Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Winbond SpiFlash TrustME Secure Flash Memory W75F40WBYJEG version A
2019-48-INF-3811
genuscreen 7.0
BSI-DSZ-CC-1142-2020
name Winbond SpiFlash TrustME Secure Flash Memory W75F40WBYJEG version A genuscreen 7.0
category ICs, Smart Cards and Smart Card-Related Devices and Systems Boundary Protection Devices and Systems
scheme ES DE
not_valid_after 07.06.2027 17.08.2025
not_valid_before 07.06.2022 18.08.2020
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-48_Certificado.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1142c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-48%20INF-3811.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1142a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-48%20ST_lite.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1142b_pdf.pdf
manufacturer Winbond Electonics Corporation genua GmbH
manufacturer_web https://www.winbond.com/ https://www.genua.de
security_level EAL5+, AVA_VAN.5, ALC_DVS.2 AVA_VAN.4, ASE_TSS.2, EAL4+, ALC_FLR.2
dgst 51a1149f945dea23 cb3f4b9ba75d937b
heuristics/cert_id 2019-48-INF-3811 BSI-DSZ-CC-1142-2020
heuristics/cert_lab [] BSI
heuristics/extracted_sars ALC_LCD.1, ASE_CCL.1, AGD_OPE.1, ASE_SPD.1, ASE_OBJ.2, ATE_DPT.3, ATE_COV.2, ALC_CMS.5, ADV_ARC.1, ATE_FUN.1, ADV_IMP.1, ALC_DVS.2, ALC_TAT.2, ASE_INT.1, AVA_VAN.5, ASE_TSS.1, ADV_TDS.4, ALC_CMC.4, ADV_INT.2, ASE_REQ.2, ALC_DEL.1, ADV_FSP.5, AGD_PRE.1, ASE_ECD.1 ALC_DVS.1, ATE_IND.2, ALC_TAT.1, ALC_LCD.1, ADV_FSP.4, AVA_VAN.4, ATE_DPT.1, ASE_CCL.1, ADV_TDS.3, AGD_OPE.1, ASE_SPD.1, ASE_OBJ.2, ASE_TSS.2, ATE_COV.2, ADV_ARC.1, ATE_FUN.1, ADV_IMP.1, ASE_INT.1, ALC_CMC.4, ALC_FLR.2, ASE_REQ.2, ALC_DEL.1, ADV_TAT.1, AGD_PRE.1, ALC_CMS.4, ASE_ECD.1
heuristics/extracted_versions - 7.0
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-1194-2023
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-1194-2023
heuristics/scheme_data
  • category: Smart Cards and similiar devices
  • certification_date: 07.06.2022
  • enhanced:
    • category: Smart Cards and similiar devices
    • cc_version: Common Criteria 3.1 release 5
    • cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1478
    • certification_date: 07.06.2022
    • description: The TOE is a memory flash IC designed to be embedded into highly critical hardware devices such as smart card, secure element, USB token, secure micro SD, etc. These devices will embed secure applications such as financial, telecommunication, identity (e-Government), etc. and will be working in a hostile environment. In particular, the TOE main function is the secure storage of the code and data of critical applications. The security needs for the TOE consist in: Maintaining the integrity of the content of the memories and the confidentiality of the content of protected memory areas as required by the critical HW products (e.g. Security IC) the Memory Flash is built for. Providing a secure communication with the Host device that will embed the TOE in a secure HW product such as Security IC.
    • evaluation_facility: Applus Laboratories
    • level: EAL5 + ALC_DVS.2 + AVA_VAN.5
    • manufacturer: Winbond Electronics Corporation
    • report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1479
    • status: Certified
    • target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1477
    • type: Product
  • manufacturer: Winbond Electronics Corporation
  • product: Winbond SpiFlash TrustME Secure Flash Memory W75F40WBYJEG version A
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/826-winbond-spiflash-trustme-secure-flash-memory-w75f40wbyjeg-version-a
pdf_data/cert_filename 2019-48_Certificado.pdf 1142c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1142-2020: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL5: 1
  • EAL:
    • EAL 2: 1
    • EAL 4: 2
    • EAL 4 augmented: 1
    • EAL 5: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN.5: 1
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.2: 1
  • ASE:
    • ASE_TSS.2: 1
  • AVA:
    • AVA_VAN.4: 1
pdf_data/cert_keywords/cc_claims
  • O:
    • O.E: 1
pdf_data/cert_keywords/eval_facility
  • Applus:
    • Applus Laboratories: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 880365
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20200826080252+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung"
  • /ModDate: D:20200828100319+02'00'
  • /Producer: LibreOffice 6.2
  • /Subject: BSI-DSZ-CC-1142-2020 for genuscreen 7.0 from genua GmbH
  • /Title: Certification Report BSI-DSZ-CC-1142-2020
  • pdf_file_size_bytes: 284767
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 2019-48 INF-3811.pdf 1142a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cc_security_level: Common Criteria Part 3 extended EAL 4 augmented by ALC_FLR.2, ASE_TSS.2 and AVA_VAN.4
    • cc_version: Product specific Security Target, Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-1142-2020
    • cert_item: genuscreen 7.0
    • cert_lab: BSI
    • developer: genua GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: None
pdf_data/report_keywords/cc_cert_id
  • ES:
    • 2019-48-INF-3811- v1: 1
  • DE:
    • BSI-DSZ-CC-1085-2019: 3
    • BSI-DSZ-CC-1142-2020: 15
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL2: 1
    • EAL5: 8
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 2+: 1
    • EAL 4: 8
    • EAL 4 augmented: 3
    • EAL 5: 3
    • EAL 5+: 1
    • EAL 6: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_IMP.1: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 8
    • ALC_FLR: 3
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.5: 9
  • ALC:
    • ALC_FLR: 3
    • ALC_FLR.2: 5
  • ASE:
    • ASE_TSS.2: 5
  • AVA:
    • AVA_VAN.4: 5
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_IFC.1: 1
    • FDP_RIP.1: 1
    • FDP_SDI.2: 1
    • FDP_UIT.1: 1
  • FMT:
    • FMT_LIM.1: 1
  • FPT:
    • FPT_FLS: 2
    • FPT_ITT.1: 1
    • FPT_TRP.1: 1
  • FRU:
    • FRU_FLT.2: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.HANET: 3
    • A.INIT: 3
    • A.NOEVIL: 3
    • A.PHYSEC: 4
    • A.REMOTE_AUTH: 3
    • A.SINGEN: 3
    • A.TIMESTMP: 2
pdf_data/report_keywords/eval_facility
  • Applus:
    • Applus Laboratories: 5
  • secuvera:
    • secuvera: 3
pdf_data/report_keywords/symmetric_crypto
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 5
      • SHA512: 5
pdf_data/report_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 1
  • IPsec:
    • IPsec: 7
  • SSH:
    • SSH: 5
  • VPN:
    • VPN: 7
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 2
  • other:
    • JIL: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 20: 2
    • AIS 32: 1
    • AIS 34: 1
    • AIS 38: 1
    • AIS20: 2
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • for genuscreen 7.0 from genua GmbH, Version 2, Date: 05.08.2020, secuvera GmbH (confidential document) [8] Guidance documentation for the TOE, genucenter Installations- und Konfigurationshandbuch: 1
  • OutOfScope:
    • The genucenter must be operated on real hardware. Running the genucenter in a virtual machine is out of scope for this TOE. The Security Target [6] is the basis for this certification. It is not based on a: 1
    • VPN, IKEv2/MOBIKE VPN, Dynamic Routing, genucenter HA, Remote Maintenance, genucenter REST API) are out of scope of the evaluated configuration. All information contained in the Security Target [6] and the: 1
    • components were installed on physical hardware, the installation of the TOE on virtual machines is out of scope of the evaluated configuration. For the operational configuration the firewall appliances and the: 1
    • out of scope: 3
pdf_data/report_metadata
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 964023
  • pdf_hyperlinks: http://www.commoncriteriaportal.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 14
pdf_data/st_filename 2019-48 ST_lite.pdf 1142b_pdf.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0084: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL5: 6
    • EAL5 augmented: 2
  • EAL:
    • EAL4: 4
    • EAL4 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 6
    • ADV_FSP.1: 3
    • ADV_FSP.2: 3
    • ADV_FSP.4: 1
    • ADV_FSP.5: 8
    • ADV_IMP.1: 9
    • ADV_INT.2: 1
    • ADV_TDS.1: 2
    • ADV_TDS.3: 4
    • ADV_TDS.4: 8
  • AGD:
    • AGD_OPE.1: 6
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.1: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 9
    • ALC_LCD.1: 3
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 5
    • ASE_INT.1: 5
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 3
    • ATE_DPT.1: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 6
  • AVA:
    • AVA_VAN.5: 10
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 4
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_IMP: 1
    • ADV_IMP.1: 3
    • ADV_INT: 2
    • ADV_SPM: 2
    • ADV_TAT.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 3
    • AGD_PRE: 1
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMS: 1
    • ALC_CMS.4: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 2
    • ALC_FLR: 1
    • ALC_FLR.2: 3
    • ALC_LCD: 1
    • ALC_LCD.1: 2
    • ALC_TAT: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 3
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.2: 1
    • ASE_REQ: 1
    • ASE_REQ.1: 2
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.2: 4
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 2
    • ATE_FUN: 1
    • ATE_FUN.1: 4
    • ATE_IND: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.4: 4
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ACC.1: 3
    • FDP_ACF: 1
    • FDP_IFC.1: 27
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 4
    • FDP_ITT.1: 13
    • FDP_ITT.1.1: 1
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
    • FDP_SDC: 4
    • FDP_SDC.1: 16
    • FDP_SDC.1.1: 2
    • FDP_SDI: 1
    • FDP_SDI.2: 11
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT.1: 8
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 8
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FMT:
    • FMT_LIM: 5
    • FMT_LIM.1: 22
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 19
    • FMT_LIM.2.1: 2
  • FPT:
    • FPT_FLS: 24
    • FPT_FLS.1: 3
    • FPT_ITT.1: 12
    • FPT_ITT.1.1: 1
    • FPT_PHP.3: 14
    • FPT_PHP.3.1: 1
  • FRU:
    • FRU_FLT.2: 12
    • FRU_FLT.2.1: 1
  • FTP:
    • FTP_ITC.1: 2
    • FTP_TRP.1: 11
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN: 17
    • FAU_GEN.1: 5
    • FAU_GEN.2: 1
    • FAU_SAR: 10
    • FAU_SAR.1: 3
    • FAU_SAR.3: 1
  • FCS:
    • FCS_CKM: 86
    • FCS_CKM.1: 21
    • FCS_CKM.4: 22
    • FCS_COP: 67
    • FCS_COP.1: 20
    • FCS_RNG: 1
    • FCS_RNG.1: 12
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_IFC: 43
    • FDP_IFC.1: 31
    • FDP_IFC.2: 2
    • FDP_IFF: 34
    • FDP_IFF.1: 37
    • FDP_ITT: 21
    • FDP_ITT.1: 3
  • FIA:
    • FIA_ATD: 5
    • FIA_ATD.1: 1
    • FIA_SOS: 5
    • FIA_SOS.1: 1
    • FIA_UAU: 10
    • FIA_UAU.2: 1
    • FIA_UAU.6: 1
    • FIA_UID: 5
    • FIA_UID.1: 3
    • FIA_UID.2: 2
  • FMT:
    • FMT_MOF: 5
    • FMT_MOF.1: 1
    • FMT_MSA: 125
    • FMT_MSA.1: 24
    • FMT_MSA.2: 3
    • FMT_MSA.3: 18
    • FMT_SMF: 39
    • FMT_SMF.1: 22
    • FMT_SMR: 6
    • FMT_SMR.1: 25
  • FPT:
    • FPT_ITT: 7
    • FPT_ITT.1: 3
    • FPT_STM.1: 3
    • FPT_TEE: 7
    • FPT_TEE.1: 2
    • FPT_TRC: 5
    • FPT_TRC.1: 1
    • FPT_TRC.1.1: 1
    • FPT_TRC.1.2: 1
  • FTP:
    • FTP_STM.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.HANET: 2
    • A.INIT: 3
    • A.NOEVIL: 3
    • A.PHYSEC: 3
    • A.REMOTE_AUTH: 2
    • A.SINGEN: 4
    • A.TIMESTMP: 3
  • O:
    • O.AUDREC: 5
    • O.AUTH: 11
    • O.AVAIL: 7
    • O.CONFID: 11
    • O.INTEG: 8
    • O.MEDIAT: 4
    • O.NOREPLAY: 11
  • OE:
    • OE.ADMIN: 2
    • OE.HANET: 4
    • OE.INIT: 7
    • OE.NOEVIL: 3
    • OE.PHYSEC: 4
    • OE.REMOTE_AUTH: 1
    • OE.SINGEN: 4
    • OE.TIMESTMP: 5
  • T:
    • T.MEDIAT: 3
    • T.MMODIFY: 3
    • T.MODIFY: 3
    • T.MSNIFF: 3
    • T.NOAUTH: 3
    • T.SELPRO: 3
    • T.SNIFF: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 13
  • constructions:
    • MAC:
      • HMAC: 4
      • HMAC-SHA-256: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 2
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 6
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 5
      • SHA-512: 3
      • SHA256: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
  • KEX:
    • Key Exchange: 5
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 82
    • IKEv1: 7
    • IKEv2: 6
  • IPsec:
    • IPsec: 37
  • SSH:
    • SSH: 111
  • TLS:
    • TLS:
      • TLS: 3
  • VPN:
    • VPN: 20
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 5
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 6
  • CTR:
    • CTR: 5
pdf_data/st_keywords/crypto_library
  • LibreSSL:
    • LibreSSL: 1
  • OpenSSL:
    • OpenSSL: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Fault Injection: 1
    • Malfunction: 17
    • fault injection: 2
    • malfunction: 3
    • physical tampering: 3
  • SCA:
    • Leak-Inherent: 17
    • Physical Probing: 2
    • physical probing: 5
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-02102: 2
    • BSI TR-02102-1: 2
    • BSI TR-02102-2: 2
    • BSI TR-02102-3: 2
    • BSI TR-02102-4: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 7816-3: 1
  • BSI:
    • AIS 20: 2
    • AIS 31: 2
    • AIS20: 2
    • AIS31: 1
  • CC:
    • CCMB-2012-04-003: 1
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
  • FIPS:
    • FIPS180-4: 2
  • PKCS:
    • PKCS#1: 9
  • RFC:
    • RFC 2104: 1
    • RFC 2409: 1
    • RFC 2460: 1
    • RFC 3447: 1
    • RFC 3526: 1
    • RFC 4109: 1
    • RFC 4253: 1
    • RFC 4306: 1
    • RFC 4418: 1
    • RFC 5639: 1
    • RFC 6151: 1
    • RFC 6668: 1
    • RFC2104: 6
    • RFC2409: 9
    • RFC2460: 1
    • RFC3502: 1
    • RFC3526: 4
    • RFC4253: 3
    • RFC4301: 1
    • RFC4344: 1
    • RFC4418: 4
    • RFC4432: 1
    • RFC5639: 3
    • RFC5656: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • 1.4.10.5 No Dynamic Routing The dynamic routing feature which uses OSPF only works with IPv4 and is out of scope for this TOE. 1.4.10.6 No genucenter HA While the HA setup for the genuscreens is part of the: 1
    • and genucenter versions 200, 400, 600 and 800 in the field with hardware revision 6 and 7 which are out of scope for the current certification. The software genuscreen 7.0 runs on this hardware with the same: 1
    • cryptocard to perform cryptographic operations for IPsec usage. However, usage of the cryptocard is out of scope for this TOE. 1.4.10.2 No VPN to Other Appliances or Mobile Clients It is possible to build VPN: 1
    • hardware has not been evaluated. Also, operating the genucenter software on a virtual machine is out of scope for this certification. If the virtual genucenter is used, the end user has to ensure that all: 1
    • is out of scope. 1.4.10.8 No genucenter Rest API The genucenter REST API is out of scope and must not be used. 1.4.11 Physical Scope The physical scope of the TOE consists only of software: 1
    • out of scope: 7
    • the HA setup for genucenter is out of scope. 1.4.10.7 No Remote Maintenance The remote maintenance feature using a rendezvous genuscreen: 1
pdf_data/st_metadata
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different