name |
Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.4.6; (Firmware Vers. 1.3.28, HW Vers. 0)
|
Xerox Color 550/560 Printer Version:Controller ROM Ver. 1.203.1, IOT ROM Ver. 62.23.0, IIT ROM Ver. 6.13.0, ADF ROM Ver. 12.4.0
|
category |
Other Devices and Systems
|
Multi-Function Devices
|
not_valid_before |
2021-10-27
|
2011-06-23
|
not_valid_after |
2026-10-27
|
2016-07-04
|
scheme |
DE
|
JP
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1181b_pdf.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0294_est.pdf
|
status |
active
|
archived
|
manufacturer |
Bundesdruckerei GmbH
|
Fuji Xerox Co., Ltd.
|
manufacturer_web |
https://www.bundesdruckerei.de
|
https://www.fujixerox.co.jp/eng/
|
security_level |
EAL3 |
ALC_FLR.2, EAL3+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1181a_pdf.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0294_erpt.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1181c_pdf.pdf
|
None
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Common Criteria Protection Profile for Inspection Systems, Version 1.01', 'pp_eal': 'EAL3', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0064b_pdf.pdf', 'pp_ids': None}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.1™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': None}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
True
|
False
|
state/cert/download_ok |
True
|
False
|
state/cert/extract_ok |
True
|
False
|
state/cert/pdf_hash |
1d1da873337d138b0ce159c51f7fc3f45aea16dacbef34f16374d7f8dd3befeb
|
None
|
state/cert/txt_hash |
161cdda16fc7ceeeece0cac20018bc62852a0dc306cef4c926c298d188e93699
|
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
d3ea8b3a54f1a6190f13ab86f446e8b7e15be4eded087aa62a93c32ef1ae605e
|
8ca83f92ba2f79bad373f70552ac4425abbca9d2da8706bbf8107594bfa578a8
|
state/report/txt_hash |
16b19318b760c2523599b16c51cb8e6d75035a47f9e45dc109e05a5b4c3a2a94
|
09a2e4c5801394c6efe1b13162ba9dcae984078fe9f6d191d12192ec2031b88c
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
b5d8d8bd31c47186afa41397f8292f0505452c5fe1535badb9f14d7cf3633326
|
92d2f1a77903cdef52f499be8d90d1b37b2515310b60c6fecfbcd3046ba466eb
|
state/st/txt_hash |
c1790a04de2ab290cfb648c47203c9abebed53098d5bfcc4ad767546369e112b
|
6e8a175b960d79aa20b676b0d1caf968a7fa125f7d57c81711a8d85170dc4573
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
BSI-DSZ-CC-1181-2021
|
JISEC-CC-CRP-C0294
|
heuristics/cert_lab |
BSI |
None
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
2.4.6, 1.3.28 |
1.203.1, 62.23.0, 12.4.0, 6.13.0 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
BSI-DSZ-CC-1215-2023 |
None
|
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1161-2020 |
None
|
heuristics/report_references/indirectly_referenced_by |
BSI-DSZ-CC-1215-2023 |
None
|
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-1161-2020, BSI-DSZ-CC-1093, BSI-DSZ-CC-1125-2019 |
None
|
heuristics/scheme_data |
- cert_id:
BSI-DSZ-CC-1181-2021
- product: Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.4.6; (Firmware Vers. 1.3.28, …
- vendor: Bundesdruckerei GmbH
- certification_date:
27.10.2021
- category: Electronic ID documents
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Hoheitliche_Dokumente-Software_mit_Hardware/1181.html
- enhanced:
- product:
Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.4.6; (Firmware Vers. 1.3.28, HW Vers. 0)
- applicant:
Bundesdruckerei GmbH
Kommandantenstraße 18
10969 Berlin
- evaluation_facility:
TÜV Informationstechnik GmbH
- assurance_level:
EAL3
- protection_profile:
Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018, Version: 2.0, 2018-06-06, Federal Office for Information Security (BSI)
- certification_date:
27.10.2021
- expiration_date:
26.10.2026
- entries:
frozendict({'id': 'BSI-DSZ-CC-1181-2021-MA-02 (Ausstellungsdatum / Certification Date 23.05.2022)', 'description': '"Rest of the terminal firmware (including the Operating System)"'}), frozendict({'id': 'BSI-DSZ-CC-1181-2021-MA-01 (Ausstellungsdatum / Certification Date 09.03.2022)', 'description': 'Vers. 0) was changed due to an update of the Rest of the terminal firmware (including the Operating System). Configuration Management procedures required a change in the product identifier. Therefore the version number of the Firmware changed from 1.3.28 to 1.4.8. The changes also cover an minor update of the user guidance related to this version number.'}), frozendict({'id': 'BSI-DSZ-CC-1181-2021', 'description': 'Certificate'})
- report_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1181a_pdf.pdf?__blob=publicationFile&v=2
- target_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1181b_pdf.pdf?__blob=publicationFile&v=2
- cert_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1181c_pdf.pdf?__blob=publicationFile&v=2
- description:
The Target of Evaluation (TOE) is the Bundesdruckerei Document Application with tamper-evident casing 2.4.6.
The Document Application is running on a Document Management Terminal (DMT). It is used to read the German Passport (ePass), to read and update the electronic data of the German identification card (“Personalausweis (PA)”) and electronic resident permit (“elektronischer Aufenthaltstitel (eAT)”) as well as to verify the document’s authenticity and the integrity of its data.
The TOE is operated by governmental organisations, e.g. municipal office, police, government or other state approved agencies. The TOE is specifically applied in registration offices to allow card holders to verify that their ePass, PA or eAT is working correctly. In case of PA and eAT it is further possible to update the address information of the card holder, the card holder’s PIN for eID applications, and the community ID (“Gemeindeschlüssel”). In addition, the eID application functionality of the PA or eAT can be activated or deactivated. Additionally the TOE ensures secure communication to external control software and provides a tamper-evident enclosure.
Necessary protocols for the communication of the TOE with the electronic identity documents like the ePass, PA or eAT are described in [ICAO_9303], [TR-03110-1], [TR-03110-2], and [TR-03110-3].
- subcategory: Software with hardware
|
- cert_id:
C0294
- supplier: Fuji Xerox Co., Ltd.
- toe_overseas_name: Xerox Color 550/560 Printer
Controller ROM Ver. 1.203.1, IOT ROM Ver. 62.23.0, IIT ROM Ver. 6.13.0, ADF ROM Ver. 12.4.0
- expiration_date: 2016-07
- claim: EAL3+
ALC_FLR.2
PP
- certification_date:
2011-06
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0294_it0305.html
- toe_japan_name: -----
- enhanced:
- product:
Xerox Color 550/560 Printer
- toe_version:
Controller ROM
Ver. 1.203.1
IOT ROM
Ver. 62.23.0
IIT ROM
Ver. 6.13.0
ADF ROM
Ver. 12.4.0
- product_type:
Multi Function Device
- certification_date:
2011-06-23
- cc_version:
3.1
- assurance_level:
EAL3 Augmented with ALC_FLR.2
- protection_profile:
IEEE Std 2600.1-2009
- vendor:
Fuji Xerox Co., Ltd.
- evaluation_facility:
Information Technology Security Center Evaluation Department
- report_link:
https://www.ipa.go.jp/en/security/c0294_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0294_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0294_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the TOE via internal network, and general user client which is directly linked to the TOE.
TOE security functionality
To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions:
-
Hard Disk Data Overwrite
A function to overwrite and delete the document data in the internal HDD.
-
Hard Disk Data Encryption
A function to encrypt the document data before the data is stored into the internal HDD.
-
User Authentication
A function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data.
-
System Administrator's Security Management
A function to allow only system administrators to configure the settings of security functions.
-
Customer Engineer Operation Restriction
A function to allow only system administrators to configure the settings for restricting customer engineer operations.
-
Security Audit Log
A function to generate audit logs of security events and allow only system administrators to refer to them.
-
Internal Network Data Protection
A function to protect communication data by using encryption communication protocols.
-
Information Flow Security
A function to restrict the unpermitted communication between the TOE interface and internal network.
-
Self test
A function to verify the integrity of TSF executable code and TOE setting data.
|
heuristics/scheme_data/cert_id |
BSI-DSZ-CC-1181-2021
|
C0294
|
heuristics/scheme_data/certification_date |
27.10.2021
|
2011-06
|
heuristics/scheme_data/enhanced |
- product:
Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.4.6; (Firmware Vers. 1.3.28, HW Vers. 0)
- applicant: Bundesdruckerei GmbH
Kommandantenstraße 18
10969 Berlin
- evaluation_facility:
TÜV Informationstechnik GmbH
- assurance_level:
EAL3
- protection_profile:
Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018, Version: 2.0, 2018-06-06, Federal Office for Information Security (BSI)
- certification_date:
27.10.2021
- expiration_date: 26.10.2026
- entries: frozendict({'id': 'BSI-DSZ-CC-1181-2021-MA-02 (Ausstellungsdatum / Certification Date 23.05.2022)', 'description': '"Rest of the terminal firmware (including the Operating System)"'}), frozendict({'id': 'BSI-DSZ-CC-1181-2021-MA-01 (Ausstellungsdatum / Certification Date 09.03.2022)', 'description': 'Vers. 0) was changed due to an update of the Rest of the terminal firmware (including the Operating System). Configuration Management procedures required a change in the product identifier. Therefore the version number of the Firmware changed from 1.3.28 to 1.4.8. The changes also cover an minor update of the user guidance related to this version number.'}), frozendict({'id': 'BSI-DSZ-CC-1181-2021', 'description': 'Certificate'})
- report_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1181a_pdf.pdf?__blob=publicationFile&v=2
- target_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1181b_pdf.pdf?__blob=publicationFile&v=2
- cert_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1181c_pdf.pdf?__blob=publicationFile&v=2
- description:
The Target of Evaluation (TOE) is the Bundesdruckerei Document Application with tamper-evident casing 2.4.6.
The Document Application is running on a Document Management Terminal (DMT). It is used to read the German Passport (ePass), to read and update the electronic data of the German identification card (“Personalausweis (PA)”) and electronic resident permit (“elektronischer Aufenthaltstitel (eAT)”) as well as to verify the document’s authenticity and the integrity of its data.
The TOE is operated by governmental organisations, e.g. municipal office, police, government or other state approved agencies. The TOE is specifically applied in registration offices to allow card holders to verify that their ePass, PA or eAT is working correctly. In case of PA and eAT it is further possible to update the address information of the card holder, the card holder’s PIN for eID applications, and the community ID (“Gemeindeschlüssel”). In addition, the eID application functionality of the PA or eAT can be activated or deactivated. Additionally the TOE ensures secure communication to external control software and provides a tamper-evident enclosure.
Necessary protocols for the communication of the TOE with the electronic identity documents like the ePass, PA or eAT are described in [ICAO_9303], [TR-03110-1], [TR-03110-2], and [TR-03110-3].
|
- product:
Xerox Color 550/560 Printer
- toe_version: Controller ROM
Ver. 1.203.1
IOT ROM
Ver. 62.23.0
IIT ROM
Ver. 6.13.0
ADF ROM
Ver. 12.4.0
- product_type: Multi Function Device
- certification_date:
2011-06-23
- cc_version: 3.1
- assurance_level:
EAL3 Augmented with ALC_FLR.2
- protection_profile:
IEEE Std 2600.1-2009
- vendor: Fuji Xerox Co., Ltd.
- evaluation_facility:
Information Technology Security Center Evaluation Department
- report_link:
https://www.ipa.go.jp/en/security/c0294_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0294_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0294_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the TOE via internal network, and general user client which is directly linked to the TOE.
TOE security functionality
To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions:
-
Hard Disk Data Overwrite
A function to overwrite and delete the document data in the internal HDD.
-
Hard Disk Data Encryption
A function to encrypt the document data before the data is stored into the internal HDD.
-
User Authentication
A function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data.
-
System Administrator's Security Management
A function to allow only system administrators to configure the settings of security functions.
-
Customer Engineer Operation Restriction
A function to allow only system administrators to configure the settings for restricting customer engineer operations.
-
Security Audit Log
A function to generate audit logs of security events and allow only system administrators to refer to them.
-
Internal Network Data Protection
A function to protect communication data by using encryption communication protocols.
-
Information Flow Security
A function to restrict the unpermitted communication between the TOE interface and internal network.
-
Self test
A function to verify the integrity of TSF executable code and TOE setting data.
|
heuristics/scheme_data/enhanced/assurance_level |
EAL3
|
EAL3 Augmented with ALC_FLR.2
|
heuristics/scheme_data/enhanced/cert_link |
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1181c_pdf.pdf?__blob=publicationFile&v=2
|
https://www.ipa.go.jp/en/security/c0294_eimg.pdf
|
heuristics/scheme_data/enhanced/certification_date |
27.10.2021
|
2011-06-23
|
heuristics/scheme_data/enhanced/description |
The Target of Evaluation (TOE) is the Bundesdruckerei Document Application with tamper-evident casing 2.4.6.
The Document Application is running on a Document Management Terminal (DMT). It is used to read the German Passport (ePass), to read and update the electronic data of the German identification card (“Personalausweis (PA)”) and electronic resident permit (“elektronischer Aufenthaltstitel (eAT)”) as well as to verify the document’s authenticity and the integrity of its data.
The TOE is operated by governmental organisations, e.g. municipal office, police, government or other state approved agencies. The TOE is specifically applied in registration offices to allow card holders to verify that their ePass, PA or eAT is working correctly. In case of PA and eAT it is further possible to update the address information of the card holder, the card holder’s PIN for eID applications, and the community ID (“Gemeindeschlüssel”). In addition, the eID application functionality of the PA or eAT can be activated or deactivated. Additionally the TOE ensures secure communication to external control software and provides a tamper-evident enclosure.
Necessary protocols for the communication of the TOE with the electronic identity documents like the ePass, PA or eAT are described in [ICAO_9303], [TR-03110-1], [TR-03110-2], and [TR-03110-3].
|
PRODUCT DESCRIPTION
Description of TOE
The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the TOE via internal network, and general user client which is directly linked to the TOE.
TOE security functionality
To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions:
-
Hard Disk Data Overwrite
A function to overwrite and delete the document data in the internal HDD.
-
Hard Disk Data Encryption
A function to encrypt the document data before the data is stored into the internal HDD.
-
User Authentication
A function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data.
-
System Administrator's Security Management
A function to allow only system administrators to configure the settings of security functions.
-
Customer Engineer Operation Restriction
A function to allow only system administrators to configure the settings for restricting customer engineer operations.
-
Security Audit Log
A function to generate audit logs of security events and allow only system administrators to refer to them.
-
Internal Network Data Protection
A function to protect communication data by using encryption communication protocols.
-
Information Flow Security
A function to restrict the unpermitted communication between the TOE interface and internal network.
-
Self test
A function to verify the integrity of TSF executable code and TOE setting data.
|
heuristics/scheme_data/enhanced/evaluation_facility |
TÜV Informationstechnik GmbH
|
Information Technology Security Center Evaluation Department
|
heuristics/scheme_data/enhanced/product |
Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.4.6; (Firmware Vers. 1.3.28, HW Vers. 0)
|
Xerox Color 550/560 Printer
|
heuristics/scheme_data/enhanced/protection_profile |
Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018, Version: 2.0, 2018-06-06, Federal Office for Information Security (BSI)
|
IEEE Std 2600.1-2009
|
heuristics/scheme_data/enhanced/report_link |
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1181a_pdf.pdf?__blob=publicationFile&v=2
|
https://www.ipa.go.jp/en/security/c0294_erpt.pdf
|
heuristics/scheme_data/enhanced/target_link |
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1181b_pdf.pdf?__blob=publicationFile&v=2
|
https://www.ipa.go.jp/en/security/c0294_est.pdf
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
1181c_pdf.pdf
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
- cc_cert_id:
- cc_protection_profile_id:
- cc_security_level:
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- ISO:
- ISO/IEC 15408:
2
- ISO/IEC 18045:
2
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
None
|
pdf_data/cert_metadata |
- pdf_file_size_bytes:
244679
- pdf_is_encrypted:
False
- pdf_number_of_pages:
1
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate:
D:20211104084818+01'00'
- /Creator:
Writer
- /Keywords:
"Common Criteria, Certification, Zertifizierung, BDr, Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018"
- /ModDate:
D:20211108192831+01'00'
- /Producer:
LibreOffice 6.3
- /Subject:
Bundesdruckerei Document Application withtamper-evident casing
- /Title:
Certification Report BSI-DSZ-CC-1181-2021
- pdf_hyperlinks:
|
None
|
pdf_data/report_filename |
1181a_pdf.pdf
|
c0294_erpt.pdf
|
pdf_data/report_frontpage |
- DE:
- match_rules:
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
- cert_id:
BSI-DSZ-CC-1181-2021
- cert_item:
Bundesdruckerei Document Application with tamper-evident casing Document Application Version 2.4.6; (Firmware Vers. 1.3.28, HW Vers. 0
- developer:
Bundesdruckerei GmbH
- cert_lab:
BSI
- ref_protection_profiles:
Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064- V2-2018, Version: 2.0, 2018-06-06, Federal Office for Information Security (BSI
- cc_version:
PP conformant Common Criteria Part 2 extended
- cc_security_level:
Common Criteria Part 3 conformant EAL 3
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1181-2021:
15
- BSI-DSZ-CC-1161-:
1
- BSI-DSZ-CC-1161-2020:
2
- BSI-DSZ-CC-1181:
1
|
- JP:
- CRP-C0294-01:
1
- Certification No. C0294:
1
|
pdf_data/report_keywords/cc_claims |
|
- T:
- T.DOC:
4
- T.FUNC:
2
- T.CONF:
4
- T.PROT:
2
- A:
- A.ACCESS:
1
- A.USER:
1
- A.ADMIN:
2
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0064-:
1
- BSI-CC-PP-0064-V2-2018:
3
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 3:
4
- EAL 2:
2
- EAL 1:
1
- EAL 4:
1
- EAL 2+:
1
|
- EAL3:
4
- EAL3 augmented:
2
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FIA:
- FIA_UAU.4:
1
- FIA_UAU.5:
1
- FIA_UAU.6:
1
- FIA_API.1:
1
- FIA_UAU.2:
1
- FIA_UID.2:
1
- FMT:
- FMT_SMR.1:
1
- FMT_SMF.1:
1
- FMT_MTD:
3
- FPT:
- FTP:
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification:
1
- Evaluation Technical Report, Version 1, 2021-10-11, BSI-DSZ-CC-1181, TÜV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile for Document Management Terminal DMT-PP:
1
- Security (BSI) [9] Configuration list for the TOE, Version 1.37, 2021-09-29, Bundesdruckerei GmbH (confidential document) [10] Guidance documentation for the TOE, Version 1.195, 2021-09-17, VISOTEC® V- ÄNDERUNGSTERMINAL:
1
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_protocol/TLS |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik:
3
|
- ITSC:
- Information Technology Security Center:
3
|
pdf_data/report_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA256:
10
- SHA384:
6
- SHA512:
1
- SHA224:
1
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS186-2:
6
- FIPS180-4:
8
- FIPS PUB 46-3:
2
- FIPS 197:
8
- FIPS186-4:
1
- FIPS197:
1
- BSI:
- AIS 48:
1
- AIS 20:
1
- AIS 32:
1
- AIS 38:
1
- RFC:
- ISO:
- ISO/IEC 15408:
4
- ISO/IEC 18045:
4
- ISO/IEC 17065:
2
- ISO/IEC 9797-:
2
- ISO/IEC 15946-:
6
- ICAO:
|
- CC:
- CCMB-2009-07-001:
2
- CCMB-2009-07-002:
2
- CCMB-2009-07-003:
2
- CCMB-2009-07-004:
2
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES |
5
|
1
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
789441
- pdf_is_encrypted:
False
- pdf_number_of_pages:
29
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate:
D:20211105104643+01'00'
- /Creator:
Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, BDr, Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018"
- /ModDate:
D:20211108154109+01'00'
- /Producer:
LibreOffice 6.3
- /Subject: Bundesdruckerei Document Application withtamper-evident casing
- /Title:
Certification Report BSI-DSZ-CC-1181-2021
- pdf_hyperlinks:
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte
|
- pdf_file_size_bytes:
539980
- pdf_is_encrypted:
True
- pdf_number_of_pages:
36
- /Author:
IPA/JISEC
- /Company: IPA
- /CreationDate:
D:20110725135724+09'00'
- /Creator:
Word 用 Acrobat PDFMaker 8.1
- /Manager: IPA
- /ModDate:
D:20110725135811+09'00'
- /Producer:
Acrobat Distiller 8.3.0 (Windows)
- /Title:
CRP-e
- pdf_hyperlinks:
|
pdf_data/report_metadata//Author |
Bundesamt für Sicherheit in der Informationstechnik
|
IPA/JISEC
|
pdf_data/report_metadata//CreationDate |
D:20211105104643+01'00'
|
D:20110725135724+09'00'
|
pdf_data/report_metadata//Creator |
Writer
|
Word 用 Acrobat PDFMaker 8.1
|
pdf_data/report_metadata//ModDate |
D:20211108154109+01'00'
|
D:20110725135811+09'00'
|
pdf_data/report_metadata//Producer |
LibreOffice 6.3
|
Acrobat Distiller 8.3.0 (Windows)
|
pdf_data/report_metadata//Title |
Certification Report BSI-DSZ-CC-1181-2021
|
CRP-e
|
pdf_data/report_metadata/pdf_file_size_bytes |
789441
|
539980
|
pdf_data/report_metadata/pdf_hyperlinks |
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte |
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
True
|
pdf_data/report_metadata/pdf_number_of_pages |
29
|
36
|
pdf_data/st_filename |
1181b_pdf.pdf
|
c0294_est.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
|
- D:
- D.FUNC:
64
- D.PROT:
3
- D.DOC:
70
- D.CONF:
7
- O:
- O.PROT:
1
- O.AUDIT_STORAGE:
9
- O.AUDIT_ACCESS:
10
- O.CIPHER:
9
- O.DOC:
16
- O.FUNC:
8
- O.CONF:
16
- O.USER:
13
- O.INTERFACE:
8
- O.SOFTWARE:
8
- O.AUDIT:
8
- O.AUDIT_STORAG:
1
- T:
- T.PROT:
1
- T.DOC:
7
- T.CONF:
7
- T.FUNC:
3
- A:
- A.ACCESS:
3
- A.USER:
3
- A.ADMIN:
6
- OE:
- OE.AUDIT_STORAGE:
2
- OE.AUDIT_ACCESS:
2
- OE.PHYSICAL:
2
- OE.USER:
11
- OE.ADMIN:
6
- OE.AUDIT:
3
- OE.INTERFACE:
3
- OE.PHYISCAL:
1
|
pdf_data/st_keywords/cc_claims/A |
|
- A.ACCESS:
3
- A.USER:
3
- A.ADMIN:
6
|
pdf_data/st_keywords/cc_claims/OE |
|
- OE.AUDIT_STORAGE:
2
- OE.AUDIT_ACCESS:
2
- OE.PHYSICAL:
2
- OE.USER:
11
- OE.ADMIN:
6
- OE.AUDIT:
3
- OE.INTERFACE:
3
- OE.PHYISCAL:
1
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0064-V2-2018:
3
- BSI-CC-PP-0064-:
1
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1:
1
- ADV_TDS.2:
1
- AGD:
- ALC:
- ALC_CMC.3:
1
- ALC_DEL.1:
1
- ALC_LCD.1:
1
- ATE:
- ATE_COV.2:
1
- ATE_FUN.1:
1
- AVA:
- AVA_VAN.5:
2
- AVA_VAN.2:
1
- APE:
- ASE:
- ASE_CCL.1:
1
- ASE_INT.1:
1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
|
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.3:
1
- ADV_TDS.2:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_FLR.2:
5
- ALC_CMC.3:
1
- ALC_CMS.3:
1
- ALC_DEL.1:
1
- ALC_DVS.1:
1
- ALC_LCD.1:
1
- ATE:
- ATE_COV.2:
1
- ATE_DPT.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- ASE:
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_ARC.1:
1
- ADV_TDS.2:
1
|
- ADV_ARC.1:
1
- ADV_FSP.3: 1
- ADV_TDS.2:
1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_TDS.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AGD |
|
- AGD_OPE.1:
1
- AGD_PRE.1: 1
|
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_CMC.3:
1
- ALC_DEL.1:
1
- ALC_LCD.1:
1
|
- ALC_FLR.2: 5
- ALC_CMC.3:
1
- ALC_CMS.3: 1
- ALC_DEL.1:
1
- ALC_DVS.1: 1
- ALC_LCD.1:
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC.3 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_LCD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE |
- ASE_CCL.1:
1
- ASE_INT.1:
1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
|
- ASE_CCL.1:
1
- ASE_ECD.1: 1
- ASE_INT.1:
1
- ASE_OBJ.2: 1
- ASE_REQ.2:
1
- ASE_SPD.1: 1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.2:
1
- ATE_FUN.1:
1
|
- ATE_COV.2:
1
- ATE_DPT.1: 1
- ATE_FUN.1:
1
- ATE_IND.2: 1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AVA |
- AVA_VAN.5: 2
- AVA_VAN.2:
1
|
|
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.2 |
1
|
1
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL 3:
4
- EAL4+: 2
- EAL3:
1
|
- EAL3:
2
- EAL 3:
1
- EAL3 augmented: 1
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 3 |
4
|
1
|
pdf_data/st_keywords/cc_security_level/EAL/EAL3 |
1
|
2
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1:
5
- FAU_GEN.1.1:
3
- FAU_GEN.1.2:
2
- FAU_GEN:
1
- FCS:
- FCS_RNG.1:
6
- FCS_COP:
29
- FCS_CKM:
13
- FCS_CKM.1:
15
- FCS_CKM.4:
5
- FCS_CKM.4.1:
1
- FCS_COP.1:
25
- FCS_RNG.1.1:
1
- FCS_RNG.1.2:
1
- FCS_RNG:
3
- FDP:
- FDP_RIP.1:
4
- FDP_RIP.1.1:
1
- FIA:
- FIA_API.1:
6
- FIA_UAU.4:
5
- FIA_API:
1
- FIA_API.1.1:
1
- FIA_UAU.2:
6
- FIA_UAU.2.1:
1
- FIA_UAU.1:
3
- FIA_UAU.4.1:
1
- FIA_UAU.5:
4
- FIA_UAU.5.1:
1
- FIA_UAU.5.2:
1
- FIA_UAU.6:
4
- FIA_UAU.6.1:
1
- FIA_UID.2:
6
- FIA_UID.2.1:
1
- FIA_UID.1:
2
- FMT:
- FMT_MTD:
22
- FMT_MTD.1:
5
- FMT_SMF.1:
7
- FMT_SMF.1.1:
1
- FMT_SMR.1:
5
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FTP:
- FTP_TRP:
4
- FTP_TRP.1:
3
- FTP_TRP.1.2:
1
|
- FAU:
- FAU_GEN:
1
- FAU_GEN.1:
15
- FAU_GEN.2:
7
- FAU_SAR.1:
10
- FAU_SAR.2:
7
- FAU_STG.1:
11
- FAU_STG.4:
7
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2.1:
1
- FAU_SAR:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3:
1
- FAU_STG.4.1:
1
- FAU_STG:
1
- FCS:
- FCS_CKM.1:
12
- FCS_COP.1:
9
- FCS_CKM.2:
1
- FCS_CKM.4:
2
- FCS_CKM.1.1:
1
- FCS_COP.1.1:
1
- FCS_CKM:
1
- FCS_COP:
1
- FDP:
- FDP_ACC:
4
- FDP_IFF:
1
- FDP_IFC:
1
- FDP_ACC.1:
97
- FDP_ACF.1:
90
- FDP_RIP.1:
9
- FDP_ITC.1:
1
- FDP_ITC.2:
1
- FDP_ACC.1.1:
8
- FDP_ACF.1.1:
8
- FDP_ACF.1.2:
8
- FDP_ACF.1.3:
8
- FDP_ACF.1.4:
8
- FDP_RIP.1.1:
1
- FDP_IFC.1:
8
- FIA:
- FIA_AFL.1:
35
- FIA_ATD.1:
11
- FIA_SOS.1:
6
- FIA_UAU.1:
18
- FIA_UAU.7:
8
- FIA_UID.1:
23
- FIA_USB.1:
7
- FIA_AFL.1.1:
4
- FIA_AFL.1.2:
4
- FIA_ATD.1.1:
1
- FIA_SOS.1.1:
1
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.7.1:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FMT:
- FMT_SMR.1:
43
- FMT_MOF.1:
10
- FMT_MSA.1:
88
- FMT_MSA.3:
90
- FMT_MTD.1:
21
- FMT_SMF.1:
37
- FMT_MOF.1.1:
1
- FMT_MSA.1.1:
8
- FMT_MSA.3.1:
8
- FMT_MSA.3.2:
8
- FMT_MTD.1.1:
2
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA:
1
- FPT:
- FPT_FDI_EXP:
3
- FPT_FDI_EXP.1:
15
- FPT_FDI_EXP.1.1:
2
- FPT_STM.1:
9
- FPT_TST.1:
9
- FPT_STM.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FTA:
- FTA_SSL.3:
10
- FTA_SSL.3.1:
1
- FTP:
- FTP_ITC.1:
12
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_GEN.1:
5
- FAU_GEN.1.1:
3
- FAU_GEN.1.2:
2
- FAU_GEN:
1
|
- FAU_GEN:
1
- FAU_GEN.1:
15
- FAU_GEN.2: 7
- FAU_SAR.1: 10
- FAU_SAR.2: 7
- FAU_STG.1: 11
- FAU_STG.4: 7
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2.1: 1
- FAU_SAR: 1
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2.1: 1
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4.1: 1
- FAU_STG: 1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 |
5
|
15
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1.1 |
3
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1.2 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_RNG.1: 6
- FCS_COP:
29
- FCS_CKM:
13
- FCS_CKM.1:
15
- FCS_CKM.4:
5
- FCS_CKM.4.1: 1
- FCS_COP.1:
25
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FCS_RNG: 3
|
- FCS_CKM.1:
12
- FCS_COP.1:
9
- FCS_CKM.2: 1
- FCS_CKM.4:
2
- FCS_CKM.1.1: 1
- FCS_COP.1.1: 1
- FCS_CKM:
1
- FCS_COP:
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM |
13
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
15
|
12
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
5
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP |
29
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
25
|
9
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_RIP.1:
4
- FDP_RIP.1.1:
1
|
- FDP_ACC: 4
- FDP_IFF: 1
- FDP_IFC: 1
- FDP_ACC.1: 97
- FDP_ACF.1: 90
- FDP_RIP.1:
9
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_ACC.1.1: 8
- FDP_ACF.1.1: 8
- FDP_ACF.1.2: 8
- FDP_ACF.1.3: 8
- FDP_ACF.1.4: 8
- FDP_RIP.1.1:
1
- FDP_IFC.1: 8
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 |
4
|
9
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_API.1: 6
- FIA_UAU.4: 5
- FIA_API: 1
- FIA_API.1.1: 1
- FIA_UAU.2: 6
- FIA_UAU.2.1: 1
- FIA_UAU.1:
3
- FIA_UAU.4.1: 1
- FIA_UAU.5: 4
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 4
- FIA_UAU.6.1: 1
- FIA_UID.2: 6
- FIA_UID.2.1: 1
- FIA_UID.1:
2
|
- FIA_AFL.1: 35
- FIA_ATD.1: 11
- FIA_SOS.1: 6
- FIA_UAU.1:
18
- FIA_UAU.7: 8
- FIA_UID.1:
23
- FIA_USB.1: 7
- FIA_AFL.1.1: 4
- FIA_AFL.1.2: 4
- FIA_ATD.1.1: 1
- FIA_SOS.1.1: 1
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7.1: 1
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
3
|
18
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
2
|
23
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MTD: 22
- FMT_MTD.1:
5
- FMT_SMF.1:
7
- FMT_SMF.1.1:
1
- FMT_SMR.1:
5
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
|
- FMT_SMR.1:
43
- FMT_MOF.1: 10
- FMT_MSA.1: 88
- FMT_MSA.3: 90
- FMT_MTD.1:
21
- FMT_SMF.1:
37
- FMT_MOF.1.1: 1
- FMT_MSA.1.1: 8
- FMT_MSA.3.1: 8
- FMT_MSA.3.2: 8
- FMT_MTD.1.1: 2
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA: 1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
5
|
21
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
7
|
37
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
5
|
43
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
|
- FPT_FDI_EXP:
3
- FPT_FDI_EXP.1:
15
- FPT_FDI_EXP.1.1:
2
- FPT_STM.1:
9
- FPT_TST.1:
9
- FPT_STM.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_TRP:
4
- FTP_TRP.1:
3
- FTP_TRP.1.2:
1
|
- FTP_ITC.1:
12
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
|
pdf_data/st_keywords/certification_process |
|
- ConfidentialDocument:
- When this function is set to [enabled], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. Job Flow A function to enable efficient standard:
1
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256:
2
- P-384:
1
- NIST P-384:
1
- secp384r1:
3
- secp256r1:
1
- secp521r1:
1
- prime256v1:
2
- Brainpool:
- brainpoolP224r1:
1
- brainpoolP256r1:
2
- brainpoolP384r1:
2
- brainpoolP512r1:
2
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function/SHA |
- SHA1:
- SHA2:
- SHA-256:
5
- SHA-224:
2
- SHA-384:
2
- SHA-512:
2
- SHA256:
2
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 |
7
|
10
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.DG1:
2
- EF.DG2:
1
- EF.DG3:
2
- EF.DG4:
2
- EF.DG5:
1
- EF.DG16:
2
- EF.DG13:
1
- EF.COM:
2
- EF.SOD:
2
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-4:
2
- FIPS186-4:
3
- FIPS180-4:
3
- FIPS186-2:
2
- FIPS197:
2
- FIPS 186-2:
1
- FIPS 186-4:
1
- FIPS PUB 197:
1
- BSI:
- RFC:
- ISO:
- ISO/IEC 14443:
2
- ISO/IEC 7816-4:
1
- ICAO:
|
- FIPS:
- RFC:
- X509:
- CC:
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
- CCMB-2009-07-004:
1
|
pdf_data/st_keywords/standard_id/FIPS |
- FIPS 180-4: 2
- FIPS186-4: 3
- FIPS180-4: 3
- FIPS186-2: 2
- FIPS197: 2
- FIPS 186-2: 1
- FIPS 186-4: 1
- FIPS PUB 197:
1
|
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 197 |
1
|
1
|
pdf_data/st_keywords/standard_id/RFC |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
8
|
7
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES |
4
|
3
|
pdf_data/st_keywords/symmetric_crypto/DES/DES |
|
|
pdf_data/st_keywords/symmetric_crypto/constructions/MAC |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA:
1
- TLS_RSA_WITH_AES_256_CBC_SHA:
1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
1655411
- pdf_is_encrypted:
False
- pdf_number_of_pages:
92
- /Title:
Bundesdruckerei Document Application Common Criteria Evaluation
- /Author:
Alexander Haferland
- /Subject: Security Target
- /Keywords: CC, ST, Common Criteria, Security Target, Inspection System, PA, eAT, ePass
- /Creator:
Microsoft® Word 2016
- /CreationDate:
D:20210909141650+02'00'
- /ModDate:
D:20210909141650+02'00'
- /Producer:
Microsoft® Word 2016
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
1275224
- pdf_is_encrypted:
False
- pdf_number_of_pages:
138
- /ModDate:
D:20110715161232+09'00'
- /CreationDate:
D:20110715161232+09'00'
- /Title:
Microsoft Word - C0294_ST_e.doc
- /Creator:
PScript5.dll Version 5.2.2
- /Producer:
Acrobat Distiller 6.0 (Windows)
- /Author:
- pdf_hyperlinks:
|
pdf_data/st_metadata//Author |
Alexander Haferland
|
|
pdf_data/st_metadata//CreationDate |
D:20210909141650+02'00'
|
D:20110715161232+09'00'
|
pdf_data/st_metadata//Creator |
Microsoft® Word 2016
|
PScript5.dll Version 5.2.2
|
pdf_data/st_metadata//ModDate |
D:20210909141650+02'00'
|
D:20110715161232+09'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Word 2016
|
Acrobat Distiller 6.0 (Windows)
|
pdf_data/st_metadata//Title |
Bundesdruckerei Document Application Common Criteria Evaluation
|
Microsoft Word - C0294_ST_e.doc
|
pdf_data/st_metadata/pdf_file_size_bytes |
1655411
|
1275224
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
92
|
138
|
dgst |
4be309edc35f4fe0
|
b12c1b95b13a9e98
|