name |
secunet SBC Container Version 5.2 |
Health Insurance Card G2 1.0.0 |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
DE |
DE |
status |
active |
archived |
not_valid_after |
25.06.2029 |
28.10.2021 |
not_valid_before |
26.06.2024 |
28.10.2016 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1089V3c_pdf.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1089V3a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0956a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1089V3b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0956b_pdf.pdf |
manufacturer |
Secunet Security Networks AG |
Gemalto |
manufacturer_web |
https://www.secunet.com/en/ |
https://www.gemalto.com/ |
security_level |
ASE_TSS.2, ALC_FLR.2, AVA_VAN.5, EAL4+ |
EAL4+, ATE_DPT.2, ALC_DVS.2, AVA_VAN.5 |
dgst |
1fbbc802399645af |
67f165ca2951a094 |
heuristics/cert_id |
BSI-DSZ-CC-1089-V3-2024 |
BSI-DSZ-CC-0956-2016 |
heuristics/cert_lab |
BSI |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ALC_FLR.2, ASE_TSS.2, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, AVA_VAN.5, ADV_COMP.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ASE_REQ.2, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 |
heuristics/extracted_versions |
5.2 |
1.0.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1089-V2-2022 |
BSI-DSZ-CC-0782-V2-2015 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-1089-V2-2022, BSI-DSZ-CC-1089-2020 |
BSI-DSZ-CC-0782-V2-2015, BSI-DSZ-CC-0782-2012 |
heuristics/scheme_data |
- category: Network and Network related Devices and Systems
- cert_id: BSI-DSZ-CC-1089-V3-2024
- certification_date: 26.06.2024
- enhanced:
- applicant: secunet Security Networks AG Weidenauer Straße 223-225 57076 Siegen
- assurance_level: EAL4+,AVA_VAN.5,ASE_TSS.2,ALC_FLR.2
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1089V3c_pdf.pdf?__blob=publicationFile&v=2
- certification_date: 26.06.2024
- description: The secunet SBC Container is a Session Border Controller Container, a Linux systemd-nspawn container which can be deployed on a Linux operating system. The main purpose of the secunet SBC Container is a secure bridging between an SIP caller and the SIP callee. Concretely, the SBC supports a safeguarded initiation of SIP sessions (also called signaling) and bridging of media communication streams such as RTP or SRTP. A Session Border Controller (SBC) is a device which is deployed in Voice-over-IP (VoIP) networks to manage the signaling and media streams of audio and video communication. The used hardware is under full control of the operating system. However, the connected networks have to be separated physically, especially the management network, to allow the secunet SBC to perform the intended operation in a secure manner.
- entries: [frozendict({'id': 'BSI-DSZ-CC-1089-V3-2024 (26.06.2024)', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-1089-V2-2022 (19.05.2022)', 'description': ') networks to manage the signaling and media streams of audio and video communication. The used hardware is under full control of the operating system. However, the connected networks have to be separated physically, especially the management network, to allow the secunet SBC to perform the in-tended operation in a secure manner.'}), frozendict({'id': 'BSI-DSZ-CC-1089-2020 (08.07.2020)', 'description': 'Certificate'})]
- evaluation_facility: SRC Security Research & Consulting GmbH
- expiration_date: 25.06.2029
- product: secunet SBC Container Version 5.2
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1089V3a_pdf.pdf?__blob=publicationFile&v=2
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1089V3b_pdf.pdf?__blob=publicationFile&v=2
- product: secunet SBC Container Version 5.2
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Netzwerk_und_Kommunikationsprodukte/1089.html
- vendor: secunet Security Networks AG
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0782-V2-2015 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0782-V2-2015 |
heuristics/protection_profiles |
{} |
ecc28509c30de1a5 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0082V2b_pdf.pdf |
pdf_data/cert_filename |
1089V3c_pdf.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1089-V3-2024: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 2
- EAL 4 augmented: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, secunet SBC Container, Version 5.2"
- /Subject: Common Criteria, Certification, Zertifizierung, secunet SBC Container, Version 5.2
- /Title: Certificate BSI-DSZ-CC-1089-V3-2024
- pdf_file_size_bytes: 230700
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
1089V3a_pdf.pdf |
0956a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ASE_TSS.2, ALC_FLR.2 and AVA_VAN.5 valid until: 25 Month 2029 SOGIS Recognition Agreement for components up to EAL 4
- cc_version: Product specific Security Target Common Criteria Part 2 conformant
- cert_id: BSI-DSZ-CC-1089-V3-2024
- cert_item: secunet SBC Container, Version 5.2
- cert_lab: BSI
- developer: secunet Security Networks AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: None
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by AVA_VAN.5, ATE_DPT.2 and ALC_DVS.2
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0956-2016
- cert_item: Health Insurance Card G2 1.0.0
- cert_lab: BSI
- developer: Gemalto GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Card Operating System Generation 2 (PP COS G2), Version 1.9, 18 November 2014, BSI-CC-PP-0082-V2-2014
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1089-V2-2022: 2
- BSI-DSZ-CC-1089-V3-2024: 13
|
- DE:
- BSI-DSZ-CC-0782-V2-2015: 7
- BSI-DSZ-CC-0956-2016: 31
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0082-V2-2014: 4
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 8
- EAL 4 augmented: 3
- EAL 5: 2
- EAL 5+: 1
- EAL 6: 1
|
- EAL:
- EAL 1: 7
- EAL 2: 4
- EAL 3: 4
- EAL 4: 13
- EAL 4 augmented: 3
- EAL 5: 10
- EAL 5+: 1
- EAL 6: 4
- EAL 7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 3
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 6
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
pdf_data/report_keywords/cc_sfr |
|
- FCS:
- FCS_CKM.1: 2
- FCS_COP.1: 30
- FCS_RNG.1: 1
- FMT:
- FPT:
- FPT_ITE.1: 1
- FPT_ITE.2: 2
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon: 11
- Infineon Technologies AG: 6
|
pdf_data/report_keywords/eval_facility |
- SRC:
- SRC Security Research & Consulting: 3
|
- TUV:
- TÜV Informationstechnik: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-256: 11
- SHA-512: 1
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 5
- brainpoolP384r1: 5
- brainpoolP512r1: 5
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- SCA:
- DPA: 1
- Template attacks: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 30: 1
- BSI 7148: 1
- BSI TR-03116-1: 1
- BSI TR-03143: 4
- BSI TR-03144: 9
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 32: 1
- AIS 34: 2
- AIS 38: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 20: 2
- AIS 23: 1
- AIS 25: 2
- AIS 26: 3
- AIS 31: 3
- AIS 32: 1
- AIS 34: 2
- AIS 35: 1
- AIS 36: 4
- AIS 38: 1
- FIPS:
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- FIPS PUB 197: 1
- FIPS PUB 46-3: 1
- ISO:
- ISO/IEC 10116: 2
- ISO/IEC 10116:2006: 1
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- ISO/IEC 9797: 2
- NIST:
- PKCS:
