Digital Tachograph EFAS-4.10 V05.00

CSV information ?

Status active
Valid from 25.09.2019
Valid until 25.09.2024
Scheme 🇩🇪 DE
Manufacturer intellic GmbH
Category Other Devices and Systems
Security level EAL4+, AVA_VAN.5, ATE_DPT.2

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-1117-2019

Certificate ?

Extracted keywords

Security level
EAL 4, EAL 5, EAL 2, EAL 4 augmented
Security Assurance Requirements (SAR)
ALC_FLR, ATE_DPT.2, AVA_VAN.5
Protection profiles
BSI-CC-PP-0094-2017
Certificates
BSI-DSZ-CC-1117-2019

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Title Certificate BSI-DSZ-CC-1117-2019
Subject Certificate Digital Tachograph EFAS-4.10 V05.00
Keywords "Common Criteria, Certification, Zertifizierung, "
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20191017115054+02'00'
Modification date D:20191017122955+02'00'
Pages 1
Creator Writer
Producer LibreOffice 6.2

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES, CMAC
Randomness
RNG
Block cipher modes
ECB

Vendor
Infineon Technologies AG, Infineon

Security level
EAL 4, EAL 5, EAL 2, EAL 1, EAL 2+, EAL 5+, EAL 6, EAL6, EAL6+, EAL 4 augmented, EAL6 augmented
Security Assurance Requirements (SAR)
ALC_FLR, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_DPT.2, AVA_VAN.5
Protection profiles
BSI-CC-PP-0094-2017, BSI-CC-PP- 0094-2017
Certificates
BSI-DSZ-CC-1117-2019, BSI-DSZ-CC-1055-2018
Evaluation facilities
TÜV Informationstechnik, SRC Security Research & Consulting
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, 08.2019, intellic Germany GmbH [7] Evaluation Technical Report, Version 1.1, 20.09.2019, SRC GmbH, (confidential document) [8] Digital Tachograph - Vehicle Unit (VU PP) Version 1.0, 9 May 2017, BSI-CC-PP- 0094-2017 [9, Version 04, Approved, 02.09.2019 file name: 1250-111-SEC-DE04_APPR_Konfigurationsliste.docx (confidential document) [12] Bedienungsanleitung Smart Tachograph EFAS-4.10, INTELLIC, Version 01, 2019, file name, COMP) - M7892 G12 and D11- BSI-DSZ-CC-0891-V3, TÜV Informationstechnik GmbH, Version 1, 2017-11-29 (confidential document) 21 / 25 Certification Report BSI-DSZ-CC-1117-2019 C. Excerpts from the Criteria For the meaning

Side-channel analysis
JIL
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, 08.2019, intellic Germany GmbH [7] Evaluation Technical Report, Version 1.1, 20.09.2019, SRC GmbH, (confidential document) [8] Digital Tachograph - Vehicle Unit (VU PP) Version 1.0, 9 May 2017, BSI-CC-PP- 0094-2017 [9, Version 04, Approved, 02.09.2019 file name: 1250-111-SEC-DE04_APPR_Konfigurationsliste.docx (confidential document) [12] Bedienungsanleitung Smart Tachograph EFAS-4.10, INTELLIC, Version 01, 2019, file name, COMP) - M7892 G12 and D11- BSI-DSZ-CC-0891-V3, TÜV Informationstechnik GmbH, Version 1, 2017-11-29 (confidential document) 21 / 25 Certification Report BSI-DSZ-CC-1117-2019 C. Excerpts from the Criteria For the meaning

Standards
AIS 34, AIS 36, AIS 25, AIS 26, AIS 20, AIS 31, AIS 32, AIS 35, AIS 38, AIS 40, AIS 46, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065
Technical reports
BSI TR-02102, BSI 7148

File metadata

Title Certification Report BSI-DSZ-CC-1117-2019
Subject Certification Report Digital Tachograph EFAS-4.10 V05.00 Intellic GmbH
Keywords "Common Criteria, Certification, Zertifizierung, "
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20191017115114+02'00'
Modification date D:20191018121359+02'00'
Pages 25
Creator Writer
Producer LibreOffice 6.2

Frontpage

Certificate ID BSI-DSZ-CC-1117-2019
Certified item Digital Tachograph EFAS-4.10 V05.00
Certification lab BSI
Developer Intellic GmbH

References

Outgoing

Security target ?

Extracted keywords

Symmetric Algorithms
AES, AES-, AES-128, AES-192, AES-256, DES, TDES, Triple-DES, KMAC, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC
Hash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA-2
Schemes
MAC
Randomness
TRNG, PRNG, RNG, RND
Elliptic Curves
P-256, P-384, P-521, NIST P-256, NIST P-384, NIST P-521, secp256r1, secp384r1, secp521r1, brainpoolP256r1, brainpoolP384r1, brainpoolP512r1
Block cipher modes
ECB, CBC, GCM

