Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.4.6; (Firmware Vers. 1.3.28, HW Vers. 0)
BSI-DSZ-CC-1181-2021
Northern Light Video Conferencing System (NLVC) consist of NLVC Client version 6.3.0.0, NLVC Server Webadmin Tool version 7.0.0.1, and NLVC Server version 6.1-0.21
ISCB-5-RPT-C034-CR-v1a
name Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.4.6; (Firmware Vers. 1.3.28, HW Vers. 0) Northern Light Video Conferencing System (NLVC) consist of NLVC Client version 6.3.0.0, NLVC Server Webadmin Tool version 7.0.0.1, and NLVC Server version 6.1-0.21
not_valid_before 2021-10-27 2012-03-22
not_valid_after 2026-10-27 2017-03-22
scheme DE MY
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1181b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JMCS%20Systems%20EAL2%20Security%20Target%20(Northern%20Light%20Video%20Conferencing)%20v1.2.pdf
status active archived
manufacturer Bundesdruckerei GmbH JMCS Sdn Bhd
manufacturer_web https://www.bundesdruckerei.de https://www.nltvc.com
security_level EAL3 EAL2
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1181a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C034-CR-v1a.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1181c_pdf.pdf None
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Common Criteria Protection Profile for Inspection Systems, Version 1.01', 'pp_eal': 'EAL3', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0064b_pdf.pdf', 'pp_ids': None})
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash 1d1da873337d138b0ce159c51f7fc3f45aea16dacbef34f16374d7f8dd3befeb None
state/cert/txt_hash 161cdda16fc7ceeeece0cac20018bc62852a0dc306cef4c926c298d188e93699 None
state/report/pdf_hash d3ea8b3a54f1a6190f13ab86f446e8b7e15be4eded087aa62a93c32ef1ae605e 1fbf09ca7b45347f4f0603d0b3472df75bfae6a2b01fea1bf2e45fa7e270d647
state/report/txt_hash 16b19318b760c2523599b16c51cb8e6d75035a47f9e45dc109e05a5b4c3a2a94 2ec3cfcfc975c4bd3865664c68a94a8465d1adadf2e883c53cd4bebf8ba356be
state/st/pdf_hash b5d8d8bd31c47186afa41397f8292f0505452c5fe1535badb9f14d7cf3633326 9853ec30c8121dcecf48d3c1c1397a0e0031a9eed0b589b553cd87966b5ac4c0
state/st/txt_hash c1790a04de2ab290cfb648c47203c9abebed53098d5bfcc4ad767546369e112b e155d4d6fa3d13ec44da115d85f113157dcb15c2e7c10b4884180ac019a54148
heuristics/cert_id BSI-DSZ-CC-1181-2021 ISCB-5-RPT-C034-CR-v1a
heuristics/cert_lab BSI None
heuristics/extracted_versions 2.4.6, 1.3.28 6.3.0.0, 0.21, 7.0.0.1, 6.1
heuristics/report_references/directly_referenced_by BSI-DSZ-CC-1215-2023 None
heuristics/report_references/directly_referencing BSI-DSZ-CC-1161-2020 None
heuristics/report_references/indirectly_referenced_by BSI-DSZ-CC-1215-2023 None
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-1161-2020, BSI-DSZ-CC-1093, BSI-DSZ-CC-1125-2019 None
heuristics/scheme_data
  • cert_id: BSI-DSZ-CC-1181-2021
  • product: Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.4.6; (Firmware Vers. 1.3.28, …
  • vendor: Bundesdruckerei GmbH
  • certification_date: 27.10.2021
  • category: Electronic ID documents
  • url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Hoheitliche_Dokumente-Software_mit_Hardware/1181.html
  • enhanced:
    • product: Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.4.6; (Firmware Vers. 1.3.28, HW Vers. 0)
    • applicant: Bundesdruckerei GmbH Kommandantenstraße 18 10969 Berlin
    • evaluation_facility: TÜV Informationstechnik GmbH
    • assurance_level: EAL3
    • protection_profile: Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018, Version: 2.0, 2018-06-06, Federal Office for Information Security (BSI)
    • certification_date: 27.10.2021
    • expiration_date: 26.10.2026
    • entries: frozendict({'id': 'BSI-DSZ-CC-1181-2021-MA-02 (Ausstellungsdatum / Certification Date 23.05.2022)', 'description': '"Rest of the terminal firmware (including the Operating System)"'}), frozendict({'id': 'BSI-DSZ-CC-1181-2021-MA-01 (Ausstellungsdatum / Certification Date 09.03.2022)', 'description': 'Vers. 0) was changed due to an update of the Rest of the terminal firmware (including the Operating System). Configuration Management procedures required a change in the product identifier. Therefore the version number of the Firmware changed from 1.3.28 to 1.4.8. The changes also cover an minor update of the user guidance related to this version number.'}), frozendict({'id': 'BSI-DSZ-CC-1181-2021', 'description': 'Certificate'})
    • report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1181a_pdf.pdf?__blob=publicationFile&v=2
    • target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1181b_pdf.pdf?__blob=publicationFile&v=2
    • cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1181c_pdf.pdf?__blob=publicationFile&v=2
    • description: The Target of Evaluation (TOE) is the Bundesdruckerei Document Application with tamper-evident casing 2.4.6. The Document Application is running on a Document Management Terminal (DMT). It is used to read the German Passport (ePass), to read and update the electronic data of the German identification card (“Personalausweis (PA)”) and electronic resident permit (“elektronischer Aufenthaltstitel (eAT)”) as well as to verify the document’s authenticity and the integrity of its data. The TOE is operated by governmental organisations, e.g. municipal office, police, government or other state approved agencies. The TOE is specifically applied in registration offices to allow card holders to verify that their ePass, PA or eAT is working correctly. In case of PA and eAT it is further possible to update the address information of the card holder, the card holder’s PIN for eID applications, and the community ID (“Gemeindeschlüssel”). In addition, the eID application functionality of the PA or eAT can be activated or deactivated. Additionally the TOE ensures secure communication to external control software and provides a tamper-evident enclosure. Necessary protocols for the communication of the TOE with the electronic identity documents like the ePass, PA or eAT are described in [ICAO_9303], [TR-03110-1], [TR-03110-2], and [TR-03110-3].
  • subcategory: Software with hardware
  • cert_no: 2012-003-C034
  • developer: JMCS Sdn Bhd
  • level: EAL2
  • product: Northern Light Video Conferencing System (NLVC) consist of: - NLVC Client version 6.3.0.0 - NLVC Server Webadmin Tool version 7.0.0.1 - NLVC Server version 6.1-0.21
  • certification_date: 22-03-2012
  • expiration_date: 22-03-2017
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/151
  • enhanced:
    • cert_id: C034
    • product: Northern Light Video Conferencing System (NLVC) consist of: - NLVC Client version 6.3.0.0 - NLVC Server Webadmin Tool version 7.0.0.1 - NLVC Server version 6.1-0.21
    • developer: NLTVC Sdn. Bhd. Level 2, Block C, Science@USMNo 10, Persiaran Bukit Jambul,11900 Penang, MALAYSIA. URL: http://www.nltvc.comEmail: [email protected]: +60 (4) 653 3005Fax: +60 (4) 653 3001
    • category: Other Devices and Systems
    • type: Multipoint-to-multipoint video conferencing system.
    • scope: The Target of Evaluation (TOE), Northern Light Video Conferencing System (NLVC), is a multipoint-to-multipoint video conferencing system. It allows conferencing of any desired number of people around the world using existing LAN infrastructure, without affecting current applications. It is software based and uses non-proprietary hardware. The TOE components include: NLVC Client version 6.3.0.0. A user based GUI application that works on the end user's PC or NLVC boardroom codec system. NLVC Server Webadmin Tool version 7.0.0.1. A web based interface use to ease the administration of the TOE (NLVC Server). NLVC Server version 6.1-0.21. The main purpose is to maintain and control conference according to the Real Time Switching (RSW) control criteria used. The evaluated security functionalities for the TOE includes: Identification and Authentication – the TOE requires that each user is successfully identified (User ID) and authenticated (password) before they are allowed to access the functionality of the TOE. Secure communication – the TOE provides a secure SSL session between the client and the server in order to protect the video feeds and command data when transmitted between the client and the server. Security Management – the TOE manages functions to ensure efficient and secure management of the TOE and its security functions. The TOE restricts access to the management functions based on the role of the user. The roles maintained by the TOE are: Chairman, Participant, Observer, and Administrator. Each access control list maps users and roles to the operations that they are permitted to perform on the object. User Data Protection – the TOE manages access control on configuration data and functions based on user role and access control lists.
    • assurance_level: EAL2
    • certification_date: 22-03-2012
    • expiration_date: 22-03-2017
    • mutual_recognition: CCRA
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C034/JMCS%20Systems%20EAL2%20Security%20Target%20(Northern%20Light%20Video%20Conferencing)%20v1.2.pdf
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C034/ISCB-5-RPT-C034-CR-v1a.pdf
    • status: Archive
heuristics/scheme_data/certification_date 27.10.2021 22-03-2012
heuristics/scheme_data/enhanced
  • product: Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.4.6; (Firmware Vers. 1.3.28, HW Vers. 0)
  • applicant: Bundesdruckerei GmbH Kommandantenstraße 18 10969 Berlin
  • evaluation_facility: TÜV Informationstechnik GmbH
  • assurance_level: EAL3
  • protection_profile: Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018, Version: 2.0, 2018-06-06, Federal Office for Information Security (BSI)
  • certification_date: 27.10.2021
  • expiration_date: 26.10.2026
  • entries: frozendict({'id': 'BSI-DSZ-CC-1181-2021-MA-02 (Ausstellungsdatum / Certification Date 23.05.2022)', 'description': '"Rest of the terminal firmware (including the Operating System)"'}), frozendict({'id': 'BSI-DSZ-CC-1181-2021-MA-01 (Ausstellungsdatum / Certification Date 09.03.2022)', 'description': 'Vers. 0) was changed due to an update of the Rest of the terminal firmware (including the Operating System). Configuration Management procedures required a change in the product identifier. Therefore the version number of the Firmware changed from 1.3.28 to 1.4.8. The changes also cover an minor update of the user guidance related to this version number.'}), frozendict({'id': 'BSI-DSZ-CC-1181-2021', 'description': 'Certificate'})
  • report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1181a_pdf.pdf?__blob=publicationFile&v=2
  • target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1181b_pdf.pdf?__blob=publicationFile&v=2
  • cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1181c_pdf.pdf?__blob=publicationFile&v=2
  • description: The Target of Evaluation (TOE) is the Bundesdruckerei Document Application with tamper-evident casing 2.4.6. The Document Application is running on a Document Management Terminal (DMT). It is used to read the German Passport (ePass), to read and update the electronic data of the German identification card (“Personalausweis (PA)”) and electronic resident permit (“elektronischer Aufenthaltstitel (eAT)”) as well as to verify the document’s authenticity and the integrity of its data. The TOE is operated by governmental organisations, e.g. municipal office, police, government or other state approved agencies. The TOE is specifically applied in registration offices to allow card holders to verify that their ePass, PA or eAT is working correctly. In case of PA and eAT it is further possible to update the address information of the card holder, the card holder’s PIN for eID applications, and the community ID (“Gemeindeschlüssel”). In addition, the eID application functionality of the PA or eAT can be activated or deactivated. Additionally the TOE ensures secure communication to external control software and provides a tamper-evident enclosure. Necessary protocols for the communication of the TOE with the electronic identity documents like the ePass, PA or eAT are described in [ICAO_9303], [TR-03110-1], [TR-03110-2], and [TR-03110-3].
  • cert_id: C034
  • product: Northern Light Video Conferencing System (NLVC) consist of: - NLVC Client version 6.3.0.0 - NLVC Server Webadmin Tool version 7.0.0.1 - NLVC Server version 6.1-0.21
  • developer: NLTVC Sdn. Bhd. Level 2, Block C, Science@USMNo 10, Persiaran Bukit Jambul,11900 Penang, MALAYSIA. URL: http://www.nltvc.comEmail: [email protected]: +60 (4) 653 3005Fax: +60 (4) 653 3001
  • category: Other Devices and Systems
  • type: Multipoint-to-multipoint video conferencing system.
  • scope: The Target of Evaluation (TOE), Northern Light Video Conferencing System (NLVC), is a multipoint-to-multipoint video conferencing system. It allows conferencing of any desired number of people around the world using existing LAN infrastructure, without affecting current applications. It is software based and uses non-proprietary hardware. The TOE components include: NLVC Client version 6.3.0.0. A user based GUI application that works on the end user's PC or NLVC boardroom codec system. NLVC Server Webadmin Tool version 7.0.0.1. A web based interface use to ease the administration of the TOE (NLVC Server). NLVC Server version 6.1-0.21. The main purpose is to maintain and control conference according to the Real Time Switching (RSW) control criteria used. The evaluated security functionalities for the TOE includes: Identification and Authentication – the TOE requires that each user is successfully identified (User ID) and authenticated (password) before they are allowed to access the functionality of the TOE. Secure communication – the TOE provides a secure SSL session between the client and the server in order to protect the video feeds and command data when transmitted between the client and the server. Security Management – the TOE manages functions to ensure efficient and secure management of the TOE and its security functions. The TOE restricts access to the management functions based on the role of the user. The roles maintained by the TOE are: Chairman, Participant, Observer, and Administrator. Each access control list maps users and roles to the operations that they are permitted to perform on the object. User Data Protection – the TOE manages access control on configuration data and functions based on user role and access control lists.
  • assurance_level: EAL2
  • certification_date: 22-03-2012
  • expiration_date: 22-03-2017
  • mutual_recognition: CCRA
  • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C034/JMCS%20Systems%20EAL2%20Security%20Target%20(Northern%20Light%20Video%20Conferencing)%20v1.2.pdf
  • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C034/ISCB-5-RPT-C034-CR-v1a.pdf
  • status: Archive
heuristics/scheme_data/enhanced/assurance_level EAL3 EAL2
heuristics/scheme_data/enhanced/certification_date 27.10.2021 22-03-2012
heuristics/scheme_data/enhanced/expiration_date 26.10.2026 22-03-2017
heuristics/scheme_data/enhanced/product Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.4.6; (Firmware Vers. 1.3.28, HW Vers. 0) Northern Light Video Conferencing System (NLVC) consist of: - NLVC Client version 6.3.0.0 - NLVC Server Webadmin Tool version 7.0.0.1 - NLVC Server version 6.1-0.21
heuristics/scheme_data/enhanced/report_link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1181a_pdf.pdf?__blob=publicationFile&v=2 https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C034/ISCB-5-RPT-C034-CR-v1a.pdf
heuristics/scheme_data/enhanced/target_link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1181b_pdf.pdf?__blob=publicationFile&v=2 https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C034/JMCS%20Systems%20EAL2%20Security%20Target%20(Northern%20Light%20Video%20Conferencing)%20v1.2.pdf
heuristics/scheme_data/product Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.4.6; (Firmware Vers. 1.3.28, … Northern Light Video Conferencing System (NLVC) consist of: - NLVC Client version 6.3.0.0 - NLVC Server Webadmin Tool version 7.0.0.1 - NLVC Server version 6.1-0.21
heuristics/scheme_data/url https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Hoheitliche_Dokumente-Software_mit_Hardware/1181.html https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/151
pdf_data/cert_filename 1181c_pdf.pdf None
pdf_data/cert_keywords
  • cc_cert_id:
    • DE:
      • BSI-DSZ-CC-1181-2021: 1
  • cc_protection_profile_id:
    • BSI:
      • BSI-CC-PP-0064-: 1
  • cc_security_level:
    • EAL:
      • EAL 3: 1
      • EAL 2: 1
  • cc_sar:
    • ALC:
      • ALC_FLR: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
  • eval_facility:
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
    • ISO:
      • ISO/IEC 15408: 2
      • ISO/IEC 18045: 2
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
None
pdf_data/cert_metadata
  • pdf_file_size_bytes: 244679
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20211104084818+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, BDr, Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018"
  • /ModDate: D:20211108192831+01'00'
  • /Producer: LibreOffice 6.3
  • /Subject: Bundesdruckerei Document Application withtamper-evident casing
  • /Title: Certification Report BSI-DSZ-CC-1181-2021
  • pdf_hyperlinks:
None
pdf_data/report_filename 1181a_pdf.pdf ISCB-5-RPT-C034-CR-v1a.pdf
pdf_data/report_frontpage
  • DE:
    • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
    • cert_id: BSI-DSZ-CC-1181-2021
    • cert_item: Bundesdruckerei Document Application with tamper-evident casing Document Application Version 2.4.6; (Firmware Vers. 1.3.28, HW Vers. 0
    • developer: Bundesdruckerei GmbH
    • cert_lab: BSI
    • ref_protection_profiles: Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064- V2-2018, Version: 2.0, 2018-06-06, Federal Office for Information Security (BSI
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cc_security_level: Common Criteria Part 3 conformant EAL 3
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 7
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1181-2021: 15
    • BSI-DSZ-CC-1161-: 1
    • BSI-DSZ-CC-1161-2020: 2
    • BSI-DSZ-CC-1181: 1
  • MY:
    • ISCB-5-RPT-C034-CR-v1a: 35
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0064-: 1
    • BSI-CC-PP-0064-V2-2018: 3
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
  • ALC:
    • ALC_FLR: 3
  • ATE:
    • ATE_FUN: 1
    • ATE_IND: 5
  • AVA:
    • AVA_VAN: 2
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 3: 4
  • EAL 2: 2
  • EAL 1: 1
  • EAL 4: 1
  • EAL 2+: 1
  • EAL2: 9
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
  • FIA:
    • FIA_UAU.4: 1
    • FIA_UAU.5: 1
    • FIA_UAU.6: 1
    • FIA_API.1: 1
    • FIA_UAU.2: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_SMR.1: 1
    • FMT_SMF.1: 1
    • FMT_MTD: 3
  • FPT:
    • FPT_PHP: 1
  • FTP:
    • FTP_TRP: 1
  • FCS:
    • FCS_COP.1: 1
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
    • FDP_ITT.1: 1
  • FIA:
    • FIA_UAU: 2
    • FIA_UID: 2
    • FIA_UAU.2: 2
    • FIA_UID.2: 2
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA: 4
    • FMT_MSA.1: 1
    • FMT_MSA.3.1: 2
    • FMT_MSA.3: 2
    • FMT_MTD: 3
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPR:
    • FPR_ITT.1: 1
pdf_data/report_keywords/cc_sfr/FIA
  • FIA_UAU.4: 1
  • FIA_UAU.5: 1
  • FIA_UAU.6: 1
  • FIA_API.1: 1
  • FIA_UAU.2: 1
  • FIA_UID.2: 1
  • FIA_UAU: 2
  • FIA_UID: 2
  • FIA_UAU.2: 2
  • FIA_UID.2: 2
pdf_data/report_keywords/cc_sfr/FIA/FIA_UAU.2 1 2
pdf_data/report_keywords/cc_sfr/FIA/FIA_UID.2 1 2
pdf_data/report_keywords/cc_sfr/FMT
  • FMT_SMR.1: 1
  • FMT_SMF.1: 1
  • FMT_MTD: 3
  • FMT_MOF.1: 1
  • FMT_MSA: 4
  • FMT_MSA.1: 1
  • FMT_MSA.3.1: 2
  • FMT_MSA.3: 2
  • FMT_MTD: 3
  • FMT_SMF.1: 1
  • FMT_SMR.1: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • Evaluation Technical Report, Version 1, 2021-10-11, BSI-DSZ-CC-1181, TÜV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile for Document Management Terminal DMT-PP: 1
    • Security (BSI) [9] Configuration list for the TOE, Version 1.37, 2021-09-29, Bundesdruckerei GmbH (confidential document) [10] Guidance documentation for the TOE, Version 1.195, 2021-09-17, VISOTEC® V- ÄNDERUNGSTERMINAL: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 6
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 2
  • TLS:
    • TLS:
      • TLS: 1
  • PACE:
    • PACE: 8
  • SSH:
    • SSH: 1
  • TLS:
    • SSL:
      • SSL: 9
    • TLS:
      • TLS: 1
  • VPN:
    • VPN: 12
pdf_data/report_keywords/crypto_protocol/SSH/SSH 2 1
pdf_data/report_keywords/crypto_protocol/TLS
  • TLS:
    • TLS: 1
  • SSL:
    • SSL: 9
  • TLS:
    • TLS: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 6
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 3
pdf_data/report_keywords/hash_function/SHA
  • SHA1:
    • SHA1: 1
    • SHA-1: 1
  • SHA2:
    • SHA256: 10
    • SHA384: 6
    • SHA512: 1
    • SHA224: 1
  • SHA2:
    • SHA256: 1
pdf_data/report_keywords/hash_function/SHA/SHA2
  • SHA256: 10
  • SHA384: 6
  • SHA512: 1
  • SHA224: 1
  • SHA256: 1
pdf_data/report_keywords/hash_function/SHA/SHA2/SHA256 10 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 6
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 4
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS186-2: 6
    • FIPS180-4: 8
    • FIPS PUB 46-3: 2
    • FIPS 197: 8
    • FIPS186-4: 1
    • FIPS197: 1
  • BSI:
    • AIS 48: 1
    • AIS 20: 1
    • AIS 32: 1
    • AIS 38: 1
  • RFC:
    • RFC5246: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 18045: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 9797-: 2
    • ISO/IEC 15946-: 6
  • ICAO:
    • ICAO: 2
  • FIPS:
    • FIPS 180-2: 1
  • ISO:
    • ISO/IEC15408: 2
    • ISO/IEC 18045: 2
pdf_data/report_keywords/standard_id/FIPS
  • FIPS186-2: 6
  • FIPS180-4: 8
  • FIPS PUB 46-3: 2
  • FIPS 197: 8
  • FIPS186-4: 1
  • FIPS197: 1
  • FIPS 180-2: 1
pdf_data/report_keywords/standard_id/ISO
  • ISO/IEC 15408: 4
  • ISO/IEC 18045: 4
  • ISO/IEC 17065: 2
  • ISO/IEC 9797-: 2
  • ISO/IEC 15946-: 6
  • ISO/IEC15408: 2
  • ISO/IEC 18045: 2
pdf_data/report_keywords/standard_id/ISO/ISO/IEC 18045 4 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
  • DES:
    • DES:
      • DES: 2
    • 3DES:
      • 3DES: 4
  • constructions:
    • MAC:
      • CMAC: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
pdf_data/report_metadata
  • pdf_file_size_bytes: 789441
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 29
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20211105104643+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, BDr, Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018"
  • /ModDate: D:20211108154109+01'00'
  • /Producer: LibreOffice 6.3
  • /Subject: Bundesdruckerei Document Application withtamper-evident casing
  • /Title: Certification Report BSI-DSZ-CC-1181-2021
  • pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte
  • pdf_file_size_bytes: 439358
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 35
  • /Author: ISCB Department
  • /Category: PUBLIC
  • /Company: CyberSecurity Malaysia
  • /CreationDate: D:20120327111223+08'00'
  • /Creator: Acrobat PDFMaker 8.1 for Word
  • /Keywords: C034 Northern Light Video Conferencing (NLVC) System
  • /ModDate: D:20120327111314+08'00'
  • /Producer: Acrobat Distiller 8.1.0 (Windows)
  • /SourceModified: D:20120327031203
  • /Subject: Northern Light Video Conferencing System (NLVC)
  • /Title: C034 Certification Report
  • pdf_hyperlinks: http://www.cybersecurity.my/mycc, mailto:[email protected]
pdf_data/report_metadata//Author Bundesamt für Sicherheit in der Informationstechnik ISCB Department
pdf_data/report_metadata//CreationDate D:20211105104643+01'00' D:20120327111223+08'00'
pdf_data/report_metadata//Creator Writer Acrobat PDFMaker 8.1 for Word
pdf_data/report_metadata//Keywords "Common Criteria, Certification, Zertifizierung, BDr, Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018" C034 Northern Light Video Conferencing (NLVC) System
pdf_data/report_metadata//ModDate D:20211108154109+01'00' D:20120327111314+08'00'
pdf_data/report_metadata//Producer LibreOffice 6.3 Acrobat Distiller 8.1.0 (Windows)
pdf_data/report_metadata//Subject Bundesdruckerei Document Application withtamper-evident casing Northern Light Video Conferencing System (NLVC)
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-1181-2021 C034 Certification Report
pdf_data/report_metadata/pdf_file_size_bytes 789441 439358
pdf_data/report_metadata/pdf_hyperlinks https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte http://www.cybersecurity.my/mycc, mailto:[email protected]
pdf_data/report_metadata/pdf_is_encrypted False True
pdf_data/report_metadata/pdf_number_of_pages 29 35
pdf_data/st_filename 1181b_pdf.pdf JMCS Systems EAL2 Security Target (Northern Light Video Conferencing) v1.2.pdf
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • Diffie-Hellman: 1
      • DH: 2
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1181: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.PKI: 4
  • R:
    • R.CRL: 3
  • OE:
    • OE.PKI: 4
  • OSP:
    • OSP.RNG: 4
  • O:
    • O.ACCESS: 4
    • O.USER: 3
    • O.MANAGE: 2
    • O.PASSWORD: 3
    • O.COMMS: 3
  • T:
    • T.ACCESS: 2
    • T.SNIFFING: 2
    • T.MANAGEMENT: 2
    • T.PASSWORD: 2
  • A:
    • A.ENVIRONMENT: 2
    • A.TRUST: 2
    • A.ADMIN: 2
    • A.PHYSICAL: 2
    • A.DATABASE: 2
    • A.MANAGEMENT: 2
    • A.CRYPTO: 2
  • OE:
    • OE.ENVIRONMENT: 2
    • OE.TRUST: 2
    • OE.ADMIN: 2
    • OE.PHYSICAL: 2
    • OE.DATABASE: 2
    • OE.MANAGEMENT: 2
    • OE.CRYPTO: 1
pdf_data/st_keywords/cc_claims/A
  • A.PKI: 4
  • A.ENVIRONMENT: 2
  • A.TRUST: 2
  • A.ADMIN: 2
  • A.PHYSICAL: 2
  • A.DATABASE: 2
  • A.MANAGEMENT: 2
  • A.CRYPTO: 2
pdf_data/st_keywords/cc_claims/OE
  • OE.PKI: 4
  • OE.ENVIRONMENT: 2
  • OE.TRUST: 2
  • OE.ADMIN: 2
  • OE.PHYSICAL: 2
  • OE.DATABASE: 2
  • OE.MANAGEMENT: 2
  • OE.CRYPTO: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0064-V2-2018: 3
    • BSI-CC-PP-0064-: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_DEL.1: 1
    • ALC_LCD.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.5: 2
    • AVA_VAN.2: 1
  • APE:
    • APE_ECD: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMS.2: 1
    • ALC_CMC.2: 1
    • ALC_DEL.1: 1
  • ATE:
    • ATE_IND.2: 1
    • ATE_FUN.1: 1
    • ATE_COV.1: 1
  • AVA:
    • AVA_VAN.2: 1
  • ASE:
    • ASE_INT: 2
    • ASE_CCL: 2
    • ASE_OBJ: 2
    • ASE_REQ: 2
    • ASE_TSS: 2
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_TDS.2: 1
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.1: 1
pdf_data/st_keywords/cc_sar/AGD
  • AGD_OPE.1: 1
  • AGD_OPE.1: 1
  • AGD_PRE.1: 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_CMC.3: 1
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_CMS.2: 1
  • ALC_CMC.2: 1
  • ALC_DEL.1: 1
pdf_data/st_keywords/cc_sar/ASE
  • ASE_CCL.1: 1
  • ASE_INT.1: 1
  • ASE_REQ.2: 1
  • ASE_TSS.1: 1
  • ASE_INT: 2
  • ASE_CCL: 2
  • ASE_OBJ: 2
  • ASE_REQ: 2
  • ASE_TSS: 2
  • ASE_CCL.1: 1
  • ASE_ECD.1: 1
  • ASE_INT.1: 1
  • ASE_OBJ.2: 1
  • ASE_REQ.2: 1
  • ASE_SPD.1: 1
  • ASE_TSS.1: 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_FUN.1: 1
  • ATE_COV.1: 1
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.5: 2
  • AVA_VAN.2: 1
  • AVA_VAN.2: 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL 3: 4
  • EAL4+: 2
  • EAL3: 1
  • EAL2: 7
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 5
    • FAU_GEN.1.1: 3
    • FAU_GEN.1.2: 2
    • FAU_GEN: 1
  • FCS:
    • FCS_RNG.1: 6
    • FCS_COP: 29
    • FCS_CKM: 13
    • FCS_CKM.1: 15
    • FCS_CKM.4: 5
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 25
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
    • FCS_RNG: 3
  • FDP:
    • FDP_RIP.1: 4
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_API.1: 6
    • FIA_UAU.4: 5
    • FIA_API: 1
    • FIA_API.1.1: 1
    • FIA_UAU.2: 6
    • FIA_UAU.2.1: 1
    • FIA_UAU.1: 3
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 4
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 4
    • FIA_UAU.6.1: 1
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
    • FIA_UID.1: 2
  • FMT:
    • FMT_MTD: 22
    • FMT_MTD.1: 5
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 5
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_PHP: 4
    • FPT_PHP.1: 2
  • FTP:
    • FTP_TRP: 4
    • FTP_TRP.1: 3
    • FTP_TRP.1.2: 1
  • FCS:
    • FCS_COP.1: 4
    • FCS_COP.1.1: 1
    • FCS_CKM.1: 2
    • FCS_CKM.4: 2
    • FCS_COP: 1
  • FDP:
    • FDP_IFC: 2
    • FDP_IFF: 4
    • FDP_ITT: 2
    • FDP_ACC.1: 13
    • FDP_ACF.1: 5
    • FDP_IFC.1: 15
    • FDP_IFF.1: 5
    • FDP_ITT.1: 4
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITT.1.1: 1
    • FDP_ACC: 1
    • FDP_ACF: 1
  • FIA:
    • FIA_UAU: 10
    • FIA_UID: 13
    • FIA_UAU.1: 2
    • FIA_UAU.2.1: 2
    • FIA_UID.1: 8
    • FIA_UID.2.1: 2
  • FMT:
    • FMT_MOF.1: 3
    • FMT_MSA: 23
    • FMT_MTD: 17
    • FMT_SMF.1: 22
    • FMT_SMR.1: 22
    • FMT_MSA.3: 4
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 2
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MSA.1: 4
    • FMT_MTD.1.1: 3
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_SMR: 2
    • FMT_SMF: 1
  • FPT:
    • FPT_ITT.1: 4
    • FPT_ITT.1.1: 1
    • FPT_ITT: 1
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RNG.1: 6
  • FCS_COP: 29
  • FCS_CKM: 13
  • FCS_CKM.1: 15
  • FCS_CKM.4: 5
  • FCS_CKM.4.1: 1
  • FCS_COP.1: 25
  • FCS_RNG.1.1: 1
  • FCS_RNG.1.2: 1
  • FCS_RNG: 3
  • FCS_COP.1: 4
  • FCS_COP.1.1: 1
  • FCS_CKM.1: 2
  • FCS_CKM.4: 2
  • FCS_COP: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 15 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 5 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 29 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 25 4
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_RIP.1: 4
  • FDP_RIP.1.1: 1
  • FDP_IFC: 2
  • FDP_IFF: 4
  • FDP_ITT: 2
  • FDP_ACC.1: 13
  • FDP_ACF.1: 5
  • FDP_IFC.1: 15
  • FDP_IFF.1: 5
  • FDP_ITT.1: 4
  • FDP_ITC.1: 2
  • FDP_ITC.2: 2
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1.1: 1
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_ITT.1.1: 1
  • FDP_ACC: 1
  • FDP_ACF: 1
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_API.1: 6
  • FIA_UAU.4: 5
  • FIA_API: 1
  • FIA_API.1.1: 1
  • FIA_UAU.2: 6
  • FIA_UAU.2.1: 1
  • FIA_UAU.1: 3
  • FIA_UAU.4.1: 1
  • FIA_UAU.5: 4
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.6: 4
  • FIA_UAU.6.1: 1
  • FIA_UID.2: 6
  • FIA_UID.2.1: 1
  • FIA_UID.1: 2
  • FIA_UAU: 10
  • FIA_UID: 13
  • FIA_UAU.1: 2
  • FIA_UAU.2.1: 2
  • FIA_UID.1: 8
  • FIA_UID.2.1: 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 3 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.2.1 1 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 2 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2.1 1 2
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MTD: 22
  • FMT_MTD.1: 5
  • FMT_SMF.1: 7
  • FMT_SMF.1.1: 1
  • FMT_SMR.1: 5
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MOF.1: 3
  • FMT_MSA: 23
  • FMT_MTD: 17
  • FMT_SMF.1: 22
  • FMT_SMR.1: 22
  • FMT_MSA.3: 4
  • FMT_MOF.1.1: 1
  • FMT_MSA.1.1: 2
  • FMT_MSA.3.1: 2
  • FMT_MSA.3.2: 2
  • FMT_MSA.1: 4
  • FMT_MTD.1.1: 3
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_SMR: 2
  • FMT_SMF: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 22 17
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 7 22
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 5 22
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_PHP: 4
  • FPT_PHP.1: 2
  • FPT_ITT.1: 4
  • FPT_ITT.1.1: 1
  • FPT_ITT: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS1.2: 6
      • TLS 1.2: 2
  • PACE:
    • PACE: 27
  • SSH:
    • SSH: 1
  • TLS:
    • SSL:
      • SSL: 7
  • VPN:
    • VPN: 5
pdf_data/st_keywords/crypto_protocol/TLS
  • TLS:
    • TLS1.2: 6
    • TLS 1.2: 2
  • SSL:
    • SSL: 7
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 12
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
    • P-384: 1
    • NIST P-384: 1
    • secp384r1: 3
    • secp256r1: 1
    • secp521r1: 1
    • prime256v1: 2
  • Brainpool:
    • brainpoolP224r1: 1
    • brainpoolP256r1: 2
    • brainpoolP384r1: 2
    • brainpoolP512r1: 2
pdf_data/st_keywords/hash_function/SHA
  • SHA1:
    • SHA-1: 7
    • SHA1: 2
  • SHA2:
    • SHA-256: 5
    • SHA-224: 2
    • SHA-384: 2
    • SHA-512: 2
    • SHA256: 2
  • SHA2:
    • SHA256: 3
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-256: 5
  • SHA-224: 2
  • SHA-384: 2
  • SHA-512: 2
  • SHA256: 2
  • SHA256: 3
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA256 2 3
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG1: 2
    • EF.DG2: 1
    • EF.DG3: 2
    • EF.DG4: 2
    • EF.DG5: 1
    • EF.DG16: 2
    • EF.DG13: 1
    • EF.COM: 2
    • EF.SOD: 2
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 25
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 5
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 180-4: 2
    • FIPS186-4: 3
    • FIPS180-4: 3
    • FIPS186-2: 2
    • FIPS197: 2
    • FIPS 186-2: 1
    • FIPS 186-4: 1
    • FIPS PUB 197: 1
  • BSI:
    • AIS31: 2
  • RFC:
    • RFC5280: 1
    • RFC3369: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816-4: 1
  • ICAO:
    • ICAO: 13
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 8
    • E2:
      • E2: 1
  • DES:
    • DES:
      • DES: 1
    • 3DES:
      • Triple-DES: 4
      • 3DES: 4
  • constructions:
    • MAC:
      • KMAC: 1
      • CMAC: 2
pdf_data/st_metadata
  • pdf_file_size_bytes: 1655411
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 92
  • /Title: Bundesdruckerei Document Application Common Criteria Evaluation
  • /Author: Alexander Haferland
  • /Subject: Security Target
  • /Keywords: CC, ST, Common Criteria, Security Target, Inspection System, PA, eAT, ePass
  • /Creator: Microsoft® Word 2016
  • /CreationDate: D:20210909141650+02'00'
  • /ModDate: D:20210909141650+02'00'
  • /Producer: Microsoft® Word 2016
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 336015
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
  • /Author: muzamir
  • /CreationDate: D:20120223110837+08'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20120223110837+08'00'
  • /Producer: Acrobat Distiller 10.0.0 (Windows)
  • /Title: Microsoft Word - JMCS Systems EAL2 Security Target (Northern Light Video Conferencing) v1.2.docx
  • pdf_hyperlinks:
pdf_data/st_metadata//Author Alexander Haferland muzamir
pdf_data/st_metadata//CreationDate D:20210909141650+02'00' D:20120223110837+08'00'
pdf_data/st_metadata//Creator Microsoft® Word 2016 PScript5.dll Version 5.2.2
pdf_data/st_metadata//ModDate D:20210909141650+02'00' D:20120223110837+08'00'
pdf_data/st_metadata//Producer Microsoft® Word 2016 Acrobat Distiller 10.0.0 (Windows)
pdf_data/st_metadata//Title Bundesdruckerei Document Application Common Criteria Evaluation Microsoft Word - JMCS Systems EAL2 Security Target (Northern Light Video Conferencing) v1.2.docx
pdf_data/st_metadata/pdf_file_size_bytes 1655411 336015
pdf_data/st_metadata/pdf_number_of_pages 92 38
dgst 4be309edc35f4fe0 efb467462d13a42a