- RFC:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Version 1.4, 25.04.2024, file name: SBC_TAT_CMS, Frafos GmbH (confidential document) [9] Secunet SBC container – User Guidance, Frafos GmbH, 28.05.2024, v3.6, file name: SBC – AGD v3: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- secunet SBC Container, Version 2.1, Date 31.05.2024, SRC Security Research & Consulting GmbH (confidential document) [8] Configuration list for the TOE as part of Tools and Techniques / Configuration, secunet SBC: 1
|
- ConfidentialDocument:
- 1.7, 28.09.2016, Gemalto GmbH (confidential document) [11] Guidance Documentation Health Insurance Card G2 1.0.0 - Specification for Chip card: 1
- Security Target Health Insurance Card G2 1.0.0, Version 1.13, 23.09.2016, Gemalto SA (confidential document) [7] Security Target Lite BSI-DSZ-CC-0956-2016, Security Target Lite Health Insurance Card G2 1.0.0: 1
- Summary for Health Insurance Card G2 1.0.0, Version 5.0, 29.09.2016, TÜV Informationstechnik GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-0956-2016, Configuration List Health Insurance Card G2 1.0.0: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- procedure BSI-DSZ-CC-0782-V2-2015, Version 7, 21 October 2015, TÜV Informationstechnik GmbH (confidential document) [20] Einführung der Gesundheitskarte, Spezifikation des Card Operating System (COS), Elektrische: 1
|
pdf_data/report_metadata |
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, secunet SBC Container, Version 5.2"
- /Subject: Common Criteria, Certification, Zertifizierung, secunet SBC Container, Version 5.2
- /Title: Certification Report BSI-DSZ-CC-1089-V3-2024
- pdf_file_size_bytes: 348771
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20161109130214+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, eHC G2, PP-0082, Gemalto"
- /ModDate: D:20161109152306+01'00'
- /Producer: LibreOffice 4.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0956-2016
- pdf_file_size_bytes: 1416001
- pdf_hyperlinks: https://www.bsi.bund.de/AIS, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 52
|
pdf_data/st_filename |
1089V3b_pdf.pdf |
0956b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0782-V2-2015: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0035-2007: 2
- BSI-CC-PP- 0035-2007and: 1
- BSI-CC-PP-0035-: 3
- BSI-CC-PP-0035-2007: 15
- BSI-CC-PP-0082-V2: 1
- BSI-PP- 0035: 1
- BSI-PP-0035: 2
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 11
- EAL4 augmented: 1
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 6: 1
- EAL 6 augmented: 1
- EAL4: 13
- EAL4 augmented: 3
- EAL5+: 1
- EAL6: 1
- EAL6 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 2
- ADV_IMP.1: 2
- ADV_TDS: 1
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 7
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.2: 6
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 2
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 8
- ADV_COMP.1: 1
- ADV_FSP: 2
- ADV_FSP.4: 5
- ADV_IMP: 2
- ADV_IMP.1: 5
- ADV_TDS.3: 3
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 5
- AGD_PRE: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC: 2
- ALC_CMC.4: 1
- ALC_CMS: 2
- ALC_CMS.4: 1
- ALC_DEL: 2
- ALC_DEL.1: 1
- ALC_DVS: 2
- ALC_DVS.2: 13
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 7
- ATE_FUN.1: 5
- ATE_IND.2: 4
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 1
- FDP_IFC.1: 12
- FDP_IFC.1.1: 1
- FDP_IFF.1: 7
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_SOS.1: 4
- FIA_SOS.1.1: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 10
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 7
- FMT_MSA.1.1: 1
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF: 13
- FMT_SMF.1: 7
- FMT_SMR: 1
- FMT_SMR.1: 16
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 2
- FPT_TDC.1: 7
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FTA:
- FTA_SSL.3: 7
- FTA_SSL.3.1: 1
|
- FAU:
- FCS:
- FCS_CKM: 52
- FCS_CKM.1: 30
- FCS_CKM.2: 9
- FCS_CKM.4: 53
- FCS_CKM.4.1: 2
- FCS_COP: 113
- FCS_COP.1: 26
- FCS_COP.1.1: 1
- FCS_RNG: 12
- FCS_RNG.1: 16
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 73
- FDP_ACC.1: 34
- FDP_ACF: 52
- FDP_ACF.1: 41
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_IFC: 8
- FDP_IFC.1: 18
- FDP_IFF.1: 4
- FDP_ITC: 11
- FDP_ITC.1: 29
- FDP_ITC.2: 26
- FDP_ITT: 6
- FDP_ITT.1: 4
- FDP_RIP.1: 8
- FDP_RIP.1.1: 2
- FDP_SDI: 23
- FDP_SDI.1: 3
- FDP_SDI.2: 6
- FIA:
- FIA_AFL: 14
- FIA_AFL.1: 9
- FIA_API: 6
- FIA_API.1: 14
- FIA_API.1.1: 3
- FIA_ATD.1: 9
- FIA_ATD.1.1: 4
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 14
- FIA_UAU.1.1: 3
- FIA_UAU.1.2: 1
- FIA_UAU.4: 6
- FIA_UAU.4.1: 4
- FIA_UAU.5: 7
- FIA_UAU.5.1: 7
- FIA_UAU.5.2: 4
- FIA_UAU.6: 8
- FIA_UAU.6.1: 1
- FIA_UID.1: 13
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 6
- FIA_USB.1.2: 2
- FIA_USB.1.3: 8
- FMT:
- FMT_LIM: 16
- FMT_LIM.1: 6
- FMT_LIM.2: 7
- FMT_MSA: 35
- FMT_MSA.1: 8
- FMT_MSA.3: 31
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 41
- FMT_MTD.1: 11
- FMT_SMF.1: 35
- FMT_SMF.1.1: 4
- FMT_SMR.1: 40
- FMT_SMR.1.1: 6
- FMT_SMR.1.2: 6
- FPT:
- FPT_EMS: 5
- FPT_EMS.1: 11
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS: 8
- FPT_FLS.1: 27
- FPT_FLS.1.1: 3
- FPT_ITE: 6
- FPT_ITE.1: 14
- FPT_ITE.1.1: 2
- FPT_ITE.1.2: 2
- FPT_ITE.2: 14
- FPT_ITE.2.1: 4
- FPT_ITE.2.2: 2
- FPT_ITT: 8
- FPT_ITT.1: 3
- FPT_PHP: 6
- FPT_PHP.3: 5
- FPT_TDC.1: 10
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 1
- FPT_TST.1: 11
- FPT_TST.1.1: 9
- FPT_TST.1.2: 3
- FPT_TST.1.3: 3
- FPT_TST.2: 1
- FRU:
- FRU_FLT: 7
- FRU_FLT.1: 1
- FRU_FLT.2: 4
- FTP:
- FTP_ITC: 7
- FTP_ITC.1: 3
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
- Gemalto:
- Gemalto: 6
- Gemalto N.V: 2
- Infineon:
|
pdf_data/st_keywords/eval_facility |
|
- TUV:
- TUV Informationstechnik: 1
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 4
- SHA-256: 17
- SHA-384: 7
- SHA-512: 9
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 4
- brainpoolP384r1: 4
- brainpoolP512r1: 4
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Malfunction: 16
- malfunction: 3
- physical tampering: 2
- SCA:
- DPA: 2
- Leak-Inherent: 14
- Physical Probing: 2
- SPA: 2
- physical probing: 3
- side channel: 1
- timing attacks: 1
- other:
- Bleichenbacher attack: 1
- JIL: 1
|
pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI TR-03116: 1
- BSI TR-03143: 1
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
|
- BSI:
- AIS 34: 2
- AIS 36: 2
- AIS31: 2
- CC:
- FIPS:
- FIPS 180-3: 1
- FIPS 180-4: 2
- FIPS 197: 3
- FIPS 46-3: 1
- FIPS PUB 180-3: 1
- FIPS PUB 197: 1
- FIPS PUB 46-3: 2
- ISO:
- ISO/IEC 7816-4: 1
- ISO/IEC 9796-2: 2
- NIST:
- NIST SP 800-38B: 1
- NIST SP 800-67: 1
- PKCS:
- PKCS #1: 2
- PKCS#1: 4
- PKCS1: 1
- RFC:
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- public ELC key object (and with it to its associated CHAT). (iv) If an authentication state gets out of scope by changing the currently selected path or by resetting the SE, it is deleted (FIA_USB.1.3): 8.12: 1
|
pdf_data/st_metadata |
- /Author: SRC
- pdf_file_size_bytes: 914085
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 43
|
- /Author: Gemalto
- /CreationDate: D:20161021131410+02'00'
- /Creator: Microsoft® Word 2013
- /Keywords: German healthcare G2, COS G2, patient card G2, eGK G2
- /ModDate: D:20161021131410+02'00'
- /Producer: Microsoft® Word 2013
- /Subject: Health Insurance Card G2
- /Title: Security Target Lite Health Insurance Card G2
- pdf_file_size_bytes: 2139714
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 167
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |