name |
IBM z/OS Version 1 Release 10 |
SMGW Version 2.2 |
category |
Operating Systems |
Other Devices and Systems |
scheme |
DE |
DE |
status |
archived |
active |
not_valid_after |
01.09.2019 |
07.11.2031 |
not_valid_before |
13.08.2009 |
08.11.2024 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0831V10c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0534a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0831V10a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0534b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0831V10b_pdf.pdf |
manufacturer |
IBM Corporation |
Power Plus Communications AG |
manufacturer_web |
https://www.ibm.com |
https://ppc-ag.de |
security_level |
EAL4+, ALC_FLR.3 |
ALC_FLR.2, AVA_VAN.5, EAL4+ |
dgst |
174f8248817bdcb1 |
fbefd0a153f669f0 |
heuristics/cert_id |
BSI-DSZ-CC-0534-2009 |
BSI-DSZ-CC-0831 |
heuristics/cert_lab |
BSI |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ASE_TSS.2, ASE_REQ.2, ALC_DVS.1, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1 |
ALC_DVS.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_INT.1, ALC_CMS.4, ATE_FUN.1, AVA_VAN.5, AGD_OPE.1, ADV_ARC.1, ASE_REQ.2, ASE_CCL.1, ALC_CMC.4, ALC_FLR.2, ADV_IMP.1 |
heuristics/extracted_versions |
1, 10 |
2.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
BSI-DSZ-CC-0637-2010 |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0459-2008 |
BSI-DSZ-CC-1217-2024, BSI-DSZ-CC-0957-V2-2016, BSI-DSZ-CC-0831-V9-2024 |
heuristics/report_references/indirectly_referenced_by |
BSI-DSZ-CC-0948-2017, BSI-DSZ-CC-0875-2015, BSI-DSZ-CC-1029-2017, BSI-DSZ-CC-0637-2010, BSI-DSZ-CC-0816-2013, BSI-DSZ-CC-0701-2011, BSI-DSZ-CC-0788-2012, BSI-DSZ-CC-0972-2015, BSI-DSZ-CC-0874-2014, OCSI/CERT/ATS/01/2017/RC |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0377-2007, BSI-DSZ-CC-0459-2008, BSI-DSZ-CC-0247-2005, BSI-DSZ-CC-0304-2006 |
BSI-DSZ-CC-1149-V3-2023, BSI-DSZ-CC-0831-V2-2020, BSI-DSZ-CC-0831-V3-2021, BSI-DSZ-CC-0831-V9-2024, BSI-DSZ-CC-0831-V7-2023, BSI-DSZ-CC-0831-V4-2021, BSI-DSZ-CC-1149-V2-2023, BSI-DSZ-CC-0845-V2-2013, BSI-DSZ-CC-0845-2012, BSI-DSZ-CC-1217-2024, BSI-DSZ-CC-0666-2012, BSI-DSZ-CC-1149-2022, BSI-DSZ-CC-0831-2018, BSI-DSZ-CC-0978-2016, BSI-DSZ-CC-0957-V2-2016, BSI-DSZ-CC-0957-2015, BSI-DSZ-CC-0831-V5-2022 |
heuristics/scheme_data |
|
- category: Intelligent measuring systems
- cert_id: BSI-DSZ-CC-0831-V10-2024
- certification_date: 08.11.2024
- enhanced:
- applicant: Power Plus Communications AG Dudenstraße 6 68167 Mannheim
- assurance_level: EAL4+,AVA_VAN.5,ALC_FLR.2
- certification_date: 08.11.2024
- description: The target of evaluation (TOE) is the Smart Meter Gateway "SMGW Integrationsmodul Version 1.0". This Smartmeter Gateway is the communication unit used within an intelligent metering system. The main functionality of the Gateway is the reception and the storage of measured values and status of the connected meters as well as the processing and the transfer of these measurements and status values to authorized entities.
- entries: [frozendict({'id': 'BSI-DSZ-CC-0831-V10-2024-MA-01', 'description': 'Maintenance Report'}), frozendict({'id': 'BSI-DSZ-CC-0831-V10-2024', 'description': 'Der Evaluierungsgegenstand ist das Smart Meter Gateway “SMGW Version 2.2” bestehend aus der “SMGW Software”, Version 2.2.2 und der “SMGW Hardware”, Version 2.0 und 2B. Das Smart Meter Gateway stellt die Kommunikationseinheit innerhalb eines intelligenten Messsystems dar. Die Hauptfunktionalität des Gateways besteht im Empfang und der Speicherung von Mess- und Statuswerten angeschlossener Zähler sowie der Verarbeitung und Versendung dieser Mess- und Statuswerte an berechtigte Instanzen, darüber hinaus stellt das Smart Meter Gateway den sicheren CLS Kommunikationskanal für nachgelagerte Systemeinheiten zur Verfügung. Der Fokus dieser Re-Zertifizierung lag auf der Ergänzung eines neuen Sicherheitsmoduls, der Ergänzung der Spannungsversorgung mit 100V und einer Änderung bezüglich des OpenSSL Padding Bytes.'}), frozendict({'id': 'BSI-DSZ-CC-0831-V9-2024-MA-01', 'description': 'Security Target'}), frozendict({'id': 'BSI-DSZ-CC-0831-V9-2024', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-0831-V8-2024', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-0831-V7-2023-MA-03', 'description': 'Sky-/Safety'}), frozendict({'id': 'BSI-DSZ-CC-0831-V7-2023-MA-01', 'description': 'Maintenance Report'}), frozendict({'id': 'BSI-DSZ-CC-0831-V7-2023', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-0831-V6-2023-MA-02', 'description': 'Maintenance Report'}), frozendict({'id': 'BSI-DSZ-CC-0831-V6-2023-MA-01', 'description': 'Maintenance Report'}), frozendict({'id': 'BSI-DSZ-CC-0831-V6-2023', 'description': 'The focus of this re-certification was on changes to the wMBUS-functionality, profile adjustments as well as further improvements.'}), frozendict({'id': 'BSI-DSZ-CC-0831-V5-2022-MA-02', 'description': 'Maintenance Report'}), frozendict({'id': 'This'}), frozendict({'id': 'BSI-DSZ-CC-0831-V5-2022-RA-01', 'description': 'Successful Re-Assessment with update of the vulnerability analysis. The CC-certificate BSI-DSZ-CC-0831-V5-2022 remains valid for 2 further years.'}), frozendict({'id': 'BSI-DSZ-CC-0831-V5-2022-MA-01', 'description': 'Maintenance Report'}), frozendict({'id': 'BSI-DSZ-CC-0831-V5-2022', 'description': 'The focus of this re-certification laid on the update of the linux kernel, a new hardware configuration, optimizations and bugfixing as well as changes in the developpment process.'}), frozendict({'id': 'BSI', 'description': 'Maintenance Repor'}), frozendict({'id': 'BSI-DSZ-CC-0831-V4-2021-RA-01', 'description': 'Successful Re-Assessment with update of the vulnerability analysis. The CC-certificate BSI-DSZ-CC-0831-V4-2021 remains valid for 2 further years.'}), frozendict({'id': 'BSI-DSZ-CC-0831-V4-2021-MA-04', 'description': 'Maintenance Report'}), frozendict({'id': 'BSI-DSZ-CC-0831-V4-2021-MA-03', 'description': 'Maintenance Report'}), frozendict({'id': 'BSI-DSZ-CC-0831-V4-2021-MA-02 (Ausstellungsdatum / Certification Date 15.02.2022)', 'description': 'Maintenance Report'}), frozendict({'id': 'BSI', 'description': 'The guidance documentation was updated and the description of the communication adapter was added.'}), frozendict({'id': 'BSI-DSZ-CC-0831-V4-2021', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-0831-V3-2021-MA-01', 'description': 'Certification Report'}), frozendict({'id': 'BSI-DSZ-CC-0831-V3-2021', 'description': 'Target of Evaluation'}), frozendict({'id': 'BSI-DSZ-CC-0831-V2-2020', 'description': 'Target of Evaluation'}), frozendict({'id': 'BSI-DSZ-CC-0831-2018-RA-01'}), frozendict({'id': 'BSI-DSZ-CC-0831-2018-MA-01', 'description': 'Finally, the guidance documentation was updated to reflect the new communication adapters and to include a minor change in the delivery procedure.'}), frozendict({'id': 'BSI-DSZ-CC-0831-2018', 'description': 'Certificate'})]
- evaluation_facility: TÜV Informationstechnik GmbH
- expiration_date: 07.11.2032
- product: SMGW Version 2.2
- protection_profile: Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI-CC-PP-0073-2014
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte08/0831V10a_pdf.pdf?__blob=publicationFile&v=2
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte08/0831V10b_pdf.pdf?__blob=publicationFile&v=2
- product: SMGW Version 2.2
- subcategory: (Smart Meter Gateway)
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartMeter_Gateway/0831.html
- vendor: Power Plus Communications AG
|
heuristics/st_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0831-V5-2022, BSI-DSZ-CC-0831-V4-2021, BSI-DSZ-CC-0831-2018 |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0831-V5-2022, BSI-DSZ-CC-0831-V4-2021, BSI-DSZ-CC-0831-2018 |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
6346b04de6859db3 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0073b_pdf.pdf |
pdf_data/cert_filename |
|
0831V10c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 2
- EAL 4 augmented: 1
- EAL 5: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smartmeter Gateway, SMGW, Smart Grid, PPC, Power Plus Communications"
- /Subject: Common Criteria, Certification, Zertifizierung, Smartmeter Gateway, SMGW, Smart Grid, PPC, Power Plus Communications
- /Title: Certification Report BSI-DSZ-CC-0831-V10-2024
- pdf_file_size_bytes: 230123
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
0534a_pdf.pdf |
0831V10a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0534-2009
- cert_item: IBM z/OS Version 1 Release 10
- cert_lab: BSI
- developer: IBM Corporation
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.2 and AVA_VAN.5 valid until: 07 November 2032
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0831-V10-2024
- cert_item: SMGW Version 2.2
- cert_lab: BSI
- developer: Power Plus Communications AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI- CC-PP-0073-2014
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0459-2008: 3
- BSI-DSZ-CC-0534: 2
- BSI-DSZ-CC-0534-2009: 28
|
- DE:
- BSI-DSZ-CC-0831-V9-2024: 3
- BSI-DSZ-CC-0957-V2-2016: 1
- BSI-DSZ-CC-1217-2024: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 4: 5
- EAL 4 augmented: 2
- EAL 7: 1
- EAL1: 6
- EAL2: 3
- EAL3: 4
- EAL4: 6
- EAL4 augmented: 1
- EAL5: 6
- EAL6: 3
- EAL7: 4
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 8
- EAL 4 augmented: 3
- EAL 5: 3
- EAL 5+: 1
- EAL 6: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 5
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 1
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- OE:
- OE.CLASSIFICATION: 1
- OE.CREDEN: 1
- OE.HW_CRYPTO: 1
- OE.HW_SEP: 1
- OE.INSTALL: 1
- OE.PHYSICAL: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
- SHA2: 1
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
- BSI:
- BSI 7148: 1
- BSI TR-02102-1: 1
- BSI TR-03109-1: 1
- BSI TR-03116-3: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 23: 1
- AIS 32: 1
- PKCS:
- RFC:
- X509:
|
- BSI:
- AIS 1: 1
- AIS 32: 1
- AIS 34: 2
- AIS 38: 1
- AIS 46: 2
- AIS 48: 1
- FIPS:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- RFC:
- RFC2104: 2
- RFC3565: 1
- RFC4493: 3
- RFC5084: 1
- RFC5246: 4
- RFC5288: 1
- RFC5652: 2
- RFC6033: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Evaluation Technical Report BSI-DSZ-CC-0534, Version 3, 30.06.09, atsec information security GmbH (confidential document) [9] MLSGUIDE z/OS Planning for Multilevel Security and the Common Criteria, Version GA22-7509-08: 1
|
- ConfidentialDocument:
- AG [7] Evaluation Technical Report, Version 2, 2024-10-25, TÜV Informationstechnik GmbH (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- list for the TOE, Version v174, 2024-10-02, EVG-CM-List, Power Plus Communications AG (confidential document) [10] Handbuch für Verbraucher, Smart Meter Gateway, Version 4.15, 2024-08-15, Power Plus: 1
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20090903081720+02'00'
- /Creator: Writer
- /Keywords: "Zertifzierung, Certification, CC, Common Criteria, IBM Corporation, IBM z/OS Version 1 Release 19, Betriebssystems, operating system"
- /ModDate: D:20090903102744+02'00'
- /Producer: StarOffice 9
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0534-2009
- pdf_file_size_bytes: 1379048
- pdf_hyperlinks: http://publibz.boulder.ibm.com/epubs/pdf/dz9zr007.pdf, http://www.bsi.bund.de/, https://www.ibm.com/software/shopzseries
- pdf_is_encrypted: False
- pdf_number_of_pages: 58
|
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smartmeter Gateway, SMGW, Smart Grid, PPC, Power Plus Communications"
- /Subject: Common Criteria, Certification, Zertifizierung, Smartmeter Gateway, SMGW, Smart Grid, PPC, Power Plus Communications
- /Title: Certification Report BSI-DSZ-CC-0831-V10-2024
- pdf_file_size_bytes: 344953
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
pdf_data/st_filename |
0534b_pdf.pdf |
0831V10b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL3: 2
- EAL4: 6
- EAL4 augmented: 3
|
- EAL:
- EAL 2605: 1
- EAL 4: 3
- EAL 4 augmented: 1
- EAL 4+: 1
- EAL4: 1
- EAL4 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 7
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 7
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- ATE_DPT.2: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- AGD:
- AGD_GWA: 2
- AGD_OPE.1: 1
- AGD_SEC: 3
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 5
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 9
- FAU_GEN.2.1: 1
- FAU_SAR.1: 13
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 7
- FAU_SAR.2.1: 1
- FAU_SAR.3: 12
- FAU_SAR.3.1: 1
- FAU_SEL.1: 12
- FAU_SEL.1.1: 1
- FAU_STG.1: 8
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.2: 1
- FAU_STG.3: 13
- FAU_STG.3.1: 1
- FAU_STG.4: 12
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 44
- FCS_CKM.1.1: 8
- FCS_CKM.2: 35
- FCS_CKM.2.1: 5
- FCS_CKM.4: 1
- FCS_COP.1: 50
- FCS_COP.1.1: 13
- FDP:
- FDP_ACC.1: 11
- FDP_ACC.1.1: 2
- FDP_ACF.1: 24
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 4
- FDP_ETC.1: 10
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ETC.2: 12
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 9
- FDP_IFC.1.1: 1
- FDP_IFF.2: 9
- FDP_IFF.2.1: 1
- FDP_IFF.2.3: 1
- FDP_IFF.2.4: 1
- FDP_IFF.2.5: 1
- FDP_IFF.2.6: 1
- FDP_ITC.1: 11
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 9
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_RIP.1: 1
- FDP_RIP.2: 7
- FDP_RIP.2.1: 1
- FDP_UCT.1: 7
- FDP_UCT.1.1: 1
- FDP_UIT.1: 6
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_ATD.1: 15
- FIA_ATD.1.1: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 9
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 9
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 18
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 28
- FMT_MSA.1.1: 2
- FMT_MSA.2: 7
- FMT_MSA.2.1: 1
- FMT_MSA.3: 29
- FMT_MSA.3.1: 4
- FMT_MSA.3.2: 3
- FMT_MTC.1: 1
- FMT_MTD.1: 101
- FMT_MTD.1.1: 10
- FMT_REV.1: 29
- FMT_REV.1.1: 2
- FMT_REV.1.2: 2
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 3
- FPT_ITC.1: 1
- FPT_RVM.1: 5
- FPT_SEP.1: 5
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FPT_TDC.1: 9
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TEE: 1
- FPT_TEE.1: 12
- FPT_TEE.1.1: 1
- FTP:
- FTP_ITC.1: 12
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 2
|
- FAU:
- FAU_ARP: 10
- FAU_ARP.1: 1
- FAU_GEN: 37
- FAU_GEN.1: 17
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAA: 10
- FAU_SAA.1: 3
- FAU_SAA.1.1: 1
- FAU_SAR: 28
- FAU_SAR.1: 7
- FAU_STG: 29
- FAU_STG.1: 7
- FAU_STG.2: 13
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FAU_STG.3: 3
- FAU_STG.4: 3
- FCO:
- FCO_NRO: 3
- FCO_NRO.1: 1
- FCO_NRO.2: 10
- FCO_NRO.2.1: 1
- FCO_NRO.2.2: 1
- FCO_NRO.2.3: 1
- FCS:
- FCS_CKM: 41
- FCS_CKM.1: 17
- FCS_CKM.2: 6
- FCS_CKM.4: 33
- FCS_CKM.4.1: 1
- FCS_COP: 58
- FCS_COP.1: 11
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 9
- FDP_ACC.2: 10
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 1
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 27
- FDP_IFC.1: 12
- FDP_IFC.2: 4
- FDP_IFF: 22
- FDP_IFF.1: 19
- FDP_IFF.1.3: 1
- FDP_ITC.1: 12
- FDP_ITC.2: 12
- FDP_RIP: 2
- FDP_RIP.1: 1
- FDP_RIP.2: 9
- FDP_RIP.2.1: 1
- FDP_SDI: 2
- FDP_SDI.1: 1
- FDP_SDI.2: 8
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_AFL: 3
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 3
- FIA_ATD.1: 12
- FIA_ATD.1.1: 1
- FIA_UAU: 5
- FIA_UAU.1: 2
- FIA_UAU.2: 7
- FIA_UAU.2.1: 1
- FIA_UAU.5: 6
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 2
- FIA_UAU.6: 7
- FIA_UAU.6.1: 1
- FIA_UID: 3
- FIA_UID.1: 8
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FIA_USB: 3
- FIA_USB.1: 11
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 2
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA: 55
- FMT_MSA.1: 9
- FMT_MSA.3: 12
- FMT_SMF: 2
- FMT_SMF.1: 18
- FMT_SMF.1.1: 1
- FMT_SMR: 3
- FMT_SMR.1: 28
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_CON: 6
- FPR_CON.1: 10
- FPR_CON.1.1: 2
- FPR_CON.1.2: 4
- FPR_PSE: 2
- FPR_PSE.1: 8
- FPR_PSE.1.1: 1
- FPR_PSE.1.2: 1
- FPR_PSE.1.3: 1
- FPT:
- FPT_FLS: 3
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_PHP: 3
- FPT_PHP.1: 7
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_RPL: 3
- FPT_RPL.1: 10
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_STM: 3
- FPT_STM.1: 17
- FPT_STM.1.1: 1
- FPT_TST: 3
- FPT_TST.1: 9
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CLEARANCE: 3
- A.CONNECT: 4
- A.COOP: 4
- A.LOCATE: 4
- A.MANAGE: 4
- A.NO_EVIL_ADM: 1
- A.NO_EVIL_ADMIN: 2
- A.PEER: 4
- A.PROTECT: 3
- A.SENSITIVITY: 4
- O:
- O.AUDITING: 20
- O.AUTHORIZATION: 18
- O.COMPROT: 33
- O.DISCRETIONARY_ACCESS: 15
- O.ENFORCEMENT: 12
- O.ENFORCMENT: 1
- O.MANAGE: 32
- O.MANDATORY_ACCESS: 21
- O.RESIDUAL_INFORMATION: 8
- OE:
- OE.CLASSIFICATION: 6
- OE.CREDEN: 4
- OE.HW_CRYPTO: 4
- OE.HW_SEP: 12
- OE.INSTALL: 6
- OE.PHYSICAL: 6
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 46
- AES-128: 1
- AES-256: 1
- AES128: 3
- AES256: 2
- RC:
- DES:
|
- AES_competition:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-224: 4
- SHA-256: 5
- SHA-384: 4
- SHA-512: 5
|
- SHA:
- SHA2:
- SHA-256: 7
- SHA-384: 3
- SHA-512: 2
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IPsec:
- SSH:
- TLS:
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- NIST P-256: 2
- NIST P-384: 2
- P-256: 2
- P-384: 2
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_RC4_128_SHA: 1
|
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- malfunction: 2
- physical tampering: 3
|
pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI TR-02102: 1
- BSI TR-03109: 1
- BSI TR-03109-1: 3
- BSI TR-03109-2: 1
- BSI TR-03109-3: 1
- BSI TR-03109-4: 1
- BSI TR-03109-6: 1
- BSI TR-03111: 1
- BSI TR-03116-3: 1
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- FIPS:
- FIPS 180-2: 2
- FIPS 197: 1
- FIPS 46-3: 2
- PKCS:
- PKCS#1: 7
- PKCS#11: 17
- PKCS#12: 1
- PKCS#7: 1
- RFC:
- RFC 1510: 1
- RFC 1777: 1
- RFC 1778: 1
- RFC 1779: 1
- RFC 1823: 1
- RFC 2052: 1
- RFC 2078: 1
- RFC 2203: 1
- RFC 2222: 1
- RFC 2251: 1
- RFC 2252: 1
- RFC 2253: 1
- RFC 2254: 1
- RFC 2255: 1
- RFC 2256: 1
- RFC 2402: 1
- RFC 2404: 1
- RFC 2406: 1
- RFC 2409: 1
- RFC 2459: 2
- RFC 2560: 1
- RFC 2623: 1
- RFC 2829: 1
- RFC 2830: 1
- RFC 2831: 1
- RFC 2849: 1
- RFC 3268: 1
- RFC 3530: 1
- RFC 3602: 1
- RFC 3961: 1
- RFC 3962: 1
- RFC 4217: 2
- RFC 4253: 1
- RFC1510: 1
- RFC1777: 1
- RFC1778: 1
- RFC1779: 1
- RFC1823: 1
- RFC1964: 1
- RFC2052: 1
- RFC2203: 1
- RFC2222: 1
- RFC2251: 1
- RFC2252: 1
- RFC2253: 1
- RFC2254: 1
- RFC2255: 1
- RFC2256: 1
- RFC2401: 1
- RFC2402: 1
- RFC2406: 1
- RFC2408: 2
- RFC2409: 1
- RFC2459: 1
- RFC2560: 1
- RFC2623: 1
- RFC2744: 1
- RFC2829: 1
- RFC2830: 1
- RFC2831: 1
- RFC2849: 1
- RFC3268: 2
- RFC3530: 1
- RFC3602: 1
- RFC3692: 1
- RFC3961: 3
- RFC4217: 2
- RFC4251: 2
- RFC4252: 1
- RFC4253: 8
- RFC4301: 1
- RFC4302: 1
- RFC4303: 1
- RFC4304: 1
- RFC4305: 1
- RFC4308: 1
- RFC4835: 1
- X509:
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 140-3: 1
- FIPS 180-4: 1
- FIPS 197: 1
- ISO:
- RFC:
- RFC 2104: 4
- RFC 2616: 3
- RFC 3394: 3
- RFC 3565: 3
- RFC 4493: 5
- RFC 5083: 2
- RFC 5084: 3
- RFC 5114: 6
- RFC 5246: 12
- RFC 5289: 4
- RFC 5639: 8
- RFC 5652: 4
- RFC 7616: 3
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Walter Farrell, Helmut Kurth
- /CreationDate: D:20090316140319-04'00'
- /Creator: Writer
- /Producer: OpenOffice.org 3.0
- /Subject: z/OS Evaluation
- /Title: Security Target for IBM z/OS Version 1 Release 10
- pdf_file_size_bytes: 1427013
- pdf_hyperlinks: http://wp.netscape.com/eng/ssl3/draft302.txt, http://rfc.net/rfc2560.html#sX.509, http://www1.es.net/pub/rfcs/rfc4308.txt, http://www1.es.net/pub/rfcs/rfc4304.txt, http://www1.es.net/pub/rfcs/rfc4835.txt, ftp://ftp.rfc-editor.org/in-notes/rfc2401.txt, http://www1.es.net/pub/rfcs/rfc4303.txt, http://www1.es.net/pub/rfcs/rfc4302.txt, http://www.sdsusa.com/dictionary/glossAZ/r.htm#racf, http://rfc.net/rfc3602.html, http://www1.es.net/pub/rfcs/rfc4305.txt, ftp://FTP.system-name.ftp-daemon-name.PORTnnnn/, http://en.wikipedia.org/wiki/Integrity, ftp://ftp.rfc-editor.org/in-notes/rfc2246.txt, http://www1.es.net/pub/rfcs/rfc4301.txt, http://niap.bahialab.com/cc-scheme/pp/index.cfm
- pdf_is_encrypted: False
- pdf_number_of_pages: 188
|
- /Title: Security Target SMGW Version 2.2
- pdf_file_size_bytes: 5040086
- pdf_hyperlinks: http://www.ietf.org/rfc/rfc5084.txt, http://www.ietf.org/rfc/rfc5652.txt, http://fc12.ifca.ai/pre-proceedings/paper_49.pdf, http://rfc-editor.org/rfc/rfc3565.txt, http://www.ietf.org/rfc/rfc5114.txt, http://www.ietf.org/rfc/rfc5083.txt, http://www.usb.org/developers/docs/usb20_docs/%23usb20spec, http://de.wikipedia.org/wiki/Ethernet, http://www.ietf.org/rfc/rfc5639.txt, http://rfc-editor.org/rfc/rfc2104.txt, http://www.ppc-ag.com/, http://www.ietf.org/rfc/rfc5246.txt, http://www.rfc-editor.org/rfc/rfc4493.txt, http://rfc-editor.org/rfc/rfc7616.txt, http://en.wikipedia.org/wiki/Network_interface_device, http://rfc-editor.org/rfc/rfc3394.txt, http://de.wikipedia.org/wiki/Open_Metering_System, http://rfc-editor.org/rfc/rfc2616.txt, http://www.ietf.org/rfc/rfc5289.txt, http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 173
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |