{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0918V8c_pdf.pdf",
"dgst": "c6cce97ca39f1234",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0918-V8-2025",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"3.0",
"1.7"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1217-2024",
"BSI-DSZ-CC-0957-V2-2016",
"BSI-DSZ-CC-0918-V7-2025"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1217-2024",
"BSI-DSZ-CC-0918-2020",
"BSI-DSZ-CC-1149-V3-2023",
"BSI-DSZ-CC-0666-2012",
"BSI-DSZ-CC-0918-V6-2024",
"BSI-DSZ-CC-0918-V7-2025",
"BSI-DSZ-CC-0845-2012",
"BSI-DSZ-CC-0918-V5-2023",
"BSI-DSZ-CC-1149-V2-2023",
"BSI-DSZ-CC-0957-2015",
"BSI-DSZ-CC-1149-2022",
"BSI-DSZ-CC-0918-V4-2022",
"BSI-DSZ-CC-0957-V2-2016",
"BSI-DSZ-CC-0918-V3-2022",
"BSI-DSZ-CC-0845-V2-2013",
"BSI-DSZ-CC-0918-V2-2021",
"BSI-DSZ-CC-0978-2016"
]
}
},
"scheme_data": {
"category": "Intelligent measuring systems",
"cert_id": "BSI-DSZ-CC-0918-V8-2025",
"certification_date": "2025-07-03",
"enhanced": {
"applicant": "Theben Smart Energy GmbH Schlossfeld 9 72401 Haigerloch",
"assurance_level": "EAL4+,ALC_FLR.2,AVA_VAN.5",
"cert_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0918V8c_pdf.pdf?__blob=publicationFile\u0026v=2",
"certification_date": "2025-07-03",
"description": "The Target of Evaluation (TOE) is the Smart Meter Gateway (SMGW) CONEXA 3.0, Version 1.0. The Smart Meter Gateway is the communication unit in a smart metering system. The main functionality of the gateway is the reception and the storage of measured consumption and status values of the connected meters as well as the processing and the transfer of these consumption and status values to authorized entities.",
"entries": [
{
"description": "The changes are related to an update of the communication in the LMN.",
"id": "BSI-DSZ-CC-0918-V8-2025-MA-01"
},
{
"description": "The Target of Evaluation (TOE) presented in this document is called \"Smart Meter Gateway\", \u201cSMGW\u201d or \u201cGateway\u201d and uniquely identified as CONEXA 3.0 (CC), Version 1.7. It is the communication unit used within such an intelligent metering system and represented by the product CONEXA 3.0 except for the integrated Security Module. Besides data processing, Smart Meter Gateway offers possibility to generate tariff rates in order to enable network operators and consumers to control energy consumption in an intelligent way. The changes regarding this re-certification are based on using a new security module and some bug fixing.",
"id": "BSI-DSZ-CC-0918-V8-2025 (Ausstellungsdatum / Certification Date 03.07.2025, g\u00fcltig bis / valid until 02.07.2033)"
},
{
"description": "The Target of Evaluation (TOE) presented in this document is called \"Smart Meter Gateway\", \u201cSMGW\u201d or \u201cGateway\u201d and uniquely identified as CONEXA 3.0 (CC), Version 1.6. It is the communication unit used within such an intelligent metering system and represented by the product CONEXA 3.0 except for the integrated Security Module. Besides data processing, Smart Meter Gateway offers possibility to generate tariff rates in order to enable network operators and consumers to control energy consumption in an intelligent way. The following changes on the evaluated product have been in the focus of this re-evaluation procedure: Adjustment in assignment of counter register to measured value list, optimization GWA change process, compression of data at the WAN interface, documentation adaptions, implementation of the MPO delivery method, further changes and bugfixes, kernel update and editorial changes.",
"id": "BSI-DSZ-CC-0918-V7-2025 (Ausstellungsdatum / Certification Date 06.02.2025, g\u00fcltig bis / valid until 05.02.2033)"
},
{
"description": "The changes are related to an update of the user guidance and to the certified scope of the delivery procedures. For the certified scope of the delivery procedures, the assurance component ALC_DEL.1 (ALC_DEL.1.1D, ALC_DEL.1.1C) has been refined in the ST to only cover the delivery of the TOE from the manufacturer to the MPO (metering point operator), who is the customer of the developer and the recipient of the TOE.",
"id": "BSI-DSZ-CC-0918-V6-2024-MA-03"
},
{
"description": "The changes are related to an update of the user guidance and to the certified scope of the delivery procedures. For the certified scope of the delivery procedures, the assurance component ALC_DEL.1 (ALC_DEL.1.1D, ALC_DEL.1.1C) has been refined in the ST to only cover the delivery of the TOE from the manufacturer to the MPO (metering point operator), who is the customer of the developer and the recipient of the TOE.",
"id": "BSI-DSZ-CC-0918-V6-2024-MA-02"
},
{
"description": "The maintenance consists of a bug fix that was necessary to eliminate problems with connection interruptions both when tariffing with compact profiles and during network Management.",
"id": "BSI-DSZ-CC-0918-V6-2024-MA-01"
},
{
"description": ", some software adjustments and adjustment of kernel-hardening. And last but not least the boot process was improved, some further adjustments with impact on documentation and editorial changes were made.",
"id": "BSI-DSZ-CC-0918-V6-2024 (Ausstellungsdatum / Certification Date 08.02.2024, g\u00fcltig bis / valid until 07.02.2032)"
},
{
"description": "The change to the certified product is at the level of vendor\u2019s renaming.",
"id": "BSI-DSZ-CC-0918-V5-2023-MA-02"
},
{
"description": "The description of the secure delivery procedure was extended due to adding an alternative delivery procedure (cardbox delivery).",
"id": "BSI-DSZ-CC-0918-V5-2023-MA-01"
},
{
"description": "The focus of this re-evaluation was on certification obligations following BSI-K-TR-0507-2022, mobile phone signal validation without tools, adaption reaction of \u003e36h no time synchronization and some further small changes, adjustments and updates.",
"id": "BSI-DSZ-CC-0918-V5-2023 (Ausstellungsdatum / Certification Date 11.05.2023, g\u00fcltig bis / valid until 10.05.2031)"
},
{
"id": "BSI-DSZ-CC-0918-V4-2022-MA-03"
},
{
"description": "The assembly space for the Fakra socket was adapted.",
"id": "BSI-DSZ-CC-0918-V4-2022-MA-02"
},
{
"description": "The order of the configuration parameters regarding the LTE module were corrected.",
"id": "BSI-DSZ-CC-0918-V4-2022-MA-01"
},
{
"description": "Certificate",
"id": "BSI-DSZ-CC-0918-V4-2022 (Ausstellungsdatum / Certification Date 08.03.2022, g\u00fcltig bis / valid until 07.03.2030)"
},
{
"description": "Certificate",
"id": "BSI-DSZ-CC-0918-V3-2022 (Ausstellungsdatum / Certification Date 24.01.2022, g\u00fcltig bis / valid until 23.01.2030)"
},
{
"description": "), Version 1.1 was enhanced due to the new tariff use cases (TAF) 9, 10 and 14. Further optimizations and some minor bugfixing were also performed.",
"id": "BSI-DSZ-CC-0918-V2-2021 (Ausstellungsdatum / Certification Date 01.07.2021, g\u00fcltig bis / valid until 30.06.2029)"
},
{
"description": "alive values. Therefore the version number changed for the Software from v3.33.0-cc to v3.33.3-cc.",
"id": "BSI-DSZ-CC-0918-2020-MA-01"
}
],
"evaluation_facility": "T\u00dcV Informationstechnik GmbH",
"expiration_date": "2033-07-02",
"product": "CONEXA 3.0, Version 1.7",
"protection_profile": "Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI-CC-PP-0073-2014",
"report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0918V8a_pdf.pdf?__blob=publicationFile\u0026v=2",
"target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0918V8b_pdf.pdf?__blob=publicationFile\u0026v=2"
},
"product": "CONEXA 3.0, Version 1.7",
"subcategory": "(Smart Meter Gateway)",
"url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartMeter_Gateway/0918.html",
"vendor": "Theben Smart Energy GmbH"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0957-V2-2016"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0957-V2-2016",
"BSI-DSZ-CC-0978-2016"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2025-11-28",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0918V8ma1a_pdf.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0918V8ma1b_pdf.pdf",
"maintenance_title": "CONEXA 3.0 Version 1.7, (Hardware: HW V01.00 \u0026 V01.01 \u0026 V01.02, Software: v3.87.1-cc)"
}
]
},
"manufacturer": "Theben Smart Energy GmbH",
"manufacturer_web": "https://www.theben.de",
"name": "CONEXA 3.0, Version 1.7",
"not_valid_after": "2033-07-02",
"not_valid_before": "2025-07-03",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "0918V8c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0918-V8-2025": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 1,
"ALC_FLR.2": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 2,
"EAL 4 augmented": 1,
"EAL 5": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "Federal Office for Information Security",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Theben, SMGW, Smart Meter Gateway, BSI-DSZ-CC-0918-V8-2025\"",
"/Subject": "Common Criteria, Certification, Zertifizierung, Theben, SMGW, Smart Meter Gateway, BSI-DSZ-CC-0918-V8-2025",
"/Title": "Certificate BSI-DSZ-CC-0918-V8-2025",
"pdf_file_size_bytes": 231702,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "0918V8a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.2, AVA_VAN.5 valid until: 2 July 2033",
"cc_version": "PP conformant Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-0918-V8-2025",
"cert_item": "CONEXA 3.0 Version 1.7",
"cert_lab": "BSI",
"developer": "Theben Smart Energy GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI- CC-PP-0073-2014"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 4
}
},
"FF": {
"DH": {
"Diffie-Hellman": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0918-V7-2025": 3,
"BSI-DSZ-CC-0918-V8-": 1,
"BSI-DSZ-CC-0918-V8-2025": 13,
"BSI-DSZ-CC-0957-V2-2016": 1,
"BSI-DSZ-CC-1217-2024": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0073-2014": 3
}
},
"cc_sar": {
"ALC": {
"ALC_CMS.4": 2,
"ALC_FLR": 3,
"ALC_FLR.2": 4
},
"AVA": {
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 3,
"EAL 4": 8,
"EAL 4 augmented": 3,
"EAL 5": 3,
"EAL 5+": 1,
"EAL 6": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"3.0 (ALC_CMS.4), Version 3.87.0-cc, Theben Smart Energy GmbH (confidential document) [10] Handbuch CONEXA 3.0 f\u00fcr Gateway Administrator, Version 2.14.0, 2025-02-17, Theben Smart": 1,
"4 Konfigurationsliste Smart Meter Gateway CONEXA 3.0, Version 1.0, Theben Smart Energy GmbH (confidential document) [9] Configuration list for the TOE SW, \u201cASSURANCE LIFE CYCLE \u2013 CONFIGURATION MANAGEMENT\u201d DER": 1,
"Analysis Report \u2013 Smart Meter Gateway CONEXA, Version 0.5, 2025-05-27, Theben Smart Energy GmbH (confidential document) [20] BSI. Anforderungskatalog zur MSB-Lieferkette, in der aktuell g\u00fcltigen Fassung. URL": 1,
"Energy GmbH [6] Evaluation Technical Report, Version 2, 13.06.2025, T\u00dcV Informationstechnik GmbH, (confidential document) [7] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 1
},
"GCM": {
"GCM": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKEv2": 1
},
"IPsec": {
"IPsec": 1
},
"SSH": {
"SSH": 3
},
"TLS": {
"TLS": {
"TLS": 5,
"TLS 1.2": 1
}
}
},
"crypto_scheme": {
"KA": {
"Key agreement": 1
},
"KEX": {
"Key Exchange": 1
},
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"secp256r1": 1,
"secp384r1": 1
}
},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 3
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 1,
"SHA-384": 1,
"SHA-512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 32": 1,
"AIS 34": 2,
"AIS 38": 1,
"AIS 46": 2,
"AIS 48": 2
},
"FIPS": {
"FIPS 180-4": 4,
"FIPS 197": 6
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
},
"RFC": {
"RFC 2104": 3,
"RFC 3394": 3,
"RFC 4493": 5,
"RFC 5084": 3,
"RFC 5114": 3,
"RFC 5246": 4,
"RFC 5289": 3,
"RFC 5639": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3,
"AES-": 1
}
},
"constructions": {
"MAC": {
"CMAC": 2,
"HMAC": 1
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-02102": 1,
"BSI TR-03109-1": 3
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Federal Office for Information Security",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Theben, SMGW, Smart Meter Gateway, BSI-DSZ-CC-0918-V8-2025\"",
"/Subject": "Common Criteria, Certification, Zertifizierung, Theben, SMGW, Smart Meter Gateway, BSI-DSZ-CC-0918-V8-2025",
"/Title": "Certification Report BSI-DSZ-CC-0918-V8-2025",
"pdf_file_size_bytes": 370407,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.bsi.bund.de/dok/Zertifizierung-Gesamtlisten",
"https://www.bsi.bund.de/AIS",
"https://www.sogis.eu/",
"https://www.bsi.bund.de/zertifizierung",
"https://www.commoncriteriaportal.org/",
"http://www.commoncriteriaportal.org/",
"http://www.commoncriteriaportal.org/cc/",
"https://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 27
},
"st_filename": "0918V8b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 5
},
"ECDSA": {
"ECDSA": 1
}
},
"FF": {
"DH": {
"Diffie-Hellman": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0918-V8-2025": 1,
"BSI-DSZ-CC-0957-V2-2016": 1
},
"NL": {
"CC-1217-2024": 1
}
},
"cc_claims": {
"OE": {
"OE.SM": 4
},
"OSP": {
"OSP.SM": 5
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0073": 1,
"BSI-CC-PP-0077": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1
},
"AGD": {
"AGD_OPE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_DEL.1": 6,
"ALC_FLR.2": 6,
"ALC_LCD.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_INT.1": 1,
"ASE_REQ.2": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_FUN.1": 1
},
"AVA": {
"AVA_VAN.5": 7
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 5,
"EAL 4 augmented": 2,
"EAL4": 1,
"EAL4 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP": 10,
"FAU_ARP.1": 1,
"FAU_GEN": 38,
"FAU_GEN.1": 22,
"FAU_GEN.2": 8,
"FAU_GEN.2.1": 1,
"FAU_SAA": 11,
"FAU_SAA.1": 4,
"FAU_SAR": 30,
"FAU_SAR.1": 7,
"FAU_STG": 32,
"FAU_STG.1": 8,
"FAU_STG.2": 15,
"FAU_STG.2.1": 1,
"FAU_STG.2.2": 1,
"FAU_STG.2.3": 1,
"FAU_STG.3": 3,
"FAU_STG.4": 3
},
"FCO": {
"FCO_NRO": 3,
"FCO_NRO.1": 1,
"FCO_NRO.2": 9,
"FCO_NRO.2.1": 1,
"FCO_NRO.2.2": 1,
"FCO_NRO.2.3": 1
},
"FCS": {
"FCS_CKM": 44,
"FCS_CKM.1": 16,
"FCS_CKM.2": 6,
"FCS_CKM.4": 32,
"FCS_CKM.4.1": 1,
"FCS_COP": 63,
"FCS_COP.1": 10,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC": 2,
"FDP_ACC.1": 9,
"FDP_ACC.2": 11,
"FDP_ACC.2.1": 1,
"FDP_ACC.2.2": 1,
"FDP_ACF.1": 11,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 4,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 3,
"FDP_IFC": 29,
"FDP_IFC.1": 12,
"FDP_IFC.2": 4,
"FDP_IFF": 25,
"FDP_IFF.1": 24,
"FDP_IFF.1.3": 1,
"FDP_ITC.1": 12,
"FDP_ITC.2": 12,
"FDP_RIP": 2,
"FDP_RIP.1": 1,
"FDP_RIP.2": 9,
"FDP_RIP.2.1": 1,
"FDP_SDI": 2,
"FDP_SDI.1": 1,
"FDP_SDI.2": 8,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1
},
"FIA": {
"FIA_AFL": 3,
"FIA_AFL.1": 8,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD": 3,
"FIA_ATD.1": 13,
"FIA_ATD.1.1": 1,
"FIA_UAU": 5,
"FIA_UAU.1": 2,
"FIA_UAU.2": 8,
"FIA_UAU.2.1": 1,
"FIA_UAU.5": 7,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 8,
"FIA_UAU.6.1": 1,
"FIA_UID": 3,
"FIA_UID.1": 8,
"FIA_UID.2": 12,
"FIA_UID.2.1": 1,
"FIA_USB": 3,
"FIA_USB.1": 8,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MOF": 1,
"FMT_MOF.1": 10,
"FMT_MOF.1.1": 1,
"FMT_MSA": 64,
"FMT_MSA.1": 9,
"FMT_MSA.3": 12,
"FMT_SMF": 2,
"FMT_SMF.1": 19,
"FMT_SMF.1.1": 1,
"FMT_SMR": 3,
"FMT_SMR.1": 30,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_CON": 6,
"FPR_CON.1": 10,
"FPR_CON.1.1": 3,
"FPR_CON.1.2": 5,
"FPR_PSE": 2,
"FPR_PSE.1": 8,
"FPR_PSE.1.1": 3,
"FPR_PSE.1.2": 2,
"FPR_PSE.1.3": 2
},
"FPT": {
"FPT_FLS": 3,
"FPT_FLS.1": 10,
"FPT_FLS.1.1": 1,
"FPT_PHP": 3,
"FPT_PHP.1": 8,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_RPL": 3,
"FPT_RPL.1": 8,
"FPT_RPL.1.1": 1,
"FPT_RPL.1.2": 1,
"FPT_STM": 3,
"FPT_STM.1": 18,
"FPT_STM.1.1": 1,
"FPT_TST": 3,
"FPT_TST.1": 9,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC": 30,
"FTP_ITC.1": 9
}
},
"certification_process": {},
"cipher_mode": {
"GCM": {
"GCM": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 62,
"TLS 1.2": 5
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 9
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"NIST P-256": 3,
"NIST P-384": 3,
"P-256": 3,
"P-384": 3,
"secp256r1": 3,
"secp384r1": 3
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 13,
"SHA-384": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"PRNG": 1
},
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"malfunction": 2,
"physical tampering": 4
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 3,
"FIPS 180-4": 8,
"FIPS 197": 12
},
"RFC": {
"RFC 2104": 6,
"RFC 2616": 5,
"RFC 3394": 3,
"RFC 4493": 8,
"RFC 5084": 4,
"RFC 5114": 5,
"RFC 5246": 7,
"RFC 5289": 6,
"RFC 5639": 5,
"RFC 5905": 4,
"RFC5246": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 7
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-03109": 1,
"BSI TR-03109-1": 2
}
},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256": 2,
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 2,
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384": 2,
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 2
}
},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Theben Smart Energy GmbH",
"/Subject": "Security Target",
"/Title": "Security Target v1.98.0 - CONEXA 3.0",
"pdf_file_size_bytes": 1745490,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf",
"https://www.bsi.bund.de/DE/Themen/Unternehmen-und-Organisationen/Standards-und-Zertifizierung/Smart-metering/Smart-Meter-Gateway/MSB/MSB_node.html",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf",
"http://www.jtc1sc27.din.de/sce/sd6"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 132
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0918V8a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.2",
"EAL4+",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0918V8b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "3c7c1f8d2f775f25a6bf3dfc280643320263f5dcd9de15e31fec4add9e5befc5",
"txt_hash": "7111a5847ed0d389e6767a8d0177fdc4caedd164a56d2554928e31991d3bbdc9"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "cd6f3e237128c897ff0db91c965453ed01d027e4fa6a68031cf364e48cd684b8",
"txt_hash": "d0c95683c749f19dec832a4243e42774a7d3b063e03d60f0e0d34f625ef13560"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "d6bdf2d0f08dd8015963e1137ddda3d548efe22e757a10654efacccb695f980c",
"txt_hash": "8a5db36c25e7010c09b496841e6f7946fa0085f335e431565478b82f80bc2faf"
}
},
"status": "active"
}