name |
NetApp DataFort FC520 v2, LKM 2.5.1 |
Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.4.6; (Firmware Vers. 1.3.28, HW Vers. 0) |
category |
Data Protection |
Other Devices and Systems |
scheme |
US |
DE |
status |
archived |
active |
not_valid_after |
20.07.2012 |
27.10.2026 |
not_valid_before |
01.04.2009 |
27.10.2021 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1181c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10035-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1181a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10035-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1181b_pdf.pdf |
manufacturer |
NetApp, Inc. |
Bundesdruckerei GmbH |
manufacturer_web |
https://www.netapp.com/ |
https://www.bundesdruckerei.de |
security_level |
EAL4+, ALC_FLR.1 |
EAL3 |
dgst |
436894360f619ed2 |
4be309edc35f4fe0 |
heuristics/cert_id |
CCEVS-VR-VID-10035-2009 |
BSI-DSZ-CC-1181-2021 |
heuristics/cert_lab |
US |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_RCR.1, AVA_VLA.2, ADV_HLD.2, AGD_USR.1, ADV_FSP.2, AVA_SOF.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ATE_DPT.1, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 |
ATE_COV.2, ASE_TSS.1, ASE_INT.1, ATE_FUN.1, AVA_VAN.5, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, ADV_ARC.1, AGD_OPE.1, ALC_CMC.3, ASE_CCL.1, ASE_REQ.2 |
heuristics/extracted_versions |
2.5.1 |
1.3.28, 2.4.6 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1215-2023 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1161-2020 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1215-2023 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1125-2019, BSI-DSZ-CC-1161-2020, BSI-DSZ-CC-1093 |
heuristics/scheme_data |
- category: Sensitive Data Protection, System Access Control
- certification_date: 20.02.2009
- evaluation_facility: CygnaCom Solutions, Inc
- expiration_date:
- id: CCEVS-VR-VID10035
- product: NetApp DataFort FC520 v2, LKM 2.5.1
- scheme: US
- url: https://www.niap-ccevs.org/product/10035
- vendor: NetApp, Inc.
|
- category: Electronic ID documents
- cert_id: BSI-DSZ-CC-1181-2021
- certification_date: 27.10.2021
- enhanced:
- applicant: Bundesdruckerei GmbH Kommandantenstraße 18 10969 Berlin
- assurance_level: EAL3
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1181c_pdf.pdf?__blob=publicationFile&v=2
- certification_date: 27.10.2021
- description: The Target of Evaluation (TOE) is the Bundesdruckerei Document Application with tamper-evident casing 2.4.6. The Document Application is running on a Document Management Terminal (DMT). It is used to read the German Passport (ePass), to read and update the electronic data of the German identification card (“Personalausweis (PA)”) and electronic resident permit (“elektronischer Aufenthaltstitel (eAT)”) as well as to verify the document’s authenticity and the integrity of its data. The TOE is operated by governmental organisations, e.g. municipal office, police, government or other state approved agencies. The TOE is specifically applied in registration offices to allow card holders to verify that their ePass, PA or eAT is working correctly. In case of PA and eAT it is further possible to update the address information of the card holder, the card holder’s PIN for eID applications, and the community ID (“Gemeindeschlüssel”). In addition, the eID application functionality of the PA or eAT can be activated or deactivated. Additionally the TOE ensures secure communication to external control software and provides a tamper-evident enclosure. Necessary protocols for the communication of the TOE with the electronic identity documents like the ePass, PA or eAT are described in [ICAO_9303], [TR-03110-1], [TR-03110-2], and [TR-03110-3].
- entries: [frozendict({'id': 'BSI-DSZ-CC-1181-2021-MA-02 (Ausstellungsdatum / Certification Date 23.05.2022)', 'description': '"Rest of the terminal firmware (including the Operating System)"'}), frozendict({'id': 'BSI-DSZ-CC-1181-2021-MA-01 (Ausstellungsdatum / Certification Date 09.03.2022)', 'description': 'Vers. 0) was changed due to an update of the Rest of the terminal firmware (including the Operating System). Configuration Management procedures required a change in the product identifier. Therefore the version number of the Firmware changed from 1.3.28 to 1.4.8. The changes also cover an minor update of the user guidance related to this version number.'}), frozendict({'id': 'BSI-DSZ-CC-1181-2021', 'description': 'Certificate'})]
- evaluation_facility: TÜV Informationstechnik GmbH
- expiration_date: 26.10.2026
- product: Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.4.6; (Firmware Vers. 1.3.28, HW Vers. 0)
- protection_profile: Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018, Version: 2.0, 2018-06-06, Federal Office for Information Security (BSI)
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1181a_pdf.pdf?__blob=publicationFile&v=2
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1181b_pdf.pdf?__blob=publicationFile&v=2
- product: Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.4.6; (Firmware Vers. 1.3.28, …
- subcategory: Software with hardware
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Hoheitliche_Dokumente-Software_mit_Hardware/1181.html
- vendor: Bundesdruckerei GmbH
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
c3398dec6cc86c4f |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0064b_pdf.pdf |
pdf_data/cert_filename |
|
1181c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20211104084818+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, BDr, Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018"
- /ModDate: D:20211108192831+01'00'
- /Producer: LibreOffice 6.3
- /Subject: Bundesdruckerei Document Application withtamper-evident casing
- /Title: Certification Report BSI-DSZ-CC-1181-2021
- pdf_file_size_bytes: 244679
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
st_vid10035-vr.pdf |
1181a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- US:
- cert_id: CCEVS-VR-VID10035-2009
- cert_item: NetApp Decru DataFort FC520v2, LKM 2.5.1
- cert_lab: US NIAP
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 3
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1181-2021
- cert_item: Bundesdruckerei Document Application with tamper-evident casing Document Application Version 2.4.6; (Firmware Vers. 1.3.28, HW Vers. 0
- cert_lab: BSI
- developer: Bundesdruckerei GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064- V2-2018, Version: 2.0, 2018-06-06, Federal Office for Information Security (BSI
- US:
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10035-2009: 1
|
- DE:
- BSI-DSZ-CC-1161-: 1
- BSI-DSZ-CC-1161-2020: 2
- BSI-DSZ-CC-1181: 1
- BSI-DSZ-CC-1181-2021: 15
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0064-: 1
- BSI-CC-PP-0064-V2-2018: 3
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 3: 4
- EAL 4: 1
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ALC:
- ALC_DVS.1: 1
- ALC_FLR.1: 4
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 1
- FAU_STG_ENV.1: 1
- FAU_STG_EXP.1: 1
- FCS:
- FCS_CKM: 3
- FCS_CKM.4: 1
- FCS_CKM_EXP.5: 1
- FCS_CKM_EXP.6: 1
- FCS_CKM_EXP.7: 1
- FCS_CKM_EXP.8: 1
- FCS_COP: 3
- FCS_COP_EXP.1: 1
- FCS_COP_EXP.2: 1
- FCS_COP_EXP.3: 1
- FCS_COP_EXP.4: 1
- FCS_COP_EXP.5: 1
- FDP:
- FDP_IFC.1: 1
- FDP_IFF.1: 2
- FIA:
- FIA_EAU_ENV.2: 1
- FIA_EAU_EXP.5: 1
- FIA_EID_ENV.2: 1
- FIA_EID_EXP.1: 1
- FIA_UAU_ENV.5: 1
- FIA_UAU_EXP.5: 1
- FIA_UID_ENV.2: 1
- FIA_UID_EXP.2: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.1: 1
- FMT_MSA.2: 1
- FMT_MSA.3: 1
- FMT_MTD.1: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FPT_FLS.1: 1
- FPT_RCV.4: 1
- FPT_RVM_ENV.1: 1
- FPT_RVM_EXP.1: 1
- FPT_SEP_ENV.1: 1
- FPT_SEP_EXP.1: 1
- FPT_STM_ENV.1: 1
- FPT_STM_EXP.1: 1
- FTP:
- FTP_ITC_ENV.1: 1
- FTP_ITC_EXP.1: 2
|
- FAU:
- FIA:
- FIA_API.1: 1
- FIA_UAU.2: 1
- FIA_UAU.4: 1
- FIA_UAU.5: 1
- FIA_UAU.6: 1
- FIA_UID.2: 1
- FMT:
- FMT_MTD: 3
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FTP:
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 3
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA224: 1
- SHA256: 10
- SHA384: 6
- SHA512: 1
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS 140: 3
- FIPS 140-2: 14
|
- BSI:
- AIS 20: 1
- AIS 32: 1
- AIS 38: 1
- AIS 48: 1
- FIPS:
- FIPS 197: 8
- FIPS PUB 46-3: 2
- FIPS180-4: 8
- FIPS186-2: 6
- FIPS186-4: 1
- FIPS197: 1
- ICAO:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 15946-: 6
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- ISO/IEC 9797-: 2
- RFC:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Evaluation Technical Report, Version 1, 2021-10-11, BSI-DSZ-CC-1181, TÜV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile for Document Management Terminal DMT-PP: 1
- Security (BSI) [9] Configuration list for the TOE, Version 1.37, 2021-09-29, Bundesdruckerei GmbH (confidential document) [10] Guidance documentation for the TOE, Version 1.195, 2021-09-17, VISOTEC® V- ÄNDERUNGSTERMINAL: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /Author: James E Brosey
- /CreationDate: D:20090326171341
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20090326171341
- /Producer: Microsoft® Office Word 2007
- /Title: Validation Report
- pdf_file_size_bytes: 443011
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20211105104643+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, BDr, Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018"
- /ModDate: D:20211108154109+01'00'
- /Producer: LibreOffice 6.3
- /Subject: Bundesdruckerei Document Application withtamper-evident casing
- /Title: Certification Report BSI-DSZ-CC-1181-2021
- pdf_file_size_bytes: 789441
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 29
|
pdf_data/st_filename |
st_vid10035-st.pdf |
1181b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0064-: 1
- BSI-CC-PP-0064-V2-2018: 3
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 4
- EAL 4 augmented: 1
- EAL4: 11
- EAL4 augmented: 2
|
- EAL:
- EAL 3: 4
- EAL3: 1
- EAL4+: 2
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 3
- ACM_CAP.4: 2
- ACM_SCP.2: 2
- ADO:
- ADO_DEL.2: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.2: 2
- ADV_HLD.2: 2
- ADV_IMP.1: 2
- ADV_LLD.1: 2
- ADV_RCR.1: 2
- ADV_SPM.1: 8
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ALC_DVS.1: 6
- ALC_FLR.1: 13
- ALC_LCD.1: 6
- ALC_TAT.1: 6
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU: 1
- AVA_MSU.2: 2
- AVA_SOF.1: 2
- AVA_VLA.2: 3
|
- ADV:
- ADV_ARC.1: 1
- ADV_TDS.2: 1
- AGD:
- ALC:
- ALC_CMC.3: 1
- ALC_DEL.1: 1
- ALC_LCD.1: 1
- APE:
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
- AVA_VAN.2: 1
- AVA_VAN.5: 2
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 19
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_STG_ENV.1: 11
- FAU_STG_ENV.1.1: 1
- FAU_STG_ENV.1.2: 1
- FAU_STG_ENV.1.3: 1
- FAU_STG_ENV.1.4: 1
- FAU_STG_ENV.1.5: 1
- FAU_STG_ENV.1.6: 1
- FAU_STG_EXP.1: 12
- FAU_STG_EXP.1.1: 1
- FAU_STG_EXP.1.2: 1
- FCS:
- FCS_CKM: 41
- FCS_CKM.1: 3
- FCS_CKM.4: 33
- FCS_CKM.4.1: 1
- FCS_CKM_EXP: 1
- FCS_CKM_EXP.5: 12
- FCS_CKM_EXP.5.1: 1
- FCS_CKM_EXP.6: 13
- FCS_CKM_EXP.6.1: 1
- FCS_CKM_EXP.7: 17
- FCS_CKM_EXP.7.1: 1
- FCS_CKM_EXP.7.2: 1
- FCS_CKM_EXP.8: 14
- FCS_CKM_EXP.8.1: 1
- FCS_CKM_EXP.8.2: 1
- FCS_COP: 51
- FCS_COP.1: 2
- FCS_COP_EXP.1: 16
- FCS_COP_EXP.1.1: 1
- FCS_COP_EXP.2: 15
- FCS_COP_EXP.2.1: 1
- FCS_COP_EXP.3: 12
- FCS_COP_EXP.3.1: 1
- FCS_COP_EXP.4: 14
- FCS_COP_EXP.4.1: 1
- FCS_COP_EXP.4.2: 1
- FCS_COP_EXP.5: 16
- FCS_COP_EXP.5.1: 1
- FDP:
- FDP_IFC.1: 17
- FDP_IFC.1.1: 1
- FDP_IFF.1: 14
- FDP_IFF.1.1: 3
- FDP_IFF.1.2: 3
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FDP_IFF.3: 2
- FDP_ITC: 1
- FIA:
- FIA_EAU_ENV.2: 7
- FIA_EAU_ENV.2.1: 1
- FIA_EAU_EXP.5: 14
- FIA_EAU_EXP.5.1: 1
- FIA_EAU_EXP.5.2: 1
- FIA_EID_ENV.2: 6
- FIA_EID_ENV.2.1: 1
- FIA_EID_ENV.2.2: 1
- FIA_EID_EXP.1: 8
- FIA_EID_EXP.1.1: 1
- FIA_EID_EXP.1.2: 1
- FIA_UAU: 1
- FIA_UAU_ENV.5: 7
- FIA_UAU_ENV.5.1: 1
- FIA_UAU_ENV.5.2: 1
- FIA_UAU_EXP.5: 15
- FIA_UAU_EXP.5.1: 1
- FIA_UAU_EXP.5.2: 1
- FIA_UID: 1
- FIA_UID.1: 2
- FIA_UID_ENV.2: 6
- FIA_UID_ENV.2.1: 1
- FIA_UID_EXP.2: 8
- FIA_UID_EXP.2.1: 1
- FMT:
- FMT_MOF.1: 14
- FMT_MOF.1.1: 1
- FMT_MSA.1: 34
- FMT_MSA.1.1: 1
- FMT_MSA.2: 25
- FMT_MSA.2.1: 1
- FMT_MSA.3: 11
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 1
- FMT_MTD.1: 19
- FMT_MTD.1.1: 1
- FMT_SMF.1: 36
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_RCV.4: 12
- FPT_RCV.4.1: 1
- FPT_RVM_ENV.1: 8
- FPT_RVM_ENV.1.1: 1
- FPT_RVM_EXP.1: 11
- FPT_RVM_EXP.1.1: 1
- FPT_RVM_EXP.1.2: 1
- FPT_RVM_EXP.1.3: 1
- FPT_SEP_ENV.1: 7
- FPT_SEP_ENV.1.1: 1
- FPT_SEP_EXP.1: 10
- FPT_SEP_EXP.1.1: 1
- FPT_SEP_EXP.1.2: 1
- FPT_SEP_EXP.1.3: 1
- FPT_SEP_EXP.1.4: 1
- FPT_STM.1: 1
- FPT_STM_ENV.1: 7
- FPT_STM_ENV.1.1: 1
- FPT_STM_EXP.1: 14
- FPT_STM_EXP.1.1: 1
- FTP:
- FTP_ITC_ENV.1: 8
- FTP_ITC_ENV.1.1: 1
- FTP_ITC_ENV.1.2: 1
- FTP_ITC_EXP.1: 12
- FTP_ITC_EXP.1.1: 1
- FTP_ITC_EXP.1.2: 1
- FTP_ITC_EXP.1.3: 1
|
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 5
- FAU_GEN.1.1: 3
- FAU_GEN.1.2: 2
- FCS:
- FCS_CKM: 13
- FCS_CKM.1: 15
- FCS_CKM.4: 5
- FCS_CKM.4.1: 1
- FCS_COP: 29
- FCS_COP.1: 25
- FCS_RNG: 3
- FCS_RNG.1: 6
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_RIP.1: 4
- FDP_RIP.1.1: 1
- FIA:
- FIA_API: 1
- FIA_API.1: 6
- FIA_API.1.1: 1
- FIA_UAU.1: 3
- FIA_UAU.2: 6
- FIA_UAU.2.1: 1
- FIA_UAU.4: 5
- FIA_UAU.4.1: 1
- FIA_UAU.5: 4
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 4
- FIA_UAU.6.1: 1
- FIA_UID.1: 2
- FIA_UID.2: 6
- FIA_UID.2.1: 1
- FMT:
- FMT_MTD: 22
- FMT_MTD.1: 5
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.1: 5
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FTP:
- FTP_TRP: 4
- FTP_TRP.1: 3
- FTP_TRP.1.2: 1
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 54
- AES-: 1
- AES-256: 4
- DES:
- constructions:
- MAC:
- HMAC: 13
- HMAC-SHA-256: 9
- HMAC-SHA-512: 3
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 5
- SHA-384: 2
- SHA-512: 2
- SHA256: 2
|
pdf_data/st_keywords/crypto_scheme |
- KA:
- Key Agreement: 6
- Key agreement: 1
- KEX:
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP224r1: 1
- brainpoolP256r1: 2
- brainpoolP384r1: 2
- brainpoolP512r1: 2
- NIST:
- NIST P-384: 1
- P-256: 2
- P-384: 1
- prime256v1: 2
- secp256r1: 1
- secp384r1: 3
- secp521r1: 1
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 2
- EF.DG1: 2
- EF.DG13: 1
- EF.DG16: 2
- EF.DG2: 1
- EF.DG3: 2
- EF.DG4: 2
- EF.DG5: 1
- EF.SOD: 2
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140: 2
- FIPS 140-2: 23
- FIPS 180-2: 2
- FIPS 186-2: 8
- FIPS 197: 7
- FIPS 198: 3
- FIPS 46-3: 5
- FIPS PUB 140-2: 1
- FIPS PUB 146-3: 1
- FIPS PUB 180-2: 1
- FIPS PUB 186-2: 1
- FIPS PUB 197: 1
- FIPS PUB 198: 1
- NIST:
- RFC:
- RFC 2104: 1
- RFC 2246: 3
- RFC 2404: 1
- RFC 2407: 1
- RFC 2408: 1
- RFC 2409: 2
- RFC 2411: 1
- RFC 2631: 1
- RFC 3602: 1
- RFC 4109: 1
- RFC 4301: 1
- RFC 4304: 1
- RFC 4305: 1
- RFC 4306: 1
- RFC 4346: 1
|
- BSI:
- FIPS:
- FIPS 180-4: 2
- FIPS 186-2: 1
- FIPS 186-4: 1
- FIPS PUB 197: 1
- FIPS180-4: 3
- FIPS186-2: 2
- FIPS186-4: 3
- FIPS197: 2
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: Alexander Haferland
- /CreationDate: D:20210909141650+02'00'
- /Creator: Microsoft® Word 2016
- /Keywords: CC, ST, Common Criteria, Security Target, Inspection System, PA, eAT, ePass
- /ModDate: D:20210909141650+02'00'
- /Producer: Microsoft® Word 2016
- /Subject: Security Target
- /Title: Bundesdruckerei Document Application Common Criteria Evaluation
- pdf_file_size_bytes: 1655411
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 92
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |