name |
Concepteers Teleconsole™ Version 2.0 |
TCOS eEnergy Security Module Version 2.0 Release 1/P71 |
category |
Access Control Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
CA |
DE |
status |
archived |
active |
not_valid_after |
15.05.2017 |
01.03.2034 |
not_valid_before |
18.07.2011 |
29.02.2024 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1217c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-177%20CR%20v1.1e.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1217a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Concepteers%20Teleconsole%20EAL3%20ST%20v1-2.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1217b_pdf.pdf |
manufacturer |
Concepteers LLC |
Deutsche Telekom Security GmbH |
manufacturer_web |
https://www.concepteers.com |
https://www.telekom.de/security |
security_level |
EAL3 |
ALC_DVS.2, EAL4+, ATE_DPT.2, AVA_VAN.5 |
dgst |
2ad25b4c7f906dcb |
8239b6c33b01617f |
heuristics/cert_id |
383-4-177 |
BSI-DSZ-CC-1217-2024 |
heuristics/cert_lab |
CANADA |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ALC_DVS.2, ALC_CMC.4, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ATE_DPT.2, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, ADV_FUN.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ADV_TDS.3, ASE_TSS.2, ADV_FSP.4 |
heuristics/extracted_versions |
2.0 |
2.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0831 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1149-V3-2023 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0831 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1149-V3-2023, BSI-DSZ-CC-1149-2022, BSI-DSZ-CC-1149-V2-2023 |
heuristics/scheme_data |
|
- category: Intelligent measuring systems
- cert_id: BSI-DSZ-CC-1217-2024
- certification_date: 29.02.2024
- enhanced:
- applicant: Deutsche Telekom Security GmbH Untere Industriestraße 20 57250 Netphen
- assurance_level: EAL4+,ALC_DVS.2,ATE_DPT.2,AVA_VAN.5
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1217c_pdf.pdf?__blob=publicationFile&v=2
- certification_date: 29.02.2024
- description: The Target of Evaluation (TOE) is the product TCOS eEnergy Security Module Version 2.0 Release 1/P71 developed by Deutsche Telekom Security GmbH. The TOE is a Smart Meter Security Module according to the Technical Guideline BSI TR-03109-2, Version 1.1 intended to be used by a Smart Meter Gateway in a Smart Metering System. The TOE serves as cryptographic service provider for the Smart Meter Gateway and supports the Smart Meter Gateway for its specific cryptographic needs. These cryptographic services cover the following issues: Digital Signature Generation, Digital Signature Verification, Key Agreement for TLS, Key Agreement for Content Data Encryption, Key Pair Generation, Random Number Generation, Component Authentication via the PACE Protocol with Negotiation of Session Keys, Secure Messaging, and Secure Storage of Key Material and further data relevant for the Gateway.
- evaluation_facility: SRC Security Research & Consulting GmbH
- expiration_date: 28.02.2034
- product: TCOS eEnergy Security Module Version 2.0 Release 1/P71
- protection_profile: Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP), Version 1.03, 11 December 2014, BSI-CC-PP-0077-V2-2015
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1217a_pdf.pdf?__blob=publicationFile&v=2
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1217b_pdf.pdf?__blob=publicationFile&v=2
- product: TCOS eEnergy Security Module Version 2.0 Release 1/P71
- subcategory: Security module for an Smart Metering Gateway
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Smartmeter_Sicherheitsmodule/1217.html
- vendor: Deutsche Telekom Security GmbH
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1149-V3-2023 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1149-V3-2023 |
heuristics/protection_profiles |
{} |
c8d6c0233df5d5fb |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0077b_pdf.pdf |
pdf_data/cert_filename |
|
1217c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0077-V2-2015: 1
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
- DeutscheTelekom:
- Deutsche Telekom Security: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smart Meter, Security Module, Gateway, PP-0077-V2"
- /Subject: Common Criteria, Certification, Zertifizierung, Smart Meter, Security Module, Gateway, PP-0077-V2
- /Title: Certificate BSI-DSZ-CC-1217-2024
- pdf_file_size_bytes: 233498
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
383-4-177 CR v1.1e.pdf |
1217a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- CA:
- cert_id: 383-4-177-CR
- cert_lab: CANADA
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5 valid until: 28 February 2034
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1217-2024
- cert_item: TCOS eEnergy Security Module Version 2.0 Release 1/P71
- cert_lab: BSI
- developer: Deutsche Telekom Security GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP), Version 1.03, 11 December 2014, BSI-CC-PP-0077-V2-2015
- CA:
|
pdf_data/report_keywords/cc_cert_id |
- CA:
- 383-4-177: 1
- 383-4-177-CR: 1
|
- DE:
- BSI-DSZ-CC-1149-V3-2023: 5
- BSI-DSZ-CC-1217: 3
- BSI-DSZ-CC-1217-2024: 16
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0077-V2-2015: 4
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 5
- EAL 4 augmented: 3
- EAL 5: 4
- EAL 5+: 1
- EAL 6: 1
- EAL5+: 1
- EAL6: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_FLR: 2
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
- FCS:
- FCS_CKM: 4
- FCS_COP: 6
- FCS_RNG.1: 1
- FIA:
- FIA_UAU.4: 1
- FIA_UAU.5: 1
- FIA_UID.1: 1
- FTP:
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 5
- NXP Semiconductors: 9
|
pdf_data/report_keywords/eval_facility |
|
- DeutscheTelekom:
- Deutsche Telekom Security: 15
- SRC:
- SRC Security Research & Consulting: 3
- TUV:
- TÜV Informationstechnik: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- fault injection: 2
- malfunction: 1
- SCA:
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-03109-2: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS 140-2: 2
- FIPS 180-3: 1
- FIPS 186-3: 1
- FIPS 197: 1
- FIPS 46-3: 1
- ISO:
- PKCS:
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 20: 3
- AIS 25: 4
- AIS 26: 4
- AIS 31: 3
- AIS 32: 1
- AIS 34: 4
- AIS 35: 1
- AIS 36: 7
- AIS 37: 3
- AIS 38: 1
- AIS 46: 3
- FIPS:
- FIPS 180-4: 2
- FIPS 186: 5
- FIPS 197: 2
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- RFC:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- P71D600, Version 1.0, 13 February 2024, Deutsche Telekom Security GmbH (confidential document) [10] Guidance Documentation BSI-DSZ-CC-1217, Operational Guidance for users and administrators: 1
- R1/R2R3), BSI- DSZ-CC-1149-V3-2023, Version 2, 1 December 2023, TÜV Informationstechnik GmbH (confidential document) [14] Technische Richtlinie BSI TR-03109-1: Smart Meter Gateway - Anforderungen an die: 1
- Version 2.0 Release 1/P71, Version 1.1, 16 February 2024, SRC Security Research & Consulting GmbH (confidential document) [9] Configuration List BSI-DSZ-CC-1217, Konfigurationsliste von TCOS eESM Version 2.0 Release: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /AM_ACPP_Date: [dd month yyyy]
- /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
- /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
- /AM_ACPP_Version: [AM_AMCPP_Version]
- /AM_IAR_Date: [dd month yyyy]
- /AM_IAR_Doc#: [AM_IAR_Doc#]
- /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
- /AM_IAR_Version: [AM_IAR_Version]
- /AM_ST Date: [dd month yyyy]
- /AM_ST Title: [AM_ST Title]
- /AM_ST Version: [AM_ST Version]
- /AM_TOE: [AM_TOE]
- /AM_TOE Short: [AM_TOE Short]
- /AM_TOE Version: [AM_TOE Version]
- /Author: sjackson
- /CC Version: 3.1 Revision 3
- /CC date: July 2009
- /CEM Version: 3.1 Revision 3
- /CEM date: July 2009
- /CR_Date: 18 July 2011
- /CR_Version: 1.0
- /Client City: Jersey City
- /Client Country: USA
- /Client Full Name: Concepteers, LLC
- /Client Postal Code: 07302
- /Client Short Name: Concepteers
- /Client State: New Jersey
- /Client Street: 121 Newark Ave, Suite 204
- /Comments: PCR Template Version 0.1-EWA-C (for CC 3.1)
- /Company: Microsoft
- /CreationDate: D:20110721141436-04'00'
- /Creator: Acrobat PDFMaker 6.0 for Word
- /Developer Long Name: Concepteers, LLC
- /Developer Short Name: Concepteers
- /EAL Level: 3
- /EAL Level Base: 3
- /EAL Level Text: 3
- /EAL Long: 3
- /EAL Short: EAL 3
- /ER Document Date: 15 September 2010
- /ER Version: Version 1.0
- /ETPlan_Doc#: 1688-000-D003
- /ETPlan_Title: Evaluation Test Plan
- /ETPlan_Version: TBD
- /ETPlan_date: TBD
- /ETProcRes_Date: TBD
- /ETProcRes_Doc#: 1688-000-D005
- /ETProcRes_Title: Evaluation Test Results
- /ETProcRes_Version: TBD
- /ETProc_Date: TBD
- /ETProc_Doc#: 1688-000-D004
- /ETProc_Title: Evaluation Test Procedures
- /ETProc_Version: TBD
- /ETReport_Date: 13 July 2011
- /ETReport_Doc#: 1688-000-D002
- /ETReport_Title: Evaluation Technical Report
- /ETReport_TitleShort: ETR
- /ETReport_Version: 1.3
- /EWP_Date: 10 November 2010
- /EWP_Doc#: 1688-000-D001
- /EWP_Title: Evaluation Work Plan
- /EWP_Version: 1.0
- /Eval number: 383-4-177
- /Eval_End_Date: 1 September 2011
- /Eval_Start_Date: 1 September 2010
- /LeadEvaluator: Kim Braun
- /LeadEvaluatorInitials: KB
- /ModDate: D:20110721141454-04'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /ProjectManager: M. Gauvreau
- /ProjectManagerInitials: MG
- /ProjectNumber: 1688
- /ST_Date: 22 June 2011
- /ST_Title: Security Target Concepteers Teleconsole Family Version 2.0
- /ST_Version: 1.2
- /SVC_Date: TBD
- /SVC_Doc#: 1688-000-D007
- /SVC_Title: Site Visit Checklist
- /SVC_Version: TBD
- /SVR_Date: TBD
- /SVR_Doc#: 1688-000-D006
- /SVR_Title: Site Visit Report
- /SVR_Version: TBD
- /SV_City: Jersey City
- /Security Classification: EWA-Canada & Concepteers Proprietary
- /SourceModified: D:20110721181411
- /Sponsor: Concepteers
- /Sponsor City: Jersey City
- /Sponsor Country: USA
- /Sponsor Postal Code: 07302
- /Sponsor State: New Jersey
- /Sponsor Street: 121 Newark Ave, Suite 204
- /TOE: Concepteers Teleconsole™ Version 2.0
- /TOE Short: Teleconsole™ Version 2.0
- /TOE Short with version: Teleconsole™ Version 2.0
- /TOE Short-NoTM: Teleconsole Version 2.0
- /TOE Version: 2.0
- /TOE with version: Concepteers Teleconsole™ Version 2.0
- /TOE-NoTM: Concepteers Teleconsole Family Version 2.0
- /Title: EAL X+ Evaluation of [Developer Long Name]
- pdf_file_size_bytes: 105018
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smart Meter, Security Module, Gateway, PP-0077-V2"
- /Subject: Common Criteria, Certification, Zertifizierung, Smart Meter, Security Module, Gateway, PP-0077-V2
- /Title: Certification Report BSI-DSZ-CC-1217-2024
- pdf_file_size_bytes: 416984
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 29
|
pdf_data/st_filename |
Concepteers Teleconsole EAL3 ST v1-2.pdf |
1217b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1149-V3-2023: 1
- BSI-DSZ-CC-1217: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0073-2014: 1
- BSI-CC-PP-0077-V2-2015: 2
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 5
- EAL 6: 1
- EAL 6 augmented: 1
- EAL 6+: 1
- EAL4: 6
- EAL4 augmented: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.3: 2
- ADV_TDS.2: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.3: 2
- ALC_CMS.3: 2
- ALC_DEL.1: 2
- ALC_DVS.1: 2
- ALC_LCD.1: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 1
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 2
- ADV_FSP: 1
- ADV_FSP.4: 1
- ADV_FUN.1: 1
- ADV_IMP.1: 1
- ADV_TDS: 2
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 2
- ALC_DVS.2: 8
- ALC_FLR.1: 2
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ATE:
- ATE_COV.2: 1
- ATE_DPT.2: 8
- ATE_FUN.1: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 1
- FAU_SAR.1: 5
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FCS:
- FCS_CKM: 3
- FCS_CKM.1: 9
- FCS_CKM.1.1: 1
- FCS_CKM.2: 6
- FCS_CKM.2.1: 1
- FCS_CKM.4: 6
- FCS_CKM.4.1: 1
- FCS_COP: 1
- FCS_COP.1: 7
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 2
- FDP_IDC.2: 3
- FDP_IFC: 1
- FDP_IFC.1: 9
- FDP_IFC.1.1: 1
- FDP_IFF: 1
- FDP_IFF.1: 8
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 3
- FIA:
- FIA_ATD: 1
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU: 1
- FIA_UAU.2: 7
- FIA_UAU.2.1: 1
- FIA_UID: 1
- FIA_UID.1: 2
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 11
- FMT_MOF.1.1: 1
- FMT_MSA: 3
- FMT_MSA.1: 10
- FMT_MSA.1.1: 1
- FMT_MSA.2: 9
- FMT_MSA.2.1: 1
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 1
- FMT_MTD.1: 10
- FMT_MTD.1.1: 3
- FMT_SAE: 2
- FMT_SAE.1: 4
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF: 1
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 11
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM: 1
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FTP:
- FTP_TRP: 1
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FCS:
- FCS_CKM: 61
- FCS_CKM.1: 16
- FCS_CKM.2: 8
- FCS_CKM.4: 45
- FCS_CKM.4.1: 1
- FCS_COP: 67
- FCS_COP.1: 12
- FCS_RNG: 9
- FCS_RNG.1: 17
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 12
- FDP_ACC.2: 17
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 4
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ETC.1: 7
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC: 1
- FDP_IFC.1: 8
- FDP_ITC: 8
- FDP_ITC.1: 20
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 14
- FDP_ITT.1: 1
- FDP_RIP: 1
- FDP_RIP.1: 7
- FDP_RIP.1.1: 1
- FDP_SDC.1: 1
- FDP_SDI: 1
- FDP_SDI.1: 2
- FDP_SDI.2: 8
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT: 1
- FDP_UCT.1: 8
- FDP_UIT: 2
- FDP_UIT.1: 7
- FDP_UIT.1.2: 1
- FIA:
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.1: 3
- FIA_SOS.1.1: 1
- FIA_UAU: 18
- FIA_UAU.1: 5
- FIA_UAU.4: 6
- FIA_UAU.4.1: 1
- FIA_UAU.5: 6
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID: 1
- FIA_UID.1: 14
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 1
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 23
- FMT_LIM.1.1: 2
- FMT_LIM.2: 21
- FMT_LIM.2.1: 2
- FMT_MSA: 2
- FMT_MSA.3: 4
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 6
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 6
- FPT_EMS.1: 14
- FPT_EMS.1.1: 2
- FPT_EMS.1.2: 2
- FPT_FLS: 1
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP: 1
- FPT_PHP.3: 9
- FPT_PHP.3.1: 1
- FPT_TST: 1
- FPT_TST.1: 9
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FTP:
- FTP_ICT.1: 4
- FTP_ITC: 2
- FTP_ITC.1: 10
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- A.GENPUR: 2
- A.NOEVIL: 2
- A.PHYSEC: 2
- A.PUBLIC: 2
- A.SINGEN: 2
- O:
- O.ACCOUN: 9
- O.AUDREC: 8
- O.ENCRYP: 11
- O.IDAUTH: 10
- O.MEDIAT: 15
- O.SECFUN: 18
- O.SECKEY: 9
- O.SECSTA: 13
- O.SELPRO: 9
- O.SINUSE: 8
- OE:
- OE.ADMTRA: 4
- OE.GENPUR: 3
- OE.GUIDAN: 4
- OE.PHYSEC: 3
- OE.PUBLIC: 3
- OE.SINGEN: 3
- T:
- T.AUDACC: 4
- T.AUDFUL: 4
- T.MEDIAT: 3
- T.NOAUTH: 3
- T.OLDINF: 3
- T.PROCOM: 4
- T.REPLAY: 3
- T.SELPRO: 4
- T.TUSAGE: 4
|
- O:
- O.AES: 1
- O.ECC: 1
- O.PACE: 5
- O.PUF: 1
- O.RND: 2
- O.RSA: 1
- O.TDES: 1
- OE:
- OSP:
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 2
- NXP Semiconductors: 1
|
pdf_data/st_keywords/eval_facility |
|
- DeutscheTelekom:
- Deutsche Telekom Security: 81
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 2
- brainpoolP384r1: 2
- brainpoolP512r1: 2
- NIST:
- NIST P-256: 1
- NIST P-384: 1
- P-256: 11
- P-384: 15
- secp256r1: 1
- secp384r1: 1
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Malfunction: 9
- Physical tampering: 1
- fault injection: 1
- malfunction: 3
- physical tampering: 5
- SCA:
- DPA: 2
- Leak-Inherent: 2
- Physical Probing: 1
- SPA: 2
- physical probing: 2
- side channel: 1
- side channels: 1
- side-channels: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 4
- FIPS 180-3: 1
- FIPS 186-3: 1
- FIPS 197: 2
- FIPS 46-3: 2
- PKCS:
- RFC:
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 2
- FIPS:
- FIPS PUB 186-4: 1
- FIPS186: 10
- FIPS197: 3
- RFC:
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- entities. 72 As these external entities only indirectly interact with the TOE, these entities are out of scope for this ST. 73 During its pre-operational phases the TOE interacts with the Integrator and the: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /AAPL:Keywords: []
- /Author: RAY POTTER
- /CreationDate: D:20110622235326Z00'00'
- /Creator: Microsoft Word
- /Keywords:
- /ModDate: D:20110622235326Z00'00'
- /Producer: Mac OS X 10.6.7 Quartz PDFContext
- /Title: Microsoft Word - Concepteers Teleconsole EAL3 ST v1-2.docx
- pdf_file_size_bytes: 536081
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 42
|
- /Author: Deutsche Telekom Security GmbH
- /Keywords: "TCOS Security Module, Sicherheitsmodul, Smart Meter"
- /Subject: TCOS Smart Meter Security Module Version 1.0 Release 1
- /Title: Security Target TCOS Smart Meter Security Module (NXP)
- pdf_file_size_bytes: 930419
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 75
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
True |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |