name |
STARCOS 3.2 QES Version 1.0
|
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6
|
category |
Products for Digital Signatures
|
Data Protection
|
not_valid_before |
2008-04-02
|
2014-11-07
|
not_valid_after |
2019-09-01
|
2019-11-08
|
scheme |
DE
|
DE
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080527_0407b.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772b_pdf.pdf
|
status |
archived
|
archived
|
manufacturer |
G+D Mobile Security GmbH
|
Kanguru Solutions
|
manufacturer_web |
https://www.gi-de.com/de/de/mobile-security/
|
https://www.kanguru.com
|
security_level |
EAL4+, AVA_VLA.4, AVA_MSU.3 |
ALC_FLR.1, EAL2+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080527_0407a.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772a_pdf.pdf
|
cert_link |
None
|
None
|
protection_profiles |
|
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Schutzprofil fur USB-Datentrager, Version 1.4', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0025b.pdf', 'pp_ids': frozenset({'SCHUTZPROFIL_USB-DATENTRAGER_V1.4'})}) |
maintenance_updates |
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2008, 9, 3), 'maintenance_title': 'Starcos 3.2 QES, Version 1.1', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0407_ma1.pdf', 'maintenance_st_link': None}) |
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2015, 1, 20), 'maintenance_title': 'Kanguru Defender Elite 200 and Kanguru Defender 2000, firmware version 2.05.10', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1b_pdf.pdf'}) |
state/cert |
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
662aef500338878a59d1f453345eaa960798a255362b57522058817c2b159169
|
16e52e72927a5eee7124e6fde0c186c1d3d113e733e6116f5fdfcc44278c5b57
|
state/report/txt_hash |
ae7c44ac070fb5dc03b57635f151d4b3343e402e2eb6157d32293904ec92a6d5
|
8cb2309bdc02367be25c3961b565d25c9f78b2d7cdce20c08213092f4a2eff82
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
a2197eb682b1b6e45379edf446d7349c9efa7faa405e93a593d04fe4b1d06a35
|
077d27d1e2e9eafc65cbb9d302bc66883e2dd06e21ea816741ca25fe7f7dcd7d
|
state/st/txt_hash |
acb2e8af61be4fc46d1fbf068933f5a02429650431376fcc44770a6766a4a4f5
|
74714db4c60a8332c3603aaae83a1c8ec3cbea7950400f562332e8ccdcc98147
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
BSI-DSZ-CC-0407-2008
|
BSI-DSZ-CC-0772-2014
|
heuristics/cert_lab |
BSI |
BSI |
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
1.0, 3.2 |
2.0.0.0, 1.2.1.8, 3.2.0.3, 02.03.10, 5.0.2.6 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
None
|
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0406-2007, BSI-DSZ-CC-0322-2005 |
None
|
heuristics/report_references/indirectly_referenced_by |
None
|
None
|
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0406-2007, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0223-2003 |
None
|
heuristics/scheme_data |
None
|
None
|
heuristics/st_references/directly_referenced_by |
None
|
None
|
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-0322-2005 |
None
|
heuristics/st_references/indirectly_referenced_by |
None
|
None
|
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0322-2005 |
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
None
|
pdf_data/cert_metadata |
None
|
None
|
pdf_data/report_filename |
20080527_0407a.pdf
|
0772a_pdf.pdf
|
pdf_data/report_frontpage/DE/cert_id |
BSI-DSZ-CC-0407-2008
|
BSI-DSZ-CC-0772-2014
|
pdf_data/report_frontpage/DE/cert_item |
STARCOS 3.2 QES Version 1.0
|
Kanguru Defender Elite 200 Kanguru Defender 2000 Universal Kanguru Local Administrator, v3.2.0.3 Kanguru Remote Management Console, v5.0.2.6
|
pdf_data/report_frontpage/DE/cert_lab |
BSI
|
BSI
|
pdf_data/report_frontpage/DE/developer |
Giesecke & Devrient GmbH Certification Report V1.0 ZS-01-01-F-326 V4.1 BSI -
|
Kanguru Solutions
|
pdf_data/report_frontpage/DE/match_rules |
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*) |
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*) |
pdf_data/report_keywords/asymmetric_crypto |
- RSA:
- RSA 2048:
2
- RSA 1024:
1
- RSA 1280:
1
- RSA 1536:
1
- RSA2048:
1
|
|
pdf_data/report_keywords/cc_cert_id/DE |
- BSI-DSZ-CC-0407-2008:
20
- BSI-DSZ-CC-0406:
1
- BSI-DSZ-CC-0322-2005:
1
- BSI-DSZ-CC-0406-2007:
1
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT:
2
- ACM_CAP:
2
- ACM_SCP:
2
- ADO:
- ADV:
- ADV_FSP:
2
- ADV_HLD:
2
- ADV_IMP:
2
- ADV_INT:
2
- ADV_LLD:
2
- ADV_RCR:
2
- ADV_SPM:
2
- AGD:
- ALC:
- ALC_DVS:
2
- ALC_FLR:
2
- ALC_LCD:
1
- ALC_TAT:
2
- ATE:
- ATE_FUN:
3
- ATE_IND:
4
- ATE_COV:
2
- ATE_DPT:
2
- AVA:
- AVA_MSU.3:
5
- AVA_VLA.4:
6
- AVA_VLA:
5
- AVA_CCA:
2
- AVA_MSU:
2
- AVA_SOF:
3
- AVA_VLA.2:
1
- AVA_VLA.3:
1
- APE:
- APE_DES:
1
- APE_ENV:
1
- APE_INT:
1
- APE_OBJ:
1
- APE_REQ:
1
- APE_SRE:
1
- ASE:
- ASE_DES:
1
- ASE_ENV:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_PPC:
1
- ASE_REQ:
1
- ASE_SRE:
1
- ASE_TSS:
1
|
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.1:
1
- ADV_FSP.2:
1
- ADV_FSP.3:
1
- ADV_FSP.4:
1
- ADV_FSP.5:
1
- ADV_FSP.6:
1
- ADV_IMP.1:
1
- ADV_IMP.2:
1
- ADV_INT.1:
1
- ADV_INT.2:
1
- ADV_INT.3:
1
- ADV_SPM.1:
1
- ADV_TDS.1:
1
- ADV_TDS.2:
1
- ADV_TDS.3:
1
- ADV_TDS.4:
1
- ADV_TDS.5:
1
- ADV_TDS.6:
1
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- AGD_OPE:
1
- AGD_PRE:
1
- ALC:
- ALC_FLR.1:
5
- ALC_FLR:
3
- ALC_CMC.1:
1
- ALC_CMC.2:
1
- ALC_CMC.3:
1
- ALC_CMC.4:
1
- ALC_CMC.5:
1
- ALC_CMS.1:
1
- ALC_CMS.2:
1
- ALC_CMS.3:
1
- ALC_CMS.4:
1
- ALC_CMS.5:
1
- ALC_DEL.1:
1
- ALC_DVS.1:
1
- ALC_DVS.2:
1
- ALC_FLR.2:
1
- ALC_FLR.3:
1
- ALC_LCD.1:
1
- ALC_LCD.2:
1
- ALC_TAT.1:
1
- ALC_TAT.2:
1
- ALC_TAT.3:
1
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
- ATE:
- ATE_COV.1:
2
- ATE_COV.2:
1
- ATE_COV.3:
1
- ATE_DPT.1:
1
- ATE_DPT.2:
1
- ATE_DPT.3:
1
- ATE_DPT.4:
1
- ATE_FUN.1:
1
- ATE_FUN.2:
1
- ATE_IND.1:
1
- ATE_IND.2:
1
- ATE_IND.3:
1
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- AVA_VAN.1:
1
- AVA_VAN.2:
1
- AVA_VAN.3:
1
- AVA_VAN.4:
1
- AVA_VAN.5:
1
- AVA_VAN:
2
- APE:
- APE_INT.1:
1
- APE_CCL.1:
1
- APE_SPD.1:
1
- APE_OBJ.1:
1
- APE_OBJ.2:
1
- APE_ECD.1:
1
- APE_REQ.1:
1
- APE_REQ.2:
1
- ASE:
- ASE_INT.1:
1
- ASE_CCL.1:
1
- ASE_SPD.1:
1
- ASE_OBJ.1:
1
- ASE_OBJ.2:
1
- ASE_ECD.1:
1
- ASE_REQ.1:
1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
- ASE_TSS.2:
1
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_sar/ADV |
- ADV_FSP:
2
- ADV_HLD: 2
- ADV_IMP:
2
- ADV_INT:
2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM:
2
|
- ADV_ARC.1: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM.1: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- ADV_ARC: 1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS: 1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP |
2
|
1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_IMP |
2
|
1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_INT |
2
|
1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_SPM |
2
|
1
|
pdf_data/report_keywords/cc_sar/AGD |
|
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- AGD_OPE:
1
- AGD_PRE:
1
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_DVS:
2
- ALC_FLR:
2
- ALC_LCD: 1
- ALC_TAT:
2
|
- ALC_FLR.1: 5
- ALC_FLR:
3
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 1
- ALC_LCD.2: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS:
1
- ALC_TAT:
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS |
2
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
2
|
3
|
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT |
2
|
1
|
pdf_data/report_keywords/cc_sar/APE |
- APE_DES:
1
- APE_ENV:
1
- APE_INT:
1
- APE_OBJ:
1
- APE_REQ:
1
- APE_SRE:
1
|
- APE_INT.1:
1
- APE_CCL.1:
1
- APE_SPD.1:
1
- APE_OBJ.1:
1
- APE_OBJ.2:
1
- APE_ECD.1:
1
- APE_REQ.1:
1
- APE_REQ.2:
1
|
pdf_data/report_keywords/cc_sar/ASE |
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS:
1
|
- ASE_INT.1: 1
- ASE_CCL.1: 1
- ASE_SPD.1: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_ECD.1: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_SPD: 1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_INT |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_OBJ |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_TSS |
1
|
1
|
pdf_data/report_keywords/cc_sar/ATE |
- ATE_FUN:
3
- ATE_IND:
4
- ATE_COV:
2
- ATE_DPT:
2
|
- ATE_COV.1: 2
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_COV |
2
|
1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_DPT |
2
|
1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_FUN |
3
|
1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_IND |
4
|
1
|
pdf_data/report_keywords/cc_sar/AVA |
- AVA_MSU.3:
5
- AVA_VLA.4:
6
- AVA_VLA:
5
- AVA_CCA:
2
- AVA_MSU:
2
- AVA_SOF:
3
- AVA_VLA.2:
1
- AVA_VLA.3:
1
|
- AVA_VAN.1:
1
- AVA_VAN.2:
1
- AVA_VAN.3:
1
- AVA_VAN.4:
1
- AVA_VAN.5:
1
- AVA_VAN:
2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4:
8
- EAL4:
7
- EAL 1:
1
- EAL 7:
1
- EAL5+:
1
- EAL 4+:
1
- EAL1:
5
- EAL3:
4
- EAL5:
6
- EAL7:
4
- EAL2:
3
- EAL6:
3
- EAL 4 augmented:
3
|
- EAL:
- EAL 2:
8
- EAL 1:
7
- EAL 4:
7
- EAL2:
2
- EAL 3:
4
- EAL 5:
6
- EAL 6:
3
- EAL 7:
4
- EAL 2 augmented:
3
- ITSEC:
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 4:
8
- EAL4: 7
- EAL 1:
1
- EAL 7:
1
- EAL5+: 1
- EAL 4+: 1
- EAL1: 5
- EAL3: 4
- EAL5: 6
- EAL7: 4
- EAL2:
3
- EAL6: 3
- EAL 4 augmented: 3
|
- EAL 2: 8
- EAL 1:
7
- EAL 4:
7
- EAL2:
2
- EAL 3: 4
- EAL 5: 6
- EAL 6: 3
- EAL 7:
4
- EAL 2 augmented: 3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 |
1
|
7
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 |
8
|
7
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 7 |
1
|
4
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 |
3
|
2
|
pdf_data/report_keywords/cc_sfr |
|
- FCS:
- FCS_COP.1:
1
- FCS_CKM.1:
1
- FCS_RNG.1:
1
- FDP:
- FDP_ACC.1:
2
- FDP_ACF.1:
2
- FIA:
- FIA_UID.2:
4
- FIA_UAU.2:
4
- FIA_UAU.6:
1
- FIA_SOS.1:
1
- FMT:
- FMT_MTD:
2
- FMT_SMF:
2
- FMT_SMF.1:
1
|
pdf_data/report_keywords/certification_process/ConfidentialDocument |
- BSI-DSZ-0407-2008, Version 1.9, Date 19.11.2007, Security Target of STARCOS 3.2 QES V1.0, G&D (confidential document) [7] Security Target BSI-DSZ-0407-2008, Version 1.0, Date 19.11.2007, Security Target Lite STARCOS:
1
- Evaluation Technical Report (ETR), Evaluation Body for IT Security of TÜV Informationstechnik GmbH (confidential document) B-16 BSI-DSZ-CC-0407-2008 Certification Report [9] Protection Profile Secure Signature Creation:
1
- Technical Report (ETR-LITE), Evaluation Body for IT Security of TÜV Informationstechnik GmbH (confidential document) [11] Certification Report BSI-DSZ-CC-0322-2005 for Infineon Smart Card IC (Security Controller:
1
- list for the TOE, Version 1.5, Date 19.11.2007, Configuration List STARCOS 3.2 eGK, G&D (confidential document) [13] Administrator guidance STARCOS 3.2 eGK; STARCOS 3.2 QES V1.0, Version 0.9/Status 02.07.07 [14:
1
|
- Report, Version 8, 2014-10-07, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [9] Evaluated Product User Guide, Version 1.20, 2014-10-02 [10] Kanguru Defender Elite 200 User:
1
- KRMC Administrator's User Manual, Version 5.0.2, 2013-11-01 [14] Configuration lists for the TOE (confidential documents): a) Configuration list for TOE executables, 2014-09-17 b) Configuration list from Phison:
1
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik:
5
|
|
pdf_data/report_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224:
3
- SHA-256:
3
- SHA-384:
3
- SHA-512:
2
- RIPEMD:
|
|
pdf_data/report_keywords/hash_function/SHA |
- SHA1:
- SHA2:
- SHA-224:
3
- SHA-256:
3
- SHA-384:
3
- SHA-512:
2
|
|
pdf_data/report_keywords/hash_function/SHA/SHA2 |
- SHA-224: 3
- SHA-256:
3
- SHA-384: 3
- SHA-512: 2
|
|
pdf_data/report_keywords/hash_function/SHA/SHA2/SHA-256 |
3
|
13
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis/FI |
- physical tampering:
1
- malfunction: 1
|
|
pdf_data/report_keywords/side_channel_analysis/FI/physical tampering |
1
|
2
|
pdf_data/report_keywords/standard_id/BSI |
- AIS 34: 3
- AIS 36: 4
- AIS 25: 2
- AIS 26: 2
- AIS 20:
1
- AIS 35: 2
- AIS 31: 1
- AIS 32:
1
- AIS 38: 1
|
|
pdf_data/report_keywords/standard_id/BSI/AIS 20 |
1
|
2
|
pdf_data/report_keywords/standard_id/BSI/AIS 32 |
1
|
1
|
pdf_data/report_keywords/standard_id/ISO |
|
- ISO/IEC 17065:
2
- ISO/IEC 15408:
2
- ISO/IEC 18045:
2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/symmetric_crypto/AES_competition |
|
|
pdf_data/report_keywords/technical_report_id/BSI |
- BSI 7125:
2
- BSI 7148:
1
- BSI 7149: 1
|
- BSI TR-02102: 1
- BSI 7138: 2
- BSI 7125:
2
- BSI 7148:
1
|
pdf_data/report_keywords/technical_report_id/BSI/BSI 7125 |
2
|
2
|
pdf_data/report_keywords/technical_report_id/BSI/BSI 7148 |
1
|
1
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
- Infineon:
- GD:
- Giesecke & Devrient:
11
- G&D:
7
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
278952
- pdf_is_encrypted:
False
- pdf_number_of_pages:
38
- /CreationDate:
D:20080408134512+02'00'
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /Creator:
Acrobat PDFMaker 8.1 für Word
- /Keywords:
"Common Criteria, Certification, Zertifizierung, Signaturkarte, qualifizierte elektronische Signatur, electronic signature, QES"
- /Producer:
Acrobat Distiller 8.1.0 (Windows)
- /ModDate:
D:20080408144908+02'00'
- /Company: BSI, Postfach 200363, 53133 Bonn
- /SourceModified: D:20080408091300
- /Title:
Certification Report BSI-DSZ-CC-0407-2008
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
1643286
- pdf_is_encrypted:
False
- pdf_number_of_pages:
42
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate:
D:20141121083051+01'00'
- /Creator:
Writer
- /Keywords:
"Common Criteria, Certification, Zertifizierung, encrypted USB storage device, Kanguru Defender"
- /ModDate:
D:20141121113713+01'00'
- /Producer:
LibreOffice 4.2
- /Subject: Common Criteria Certification
- /Title:
Certification Report BSI-DSZ-CC-0772-2014
- pdf_hyperlinks:
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/
|
pdf_data/report_metadata//Author |
Bundesamt für Sicherheit in der Informationstechnik
|
Bundesamt für Sicherheit in der Informationstechnik
|
pdf_data/report_metadata//CreationDate |
D:20080408134512+02'00'
|
D:20141121083051+01'00'
|
pdf_data/report_metadata//Creator |
Acrobat PDFMaker 8.1 für Word
|
Writer
|
pdf_data/report_metadata//Keywords |
"Common Criteria, Certification, Zertifizierung, Signaturkarte, qualifizierte elektronische Signatur, electronic signature, QES"
|
"Common Criteria, Certification, Zertifizierung, encrypted USB storage device, Kanguru Defender"
|
pdf_data/report_metadata//ModDate |
D:20080408144908+02'00'
|
D:20141121113713+01'00'
|
pdf_data/report_metadata//Producer |
Acrobat Distiller 8.1.0 (Windows)
|
LibreOffice 4.2
|
pdf_data/report_metadata//Title |
Certification Report BSI-DSZ-CC-0407-2008
|
Certification Report BSI-DSZ-CC-0772-2014
|
pdf_data/report_metadata/pdf_file_size_bytes |
278952
|
1643286
|
pdf_data/report_metadata/pdf_hyperlinks |
|
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/ |
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
38
|
42
|
pdf_data/st_filename |
20080527_0407b.pdf
|
0772b_pdf.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id/DE |
- BSI-DSZ-CC-0322-2005:
2
- BSI-DSZ-CC-0322-2005-MA-04:
1
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
- BSI-PP-0002-2001:
2
- BSI-PP- 0006-2002:
1
- BSI-PP-0006-2002:
1
|
- BSI-PP-0025:
6
- BSI-PP- 0025:
13
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1:
3
- ACM_SCP.2:
3
- ACM_CAP.4:
2
- ACM_CAP.3:
1
- ADO:
- ADO_DEL.2:
4
- ADO_IGS.1:
5
- ADV:
- ADV_FSP.2:
3
- ADV_IMP.1:
6
- ADV_RCR.1:
5
- ADV_SPM.1:
3
- ADV_HLD.2:
4
- ADV_LLD.1:
5
- ADV_FSP.1:
10
- ADV_HLD.1:
2
- AGD:
- AGD_ADM.1:
10
- AGD_USR.1:
9
- ALC:
- ALC_DVS.1:
4
- ALC_TAT.1:
5
- ALC_LCD.1:
2
- ATE:
- ATE_COV.2:
3
- ATE_FUN.1:
5
- ATE_DPT.1:
1
- ATE_IND.2:
1
- AVA:
- AVA_MSU.3:
9
- AVA_VLA.4:
10
- AVA_SOF:
1
- AVA_SOF.1:
3
|
- ADV:
- ADV_SPM.1:
2
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_TDS.1:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_FLR.1:
5
- ALC_CMC.2:
1
- ALC_CMS.2:
1
- ALC_DEL.1:
1
- ATE:
- ATE_COV.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- ASE:
- ASE_INT.1:
1
- ASE_CCL.1:
1
- ASE_SPD.1:
1
- ASE_OBJ.2:
1
- ASE_ECD.1:
1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_FSP.2:
3
- ADV_IMP.1: 6
- ADV_RCR.1: 5
- ADV_SPM.1:
3
- ADV_HLD.2: 4
- ADV_LLD.1: 5
- ADV_FSP.1: 10
- ADV_HLD.1: 2
|
- ADV_SPM.1:
2
- ADV_ARC.1: 1
- ADV_FSP.2:
1
- ADV_TDS.1: 1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.2 |
3
|
1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_SPM.1 |
3
|
2
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_ADM.1:
10
- AGD_USR.1:
9
|
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_DVS.1:
4
- ALC_TAT.1:
5
- ALC_LCD.1:
2
|
- ALC_FLR.1:
5
- ALC_CMC.2:
1
- ALC_CMS.2:
1
- ALC_DEL.1:
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.2: 3
- ATE_FUN.1:
5
- ATE_DPT.1: 1
- ATE_IND.2:
1
|
- ATE_COV.1: 1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 |
5
|
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AVA |
- AVA_MSU.3:
9
- AVA_VLA.4:
10
- AVA_SOF:
1
- AVA_SOF.1:
3
|
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL5+:
2
- EAL4+:
4
- EAL4:
7
- EAL 4:
21
- EAL4 augmented:
2
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM.1:
10
- FCS_CKM.1.1:
3
- FCS_CKM.4:
14
- FCS_COP.1:
9
- FCS_CKM.2:
2
- FCS_CKM.3:
2
- FCS_COP:
12
- FCS_CKM:
8
- FDP:
- FDP_ACC.1:
14
- FDP_ACF.1:
17
- FDP_ETC.1:
3
- FDP_ITC.1:
7
- FDP_RIP.1:
5
- FDP_RIP.1.1:
2
- FDP_SDI.2:
6
- FDP_UIT.1:
6
- FDP_UIT:
11
- FDP_UAU.1:
1
- FDP_UID.1:
1
- FDP_ACF.1.4:
1
- FDP_ACC:
24
- FDP_ACF:
26
- FDP_ETC:
5
- FDP_ITC:
6
- FDP_SDI:
10
- FIA:
- FIA_AFL.1:
6
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1:
5
- FIA_ATD.1.1:
2
- FIA_UAU.1:
7
- FIA_UAU.1.1:
1
- FIA_UID.1:
7
- FIA_UAU.1.2:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_AFL:
1
- FIA_UID:
1
- FMT:
- FMT_MOF.1:
6
- FMT_MOF.1.1:
3
- FMT_MSA.1:
8
- FMT_MSA.2:
10
- FMT_MSA.2.1:
3
- FMT_MSA.3:
12
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MTD.1:
3
- FMT_MTD.1.1:
3
- FMT_SMF.1:
10
- FMT_SMF.1.1:
3
- FMT_SMR.1:
10
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA:
9
- FMT_SMR:
1
- FPT:
- FPT_AMT.1:
6
- FPT_AMT.1.1:
2
- FPT_FLS.1:
5
- FPT_FLS.1.1:
2
- FPT_PHP.1:
5
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_PHP.3:
4
- FPT_PHP.3.1:
2
- FPT_RVM.1:
8
- FPT_RVM.1.1:
1
- FPT_SEP.1:
9
- FPT_SEP.1.1:
1
- FPT_SEP.1.2:
1
- FPT_TST.1:
6
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_FLS:
1
- FPT_PHP:
1
- FPT_RVM:
1
- FPT_TST:
1
- FTP:
- FTP_ITC.1:
8
- FTP_ITC:
11
- FTP_TRP:
2
|
- FAU:
- FCS:
- FCS_RNG.1:
15
- FCS_CKM.1:
9
- FCS_CKM.4:
9
- FCS_COP.1:
9
- FCS_RNG:
2
- FCS_RNG.1.1:
3
- FCS_RNG.1.2:
3
- FCS_CKM.1.1:
1
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
1
- FCS_CKM.2:
1
- FDP:
- FDP_ACC.1:
14
- FDP_ACF.1:
13
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_ITC.1:
2
- FDP_ITC.2:
2
- FDP_IFC.1:
1
- FIA:
- FIA_UAU.1:
7
- FIA_UAU.6:
8
- FIA_SOS.1:
8
- FIA_UAU.2:
9
- FIA_UID.2:
10
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.6.1:
1
- FIA_SOS.1.1:
1
- FIA_UAU.2.1:
1
- FIA_UID.2.1:
1
- FIA_UID.1:
2
- FMT:
- FMT_MSA.1:
8
- FMT_MTD:
12
- FMT_SMF:
20
- FMT_SMR.1:
12
- FMT_SMF.1:
6
- FMT_MTD.1:
3
- FMT_MSA.1.1:
1
- FMT_MTD.1.1:
2
- FMT_SMF.1.1:
2
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA.3:
1
- FPT:
- FPT_FLS.1:
9
- FPT_RCV.4:
8
- FPT_PHP.1:
8
- FPT_RCV.4.1:
2
- FPT_FLS.1.1:
1
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
|
pdf_data/st_keywords/cc_sfr/FAU |
|
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_CKM.1:
10
- FCS_CKM.1.1:
3
- FCS_CKM.4:
14
- FCS_COP.1:
9
- FCS_CKM.2:
2
- FCS_CKM.3: 2
- FCS_COP: 12
- FCS_CKM: 8
|
- FCS_RNG.1: 15
- FCS_CKM.1:
9
- FCS_CKM.4:
9
- FCS_COP.1:
9
- FCS_RNG: 2
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 3
- FCS_CKM.1.1:
1
- FCS_CKM.4.1: 1
- FCS_COP.1.1: 1
- FCS_CKM.2:
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
10
|
9
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 |
3
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
14
|
9
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
9
|
9
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACC.1:
14
- FDP_ACF.1:
17
- FDP_ETC.1: 3
- FDP_ITC.1:
7
- FDP_RIP.1: 5
- FDP_RIP.1.1: 2
- FDP_SDI.2: 6
- FDP_UIT.1: 6
- FDP_UIT: 11
- FDP_UAU.1: 1
- FDP_UID.1: 1
- FDP_ACF.1.4:
1
- FDP_ACC: 24
- FDP_ACF: 26
- FDP_ETC: 5
- FDP_ITC: 6
- FDP_SDI: 10
|
- FDP_ACC.1:
14
- FDP_ACF.1:
13
- FDP_ACC.1.1: 1
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4:
1
- FDP_ITC.1:
2
- FDP_ITC.2: 2
- FDP_IFC.1: 1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
14
|
14
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
17
|
13
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
7
|
2
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 5
- FIA_ATD.1.1: 2
- FIA_UAU.1:
7
- FIA_UAU.1.1:
1
- FIA_UID.1:
7
- FIA_UAU.1.2:
1
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_AFL: 1
- FIA_UID: 1
|
- FIA_UAU.1:
7
- FIA_UAU.6: 8
- FIA_SOS.1: 8
- FIA_UAU.2: 9
- FIA_UID.2: 10
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.6.1: 1
- FIA_SOS.1.1: 1
- FIA_UAU.2.1: 1
- FIA_UID.2.1: 1
- FIA_UID.1:
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
7
|
7
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
7
|
2
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MOF.1: 6
- FMT_MOF.1.1: 3
- FMT_MSA.1:
8
- FMT_MSA.2: 10
- FMT_MSA.2.1: 3
- FMT_MSA.3:
12
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1:
3
- FMT_MTD.1.1:
3
- FMT_SMF.1:
10
- FMT_SMF.1.1:
3
- FMT_SMR.1:
10
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA: 9
- FMT_SMR: 1
|
- FMT_MSA.1:
8
- FMT_MTD: 12
- FMT_SMF: 20
- FMT_SMR.1:
12
- FMT_SMF.1:
6
- FMT_MTD.1:
3
- FMT_MSA.1.1: 1
- FMT_MTD.1.1:
2
- FMT_SMF.1.1:
2
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA.3:
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
8
|
8
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
12
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 |
3
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
10
|
6
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
3
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
10
|
12
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_AMT.1: 6
- FPT_AMT.1.1: 2
- FPT_FLS.1:
5
- FPT_FLS.1.1:
2
- FPT_PHP.1:
5
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_PHP.3: 4
- FPT_PHP.3.1: 2
- FPT_RVM.1: 8
- FPT_RVM.1.1: 1
- FPT_SEP.1: 9
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_FLS: 1
- FPT_PHP: 1
- FPT_RVM: 1
- FPT_TST: 1
|
- FPT_FLS.1:
9
- FPT_RCV.4: 8
- FPT_PHP.1:
8
- FPT_RCV.4.1: 2
- FPT_FLS.1.1:
1
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 |
5
|
9
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.1 |
5
|
8
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.1.2 |
1
|
1
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- Out of scope:
2
- 11 1.5.4.3 Out of scope :
1
- 11 1.5.4.3 Out of scope ........................................................................................... 12 1.5:
1
- from the KRMC to the device. Commands are queued at the KRMC until polled form the device. 1.5.4.3 Out of scope The TOE supports additional features that are not part of the scope: ● Antivirus solution ●:
1
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cipher_mode/CBC |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- RIPEMD:
- RIPEMD160:
1
- RIPEMD-160:
2
|
|
pdf_data/st_keywords/hash_function/SHA |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
- SCA:
- SPA:
1
- DPA:
1
- timing attacks:
1
- FI:
- physical tampering:
9
- DFA:
1
|
|
pdf_data/st_keywords/side_channel_analysis/FI |
- physical tampering:
9
- DFA: 1
|
|
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering |
9
|
3
|
pdf_data/st_keywords/standard_id |
- FIPS:
- PKCS:
- BSI:
- AIS20:
1
- AIS31:
1
- AIS 31:
1
- AIS 20:
1
- AIS 32:
1
- ISO:
- ISO/IEC 9796-2:
1
- ISO/IEC 9796-1:
1
- ISO/IEC 15408:2005:
1
|
|
pdf_data/st_keywords/standard_id/BSI |
- AIS20: 1
- AIS31: 1
- AIS 31:
1
- AIS 20:
1
- AIS 32: 1
|
|
pdf_data/st_keywords/standard_id/BSI/AIS 20 |
1
|
1
|
pdf_data/st_keywords/standard_id/BSI/AIS 31 |
1
|
1
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
- Infineon:
- Infineon:
4
- Infineon Technologies AG:
3
- GD:
- Giesecke & Devrient:
7
- G&D:
6
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
318571
- pdf_is_encrypted:
True
- pdf_number_of_pages:
71
- /Company: Giesecke & Devrient
- /CreationDate:
D:20071119155707+01'00'
- /Creator:
Acrobat PDFMaker 7.0 für Word
- /Keywords:
Version 1.0/Status 19.11.2007
- /ModDate:
D:20071119155754+01'00'
- /Producer:
Acrobat Distiller 7.0 (Windows)
- /Subject:
STARCOS 3.2 QES V1.0
- /Title:
Security Target Lite
- pdf_hyperlinks:
http://www.commoncriteriaportal.org/public/expert/index.php?menu=5
|
- pdf_file_size_bytes:
704587
- pdf_is_encrypted:
False
- pdf_number_of_pages:
41
- /Keywords:
Security Target, Common Criteria, USB Storage, Encryption, Protected Storage
- /Subject:
- /Title:
Kanguru Defender Security Target (version 1.10 as of 2014-10-06)
- /Creator:
Unknown
- /Author: Andreas Siegert (generated by CCTool version 2.8)
- /Producer:
XEP 4.23
- /application: CCTool version x.y
- /Trapped: /False
- /CreationDate:
D:20141006150157Z
- /ModDate:
D:20141006150157Z
- pdf_hyperlinks:
http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf
|
pdf_data/st_metadata//CreationDate |
D:20071119155707+01'00'
|
D:20141006150157Z
|
pdf_data/st_metadata//Creator |
Acrobat PDFMaker 7.0 für Word
|
Unknown
|
pdf_data/st_metadata//Keywords |
Version 1.0/Status 19.11.2007
|
Security Target, Common Criteria, USB Storage, Encryption, Protected Storage
|
pdf_data/st_metadata//ModDate |
D:20071119155754+01'00'
|
D:20141006150157Z
|
pdf_data/st_metadata//Producer |
Acrobat Distiller 7.0 (Windows)
|
XEP 4.23
|
pdf_data/st_metadata//Subject |
STARCOS 3.2 QES V1.0
|
|
pdf_data/st_metadata//Title |
Security Target Lite
|
Kanguru Defender Security Target (version 1.10 as of 2014-10-06)
|
pdf_data/st_metadata/pdf_file_size_bytes |
318571
|
704587
|
pdf_data/st_metadata/pdf_hyperlinks |
http://www.commoncriteriaportal.org/public/expert/index.php?menu=5 |
http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf |
pdf_data/st_metadata/pdf_is_encrypted |
True
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
71
|
41
|
dgst |
0e57b8c8bb3e9fe3
|
eda06ca3c208ebd0
|