name |
secunet SBC Container Version 5.2 |
TCOS Tachograph Card Version 1.0 |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
DE |
DE |
status |
active |
archived |
not_valid_after |
25.06.2029 |
01.09.2019 |
not_valid_before |
26.06.2024 |
01.05.2004 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1089V3c_pdf.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1089V3a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0242a.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1089V3b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0242b.pdf |
manufacturer |
Secunet Security Networks AG |
T-Systems Enterprise Services GmbH |
manufacturer_web |
https://www.secunet.com/en/ |
https://www.t-systems.de/ |
security_level |
ASE_TSS.2, ALC_FLR.2, AVA_VAN.5, EAL4+ |
ADV_IMP.2, ADO_IGS.2, ATE_DPT.2, AVA_VLA.4, AVA_MSU.3, EAL4+, ALC_DVS.2 |
dgst |
1fbbc802399645af |
7e8dccf301a9b3fc |
heuristics/cert_id |
BSI-DSZ-CC-1089-V3-2024 |
BSI-DSZ-CC-0242-2004 |
heuristics/cert_lab |
BSI |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ALC_FLR.2, ASE_TSS.2, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
ASE_ENV.1, ADV_RCR.1, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ALC_DVS.2, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, ADV_FSP.2, AVA_SOF.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ATE_DPT.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ADV_IMP.2, AVA_VLA.4, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1, AVA_MSU.3 |
heuristics/extracted_versions |
5.2 |
1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1089-V2-2022 |
BSI-DSZ-CC-0223-2003 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-1089-V2-2022, BSI-DSZ-CC-1089-2020 |
BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0223-2003 |
heuristics/scheme_data |
- category: Network and Network related Devices and Systems
- cert_id: BSI-DSZ-CC-1089-V3-2024
- certification_date: 26.06.2024
- enhanced:
- applicant: secunet Security Networks AG Weidenauer Straße 223-225 57076 Siegen
- assurance_level: EAL4+,AVA_VAN.5,ASE_TSS.2,ALC_FLR.2
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1089V3c_pdf.pdf?__blob=publicationFile&v=2
- certification_date: 26.06.2024
- description: The secunet SBC Container is a Session Border Controller Container, a Linux systemd-nspawn container which can be deployed on a Linux operating system. The main purpose of the secunet SBC Container is a secure bridging between an SIP caller and the SIP callee. Concretely, the SBC supports a safeguarded initiation of SIP sessions (also called signaling) and bridging of media communication streams such as RTP or SRTP. A Session Border Controller (SBC) is a device which is deployed in Voice-over-IP (VoIP) networks to manage the signaling and media streams of audio and video communication. The used hardware is under full control of the operating system. However, the connected networks have to be separated physically, especially the management network, to allow the secunet SBC to perform the intended operation in a secure manner.
- entries: [frozendict({'id': 'BSI-DSZ-CC-1089-V3-2024 (26.06.2024)', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-1089-V2-2022 (19.05.2022)', 'description': ') networks to manage the signaling and media streams of audio and video communication. The used hardware is under full control of the operating system. However, the connected networks have to be separated physically, especially the management network, to allow the secunet SBC to perform the in-tended operation in a secure manner.'}), frozendict({'id': 'BSI-DSZ-CC-1089-2020 (08.07.2020)', 'description': 'Certificate'})]
- evaluation_facility: SRC Security Research & Consulting GmbH
- expiration_date: 25.06.2029
- product: secunet SBC Container Version 5.2
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1089V3a_pdf.pdf?__blob=publicationFile&v=2
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1089V3b_pdf.pdf?__blob=publicationFile&v=2
