Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Huawei UNC V001R001C20SPC200 with Patch V100R001C20SPH230
2019-7-INF-4068
STARCOS 3.4 Health SMC-B C1
BSI-DSZ-CC-0692-2011
name Huawei UNC V001R001C20SPC200 with Patch V100R001C20SPH230 STARCOS 3.4 Health SMC-B C1
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme ES DE
status active archived
not_valid_after 21.09.2028 01.09.2019
not_valid_before 21.06.2023 21.07.2011
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-07_Certificado.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-07-INF-4068.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0692a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-07_ST.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0692b_pdf.pdf
manufacturer Huawei Technologies Co., Ltd. G+D Mobile Security GmbH
manufacturer_web https://www.huawei.com https://www.gi-de.com/de/de/mobile-security/
security_level EAL4+, ALC_FLR.1 EAL4+, AVA_VAN.5
dgst 0e8a25a9fbdc32c5 deaaec8413e98427
heuristics/cert_id 2019-7-INF-4068 BSI-DSZ-CC-0692-2011
heuristics/cert_lab [] BSI
heuristics/extracted_sars ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_INT.1, ALC_CMC.4, ATE_FUN.1, ALC_DEL.1, AGD_OPE.1, ADV_ARC.1, ADV_IMP.1, ASE_CCL.1, AVA_VAN.3, ASE_REQ.2 ALC_LCD.2, ASE_INT.1, ALC_DVS.2, ASE_ECD.1, APE_ECD.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ADV_COMP.1, ALC_DEL.1, ALC_TAT.3, ALC_FLR.3, ATE_FUN.2, AGD_OPE.1, AGD_PRE.1, ATE_IND.3, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_IMP.2, ADV_TDS.3, ATE_DPT.1, ALC_CMC.5, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, APE_OBJ.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1
heuristics/extracted_versions - 3.4
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0466-2008
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0466-2008
heuristics/scheme_data
  • category: Others
  • certification_date: 21.06.2023
  • enhanced:
    • category: Others
    • cc_version: Common Criteria 3.1 release 5
    • cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1852
    • certification_date: 21.06.2023
    • description: The TOE is server service software that is deployed on CloudOS, which serves as a united network controller (UNC). UNC authenticates mobile subscribers onto the network system and tracks active and idle subscribers on the network system. UNC pages mobile subscribers when it is triggered by new data arriving for an idle subscriber at the assigned Serving GW (gateway). When a subscriber attaches to an eNodeB, the eNodeB select a UNC. UNC in turn selects the Serving GW and the PDN GW that will handle bearer packets of the subscriber. There are procedures to relocate a subscriber to a new UNC (and potentially a new Serving GW), when an active or idle subscriber moves to a new area outside of the current UNC control.
    • evaluation_facility: DEKRA Testing and Certification S.A.U.
    • level: EAL4 + ALC_FLR.1
    • manufacturer: Huawei Technologies Co., Ltd.
    • report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1853
    • status: Certified
    • target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1851
    • type: Product
  • manufacturer: Huawei Technologies Co., Ltd.
