",
"BSI-DSZ-CC-0919-V2-2021",
"BSI-DSZ-CC-0918-V2-2021",
"BSI-DSZ-CC-0822-V5-2023",
"BSI-DSZ-CC-0822-V4-2023",
"BSI-DSZ-CC-0918-V5-2023",
"BSI-DSZ-CC-0918-V6-2024",
"BSI-DSZ-CC-0919-V3-2023",
"BSI-DSZ-CC-0918-2020"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0978-2016"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "T-Systems International GMBH",
"manufacturer_web": "https://www.t-systems.de/",
"name": "TCOS Smart Meter Security Module Version 1.0 Release 1/P60C144PVA",
"not_valid_after": "2026-11-18",
"not_valid_before": "2016-11-18",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0957V2a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by AVA_VAN.5",
"cc_version": "PP conformant Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-0957-V2-2016",
"cert_item": "TCOS Smart Meter Security Module Version 1.0 Release 2/P60C144PVE",
"cert_lab": "BSI",
"developer": "T-Systems International GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP) - Schutzprofil f\u00fcr das Sicherheitsmodul der Kommunikationseinheit eines intelligenten Messsystems f\u00fcr Stoff- und Energiemengen Version 1.03, 11 December 2014, BSI-CC-PP-0077-V2-2015"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 3
},
"ECDSA": {
"ECDSA": 6
}
},
"FF": {
"DH": {
"DH": 2,
"Diffie-Hellman": 2
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0957-2015": 3,
"BSI-DSZ-CC-0957-V2-2016": 24,
"BSI-DSZ-CC-0978": 2,
"BSI-DSZ-CC-0978-2016": 5
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0077-V2-2015": 4
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 1,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 1,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 2,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 2,
"ALC_CMS.5": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 2,
"ALC_DVS": 1,
"ALC_DVS.1": 2,
"ALC_DVS.2": 1,
"ALC_FLR": 3,
"ALC_FLR.1": 1,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 2,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 2,
"ALC_TAT.2": 1,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_COV.3": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 1,
"ATE_DPT.4": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND": 1,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 7,
"EAL 2": 4,
"EAL 3": 4,
"EAL 4": 13,
"EAL 4 augmented": 3,
"EAL 5": 10,
"EAL 5+": 1,
"EAL 6": 4,
"EAL 7": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM": 4,
"FCS_COP": 6,
"FCS_RNG.1": 1
},
"FIA": {
"FIA_UAU.4": 1,
"FIA_UAU.5": 1,
"FIA_UID.1": 1
},
"FTP": {
"FTP_ITC.1": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"1.0 Release 2/P60C144PVE, Version 1.2, 27 October 2016, SRC Security Research \u0026 Consulting GmbH (confidential document) 9 specifically \u2022 AIS 1, Version 13, Durchf\u00fchrung der Ortsbesichtigung in der Entwicklungsumgebung": 1,
"Version 1.0 Release 2/P60C144PVE, Version 1.3, 25 October 2016, T-Systems International GmbH (confidential document) [10] Guidance Documentation BSI-DSZ-CC-0957-V2-2016, Operational Guidance for users and": 1,
"Y/B/X)/yVE, BSI-DSZ-CC-0978, Version 2, 17 December 2015, T\u00dcV Informationstechnik GmbH (confidential document) [14] Product Data Sheet, SmartMX2 family P60x080/144 VA/VE, Secure high performance smart card": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 3
}
},
"cplc_data": {},
"crypto_engine": {
"SmartMX": {
"SmartMX2": 2
}
},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 7
},
"TLS": {
"TLS": {
"TLS": 6
}
}
},
"crypto_scheme": {
"KA": {
"KA": 1,
"Key Agreement": 8
},
"MAC": {
"MAC": 3
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"SRC": {
"SRC Security Research \u0026 Consulting": 3
},
"TSystems": {
"T-Systems International": 13
},
"TUV": {
"T\u00dcV Informationstechnik": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 2
