Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Samsung Galaxy Devices on Android 11 - Spring
CCEVS-VR-VID-11160-2021
SMARTY IQ-GPRS / LTE, Version 1.4
BSI-DSZ-CC-0822-V6-2024
name Samsung Galaxy Devices on Android 11 - Spring SMARTY IQ-GPRS / LTE, Version 1.4
category Mobility Other Devices and Systems
scheme US DE
status archived active
not_valid_after 15.03.2023 19.12.2032
not_valid_before 15.03.2021 20.12.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11160-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0822V6c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11160-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0822V6a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11160-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0822V6b_pdf.pdf
manufacturer Samsung Electronics Co., Ltd. Sagemcom Dr. Neuhaus GmbH
manufacturer_web https://www.samsung.com https://sagemcom.com
security_level {} EAL4+, ALC_FLR.2, AVA_VAN.5
dgst 5b2d5786e0044bc3 4b7dcf610d994944
heuristics/cert_id CCEVS-VR-VID-11160-2021 BSI-DSZ-CC-0822-V6-2024
heuristics/cert_lab US BSI
heuristics/cpe_matches cpe:2.3:o:samsung:android:11.0:-:*:*:*:*:*:* {}
heuristics/related_cves CVE-2023-30700, CVE-2023-42537, CVE-2023-30712, CVE-2023-42536, CVE-2023-30689, CVE-2023-30694, CVE-2023-30685, CVE-2023-21485, CVE-2023-30715, CVE-2023-21461, CVE-2023-21430, CVE-2023-30679, CVE-2024-20836, CVE-2023-21438, CVE-2023-21420, CVE-2023-21441, CVE-2023-21490, CVE-2023-30688, CVE-2023-30717, CVE-2023-42569, CVE-2023-30708, CVE-2023-30696, CVE-2024-20831, CVE-2023-30654, CVE-2023-42556, CVE-2023-42538, CVE-2023-21457, CVE-2023-21487, CVE-2023-30690, CVE-2024-20804, CVE-2023-30693, CVE-2024-20817, CVE-2023-30711, CVE-2023-42561, CVE-2024-20814, CVE-2023-30681, CVE-2023-21428, CVE-2023-30706, CVE-2024-20832, CVE-2023-21454, CVE-2023-21492, CVE-2023-21437, CVE-2023-30716, CVE-2023-30697, CVE-2023-21421, CVE-2023-42530, CVE-2023-21486, CVE-2023-30721, CVE-2023-42532, CVE-2023-21488, CVE-2023-42527, CVE-2023-30718, CVE-2024-20812, CVE-2023-21456, CVE-2024-20818, CVE-2023-30691, CVE-2023-30699, CVE-2023-21445, CVE-2023-42560, CVE-2023-21460, CVE-2023-21504, CVE-2024-20819, CVE-2024-20833, CVE-2023-21496, CVE-2023-42529, CVE-2024-20811, CVE-2023-21458, CVE-2023-21493, CVE-2023-30692, CVE-2023-21495, CVE-2023-30720, CVE-2024-20815, CVE-2023-42559, CVE-2023-21442, CVE-2024-20806, CVE-2023-21435, CVE-2023-21489, CVE-2023-30710, CVE-2023-21429, CVE-2023-21424, CVE-2023-21452, CVE-2023-30727, CVE-2024-20803, CVE-2024-20830, CVE-2023-30686, CVE-2023-30739, CVE-2024-20813, CVE-2023-21427, CVE-2023-30707, CVE-2023-42528, CVE-2023-42531, CVE-2023-42570, CVE-2023-21425, CVE-2024-20834, CVE-2024-20816, CVE-2023-30709, CVE-2023-21422, CVE-2024-20862, CVE-2023-30714, CVE-2023-21436, CVE-2023-21446, CVE-2023-30713, CVE-2024-20835, CVE-2023-30687, CVE-2023-30701, CVE-2023-42566, CVE-2024-20820, CVE-2023-21484, CVE-2023-30719, CVE-2024-20805 {}
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1 ATE_COV.2, ASE_TSS.1, ASE_INT.1, ATE_FUN.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_ARC.1, AGD_OPE.1, ASE_REQ.2, ASE_CCL.1, ALC_CMC.4, ALC_FLR.2, ADV_IMP.1
heuristics/extracted_versions 11 1.4
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0822-V5-2023
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0822-V2-2020, BSI-DSZ-CC-0822-V4-2023, BSI-DSZ-CC-0822-V3-2021, BSI-DSZ-CC-0822-V5-2023
heuristics/scheme_data
  • category: Mobility, Virtual Private Network
  • certification_date: 15.03.2021
  • evaluation_facility: Gossamer Security Solutions
  • expiration_date: 15.03.2023
  • id: CCEVS-VR-VID11160
  • product: Samsung Galaxy Devices on Android 11 - Spring
  • scheme: US
  • url: https://www.niap-ccevs.org/product/11160
  • vendor: Samsung Electronics Co., Ltd.
  • category: Intelligent measuring systems
  • cert_id: BSI-DSZ-CC-0822-V6-2024
  • certification_date: 20.12.2024
  • enhanced:
    • applicant: Sagemcom Dr. Neuhaus GmbH Papenreye 65 22453 Hamburg
    • assurance_level: EAL4+,AVA_VAN.5,ALC_FLR.2
    • cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte08/0822V6c_pdf.pdf?__blob=publicationFile&v=2
    • certification_date: 20.12.2024
    • entries: [frozendict({'id': 'BSI-DSZ-CC-0822-V6-2024', 'description': 'The focus of this recertification was on the introduction of a new LTE-Modul for WAN-communication, the GWA-change process implementation following FNN requirements and the introduction of proxy-profiles and communication scenario HKS3 with SOCKSv5.'}), frozendict({'id': 'BSI-DSZ-CC-0822-V5-2023', 'description': 'components.'}), frozendict({'id': 'BSI-DSZ-CC-0822-V4-2023', 'description': 'The focus of this recertification was on the update of the operating system and some libraries, the implementation of changed and added tariff use cases (TAF 2, TAF 9, TAF 10, TAF 14), the support of IPv6 and the support of firmware download.'}), frozendict({'id': 'BSI-DSZ-CC-0822-V3-2021-RA-02', 'description': 'The CC-certificate BSI-DSZ-CC-0822-V3-2021 remains valid for 2 further years.'}), frozendict({'id': 'BSI-DSZ-CC-0822-V3-2021-RA-01', 'description': 'Successful Re-Assessment with update of the vulnerability analysis.'}), frozendict({'id': 'BSI-DSZ-CC-0822-V3-2021-MA-02', 'description': 'Security Target'}), frozendict({'id': 'BSI-DSZ-CC-0822-V3-2021-MA-01', 'description': 'version number remains the same as the alternative components have the same behaviour as the original one.'}), frozendict({'id': 'BSI-DSZ-CC-0822-V3-2021', 'description': 'The previoulsly certified TOE was changed and re-certified to implement minor security-relevant optimizations.'}), frozendict({'id': 'BSI-DSZ-CC-0822-V2-2020', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-0822-2019-MA-01 (20.11.2019)', 'description': 'Certificate invalid'}), frozendict({'id': 'BSI-DSZ-CC-0822-2019 (25.09.2019)', 'description': 'Certificate invalid'})]
    • evaluation_facility: TÜV Informationstechnik GmbH
    • expiration_date: 19.12.2032
    • product: SMARTY IQ-LTE, Version 1.4
    • protection_profile: Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI-CC-PP-0073-2014
    • report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte08/0822V6a_pdf.pdf?__blob=publicationFile&v=2
    • target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte08/0822V6b_pdf.html?nn=456626
  • product: SMARTY IQ-LTE, Version 1.4
  • subcategory: (Smart Meter Gateway)
  • url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartMeter_Gateway/0822_0822V2_0822V3_0822V4_0822V5_0822V6.html
  • vendor: Sagemcom Dr. Neuhaus GmbH
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0957-V2-2016
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0957-V2-2016, BSI-DSZ-CC-0978-2016
heuristics/protection_profiles df09b703c88c665a, c88af12926be2779, f4474c6c73660987 6346b04de6859db3
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vpn_cli_v2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v3.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0073b_pdf.pdf
pdf_data/cert_filename st_vid11160-ci.pdf 0822V6c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11160-2021: 1
  • DE:
    • BSI-DSZ-CC-0822-V6-2024: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
  • EAL:
    • EAL 2: 1
    • EAL 4: 2
    • EAL 4 augmented: 1
    • EAL 5: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/vendor
  • Samsung:
    • Samsung: 2
pdf_data/cert_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 1
pdf_data/cert_keywords/crypto_protocol
  • VPN:
    • VPN: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20210315150610-04'00'
  • /ModDate: D:20210315150610-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 182575
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Federal Office for Information Security
  • /Keywords: "Common Criteria, Certification, Zertifizierung, SMGW, Smartmeter Gateway, Sagemcom, Dr. Neuhaus, Smart Grid"
  • /Subject: Common Criteria, Certification, Zertifizierung, SMGW, Smartmeter Gateway, Sagemcom, Dr. Neuhaus, Smart Grid
  • /Title: Certificate BSI-DSZ-CC-0822-V6-2024
  • pdf_file_size_bytes: 335622
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid11160-vr.pdf 0822V6a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • US:
    • cert_id: CCEVS-VR-VID11160-2021
    • cert_item: Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 11 - Spring
    • cert_lab: US NIAP
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.2 and AVA_VAN.5 valid until: 19 December 2032
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0822-V6-2024
    • cert_item: SMARTY IQ-LTE, Version 1.4
    • cert_lab: BSI
    • developer: Sagemcom Dr. Neuhaus GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI- CC-PP-0073-2014
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11160-2021: 1
  • DE:
    • BSI-DSZ-CC-0822-V5-2023: 3
    • BSI-DSZ-CC-0822-V6-2024: 14
    • BSI-DSZ-CC-0957-: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0073-2014: 3
    • BSI-CC-PP-0077-V2-2015: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 4: 8
    • EAL 4 augmented: 3
    • EAL 5: 3
    • EAL 5+: 1
    • EAL 6: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR: 3
    • ALC_FLR.2: 4
  • AVA:
    • AVA_VAN.5: 5
pdf_data/report_keywords/vendor
  • Qualcomm:
    • Qualcomm: 30
  • Samsung:
    • Samsung: 89
pdf_data/report_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 4
  • TUV:
    • TÜV Informationstechnik: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
      • AES-: 2
  • constructions:
    • MAC:
      • CMAC: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDSA:
      • ECDSA: 3
pdf_data/report_keywords/hash_function
  • JH:
    • JH: 1
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 6
  • TLS:
    • TLS:
      • TLS: 4
  • VPN:
    • VPN: 11
  • TLS:
    • TLS:
      • TLS: 12
pdf_data/report_keywords/cipher_mode
  • GCM:
    • GCM: 2
pdf_data/report_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-03109: 1
    • BSI TR-03116: 1
pdf_data/report_keywords/standard_id
  • X509:
    • X.509: 1
  • BSI:
    • AIS 32: 1
    • AIS 34: 2
    • AIS 38: 1
    • AIS 46: 2
    • AIS 48: 1
  • FIPS:
    • FIPS 186-4: 1
    • FIPS PUB 180-4: 1
    • FIPS PUB 186: 1
    • FIPS180-4: 3
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • RFC:
    • RFC 2104: 1
    • RFC 5246: 1
    • RFC 5639: 1
    • RFC 5652: 1
    • RFC 8289: 1
    • RFC 8422: 1
    • RFC2104: 2
    • RFC4493: 6
    • RFC5084: 2
    • RFC5246: 6
    • RFC5288: 2
    • RFC5289: 3
    • RFC5639: 6
    • RFC5652: 4
    • RFC6033: 2
    • RFC6090: 4
    • RFC6161: 2
    • RFC8422: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • Knox-specific claims made in this evaluation. All other functionality provided by the container is out of scope. 7 Documentation The following documents were available with the TOE for evaluation: Samsung: 1
    • out of scope: 1
  • ConfidentialDocument:
    • 23 / 27 Certification Report BSI-DSZ-CC-0822-V6-2024 [9] Configuration list for the TOE (confidential documents): filelist_OS, 2024-11-12 filelist_sln8209, 2024-11-12 8209SE011_SMGw_CPU_USB, Version 3.3: 1
    • Technical Report BSI-DSZ-CC-0822-V6, Version 1, 2024-11-15, TÜV Informationstechnik GmbH, (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
pdf_data/report_metadata
  • /CreationDate: D:20210701101149-04'00'
  • /ModDate: D:20210701101149-04'00'
  • pdf_file_size_bytes: 843882
  • pdf_hyperlinks: https://web.nvd.nist.gov/view/vuln/search
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
pdf_data/st_filename st_vid11160-st.pdf 0822V6b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0957-V2-2016: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0073: 4
    • BSI-CC-PP-0077-2013: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 1: 2
    • EAL 1 augmented: 2
  • EAL:
    • EAL 4: 5
    • EAL 4 augmented: 2
    • EAL4: 1
    • EAL4 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 8
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 9
    • AGD_PRE: 1
    • AGD_PRE.1: 5
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 3
    • ALC_CMS: 1
    • ALC_CMS.1: 4
    • ALC_TSU_EXT: 3
    • ALC_TSU_EXT.1: 8
  • ATE:
    • ATE_IND: 1
    • ATE_IND.1: 4
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 5
  • ADV:
    • ADV_ARC.1: 1
    • ADV_IMP.1: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 6
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.5: 7
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 4
    • FAU_GEN.1: 8
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 2
    • FAU_SAR.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SEL: 2
    • FAU_SEL.1: 1
    • FAU_SEL.1.1: 1
    • FAU_STG: 4
    • FAU_STG.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 1
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 12
    • FCS_CKM.1: 8
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 11
    • FCS_CKM_EXT: 18
    • FCS_CKM_EXT.1: 1
    • FCS_CKM_EXT.1.1: 1
    • FCS_CKM_EXT.1.2: 1
    • FCS_CKM_EXT.1.3: 1
    • FCS_CKM_EXT.2: 2
    • FCS_CKM_EXT.2.1: 2
    • FCS_CKM_EXT.3: 5
    • FCS_CKM_EXT.3.1: 1
    • FCS_CKM_EXT.3.2: 1
    • FCS_CKM_EXT.4: 2
    • FCS_CKM_EXT.4.1: 2
    • FCS_CKM_EXT.4.2: 1
    • FCS_CKM_EXT.5: 1
    • FCS_CKM_EXT.5.1: 1
    • FCS_CKM_EXT.5.2: 1
    • FCS_CKM_EXT.6: 1
    • FCS_CKM_EXT.6.1: 1
    • FCS_COP.1: 57
    • FCS_RBG_EXT: 6
    • FCS_RBG_EXT.1: 15
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_RBG_EXT.1.3: 1
    • FCS_RBG_EXT.2: 1
    • FCS_RBG_EXT.2.1: 1
    • FCS_SRV_EXT: 7
    • FCS_SRV_EXT.1.1: 1
    • FCS_SRV_EXT.2.1: 1
    • FCS_STG_EXT: 9
    • FCS_STG_EXT.1: 2
    • FCS_STG_EXT.1.1: 1
    • FCS_STG_EXT.1.2: 1
    • FCS_STG_EXT.1.3: 1
    • FCS_STG_EXT.1.4: 1
    • FCS_STG_EXT.1.5: 1
    • FCS_STG_EXT.2: 4
    • FCS_STG_EXT.2.1: 2
    • FCS_STG_EXT.2.2: 1
    • FCS_STG_EXT.3: 2
    • FCS_STG_EXT.3.1: 1
    • FCS_STG_EXT.3.2: 1
    • FCS_TLSC_EXT: 17
    • FCS_TLSC_EXT.1: 6
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.2: 1
    • FCS_TLSC_EXT.2.1: 1
  • FDP:
    • FDP_ACC.1: 3
    • FDP_ACF_EXT: 10
    • FDP_ACF_EXT.1.1: 1
    • FDP_ACF_EXT.1.2: 2
    • FDP_ACF_EXT.2.1: 1
    • FDP_ACF_EXT.3.1: 1
    • FDP_DAR_EXT: 6
    • FDP_DAR_EXT.1: 1
    • FDP_DAR_EXT.1.1: 1
    • FDP_DAR_EXT.1.2: 1
    • FDP_DAR_EXT.2: 2
    • FDP_DAR_EXT.2.1: 1
    • FDP_DAR_EXT.2.2: 1
    • FDP_DAR_EXT.2.3: 1
    • FDP_DAR_EXT.2.4: 1
    • FDP_IFC_EXT: 7
    • FDP_IFC_EXT.1: 1
    • FDP_IFC_EXT.1.1: 2
    • FDP_PBA_EXT: 3
    • FDP_PBA_EXT.1: 1
    • FDP_PBA_EXT.1.1: 1
    • FDP_RIP: 2
    • FDP_RIP.2: 1
    • FDP_RIP.2.1: 1
    • FDP_STG_EXT: 3
    • FDP_STG_EXT.1: 2
    • FDP_STG_EXT.1.1: 1
    • FDP_UPC_EXT: 3
    • FDP_UPC_EXT.1: 1
    • FDP_UPC_EXT.1.1: 1
    • FDP_UPC_EXT.1.2: 1
  • FIA:
    • FIA_AFL_EXT: 3
    • FIA_AFL_EXT.1: 3
    • FIA_AFL_EXT.1.1: 1
    • FIA_AFL_EXT.1.2: 1
    • FIA_AFL_EXT.1.3: 1
    • FIA_AFL_EXT.1.4: 1
    • FIA_AFL_EXT.1.5: 1
    • FIA_AFL_EXT.1.6: 1
    • FIA_BLT_EXT: 15
    • FIA_BLT_EXT.1: 1
    • FIA_BLT_EXT.1.1: 1
    • FIA_BLT_EXT.2: 1
    • FIA_BLT_EXT.2.1: 1
    • FIA_BLT_EXT.3: 1
    • FIA_BLT_EXT.3.1: 2
    • FIA_BLT_EXT.4: 1
    • FIA_BLT_EXT.4.1: 1
    • FIA_BLT_EXT.6: 1
    • FIA_BLT_EXT.6.1: 1
    • FIA_BMG_EXT.1: 12
    • FIA_PAE_EXT: 3
    • FIA_PAE_EXT.1: 1
    • FIA_PAE_EXT.1.1: 1
    • FIA_PMG_EXT: 3
    • FIA_PMG_EXT.1: 1
    • FIA_PMG_EXT.1.1: 1
    • FIA_PSK_EXT: 3
    • FIA_PSK_EXT.1: 1
    • FIA_PSK_EXT.1.1: 1
    • FIA_PSK_EXT.1.2: 1
    • FIA_PSK_EXT.1.3: 1
    • FIA_TRT_EXT: 3
    • FIA_TRT_EXT.1: 1
    • FIA_TRT_EXT.1.1: 1
    • FIA_UAU: 4
    • FIA_UAU.5: 2
    • FIA_UAU.5.1: 3
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 9
    • FIA_UAU.7: 2
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 9
    • FIA_UAU_EXT.1: 1
    • FIA_UAU_EXT.1.1: 1
    • FIA_UAU_EXT.2: 1
    • FIA_UAU_EXT.2.1: 1
    • FIA_UAU_EXT.2.2: 1
    • FIA_UAU_EXT.4: 1
    • FIA_UAU_EXT.4.1: 1
    • FIA_UAU_EXT.4.2: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF_EXT: 4
    • FMT_MOF_EXT.1.1: 1
    • FMT_MOF_EXT.1.2: 8
    • FMT_SMF: 4
    • FMT_SMF.1: 1
    • FMT_SMF_EXT: 11
    • FMT_SMF_EXT.1: 7
    • FMT_SMF_EXT.1.1: 8
    • FMT_SMF_EXT.2: 1
    • FMT_SMF_EXT.2.1: 2
    • FMT_SMF_EXT.3: 4
    • FMT_SMF_EXT.3.1: 1
  • FPT:
    • FPT_AEX_EXT: 19
    • FPT_AEX_EXT.1: 1
    • FPT_AEX_EXT.1.1: 1
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.2.1: 1
    • FPT_AEX_EXT.3: 1
    • FPT_AEX_EXT.3.1: 1
    • FPT_AEX_EXT.4: 1
    • FPT_AEX_EXT.4.1: 1
    • FPT_AEX_EXT.4.2: 1
    • FPT_AEX_EXT.5: 1
    • FPT_AEX_EXT.5.1: 1
    • FPT_AEX_EXT.5.2: 1
    • FPT_AEX_EXT.6.1: 1
    • FPT_BBD_EXT: 3
    • FPT_BBD_EXT.1: 1
    • FPT_BBD_EXT.1.1: 1
    • FPT_JTA_EXT: 3
    • FPT_JTA_EXT.1: 1
    • FPT_JTA_EXT.1.1: 1
    • FPT_KST_EXT: 9
    • FPT_KST_EXT.1: 1
    • FPT_KST_EXT.1.1: 1
    • FPT_KST_EXT.2: 1
    • FPT_KST_EXT.2.1: 1
    • FPT_KST_EXT.3: 1
    • FPT_KST_EXT.3.1: 1
    • FPT_NOT_EXT: 3
    • FPT_NOT_EXT.1: 1
    • FPT_NOT_EXT.1.1: 1
    • FPT_STM: 2
    • FPT_STM.1: 1
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 13
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.2: 10
    • FPT_TUD_EXT: 6
    • FPT_TUD_EXT.1: 1
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.2: 3
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
    • FPT_TUD_EXT.2.3: 1
    • FPT_TUD_EXT.2.4: 1
  • FTA:
    • FTA_SSL_EXT: 3
    • FTA_SSL_EXT.1: 2
    • FTA_SSL_EXT.1.1: 1
    • FTA_SSL_EXT.1.2: 1
    • FTA_SSL_EXT.1.3: 1
    • FTA_TAB: 2
    • FTA_TAB.1: 2
    • FTA_TAB.1.1: 1
    • FTA_WSE_EXT: 3
    • FTA_WSE_EXT.1: 2
    • FTA_WSE_EXT.1.1: 1
  • FTP:
    • FTP_ITC_EXT: 8
    • FTP_ITC_EXT.1: 2
    • FTP_ITC_EXT.1.1: 1
    • FTP_ITC_EXT.1.2: 1
    • FTP_ITC_EXT.1.3: 1
  • FAU:
    • FAU_ARP: 10
    • FAU_ARP.1: 1
    • FAU_CON.1.2: 1
    • FAU_GEN: 39
    • FAU_GEN.1: 17
    • FAU_GEN.2: 10
    • FAU_GEN.2.1: 1
    • FAU_SAA: 15
    • FAU_SAA.1: 4
    • FAU_SAR: 30
    • FAU_SAR.1: 6
    • FAU_STG: 34
    • FAU_STG.1: 8
    • FAU_STG.2: 10
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
    • FAU_STG.3: 3
    • FAU_STG.4: 3
  • FCO:
    • FCO_NRO: 3
    • FCO_NRO.1: 1
    • FCO_NRO.2: 11
    • FCO_NRO.2.1: 1
    • FCO_NRO.2.2: 1
    • FCO_NRO.2.3: 1
  • FCS:
    • FCS_CKM: 51
    • FCS_CKM.1: 16
    • FCS_CKM.2: 6
    • FCS_CKM.4: 30
    • FCS_CKM.4.1: 1
    • FCS_COP: 68
    • FCS_COP.1: 11
  • FDP:
    • FDP_ACC: 2
    • FDP_ACC.1: 9
    • FDP_ACC.2: 12
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 11
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC: 29
    • FDP_IFC.1: 12
    • FDP_IFC.2: 4
    • FDP_IFF: 26
    • FDP_IFF.1: 18
    • FDP_ITC.1: 12
    • FDP_ITC.2: 12
    • FDP_RIP: 2
    • FDP_RIP.1: 1
    • FDP_RIP.2: 8
    • FDP_RIP.2.1: 1
    • FDP_SDI: 2
    • FDP_SDI.1: 1
    • FDP_SDI.2: 9
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_AFL: 3
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 3
    • FIA_ATD.1: 13
    • FIA_ATD.1.1: 1
    • FIA_UAU: 5
    • FIA_UAU.1: 2
    • FIA_UAU.2: 9
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 9
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 10
    • FIA_UAU.6.1: 1
    • FIA_UID: 3
    • FIA_UID.1: 8
    • FIA_UID.2: 14
    • FIA_UID.2.1: 1
    • FIA_USB: 3
    • FIA_USB.1: 9
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MSA: 64
    • FMT_MSA.1: 9
    • FMT_MSA.3: 12
    • FMT_SMF: 2
    • FMT_SMF.1: 19
    • FMT_SMF.1.1: 1
    • FMT_SMR: 3
    • FMT_SMR.1: 29
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_CON: 6
    • FPR_CON.1: 12
    • FPR_CON.1.1: 3
    • FPR_CON.1.2: 3
    • FPR_PSE: 3
    • FPR_PSE.1: 9
    • FPR_PSE.1.1: 1
    • FPR_PSE.1.2: 1
    • FPR_PSE.1.3: 1
  • FPT:
    • FPT_FLS: 3
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 2
    • FPT_PHP: 3
    • FPT_PHP.1: 8
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_RPL: 3
    • FPT_RPL.1: 10
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_STM: 3
    • FPT_STM.1: 20
    • FPT_STM.1.1: 1
    • FPT_TST: 3
    • FPT_TST.1: 10
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 32
    • FTP_ITC.1: 9
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.CONFIG: 1
    • OE.NOTIFY: 1
    • OE.NO_TOE_BYPASS: 2
    • OE.PHYSICAL: 1
    • OE.PRECAUTION: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
  • OE:
    • OE.SM: 4
  • OSP:
    • OSP.SM: 5
pdf_data/st_keywords/vendor
  • Broadcom:
    • Broadcom: 3
  • Qualcomm:
    • Qualcomm: 54
  • Samsung:
    • Samsung: 180
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 23
      • AES-: 4
      • AES-128: 1
      • AES-256: 12
  • constructions:
    • MAC:
      • HMAC: 12
      • HMAC-SHA-256: 2
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 4
  • AES_competition:
    • AES:
      • AES: 3
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 4
      • ECDHE: 2
    • ECDSA:
      • ECDSA: 17
  • FF:
    • DH:
      • DH: 6
      • DHE: 1
      • Diffie-Hellman: 5
  • RSA:
    • RSA 2048: 2
  • ECC:
    • ECC:
      • ECC: 3
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 1
  • SHA:
    • SHA1:
      • SHA-1: 7
    • SHA2:
      • SHA-256: 22
      • SHA-384: 3
      • SHA-512: 3
  • JH:
    • JH: 1
  • SHA:
    • SHA2:
      • SHA-256: 3
      • SHA-384: 2
      • SHA256: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
  • MAC:
    • MAC: 8
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 12
    • IKEv1: 14
    • IKEv2: 11
  • IPsec:
    • IPsec: 42
  • TLS:
    • TLS:
      • TLS: 47
      • TLS 1.0: 1
      • TLS 1.1: 1
      • TLS 1.2: 2
  • VPN:
    • VPN: 105
  • TLS:
    • TLS:
      • TLS: 40
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 8
  • RNG:
    • RBG: 14
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 6
  • CCM:
    • CCM: 3
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 4
  • XTS:
    • XTS: 1
  • GCM:
    • GCM: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 16
    • P-384: 10
    • P-521: 8
    • secp256r1: 2
    • secp384r1: 2
  • NIST:
    • NIST P-256: 2
    • NIST P-384: 1
    • P-256: 2
    • P-384: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 2
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 22
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 3
    • physical tampering: 2
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI 7586: 1
    • BSI TR-02102-2: 1
    • BSI TR-03109: 1
    • BSI TR-03109-1: 9
    • BSI TR-03109-2: 1
    • BSI TR-03109-3: 1
    • BSI TR-03109-4: 1
    • BSI TR-03111: 1
    • BSI TR-03116-3: 1
    • BSI TR-03116-4: 1
pdf_data/st_keywords/tee_name
  • ARM:
    • TrustZone: 6
  • IBM:
    • SE: 4
  • other:
    • TEE: 26
  • IBM:
    • SE: 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 180-4: 7
    • FIPS 186-4: 8
    • FIPS 197: 11
    • FIPS 198-1: 6
    • FIPS PUB 186-4: 5
    • FIPS PUB 197: 2
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-38C: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-38E: 1
    • NIST SP 800-38F: 1
    • NIST SP 800-57: 1
    • SP 800-108: 5
    • SP 800-132: 2
    • SP 800-38A: 2
    • SP 800-38C: 3
    • SP 800-38E: 2
    • SP 800-38F: 1
    • SP 800-56A: 1
    • SP 800-90A: 5
  • PKCS:
    • PKCS 2: 1
    • PKCS#12: 2
  • RFC:
    • RFC 2246: 1
    • RFC 2560: 1
    • RFC 2818: 2
    • RFC 3394: 2
    • RFC 3526: 1
    • RFC 3602: 2
    • RFC 4106: 2
    • RFC 4109: 1
    • RFC 4301: 2
    • RFC 4303: 1
    • RFC 4346: 1
    • RFC 4945: 2
    • RFC 5216: 1
    • RFC 5246: 4
    • RFC 5280: 4
    • RFC 5282: 2
    • RFC 5288: 3
    • RFC 5289: 8
    • RFC 5759: 1
    • RFC 6125: 1
    • RFC 6379: 2
    • RFC 6960: 1
  • X509:
    • X.509: 9
  • BSI:
    • AIS20: 1
    • AIS31: 1
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 180-4: 3
    • FIPS 197: 6
  • RFC:
    • RFC 2104: 4
    • RFC 4493: 5
    • RFC 5084: 3
    • RFC 5246: 4
    • RFC 5289: 4
    • RFC 5652: 1
    • RFC 5905: 3
    • RFC5246: 2
    • RFC5905: 1
pdf_data/st_keywords/javacard_api_const
  • curves:
    • SECP256R1: 2
    • SECP384R1: 1
pdf_data/st_keywords/javacard_packages
  • com:
    • com.samsung.android.knox.net.vpn: 1
  • java:
    • java.security.cert: 1
pdf_data/st_metadata
  • /Author: Federal Office for Information Security
  • /Keywords: Smart Meter System, Gateway, Common Criteria, Smart Meter Gateway PP
  • /Subject: Schutzprofil für die Kommunikationseinheit eines intelligenten Messsystems für Stoff- und Energiemengen
  • /Title: Sagemcom Dr. Neuhaus SMARTY IQ-LTE Security Target
  • pdf_file_size_bytes: 2020364
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 112
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different