name |
Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.3.2; (Firmware Vers. 1.2.28, HW Vers. 0)
|
Dell C5765dn Color Laser Multifunction Printer Version: Controller ROM Ver. 2.205.1 IOT ROM Ver. 3.0.2 ADF ROM Ver. 11.1.0 Fax ROM Ver. 100.19.0
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
Multi-Function Devices
|
not_valid_before |
2020-12-11
|
2014-09-25
|
not_valid_after |
2025-12-10
|
2019-10-03
|
scheme |
DE
|
JP
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1161b_pdf(1).pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0437_est.pdf
|
status |
active
|
archived
|
manufacturer |
Bundesdruckerei GmbH
|
Dell, Inc.
|
manufacturer_web |
https://www.bundesdruckerei.de
|
https://www.dell.com
|
security_level |
EAL3 |
EAL3 |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1161a_pdf.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0437_erpt.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1161c_pdf.pdf
|
None
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Common Criteria Protection Profile for Document Management Terminal', 'pp_eal': 'EAL3', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0064V2b_pdf.pdf', 'pp_ids': frozenset({'DMT-PP'})}) |
|
maintenance_updates |
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2021, 3, 22), 'maintenance_title': 'tBSI-DSZ-CC-1161-2020-MA-01Bundesdruckerei Document Application withtamper-evident casing, Document ApplicationVersion 2.3.2; (Firmware Vers. 1.2.28, HW Vers. 0)', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1161ma1a_pdf.pdf', 'maintenance_st_link': None}) |
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
True
|
False
|
state/cert/download_ok |
True
|
False
|
state/cert/extract_ok |
True
|
False
|
state/cert/pdf_hash |
a2285889205be3b7175de2e8ed9c13cb80c954b2dfe4ad416ebcf44b2bbf3a25
|
None
|
state/cert/txt_hash |
2fe3e006035576e2ebcb068b66d130422f83ac1ee5444a9106ac40d97ba63a87
|
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
2de240d58368644b6f88d646c749fe3d304df95ab165ce17af0732aa081c9474
|
ac5c1c3dfd4dc5b1d3082e9e385fe4a6b38dd46ef1cd8ec271566dc9b244c87d
|
state/report/txt_hash |
69647a13214bb1901bbd3c990217ce77bb671939718b6bfab99765008c97ab6f
|
ec190332959e0b22dfabc3c01d5bcdf8be2570d4866663ef1f375e18867de81c
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
d9726ac3f917a1e4625bc8f79a609473ac1f4cf5498d05eb666d3df39fefdeaa
|
b9612bc170ec9629907f6ed9dc7728d92e23d064b6392b3de28ba78ee01fbe8c
|
state/st/txt_hash |
c5e4798f33b7f0a2c34d5df4dd4d6a063063c739cab09bedee86092ec32db023
|
7e5750c182d7979577f88af7ddaf2a564b0f09db20af91603b14d0bcaadd28c2
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
BSI-DSZ-CC-1161-2020
|
JISEC-CC-CRP-C0437
|
heuristics/cert_lab |
BSI |
None
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
2.3.2, 1.2.28 |
100.19.0, 11.1.0, 3.0.2, 2.205.1 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
BSI-DSZ-CC-1181-2021 |
None
|
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1125-2019 |
None
|
heuristics/report_references/indirectly_referenced_by |
BSI-DSZ-CC-1181-2021, BSI-DSZ-CC-1215-2023 |
None
|
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-1093, BSI-DSZ-CC-1125-2019 |
None
|
heuristics/scheme_data |
- cert_id:
BSI-DSZ-CC-1161-2020
- product: Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.3.2; (Firmware Vers. 1.2.28, …
- vendor: Bundesdruckerei GmbH
- certification_date:
11.12.2020
- category: Electronic ID documents
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Hoheitliche_Dokumente-Software_mit_Hardware/1161.html
- enhanced:
- product:
Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.3.2; (Firmware Vers. 1.2.28, HW Vers. 0)
- applicant:
Bundesdruckerei GmbH
Oranienstraße 91
10969 Berlin
- evaluation_facility:
TÜV Informationstechnik GmbH
- assurance_level:
EAL3
- protection_profile:
Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018, Version: 2.0, 2018-06-06, Federal Office for Information Security (BSI)
- certification_date:
11.12.2020
- expiration_date:
10.12.2025
- entries:
frozendict({'id': 'BSI-DSZ-CC-1161-2020-MA-01 (22.03.2021)', 'description': 'End Of Life'}), frozendict({'id': 'BSI-DSZ-CC-1161-2020 (11.12.2020)', 'description': 'Certificate'})
- report_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1161a_pdf.pdf?__blob=publicationFile&v=6
- target_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1161b_pdf.pdf?__blob=publicationFile&v=3
- cert_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1161c_pdf.pdf?__blob=publicationFile&v=2
- description:
The TOE and the related developer evidence were updated to Version 2.3.2 for this Re-evaluation. They are related mainly to the environment of the TOE. The effectiveness of the TSS is unchanged. The hardware and the seals are unchanged. The focus of this Re-evaluation was on ATE and a subset of AVA, with the subset being chosen in conjunction with the performed changes.