}
},
"side_channel_analysis": {
"FI": {
"fault injection": 2,
"malfunction": 1
},
"SCA": {
"side channel": 2
},
"other": {
"JIL": 2
}
},
"standard_id": {
"BSI": {
"AIS 1": 1,
"AIS 20": 3,
"AIS 25": 1,
"AIS 26": 3,
"AIS 31": 1,
"AIS 32": 1,
"AIS 34": 2,
"AIS 36": 5,
"AIS 46": 1
},
"FIPS": {
"FIPS 180-2": 2,
"FIPS 186": 5,
"FIPS 197": 2
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
},
"RFC": {
"RFC 5639": 5
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 6
}
},
"constructions": {
"MAC": {
"CMAC": 3
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7148": 1,
"BSI TR-03109-2": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 11,
"NXP Semiconductors": 4
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit ind er Informationstechnik",
"/CreationDate": "D:20161202073353+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Smart Meter Security Module\"",
"/ModDate": "D:20161202075632+01\u002700\u0027",
"/Producer": "LibreOffice 4.2",
"/Subject": "Common Criteria Certification",
"/Title": "Certification Report BSI-DSZ-CC-0957-V2-2016",
"pdf_file_size_bytes": 1139869,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.bsi.bund.de/AIS",
"http://www.sogisportal.eu/",
"https://www.bsi.bund.de/zertifizierungsreporte",
"https://www.bsi.bund.de/zertifizierung",
"https://www.bsi.bund.de/",
"http://www.commoncriteriaportal.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 38
},
"st_filename": "0957V2b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 11
},
"ECDH": {
"ECDH": 1
},
"ECDSA": {
"ECDSA": 19
}
},
"FF": {
"DH": {
"DH": 13,
"Diffie-Hellman": 5
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0978": 1,
"BSI-DSZ-CC-0978-2016": 1
}
},
"cc_claims": {
"O": {
"O.FW_HW": 1,
"O.HW_AES": 4,
"O.MEM_ACCESS": 3,
"O.PACE": 5,
"O.RND": 3,
"O.SFR_ACCESS": 3
},
"OE": {
"OE.PACE": 1
},
"OSP": {
"OSP.SM": 1
},
"T": {
"T.RND": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0035-2007": 1,
"BSI-CC-PP-0073-2014": 1,
"BSI-CC-PP-0077-V2-2015": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 3,
"ADV_TDS": 2,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 3
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 3,
"ALC_DVS.1": 1,
"ALC_FLR.1": 2,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_TSS.2": 2
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1
},
"AVA": {
"AVA_VAN.5": 10
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 5,
"EAL 6": 1,
"EAL 6 augmented": 1,
"EAL 6+": 1,
"EAL4": 4,
"EAL4 augmented": 3
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 1
},
"FCS": {
"FCS_CKM": 51,
"FCS_CKM.1": 16,
"FCS_CKM.2": 8,
"FCS_CKM.4": 45,
"FCS_CKM.4.1": 1,
"FCS_COP": 59,
"FCS_COP.1": 15,
"FCS_RNG": 6,
"FCS_RNG.1": 20,
"FCS_RNG.1.1": 2,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC.1": 13,
"FDP_ACC.2": 17,
"FDP_ACC.2.1": 1,
"FDP_ACC.2.2": 1,
"FDP_ACF": 2,
"FDP_ACF.1": 9,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_ETC.1": 7,
"FDP_ETC.1.1": 1,
"FDP_ETC.1.2": 1,
"FDP_IFC": 1,
"FDP_IFC.1": 8,
"FDP_ITC": 8,
"FDP_ITC.1": 20,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_ITC.2": 14,
"FDP_ITT.1": 1,
"FDP_RIP": 1,
"FDP_RIP.1": 7,
"FDP_RIP.1.1": 1,
"FDP_SDI": 1,
"FDP_SDI.1": 1,
"FDP_SDI.2": 8,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UCT.1": 8,
"FDP_UIT": 1,
"FDP_UIT.1": 7,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_ATD.1": 10,
"FIA_ATD.1.1": 1,
"FIA_SOS": 1,
"FIA_SOS.1": 3,
"FIA_SOS.1.1": 1,
"FIA_UAU": 18,
"FIA_UAU.1": 5,
"FIA_UAU.4": 6,
"FIA_UAU.4.1": 1,
"FIA_UAU.5": 6,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UID": 1,
"FIA_UID.1": 14,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_USB": 1,
"FIA_USB.1": 6,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_LIM": 6,
"FMT_LIM.1": 25,
"FMT_LIM.1.1": 2,
"FMT_LIM.2": 23,
"FMT_LIM.2.1": 2,
"FMT_MSA.1": 2,
"FMT_MSA.3": 6,
"FMT_SMF.1": 10,
"FMT_SMF.1.1": 1,
"FMT_SMR": 1,
"FMT_SMR.1": 6,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_EMS": 6,
"FPT_EMS.1": 15,
"FPT_EMS.1.1": 2,
"FPT_EMS.1.2": 2,
"FPT_FLS": 1,
"FPT_FLS.1": 11,
"FPT_FLS.1.1": 1,
"FPT_ITT.1": 1,
"FPT_PHP": 1,
"FPT_PHP.3": 10,
"FPT_PHP.3.1": 1,
"FPT_TST": 1,
"FPT_TST.1": 7,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FRU": {
"FRU_FLT.2": 1
},
"FTP": {
"FTP_ICT.1": 4,
"FTP_ITC": 1,
"FTP_ITC.1": 10,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 4
}
},
"certification_process": {
"OutOfScope": {
"entities. 72 As these external entities only indirectly interact with the TOE, these entities are out of scope for this ST. 73 During its pre-operational phases the TOE interacts with the Integrator and the": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 4
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 66
},
"TLS": {
"TLS": {
"TLS": 28
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 17
},
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {
"Brainpool": {
"brainpoolP256r1": 2,
"brainpoolP384r1": 2,
"brainpoolP512r1": 2
},
"NIST": {
"NIST P-256": 1,
"NIST P-384": 1,
"P-256": 11,
"P-384": 15,
"secp256r1": 1,
"secp384r1": 1
}
},
"eval_facility": {
"TSystems": {
"T-Systems International": 79
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 4,
"RNG": 8
}
},
"side_channel_analysis": {
"FI": {
"DFA": 1,
"Malfunction": 12,
"Physical tampering": 1,
"fault injection": 1,
"malfunction": 3,
"physical tampering": 5
},
"SCA": {
"DPA": 2,
"Leak-Inherent": 4,
"Physical Probing": 2,
"SPA": 2,
"physical probing": 2,
"side channel": 1,
"side channels": 1,
"side-channels": 1,
"timing attacks": 1
}
},
"standard_id": {
"BSI": {
"AIS 36": 1,
"AIS36": 3
},
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 2,
"CCMB-2012-09-004": 2
},
"FIPS": {
"FIPS PUB 186-4": 1,
"FIPS186": 10,
"FIPS197": 3
},
"ISO": {
"ISO/IEC 7810:2003": 1
},
"RFC": {
"RFC 5639": 1,
"RFC5639": 11
},
"X509": {
"X.509": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 16
}
},
"DES": {
"3DES": {
"TDES": 3,
"Triple-DES": 2
},
"DES": {
"DES": 4
}
},
"constructions": {
"MAC": {
"CMAC": 4
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-03109": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 2,
"NXP Semiconductors": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "T-Systems International GmbH",
"/CreationDate": "D:20161026142017+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/Keywords": "\"TCOS Security Module, Sicherheitsmodul, Smart Meter\"",
"/ModDate": "D:20161026142017+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Subject": "TCOS Smart Meter Security Module Version 1.0 Release 1",
"/Title": "Security Target TCOS Smart Meter Security Module (NXP)",
"pdf_file_size_bytes": 1152948,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.phy.duke.edu/~rgb/General/dieharder/dieharder-3.31.0.tgz",
"http://csrc.nist.gov/groups/ST/toolkit/rng/documents/sts-2.1.1.zip"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 76
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0077V2b_pdf.pdf",
"pp_name": "Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP) - ..."
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0957V2a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0957V2b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "a81e03979b196966503ad66d6e000306e08490e0c2459ede7dafab345d272d87",
"txt_hash": "a2ccef9d4f9794e51c870c876af68ced7cb8e6c0818d17a811994e87f324cacf"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "998bd15748d1ca2359fcdbb3bb287968e27f6dad0982e89e20dccc1a6e8f6195",
"txt_hash": "e374f5f87c0e498be7ed75904e3410f87e9b6a3a15ce2509a20df4ddf2ed7677"
}
},
"status": "active"
}