name |
Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.4.6; (Firmware Vers. 1.3.28, HW Vers. 0)
|
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6
|
category |
Other Devices and Systems
|
Data Protection
|
not_valid_before |
2021-10-27
|
2014-11-07
|
not_valid_after |
2026-10-27
|
2019-11-08
|
scheme |
DE
|
DE
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1181b_pdf.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772b_pdf.pdf
|
status |
active
|
archived
|
manufacturer |
Bundesdruckerei GmbH
|
Kanguru Solutions
|
manufacturer_web |
https://www.bundesdruckerei.de
|
https://www.kanguru.com
|
security_level |
EAL3 |
ALC_FLR.1, EAL2+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1181a_pdf.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772a_pdf.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1181c_pdf.pdf
|
None
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Common Criteria Protection Profile for Inspection Systems, Version 1.01', 'pp_eal': 'EAL3', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0064b_pdf.pdf', 'pp_ids': None}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Schutzprofil fur USB-Datentrager, Version 1.4', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0025b.pdf', 'pp_ids': frozenset({'SCHUTZPROFIL_USB-DATENTRAGER_V1.4'})}) |
maintenance_updates |
|
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2015, 1, 20), 'maintenance_title': 'Kanguru Defender Elite 200 and Kanguru Defender 2000, firmware version 2.05.10', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1b_pdf.pdf'}) |
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
True
|
False
|
state/cert/download_ok |
True
|
False
|
state/cert/extract_ok |
True
|
False
|
state/cert/pdf_hash |
1d1da873337d138b0ce159c51f7fc3f45aea16dacbef34f16374d7f8dd3befeb
|
None
|
state/cert/txt_hash |
161cdda16fc7ceeeece0cac20018bc62852a0dc306cef4c926c298d188e93699
|
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
d3ea8b3a54f1a6190f13ab86f446e8b7e15be4eded087aa62a93c32ef1ae605e
|
16e52e72927a5eee7124e6fde0c186c1d3d113e733e6116f5fdfcc44278c5b57
|
state/report/txt_hash |
16b19318b760c2523599b16c51cb8e6d75035a47f9e45dc109e05a5b4c3a2a94
|
8cb2309bdc02367be25c3961b565d25c9f78b2d7cdce20c08213092f4a2eff82
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
b5d8d8bd31c47186afa41397f8292f0505452c5fe1535badb9f14d7cf3633326
|
077d27d1e2e9eafc65cbb9d302bc66883e2dd06e21ea816741ca25fe7f7dcd7d
|
state/st/txt_hash |
c1790a04de2ab290cfb648c47203c9abebed53098d5bfcc4ad767546369e112b
|
74714db4c60a8332c3603aaae83a1c8ec3cbea7950400f562332e8ccdcc98147
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
BSI-DSZ-CC-1181-2021
|
BSI-DSZ-CC-0772-2014
|
heuristics/cert_lab |
BSI |
BSI |
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
2.4.6, 1.3.28 |
2.0.0.0, 1.2.1.8, 3.2.0.3, 02.03.10, 5.0.2.6 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
BSI-DSZ-CC-1215-2023 |
None
|
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1161-2020 |
None
|
heuristics/report_references/indirectly_referenced_by |
BSI-DSZ-CC-1215-2023 |
None
|
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-1161-2020, BSI-DSZ-CC-1093, BSI-DSZ-CC-1125-2019 |
None
|
heuristics/scheme_data |
- cert_id:
BSI-DSZ-CC-1181-2021
- product:
Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.4.6; (Firmware Vers. 1.3.28, …
- vendor:
Bundesdruckerei GmbH
- certification_date:
27.10.2021
- category:
Electronic ID documents
- url:
https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Hoheitliche_Dokumente-Software_mit_Hardware/1181.html
- enhanced:
- product:
Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.4.6; (Firmware Vers. 1.3.28, HW Vers. 0)
- applicant:
Bundesdruckerei GmbH
Kommandantenstraße 18
10969 Berlin
- evaluation_facility:
TÜV Informationstechnik GmbH
- assurance_level:
EAL3
- protection_profile:
Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018, Version: 2.0, 2018-06-06, Federal Office for Information Security (BSI)
- certification_date:
27.10.2021
- expiration_date:
26.10.2026
- entries:
frozendict({'id': 'BSI-DSZ-CC-1181-2021-MA-02 (Ausstellungsdatum / Certification Date 23.05.2022)', 'description': '"Rest of the terminal firmware (including the Operating System)"'}), frozendict({'id': 'BSI-DSZ-CC-1181-2021-MA-01 (Ausstellungsdatum / Certification Date 09.03.2022)', 'description': 'Vers. 0) was changed due to an update of the Rest of the terminal firmware (including the Operating System). Configuration Management procedures required a change in the product identifier. Therefore the version number of the Firmware changed from 1.3.28 to 1.4.8. The changes also cover an minor update of the user guidance related to this version number.'}), frozendict({'id': 'BSI-DSZ-CC-1181-2021', 'description': 'Certificate'})
- report_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1181a_pdf.pdf?__blob=publicationFile&v=2
- target_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1181b_pdf.pdf?__blob=publicationFile&v=2
- cert_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1181c_pdf.pdf?__blob=publicationFile&v=2
- description:
The Target of Evaluation (TOE) is the Bundesdruckerei Document Application with tamper-evident casing 2.4.6.
The Document Application is running on a Document Management Terminal (DMT). It is used to read the German Passport (ePass), to read and update the electronic data of the German identification card (“Personalausweis (PA)”) and electronic resident permit (“elektronischer Aufenthaltstitel (eAT)”) as well as to verify the document’s authenticity and the integrity of its data.
The TOE is operated by governmental organisations, e.g. municipal office, police, government or other state approved agencies. The TOE is specifically applied in registration offices to allow card holders to verify that their ePass, PA or eAT is working correctly. In case of PA and eAT it is further possible to update the address information of the card holder, the card holder’s PIN for eID applications, and the community ID (“Gemeindeschlüssel”). In addition, the eID application functionality of the PA or eAT can be activated or deactivated. Additionally the TOE ensures secure communication to external control software and provides a tamper-evident enclosure.
Necessary protocols for the communication of the TOE with the electronic identity documents like the ePass, PA or eAT are described in [ICAO_9303], [TR-03110-1], [TR-03110-2], and [TR-03110-3].
- subcategory:
Software with hardware
|
None
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
1181c_pdf.pdf
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
- cc_cert_id:
- cc_protection_profile_id:
- cc_security_level:
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- ISO:
- ISO/IEC 15408:
2
- ISO/IEC 18045:
2
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
None
|
pdf_data/cert_metadata |
- pdf_file_size_bytes:
244679
- pdf_is_encrypted:
False
- pdf_number_of_pages:
1
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate:
D:20211104084818+01'00'
- /Creator:
Writer
- /Keywords:
"Common Criteria, Certification, Zertifizierung, BDr, Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018"
- /ModDate:
D:20211108192831+01'00'
- /Producer:
LibreOffice 6.3
- /Subject:
Bundesdruckerei Document Application withtamper-evident casing
- /Title:
Certification Report BSI-DSZ-CC-1181-2021
- pdf_hyperlinks:
|
None
|
pdf_data/report_filename |
1181a_pdf.pdf
|
0772a_pdf.pdf
|
pdf_data/report_frontpage/DE |
- match_rules:
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
- cert_id:
BSI-DSZ-CC-1181-2021
- cert_item:
Bundesdruckerei Document Application with tamper-evident casing Document Application Version 2.4.6; (Firmware Vers. 1.3.28, HW Vers. 0
- developer:
Bundesdruckerei GmbH
- cert_lab:
BSI
- ref_protection_profiles: Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064- V2-2018, Version: 2.0, 2018-06-06, Federal Office for Information Security (BSI
- cc_version: PP conformant Common Criteria Part 2 extended
- cc_security_level: Common Criteria Part 3 conformant EAL 3
|
- match_rules:
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
- cert_id:
BSI-DSZ-CC-0772-2014
- cert_item:
Kanguru Defender Elite 200 Kanguru Defender 2000 Universal Kanguru Local Administrator, v3.2.0.3 Kanguru Remote Management Console, v5.0.2.6
- developer:
Kanguru Solutions
- cert_lab:
BSI
|
pdf_data/report_frontpage/DE/cert_id |
BSI-DSZ-CC-1181-2021
|
BSI-DSZ-CC-0772-2014
|
pdf_data/report_frontpage/DE/cert_item |
Bundesdruckerei Document Application with tamper-evident casing Document Application Version 2.4.6; (Firmware Vers. 1.3.28, HW Vers. 0
|
Kanguru Defender Elite 200 Kanguru Defender 2000 Universal Kanguru Local Administrator, v3.2.0.3 Kanguru Remote Management Console, v5.0.2.6
|
pdf_data/report_frontpage/DE/cert_lab |
BSI
|
BSI
|
pdf_data/report_frontpage/DE/developer |
Bundesdruckerei GmbH
|
Kanguru Solutions
|
pdf_data/report_frontpage/DE/match_rules |
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*) |
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*) |
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/DE |
- BSI-DSZ-CC-1181-2021:
15
- BSI-DSZ-CC-1161-:
1
- BSI-DSZ-CC-1161-2020:
2
- BSI-DSZ-CC-1181:
1
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
- BSI-CC-PP-0064-:
1
- BSI-CC-PP-0064-V2-2018:
3
|
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.1:
1
- ADV_FSP.2:
1
- ADV_FSP.3:
1
- ADV_FSP.4:
1
- ADV_FSP.5:
1
- ADV_FSP.6:
1
- ADV_IMP.1:
1
- ADV_IMP.2:
1
- ADV_INT.1:
1
- ADV_INT.2:
1
- ADV_INT.3:
1
- ADV_SPM.1:
1
- ADV_TDS.1:
1
- ADV_TDS.2:
1
- ADV_TDS.3:
1
- ADV_TDS.4:
1
- ADV_TDS.5:
1
- ADV_TDS.6:
1
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- AGD_OPE:
1
- AGD_PRE:
1
- ALC:
- ALC_FLR.1:
5
- ALC_FLR:
3
- ALC_CMC.1:
1
- ALC_CMC.2:
1
- ALC_CMC.3:
1
- ALC_CMC.4:
1
- ALC_CMC.5:
1
- ALC_CMS.1:
1
- ALC_CMS.2:
1
- ALC_CMS.3:
1
- ALC_CMS.4:
1
- ALC_CMS.5:
1
- ALC_DEL.1:
1
- ALC_DVS.1:
1
- ALC_DVS.2:
1
- ALC_FLR.2:
1
- ALC_FLR.3:
1
- ALC_LCD.1:
1
- ALC_LCD.2:
1
- ALC_TAT.1:
1
- ALC_TAT.2:
1
- ALC_TAT.3:
1
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
- ATE:
- ATE_COV.1:
2
- ATE_COV.2:
1
- ATE_COV.3:
1
- ATE_DPT.1:
1
- ATE_DPT.2:
1
- ATE_DPT.3:
1
- ATE_DPT.4:
1
- ATE_FUN.1:
1
- ATE_FUN.2:
1
- ATE_IND.1:
1
- ATE_IND.2:
1
- ATE_IND.3:
1
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- AVA_VAN.1:
1
- AVA_VAN.2:
1
- AVA_VAN.3:
1
- AVA_VAN.4:
1
- AVA_VAN.5:
1
- AVA_VAN:
2
- APE:
- APE_INT.1:
1
- APE_CCL.1:
1
- APE_SPD.1:
1
- APE_OBJ.1:
1
- APE_OBJ.2:
1
- APE_ECD.1:
1
- APE_REQ.1:
1
- APE_REQ.2:
1
- ASE:
- ASE_INT.1:
1
- ASE_CCL.1:
1
- ASE_SPD.1:
1
- ASE_OBJ.1:
1
- ASE_OBJ.2:
1
- ASE_ECD.1:
1
- ASE_REQ.1:
1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
- ASE_TSS.2:
1
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_sar/ADV |
|
- ADV_ARC.1: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM.1: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- ADV_ARC:
1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_ARC |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC |
|
- ALC_FLR.1: 5
- ALC_FLR:
3
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 1
- ALC_LCD.2: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_TAT: 1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
3
|
3
|
pdf_data/report_keywords/cc_sar/ATE |
|
- ATE_COV.1: 2
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN:
1
- ATE_IND:
1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_FUN |
1
|
1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_IND |
5
|
1
|
pdf_data/report_keywords/cc_sar/AVA |
|
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 1
- AVA_VAN:
2
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN |
2
|
2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 3:
4
- EAL 2:
2
- EAL 1:
1
- EAL 4:
1
- EAL 2+:
1
|
- EAL:
- EAL 2:
8
- EAL 1:
7
- EAL 4:
7
- EAL2:
2
- EAL 3:
4
- EAL 5:
6
- EAL 6:
3
- EAL 7:
4
- EAL 2 augmented:
3
- ITSEC:
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 3:
4
- EAL 2:
2
- EAL 1:
1
- EAL 4:
1
- EAL 2+: 1
|
- EAL 2:
8
- EAL 1:
7
- EAL 4:
7
- EAL2: 2
- EAL 3:
4
- EAL 5: 6
- EAL 6: 3
- EAL 7: 4
- EAL 2 augmented: 3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 |
1
|
7
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 2 |
2
|
8
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 3 |
4
|
4
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 |
1
|
7
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FIA:
- FIA_UAU.4:
1
- FIA_UAU.5:
1
- FIA_UAU.6:
1
- FIA_API.1:
1
- FIA_UAU.2:
1
- FIA_UID.2:
1
- FMT:
- FMT_SMR.1:
1
- FMT_SMF.1:
1
- FMT_MTD:
3
- FPT:
- FTP:
|
- FCS:
- FCS_COP.1:
1
- FCS_CKM.1:
1
- FCS_RNG.1:
1
- FDP:
- FDP_ACC.1:
2
- FDP_ACF.1:
2
- FIA:
- FIA_UID.2:
4
- FIA_UAU.2:
4
- FIA_UAU.6:
1
- FIA_SOS.1:
1
- FMT:
- FMT_MTD:
2
- FMT_SMF:
2
- FMT_SMF.1:
1
|
pdf_data/report_keywords/cc_sfr/FIA |
- FIA_UAU.4: 1
- FIA_UAU.5: 1
- FIA_UAU.6:
1
- FIA_API.1: 1
- FIA_UAU.2:
1
- FIA_UID.2:
1
|
- FIA_UID.2:
4
- FIA_UAU.2:
4
- FIA_UAU.6:
1
- FIA_SOS.1: 1
|
pdf_data/report_keywords/cc_sfr/FIA/FIA_UAU.2 |
1
|
4
|
pdf_data/report_keywords/cc_sfr/FIA/FIA_UAU.6 |
1
|
1
|
pdf_data/report_keywords/cc_sfr/FIA/FIA_UID.2 |
1
|
4
|
pdf_data/report_keywords/cc_sfr/FMT |
- FMT_SMR.1: 1
- FMT_SMF.1:
1
- FMT_MTD:
3
|
- FMT_MTD:
2
- FMT_SMF: 2
- FMT_SMF.1:
1
|
pdf_data/report_keywords/cc_sfr/FMT/FMT_MTD |
3
|
2
|
pdf_data/report_keywords/cc_sfr/FMT/FMT_SMF.1 |
1
|
1
|
pdf_data/report_keywords/certification_process/ConfidentialDocument |
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification:
1
- Evaluation Technical Report, Version 1, 2021-10-11, BSI-DSZ-CC-1181, TÜV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile for Document Management Terminal DMT-PP:
1
- Security (BSI) [9] Configuration list for the TOE, Version 1.37, 2021-09-29, Bundesdruckerei GmbH (confidential document) [10] Guidance documentation for the TOE, Version 1.195, 2021-09-17, VISOTEC® V- ÄNDERUNGSTERMINAL:
1
|
- Report, Version 8, 2014-10-07, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [9] Evaluated Product User Guide, Version 1.20, 2014-10-02 [10] Kanguru Defender Elite 200 User:
1
- KRMC Administrator's User Manual, Version 5.0.2, 2013-11-01 [14] Configuration lists for the TOE (confidential documents): a) Configuration list for TOE executables, 2014-09-17 b) Configuration list from Phison:
1
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik:
3
|
|
pdf_data/report_keywords/hash_function/SHA |
- SHA1:
- SHA2:
- SHA256:
10
- SHA384:
6
- SHA512:
1
- SHA224:
1
|
|
pdf_data/report_keywords/hash_function/SHA/SHA2 |
- SHA256:
10
- SHA384:
6
- SHA512:
1
- SHA224:
1
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness/RNG/RNG |
6
|
2
|
pdf_data/report_keywords/side_channel_analysis/FI/physical tampering |
4
|
2
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS186-2:
6
- FIPS180-4:
8
- FIPS PUB 46-3:
2
- FIPS 197:
8
- FIPS186-4:
1
- FIPS197:
1
- BSI:
- AIS 48:
1
- AIS 20:
1
- AIS 32:
1
- AIS 38:
1
- RFC:
- ISO:
- ISO/IEC 15408:
4
- ISO/IEC 18045:
4
- ISO/IEC 17065:
2
- ISO/IEC 9797-:
2
- ISO/IEC 15946-:
6
- ICAO:
|
- BSI:
- ISO:
- ISO/IEC 17065:
2
- ISO/IEC 15408:
2
- ISO/IEC 18045:
2
|
pdf_data/report_keywords/standard_id/BSI |
- AIS 48: 1
- AIS 20:
1
- AIS 32:
1
- AIS 38: 1
|
|
pdf_data/report_keywords/standard_id/BSI/AIS 20 |
1
|
2
|
pdf_data/report_keywords/standard_id/BSI/AIS 32 |
1
|
1
|
pdf_data/report_keywords/standard_id/ISO |
- ISO/IEC 15408:
4
- ISO/IEC 18045:
4
- ISO/IEC 17065:
2
- ISO/IEC 9797-: 2
- ISO/IEC 15946-: 6
|
- ISO/IEC 17065:
2
- ISO/IEC 15408:
2
- ISO/IEC 18045:
2
|
pdf_data/report_keywords/standard_id/ISO/ISO/IEC 15408 |
4
|
2
|
pdf_data/report_keywords/standard_id/ISO/ISO/IEC 17065 |
2
|
2
|
pdf_data/report_keywords/standard_id/ISO/ISO/IEC 18045 |
4
|
2
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES |
|
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES |
5
|
4
|
pdf_data/report_keywords/technical_report_id/BSI |
|
- BSI TR-02102: 1
- BSI 7138: 2
- BSI 7125: 2
- BSI 7148:
1
|
pdf_data/report_keywords/technical_report_id/BSI/BSI 7148 |
1
|
1
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata//Author |
Bundesamt für Sicherheit in der Informationstechnik
|
Bundesamt für Sicherheit in der Informationstechnik
|
pdf_data/report_metadata//CreationDate |
D:20211105104643+01'00'
|
D:20141121083051+01'00'
|
pdf_data/report_metadata//Creator |
Writer
|
Writer
|
pdf_data/report_metadata//Keywords |
"Common Criteria, Certification, Zertifizierung, BDr, Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018"
|
"Common Criteria, Certification, Zertifizierung, encrypted USB storage device, Kanguru Defender"
|
pdf_data/report_metadata//ModDate |
D:20211108154109+01'00'
|
D:20141121113713+01'00'
|
pdf_data/report_metadata//Producer |
LibreOffice 6.3
|
LibreOffice 4.2
|
pdf_data/report_metadata//Subject |
Bundesdruckerei Document Application withtamper-evident casing
|
Common Criteria Certification
|
pdf_data/report_metadata//Title |
Certification Report BSI-DSZ-CC-1181-2021
|
Certification Report BSI-DSZ-CC-0772-2014
|
pdf_data/report_metadata/pdf_file_size_bytes |
789441
|
1643286
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
29
|
42
|
pdf_data/st_filename |
1181b_pdf.pdf
|
0772b_pdf.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id/DE |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
- BSI-CC-PP-0064-V2-2018:
3
- BSI-CC-PP-0064-:
1
|
- BSI-PP-0025:
6
- BSI-PP- 0025:
13
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1:
1
- ADV_TDS.2:
1
- AGD:
- ALC:
- ALC_CMC.3:
1
- ALC_DEL.1:
1
- ALC_LCD.1:
1
- ATE:
- ATE_COV.2:
1
- ATE_FUN.1:
1
- AVA:
- AVA_VAN.5:
2
- AVA_VAN.2:
1
- APE:
- ASE:
- ASE_CCL.1:
1
- ASE_INT.1:
1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
|
- ADV:
- ADV_SPM.1:
2
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_TDS.1:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_FLR.1:
5
- ALC_CMC.2:
1
- ALC_CMS.2:
1
- ALC_DEL.1:
1
- ATE:
- ATE_COV.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- ASE:
- ASE_INT.1:
1
- ASE_CCL.1:
1
- ASE_SPD.1:
1
- ASE_OBJ.2:
1
- ASE_ECD.1:
1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_ARC.1:
1
- ADV_TDS.2: 1
|
- ADV_SPM.1: 2
- ADV_ARC.1:
1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AGD |
|
- AGD_OPE.1:
1
- AGD_PRE.1: 1
|
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_CMC.3: 1
- ALC_DEL.1:
1
- ALC_LCD.1: 1
|
- ALC_FLR.1: 5
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1:
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE |
- ASE_CCL.1:
1
- ASE_INT.1:
1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
|
- ASE_INT.1:
1
- ASE_CCL.1:
1
- ASE_SPD.1: 1
- ASE_OBJ.2: 1
- ASE_ECD.1: 1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.2: 1
- ATE_FUN.1:
1
|
- ATE_COV.1: 1
- ATE_FUN.1:
1
- ATE_IND.2: 1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AVA |
- AVA_VAN.5: 2
- AVA_VAN.2:
1
|
|
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.2 |
1
|
1
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL 3:
4
- EAL4+:
2
- EAL3:
1
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1:
5
- FAU_GEN.1.1:
3
- FAU_GEN.1.2:
2
- FAU_GEN:
1
- FCS:
- FCS_RNG.1:
6
- FCS_COP:
29
- FCS_CKM:
13
- FCS_CKM.1:
15
- FCS_CKM.4:
5
- FCS_CKM.4.1:
1
- FCS_COP.1:
25
- FCS_RNG.1.1:
1
- FCS_RNG.1.2:
1
- FCS_RNG:
3
- FDP:
- FDP_RIP.1:
4
- FDP_RIP.1.1:
1
- FIA:
- FIA_API.1:
6
- FIA_UAU.4:
5
- FIA_API:
1
- FIA_API.1.1:
1
- FIA_UAU.2:
6
- FIA_UAU.2.1:
1
- FIA_UAU.1:
3
- FIA_UAU.4.1:
1
- FIA_UAU.5:
4
- FIA_UAU.5.1:
1
- FIA_UAU.5.2:
1
- FIA_UAU.6:
4
- FIA_UAU.6.1:
1
- FIA_UID.2:
6
- FIA_UID.2.1:
1
- FIA_UID.1:
2
- FMT:
- FMT_MTD:
22
- FMT_MTD.1:
5
- FMT_SMF.1:
7
- FMT_SMF.1.1:
1
- FMT_SMR.1:
5
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FTP:
- FTP_TRP:
4
- FTP_TRP.1:
3
- FTP_TRP.1.2:
1
|
- FAU:
- FCS:
- FCS_RNG.1:
15
- FCS_CKM.1:
9
- FCS_CKM.4:
9
- FCS_COP.1:
9
- FCS_RNG:
2
- FCS_RNG.1.1:
3
- FCS_RNG.1.2:
3
- FCS_CKM.1.1:
1
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
1
- FCS_CKM.2:
1
- FDP:
- FDP_ACC.1:
14
- FDP_ACF.1:
13
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_ITC.1:
2
- FDP_ITC.2:
2
- FDP_IFC.1:
1
- FIA:
- FIA_UAU.1:
7
- FIA_UAU.6:
8
- FIA_SOS.1:
8
- FIA_UAU.2:
9
- FIA_UID.2:
10
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.6.1:
1
- FIA_SOS.1.1:
1
- FIA_UAU.2.1:
1
- FIA_UID.2.1:
1
- FIA_UID.1:
2
- FMT:
- FMT_MSA.1:
8
- FMT_MTD:
12
- FMT_SMF:
20
- FMT_SMR.1:
12
- FMT_SMF.1:
6
- FMT_MTD.1:
3
- FMT_MSA.1.1:
1
- FMT_MTD.1.1:
2
- FMT_SMF.1.1:
2
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA.3:
1
- FPT:
- FPT_FLS.1:
9
- FPT_RCV.4:
8
- FPT_PHP.1:
8
- FPT_RCV.4.1:
2
- FPT_FLS.1.1:
1
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_GEN.1: 5
- FAU_GEN.1.1: 3
- FAU_GEN.1.2: 2
- FAU_GEN:
1
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_RNG.1:
6
- FCS_COP: 29
- FCS_CKM: 13
- FCS_CKM.1:
15
- FCS_CKM.4:
5
- FCS_CKM.4.1:
1
- FCS_COP.1:
25
- FCS_RNG.1.1:
1
- FCS_RNG.1.2:
1
- FCS_RNG:
3
|
- FCS_RNG.1:
15
- FCS_CKM.1:
9
- FCS_CKM.4:
9
- FCS_COP.1:
9
- FCS_RNG:
2
- FCS_RNG.1.1:
3
- FCS_RNG.1.2:
3
- FCS_CKM.1.1: 1
- FCS_CKM.4.1:
1
- FCS_COP.1.1: 1
- FCS_CKM.2: 1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
15
|
9
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
5
|
9
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
25
|
9
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG |
3
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 |
6
|
15
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.1 |
1
|
3
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.2 |
1
|
3
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_RIP.1:
4
- FDP_RIP.1.1:
1
|
- FDP_ACC.1:
14
- FDP_ACF.1:
13
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_ITC.1:
2
- FDP_ITC.2:
2
- FDP_IFC.1:
1
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_API.1: 6
- FIA_UAU.4: 5
- FIA_API: 1
- FIA_API.1.1: 1
- FIA_UAU.2:
6
- FIA_UAU.2.1:
1
- FIA_UAU.1:
3
- FIA_UAU.4.1: 1
- FIA_UAU.5: 4
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6:
4
- FIA_UAU.6.1:
1
- FIA_UID.2:
6
- FIA_UID.2.1:
1
- FIA_UID.1:
2
|
- FIA_UAU.1:
7
- FIA_UAU.6:
8
- FIA_SOS.1: 8
- FIA_UAU.2:
9
- FIA_UID.2:
10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.6.1:
1
- FIA_SOS.1.1: 1
- FIA_UAU.2.1:
1
- FIA_UID.2.1:
1
- FIA_UID.1:
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
3
|
7
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.2 |
6
|
9
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.6 |
4
|
8
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.6.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 |
6
|
10
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MTD:
22
- FMT_MTD.1:
5
- FMT_SMF.1:
7
- FMT_SMF.1.1:
1
- FMT_SMR.1:
5
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
|
- FMT_MSA.1: 8
- FMT_MTD:
12
- FMT_SMF: 20
- FMT_SMR.1:
12
- FMT_SMF.1:
6
- FMT_MTD.1:
3
- FMT_MSA.1.1: 1
- FMT_MTD.1.1: 2
- FMT_SMF.1.1:
2
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA.3: 1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD |
22
|
12
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
5
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
7
|
6
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
5
|
12
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
|
- FPT_FLS.1: 9
- FPT_RCV.4: 8
- FPT_PHP.1:
8
- FPT_RCV.4.1: 2
- FPT_FLS.1.1: 1
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.1 |
2
|
8
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- Out of scope:
2
- 11 1.5.4.3 Out of scope :
1
- 11 1.5.4.3 Out of scope ........................................................................................... 12 1.5:
1
- from the KRMC to the device. Commands are queued at the KRMC until polled form the device. 1.5.4.3 Out of scope The TOE supports additional features that are not part of the scope: ● Antivirus solution ●:
1
|
pdf_data/st_keywords/cipher_mode/CBC/CBC |
4
|
1
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256:
2
- P-384:
1
- NIST P-384:
1
- secp384r1:
3
- secp256r1:
1
- secp521r1:
1
- prime256v1:
2
- Brainpool:
- brainpoolP224r1:
1
- brainpoolP256r1:
2
- brainpoolP384r1:
2
- brainpoolP512r1:
2
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function/SHA |
- SHA1:
- SHA2:
- SHA-256:
5
- SHA-224:
2
- SHA-384:
2
- SHA-512:
2
- SHA256:
2
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
- SHA-256:
5
- SHA-224: 2
- SHA-384: 2
- SHA-512: 2
- SHA256: 2
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 |
5
|
1
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.DG1:
2
- EF.DG2:
1
- EF.DG3:
2
- EF.DG4:
2
- EF.DG5:
1
- EF.DG16:
2
- EF.DG13:
1
- EF.COM:
2
- EF.SOD:
2
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness/RNG/RNG |
25
|
14
|
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering |
5
|
3
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-4:
2
- FIPS186-4:
3
- FIPS180-4:
3
- FIPS186-2:
2
- FIPS197:
2
- FIPS 186-2:
1
- FIPS 186-4:
1
- FIPS PUB 197:
1
- BSI:
- RFC:
- ISO:
- ISO/IEC 14443:
2
- ISO/IEC 7816-4:
1
- ICAO:
|
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
8
|
3
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
1655411
- pdf_is_encrypted:
False
- pdf_number_of_pages:
92
- /Title:
Bundesdruckerei Document Application Common Criteria Evaluation
- /Author:
Alexander Haferland
- /Subject:
Security Target
- /Keywords:
CC, ST, Common Criteria, Security Target, Inspection System, PA, eAT, ePass
- /Creator:
Microsoft® Word 2016
- /CreationDate:
D:20210909141650+02'00'
- /ModDate:
D:20210909141650+02'00'
- /Producer:
Microsoft® Word 2016
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
704587
- pdf_is_encrypted:
False
- pdf_number_of_pages:
41
- /Keywords:
Security Target, Common Criteria, USB Storage, Encryption, Protected Storage
- /Subject:
- /Title:
Kanguru Defender Security Target (version 1.10 as of 2014-10-06)
- /Creator:
Unknown
- /Author:
Andreas Siegert (generated by CCTool version 2.8)
- /Producer:
XEP 4.23
- /application: CCTool version x.y
- /Trapped: /False
- /CreationDate:
D:20141006150157Z
- /ModDate:
D:20141006150157Z
- pdf_hyperlinks:
http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf
|
pdf_data/st_metadata//Author |
Alexander Haferland
|
Andreas Siegert (generated by CCTool version 2.8)
|
pdf_data/st_metadata//CreationDate |
D:20210909141650+02'00'
|
D:20141006150157Z
|
pdf_data/st_metadata//Creator |
Microsoft® Word 2016
|
Unknown
|
pdf_data/st_metadata//Keywords |
CC, ST, Common Criteria, Security Target, Inspection System, PA, eAT, ePass
|
Security Target, Common Criteria, USB Storage, Encryption, Protected Storage
|
pdf_data/st_metadata//ModDate |
D:20210909141650+02'00'
|
D:20141006150157Z
|
pdf_data/st_metadata//Producer |
Microsoft® Word 2016
|
XEP 4.23
|
pdf_data/st_metadata//Subject |
Security Target
|
|
pdf_data/st_metadata//Title |
Bundesdruckerei Document Application Common Criteria Evaluation
|
Kanguru Defender Security Target (version 1.10 as of 2014-10-06)
|
pdf_data/st_metadata/pdf_file_size_bytes |
1655411
|
704587
|
pdf_data/st_metadata/pdf_hyperlinks |
|
http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf |
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
92
|
41
|
dgst |
4be309edc35f4fe0
|
eda06ca3c208ebd0
|