  • product: Huawei UNC V001R001C20SPC200 with Patch V100R001C20SPH230
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/995-huawei-unc-v001r001c20spc200-with-patch-v100r001c20sph230
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0466-2008
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0466-2008
heuristics/protection_profiles {} a2003eb22f067b0a
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0053_V2b_pdf.pdf
pdf_data/cert_filename 2019-07_Certificado.pdf
pdf_data/cert_keywords/cc_cert_id
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
    • EAL4: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 2
    • ALC_FLR.1: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
  • A:
    • A.U: 1
  • O:
    • O.E: 1
  • R:
    • R.C: 1
pdf_data/cert_keywords/vendor
  • Huawei:
    • Huawei: 2
    • Huawei Technologies Co: 2
pdf_data/cert_keywords/eval_facility
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 934591
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename 2019-07-INF-4068.pdf 0692a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0692-2011
    • cert_item: STARCOS 3.4 Health SMC-B C1
    • cert_lab: BSI
    • developer: Giesecke & Devrient GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • ES:
    • 2019-7-INF-4068- v1: 1
  • DE:
    • BSI-DSZ-CC-0466-2008: 3
    • BSI-DSZ-CC-0466-2008-MA-01: 2
    • BSI-DSZ-CC-0692-2011: 22
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0053-V2-2009: 1
    • BSI-CC-PP-0053-V2-2009: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL2: 1
    • EAL4: 8
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 1: 1
    • EAL 4: 9
    • EAL 4 augmented: 3
    • EAL 5: 4
    • EAL1: 6
    • EAL2: 3
    • EAL3: 4
    • EAL4: 4
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 4
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_IMP.1: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 3
    • ALC_FLR.1: 9
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.3: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_COMP.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 2
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 2
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 3
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 3
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 4
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_SAR.1: 1
    • FAU_STG.1: 1
  • FDP:
    • FDP_ACC.1: 1
  • FIA:
    • FIA_ATD.1: 1
    • FIA_UAU.4: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA.3: 1
    • FMT_SMF.1: 1
  • FTA:
    • FTA_MCS: 2
    • FTA_SSL.3: 1
  • FTP:
    • FTP_TRP.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.U: 4
pdf_data/report_keywords/vendor
  • Huawei:
    • Huawei: 20
    • Huawei Technologies Co: 3
  • Microsoft:
    • Microsoft: 2
  • GD:
    • G&D: 3
    • Giesecke & Devrient: 16
  • NXP:
    • NXP: 4
    • NXP Semiconductors: 3
pdf_data/report_keywords/eval_facility
  • DEKRA:
    • DEKRA Testing and Certification: 4
  • TUV:
    • TÜV Informationstechnik: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • HPC:
      • HPC: 3
  • DES:
    • 3DES:
      • TDES: 1
    • DES:
      • DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA 2048: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 2
  • SHA:
    • SHA2:
      • SHA-256: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 3
  • TLS:
    • TLS:
      • TLS: 3
pdf_data/report_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 3
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • Malfunction: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI TR-03116: 2
pdf_data/report_keywords/os_name
  • STARCOS:
    • STARCOS 3: 36
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 20: 4
    • AIS 25: 2
    • AIS 26: 2
    • AIS 32: 1
    • AIS 34: 3
    • AIS 35: 2
    • AIS 36: 4
    • AIS 37: 1
    • AIS 38: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Evaluation Technical Report Summary STARCOS 3.4 Health SMC-B C1, TÜV Informationstechnik GmbH (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product NXP P5CC052V0A Smart Card: 1
    • Version 1.8, 18th May 2011, Security Target STARCOS 3.4 Health SMC-B C1, Giesecke & Devrient GmbH (confidential document) [7] Protection Profile for Security Module Card Type B, Version 1.2, 17 November 2009: 1
    • and amendment BSI- DSZ-CC-0466-2008-MA-01, Version 1.3, 29th September 2010, T-Systems GEI GmbH (confidential document) 8 specifically • AIS 20, Version 1, 2. December 1999, Funktionalitätsklassen und: 1
    • list for the TOE, Version 1.2, 18th May 2011, Configuration List STARCOS 3.4 Health SMC-B C1 (confidential document) [12] Guidance Documentation STARCOS 3.4 Health HBA/SMC C1 – Main Document, Version 1.3, 13th: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20110812093356+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, STARCOS 3.4 Health SMC-B C1, Giesecke & Devrient GmbH"
  • /ModDate: D:20110812093709+02'00'
  • /Producer: OpenOffice.org 3.2
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0692-2011
  • pdf_file_size_bytes: 938502
  • pdf_hyperlinks: https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/, https://certificates.gi-de.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
pdf_data/st_filename 2019-07_ST.pdf 0692b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0466-2008: 2
    • BSI-DSZ-CC-0466-2008-MA-01: 2
    • BSI-DSZ-CC-0466-2009: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0035: 2
    • BSI-PP-0006-2002: 1
    • BSI-PP-0053-V2: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 2
  • EAL:
    • EAL4: 9
    • EAL4 augmented: 3
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 2
    • ALC_LCD: 1
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ATE:
    • ATE_DPT.1: 1
  • AVA:
    • AVA_VAN.5: 6
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 8
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 4
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 4
    • FAU_STG.3.1: 1
  • FDP:
    • FDP_ACC.1: 9
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 7
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 5
    • FIA_SOS.1.1: 1
    • FIA_UAU.2: 6
    • FIA_UAU.2.1: 1
    • FIA_UAU.4: 4
    • FIA_UAU.4.1: 1
    • FIA_UID.1: 4
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 5
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 4
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 7
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SAE.1: 3
    • FMT_SAE.1.1: 1
    • FMT_SAE.1.2: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 2
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 3
  • FTA:
    • FTA_MCS: 10
    • FTA_MCS.1.1: 2
    • FTA_MCS.1.2: 2
    • FTA_SSL.3: 5
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 5
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FCS:
    • FCS_CKM: 12
    • FCS_CKM.1: 32
    • FCS_CKM.2: 4
    • FCS_CKM.4: 38
    • FCS_CKM.4.1: 1
    • FCS_COP: 62
    • FCS_COP.1: 19
    • FCS_RND.1: 1
    • FCS_RNG: 10
    • FCS_RNG.1: 19
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC.1: 26
    • FDP_ACC.1.1: 2
    • FDP_ACF: 1
    • FDP_ACF.1: 19
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 8
    • FDP_ITC.1: 28
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 20
    • FDP_RIP: 8
    • FDP_RIP.1: 9
    • FDP_SDI.1: 2
    • FDP_SDI.2: 5
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT.1: 9
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 7
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 10
    • FIA_AFL.1: 7
    • FIA_API: 7
    • FIA_API.1: 15
    • FIA_API.1.1: 4
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 2
    • FIA_UAU.1: 13
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 10
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 8
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 8
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 13
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM: 7
    • FMT_LIM.1: 21
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 20
    • FMT_LIM.2.1: 2
    • FMT_MOF.1: 1
    • FMT_MSA.1: 4
    • FMT_MSA.2: 11
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 12
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 34
    • FMT_MTD.1: 6
    • FMT_SMF.1: 19
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 25
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 13
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 12
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 14
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 2
  • FTP:
    • FTP_ITC.1: 12
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECU: 1
    • A.ADMIN_CREDENTIALS_SECURE: 2
    • A.COMPONENTS_RUNNING: 3
    • A.ENVIRONMENT_ACL: 3
    • A.LIMITED_FUNCTIONALITY: 3
    • A.NETWORK_SEGREGATION: 3
    • A.PHYSICAL_PROTECTION: 3
    • A.RESIDUAL_INFORMATION: 3
    • A.TIME: 3
    • A.TRUSTED_ADMINISTRATOR: 3
  • O:
    • O.AUDIT: 5
    • O.COMMUNICA: 1
    • O.COMMUNICATI: 1
    • O.COMMUNICATION: 5
    • O.IDAUTH: 8
  • OE:
    • OE.ADMIN_CRE: 1
    • OE.ADMIN_CREDENTI: 2
    • OE.ADMIN_CREDENTIALS_SEC: 2
    • OE.COMPONEN: 1
    • OE.COMPONENTS_RU: 1
    • OE.COMPONENTS_RUNNING: 1
    • OE.ENVIRONM: 1
    • OE.ENVIRONMENT_AC: 1
    • OE.ENVIRONMENT_ACL: 1
    • OE.LIMITED_FU: 1
    • OE.LIMITED_FUNCTIO: 1
    • OE.LIMITED_FUNCTIONALITY: 1
    • OE.NETWORK_: 1
    • OE.NETWORK_SEGRE: 1
    • OE.NETWORK_SEGREGATION: 1
    • OE.NETWOR_SEGREG: 1
    • OE.NETWOR_SEGREGATION: 1
    • OE.PHYSICAL: 4
    • OE.RESIDUAL_I: 1
    • OE.RESIDUAL_INFOR: 3
    • OE.RESIDUAL_INFORMATION: 3
    • OE.TIME: 7
    • OE.TRUSTED_A: 1
    • OE.TRUSTED_ADMIN: 4
  • OSP:
    • OSP: 1
    • OSP.AUDIT: 4
  • T:
    • T.UNAUTHORIZED_: 2
    • T.UNAUTHORIZED_ADMINISTR: 1
    • T.UNTRUSTED_COMMUNICATI: 2
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.WEAK_AUTHENTICATION_E: 2
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 3
  • OT:
    • OT.DS_CSA: 8
    • OT.TSS: 4
pdf_data/st_keywords/vendor
  • Huawei:
    • Huawei: 23
    • Huawei Technologies Co: 3
  • Microsoft:
    • Microsoft: 2
  • GD:
    • Giesecke & Devrient: 8
  • Infineon:
    • Infineon Technologies AG: 1
  • NXP:
    • NXP: 9
    • NXP Semiconductors: 2
  • STMicroelectronics:
    • STMicroelectronics: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
  • constructions:
    • MAC:
      • HMAC: 4
  • AES_competition:
    • HPC:
      • HPC: 31
    • RC:
      • RC4: 1
  • DES:
    • 3DES:
      • TDES: 2
      • Triple-DES: 1
    • DES:
      • DES: 5
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 3
      • SHA384: 1
  • SHA:
    • SHA2:
      • SHA-2: 1
      • SHA-224: 1
      • SHA-256: 4
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • MAC:
    • MAC: 19
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 45
  • TLS:
    • SSL:
      • SSL: 12
    • TLS:
      • TLS: 33
      • TLS1.2: 1
  • VPN:
    • VPN: 1
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 5
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 1
    • RNG: 4
  • TRNG:
    • TRNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • GCM:
    • GCM: 1
  • CBC:
    • CBC: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • Malfunction: 3
    • Physical Tampering: 1
    • Physical tampering: 1
    • fault injection: 3
    • malfunction: 4
    • physical tampering: 8
  • SCA:
    • DPA: 3
    • SPA: 1
    • physical probing: 3
    • side channels: 3
    • timing attacks: 1
  • other:
    • Bleichenbacher attack: 1
    • reverse engineering: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03116: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 3
pdf_data/st_keywords/os_name
  • STARCOS:
    • STARCOS 3: 136
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS20: 2
    • AIS31: 2
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS 180-2: 2
    • FIPS 46-3: 1
  • ISO:
    • ISO/IEC 7816: 2
    • ISO/IEC 7816-1: 1
    • ISO/IEC 7816-2: 1
    • ISO/IEC 7816-4: 2
  • PKCS:
    • PKCS #1: 2
    • PKCS#1: 3
  • X509:
    • X.509: 12
pdf_data/st_metadata
  • /Author: Giesecke & Devrient GmbH
  • /Category: P5CC052V0A
  • /Comments: Final
  • /Company: Giesecke & Devrient
  • /CreationDate: D:20110601152640+02'00'
  • /Creator: Acrobat PDFMaker 9.1 für Word
  • /Keywords: SMC-B, Secure Module Card Type B, Starcos
  • /Manager: NXP
  • /ModDate: D:20110601152930+02'00'
  • /PINSMC-FBL: 3
  • /PINSMC-Length-max: 8
  • /PINSMC-Length-min: 6
  • /PINSMC-Limit: 10
  • /PUKSMC-Length: 8
  • /Producer: Acrobat Distiller 9.4.2 (Windows)
  • /SourceModified: D:20110601130704
  • /Subject: Security Target Lite STARCOS 3.4 Health SMC-B C1
  • /TOE_SMC-A: STARCOS 3.4 Health SMC-A C1
  • /TOE_SMC-B: STARCOS 3.4 Health SMC-B C1
  • /TOE_SMC-K: STARCOS 3.4 Health SMC-K C1
  • /Title: STARCOS 3.4 Health SMC-B C1
  • pdf_file_size_bytes: 520830
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 106
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different