- product: secunet SBC Container Version 5.2
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Netzwerk_und_Kommunikationsprodukte/1089.html
- vendor: secunet Security Networks AG
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
1089V3c_pdf.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1089-V3-2024: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 2
- EAL 4 augmented: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, secunet SBC Container, Version 5.2"
- /Subject: Common Criteria, Certification, Zertifizierung, secunet SBC Container, Version 5.2
- /Title: Certificate BSI-DSZ-CC-1089-V3-2024
- pdf_file_size_bytes: 230700
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
1089V3a_pdf.pdf |
0242a.pdf |
pdf_data/report_frontpage |
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ASE_TSS.2, ALC_FLR.2 and AVA_VAN.5 valid until: 25 Month 2029 SOGIS Recognition Agreement for components up to EAL 4
- cc_version: Product specific Security Target Common Criteria Part 2 conformant
- cert_id: BSI-DSZ-CC-1089-V3-2024
- cert_item: secunet SBC Container, Version 5.2
- cert_lab: BSI
- developer: secunet Security Networks AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: None
|
- DE:
- cert_id: BSI-DSZ-CC-0242-2004
- cert_item: TCOS Tachograph Card Version 1.0
- cert_lab: BSI
- developer: T-Systems International GmbH Service Line SI, T-Telesec
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1089-V2-2022: 2
- BSI-DSZ-CC-1089-V3-2024: 13
|
- DE:
- BSI-DSZ-CC-0223-: 1
- BSI-DSZ-CC-0223-2003: 3
- BSI-DSZ-CC-0242-2004: 25
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002: 1
- BSI-PP-0002-: 1
- BSI-PP-0002-2001: 2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 8
- EAL 4 augmented: 3
- EAL 5: 2
- EAL 5+: 1
- EAL 6: 1
|
- EAL:
- EAL 1: 1
- EAL 4: 1
- EAL 5: 1
- EAL 5 augmented: 1
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 13
- EAL4 augmented: 3
- EAL4+: 2
- EAL5: 6
- EAL6: 3
- EAL7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 2
- ACM_CAP: 2
- ACM_CAP.4: 2
- ACM_SCP: 2
- ACM_SCP.2: 2
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 2
- ADO_IGS: 2
- ADO_IGS.2: 6
- ADV:
- ADV_FSP: 2
- ADV_FSP.2: 1
- ADV_HLD: 2
- ADV_HLD.2: 1
- ADV_IMP: 2
- ADV_IMP.2: 5
- ADV_INT: 2
- ADV_LLD: 2
- ADV_LLD.1: 1
- ADV_RCR: 2
- ADV_RCR.1: 1
- ADV_SPM: 2
- ADV_SPM.1: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 1
- AGD_USR: 2
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 6
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 2
- ALC_TAT: 2
- ALC_TAT.1: 2
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT: 2
- ATE_DPT.2: 5
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_IND: 2
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 4
- AVA_SOF.1: 1
- AVA_VLA: 4
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_SAA.1: 1
- FAU_SAS.1: 1
- FCO:
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.2: 1
- FCS_CKM.3: 1
- FCS_CKM.4: 1
- FCS_COP.1: 2
- FCS_RND.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_ACC.2: 1
- FDP_ACF.1: 2
- FDP_DAU.1: 1
- FDP_ETC.1: 1
- FDP_ETC.2: 1
- FDP_IFC.1: 1
- FDP_ITC.1: 1
- FDP_ITT.1: 1
- FDP_RIP.1: 1
- FDP_SDI.2: 1
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 1
- FIA_ATD.1: 1
- FIA_UAU.1: 1
- FIA_UAU.3: 1
- FIA_UAU.4: 1
- FIA_UID.1: 1
- FIA_USB.1: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MOF.1: 1
- FMT_MSA.1: 2
- FMT_MSA.2: 1
- FMT_MSA.3: 2
- FMT_MTD.1: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPR:
- FPT:
- FPT_FLS.1: 2
- FPT_ITT.1: 1
- FPT_PHP.3: 2
- FPT_SEP.1: 2
- FPT_TDC.1: 1
- FPT_TST.1: 1
- FPT_TST.2: 1
- FRU:
- FTP:
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.DLV_AUDIT: 1
- A.DLV_PROTECT: 1
- A.DLV_RESP: 1
- A.USE_DIAG: 1
- A.USE_PROD: 1
- A.USE_TEST: 1
- T:
- T.CLON: 1
- T.DIS_DEL: 1
- T.DIS_INFO: 1
- T.DIS_TEST_ES: 1
- T.MOD: 1
- T.MOD_EXE: 1
- T.MOD_LOAD: 1
- T.MOD_SHARE: 1
- T.MOD_SOFT: 1
- T.RND: 1
- T.T_CMD: 1
- T.T_DEL: 1
- T.T_ES: 1
- T.T_TOOLS: 1
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 7
- Infineon Technologies AG: 7
|
pdf_data/report_keywords/eval_facility |
- SRC:
- SRC Security Research & Consulting: 3
|
- TSystems:
- T-Systems International: 12
- TUV:
- TÜV Informationstechnik: 10
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- SCA:
- DPA: 3
- Leak-Inherent: 1
- Physical Probing: 1
- SPA: 3
- Side channel: 2
- Timing attacks: 2
- physical probing: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 32: 1
- AIS 34: 2
- AIS 38: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
- BSI:
- AIS 20: 3
- AIS 25: 2
- AIS 26: 3
- AIS 32: 1
- AIS 35: 1
- AIS 36: 5
- ISO:
- ISO/IEC 10373: 2
- ISO/IEC 15408:1999: 1
- ISO/IEC 7810: 2
- ISO/IEC 7816: 4
- ISO/IEC 7816-2: 1
- ISO/IEC 7816-3: 4
- ISO/IEC15408: 1999: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Version 1.4, 25.04.2024, file name: SBC_TAT_CMS, Frafos GmbH (confidential document) [9] Secunet SBC container – User Guidance, Frafos GmbH, 28.05.2024, v3.6, file name: SBC – AGD v3: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- secunet SBC Container, Version 2.1, Date 31.05.2024, SRC Security Research & Consulting GmbH (confidential document) [8] Configuration list for the TOE as part of Tools and Techniques / Configuration, secunet SBC: 1
|
- ConfidentialDocument:
- CC Evaluierung der TCOS Tachograph Karte, 07. May 2004, Version 2, TÜV Informationstechnik GmbH (confidential document) [12] Smart Card IC Platform Protection Profile, Version 1.0, July 2001, registered at the German: 1
|
pdf_data/report_metadata |
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, secunet SBC Container, Version 5.2"
- /Subject: Common Criteria, Certification, Zertifizierung, secunet SBC Container, Version 5.2
- /Title: Certification Report BSI-DSZ-CC-1089-V3-2024
- pdf_file_size_bytes: 348771
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20040518143908Z
- /Creator: Microsoft Word
- /Keywords: TCOS Tachograph Card Version 1.0, T-Systems International GmbH Service Line SI, T-Telesec, Common Criteria, Certification
- /ModDate: D:20081006072226+02'00'
- /Producer: Acrobat PDFWriter 4.0 für Windows NT
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0242-2004
- pdf_file_size_bytes: 210074
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 49
|
pdf_data/st_filename |
1089V3b_pdf.pdf |
0242b.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 11
- EAL4 augmented: 1
|
- EAL:
- EAL 4: 2
- EAL 4 augmented: 1
- EAL 5: 1
- EAL4: 12
- EAL4 augmented: 2
- EAL5+: 1
- ITSEC:
- ITSEC E3: 1
- ITSEC E3 high: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 2
- ADV_IMP.1: 2
- ADV_TDS: 1
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 7
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.2: 6
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 2
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_AUT.1: 9
- ACM_CAP.4: 17
- ACM_SCP: 1
- ACM_SCP.2: 4
- ADO:
- ADO_DEL: 1
- ADO_DEL.2: 10
- ADO_IGS: 3
- ADO_IGS.1: 3
- ADO_IGS.2: 9
- ADV:
- ADV_FSP: 2
- ADV_FSP.1: 2
- ADV_FSP.2: 8
- ADV_HLD: 2
- ADV_HLD.2: 13
- ADV_IMP: 2
- ADV_IMP.1: 2
- ADV_IMP.2: 11
- ADV_LLD: 2
- ADV_LLD.1: 16
- ADV_RCR: 2
- ADV_RCR.1: 3
- ADV_SPM: 1
- ADV_SPM.1: 8
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 14
- AGD_USR: 1
- AGD_USR.1: 10
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 10
- ALC_LCD: 1
- ALC_LCD.1: 6
- ALC_TAT: 1
- ALC_TAT.1: 9
- ATE:
- ATE_COV.2: 5
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 9
- ATE_FUN: 1
- ATE_FUN.1: 10
- ATE_IND.2: 4
- AVA:
- AVA_MSU: 1
- AVA_MSU.2: 3
- AVA_MSU.3: 16
- AVA_SOF: 1
- AVA_SOF.1: 4
- AVA_VLA: 1
- AVA_VLA.4: 15
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 1
- FDP_IFC.1: 12
- FDP_IFC.1.1: 1
- FDP_IFF.1: 7
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_SOS.1: 4
- FIA_SOS.1.1: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 10
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 7
- FMT_MSA.1.1: 1
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF: 13
- FMT_SMF.1: 7
- FMT_SMR: 1
- FMT_SMR.1: 16
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 2
- FPT_TDC.1: 7
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FTA:
- FTA_SSL.3: 7
- FTA_SSL.3.1: 1
|
- FAU:
- FAU_SAA.1: 5
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAS.1: 1
- FCO:
- FCO_NRO.1: 9
- FCO_NRO.1.1: 1
- FCO_NRO.1.2: 1
- FCO_NRO.1.3: 1
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 7
- FCS_CKM.2.1: 1
- FCS_CKM.3: 3
- FCS_CKM.3.1: 1
- FCS_CKM.4: 7
- FCS_CKM.4.1: 1
- FCS_CMK.2: 2
- FCS_COP: 1
- FCS_COP.1: 12
- FCS_COP.1.1: 1
- FCS_RND.1: 2
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 1
- FDP_ACC.2: 7
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 2
- FDP_ACF.1: 7
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DAU: 1
- FDP_DAU.1: 5
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_ETC: 1
- FDP_ETC.1: 4
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ETC.2: 9
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 2
- FDP_ITC: 1
- FDP_ITC.1: 5
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITT.1: 1
- FDP_RIP: 1
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FDP_SDI: 1
- FDP_SDI.2: 4
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_AFL: 9
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 1
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 5
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UAU.3: 4
- FIA_UAU.3.1: 1
- FIA_UAU.3.2: 1
- FIA_UAU.4: 3
- FIA_UAU.4.1: 2
- FIA_UID.1: 6
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 1
- FIA_USB.1: 4
- FIA_USB.1.1: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MOF: 1
- FMT_MOF.1: 4
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.2: 8
- FMT_MSA.2.1: 1
- FMT_MSA.3: 5
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 1
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 5
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 4
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO: 1
- FPR_UNO.1: 5
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 1
- FPT_FLS.1: 6
- FPT_FLS.1.1: 1
- FPT_ITC.1: 1
- FPT_ITT.1: 1
- FPT_PHP: 1
- FPT_PHP.3: 8
- FPT_PHP.3.1: 1
- FPT_SEP: 1
- FPT_SEP.1: 8
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TDC: 2
- FPT_TDC.1: 3
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 3
- FPT_TST.1.2: 3
- FPT_TST.1.3: 2
- FPT_TST.2: 1
- FRU:
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
pdf_data/st_keywords/cc_claims |
|
- O:
- O.DEV_DIS_ES: 1
- O.DLV_AUDIT: 1
- O.DLV_DATA: 1
- O.DLV_PROTECT: 1
- O.DLV_RESP: 1
- O.INIT_ACS: 1
- O.RND: 1
- O.TAMPER_ES: 1
- O.TEST_OPERATE: 1
- O.USE_DIAG: 1
- OT:
- OT.PERSONALIZATION: 1
- OT.TAMPER_ES: 10
- R:
- T:
- T.DIS_TEST_ES: 1
- T.MOD: 1
- T.MOD_EXE: 4
- T.MOD_LOAD: 4
- T.MOD_SHARE: 4
- T.RND: 1
- T.T_CMD: 4
- T.T_ES: 4
- T.T_TOOLS: 1
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 6
- Infineon Technologies: 1
- Infineon Technologies AG: 1
|
pdf_data/st_keywords/eval_facility |
|
- TSystems:
- T-Systems International: 69
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- SCA:
- Leak-Inherent: 2
- physical probing: 1
- side channel: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 1). The SOF claimed for SF4 is high. Note that import and destruction of the static keys are out of scope. 6.1.5 SF5: Access Control of stored data objects The TOE distinguishes the following subjects: S: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: SRC
- pdf_file_size_bytes: 914085
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 43
|
- /Author: Telesec
- /CreationDate: D:20040512142546Z
- /Creator:
- /Keywords: TCOS Tachograph Card, Security Target, Specification
- /ModDate: D:20081210175354+01'00'
- /Producer: Acrobat Distiller 4.05 for Windows
- /Subject: Security Target
- /Title: TCOS Tachograph Card
- pdf_file_size_bytes: 265744
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 69
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |