name |
IMELO-Secure, Version 1.1 |
STARCOS 3.5 ID GCC C2R |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
DE |
DE |
status |
active |
archived |
not_valid_after |
14.04.2027 |
18.11.2019 |
not_valid_before |
14.12.2022 |
17.11.2014 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1013V2c_pdf.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1013V2a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0952a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1013V2b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0952b_pdf.pdf |
manufacturer |
SSI Schäfer Plastics GmbH |
G+D Mobile Security GmbH |
manufacturer_web |
https://ssi-plastic.com |
https://www.gi-de.com/de/de/mobile-security/ |
security_level |
ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, EAL1+ |
EAL4+, ATE_DPT.2, ALC_DVS.2, AVA_VAN.5 |
dgst |
3da0a90c7bb5a9cd |
27e724cd297034a1 |
heuristics/cert_id |
BSI-DSZ-CC-1013-V2-2022 |
BSI-DSZ-CC-0952-2014 |
heuristics/cert_lab |
BSI |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ALC_DEL.1, ATE_IND.1, AGD_OPE.1, ASE_OBJ.2, ASE_CCL.1, ASE_REQ.2 |
ALC_LCD.2, ASE_INT.1, ALC_DVS.2, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ASE_SPD.1, ATE_DPT.2, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_TAT.3, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ATE_IND.3, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ALC_CMC.5, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, APE_OBJ.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1 |
heuristics/extracted_versions |
1.1 |
3.5 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0952-V2-2016 |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1013-2017 |
BSI-DSZ-CC-0751-2013, BSI-DSZ-CC-0813-2012 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0952-V2-2016 |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-1013-2017 |
BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0751-2013, BSI-DSZ-CC-0813-2012 |
heuristics/scheme_data |
- category: Other products
- cert_id: BSI-DSZ-CC-1013-V2-2022
- certification_date: 14.12.2022
- enhanced:
- applicant: SSI Schäfer Plastics GmbH Kalkofen 6 58638 Iserlohn
- assurance_level: EAL1,ASE_SPD.1,ASE_REQ.2,ASE_OBJ.2
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1013V2c_pdf.pdf?__blob=publicationFile&v=3
- certification_date: 14.12.2022
- description: The TOE is referred to as IMELO-Secure 1.0. It is a waste bin identification system developed by Institut für Entsorgung und Umwelttechnik GmbH. The TOE is evaluated and certified conform to the PP „Protection Profile Waste Bin Identification System (WBIS-PP), Version 1.04“. Waste bin identification systems (WBIS) in the sense of this document are systems, which allow to identify waste bins by an ID-tag (e.g. an electronic chip which is referred to as transponder) in order to determine how often a specific waste bin has been cleared. Note that this type of system does not identify the waste directly but the waste bin, which contains the waste for disposal.
- entries: [frozendict({'id': 'BSI-DSZ-CC-1013-V2-2022', 'description': 'Environment.'}), frozendict({'id': 'BSI-DSZ-CC.1013-2017', 'description': 'Security Target'})]
- evaluation_facility: TÜV Informationstechnik GmbH
- expiration_date: 13.12.2027
- product: IMELO-Secure, Version 1.1
- protection_profile: Protection Profile Waste Bin Identification Systems (WBIS-PP), Version 1.04, 27 May 2004, BSI-PP-0010-2004
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1013V2b_pdf.pdf?__blob=publicationFile&v=3
- product: IMELO-Secure, Version 1.1
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Sonstiges/1013_1013V2.html
- vendor: SSI Schäfer Plastics GmbH
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0813-2012 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012 |
heuristics/protection_profiles |
f1e8c937d15e713a |
0e62a9ea5e7ca3a7 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/WBIS-PPv1-04.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0061b_pdf.pdf |
pdf_data/cert_filename |
1013V2c_pdf.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1013-V2-2022: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
- ASE:
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, WBIS, Imelo, Müllbehälter-Identifikationsystem"
- /Subject: Common Criteria, Certification, Zertifizierung, WBIS, Imelo, Müllbehälter-Identifikationsystem
- /Title: Zertifikat BSI-DSZ-CC-1013-V2-2022
- pdf_file_size_bytes: 457534
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
1013V2a_pdf.pdf |
0952a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-1013-V2-2022
- cert_item: IMELO-Secure, Version 1.1
- cert_lab: BSI
- developer: SSI Schäfer Plastics GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) zu (.+?) der (.*)']
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5 SOGIS Recognition Agreement
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0952-2014
- cert_item: STARCOS 3.5 ID GCC C2R
- cert_lab: BSI
- developer: Giesecke & Devrient GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Common Criteria Protection Profile Electronic Identity Card (ID_Card PP), Version 1.03, 16 December 2009, BSI-CC-PP-0061-2009 and in accordance with BSI Technische Richtlinie BSI-TR-03116-2, 2013
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1013-: 1
- BSI-DSZ-CC-1013-2017: 2
- BSI-DSZ-CC-1013-V2-2022: 11
|
- DE:
- BSI-DSZ-CC-0751-2013: 4
- BSI-DSZ-CC-0813-2012: 4
- BSI-DSZ-CC-0952-2014: 20
- BSI-DSZ-CC-S-0017-2014: 2
- BSI-DSZ-CC-S-0023-2013: 2
- BSI-DSZ-CC-S-0029-2014: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP- 0010-2004: 1
- BSI-PP-0010-2004: 2
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 5
- EAL 2: 1
- EAL 4: 1
- EAL1+: 1
|
- EAL:
- EAL 1: 7
- EAL 2: 4
- EAL 3: 4
- EAL 4: 14
- EAL 4 augmented: 3
- EAL 5: 8
- EAL 6: 3
- EAL 7: 4
- EAL5+: 1
- EAL6: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ALC:
- ASE:
- ASE_OBJ.2: 4
- ASE_REQ.2: 4
- ASE_SPD.1: 4
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 3
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 6
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- GD:
- G&D: 2
- Giesecke & Devrient: 19
- Infineon:
- Infineon: 3
- Infineon Technologies: 1
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik: 3
|
- SRC:
- SRC Security Research & Consulting: 3
- TUV:
- TÜV Informationstechnik: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- fault injection: 1
- physical tampering: 1
- SCA:
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7138: 1
- BSI 7148: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
- BSI:
- AIS 20: 1
- AIS 25: 2
- AIS 26: 2
- AIS 31: 1
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 4
- ICAO:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Evaluation Technical Report (ETR) STARCOS 3.5 ID GCC C2R, SRC Security Research & Consulting GmbH (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product M7820 A11, Version 3, 02.04: 1
- TÜV Informationstechnik GmbH, Evaluation Body for IT Security (confidential document) [11] STARCOS 3.5 ID GCC C2 Configuration 1, Application Specification, Version 1.0, 14.03.2013: 1
- Version 1.1, 05.11.2014, Konfigurationsliste von STARCOS 3.5 ID GCC C2R, Giesecke & Devrient GmbH (confidential document) 21 / 34 Certification Report BSI-DSZ-CC-0952-2014 This page is intentionally left blank. 22 / 34: 1
- Version 2.7, 05.08.2013, STARCOS 3.5 ID GCC C2R Security Target, Giesecke & Devrient GmbH (confidential document) [7] Common Criteria Protection Profile Electronic Identity Card (ID_Card PP), Version 1.03, 15: 1
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, WBIS, Imelo, Müllbehälter-Identifikationsystem"
- /Subject: Common Criteria, Certification, Zertifizierung, WBIS, Imelo, Müllbehälter-Identifikationsystem
- /Title: Zertifizierungsreport BSI-DSZ-CC-1013-V2-2022
- pdf_file_size_bytes: 758234
- pdf_hyperlinks: https://www.sogis.eu/, https://www.bsi.bund.de/AIS, https://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20141203132656+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Giesecke & Devrient, G&D, STARCOS, nPA, Personalausweis, Identity Card, ID Card"
- /ModDate: D:20141203133150+01'00'
- /Producer: LibreOffice 4.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0952-2014
- pdf_file_size_bytes: 1238020
- pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
pdf_data/st_filename |
1013V2b_pdf.pdf |
0952b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP-0010-: 1
- BSI-PP-0010-2004: 1
|
- BSI:
- BSI-CC-PP- 0035: 1
- BSI-CC-PP-0059-2009-MA-01: 2
- BSI-CC-PP-0061: 3
- BSI-PP-0055: 1
- BSI-PP-0056: 2
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL1: 1
- EAL1 augmented: 1
- EAL1+: 8
|
- EAL:
- EAL 4: 2
- EAL 5: 2
- EAL4: 13
- EAL4 augmented: 3
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMS: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 2
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 4
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_DVS.1: 1
- ALC_DVS.2: 9
- APE:
- ASE:
- ATE:
- ATE_DPT.1: 2
- ATE_DPT.2: 9
- ATE_FUN.1: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_DAU: 6
- FDP_DAU.1: 6
- FDP_DAU.1.1: 5
- FDP_DAU.1.2: 5
- FDP_ITT: 5
- FDP_ITT.1: 1
- FDP_ITT.5: 16
- FDP_ITT.5.1: 6
- FDP_SDI: 3
- FDP_SDI.1: 9
- FDP_SDI.1.1: 5
- FPT:
- FRU:
- FRU_FLT.1: 6
- FRU_FLT.1.1: 5
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 5
- FAU_SAS.1: 17
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 52
- FCS_CKM.1: 16
- FCS_CKM.2: 4
- FCS_CKM.4: 20
- FCS_COP: 56
- FCS_COP.1: 11
- FCS_RND: 7
- FCS_RND.1: 12
- FCS_RND.1.1: 2
- FCS_RNG.1: 3
- FDP:
- FDP_ACC: 16
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF: 23
- FDP_ACF.1: 21
- FDP_IFC.1: 5
- FDP_ITC.1: 7
- FDP_ITC.2: 8
- FDP_ITT.1: 1
- FDP_RIP: 4
- FDP_RIP.1: 13
- FDP_SDI: 14
- FDP_SDI.1: 3
- FDP_SDI.2: 7
- FIA:
- FIA_AFL: 32
- FIA_AFL.1: 8
- FIA_API: 20
- FIA_API.1: 4
- FIA_API.1.1: 3
- FIA_SOS.2: 1
- FIA_UAU: 45
- FIA_UAU.1: 10
- FIA_UAU.4: 6
- FIA_UAU.4.1: 1
- FIA_UAU.5: 15
- FIA_UAU.6: 8
- FIA_UIA: 1
- FIA_UID: 25
- FIA_UID.1: 11
- FMT:
- FMT_LIM: 13
- FMT_LIM.1: 16
- FMT_LIM.1.1: 2
- FMT_LIM.2: 15
- FMT_LIM.2.1: 2
- FMT_MOF: 2
- FMT_MOF.1: 1
- FMT_MSA: 14
- FMT_MSA.1: 5
- FMT_MSA.2: 1
- FMT_MSA.3: 8
- FMT_MSA.4: 1
- FMT_MTD: 86
- FMT_MTD.1: 12
- FMT_MTD.1.1: 2
- FMT_MTD.3: 9
- FMT_MTD.3.1: 1
- FMT_SMF: 5
- FMT_SMF.1: 38
- FMT_SMR: 4
- FMT_SMR.1: 31
- FPT:
- FPT_FLS: 3
- FPT_FLS.1: 12
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP: 6
- FPT_PHP.1: 5
- FPT_PHP.3: 14
- FPT_TST: 2
- FPT_TST.1: 15
- FPT_TST.1.3: 1
- FPT_TST.2: 2
- FRU:
- FTP:
|
pdf_data/st_keywords/cc_claims |
|
- A:
- O:
- OE:
- OE.CGA_SSCD: 3
- OE.CGA_TC_SVD: 2
- OE.HID_TC_VAD: 1
- OE.HID_VAD: 2
- OE.SCA_TC_DTBS: 1
- T:
|
pdf_data/st_keywords/vendor |
|
- GD:
- Infineon:
- Infineon: 3
- Infineon Technologies AG: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-224: 2
- SHA-256: 3
- SHA-384: 1
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 14
- Physical Tampering: 4
- Physical tampering: 2
- fault injection: 1
- malfunction: 6
- physical tampering: 7
- SCA:
- DPA: 2
- Leak-Inherent: 6
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-20012-09-001: 1
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 3
- CCMB-2012-09-003: 3
- CCMB-2012-09-004: 1
|
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 180-4: 2
- FIPS 197: 4
- FIPS PUB 180-2: 2
- FIPS PUB 180-4: 1
- FIPS180-2: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-2: 1
- ISO/IEC 7816-4: 1
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- to the plastic Identity Card is achieved by physical and organisational security measures being out of scope of the current ST. The TOE shall comprise at least a) the circuitry of the contactless chip incl: 1
|
pdf_data/st_metadata |
- /Author: Hartmut Möllmann;[email protected];Matthias Spielmann;Ulrich Schurkus
- /Keywords: CC-Dokumentation
- /Subject: Sicherheitsvorgaben
- /Title: Sicherheitsvorgabe für das Behälter Identifikationssystem „IMELO-Secure“ Version 1.0
- pdf_file_size_bytes: 747264
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 35
|
- /Author: stut
- /CreationDate: D:20141103145118+01'00'
- /Creator: Microsoft® Word 2010
- /Keywords: Version 2.9 Status 03.11.2014
- /ModDate: D:20141103145118+01'00'
- /Producer: Microsoft® Word 2010
- /Subject: STARCOS 3.5 ID GCC C2R
- /Title: Security Target Lite
- pdf_file_size_bytes: 2021253
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 132
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |