name |
STARCOS 3.2 eGK Version 1.0
|
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
Data Protection
|
not_valid_before |
2007-12-18
|
2014-11-07
|
not_valid_after |
2019-09-01
|
2019-11-08
|
scheme |
DE
|
DE
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080514_0406b.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772b_pdf.pdf
|
status |
archived
|
archived
|
manufacturer |
G+D Mobile Security GmbH
|
Kanguru Solutions
|
manufacturer_web |
https://www.gi-de.com/de/de/mobile-security/
|
https://www.kanguru.com
|
security_level |
EAL4+, ADV_IMP.2, AVA_MSU.3, AVA_VLA.4 |
ALC_FLR.1, EAL2+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080514_0406a.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772a_pdf.pdf
|
cert_link |
None
|
None
|
protection_profiles |
|
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Schutzprofil fur USB-Datentrager, Version 1.4', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0025b.pdf', 'pp_ids': frozenset({'SCHUTZPROFIL_USB-DATENTRAGER_V1.4'})}) |
maintenance_updates |
|
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2015, 1, 20), 'maintenance_title': 'Kanguru Defender Elite 200 and Kanguru Defender 2000, firmware version 2.05.10', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1b_pdf.pdf'}) |
state/cert |
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
216964ac90ba575e8c71d2de06a79c244fb3e06b57c294b67d32632d46a49c4a
|
16e52e72927a5eee7124e6fde0c186c1d3d113e733e6116f5fdfcc44278c5b57
|
state/report/txt_hash |
9088c2a4e9c6fbde96a475f1b1277f5ae41f4903399721c8abade3574511fc93
|
8cb2309bdc02367be25c3961b565d25c9f78b2d7cdce20c08213092f4a2eff82
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
a1fde577d38aa7dbcb678cdb8711e42da741a2456195465b3ba348722f125d4d
|
077d27d1e2e9eafc65cbb9d302bc66883e2dd06e21ea816741ca25fe7f7dcd7d
|
state/st/txt_hash |
d69e516fe896cf53d685cd1bbb18d2da1e43879105620d713f353c7e69707c59
|
74714db4c60a8332c3603aaae83a1c8ec3cbea7950400f562332e8ccdcc98147
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
BSI-DSZ-CC-0406-2007
|
BSI-DSZ-CC-0772-2014
|
heuristics/cert_lab |
BSI |
BSI |
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
1.0, 3.2 |
2.0.0.0, 1.2.1.8, 3.2.0.3, 02.03.10, 5.0.2.6 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
BSI-DSZ-CC-0407-2008, BSI-DSZ-CC-0533-2009 |
None
|
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0322-2005 |
None
|
heuristics/report_references/indirectly_referenced_by |
BSI-DSZ-CC-0407-2008, BSI-DSZ-CC-0533-2009 |
None
|
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0223-2003 |
None
|
heuristics/scheme_data |
None
|
None
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
None
|
pdf_data/cert_metadata |
None
|
None
|
pdf_data/report_filename |
20080514_0406a.pdf
|
0772a_pdf.pdf
|
pdf_data/report_frontpage/DE/cert_id |
BSI-DSZ-CC-0406-2007
|
BSI-DSZ-CC-0772-2014
|
pdf_data/report_frontpage/DE/cert_item |
STARCOS 3.2 eGK Version 1.0
|
Kanguru Defender Elite 200 Kanguru Defender 2000 Universal Kanguru Local Administrator, v3.2.0.3 Kanguru Remote Management Console, v5.0.2.6
|
pdf_data/report_frontpage/DE/cert_lab |
BSI
|
BSI
|
pdf_data/report_frontpage/DE/developer |
Giesecke & Devrient GmbH Certification Report V1.1 ZS-01-01-F-326 V4.04 BSI -
|
Kanguru Solutions
|
pdf_data/report_frontpage/DE/match_rules |
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*) |
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*) |
pdf_data/report_keywords/asymmetric_crypto |
- RSA:
- RSA 2048:
2
- RSA 1024:
1
- RSA 1280:
1
- RSA 1536:
1
|
|
pdf_data/report_keywords/cc_cert_id/DE |
- BSI-DSZ-CC-0406-2007:
19
- BSI-DSZ-CC-0322-2005:
1
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
- BSI-PP-0020-V2-2007:
2
- BSI-PP-0020-:
1
- BSI-PP-0020-V2-:
1
|
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT:
2
- ACM_CAP:
2
- ACM_SCP:
2
- ADO:
- ADV:
- ADV_IMP.2:
5
- ADV_FSP:
2
- ADV_HLD:
2
- ADV_IMP:
2
- ADV_INT:
2
- ADV_LLD:
2
- ADV_RCR:
2
- ADV_SPM:
2
- AGD:
- ALC:
- ALC_DVS:
2
- ALC_FLR:
2
- ALC_LCD:
1
- ALC_TAT:
2
- ATE:
- ATE_FUN:
3
- ATE_IND:
4
- ATE_COV:
2
- ATE_DPT:
2
- AVA:
- AVA_MSU.3:
5
- AVA_VLA.4:
6
- AVA_VLA:
5
- AVA_CCA:
2
- AVA_MSU:
2
- AVA_SOF:
3
- AVA_VLA.2:
1
- AVA_VLA.3:
1
- APE:
- APE_DES:
1
- APE_ENV:
1
- APE_INT:
1
- APE_OBJ:
1
- APE_REQ:
1
- APE_SRE:
1
- ASE:
- ASE_DES:
1
- ASE_ENV:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_PPC:
1
- ASE_REQ:
1
- ASE_SRE:
1
- ASE_TSS:
1
|
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.1:
1
- ADV_FSP.2:
1
- ADV_FSP.3:
1
- ADV_FSP.4:
1
- ADV_FSP.5:
1
- ADV_FSP.6:
1
- ADV_IMP.1:
1
- ADV_IMP.2:
1
- ADV_INT.1:
1
- ADV_INT.2:
1
- ADV_INT.3:
1
- ADV_SPM.1:
1
- ADV_TDS.1:
1
- ADV_TDS.2:
1
- ADV_TDS.3:
1
- ADV_TDS.4:
1
- ADV_TDS.5:
1
- ADV_TDS.6:
1
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- AGD_OPE:
1
- AGD_PRE:
1
- ALC:
- ALC_FLR.1:
5
- ALC_FLR:
3
- ALC_CMC.1:
1
- ALC_CMC.2:
1
- ALC_CMC.3:
1
- ALC_CMC.4:
1
- ALC_CMC.5:
1
- ALC_CMS.1:
1
- ALC_CMS.2:
1
- ALC_CMS.3:
1
- ALC_CMS.4:
1
- ALC_CMS.5:
1
- ALC_DEL.1:
1
- ALC_DVS.1:
1
- ALC_DVS.2:
1
- ALC_FLR.2:
1
- ALC_FLR.3:
1
- ALC_LCD.1:
1
- ALC_LCD.2:
1
- ALC_TAT.1:
1
- ALC_TAT.2:
1
- ALC_TAT.3:
1
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
- ATE:
- ATE_COV.1:
2
- ATE_COV.2:
1
- ATE_COV.3:
1
- ATE_DPT.1:
1
- ATE_DPT.2:
1
- ATE_DPT.3:
1
- ATE_DPT.4:
1
- ATE_FUN.1:
1
- ATE_FUN.2:
1
- ATE_IND.1:
1
- ATE_IND.2:
1
- ATE_IND.3:
1
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- AVA_VAN.1:
1
- AVA_VAN.2:
1
- AVA_VAN.3:
1
- AVA_VAN.4:
1
- AVA_VAN.5:
1
- AVA_VAN:
2
- APE:
- APE_INT.1:
1
- APE_CCL.1:
1
- APE_SPD.1:
1
- APE_OBJ.1:
1
- APE_OBJ.2:
1
- APE_ECD.1:
1
- APE_REQ.1:
1
- APE_REQ.2:
1
- ASE:
- ASE_INT.1:
1
- ASE_CCL.1:
1
- ASE_SPD.1:
1
- ASE_OBJ.1:
1
- ASE_OBJ.2:
1
- ASE_ECD.1:
1
- ASE_REQ.1:
1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
- ASE_TSS.2:
1
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_sar/ADV |
- ADV_IMP.2:
5
- ADV_FSP:
2
- ADV_HLD: 2
- ADV_IMP:
2
- ADV_INT:
2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM:
2
|
- ADV_ARC.1: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP.1: 1
- ADV_IMP.2:
1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM.1: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- ADV_ARC: 1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS: 1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP |
2
|
1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_IMP |
2
|
1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_IMP.2 |
5
|
1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_INT |
2
|
1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_SPM |
2
|
1
|
pdf_data/report_keywords/cc_sar/AGD |
|
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- AGD_OPE:
1
- AGD_PRE:
1
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_DVS:
2
- ALC_FLR:
2
- ALC_LCD: 1
- ALC_TAT:
2
|
- ALC_FLR.1: 5
- ALC_FLR:
3
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 1
- ALC_LCD.2: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS:
1
- ALC_TAT:
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS |
2
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
2
|
3
|
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT |
2
|
1
|
pdf_data/report_keywords/cc_sar/APE |
- APE_DES:
1
- APE_ENV:
1
- APE_INT:
1
- APE_OBJ:
1
- APE_REQ:
1
- APE_SRE:
1
|
- APE_INT.1:
1
- APE_CCL.1:
1
- APE_SPD.1:
1
- APE_OBJ.1:
1
- APE_OBJ.2:
1
- APE_ECD.1:
1
- APE_REQ.1:
1
- APE_REQ.2:
1
|
pdf_data/report_keywords/cc_sar/ASE |
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS:
1
|
- ASE_INT.1: 1
- ASE_CCL.1: 1
- ASE_SPD.1: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_ECD.1: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_SPD: 1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_INT |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_OBJ |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_TSS |
1
|
1
|
pdf_data/report_keywords/cc_sar/ATE |
- ATE_FUN:
3
- ATE_IND:
4
- ATE_COV:
2
- ATE_DPT:
2
|
- ATE_COV.1: 2
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_COV |
2
|
1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_DPT |
2
|
1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_FUN |
3
|
1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_IND |
4
|
1
|
pdf_data/report_keywords/cc_sar/AVA |
- AVA_MSU.3:
5
- AVA_VLA.4:
6
- AVA_VLA:
5
- AVA_CCA:
2
- AVA_MSU:
2
- AVA_SOF:
3
- AVA_VLA.2:
1
- AVA_VLA.3:
1
|
- AVA_VAN.1:
1
- AVA_VAN.2:
1
- AVA_VAN.3:
1
- AVA_VAN.4:
1
- AVA_VAN.5:
1
- AVA_VAN:
2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4:
8
- EAL4:
6
- EAL 1:
1
- EAL 7:
1
- EAL5+:
1
- EAL1:
5
- EAL3:
4
- EAL5:
6
- EAL7:
4
- EAL2:
3
- EAL6:
3
- EAL 4 augmented:
3
|
- EAL:
- EAL 2:
8
- EAL 1:
7
- EAL 4:
7
- EAL2:
2
- EAL 3:
4
- EAL 5:
6
- EAL 6:
3
- EAL 7:
4
- EAL 2 augmented:
3
- ITSEC:
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 4:
8
- EAL4: 6
- EAL 1:
1
- EAL 7:
1
- EAL5+: 1
- EAL1: 5
- EAL3: 4
- EAL5: 6
- EAL7: 4
- EAL2:
3
- EAL6: 3
- EAL 4 augmented: 3
|
- EAL 2: 8
- EAL 1:
7
- EAL 4:
7
- EAL2:
2
- EAL 3: 4
- EAL 5: 6
- EAL 6: 3
- EAL 7:
4
- EAL 2 augmented: 3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 |
1
|
7
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 |
8
|
7
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 7 |
1
|
4
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 |
3
|
2
|
pdf_data/report_keywords/cc_sfr |
|
- FCS:
- FCS_COP.1:
1
- FCS_CKM.1:
1
- FCS_RNG.1:
1
- FDP:
- FDP_ACC.1:
2
- FDP_ACF.1:
2
- FIA:
- FIA_UID.2:
4
- FIA_UAU.2:
4
- FIA_UAU.6:
1
- FIA_SOS.1:
1
- FMT:
- FMT_MTD:
2
- FMT_SMF:
2
- FMT_SMF.1:
1
|
pdf_data/report_keywords/certification_process/ConfidentialDocument |
- Security Target of STARCOS 3.2 eGK, BSI-DSZ-0406-2007, Version 1.4, 20.11.2007, Giesecke&Devrient (confidential document) [7] Security Target Lite of STARCOS 3.2 eGK, BSI-DSZ-0406-2007, Version 1.1, 20.11.2007:
1
- 2007, Version 7, 13.12.2007, Evaluation Body for IT-Security of TÜV Informationstechnik GmbH (confidential document) [9] Common Criteria Protection Profile electronic Health Card (eHC) – elektronische:
1
- list for the TOE, Version 1.7, 13.12.2007, Configuration List STARCOS 3.2 eGK, Giesecke&Devrient (confidential document) [11] Administrator Guidance STARCOS 3.2 eGK; STARCOS 3.2 QES V1.0, Version 1.0/Status 13.12.07:
1
|
- Report, Version 8, 2014-10-07, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [9] Evaluated Product User Guide, Version 1.20, 2014-10-02 [10] Kanguru Defender Elite 200 User:
1
- KRMC Administrator's User Manual, Version 5.0.2, 2013-11-01 [14] Configuration lists for the TOE (confidential documents): a) Configuration list for TOE executables, 2014-09-17 b) Configuration list from Phison:
1
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik:
4
|
|
pdf_data/report_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224:
3
- SHA-256:
3
- SHA-384:
3
- SHA-512:
2
- RIPEMD:
|
|
pdf_data/report_keywords/hash_function/SHA |
- SHA1:
- SHA2:
- SHA-224:
3
- SHA-256:
3
- SHA-384:
3
- SHA-512:
2
|
|
pdf_data/report_keywords/hash_function/SHA/SHA2 |
- SHA-224: 3
- SHA-256:
3
- SHA-384: 3
- SHA-512: 2
|
|
pdf_data/report_keywords/hash_function/SHA/SHA2/SHA-256 |
3
|
13
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis/FI |
- physical tampering:
1
- malfunction: 1
|
|
pdf_data/report_keywords/side_channel_analysis/FI/physical tampering |
1
|
2
|
pdf_data/report_keywords/standard_id |
- PKCS:
- BSI:
- AIS 34:
3
- AIS 36:
3
- AIS 25:
2
- AIS 26:
2
- AIS 20:
1
- AIS 35:
2
- AIS 31:
1
- AIS 32:
1
- AIS 38:
1
- ISO:
- ISO/IEC 9796-2:
1
- ISO/IEC 9796-1:
1
- ISO/IEC 15408:2005:
2
|
- BSI:
- ISO:
- ISO/IEC 17065:
2
- ISO/IEC 15408:
2
- ISO/IEC 18045:
2
|
pdf_data/report_keywords/standard_id/BSI |
- AIS 34: 3
- AIS 36: 3
- AIS 25: 2
- AIS 26: 2
- AIS 20:
1
- AIS 35: 2
- AIS 31: 1
- AIS 32:
1
- AIS 38: 1
|
|
pdf_data/report_keywords/standard_id/BSI/AIS 20 |
1
|
2
|
pdf_data/report_keywords/standard_id/BSI/AIS 32 |
1
|
1
|
pdf_data/report_keywords/standard_id/ISO |
- ISO/IEC 9796-2:
1
- ISO/IEC 9796-1:
1
- ISO/IEC 15408:2005:
2
|
- ISO/IEC 17065:
2
- ISO/IEC 15408:
2
- ISO/IEC 18045:
2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/symmetric_crypto/AES_competition |
|
|
pdf_data/report_keywords/technical_report_id/BSI |
- BSI 7125:
2
- BSI 7148:
1
- BSI 7149: 1
|
- BSI TR-02102: 1
- BSI 7138: 2
- BSI 7125:
2
- BSI 7148:
1
|
pdf_data/report_keywords/technical_report_id/BSI/BSI 7125 |
2
|
2
|
pdf_data/report_keywords/technical_report_id/BSI/BSI 7148 |
1
|
1
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
- Infineon:
- GD:
- Giesecke & Devrient:
9
- G&D:
5
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
254398
- pdf_is_encrypted:
False
- pdf_number_of_pages:
36
- /CreationDate:
D:20080303080757+01'00'
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /Creator:
Acrobat PDFMaker 8.1 für Word
- /Keywords:
"Common Criteria, Certification, Zertifizierung, elektronische Gesundheitskarte, eGK, Common Criteria, CC"
- /Producer:
Acrobat Distiller 8.1.0 (Windows)
- /ModDate:
D:20080303164731+01'00'
- /Company: BSI, Postfach 200363, 53133 Bonn
- /SourceModified: D:20080303070750
- /Title:
Certification Report BSI-DSZ-CC-0406-2007
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
1643286
- pdf_is_encrypted:
False
- pdf_number_of_pages:
42
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate:
D:20141121083051+01'00'
- /Creator:
Writer
- /Keywords:
"Common Criteria, Certification, Zertifizierung, encrypted USB storage device, Kanguru Defender"
- /ModDate:
D:20141121113713+01'00'
- /Producer:
LibreOffice 4.2
- /Subject: Common Criteria Certification
- /Title:
Certification Report BSI-DSZ-CC-0772-2014
- pdf_hyperlinks:
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/
|
pdf_data/report_metadata//Author |
Bundesamt für Sicherheit in der Informationstechnik
|
Bundesamt für Sicherheit in der Informationstechnik
|
pdf_data/report_metadata//CreationDate |
D:20080303080757+01'00'
|
D:20141121083051+01'00'
|
pdf_data/report_metadata//Creator |
Acrobat PDFMaker 8.1 für Word
|
Writer
|
pdf_data/report_metadata//Keywords |
"Common Criteria, Certification, Zertifizierung, elektronische Gesundheitskarte, eGK, Common Criteria, CC"
|
"Common Criteria, Certification, Zertifizierung, encrypted USB storage device, Kanguru Defender"
|
pdf_data/report_metadata//ModDate |
D:20080303164731+01'00'
|
D:20141121113713+01'00'
|
pdf_data/report_metadata//Producer |
Acrobat Distiller 8.1.0 (Windows)
|
LibreOffice 4.2
|
pdf_data/report_metadata//Title |
Certification Report BSI-DSZ-CC-0406-2007
|
Certification Report BSI-DSZ-CC-0772-2014
|
pdf_data/report_metadata/pdf_file_size_bytes |
254398
|
1643286
|
pdf_data/report_metadata/pdf_hyperlinks |
|
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/ |
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
36
|
42
|
pdf_data/st_filename |
20080514_0406b.pdf
|
0772b_pdf.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id/DE |
- BSI-DSZ-CC-0322-2005-MA-04:
2
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
- BSI-PP-0020-V2-2007:
1
- BSI-PP-0002:
2
- BSI-PP-****:
1
- BSI-PP-0005-:
1
- BSI-PP-0006-2002T:
1
- BSI-PP-0002-2001:
1
|
- BSI-PP-0025:
6
- BSI-PP- 0025:
13
|
pdf_data/st_keywords/cc_sar |
- ADO:
- ADV:
- ADV_IMP.2:
6
- ADV_SPM.1:
2
- ADV_LLD.1:
2
- ADV_RCR.1:
1
- ADV_FSP.1:
2
- ADV_HLD.2:
1
- ADV_IMP.1:
1
- AGD:
- AGD_ADM.1:
2
- AGD_USR.1:
2
- ALC:
- AVA:
- AVA_MSU.3:
5
- AVA_VLA.4:
6
|
- ADV:
- ADV_SPM.1:
2
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_TDS.1:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_FLR.1:
5
- ALC_CMC.2:
1
- ALC_CMS.2:
1
- ALC_DEL.1:
1
- ATE:
- ATE_COV.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- ASE:
- ASE_INT.1:
1
- ASE_CCL.1:
1
- ASE_SPD.1:
1
- ASE_OBJ.2:
1
- ASE_ECD.1:
1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_IMP.2: 6
- ADV_SPM.1:
2
- ADV_LLD.1: 2
- ADV_RCR.1: 1
- ADV_FSP.1: 2
- ADV_HLD.2: 1
- ADV_IMP.1: 1
|
- ADV_SPM.1:
2
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_SPM.1 |
2
|
2
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_ADM.1:
2
- AGD_USR.1:
2
|
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
pdf_data/st_keywords/cc_sar/ALC |
|
- ALC_FLR.1:
5
- ALC_CMC.2:
1
- ALC_CMS.2:
1
- ALC_DEL.1:
1
|
pdf_data/st_keywords/cc_sar/AVA |
- AVA_MSU.3:
5
- AVA_VLA.4:
6
|
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL4:
11
- EAL5+:
1
- EAL4 augmented:
2
|
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_RND:
9
- FCS_RND.1:
13
- FCS_RND.1.1:
4
- FCS_CKM.1:
24
- FCS_CKM:
7
- FCS_CKM.2:
2
- FCS_COP.1:
27
- FCS_CKM.4:
26
- FCS_CKM.4.1:
3
- FCS_COP:
45
- FDP:
- FDP_ACC.2:
14
- FDP_ACC.2.1:
4
- FDP_ACC.2.2:
5
- FDP_ACF:
1
- FDP_ITC.1:
16
- FDP_ITC.2:
15
- FDP_ACF.1:
13
- FDP_UCT.1:
11
- FDP_ACC.1:
7
- FDP_ACF.1.1:
3
- FDP_ACF.1.2:
3
- FDP_ACF.1.3:
3
- FDP_ACF.1.4:
3
- FDP_RIP.1:
11
- FDP_RIP:
14
- FDP_RIP.1.1:
2
- FDP_SDI.2:
5
- FDP_SDI.1:
2
- FDP_SDI.2.1:
3
- FDP_SDI.2.2:
3
- FDP_UIT.1:
6
- FDP_UCT.1.1:
3
- FDP_IFC.1:
4
- FDP_UIT.1.1:
3
- FDP_UIT.1.2:
3
- FIA:
- FIA_UAU.4:
8
- FIA_AFL.1:
25
- FIA_AFL:
42
- FIA_UAU.1:
14
- FIA_ATD.1:
7
- FIA_ATD.1.1:
3
- FIA_UID.1:
8
- FIA_UID.1.1:
3
- FIA_UID.1.2:
3
- FIA_UAU.1.1:
3
- FIA_UAU.1.2:
3
- FIA_UAU.4.1:
3
- FMT:
- FMT_LIM:
5
- FMT_LIM.1:
20
- FMT_LIM.2:
19
- FMT_LIM.1.1:
4
- FMT_MSA.2:
19
- FMT_MTD.1:
19
- FMT_MSA.3:
2
- FMT_SMF.1:
19
- FMT_SMR.1:
19
- FMT_SMF.1.1:
3
- FMT_SMR.1.1:
3
- FMT_SMR.1.2:
3
- FMT_LIM.2.1:
3
- FMT_MTD:
27
- FMT_MSA.1:
1
- FPT:
- FPT_FLS.1:
9
- FPT_TST.1:
11
- FPT_PHP.3:
9
- FPT_RVM.1:
10
- FPT_SEP.1:
10
- FPT_FLS.1.1:
3
- FPT_PHP.3.1:
3
- FPT_TST.1.1:
3
- FPT_TST.1.2:
3
- FPT_TST.1.3:
3
- FPT_AMT.1:
2
- FPT_RVM.1.1:
3
- FPT_SEP.1.1:
3
- FPT_SEP.1.2:
3
- FTP:
- FTP_ITC.1:
14
- FTP_TRP.1:
4
- FTP_ITC.1.1:
3
- FTP_ITC.1.2:
3
- FTP_ITC.1.3:
3
|
- FAU:
- FCS:
- FCS_RNG.1:
15
- FCS_CKM.1:
9
- FCS_CKM.4:
9
- FCS_COP.1:
9
- FCS_RNG:
2
- FCS_RNG.1.1:
3
- FCS_RNG.1.2:
3
- FCS_CKM.1.1:
1
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
1
- FCS_CKM.2:
1
- FDP:
- FDP_ACC.1:
14
- FDP_ACF.1:
13
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_ITC.1:
2
- FDP_ITC.2:
2
- FDP_IFC.1:
1
- FIA:
- FIA_UAU.1:
7
- FIA_UAU.6:
8
- FIA_SOS.1:
8
- FIA_UAU.2:
9
- FIA_UID.2:
10
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.6.1:
1
- FIA_SOS.1.1:
1
- FIA_UAU.2.1:
1
- FIA_UID.2.1:
1
- FIA_UID.1:
2
- FMT:
- FMT_MSA.1:
8
- FMT_MTD:
12
- FMT_SMF:
20
- FMT_SMR.1:
12
- FMT_SMF.1:
6
- FMT_MTD.1:
3
- FMT_MSA.1.1:
1
- FMT_MTD.1.1:
2
- FMT_SMF.1.1:
2
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA.3:
1
- FPT:
- FPT_FLS.1:
9
- FPT_RCV.4:
8
- FPT_PHP.1:
8
- FPT_RCV.4.1:
2
- FPT_FLS.1.1:
1
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_RND: 9
- FCS_RND.1: 13
- FCS_RND.1.1: 4
- FCS_CKM.1:
24
- FCS_CKM: 7
- FCS_CKM.2:
2
- FCS_COP.1:
27
- FCS_CKM.4:
26
- FCS_CKM.4.1:
3
- FCS_COP: 45
|
- FCS_RNG.1: 15
- FCS_CKM.1:
9
- FCS_CKM.4:
9
- FCS_COP.1:
9
- FCS_RNG: 2
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 3
- FCS_CKM.1.1: 1
- FCS_CKM.4.1:
1
- FCS_COP.1.1: 1
- FCS_CKM.2:
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
24
|
9
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
26
|
9
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 |
3
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
27
|
9
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACC.2: 14
- FDP_ACC.2.1: 4
- FDP_ACC.2.2: 5
- FDP_ACF: 1
- FDP_ITC.1:
16
- FDP_ITC.2:
15
- FDP_ACF.1:
13
- FDP_UCT.1: 11
- FDP_ACC.1:
7
- FDP_ACF.1.1:
3
- FDP_ACF.1.2:
3
- FDP_ACF.1.3:
3
- FDP_ACF.1.4:
3
- FDP_RIP.1: 11
- FDP_RIP: 14
- FDP_RIP.1.1: 2
- FDP_SDI.2: 5
- FDP_SDI.1: 2
- FDP_SDI.2.1: 3
- FDP_SDI.2.2: 3
- FDP_UIT.1: 6
- FDP_UCT.1.1: 3
- FDP_IFC.1:
4
- FDP_UIT.1.1: 3
- FDP_UIT.1.2: 3
|
- FDP_ACC.1:
14
- FDP_ACF.1:
13
- FDP_ACC.1.1: 1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_ITC.1:
2
- FDP_ITC.2:
2
- FDP_IFC.1:
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
7
|
14
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
13
|
13
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
3
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
3
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
3
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
3
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
4
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
16
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
15
|
2
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_UAU.4: 8
- FIA_AFL.1: 25
- FIA_AFL: 42
- FIA_UAU.1:
14
- FIA_ATD.1: 7
- FIA_ATD.1.1: 3
- FIA_UID.1:
8
- FIA_UID.1.1: 3
- FIA_UID.1.2: 3
- FIA_UAU.1.1:
3
- FIA_UAU.1.2:
3
- FIA_UAU.4.1: 3
|
- FIA_UAU.1:
7
- FIA_UAU.6: 8
- FIA_SOS.1: 8
- FIA_UAU.2: 9
- FIA_UID.2: 10
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.6.1: 1
- FIA_SOS.1.1: 1
- FIA_UAU.2.1: 1
- FIA_UID.2.1: 1
- FIA_UID.1:
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
14
|
7
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 |
3
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 |
3
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
8
|
2
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_LIM: 5
- FMT_LIM.1: 20
- FMT_LIM.2: 19
- FMT_LIM.1.1: 4
- FMT_MSA.2: 19
- FMT_MTD.1:
19
- FMT_MSA.3:
2
- FMT_SMF.1:
19
- FMT_SMR.1:
19
- FMT_SMF.1.1:
3
- FMT_SMR.1.1:
3
- FMT_SMR.1.2:
3
- FMT_LIM.2.1: 3
- FMT_MTD:
27
- FMT_MSA.1:
1
|
- FMT_MSA.1:
8
- FMT_MTD:
12
- FMT_SMF: 20
- FMT_SMR.1:
12
- FMT_SMF.1:
6
- FMT_MTD.1:
3
- FMT_MSA.1.1: 1
- FMT_MTD.1.1: 2
- FMT_SMF.1.1:
2
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA.3:
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
1
|
8
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD |
27
|
12
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
19
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
19
|
6
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
3
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
19
|
12
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
3
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
3
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_FLS.1:
9
- FPT_TST.1: 11
- FPT_PHP.3: 9
- FPT_RVM.1: 10
- FPT_SEP.1: 10
- FPT_FLS.1.1:
3
- FPT_PHP.3.1: 3
- FPT_TST.1.1: 3
- FPT_TST.1.2: 3
- FPT_TST.1.3: 3
- FPT_AMT.1: 2
- FPT_RVM.1.1: 3
- FPT_SEP.1.1: 3
- FPT_SEP.1.2: 3
|
- FPT_FLS.1:
9
- FPT_RCV.4: 8
- FPT_PHP.1: 8
- FPT_RCV.4.1: 2
- FPT_FLS.1.1:
1
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 |
9
|
9
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1.1 |
3
|
1
|
pdf_data/st_keywords/certification_process/OutOfScope |
- out of scope:
1
- FDP_ACF.1 Note by the ST-author 31: Keys and other data for creation of qualified signatures are out of scope of this Security Target. The TOE shall meet the requirement “Security attribute based access:
1
|
- Out of scope:
2
- 11 1.5.4.3 Out of scope :
1
- 11 1.5.4.3 Out of scope ........................................................................................... 12 1.5:
1
- from the KRMC to the device. Commands are queued at the KRMC until polled form the device. 1.5.4.3 Out of scope The TOE supports additional features that are not part of the scope: ● Antivirus solution ●:
1
|
pdf_data/st_keywords/cipher_mode/CBC/CBC |
3
|
1
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/hash_function/SHA |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
- SCA:
- physical probing:
5
- side channels:
2
- side channel:
1
- DPA:
1
- FI:
- Physical Tampering:
2
- physical tampering:
7
- Physical tampering:
1
- Malfunction:
3
- malfunction:
4
- fault injection:
1
- other:
- reverse engineering:
1
- Bleichenbacher attack:
1
|
|
pdf_data/st_keywords/side_channel_analysis/FI |
- Physical Tampering: 2
- physical tampering:
7
- Physical tampering: 1
- Malfunction: 3
- malfunction: 4
- fault injection: 1
|
|
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering |
7
|
3
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-2:
3
- FIPS 46-3:
2
- FIPS PUB 46-3:
2
- PKCS:
- BSI:
- AIS20:
2
- AIS31:
2
- AIS 20:
1
- ISO:
- ISO/IEC9796-2:
5
- ISO/IEC 9796-1:
1
- ISO/IEC 7816-4:
1
- X509:
- CC:
- CCMB-2005-08-001:
1
- CCMB-2005-08-002:
1
- CCIMB-2005-08-001:
1
- CCIMB-2005-08-002:
1
- CCIMB-2005-08-003:
1
- CCIMB-2005-08-004:
1
|
|
pdf_data/st_keywords/standard_id/BSI |
- AIS20: 2
- AIS31: 2
- AIS 20:
1
|
|
pdf_data/st_keywords/standard_id/BSI/AIS 20 |
1
|
1
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- DES:
- 3DES:
- Triple-DES:
11
- TDES:
5
- 3-DES:
2
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
- Infineon:
- Infineon:
9
- Infineon Technologies AG:
1
- GD:
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
374430
- pdf_is_encrypted:
False
- pdf_number_of_pages:
114
- /CreationDate:
D:20071120144357+01'00'
- /Creator:
PScript5.dll Version 5.2.2
- /Producer:
Acrobat Distiller 7.0 (Windows)
- /ModDate:
D:20080303164809+01'00'
- /Title:
Security Target Lite STARCOS 3.2 eGK V1.0
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
704587
- pdf_is_encrypted:
False
- pdf_number_of_pages:
41
- /Keywords: Security Target, Common Criteria, USB Storage, Encryption, Protected Storage
- /Subject:
- /Title:
Kanguru Defender Security Target (version 1.10 as of 2014-10-06)
- /Creator:
Unknown
- /Author: Andreas Siegert (generated by CCTool version 2.8)
- /Producer:
XEP 4.23
- /application: CCTool version x.y
- /Trapped: /False
- /CreationDate:
D:20141006150157Z
- /ModDate:
D:20141006150157Z
- pdf_hyperlinks:
http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf
|
pdf_data/st_metadata//CreationDate |
D:20071120144357+01'00'
|
D:20141006150157Z
|
pdf_data/st_metadata//Creator |
PScript5.dll Version 5.2.2
|
Unknown
|
pdf_data/st_metadata//ModDate |
D:20080303164809+01'00'
|
D:20141006150157Z
|
pdf_data/st_metadata//Producer |
Acrobat Distiller 7.0 (Windows)
|
XEP 4.23
|
pdf_data/st_metadata//Title |
Security Target Lite STARCOS 3.2 eGK V1.0
|
Kanguru Defender Security Target (version 1.10 as of 2014-10-06)
|
pdf_data/st_metadata/pdf_file_size_bytes |
374430
|
704587
|
pdf_data/st_metadata/pdf_hyperlinks |
|
http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf |
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
114
|
41
|
dgst |
1d84f97a0f8761d5
|
eda06ca3c208ebd0
|