- subcategory: Software with hardware
|
- cert_id:
C0437
- supplier: Dell Inc.
- toe_overseas_name: Dell C5765dn Color Laser Multifunction PrinterController ROM Ver. 2.205.1, IOT ROM Ver. 3.0.2, ADF ROM Ver. 11.1.0, Fax ROM Ver. 100.19.0
- expiration_date: 2019-10
- claim: EAL3
- certification_date:
2014-09
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0437_it3445.html
- toe_japan_name: Dell C5765dn Color Laser Multifunction PrinterController ROM Ver. 2.205.1, IOT ROM Ver. 3.0.2, ADF ROM Ver. 11.1.0, Fax ROM Ver. 100.19.0
- enhanced:
- product:
Dell C5765dn Color Laser Multifunction Printer
- toe_version:
Controller ROM
Ver. 2.205.1
IOT ROM
Ver. 3.0.2
ADF ROM
Ver. 11.1.0
Fax ROM
Ver. 100.19.0
- product_type:
Multi Function Device
- certification_date:
2014-09-25
- cc_version:
3.1 Release4
- assurance_level:
EAL3
- vendor:
Dell Inc.
- evaluation_facility:
Information Technology Security Center Evaluation Department
- report_link:
https://www.ipa.go.jp/en/security/c0437_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0437_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0437_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE is the Multi Function Device (MFD) that provides such basic functions as copy, print, scan, and fax. The TOE is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the MFD via internal network, and general user client which is directly connected to the MFD.
TOE security functionality
To ensure the security of assets to be protected, the TOE provides the following security functions regarding the above basic functions:
-
Hard Disk Data Overwrite
-
Hard Disk Data Encryption
-
User Authentication
-
System Administrator's Security Management
-
Customer Engineer Operation Restriction
-
Security Audit Log
-
Internal Network Data Protection
-
Fax Flow Security
-
Self Test
|
heuristics/scheme_data/cert_id |
BSI-DSZ-CC-1161-2020
|
C0437
|
heuristics/scheme_data/certification_date |
11.12.2020
|
2014-09
|
heuristics/scheme_data/enhanced |
- product:
Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.3.2; (Firmware Vers. 1.2.28, HW Vers. 0)
- applicant: Bundesdruckerei GmbH
Oranienstraße 91
10969 Berlin
- evaluation_facility:
TÜV Informationstechnik GmbH
- assurance_level:
EAL3
- protection_profile: Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018, Version: 2.0, 2018-06-06, Federal Office for Information Security (BSI)
- certification_date:
11.12.2020
- expiration_date: 10.12.2025
- entries: frozendict({'id': 'BSI-DSZ-CC-1161-2020-MA-01 (22.03.2021)', 'description': 'End Of Life'}), frozendict({'id': 'BSI-DSZ-CC-1161-2020 (11.12.2020)', 'description': 'Certificate'})
- report_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1161a_pdf.pdf?__blob=publicationFile&v=6
- target_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1161b_pdf.pdf?__blob=publicationFile&v=3
- cert_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1161c_pdf.pdf?__blob=publicationFile&v=2
- description:
The TOE and the related developer evidence were updated to Version 2.3.2 for this Re-evaluation. They are related mainly to the environment of the TOE. The effectiveness of the TSS is unchanged. The hardware and the seals are unchanged. The focus of this Re-evaluation was on ATE and a subset of AVA, with the subset being chosen in conjunction with the performed changes.
|
- product:
Dell C5765dn Color Laser Multifunction Printer
- toe_version: Controller ROM
Ver. 2.205.1
IOT ROM
Ver. 3.0.2
ADF ROM
Ver. 11.1.0
Fax ROM
Ver. 100.19.0
- product_type: Multi Function Device
- certification_date:
2014-09-25
- cc_version: 3.1 Release4
- assurance_level:
EAL3
- vendor: Dell Inc.
- evaluation_facility:
Information Technology Security Center Evaluation Department
- report_link:
https://www.ipa.go.jp/en/security/c0437_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0437_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0437_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE is the Multi Function Device (MFD) that provides such basic functions as copy, print, scan, and fax. The TOE is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the MFD via internal network, and general user client which is directly connected to the MFD.
TOE security functionality
To ensure the security of assets to be protected, the TOE provides the following security functions regarding the above basic functions:
-
Hard Disk Data Overwrite
-
Hard Disk Data Encryption
-
User Authentication
-
System Administrator's Security Management
-
Customer Engineer Operation Restriction
-
Security Audit Log
-
Internal Network Data Protection
-
Fax Flow Security
-
Self Test
|
heuristics/scheme_data/enhanced/assurance_level |
EAL3
|
EAL3
|
heuristics/scheme_data/enhanced/cert_link |
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1161c_pdf.pdf?__blob=publicationFile&v=2
|
https://www.ipa.go.jp/en/security/c0437_eimg.pdf
|
heuristics/scheme_data/enhanced/certification_date |
11.12.2020
|
2014-09-25
|
heuristics/scheme_data/enhanced/description |
The TOE and the related developer evidence were updated to Version 2.3.2 for this Re-evaluation. They are related mainly to the environment of the TOE. The effectiveness of the TSS is unchanged. The hardware and the seals are unchanged. The focus of this Re-evaluation was on ATE and a subset of AVA, with the subset being chosen in conjunction with the performed changes.
|
PRODUCT DESCRIPTION
Description of TOE
The TOE is the Multi Function Device (MFD) that provides such basic functions as copy, print, scan, and fax. The TOE is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the MFD via internal network, and general user client which is directly connected to the MFD.
TOE security functionality
To ensure the security of assets to be protected, the TOE provides the following security functions regarding the above basic functions:
-
Hard Disk Data Overwrite
-
Hard Disk Data Encryption
-
User Authentication
-
System Administrator's Security Management
-
Customer Engineer Operation Restriction
-
Security Audit Log
-
Internal Network Data Protection
-
Fax Flow Security
-
Self Test
|
heuristics/scheme_data/enhanced/evaluation_facility |
TÜV Informationstechnik GmbH
|
Information Technology Security Center Evaluation Department
|
heuristics/scheme_data/enhanced/product |
Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.3.2; (Firmware Vers. 1.2.28, HW Vers. 0)
|
Dell C5765dn Color Laser Multifunction Printer
|
heuristics/scheme_data/enhanced/report_link |
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1161a_pdf.pdf?__blob=publicationFile&v=6
|
https://www.ipa.go.jp/en/security/c0437_erpt.pdf
|
heuristics/scheme_data/enhanced/target_link |
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1161b_pdf.pdf?__blob=publicationFile&v=3
|
https://www.ipa.go.jp/en/security/c0437_est.pdf
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
1161c_pdf.pdf
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
- cc_cert_id:
- cc_protection_profile_id:
- cc_security_level:
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- ISO:
- ISO/IEC 15408:
2
- ISO/IEC 18045:
2
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
None
|
pdf_data/cert_metadata |
- pdf_file_size_bytes:
174150
- pdf_is_encrypted:
False
- pdf_number_of_pages:
1
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate:
D:20210119144356+01'00'
- /Creator:
Writer
- /Keywords:
"Common Criteria, Certification, Zertifizierung, Document Management Terminal, DMT, BSI-CC-PP-0064-V2-2018, Bundesdruckerei GmbH"
- /ModDate:
D:20210126144003+01'00'
- /Producer:
LibreOffice 6.3
- /Subject:
Zertifizierungsreport BSI-DSZ-CC-1161-2020
- /Title:
Certificat BSI-DSZ-CC-1161-2020
- pdf_hyperlinks:
|
None
|
pdf_data/report_filename |
1161a_pdf.pdf
|
c0437_erpt.pdf
|
pdf_data/report_frontpage |
- DE:
- match_rules:
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
- cert_id:
BSI-DSZ-CC-1161-2020
- cert_item:
Bundesdruckerei Document Application with tamper-evident casing Document Application Version 2.3.2; (Firmware Vers. 1.2.28, HW Vers. 0
- developer:
Bundesdruckerei GmbH
- cert_lab:
BSI
- ref_protection_profiles:
Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064- V2-2018, Version: 2.0, 2018-06-06, Federal Office for Information Security (BSI
- cc_version:
PP conformant Common Criteria Part 2 extended
- cc_security_level:
Common Criteria Part 3 conformant EAL 3 SOGIS Recognition Agreement
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1161-2020:
15
- BSI-DSZ-CC-1125-:
1
- BSI-DSZ-CC-1125-2019:
2
- BSI-DSZ-CC-1161:
1
|
- JP:
- CRP-C0437-01:
1
- Certification No. C0437:
1
|
pdf_data/report_keywords/cc_claims |
|
- T:
- T.CONSUME:
2
- T.DATA_SEC:
2
- T.CONFDATA:
2
- T.RECOVER:
2
- T.COMM_TAP:
2
- A:
- A.ADMIN:
1
- A.USER:
1
- A.SECMODE:
1
- A.ACCESS:
1
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0064-:
1
- BSI-CC-PP-0064-V2-2018:
3
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 3:
4
- EAL 2:
2
- EAL 1:
1
- EAL 4:
1
- EAL 2+:
1
|
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FIA:
- FIA_UAU.4:
1
- FIA_UAU.5:
1
- FIA_UAU.6:
1
- FIA_API.1:
1
- FIA_UAU.2:
1
- FIA_UID.2:
1
- FMT:
- FMT_SMR.1:
1
- FMT_SMF.1:
1
- FMT_MTD:
3
- FPT:
- FTP:
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification:
1
- Evaluation Technical Report, Version 2, 2020-11-17, BSI-DSZ-CC-1161, TÜV Informationstechnik GmbH (confidential document) [8] Common Criteria Protection Profile for Document Management Terminal DMT-PP:
1
- Security (BSI) [9] Configuration list for the TOE, 1.30, 2020-10-28, Bundesdruckerei GmbH (confidential document) [10] Guidance documentation for the TOE, Version 1.172, 2020-07-07, VISOTEC® V- ÄNDERUNGSTERMINAL:
1
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_protocol/TLS |
|
|
pdf_data/report_keywords/crypto_protocol/TLS/TLS |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik:
3
|
- ITSC:
- Information Technology Security Center:
3
|
pdf_data/report_keywords/hash_function/SHA |
- SHA1:
- SHA2:
- SHA256:
10
- SHA384:
6
- SHA512:
1
- SHA224:
1
|
|
pdf_data/report_keywords/hash_function/SHA/SHA1 |
|
|
pdf_data/report_keywords/hash_function/SHA/SHA1/SHA1 |
1
|
5
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS186-2:
6
- FIPS180-4:
7
- FIPS PUB 46-3:
2
- FIPS 197:
8
- FIPS186-4:
1
- FIPS197:
1
- BSI:
- AIS48:
1
- AIS 20:
2
- AIS 32:
1
- RFC:
- ISO:
- ISO/IEC 15408:
4
- ISO/IEC 18045:
4
- ISO/IEC 17065:
2
|
- X509:
- CC:
- CCMB-2012-09-001:
2
- CCMB-2012-09-002:
2
- CCMB-2012-09-003:
2
- CCMB-2012-09-004:
2
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES |
5
|
1
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
423147
- pdf_is_encrypted:
False
- pdf_number_of_pages:
29
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate:
D:20210119144356+01'00'
- /Creator:
Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Document Management Terminal, DMT, BSI-CC-PP-0064-V2-2018, Bundesdruckerei GmbH"
- /ModDate:
D:20210120150946+01'00'
- /Producer:
LibreOffice 6.3
- /Subject: Zertifizierungsreport BSI-DSZ-CC-1161-2020
- /Title: Certification Report BSI-DSZ-CC-1161-2020
- pdf_hyperlinks:
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte
|
- pdf_file_size_bytes:
332931
- pdf_is_encrypted:
True
- pdf_number_of_pages:
38
- /CreationDate:
D:20141112134831+09'00'
- /Creator:
Microsoft® Word 2010
- /ModDate:
D:20141112134854+09'00'
- /Producer:
Microsoft® Word 2010
- pdf_hyperlinks:
|
pdf_data/report_metadata//CreationDate |
D:20210119144356+01'00'
|
D:20141112134831+09'00'
|
pdf_data/report_metadata//Creator |
Writer
|
Microsoft® Word 2010
|
pdf_data/report_metadata//ModDate |
D:20210120150946+01'00'
|
D:20141112134854+09'00'
|
pdf_data/report_metadata//Producer |
LibreOffice 6.3
|
Microsoft® Word 2010
|
pdf_data/report_metadata/pdf_file_size_bytes |
423147
|
332931
|
pdf_data/report_metadata/pdf_hyperlinks |
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte |
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
True
|
pdf_data/report_metadata/pdf_number_of_pages |
29
|
38
|
pdf_data/st_filename |
1161b_pdf(1).pdf
|
c0437_est.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
|
- O:
- O.AUDITS:
8
- O.CIPHER:
6
- O.COMM_SEC:
7
- O.FAX_SEC:
5
- O.MANAGE:
9
- O.RESIDUAL:
4
- O.USER:
7
- O.RESTRICT:
7
- O.VERIFY:
4
- T:
- T.RECOVER:
5
- T.CONFDATA:
3
- T.DATA_SEC:
3
- T.COMM_TAP:
5
- T.CONSUME:
5
- A:
- A.ADMIN:
5
- A.USER:
3
- A.SECMODE:
5
- A.ACCESS:
3
- OE:
- OE.ADMIN:
3
- OE.USER:
3
- OE.SEC:
9
- OE.PHYSICAL:
3
|
pdf_data/st_keywords/cc_claims/A |
|
- A.ADMIN:
5
- A.USER:
3
- A.SECMODE:
5
- A.ACCESS:
3
|
pdf_data/st_keywords/cc_claims/OE |
|
- OE.ADMIN:
3
- OE.USER:
3
- OE.SEC:
9
- OE.PHYSICAL:
3
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0064-V2-2018:
3
- BSI-CC-PP-0064-:
1
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1:
1
- ADV_TDS.2:
1
- AGD:
- ALC:
- ALC_CMC.3:
1
- ALC_DEL.1:
1
- ALC_LCD.1:
1
- ATE:
- ATE_COV.2:
1
- ATE_FUN.1:
1
- AVA:
- AVA_VAN.5:
2
- AVA_VAN.2:
1
- APE:
- ASE:
- ASE_CCL.1:
1
- ASE_INT.1:
1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
|
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.3:
1
- ADV_TDS.2:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_CMC.3:
1
- ALC_CMS.3:
1
- ALC_DEL.1:
1
- ALC_DVS.1:
1
- ALC_LCD.1:
1
- ATE:
- ATE_COV.2:
1
- ATE_DPT.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- ASE:
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_ARC.1:
1
- ADV_TDS.2:
1
|
- ADV_ARC.1:
1
- ADV_FSP.3: 1
- ADV_TDS.2:
1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_TDS.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AGD |
|
- AGD_OPE.1:
1
- AGD_PRE.1: 1
|
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_CMC.3:
1
- ALC_DEL.1:
1
- ALC_LCD.1:
1
|
- ALC_CMC.3:
1
- ALC_CMS.3: 1
- ALC_DEL.1:
1
- ALC_DVS.1: 1
- ALC_LCD.1:
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC.3 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_LCD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE |
- ASE_CCL.1:
1
- ASE_INT.1:
1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
|
- ASE_CCL.1:
1
- ASE_ECD.1: 1
- ASE_INT.1:
1
- ASE_OBJ.2: 1
- ASE_REQ.2:
1
- ASE_SPD.1: 1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.2:
1
- ATE_FUN.1:
1
|
- ATE_COV.2:
1
- ATE_DPT.1: 1
- ATE_FUN.1:
1
- ATE_IND.2: 1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AVA |
- AVA_VAN.5: 2
- AVA_VAN.2:
1
|
|
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.2 |
1
|
1
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL 3:
4
- EAL4+: 2
- EAL3:
1
|
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 3 |
4
|
1
|
pdf_data/st_keywords/cc_security_level/EAL/EAL3 |
1
|
6
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_GEN.1:
5
- FAU_GEN.1.1:
3
- FAU_GEN.1.2:
2
- FAU_GEN: 1
|
- FAU_GEN.1:
12
- FAU_GEN.1.1:
1
- FAU_SAR.1: 9
- FAU_SAR.2: 8
- FAU_STG.1: 10
- FAU_STG.4: 8
- FAU_GEN.1.2:
1
- FAU_SAR: 1
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 2
- FAU_SAR.2.1: 1
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4.1: 1
- FAU_STG: 1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 |
5
|
12
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1.1 |
3
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1.2 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_RNG.1: 6
- FCS_COP: 29
- FCS_CKM:
13
- FCS_CKM.1:
15
- FCS_CKM.4:
5
- FCS_CKM.4.1: 1
- FCS_COP.1:
25
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FCS_RNG: 3
|
- FCS_CKM.1:
11
- FCS_COP.1:
10
- FCS_CKM.2: 1
- FCS_CKM.4:
3
- FCS_CKM.1.1: 1
- FCS_COP.1.1: 1
- FCS_CKM:
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM |
13
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
15
|
11
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
5
|
3
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
25
|
10
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_RIP.1:
4
- FDP_RIP.1.1:
1
|
- FDP_ACC.1: 12
- FDP_ACF.1: 10
- FDP_IFC.1: 11
- FDP_IFF.1: 10
- FDP_RIP.1:
8
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_ACC.1.1: 1
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1.1: 1
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_RIP.1.1:
1
- FDP_IFF: 1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 |
4
|
8
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_API.1: 6
- FIA_UAU.4: 5
- FIA_API: 1
- FIA_API.1.1: 1
- FIA_UAU.2: 6
- FIA_UAU.2.1: 1
- FIA_UAU.1:
3
- FIA_UAU.4.1: 1
- FIA_UAU.5: 4
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 4
- FIA_UAU.6.1: 1
- FIA_UID.2: 6
- FIA_UID.2.1: 1
- FIA_UID.1:
2
|
- FIA_AFL.1: 30
- FIA_ATD.1: 9
- FIA_SOS.1: 6
- FIA_UAU.1:
19
- FIA_UAU.7: 9
- FIA_UID.1:
15
- FIA_USB.1: 8
- FIA_AFL.1.1: 4
- FIA_AFL.1.2: 4
- FIA_ATD.1.1: 1
- FIA_SOS.1.1: 1
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7.1: 1
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FIA_UIA.1: 1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
3
|
19
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
2
|
15
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MTD: 22
- FMT_MTD.1:
5
- FMT_SMF.1:
7
- FMT_SMF.1.1:
1
- FMT_SMR.1:
5
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
|
- FMT_MOF.1: 9
- FMT_MSA.1: 11
- FMT_MSA.3: 11
- FMT_MTD.1:
11
- FMT_SMF.1:
17
- FMT_SMR.1:
15
- FMT_MOF.1.1: 1
- FMT_MSA.1.1: 1
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1.1: 1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA: 2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
5
|
11
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
7
|
17
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
5
|
15
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
|
- FPT_STM.1:
10
- FPT_TST.1:
8
- FPT_STM.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_TRP: 4
- FTP_TRP.1:
3
- FTP_TRP.1.2:
1
|
- FTP_TRP.1:
8
- FTP_TRP.1.1: 1
- FTP_TRP.1.2:
1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 |
3
|
8
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1.2 |
1
|
1
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256:
2
- P-384:
1
- NIST P-384:
1
- secp384r1:
3
- secp256r1:
1
- secp521r1:
1
- prime256v1:
2
- Brainpool:
- brainpoolP224r1:
1
- brainpoolP256r1:
2
- brainpoolP384r1:
2
- brainpoolP512r1:
2
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 |
7
|
8
|
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA1 |
2
|
4
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
- SHA-256: 5
- SHA-224: 2
- SHA-384: 2
- SHA-512: 2
- SHA256:
2
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA256 |
2
|
3
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.DG1:
2
- EF.DG2:
1
- EF.DG3:
2
- EF.DG4:
2
- EF.DG5:
1
- EF.DG16:
2
- EF.DG13:
1
- EF.COM:
2
- EF.SOD:
2
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-4:
2
- FIPS186-4:
3
- FIPS180-4:
3
- FIPS186-2:
2
- FIPS197:
2
- FIPS 186-2:
1
- FIPS 186-4:
1
- FIPS PUB 197:
1
- BSI:
- RFC:
- ISO:
- ISO/IEC 14443:
2
- ISO/IEC 7816-4:
1
- ICAO:
|
- FIPS:
- RFC:
- X509:
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
pdf_data/st_keywords/standard_id/FIPS |
- FIPS 180-4: 2
- FIPS186-4: 3
- FIPS180-4: 3
- FIPS186-2: 2
- FIPS197: 2
- FIPS 186-2: 1
- FIPS 186-4: 1
- FIPS PUB 197:
1
|
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 197 |
1
|
1
|
pdf_data/st_keywords/standard_id/RFC |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
8
|
12
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES |
4
|
2
|
pdf_data/st_keywords/symmetric_crypto/DES/DES |
|
|
pdf_data/st_keywords/symmetric_crypto/constructions/MAC |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA:
1
- TLS_RSA_WITH_AES_256_CBC_SHA:
1
- TLS_RSA_WITH_AES_128_CBC_SHA256:
1
- TLS_RSA_WITH_AES_256_CBC_SHA256:
1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
1654579
- pdf_is_encrypted:
False
- pdf_number_of_pages:
91
- /Title:
Bundesdruckerei Document Application Common Criteria Evaluation
- /Author:
Alexander Haferland
- /Subject: Security Target
- /Keywords: CC, ST, Common Criteria, Security Target, Inspection System, PA, eAT, ePass
- /Creator:
Microsoft® Word 2016
- /CreationDate:
D:20200911130017+02'00'
- /ModDate:
D:20200911130017+02'00'
- /Producer:
Microsoft® Word 2016
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
488409
- pdf_is_encrypted:
False
- pdf_number_of_pages:
94
- /Author:
- /CreationDate:
D:20141104101551+09'00'
- /Creator:
PScript5.dll Version 5.2.2
- /ModDate:
D:20141104101551+09'00'
- /Producer:
Acrobat Distiller 10.1.12 (Windows)
- /Title:
- pdf_hyperlinks:
|
pdf_data/st_metadata//Author |
Alexander Haferland
|
|
pdf_data/st_metadata//CreationDate |
D:20200911130017+02'00'
|
D:20141104101551+09'00'
|
pdf_data/st_metadata//Creator |
Microsoft® Word 2016
|
PScript5.dll Version 5.2.2
|
pdf_data/st_metadata//ModDate |
D:20200911130017+02'00'
|
D:20141104101551+09'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Word 2016
|
Acrobat Distiller 10.1.12 (Windows)
|
pdf_data/st_metadata//Title |
Bundesdruckerei Document Application Common Criteria Evaluation
|
|
pdf_data/st_metadata/pdf_file_size_bytes |
1654579
|
488409
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
91
|
94
|
dgst |
1355c394ee74fa69
|
1a0a8f102637d244
|