Security level
EAL4, EAL 6, EAL6, EAL6+, EAL4 augmented, EAL 6 augmented, EAL6 augmented
Claims
O.RND, O.TDES, O.AES, O.SHA, OE.EOL
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_TDS.3, ADV_FSP.4, ADV_IMP.1, ADV_ARC, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_DPT.2, ATE_FUN.1, ATE_DPT.1, ATE_COV.2, ATE_IND.2, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1, FAU_GEN.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.4, FAU_STG.3, FAU_STG.4.1, FAU_SAS.1, FCO_NRO.1, FCO_NRO.1.1, FCO_NRO.1.2, FCO_NRO.1.3, FCS_COP.1, FCS_COP, FCS_RNG, FCS_RNG.1, FCS_CKM.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.4, FCS_CKM, FCS_CKM.2, FCS_CKM.1.1, FCS_CKM.4.1, FCS_CKM.2.1, FCS_COP.1.1, FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ACC, FDP_ACF, FDP_ETC.2, FDP_IFC.1, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_ITC.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_ITC.2, FDP_ITC.2.1, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITC.2.5, FDP_ITC, FDP_ITT.1, FDP_ITT.1.1, FDP_RIP.1, FDP_RIP.1.1, FDP_RIP, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_MSA.3, FDP_SDI.1, FIA_SOS.2, FIA_UID.1, FIA_AFL.1, FIA_UAU.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1, FIA_ATD.1.1, FIA_UAU.3, FIA_UAU.3.1, FIA_UAU.3.2, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_UAU.6.1, FIA_UID.2, FIA_UID.2.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.2, FIA_UAU.2.1, FIA_API.1, FMT_MSA.3, FMT_MSA.1, FMT_SMR.1, FMT_SMF.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MOF.1, FMT_MOF.1.1, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_LIM.1, FMT_LIM.2, FMT_LIM, FPT_STM.1, FPT_TDC.1, FPT_FLS.1, FPT_FLS.1.1, FPT_PHP.2, FPT_PHP.1, FPT_PHP.2.1, FPT_PHP.2.2, FPT_PHP.2.3, FPT_PHP.3, FPT_PHP.3.1, FPT_STM.1.1, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_TDC, FPT_TDC.1.1, FPT_TDC.1.2, FRU_FLT.2, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3
Protection profiles
BSI-CC-PP-0094-2017, BSI-CC-PP-0094-, BSI-CC-PP- 0094-2017, BSI-CC-PP-0094
Certificates
BSI-DSZ-CC-1117
Evaluation facilities
SRC Security Research & Consulting
Certification process
Out of scope, downloaded data files RSA Generated by VU manufacturer at the end of the manufacturing phase Out of scope of this ST. Made unavailable when the VU has reached end of life VU non- volatile memory EUR.PK, 22 RSA Generated by ERCA; inserted in VU by VU manufacturer at the end of the manufacturing phase Out of scope of this ST Not applicable VU non- volatile memory Card.PK (conditional, possibly multiple) Card, by card or card- Manufacturer; obtained by VU in card certificate during mutual authentication Out of scope of this ST Not applicable VU non- volatile memory MS.PK (conditional, possibly multiple) Public key, foreign) MSCA; obtained by VU in MS certificate presented by a card during mutual authentication Out of scope of this ST Not applicable VU non- volatile memory Table 20 - First-generation asymmetric keys, 25. ECC Generated by ERCA; inserted in VU by manufacturer at the end of the manufacturing phase Out of scope of this ST Not applicable VU non-volatile memory EUR.PK (previous) The previous public key of ERCA, 25 ECC Generated by ERCA; inserted in VU by manufacturer at the end of the manufacturing phase Out of scope of this ST Not applicable VU non-volatile memory (conditional; only present if existing at time of, C as part of the EUR.Link.C; obtained by VU during mutual authentication towards such card or EGF Out of scope of this ST Not applicable VU general non- volatile memory (conditional; only if the VU has, by card or card manufacturer; obtained by VU in card certificate during mutual authentication Out of scope of this ST Not applicable VU non-volatile memory(conditional, possibly multiple) EGF_MA.PK EGF, obtained by VU in EGF certificate during mutual authentication as part of the coupling process Out of scope of this ST Not applicable VU non-volatile memory (conditional, possibly multiple) MSCA_Card.PK, 25 ECC Generated by MSCA ; obtained by VU in MSCA_Card certificate during mutual authentication Out of scope of this ST Not applicable VU non-volatile memory (conditional, possibly multiple) MSCA_VU- EGF.PK, 25. ECC Generated by MSCA ; obtained by VU in MSCA_VU-EGF certificate during coupling to an EGF Out of scope of this ST Not applicable VU non-volatile memory (conditional, possibly multiple) Table 23 -, phase. Note: as explained in [5] Annex 1C, Appendix 11, section 12.2, a VU contains only one KM-VU. Out of scope of this ST Made unavailable when the VU has reached end of life VU non- volatile memory KM-WC, key generations). However, a VU will retrieve only one of these keys during the pairing process. Out of scope of this ST Made unavailable at the latest by end of calibration phase Not permanently stored; only, under KM) at the end of the manufacturing phase; obtained and decrypted by VU during pairing Out of scope of this ST Made unavailable at the latest by end of calibration phase Not permanently stored; only, received from VU manufacturer; inserted by VU manufacturer at the end of the manufacturing phase Out of scope of this ST Made unavailable when the VU has reached end of life VU non- volatile memory K_VUDSRC, received from VU manufacturer; inserted by VU manufacturer at the end of the manufacturing phase Out of scope of this ST Made unavailable when the VU has reached end of life VU non- volatile memory Table 24 -, VU personalization AES Generated by the VU manufacturer at the end of the manufacturing phase Out of scope for this ST Not applicable. VU SC non- volatile memory K_Depers Key for de- personalizat ion VU, personalization request AES Derived by the VU from the SeedVu at the end of the manufacturing phase Out of scope for this ST Not applicable. VU SC non- volatile memory KCOMP SW Update: Key for MAC of compatibilit, of the SW update compatibility header AES Generated by the VU manufacturer once for a product line Out of scope for this ST Made unavailable when the VU has reached end of life VU SC non- volatile memory, SW update credentials AES Derived by the VU from the SeedVu at the end of the manufacturing phase Out of scope for this ST Made unavailable when the VU has reached end of life VU SC non- volatile memory, during SW update AES Generated by the VU manufacturer before distribution of a SW update package Out of scope for this ST Made unavailable at the end of the SW update process VU SC non- volatile memory, downloaded logging data. ECC Generated by the VU manufacturer at the end of the manufacturing phase Out of scope for this ST Not applicable. VU SC non- volatile memory K_ErrorLog_E nc ErrorLog: Key for download, downloaded logging data. AES Generated by the VU manufacturer at the end of the manufacturing phase Out of scope for this ST Not applicable. VU SC non- volatile memory K_ErrorLog_ MC ErrorLog: Key for MC data, stored in the MC memory. AES Generated by the VU manufacturer at the end of the manufacturing phase Out of scope for this ST Not applicable. VU MC non- volatile memory K_DataSe_M AC Data storage: Key VU specific, used by the VU to ensure AES Generated by the VU at the end of the manufacturing Out of scope for this ST Not applicable. VU SC non- Security Target EFAS-4.10 document number version author, data stored in the MC flash memory. AES Generated by the VU at the end of the manufacturing phase Out of scope for this ST Not applicable. VU SC non- volatile memory Table 26: Manufacturer specific keys and

Side-channel analysis
Leak-Inherent, physical tampering, Malfunction, reverse engineering, JIL
Certification process
Out of scope, downloaded data files RSA Generated by VU manufacturer at the end of the manufacturing phase Out of scope of this ST. Made unavailable when the VU has reached end of life VU non- volatile memory EUR.PK, 22 RSA Generated by ERCA; inserted in VU by VU manufacturer at the end of the manufacturing phase Out of scope of this ST Not applicable VU non- volatile memory Card.PK (conditional, possibly multiple) Card, by card or card- Manufacturer; obtained by VU in card certificate during mutual authentication Out of scope of this ST Not applicable VU non- volatile memory MS.PK (conditional, possibly multiple) Public key, foreign) MSCA; obtained by VU in MS certificate presented by a card during mutual authentication Out of scope of this ST Not applicable VU non- volatile memory Table 20 - First-generation asymmetric keys, 25. ECC Generated by ERCA; inserted in VU by manufacturer at the end of the manufacturing phase Out of scope of this ST Not applicable VU non-volatile memory EUR.PK (previous) The previous public key of ERCA, 25 ECC Generated by ERCA; inserted in VU by manufacturer at the end of the manufacturing phase Out of scope of this ST Not applicable VU non-volatile memory (conditional; only present if existing at time of, C as part of the EUR.Link.C; obtained by VU during mutual authentication towards such card or EGF Out of scope of this ST Not applicable VU general non- volatile memory (conditional; only if the VU has, by card or card manufacturer; obtained by VU in card certificate during mutual authentication Out of scope of this ST Not applicable VU non-volatile memory(conditional, possibly multiple) EGF_MA.PK EGF, obtained by VU in EGF certificate during mutual authentication as part of the coupling process Out of scope of this ST Not applicable VU non-volatile memory (conditional, possibly multiple) MSCA_Card.PK, 25 ECC Generated by MSCA ; obtained by VU in MSCA_Card certificate during mutual authentication Out of scope of this ST Not applicable VU non-volatile memory (conditional, possibly multiple) MSCA_VU- EGF.PK, 25. ECC Generated by MSCA ; obtained by VU in MSCA_VU-EGF certificate during coupling to an EGF Out of scope of this ST Not applicable VU non-volatile memory (conditional, possibly multiple) Table 23 -, phase. Note: as explained in [5] Annex 1C, Appendix 11, section 12.2, a VU contains only one KM-VU. Out of scope of this ST Made unavailable when the VU has reached end of life VU non- volatile memory KM-WC, key generations). However, a VU will retrieve only one of these keys during the pairing process. Out of scope of this ST Made unavailable at the latest by end of calibration phase Not permanently stored; only, under KM) at the end of the manufacturing phase; obtained and decrypted by VU during pairing Out of scope of this ST Made unavailable at the latest by end of calibration phase Not permanently stored; only, received from VU manufacturer; inserted by VU manufacturer at the end of the manufacturing phase Out of scope of this ST Made unavailable when the VU has reached end of life VU non- volatile memory K_VUDSRC, received from VU manufacturer; inserted by VU manufacturer at the end of the manufacturing phase Out of scope of this ST Made unavailable when the VU has reached end of life VU non- volatile memory Table 24 -, VU personalization AES Generated by the VU manufacturer at the end of the manufacturing phase Out of scope for this ST Not applicable. VU SC non- volatile memory K_Depers Key for de- personalizat ion VU, personalization request AES Derived by the VU from the SeedVu at the end of the manufacturing phase Out of scope for this ST Not applicable. VU SC non- volatile memory KCOMP SW Update: Key for MAC of compatibilit, of the SW update compatibility header AES Generated by the VU manufacturer once for a product line Out of scope for this ST Made unavailable when the VU has reached end of life VU SC non- volatile memory, SW update credentials AES Derived by the VU from the SeedVu at the end of the manufacturing phase Out of scope for this ST Made unavailable when the VU has reached end of life VU SC non- volatile memory, during SW update AES Generated by the VU manufacturer before distribution of a SW update package Out of scope for this ST Made unavailable at the end of the SW update process VU SC non- volatile memory, downloaded logging data. ECC Generated by the VU manufacturer at the end of the manufacturing phase Out of scope for this ST Not applicable. VU SC non- volatile memory K_ErrorLog_E nc ErrorLog: Key for download, downloaded logging data. AES Generated by the VU manufacturer at the end of the manufacturing phase Out of scope for this ST Not applicable. VU SC non- volatile memory K_ErrorLog_ MC ErrorLog: Key for MC data, stored in the MC memory. AES Generated by the VU manufacturer at the end of the manufacturing phase Out of scope for this ST Not applicable. VU MC non- volatile memory K_DataSe_M AC Data storage: Key VU specific, used by the VU to ensure AES Generated by the VU at the end of the manufacturing Out of scope for this ST Not applicable. VU SC non- Security Target EFAS-4.10 document number version author, data stored in the MC flash memory. AES Generated by the VU at the end of the manufacturing phase Out of scope for this ST Not applicable. VU SC non- volatile memory Table 26: Manufacturer specific keys and

Standards
FIPS 197, FIPS PUB 46-3, FIPS 186-4, FIPS PUB 197, FIPS PUB 180-4, FIPS 180-1, FIPS 180-4, PKCS#1, AIS36, RFC 5480, RFC 5639, ISO/IEC 7816-2, ISO/IEC 7816-3, ISO/IEC 7816-4, ISO/IEC 7816-6, ISO/IEC 7816-8, ISO/IEC 9797-1, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Title EFAS-4.10 V05.00
Keywords EFAS-4
Author Toda Valery
Creation date D:20191022141200+02'00'
Modification date D:20191022141200+02'00'
Pages 139
Creator Microsoft® Word 2013
Producer Microsoft® Word 2013

Heuristics ?

Certificate ID: BSI-DSZ-CC-1117-2019

Extracted SARs

ASE_ECD.1, AVA_VAN.5, ALC_FLR.1, ALC_DEL.1, AGD_PRE.1, ADV_IMP.1, ALC_LCD.1, ADV_FSP.4, ATE_FUN.1, ASE_REQ.2, ALC_CMS.4, ALC_TAT.1, ASE_CCL.1, ASE_OBJ.2, ATE_COV.2, ADV_ARC.1, ATE_IND.2, ALC_DVS.1, ASE_SPD.1, AGD_OPE.1, ASE_INT.1, ALC_CMC.4, ATE_DPT.2, ASE_TSS.1, ADV_TDS.3

Scheme data ?

Cert Id BSI-DSZ-CC-1117-2019
Product Digital Tachograph EFAS-4.10 V05.00
Vendor intellic Germany GmbH
Certification Date 25.09.2019
Category Digital tachograph
Url https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Digitaler_Tachograph-Vehicle_Unit/1117.html
Enhanced
Product Digital Tachograph EFAS-4.10 V05.00
Applicant intellic Germany GmbH Fernitzerstraße 5 A-8071 Hausmannstätten Österreich
Evaluation Facility SRC Security Research & Consulting GmbH
Assurance Level EAL4,AVA_VAN.5,ATE_DPT.2
Protection Profile Digital Tachograph - Vehicle Unit (VU PP) Version 1.0, 9 May 2017, BSI-CC-PP-0094-2017
Certification Date 25.09.2019
Expiration Date 24.09.2024
Entries [frozendict({'id': 'BSI-DSZ-CC-1117-2019-MA-01', 'description': 'The Target of Evaluation of this assurance continuity maintenance report provided for maintenance is uniquely identified by the designation "EFAS-4.10/11 V05.10". The difference is declared in the maintenance report BSI-DSZ-CC-1117-2019-MA-01. The change to the certified product is at the level of non security relevant modifications of hardware and main controller features and some display modifications. The current software version which is valid for all hardware realizations is "EFAS-4.10/11 V05.10”.'}), frozendict({'id': 'BSI'})]
Report Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1117a_pdf.pdf?__blob=publicationFile&v=1
Target Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1117b_pdf.pdf?__blob=publicationFile&v=1
Cert Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1117c_pdf.pdf?__blob=publicationFile&v=1
Description Target of evaluation (TOE) of this evaluation technical report (ETR) is the product “EFAS-4.10 digital tachograph with SW version 05.00 as developed by intellic Germany GmbH, based on INFINEON M7892 G12" (EFAS-4.10 for short in the following). The Target of Evaluation (TOE) is a Vehicle Unit (VU for short) in the sense of Annex 1 C of the COMMISSION REGULATION (EU) 2016/799 of 18 March 2016 [EU]. It is intended to be installed in road transport vehicles and will be used within the Tachograph System to store, display, print and output data related to driver activities in accordance with the requirements of [EU].
Subcategory Vehicle Unit

References ?

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '596b4c8da9ee7d182528ee826d1da49047314ca33476c6e9e29c2950945c3469', 'txt_hash': 'e2874939d24b4811e585c541e5a2637dc0bfd042ccb12e4c97e3c8004c2cbdaf'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'd9a3bae0a8ade23942931fa28832cbdc7b8c376607c99a057a420ad235c0eb2f', 'txt_hash': 'b3935800f87c9a71739517567f9ec0f4b48f049c0f0c1da1b1a6b921edfd7438'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '2968572375ade617a656efa59d5ef6443a2f2cc547672ef619d1021d010017d0', 'txt_hash': 'eb758f055f8d2c821422f3c4368d007d3824e98c7c22bba89c190418294dfc72'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 653401, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 25, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20191017115114+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, "', '/ModDate': "D:20191018121359+02'00'", '/Producer': 'LibreOffice 6.2', '/Subject': 'Certification Report Digital Tachograph EFAS-4.10 V05.00 Intellic GmbH', '/Title': 'Certification Report BSI-DSZ-CC-1117-2019', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/zertifizierungsreporte', 'https://www.bsi.bund.de/zertifizierung', 'http://www.sogisportal.eu/', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/AIS']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 4308096, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 139, '/Title': 'EFAS-4.10 V05.00', '/Author': 'Toda Valery', '/Keywords': 'EFAS-4', '/Creator': 'Microsoft® Word 2013', '/CreationDate': "D:20191022141200+02'00'", '/ModDate': "D:20191022141200+02'00'", '/Producer': 'Microsoft® Word 2013', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://dict.leo.org/ende?lp=ende&p=/hCiE.&search=respectively', 'http://www.iso.org/iso/rss.xml?csnumber=46486&rss=detail']}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 294127, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20191017115054+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, "', '/ModDate': "D:20191017122955+02'00'", '/Producer': 'LibreOffice 6.2', '/Subject': 'Certificate Digital Tachograph EFAS-4.10 V05.00', '/Title': 'Certificate BSI-DSZ-CC-1117-2019', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-1117-2019', 'cert_item': 'Digital Tachograph EFAS-4.10 V05.00', 'developer': 'Intellic GmbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Digital Tachograph - Vehicle Unit (VU PP) Version 1.0, 9 May 2017, BSI-CC-PP-0094-2017', 'cc_version': 'PP conformant Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 4 augmented by ATE_DPT.2 und AVA_VAN.5'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1117-2019': 14, 'BSI-DSZ-CC-1055-2018': 3}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0094-2017': 2, 'BSI-CC-PP- 0094-2017': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 5, 'EAL 5': 4, 'EAL 2': 2, 'EAL 1': 1, 'EAL 2+': 1, 'EAL 5+': 1, 'EAL 6': 1, 'EAL6': 1, 'EAL6+': 1, 'EAL 4 augmented': 3, 'EAL6 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR': 3, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_DPT.2': 4}, 'AVA': {'AVA_VAN.5': 4}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies AG': 1, 'Infineon': 1}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 1}, 'SRC': {'SRC Security Research & Consulting': 2}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'DES': {'DES': 1}}, 'constructions': {'MAC': {'CMAC': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {'ECB': {'ECB': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'other': {'JIL': 6}}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 34': 2, 'AIS 36': 3, 'AIS 25': 2, 'AIS 26': 2, 'AIS 20': 1, 'AIS 31': 1, 'AIS 32': 1, 'AIS 35': 1, 'AIS 38': 1, 'AIS 40': 1, 'AIS 46': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, '08.2019, intellic Germany GmbH [7] Evaluation Technical Report, Version 1.1, 20.09.2019, SRC GmbH, (confidential document) [8] Digital Tachograph - Vehicle Unit (VU PP) Version 1.0, 9 May 2017, BSI-CC-PP- 0094-2017 [9': 1, 'Version 04, Approved, 02.09.2019 file name: 1250-111-SEC-DE04_APPR_Konfigurationsliste.docx (confidential document) [12] Bedienungsanleitung Smart Tachograph EFAS-4.10, INTELLIC, Version 01, 2019, file name': 1, 'COMP) - M7892 G12 and D11- BSI-DSZ-CC-0891-V3, TÜV Informationstechnik GmbH, Version 1, 2017-11-29 (confidential document) 21 / 25 Certification Report BSI-DSZ-CC-1117-2019 C. Excerpts from the Criteria For the meaning': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1117': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0094-2017': 8, 'BSI-CC-PP-0094-': 1, 'BSI-CC-PP- 0094-2017': 3, 'BSI-CC-PP-0094': 1}}, 'cc_security_level': {'EAL': {'EAL4': 16, 'EAL 6': 2, 'EAL6': 1, 'EAL6+': 1, 'EAL4 augmented': 6, 'EAL 6 augmented': 2, 'EAL6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 3, 'ADV_TDS.3': 3, 'ADV_FSP.4': 2, 'ADV_IMP.1': 2, 'ADV_ARC': 1}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_FLR.1': 2, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_DPT.2': 9, 'ATE_FUN.1': 2, 'ATE_DPT.1': 1, 'ATE_COV.2': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 8}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1': 7, 'FAU_GEN.1': 23, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_STG.1': 15, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.4': 8, 'FAU_STG.3': 1, 'FAU_STG.4.1': 1, 'FAU_SAS.1': 1}, 'FCO': {'FCO_NRO.1': 9, 'FCO_NRO.1.1': 1, 'FCO_NRO.1.2': 1, 'FCO_NRO.1.3': 1}, 'FCS': {'FCS_COP.1': 79, 'FCS_COP': 29, 'FCS_RNG': 4, 'FCS_RNG.1': 29, 'FCS_CKM.1': 53, 'FCS_RNG.1.1': 4, 'FCS_RNG.1.2': 4, 'FCS_CKM.4': 46, 'FCS_CKM': 21, 'FCS_CKM.2': 20, 'FCS_CKM.1.1': 2, 'FCS_CKM.4.1': 2, 'FCS_CKM.2.1': 2, 'FCS_COP.1.1': 6}, 'FDP': {'FDP_ACC.1': 82, 'FDP_ACF.1': 67, 'FDP_ACC.1.1': 5, 'FDP_ACF.1.1': 10, 'FDP_ACF.1.2': 5, 'FDP_ACF.1.3': 5, 'FDP_ACF.1.4': 5, 'FDP_ACC': 12, 'FDP_ACF': 11, 'FDP_ETC.2': 12, 'FDP_IFC.1': 15, 'FDP_ETC.2.1': 1, 'FDP_ETC.2.2': 1, 'FDP_ETC.2.3': 1, 'FDP_ETC.2.4': 1, 'FDP_ITC.1': 35, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_ITC.2': 49, 'FDP_ITC.2.1': 1, 'FDP_ITC.2.2': 1, 'FDP_ITC.2.3': 1, 'FDP_ITC.2.4': 1, 'FDP_ITC.2.5': 1, 'FDP_ITC': 12, 'FDP_ITT.1': 10, 'FDP_ITT.1.1': 1, 'FDP_RIP.1': 17, 'FDP_RIP.1.1': 1, 'FDP_RIP': 1, 'FDP_SDI.2': 20, 'FDP_SDI.2.1': 2, 'FDP_SDI.2.2': 2, 'FDP_MSA.3': 4, 'FDP_SDI.1': 3}, 'FIA': {'FIA_SOS.2': 1, 'FIA_UID.1': 11, 'FIA_AFL.1': 24, 'FIA_UAU.1': 22, 'FIA_AFL.1.1': 5, 'FIA_AFL.1.2': 4, 'FIA_ATD.1': 15, 'FIA_ATD.1.1': 2, 'FIA_UAU.3': 8, 'FIA_UAU.3.1': 1, 'FIA_UAU.3.2': 1, 'FIA_UAU.5': 7, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6': 10, 'FIA_UAU.6.1': 1, 'FIA_UID.2': 18, 'FIA_UID.2.1': 1, 'FIA_UAU.1.1': 2, 'FIA_UAU.1.2': 2, 'FIA_UAU.2': 10, 'FIA_UAU.2.1': 1, 'FIA_API.1': 1}, 'FMT': {'FMT_MSA.3': 52, 'FMT_MSA.1': 29, 'FMT_SMR.1': 45, 'FMT_SMF.1': 31, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 5, 'FMT_MSA.3.2': 5, 'FMT_MOF.1': 29, 'FMT_MOF.1.1': 5, 'FMT_MTD.1': 11, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_LIM.1': 3, 'FMT_LIM.2': 1, 'FMT_LIM': 2}, 'FPT': {'FPT_STM.1': 15, 'FPT_TDC.1': 24, 'FPT_FLS.1': 14, 'FPT_FLS.1.1': 1, 'FPT_PHP.2': 9, 'FPT_PHP.1': 1, 'FPT_PHP.2.1': 1, 'FPT_PHP.2.2': 1, 'FPT_PHP.2.3': 2, 'FPT_PHP.3': 12, 'FPT_PHP.3.1': 1, 'FPT_STM.1.1': 1, 'FPT_TST.1': 12, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_TDC': 8, 'FPT_TDC.1.1': 2, 'FPT_TDC.1.2': 2}, 'FRU': {'FRU_FLT.2': 3}, 'FTP': {'FTP_ITC.1': 27, 'FTP_TRP.1': 5, 'FTP_ITC.1.1': 3, 'FTP_ITC.1.2': 3, 'FTP_ITC.1.3': 3}}, 'cc_claims': {'O': {'O.RND': 2, 'O.TDES': 2, 'O.AES': 2, 'O.SHA': 2}, 'OE': {'OE.EOL': 4}}, 'vendor': {}, 'eval_facility': {'SRC': {'SRC Security Research & Consulting': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 57, 'AES-': 1, 'AES-128': 8, 'AES-192': 4, 'AES-256': 4}}, 'DES': {'DES': {'DES': 4}, '3DES': {'TDES': 7, 'Triple-DES': 3}}, 'constructions': {'MAC': {'KMAC': 2, 'CMAC': 11}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 2}, 'ECDSA': {'ECDSA': 6}, 'ECC': {'ECC': 18}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 11}, 'SHA2': {'SHA-256': 15, 'SHA-384': 9, 'SHA-512': 9, 'SHA-2': 4}}}, 'crypto_scheme': {'MAC': {'MAC': 6}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'PRNG': {'PRNG': 1}, 'RNG': {'RNG': 13, 'RND': 2}}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CBC': {'CBC': 14}, 'GCM': {'GCM': 1}}, 'ecc_curve': {'NIST': {'P-256': 1, 'P-384': 1, 'P-521': 1, 'NIST P-256': 1, 'NIST P-384': 1, 'NIST P-521': 1, 'secp256r1': 1, 'secp384r1': 1, 'secp521r1': 1}, 'Brainpool': {'brainpoolP256r1': 1, 'brainpoolP384r1': 1, 'brainpoolP512r1': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2}, 'FI': {'physical tampering': 8, 'Malfunction': 3}, 'other': {'reverse engineering': 1, 'JIL': 4}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 197': 6, 'FIPS PUB 46-3': 2, 'FIPS 186-4': 5, 'FIPS PUB 197': 1, 'FIPS PUB 180-4': 1, 'FIPS 180-1': 3, 'FIPS 180-4': 6}, 'PKCS': {'PKCS#1': 5}, 'BSI': {'AIS36': 3}, 'RFC': {'RFC 5480': 1, 'RFC 5639': 1}, 'ISO': {'ISO/IEC 7816-2': 1, 'ISO/IEC 7816-3': 1, 'ISO/IEC 7816-4': 1, 'ISO/IEC 7816-6': 1, 'ISO/IEC 7816-8': 1, 'ISO/IEC 9797-1': 1}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'Out of scope': 28, 'downloaded data files RSA Generated by VU manufacturer at the end of the manufacturing phase Out of scope of this ST. Made unavailable when the VU has reached end of life VU non- volatile memory EUR.PK': 1, '22 RSA Generated by ERCA; inserted in VU by VU manufacturer at the end of the manufacturing phase Out of scope of this ST Not applicable VU non- volatile memory Card.PK (conditional, possibly multiple) Card': 1, 'by card or card- Manufacturer; obtained by VU in card certificate during mutual authentication Out of scope of this ST Not applicable VU non- volatile memory MS.PK (conditional, possibly multiple) Public key': 1, 'foreign) MSCA; obtained by VU in MS certificate presented by a card during mutual authentication Out of scope of this ST Not applicable VU non- volatile memory Table 20 - First-generation asymmetric keys': 1, '25. ECC Generated by ERCA; inserted in VU by manufacturer at the end of the manufacturing phase Out of scope of this ST Not applicable VU non-volatile memory EUR.PK (previous) The previous public key of ERCA': 1, '25 ECC Generated by ERCA; inserted in VU by manufacturer at the end of the manufacturing phase Out of scope of this ST Not applicable VU non-volatile memory (conditional; only present if existing at time of': 1, 'C as part of the EUR.Link.C; obtained by VU during mutual authentication towards such card or EGF Out of scope of this ST Not applicable VU general non- volatile memory (conditional; only if the VU has': 1, 'by card or card manufacturer; obtained by VU in card certificate during mutual authentication Out of scope of this ST Not applicable VU non-volatile memory(conditional, possibly multiple) EGF_MA.PK EGF': 1, 'obtained by VU in EGF certificate during mutual authentication as part of the coupling process Out of scope of this ST Not applicable VU non-volatile memory (conditional, possibly multiple) MSCA_Card.PK': 1, '25 ECC Generated by MSCA ; obtained by VU in MSCA_Card certificate during mutual authentication Out of scope of this ST Not applicable VU non-volatile memory (conditional, possibly multiple) MSCA_VU- EGF.PK': 1, '25. ECC Generated by MSCA ; obtained by VU in MSCA_VU-EGF certificate during coupling to an EGF Out of scope of this ST Not applicable VU non-volatile memory (conditional, possibly multiple) Table 23 -': 1, 'phase. Note: as explained in [5] Annex 1C, Appendix 11, section 12.2, a VU contains only one KM-VU. Out of scope of this ST Made unavailable when the VU has reached end of life VU non- volatile memory KM-WC': 1, 'key generations). However, a VU will retrieve only one of these keys during the pairing process. Out of scope of this ST Made unavailable at the latest by end of calibration phase Not permanently stored; only': 1, 'under KM) at the end of the manufacturing phase; obtained and decrypted by VU during pairing Out of scope of this ST Made unavailable at the latest by end of calibration phase Not permanently stored; only': 1, 'received from VU manufacturer; inserted by VU manufacturer at the end of the manufacturing phase Out of scope of this ST Made unavailable when the VU has reached end of life VU non- volatile memory K_VUDSRC': 1, 'received from VU manufacturer; inserted by VU manufacturer at the end of the manufacturing phase Out of scope of this ST Made unavailable when the VU has reached end of life VU non- volatile memory Table 24 -': 1, 'VU personalization AES Generated by the VU manufacturer at the end of the manufacturing phase Out of scope for this ST Not applicable. VU SC non- volatile memory K_Depers Key for de- personalizat ion VU': 1, 'personalization request AES Derived by the VU from the SeedVu at the end of the manufacturing phase Out of scope for this ST Not applicable. VU SC non- volatile memory KCOMP SW Update: Key for MAC of compatibilit': 1, 'of the SW update compatibility header AES Generated by the VU manufacturer once for a product line Out of scope for this ST Made unavailable when the VU has reached end of life VU SC non- volatile memory': 1, 'SW update credentials AES Derived by the VU from the SeedVu at the end of the manufacturing phase Out of scope for this ST Made unavailable when the VU has reached end of life VU SC non- volatile memory': 2, 'during SW update AES Generated by the VU manufacturer before distribution of a SW update package Out of scope for this ST Made unavailable at the end of the SW update process VU SC non- volatile memory': 2, 'downloaded logging data. ECC Generated by the VU manufacturer at the end of the manufacturing phase Out of scope for this ST Not applicable. VU SC non- volatile memory K_ErrorLog_E nc ErrorLog: Key for download': 1, 'downloaded logging data. AES Generated by the VU manufacturer at the end of the manufacturing phase Out of scope for this ST Not applicable. VU SC non- volatile memory K_ErrorLog_ MC ErrorLog: Key for MC data': 1, 'stored in the MC memory. AES Generated by the VU manufacturer at the end of the manufacturing phase Out of scope for this ST Not applicable. VU MC non- volatile memory K_DataSe_M AC Data storage: Key VU specific': 1, 'used by the VU to ensure AES Generated by the VU at the end of the manufacturing Out of scope for this ST Not applicable. VU SC non- Security Target EFAS-4.10 document number version author': 1, 'data stored in the MC flash memory. AES Generated by the VU at the end of the manufacturing phase Out of scope for this ST Not applicable. VU SC non- volatile memory Table 26: Manufacturer specific keys and': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1117-2019': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0094-2017': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL 5': 1, 'EAL 2': 1, 'EAL 4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR': 1}, 'ATE': {'ATE_DPT.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 1117a_pdf.pdf.
    • The st_filename property was set to 1117b_pdf.pdf.
    • The cert_filename property was set to 1117c_pdf.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-1117-2019.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1055-2018']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-2015', 'BSI-DSZ-CC-0891-V3-2018', 'BSI-DSZ-CC-0980-2017', 'BSI-DSZ-CC-1055-2018', 'BSI-DSZ-CC-0727-2011', 'BSI-DSZ-CC-0891-V2-2016', 'BSI-DSZ-CC-0726-2012', 'BSI-DSZ-CC-0606-2010', 'BSI-DSZ-CC-0782-2012']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1117a_pdf.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1117b_pdf.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Digital Tachograph EFAS-4.10 V05.00 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1117c_pdf.pdf",
  "dgst": "9bdc769a307beb62",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-1117-2019",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "4.10",
        "05.00"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1055-2018"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0606-2010",
          "BSI-DSZ-CC-0891-V2-2016",
          "BSI-DSZ-CC-0891-2015",
          "BSI-DSZ-CC-1055-2018",
          "BSI-DSZ-CC-0891-V3-2018",
          "BSI-DSZ-CC-0726-2012",
          "BSI-DSZ-CC-0727-2011",
          "BSI-DSZ-CC-0980-2017",
          "BSI-DSZ-CC-0782-2012"
        ]
      }
    },
    "scheme_data": {
      "category": "Digital tachograph",
      "cert_id": "BSI-DSZ-CC-1117-2019",
      "certification_date": "25.09.2019",
      "enhanced": {
        "applicant": "intellic Germany GmbH\nFernitzerstra\u00dfe 5\nA-8071 Hausmannst\u00e4tten\n\u00d6sterreich",
        "assurance_level": "EAL4,AVA_VAN.5,ATE_DPT.2",
        "cert_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1117c_pdf.pdf?__blob=publicationFile\u0026v=1",
        "certification_date": "25.09.2019",
        "description": "Target of evaluation (TOE) of this evaluation technical report (ETR) is the product \u201cEFAS-4.10 digital tachograph with SW version 05.00 as developed by intellic Germany GmbH, based on INFINEON M7892 G12\" (EFAS-4.10 for short in the following). The Target of Evaluation (TOE) is a Vehicle Unit (VU for short) in the sense of Annex 1 C of the COMMISSION REGULATION (EU) 2016/799 of 18 March 2016 [EU]. It is intended to be installed in road transport vehicles and will be used within the Tachograph System to store, display, print and output data related to driver activities in accordance with the requirements of [EU].",
        "entries": [
          {
            "description": "The Target of Evaluation of this assurance continuity maintenance report provided for maintenance is uniquely identified by the designation \"EFAS-4.10/11 V05.10\". The difference is declared in the maintenance report BSI-DSZ-CC-1117-2019-MA-01. The change to the certified product is at the level of non security relevant modifications of hardware and main controller features and some display modifications. The current software version which is valid for all hardware realizations is \"EFAS-4.10/11 V05.10\u201d.",
            "id": "BSI-DSZ-CC-1117-2019-MA-01"
          },
          {
            "id": "BSI"
          }
        ],
        "evaluation_facility": "SRC Security Research \u0026 Consulting GmbH",
        "expiration_date": "24.09.2024",
        "product": "Digital Tachograph EFAS-4.10 V05.00",
        "protection_profile": "Digital Tachograph - Vehicle Unit (VU PP) Version 1.0, 9 May 2017, BSI-CC-PP-0094-2017",
        "report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1117a_pdf.pdf?__blob=publicationFile\u0026v=1",
        "target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1117b_pdf.pdf?__blob=publicationFile\u0026v=1"
      },
      "product": "Digital Tachograph EFAS-4.10 V05.00",
      "subcategory": "Vehicle Unit",
      "url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Digitaler_Tachograph-Vehicle_Unit/1117.html",
      "vendor": "intellic Germany GmbH"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "intellic GmbH",
  "manufacturer_web": "https://www.intellic.eu",
  "name": "Digital Tachograph EFAS-4.10 V05.00",
  "not_valid_after": "2024-09-25",
  "not_valid_before": "2019-09-25",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "1117c_pdf.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1117-2019": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0094-2017": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 1
        },
        "ATE": {
          "ATE_DPT.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 4": 1,
          "EAL 4 augmented": 1,
          "EAL 5": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20191017115054+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, \"",
      "/ModDate": "D:20191017122955+02\u002700\u0027",
      "/Producer": "LibreOffice 6.2",
      "/Subject": "Certificate Digital Tachograph EFAS-4.10 V05.00",
      "/Title": "Certificate BSI-DSZ-CC-1117-2019",
      "pdf_file_size_bytes": 294127,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "1117a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by ATE_DPT.2 und AVA_VAN.5",
        "cc_version": "PP conformant Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-1117-2019",
        "cert_item": "Digital Tachograph EFAS-4.10 V05.00",
        "cert_lab": "BSI",
        "developer": "Intellic GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Digital Tachograph - Vehicle Unit (VU PP) Version 1.0, 9 May 2017, BSI-CC-PP-0094-2017"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1055-2018": 3,
          "BSI-DSZ-CC-1117-2019": 14
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0094-2017": 1,
          "BSI-CC-PP-0094-2017": 2
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR": 3,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ATE": {
          "ATE_DPT.2": 4
        },
        "AVA": {
          "AVA_VAN.5": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 2,
          "EAL 2+": 1,
          "EAL 4": 5,
          "EAL 4 augmented": 3,
          "EAL 5": 4,
          "EAL 5+": 1,
          "EAL 6": 1,
          "EAL6": 1,
          "EAL6 augmented": 1,
          "EAL6+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "08.2019, intellic Germany GmbH [7] Evaluation Technical Report, Version 1.1, 20.09.2019, SRC GmbH, (confidential document) [8] Digital Tachograph - Vehicle Unit (VU PP) Version 1.0, 9 May 2017, BSI-CC-PP- 0094-2017 [9": 1,
          "COMP) - M7892 G12 and D11- BSI-DSZ-CC-0891-V3, T\u00dcV Informationstechnik GmbH, Version 1, 2017-11-29 (confidential document) 21 / 25 Certification Report BSI-DSZ-CC-1117-2019 C. Excerpts from the Criteria For the meaning": 1,
          "Version 04, Approved, 02.09.2019 file name: 1250-111-SEC-DE04_APPR_Konfigurationsliste.docx (confidential document) [12] Bedienungsanleitung Smart Tachograph EFAS-4.10, INTELLIC, Version 01, 2019, file name": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
        }
      },
      "cipher_mode": {
        "ECB": {
          "ECB": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "SRC": {
          "SRC Security Research \u0026 Consulting": 2
        },
        "TUV": {
          "T\u00dcV Informationstechnik": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "other": {
          "JIL": 6
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 1,
          "AIS 25": 2,
          "AIS 26": 2,
          "AIS 31": 1,
          "AIS 32": 1,
          "AIS 34": 2,
          "AIS 35": 1,
          "AIS 36": 3,
          "AIS 38": 1,
          "AIS 40": 1,
          "AIS 46": 1
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        },
        "DES": {
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 1
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1,
          "BSI TR-02102": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 1,
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20191017115114+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, \"",
      "/ModDate": "D:20191018121359+02\u002700\u0027",
      "/Producer": "LibreOffice 6.2",
      "/Subject": "Certification Report Digital Tachograph EFAS-4.10 V05.00 Intellic GmbH",
      "/Title": "Certification Report BSI-DSZ-CC-1117-2019",
      "pdf_file_size_bytes": 653401,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/AIS",
          "https://www.bsi.bund.de/zertifizierung",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/",
          "http://www.sogisportal.eu/",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "http://www.commoncriteriaportal.org/cc/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 25
    },
    "st_filename": "1117b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 18
          },
          "ECDH": {
            "ECDH": 2
          },
          "ECDSA": {
            "ECDSA": 6
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1117": 1
        }
      },
      "cc_claims": {
        "O": {
          "O.AES": 2,
          "O.RND": 2,
          "O.SHA": 2,
          "O.TDES": 2
        },
        "OE": {
          "OE.EOL": 4
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0094-2017": 3,
          "BSI-CC-PP-0094": 1,
          "BSI-CC-PP-0094-": 1,
          "BSI-CC-PP-0094-2017": 8
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 3,
          "ADV_FSP.4": 2,
          "ADV_IMP.1": 2,
          "ADV_TDS.3": 3
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR.1": 2,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.2": 9,
          "ATE_FUN.1": 2,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 8
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 6": 2,
          "EAL 6 augmented": 2,
          "EAL4": 16,
          "EAL4 augmented": 6,
          "EAL6": 1,
          "EAL6 augmented": 1,
          "EAL6+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 23,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_SAR.1": 7,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAS.1": 1,
          "FAU_STG.1": 15,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG.3": 1,
          "FAU_STG.4": 8,
          "FAU_STG.4.1": 1
        },
        "FCO": {
          "FCO_NRO.1": 9,
          "FCO_NRO.1.1": 1,
          "FCO_NRO.1.2": 1,
          "FCO_NRO.1.3": 1
        },
        "FCS": {
          "FCS_CKM": 21,
          "FCS_CKM.1": 53,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.2": 20,
          "FCS_CKM.2.1": 2,
          "FCS_CKM.4": 46,
          "FCS_CKM.4.1": 2,
          "FCS_COP": 29,
          "FCS_COP.1": 79,
          "FCS_COP.1.1": 6,
          "FCS_RNG": 4,
          "FCS_RNG.1": 29,
          "FCS_RNG.1.1": 4,
          "FCS_RNG.1.2": 4
        },
        "FDP": {
          "FDP_ACC": 12,
          "FDP_ACC.1": 82,
          "FDP_ACC.1.1": 5,
          "FDP_ACF": 11,
          "FDP_ACF.1": 67,
          "FDP_ACF.1.1": 10,
          "FDP_ACF.1.2": 5,
          "FDP_ACF.1.3": 5,
          "FDP_ACF.1.4": 5,
          "FDP_ETC.2": 12,
          "FDP_ETC.2.1": 1,
          "FDP_ETC.2.2": 1,
          "FDP_ETC.2.3": 1,
          "FDP_ETC.2.4": 1,
          "FDP_IFC.1": 15,
          "FDP_ITC": 12,
          "FDP_ITC.1": 35,
          "FDP_ITC.1.1": 1,
          "FDP_ITC.1.2": 1,
          "FDP_ITC.1.3": 1,
          "FDP_ITC.2": 49,
          "FDP_ITC.2.1": 1,
          "FDP_ITC.2.2": 1,
          "FDP_ITC.2.3": 1,
          "FDP_ITC.2.4": 1,
          "FDP_ITC.2.5": 1,
          "FDP_ITT.1": 10,
          "FDP_ITT.1.1": 1,
          "FDP_MSA.3": 4,
          "FDP_RIP": 1,
          "FDP_RIP.1": 17,
          "FDP_RIP.1.1": 1,
          "FDP_SDI.1": 3,
          "FDP_SDI.2": 20,
          "FDP_SDI.2.1": 2,
          "FDP_SDI.2.2": 2
        },
        "FIA": {
          "FIA_AFL.1": 24,
          "FIA_AFL.1.1": 5,
          "FIA_AFL.1.2": 4,
          "FIA_API.1": 1,
          "FIA_ATD.1": 15,
          "FIA_ATD.1.1": 2,
          "FIA_SOS.2": 1,
          "FIA_UAU.1": 22,
          "FIA_UAU.1.1": 2,
          "FIA_UAU.1.2": 2,
          "FIA_UAU.2": 10,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.3": 8,
          "FIA_UAU.3.1": 1,
          "FIA_UAU.3.2": 1,
          "FIA_UAU.5": 7,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6": 10,
          "FIA_UAU.6.1": 1,
          "FIA_UID.1": 11,
          "FIA_UID.2": 18,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_LIM": 2,
          "FMT_LIM.1": 3,
          "FMT_LIM.2": 1,
          "FMT_MOF.1": 29,
          "FMT_MOF.1.1": 5,
          "FMT_MSA.1": 29,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 52,
          "FMT_MSA.3.1": 5,
          "FMT_MSA.3.2": 5,
          "FMT_MTD.1": 11,
          "FMT_MTD.1.1": 1,
          "FMT_SMF.1": 31,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 45,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FLS.1": 14,
          "FPT_FLS.1.1": 1,
          "FPT_PHP.1": 1,
          "FPT_PHP.2": 9,
          "FPT_PHP.2.1": 1,
          "FPT_PHP.2.2": 1,
          "FPT_PHP.2.3": 2,
          "FPT_PHP.3": 12,
          "FPT_PHP.3.1": 1,
          "FPT_STM.1": 15,
          "FPT_STM.1.1": 1,
          "FPT_TDC": 8,
          "FPT_TDC.1": 24,
          "FPT_TDC.1.1": 2,
          "FPT_TDC.1.2": 2,
          "FPT_TST.1": 12,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FRU": {
          "FRU_FLT.2": 3
        },
        "FTP": {
          "FTP_ITC.1": 27,
          "FTP_ITC.1.1": 3,
          "FTP_ITC.1.2": 3,
          "FTP_ITC.1.3": 3,
          "FTP_TRP.1": 5
        }
      },
      "certification_process": {
        "OutOfScope": {
          "22 RSA Generated by ERCA; inserted in VU by VU manufacturer at the end of the manufacturing phase Out of scope of this ST Not applicable VU non- volatile memory Card.PK (conditional, possibly multiple) Card": 1,
          "25 ECC Generated by ERCA; inserted in VU by manufacturer at the end of the manufacturing phase Out of scope of this ST Not applicable VU non-volatile memory (conditional; only present if existing at time of": 1,
          "25 ECC Generated by MSCA ; obtained by VU in MSCA_Card certificate during mutual authentication Out of scope of this ST Not applicable VU non-volatile memory (conditional, possibly multiple) MSCA_VU- EGF.PK": 1,
          "25. ECC Generated by ERCA; inserted in VU by manufacturer at the end of the manufacturing phase Out of scope of this ST Not applicable VU non-volatile memory EUR.PK (previous) The previous public key of ERCA": 1,
          "25. ECC Generated by MSCA ; obtained by VU in MSCA_VU-EGF certificate during coupling to an EGF Out of scope of this ST Not applicable VU non-volatile memory (conditional, possibly multiple) Table 23 -": 1,
          "C as part of the EUR.Link.C; obtained by VU during mutual authentication towards such card or EGF Out of scope of this ST Not applicable VU general non- volatile memory (conditional; only if the VU has": 1,
          "Out of scope": 28,
          "SW update credentials AES Derived by the VU from the SeedVu at the end of the manufacturing phase Out of scope for this ST Made unavailable when the VU has reached end of life VU SC non- volatile memory": 2,
          "VU personalization AES Generated by the VU manufacturer at the end of the manufacturing phase Out of scope for this ST Not applicable. VU SC non- volatile memory K_Depers Key for de- personalizat ion VU": 1,
          "by card or card manufacturer; obtained by VU in card certificate during mutual authentication Out of scope of this ST Not applicable VU non-volatile memory(conditional, possibly multiple) EGF_MA.PK EGF": 1,
          "by card or card- Manufacturer; obtained by VU in card certificate during mutual authentication Out of scope of this ST Not applicable VU non- volatile memory MS.PK (conditional, possibly multiple) Public key": 1,
          "data stored in the MC flash memory. AES Generated by the VU at the end of the manufacturing phase Out of scope for this ST Not applicable. VU SC non- volatile memory Table 26: Manufacturer specific keys and": 1,
          "downloaded data files RSA Generated by VU manufacturer at the end of the manufacturing phase Out of scope of this ST. Made unavailable when the VU has reached end of life VU non- volatile memory EUR.PK": 1,
          "downloaded logging data. AES Generated by the VU manufacturer at the end of the manufacturing phase Out of scope for this ST Not applicable. VU SC non- volatile memory K_ErrorLog_ MC ErrorLog: Key for MC data": 1,
          "downloaded logging data. ECC Generated by the VU manufacturer at the end of the manufacturing phase Out of scope for this ST Not applicable. VU SC non- volatile memory K_ErrorLog_E nc ErrorLog: Key for download": 1,
          "during SW update AES Generated by the VU manufacturer before distribution of a SW update package Out of scope for this ST Made unavailable at the end of the SW update process VU SC non- volatile memory": 2,
          "foreign) MSCA; obtained by VU in MS certificate presented by a card during mutual authentication Out of scope of this ST Not applicable VU non- volatile memory Table 20 - First-generation asymmetric keys": 1,
          "key generations). However, a VU will retrieve only one of these keys during the pairing process. Out of scope of this ST Made unavailable at the latest by end of calibration phase Not permanently stored; only": 1,
          "obtained by VU in EGF certificate during mutual authentication as part of the coupling process Out of scope of this ST Not applicable VU non-volatile memory (conditional, possibly multiple) MSCA_Card.PK": 1,
          "of the SW update compatibility header AES Generated by the VU manufacturer once for a product line Out of scope for this ST Made unavailable when the VU has reached end of life VU SC non- volatile memory": 1,
          "personalization request AES Derived by the VU from the SeedVu at the end of the manufacturing phase Out of scope for this ST Not applicable. VU SC non- volatile memory KCOMP SW Update: Key for MAC of compatibilit": 1,
          "phase. Note: as explained in [5] Annex 1C, Appendix 11, section 12.2, a VU contains only one KM-VU. Out of scope of this ST Made unavailable when the VU has reached end of life VU non- volatile memory KM-WC": 1,
          "received from VU manufacturer; inserted by VU manufacturer at the end of the manufacturing phase Out of scope of this ST Made unavailable when the VU has reached end of life VU non- volatile memory K_VUDSRC": 1,
          "received from VU manufacturer; inserted by VU manufacturer at the end of the manufacturing phase Out of scope of this ST Made unavailable when the VU has reached end of life VU non- volatile memory Table 24 -": 1,
          "stored in the MC memory. AES Generated by the VU manufacturer at the end of the manufacturing phase Out of scope for this ST Not applicable. VU MC non- volatile memory K_DataSe_M AC Data storage: Key VU specific": 1,
          "under KM) at the end of the manufacturing phase; obtained and decrypted by VU during pairing Out of scope of this ST Made unavailable at the latest by end of calibration phase Not permanently stored; only": 1,
          "used by the VU to ensure AES Generated by the VU at the end of the manufacturing Out of scope for this ST Not applicable. VU SC non- Security Target EFAS-4.10 document number version author": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 14
        },
        "ECB": {
          "ECB": 1
        },
        "GCM": {
          "GCM": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 6
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Brainpool": {
          "brainpoolP256r1": 1,
          "brainpoolP384r1": 1,
          "brainpoolP512r1": 1
        },
        "NIST": {
          "NIST P-256": 1,
          "NIST P-384": 1,
          "NIST P-521": 1,
          "P-256": 1,
          "P-384": 1,
          "P-521": 1,
          "secp256r1": 1,
          "secp384r1": 1,
          "secp521r1": 1
        }
      },
      "eval_facility": {
        "SRC": {
          "SRC Security Research \u0026 Consulting": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 11
          },
          "SHA2": {
            "SHA-2": 4,
            "SHA-256": 15,
            "SHA-384": 9,
            "SHA-512": 9
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 1
        },
        "RNG": {
          "RND": 2,
          "RNG": 13
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 3,
          "physical tampering": 8
        },
        "SCA": {
          "Leak-Inherent": 2
        },
        "other": {
          "JIL": 4,
          "reverse engineering": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS36": 3
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        },
        "FIPS": {
          "FIPS 180-1": 3,
          "FIPS 180-4": 6,
          "FIPS 186-4": 5,
          "FIPS 197": 6,
          "FIPS PUB 180-4": 1,
          "FIPS PUB 197": 1,
          "FIPS PUB 46-3": 2
        },
        "ISO": {
          "ISO/IEC 7816-2": 1,
          "ISO/IEC 7816-3": 1,
          "ISO/IEC 7816-4": 1,
          "ISO/IEC 7816-6": 1,
          "ISO/IEC 7816-8": 1,
          "ISO/IEC 9797-1": 1
        },
        "PKCS": {
          "PKCS#1": 5
        },
        "RFC": {
          "RFC 5480": 1,
          "RFC 5639": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 57,
            "AES-": 1,
            "AES-128": 8,
            "AES-192": 4,
            "AES-256": 4
          }
        },
        "DES": {
          "3DES": {
            "TDES": 7,
            "Triple-DES": 3
          },
          "DES": {
            "DES": 4
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 11,
            "KMAC": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Toda Valery",
      "/CreationDate": "D:20191022141200+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2013",
      "/Keywords": "EFAS-4",
      "/ModDate": "D:20191022141200+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2013",
      "/Title": "EFAS-4.10 V05.00",
      "pdf_file_size_bytes": 4308096,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://dict.leo.org/ende?lp=ende\u0026p=/hCiE.\u0026search=respectively",
          "http://www.iso.org/iso/rss.xml?csnumber=46486\u0026rss=detail"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 139
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0094b_pdf.pdf",
        "pp_name": "Digital Tachograph - Vehicle Unit"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1117a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "AVA_VAN.5",
      "ATE_DPT.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1117b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "2968572375ade617a656efa59d5ef6443a2f2cc547672ef619d1021d010017d0",
      "txt_hash": "eb758f055f8d2c821422f3c4368d007d3824e98c7c22bba89c190418294dfc72"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "596b4c8da9ee7d182528ee826d1da49047314ca33476c6e9e29c2950945c3469",
      "txt_hash": "e2874939d24b4811e585c541e5a2637dc0bfd042ccb12e4c97e3c8004c2cbdaf"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "d9a3bae0a8ade23942931fa28832cbdc7b8c376607c99a057a420ad235c0eb2f",
      "txt_hash": "b3935800f87c9a71739517567f9ec0f4b48f049c0f0c1da1b1a6b921edfd7438"
    }
  },
  "status": "active"
}