Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

STARCOS 3.2 eGK Version 1.0
BSI-DSZ-CC-0406-2007
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6
BSI-DSZ-CC-0772-2014
name STARCOS 3.2 eGK Version 1.0 - Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6
category ICs, Smart Cards and Smart Card-Related Devices and Systems Data Protection
not_valid_before 2007-12-18 2014-11-07
not_valid_after 2019-09-01 2019-11-08
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080514_0406b.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772b_pdf.pdf
manufacturer G+D Mobile Security GmbH Kanguru Solutions
manufacturer_web https://www.gi-de.com/de/de/mobile-security/ https://www.kanguru.com
security_level EAL4+, ADV_IMP.2, AVA_MSU.3, AVA_VLA.4 ALC_FLR.1, EAL2+
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080514_0406a.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772a_pdf.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Schutzprofil fur USB-Datentrager, Version 1.4', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0025b.pdf', 'pp_ids': frozenset({'SCHUTZPROFIL_USB-DATENTRAGER_V1.4'})})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2015, 1, 20), 'maintenance_title': 'Kanguru Defender Elite 200 and Kanguru Defender 2000, firmware version 2.05.10', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1b_pdf.pdf'})
state/report/pdf_hash 216964ac90ba575e8c71d2de06a79c244fb3e06b57c294b67d32632d46a49c4a 16e52e72927a5eee7124e6fde0c186c1d3d113e733e6116f5fdfcc44278c5b57
state/report/txt_hash 9088c2a4e9c6fbde96a475f1b1277f5ae41f4903399721c8abade3574511fc93 8cb2309bdc02367be25c3961b565d25c9f78b2d7cdce20c08213092f4a2eff82
state/st/pdf_hash a1fde577d38aa7dbcb678cdb8711e42da741a2456195465b3ba348722f125d4d 077d27d1e2e9eafc65cbb9d302bc66883e2dd06e21ea816741ca25fe7f7dcd7d
state/st/txt_hash d69e516fe896cf53d685cd1bbb18d2da1e43879105620d713f353c7e69707c59 74714db4c60a8332c3603aaae83a1c8ec3cbea7950400f562332e8ccdcc98147
heuristics/cert_id BSI-DSZ-CC-0406-2007 BSI-DSZ-CC-0772-2014
heuristics/extracted_versions 1.0, 3.2 2.0.0.0, 1.2.1.8, 3.2.0.3, 02.03.10, 5.0.2.6
heuristics/report_references/directly_referenced_by BSI-DSZ-CC-0407-2008, BSI-DSZ-CC-0533-2009 None
heuristics/report_references/directly_referencing BSI-DSZ-CC-0322-2005 None
heuristics/report_references/indirectly_referenced_by BSI-DSZ-CC-0407-2008, BSI-DSZ-CC-0533-2009 None
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0223-2003 None
pdf_data/report_filename 20080514_0406a.pdf 0772a_pdf.pdf
pdf_data/report_frontpage/DE/cert_id BSI-DSZ-CC-0406-2007 BSI-DSZ-CC-0772-2014
pdf_data/report_frontpage/DE/cert_item STARCOS 3.2 eGK Version 1.0 Kanguru Defender Elite 200 Kanguru Defender 2000 Universal Kanguru Local Administrator, v3.2.0.3 Kanguru Remote Management Console, v5.0.2.6
pdf_data/report_frontpage/DE/developer Giesecke & Devrient GmbH Certification Report V1.1 ZS-01-01-F-326 V4.04 BSI - Kanguru Solutions
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA 2048: 2
    • RSA 1024: 1
    • RSA 1280: 1
    • RSA 1536: 1
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0406-2007: 19
  • BSI-DSZ-CC-0322-2005: 1
  • BSI-DSZ-CC-0772-2014: 22
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0020-V2-2007: 2
  • BSI-PP-0020-: 1
  • BSI-PP-0020-V2-: 1
  • BSI-PP-0025-2006: 4
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT: 2
    • ACM_CAP: 2
    • ACM_SCP: 2
  • ADO:
    • ADO_DEL: 2
    • ADO_IGS: 2
  • ADV:
    • ADV_IMP.2: 5
    • ADV_FSP: 2
    • ADV_HLD: 2
    • ADV_IMP: 2
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_USR: 2
  • ALC:
    • ALC_DVS: 2
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_TAT: 2
  • ATE:
    • ATE_FUN: 3
    • ATE_IND: 4
    • ATE_COV: 2
    • ATE_DPT: 2
  • AVA:
    • AVA_MSU.3: 5
    • AVA_VLA.4: 6
    • AVA_VLA: 5
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_SOF: 3
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
  • APE:
    • APE_DES: 1
    • APE_ENV: 1
    • APE_INT: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SRE: 1
  • ASE:
    • ASE_DES: 1
    • ASE_ENV: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_PPC: 1
    • ASE_REQ: 1
    • ASE_SRE: 1
    • ASE_TSS: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM.1: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_FLR.1: 5
    • ALC_FLR: 3
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 1
    • ALC_LCD.2: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_TAT: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
    • AVA_VAN: 2
  • APE:
    • APE_INT.1: 1
    • APE_CCL.1: 1
    • APE_SPD.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_ECD.1: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
  • ASE:
    • ASE_INT.1: 1
    • ASE_CCL.1: 1
    • ASE_SPD.1: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_ECD.1: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
pdf_data/report_keywords/cc_sar/ADV
  • ADV_IMP.2: 5
  • ADV_FSP: 2
  • ADV_HLD: 2
  • ADV_IMP: 2
  • ADV_INT: 2
  • ADV_LLD: 2
  • ADV_RCR: 2
  • ADV_SPM: 2
  • ADV_ARC.1: 1
  • ADV_FSP.1: 1
  • ADV_FSP.2: 1
  • ADV_FSP.3: 1
  • ADV_FSP.4: 1
  • ADV_FSP.5: 1
  • ADV_FSP.6: 1
  • ADV_IMP.1: 1
  • ADV_IMP.2: 1
  • ADV_INT.1: 1
  • ADV_INT.2: 1
  • ADV_INT.3: 1
  • ADV_SPM.1: 1
  • ADV_TDS.1: 1
  • ADV_TDS.2: 1
  • ADV_TDS.3: 1
  • ADV_TDS.4: 1
  • ADV_TDS.5: 1
  • ADV_TDS.6: 1
  • ADV_ARC: 1
  • ADV_FSP: 1
  • ADV_IMP: 1
  • ADV_INT: 1
  • ADV_SPM: 1
  • ADV_TDS: 1
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP 2 1
pdf_data/report_keywords/cc_sar/ADV/ADV_IMP 2 1
pdf_data/report_keywords/cc_sar/ADV/ADV_IMP.2 5 1
pdf_data/report_keywords/cc_sar/ADV/ADV_INT 2 1
pdf_data/report_keywords/cc_sar/ADV/ADV_SPM 2 1
pdf_data/report_keywords/cc_sar/AGD
  • AGD_ADM: 2
  • AGD_USR: 2
  • AGD_OPE.1: 1
  • AGD_PRE.1: 1
  • AGD_OPE: 1
  • AGD_PRE: 1
pdf_data/report_keywords/cc_sar/ALC
  • ALC_DVS: 2
  • ALC_FLR: 2
  • ALC_LCD: 1
  • ALC_TAT: 2
  • ALC_FLR.1: 5
  • ALC_FLR: 3
  • ALC_CMC.1: 1
  • ALC_CMC.2: 1
  • ALC_CMC.3: 1
  • ALC_CMC.4: 1
  • ALC_CMC.5: 1
  • ALC_CMS.1: 1
  • ALC_CMS.2: 1
  • ALC_CMS.3: 1
  • ALC_CMS.4: 1
  • ALC_CMS.5: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 1
  • ALC_DVS.2: 1
  • ALC_FLR.2: 1
  • ALC_FLR.3: 1
  • ALC_LCD.1: 1
  • ALC_LCD.2: 1
  • ALC_TAT.1: 1
  • ALC_TAT.2: 1
  • ALC_TAT.3: 1
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS 2 1
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR 2 3
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT 2 1
pdf_data/report_keywords/cc_sar/APE
  • APE_DES: 1
  • APE_ENV: 1
  • APE_INT: 1
  • APE_OBJ: 1
  • APE_REQ: 1
  • APE_SRE: 1
  • APE_INT.1: 1
  • APE_CCL.1: 1
  • APE_SPD.1: 1
  • APE_OBJ.1: 1
  • APE_OBJ.2: 1
  • APE_ECD.1: 1
  • APE_REQ.1: 1
  • APE_REQ.2: 1
pdf_data/report_keywords/cc_sar/ASE
  • ASE_DES: 1
  • ASE_ENV: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_PPC: 1
  • ASE_REQ: 1
  • ASE_SRE: 1
  • ASE_TSS: 1
  • ASE_INT.1: 1
  • ASE_CCL.1: 1
  • ASE_SPD.1: 1
  • ASE_OBJ.1: 1
  • ASE_OBJ.2: 1
  • ASE_ECD.1: 1
  • ASE_REQ.1: 1
  • ASE_REQ.2: 1
  • ASE_TSS.1: 1
  • ASE_TSS.2: 1
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_SPD: 1
  • ASE_TSS: 1
pdf_data/report_keywords/cc_sar/ATE
  • ATE_FUN: 3
  • ATE_IND: 4
  • ATE_COV: 2
  • ATE_DPT: 2
  • ATE_COV.1: 2
  • ATE_COV.2: 1
  • ATE_COV.3: 1
  • ATE_DPT.1: 1
  • ATE_DPT.2: 1
  • ATE_DPT.3: 1
  • ATE_DPT.4: 1
  • ATE_FUN.1: 1
  • ATE_FUN.2: 1
  • ATE_IND.1: 1
  • ATE_IND.2: 1
  • ATE_IND.3: 1
  • ATE_COV: 1
  • ATE_DPT: 1
  • ATE_FUN: 1
  • ATE_IND: 1
pdf_data/report_keywords/cc_sar/ATE/ATE_COV 2 1
pdf_data/report_keywords/cc_sar/ATE/ATE_DPT 2 1
pdf_data/report_keywords/cc_sar/ATE/ATE_FUN 3 1
pdf_data/report_keywords/cc_sar/ATE/ATE_IND 4 1
pdf_data/report_keywords/cc_sar/AVA
  • AVA_MSU.3: 5
  • AVA_VLA.4: 6
  • AVA_VLA: 5
  • AVA_CCA: 2
  • AVA_MSU: 2
  • AVA_SOF: 3
  • AVA_VLA.2: 1
  • AVA_VLA.3: 1
  • AVA_VAN.1: 1
  • AVA_VAN.2: 1
  • AVA_VAN.3: 1
  • AVA_VAN.4: 1
  • AVA_VAN.5: 1
  • AVA_VAN: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 8
    • EAL4: 6
    • EAL 1: 1
    • EAL 7: 1
    • EAL5+: 1
    • EAL1: 5
    • EAL3: 4
    • EAL5: 6
    • EAL7: 4
    • EAL2: 3
    • EAL6: 3
    • EAL 4 augmented: 3
  • EAL:
    • EAL 2: 8
    • EAL 1: 7
    • EAL 4: 7
    • EAL2: 2
    • EAL 3: 4
    • EAL 5: 6
    • EAL 6: 3
    • EAL 7: 4
    • EAL 2 augmented: 3
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 4: 8
  • EAL4: 6
  • EAL 1: 1
  • EAL 7: 1
  • EAL5+: 1
  • EAL1: 5
  • EAL3: 4
  • EAL5: 6
  • EAL7: 4
  • EAL2: 3
  • EAL6: 3
  • EAL 4 augmented: 3
  • EAL 2: 8
  • EAL 1: 7
  • EAL 4: 7
  • EAL2: 2
  • EAL 3: 4
  • EAL 5: 6
  • EAL 6: 3
  • EAL 7: 4
  • EAL 2 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 1 7
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 8 7
pdf_data/report_keywords/cc_security_level/EAL/EAL 7 1 4
pdf_data/report_keywords/cc_security_level/EAL/EAL2 3 2
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_COP.1: 1
    • FCS_CKM.1: 1
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC.1: 2
    • FDP_ACF.1: 2
  • FIA:
    • FIA_UID.2: 4
    • FIA_UAU.2: 4
    • FIA_UAU.6: 1
    • FIA_SOS.1: 1
  • FMT:
    • FMT_MTD: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 1
pdf_data/report_keywords/certification_process/ConfidentialDocument
  • Security Target of STARCOS 3.2 eGK, BSI-DSZ-0406-2007, Version 1.4, 20.11.2007, Giesecke&Devrient (confidential document) [7] Security Target Lite of STARCOS 3.2 eGK, BSI-DSZ-0406-2007, Version 1.1, 20.11.2007: 1
  • 2007, Version 7, 13.12.2007, Evaluation Body for IT-Security of TÜV Informationstechnik GmbH (confidential document) [9] Common Criteria Protection Profile electronic Health Card (eHC) – elektronische: 1
  • list for the TOE, Version 1.7, 13.12.2007, Configuration List STARCOS 3.2 eGK, Giesecke&Devrient (confidential document) [11] Administrator Guidance STARCOS 3.2 eGK; STARCOS 3.2 QES V1.0, Version 1.0/Status 13.12.07: 1
  • Report, Version 8, 2014-10-07, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [9] Evaluated Product User Guide, Version 1.20, 2014-10-02 [10] Kanguru Defender Elite 200 User: 1
  • KRMC Administrator's User Manual, Version 5.0.2, 2013-11-01 [14] Configuration lists for the TOE (confidential documents): a) Configuration list for TOE executables, 2014-09-17 b) Configuration list from Phison: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 4
  • atsec:
    • atsec: 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-224: 3
      • SHA-256: 3
      • SHA-384: 3
      • SHA-512: 2
  • RIPEMD:
    • RIPEMD-160: 3
    • RIPEMD: 1
  • SHA:
    • SHA2:
      • SHA-256: 13
pdf_data/report_keywords/hash_function/SHA
  • SHA1:
    • SHA-1: 3
  • SHA2:
    • SHA-224: 3
    • SHA-256: 3
    • SHA-384: 3
    • SHA-512: 2
  • SHA2:
    • SHA-256: 13
pdf_data/report_keywords/hash_function/SHA/SHA2
  • SHA-224: 3
  • SHA-256: 3
  • SHA-384: 3
  • SHA-512: 2
  • SHA-256: 13
pdf_data/report_keywords/hash_function/SHA/SHA2/SHA-256 3 13
pdf_data/report_keywords/os_name
  • STARCOS:
    • STARCOS 3: 25
    • STARCOS: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/report_keywords/side_channel_analysis/FI
  • physical tampering: 1
  • malfunction: 1
  • physical tampering: 2
pdf_data/report_keywords/side_channel_analysis/FI/physical tampering 1 2
pdf_data/report_keywords/standard_id
  • PKCS:
    • PKCS #1: 2
    • PKCS#1: 1
  • BSI:
    • AIS 34: 3
    • AIS 36: 3
    • AIS 25: 2
    • AIS 26: 2
    • AIS 20: 1
    • AIS 35: 2
    • AIS 31: 1
    • AIS 32: 1
    • AIS 38: 1
  • ISO:
    • ISO/IEC 9796-2: 1
    • ISO/IEC 9796-1: 1
    • ISO/IEC 15408:2005: 2
  • BSI:
    • AIS 20: 2
    • AIS 32: 1
  • ISO:
    • ISO/IEC 17065: 2
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/report_keywords/standard_id/BSI
  • AIS 34: 3
  • AIS 36: 3
  • AIS 25: 2
  • AIS 26: 2
  • AIS 20: 1
  • AIS 35: 2
  • AIS 31: 1
  • AIS 32: 1
  • AIS 38: 1
  • AIS 20: 2
  • AIS 32: 1
pdf_data/report_keywords/standard_id/BSI/AIS 20 1 2
pdf_data/report_keywords/standard_id/ISO
  • ISO/IEC 9796-2: 1
  • ISO/IEC 9796-1: 1
  • ISO/IEC 15408:2005: 2
  • ISO/IEC 17065: 2
  • ISO/IEC 15408: 2
  • ISO/IEC 18045: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • E2:
      • E2: 1
  • DES:
    • DES:
      • DES: 3
    • 3DES:
      • TDES: 1
  • AES_competition:
    • AES:
      • AES-256: 1
      • AES: 4
pdf_data/report_keywords/symmetric_crypto/AES_competition
  • E2:
    • E2: 1
  • AES:
    • AES-256: 1
    • AES: 4
pdf_data/report_keywords/technical_report_id/BSI
  • BSI 7125: 2
  • BSI 7148: 1
  • BSI 7149: 1
  • BSI TR-02102: 1
  • BSI 7138: 2
  • BSI 7125: 2
  • BSI 7148: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 3
  • GD:
    • Giesecke & Devrient: 9
    • G&D: 5
  • Microsoft:
    • Microsoft: 1
pdf_data/report_metadata
  • pdf_file_size_bytes: 254398
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
  • /CreationDate: D:20080303080757+01'00'
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Creator: Acrobat PDFMaker 8.1 für Word
  • /Keywords: "Common Criteria, Certification, Zertifizierung, elektronische Gesundheitskarte, eGK, Common Criteria, CC"
  • /Producer: Acrobat Distiller 8.1.0 (Windows)
  • /ModDate: D:20080303164731+01'00'
  • /Company: BSI, Postfach 200363, 53133 Bonn
  • /SourceModified: D:20080303070750
  • /Title: Certification Report BSI-DSZ-CC-0406-2007
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 1643286
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 42
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20141121083051+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, encrypted USB storage device, Kanguru Defender"
  • /ModDate: D:20141121113713+01'00'
  • /Producer: LibreOffice 4.2
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0772-2014
  • pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/
pdf_data/report_metadata//CreationDate D:20080303080757+01'00' D:20141121083051+01'00'
pdf_data/report_metadata//Creator Acrobat PDFMaker 8.1 für Word Writer
pdf_data/report_metadata//Keywords "Common Criteria, Certification, Zertifizierung, elektronische Gesundheitskarte, eGK, Common Criteria, CC" "Common Criteria, Certification, Zertifizierung, encrypted USB storage device, Kanguru Defender"
pdf_data/report_metadata//ModDate D:20080303164731+01'00' D:20141121113713+01'00'
pdf_data/report_metadata//Producer Acrobat Distiller 8.1.0 (Windows) LibreOffice 4.2
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0406-2007 Certification Report BSI-DSZ-CC-0772-2014
pdf_data/report_metadata/pdf_file_size_bytes 254398 1643286
pdf_data/report_metadata/pdf_hyperlinks https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/
pdf_data/report_metadata/pdf_number_of_pages 36 42
pdf_data/st_filename 20080514_0406b.pdf 0772b_pdf.pdf
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA2048: 1
pdf_data/st_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0322-2005-MA-04: 2
  • BSI-DSZ-CC-0772: 1
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0020-V2-2007: 1
  • BSI-PP-0002: 2
  • BSI-PP-****: 1
  • BSI-PP-0005-: 1
  • BSI-PP-0006-2002T: 1
  • BSI-PP-0002-2001: 1
  • BSI-PP-0025: 6
  • BSI-PP- 0025: 13
pdf_data/st_keywords/cc_sar
  • ADO:
    • ADO_IGS.1: 1
  • ADV:
    • ADV_IMP.2: 6
    • ADV_SPM.1: 2
    • ADV_LLD.1: 2
    • ADV_RCR.1: 1
    • ADV_FSP.1: 2
    • ADV_HLD.2: 1
    • ADV_IMP.1: 1
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_TAT.1: 1
  • AVA:
    • AVA_MSU.3: 5
    • AVA_VLA.4: 6
  • ADV:
    • ADV_SPM.1: 2
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_FLR.1: 5
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ASE:
    • ASE_INT.1: 1
    • ASE_CCL.1: 1
    • ASE_SPD.1: 1
    • ASE_OBJ.2: 1
    • ASE_ECD.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_IMP.2: 6
  • ADV_SPM.1: 2
  • ADV_LLD.1: 2
  • ADV_RCR.1: 1
  • ADV_FSP.1: 2
  • ADV_HLD.2: 1
  • ADV_IMP.1: 1
  • ADV_SPM.1: 2
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.1: 1
pdf_data/st_keywords/cc_sar/AGD
  • AGD_ADM.1: 2
  • AGD_USR.1: 2
  • AGD_OPE.1: 1
  • AGD_PRE.1: 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_TAT.1: 1
  • ALC_FLR.1: 5
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
pdf_data/st_keywords/cc_sar/AVA
  • AVA_MSU.3: 5
  • AVA_VLA.4: 6
  • AVA_VAN.2: 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL4: 11
  • EAL5+: 1
  • EAL4 augmented: 2
  • EAL2: 4
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_RND: 9
    • FCS_RND.1: 13
    • FCS_RND.1.1: 4
    • FCS_CKM.1: 24
    • FCS_CKM: 7
    • FCS_CKM.2: 2
    • FCS_COP.1: 27
    • FCS_CKM.4: 26
    • FCS_CKM.4.1: 3
    • FCS_COP: 45
  • FDP:
    • FDP_ACC.2: 14
    • FDP_ACC.2.1: 4
    • FDP_ACC.2.2: 5
    • FDP_ACF: 1
    • FDP_ITC.1: 16
    • FDP_ITC.2: 15
    • FDP_ACF.1: 13
    • FDP_UCT.1: 11
    • FDP_ACC.1: 7
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_RIP.1: 11
    • FDP_RIP: 14
    • FDP_RIP.1.1: 2
    • FDP_SDI.2: 5
    • FDP_SDI.1: 2
    • FDP_SDI.2.1: 3
    • FDP_SDI.2.2: 3
    • FDP_UIT.1: 6
    • FDP_UCT.1.1: 3
    • FDP_IFC.1: 4
    • FDP_UIT.1.1: 3
    • FDP_UIT.1.2: 3
  • FIA:
    • FIA_UAU.4: 8
    • FIA_AFL.1: 25
    • FIA_AFL: 42
    • FIA_UAU.1: 14
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 3
    • FIA_UID.1: 8
    • FIA_UID.1.1: 3
    • FIA_UID.1.2: 3
    • FIA_UAU.1.1: 3
    • FIA_UAU.1.2: 3
    • FIA_UAU.4.1: 3
  • FMT:
    • FMT_LIM: 5
    • FMT_LIM.1: 20
    • FMT_LIM.2: 19
    • FMT_LIM.1.1: 4
    • FMT_MSA.2: 19
    • FMT_MTD.1: 19
    • FMT_MSA.3: 2
    • FMT_SMF.1: 19
    • FMT_SMR.1: 19
    • FMT_SMF.1.1: 3
    • FMT_SMR.1.1: 3
    • FMT_SMR.1.2: 3
    • FMT_LIM.2.1: 3
    • FMT_MTD: 27
    • FMT_MSA.1: 1
  • FPT:
    • FPT_FLS.1: 9
    • FPT_TST.1: 11
    • FPT_PHP.3: 9
    • FPT_RVM.1: 10
    • FPT_SEP.1: 10
    • FPT_FLS.1.1: 3
    • FPT_PHP.3.1: 3
    • FPT_TST.1.1: 3
    • FPT_TST.1.2: 3
    • FPT_TST.1.3: 3
    • FPT_AMT.1: 2
    • FPT_RVM.1.1: 3
    • FPT_SEP.1.1: 3
    • FPT_SEP.1.2: 3
  • FTP:
    • FTP_ITC.1: 14
    • FTP_TRP.1: 4
    • FTP_ITC.1.1: 3
    • FTP_ITC.1.2: 3
    • FTP_ITC.1.3: 3
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_RNG.1: 15
    • FCS_CKM.1: 9
    • FCS_CKM.4: 9
    • FCS_COP.1: 9
    • FCS_RNG: 2
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 3
    • FCS_CKM.1.1: 1
    • FCS_CKM.4.1: 1
    • FCS_COP.1.1: 1
    • FCS_CKM.2: 1
  • FDP:
    • FDP_ACC.1: 14
    • FDP_ACF.1: 13
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_IFC.1: 1
  • FIA:
    • FIA_UAU.1: 7
    • FIA_UAU.6: 8
    • FIA_SOS.1: 8
    • FIA_UAU.2: 9
    • FIA_UID.2: 10
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.6.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.2.1: 1
    • FIA_UID.2.1: 1
    • FIA_UID.1: 2
  • FMT:
    • FMT_MSA.1: 8
    • FMT_MTD: 12
    • FMT_SMF: 20
    • FMT_SMR.1: 12
    • FMT_SMF.1: 6
    • FMT_MTD.1: 3
    • FMT_MSA.1.1: 1
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 2
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA.3: 1
  • FPT:
    • FPT_FLS.1: 9
    • FPT_RCV.4: 8
    • FPT_PHP.1: 8
    • FPT_RCV.4.1: 2
    • FPT_FLS.1.1: 1
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RND: 9
  • FCS_RND.1: 13
  • FCS_RND.1.1: 4
  • FCS_CKM.1: 24
  • FCS_CKM: 7
  • FCS_CKM.2: 2
  • FCS_COP.1: 27
  • FCS_CKM.4: 26
  • FCS_CKM.4.1: 3
  • FCS_COP: 45
  • FCS_RNG.1: 15
  • FCS_CKM.1: 9
  • FCS_CKM.4: 9
  • FCS_COP.1: 9
  • FCS_RNG: 2
  • FCS_RNG.1.1: 3
  • FCS_RNG.1.2: 3
  • FCS_CKM.1.1: 1
  • FCS_CKM.4.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM.2: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 24 9
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 2 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 26 9
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 3 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 27 9
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.2: 14
  • FDP_ACC.2.1: 4
  • FDP_ACC.2.2: 5
  • FDP_ACF: 1
  • FDP_ITC.1: 16
  • FDP_ITC.2: 15
  • FDP_ACF.1: 13
  • FDP_UCT.1: 11
  • FDP_ACC.1: 7
  • FDP_ACF.1.1: 3
  • FDP_ACF.1.2: 3
  • FDP_ACF.1.3: 3
  • FDP_ACF.1.4: 3
  • FDP_RIP.1: 11
  • FDP_RIP: 14
  • FDP_RIP.1.1: 2
  • FDP_SDI.2: 5
  • FDP_SDI.1: 2
  • FDP_SDI.2.1: 3
  • FDP_SDI.2.2: 3
  • FDP_UIT.1: 6
  • FDP_UCT.1.1: 3
  • FDP_IFC.1: 4
  • FDP_UIT.1.1: 3
  • FDP_UIT.1.2: 3
  • FDP_ACC.1: 14
  • FDP_ACF.1: 13
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 2
  • FDP_ITC.2: 2
  • FDP_IFC.1: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 7 14
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 3 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 3 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 3 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 3 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 4 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 16 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 15 2
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_UAU.4: 8
  • FIA_AFL.1: 25
  • FIA_AFL: 42
  • FIA_UAU.1: 14
  • FIA_ATD.1: 7
  • FIA_ATD.1.1: 3
  • FIA_UID.1: 8
  • FIA_UID.1.1: 3
  • FIA_UID.1.2: 3
  • FIA_UAU.1.1: 3
  • FIA_UAU.1.2: 3
  • FIA_UAU.4.1: 3
  • FIA_UAU.1: 7
  • FIA_UAU.6: 8
  • FIA_SOS.1: 8
  • FIA_UAU.2: 9
  • FIA_UID.2: 10
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.6.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.2.1: 1
  • FIA_UID.2.1: 1
  • FIA_UID.1: 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 14 7
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 3 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 3 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 8 2
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM: 5
  • FMT_LIM.1: 20
  • FMT_LIM.2: 19
  • FMT_LIM.1.1: 4
  • FMT_MSA.2: 19
  • FMT_MTD.1: 19
  • FMT_MSA.3: 2
  • FMT_SMF.1: 19
  • FMT_SMR.1: 19
  • FMT_SMF.1.1: 3
  • FMT_SMR.1.1: 3
  • FMT_SMR.1.2: 3
  • FMT_LIM.2.1: 3
  • FMT_MTD: 27
  • FMT_MSA.1: 1
  • FMT_MSA.1: 8
  • FMT_MTD: 12
  • FMT_SMF: 20
  • FMT_SMR.1: 12
  • FMT_SMF.1: 6
  • FMT_MTD.1: 3
  • FMT_MSA.1.1: 1
  • FMT_MTD.1.1: 2
  • FMT_SMF.1.1: 2
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA.3: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 1 8
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 27 12
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 19 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 19 6
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 3 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 19 12
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 3 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 3 1
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FLS.1: 9
  • FPT_TST.1: 11
  • FPT_PHP.3: 9
  • FPT_RVM.1: 10
  • FPT_SEP.1: 10
  • FPT_FLS.1.1: 3
  • FPT_PHP.3.1: 3
  • FPT_TST.1.1: 3
  • FPT_TST.1.2: 3
  • FPT_TST.1.3: 3
  • FPT_AMT.1: 2
  • FPT_RVM.1.1: 3
  • FPT_SEP.1.1: 3
  • FPT_SEP.1.2: 3
  • FPT_FLS.1: 9
  • FPT_RCV.4: 8
  • FPT_PHP.1: 8
  • FPT_RCV.4.1: 2
  • FPT_FLS.1.1: 1
  • FPT_PHP.1.1: 1
  • FPT_PHP.1.2: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1.1 3 1
pdf_data/st_keywords/certification_process/OutOfScope
  • out of scope: 1
  • FDP_ACF.1 Note by the ST-author 31: Keys and other data for creation of qualified signatures are out of scope of this Security Target. The TOE shall meet the requirement “Security attribute based access: 1
  • Out of scope: 2
  • 11 1.5.4.3 Out of scope : 1
  • 11 1.5.4.3 Out of scope ........................................................................................... 12 1.5: 1
  • from the KRMC to the device. Commands are queued at the KRMC until polled form the device. 1.5.4.3 Out of scope The TOE supports additional features that are not part of the scope: ● Antivirus solution ●: 1
pdf_data/st_keywords/cipher_mode/CBC/CBC 3 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 21
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 40
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 9
    • SHA2:
      • SHA-224: 1
      • SHA-2: 8
  • RIPEMD:
    • RIPEMD-160: 5
  • SHA:
    • SHA2:
      • SHA-256: 1
pdf_data/st_keywords/hash_function/SHA
  • SHA1:
    • SHA-1: 9
  • SHA2:
    • SHA-224: 1
    • SHA-2: 8
  • SHA2:
    • SHA-256: 1
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-224: 1
  • SHA-2: 8
  • SHA-256: 1
pdf_data/st_keywords/os_name
  • STARCOS:
    • STARCOS 3: 7
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 14
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • physical probing: 5
    • side channels: 2
    • side channel: 1
    • DPA: 1
  • FI:
    • Physical Tampering: 2
    • physical tampering: 7
    • Physical tampering: 1
    • Malfunction: 3
    • malfunction: 4
    • fault injection: 1
  • other:
    • reverse engineering: 1
    • Bleichenbacher attack: 1
  • FI:
    • physical tampering: 3
pdf_data/st_keywords/side_channel_analysis/FI
  • Physical Tampering: 2
  • physical tampering: 7
  • Physical tampering: 1
  • Malfunction: 3
  • malfunction: 4
  • fault injection: 1
  • physical tampering: 3
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering 7 3
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 180-2: 3
    • FIPS 46-3: 2
    • FIPS PUB 46-3: 2
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 8
  • BSI:
    • AIS20: 2
    • AIS31: 2
    • AIS 20: 1
  • ISO:
    • ISO/IEC9796-2: 5
    • ISO/IEC 9796-1: 1
    • ISO/IEC 7816-4: 1
  • X509:
    • X.509: 8
    • x.509: 2
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCIMB-2005-08-001: 1
    • CCIMB-2005-08-002: 1
    • CCIMB-2005-08-003: 1
    • CCIMB-2005-08-004: 1
  • BSI:
    • AIS 20: 1
    • AIS 31: 1
pdf_data/st_keywords/standard_id/BSI
  • AIS20: 2
  • AIS31: 2
  • AIS 20: 1
  • AIS 20: 1
  • AIS 31: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • HPC:
      • HPC: 17
  • DES:
    • DES:
      • DES: 5
    • 3DES:
      • Triple-DES: 11
      • TDES: 5
      • 3-DES: 2
  • AES_competition:
    • AES:
      • AES: 3
pdf_data/st_keywords/symmetric_crypto/AES_competition
  • HPC:
    • HPC: 17
  • AES:
    • AES: 3
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 9
    • Infineon Technologies AG: 1
  • GD:
    • Giesecke & Devrient: 11
pdf_data/st_metadata
  • pdf_file_size_bytes: 374430
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 114
  • /CreationDate: D:20071120144357+01'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /ModDate: D:20080303164809+01'00'
  • /Title: Security Target Lite STARCOS 3.2 eGK V1.0
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 704587
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 41
  • /Keywords: Security Target, Common Criteria, USB Storage, Encryption, Protected Storage
  • /Subject:
  • /Title: Kanguru Defender Security Target (version 1.10 as of 2014-10-06)
  • /Creator: Unknown
  • /Author: Andreas Siegert (generated by CCTool version 2.8)
  • /Producer: XEP 4.23
  • /application: CCTool version x.y
  • /Trapped: /False
  • /CreationDate: D:20141006150157Z
  • /ModDate: D:20141006150157Z
  • pdf_hyperlinks: http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf
pdf_data/st_metadata//CreationDate D:20071120144357+01'00' D:20141006150157Z
pdf_data/st_metadata//Creator PScript5.dll Version 5.2.2 Unknown
pdf_data/st_metadata//ModDate D:20080303164809+01'00' D:20141006150157Z
pdf_data/st_metadata//Producer Acrobat Distiller 7.0 (Windows) XEP 4.23
pdf_data/st_metadata//Title Security Target Lite STARCOS 3.2 eGK V1.0 Kanguru Defender Security Target (version 1.10 as of 2014-10-06)
pdf_data/st_metadata/pdf_file_size_bytes 374430 704587
pdf_data/st_metadata/pdf_hyperlinks http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf
pdf_data/st_metadata/pdf_number_of_pages 114 41
dgst 1d84f97a0f8761d5 eda06ca3c208ebd0