name |
bizhub 958/bizhub PRO 958/bizhub 808/bizhub 758/ineo 958/ineo 758 G00-14 |
SMARTY IQ-GPRS / LTE, Version 1.4 |
category |
Multi-Function Devices |
Other Devices and Systems |
scheme |
JP |
DE |
status |
archived |
active |
not_valid_after |
29.06.2021 |
19.12.2032 |
not_valid_before |
29.06.2016 |
20.12.2024 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0822V6c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0515_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0822V6a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0515_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0822V6b_pdf.pdf |
manufacturer |
KONICA MINOLTA, INC. |
Sagemcom Dr. Neuhaus GmbH |
manufacturer_web |
https://www.konicaminolta.com/index.html |
https://sagemcom.com |
security_level |
EAL2+, ALC_FLR.2 |
EAL4+, ALC_FLR.2, AVA_VAN.5 |
dgst |
6147b68ac576bf82 |
4b7dcf610d994944 |
heuristics/cert_id |
JISEC-CC-CRP-C0515 |
BSI-DSZ-CC-0822-V6-2024 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
cpe:2.3:h:konicaminolta:bizhub_808:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_758:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_958:-:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ATE_COV.2, ASE_TSS.1, ASE_INT.1, ATE_FUN.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_ARC.1, AGD_OPE.1, ASE_REQ.2, ASE_CCL.1, ALC_CMC.4, ALC_FLR.2, ADV_IMP.1 |
heuristics/extracted_versions |
758, 958, 14, 808 |
1.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0822-V5-2023 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0822-V2-2020, BSI-DSZ-CC-0822-V4-2023, BSI-DSZ-CC-0822-V3-2021, BSI-DSZ-CC-0822-V5-2023 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0515
- certification_date: 01.06.2016
- claim: EAL2+ALC_FLR.2 PP
- enhanced:
- assurance_level: EAL2 Augmented with ALC_FLR.2
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0515_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is an MFP (Multi-Function Printer) that offers Copy, Scan, Print, Fax, and Document storage and retrieval functions. The TOE provides security functions that conform to U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std 2600.2™-2009) which is the MFP security requirement specification, to prevent unauthorized disclosure and alteration of user’s document data. TOE Security functions The TOE provides the following security functions. - Identification and authentication Function to identify and authenticate users. - User restriction control function Function to restrict available functions of users and to control the access to document data other than accumulated documents only to the authorized users. - Accumulated documents access control function Function to control the access to accumulated documents only to the authorized users. - HDD encryption function Function to encrypt the data that is stored in HDD. - Residual information deletion function Function to overwrite and delete the data stored in HDD, so that they cannot be reused. - Audit log function Function to record audit log related to security functions. - Network communication protection function Function to encrypt communication data on the LAN. - Self-test function Function to verify the integrity of executable codes of HDD encryption function and security functions. - Security management function Function to control the management of security functions only to the authorized users. - External interface separation function Function to prevent unauthorized transfer to LAN from external interface like public phone etc.
- evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
- product: bizhub 958/bizhub PRO 958/bizhub 808/bizhub 758/ineo 958/ineo 758
- product_type: Multi-Function Printer
- protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- report_link: https://www.ipa.go.jp/en/security/c0515_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0515_est.pdf
- toe_version: G00-14
- vendor: KONICA MINOLTA, INC.
- expiration_date: 01.07.2021
- revalidations: [frozendict({'date': '2017-11', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0515_it5586_01.html'})]
- supplier: KONICA MINOLTA,INC.
- toe_japan_name: bizhub 958/bizhub PRO 958/bizhub 808/bizhub 758/ineo 958/ineo 758G00-14
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0515_it5586.html
- toe_overseas_name: bizhub 958/bizhub PRO 958/bizhub 808/bizhub 758/ineo 958/ineo 758/Sindoh N911/Sindoh N910/Sindoh MF9141/Sindoh MF7121G00-14
|
- category: Intelligent measuring systems
- cert_id: BSI-DSZ-CC-0822-V6-2024
- certification_date: 20.12.2024
- enhanced:
- applicant: Sagemcom Dr. Neuhaus GmbH Papenreye 65 22453 Hamburg
- assurance_level: EAL4+,AVA_VAN.5,ALC_FLR.2
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte08/0822V6c_pdf.pdf?__blob=publicationFile&v=2
- certification_date: 20.12.2024
- entries: [frozendict({'id': 'BSI-DSZ-CC-0822-V6-2024', 'description': 'The focus of this recertification was on the introduction of a new LTE-Modul for WAN-communication, the GWA-change process implementation following FNN requirements and the introduction of proxy-profiles and communication scenario HKS3 with SOCKSv5.'}), frozendict({'id': 'BSI-DSZ-CC-0822-V5-2023', 'description': 'components.'}), frozendict({'id': 'BSI-DSZ-CC-0822-V4-2023', 'description': 'The focus of this recertification was on the update of the operating system and some libraries, the implementation of changed and added tariff use cases (TAF 2, TAF 9, TAF 10, TAF 14), the support of IPv6 and the support of firmware download.'}), frozendict({'id': 'BSI-DSZ-CC-0822-V3-2021-RA-02', 'description': 'The CC-certificate BSI-DSZ-CC-0822-V3-2021 remains valid for 2 further years.'}), frozendict({'id': 'BSI-DSZ-CC-0822-V3-2021-RA-01', 'description': 'Successful Re-Assessment with update of the vulnerability analysis.'}), frozendict({'id': 'BSI-DSZ-CC-0822-V3-2021-MA-02', 'description': 'Security Target'}), frozendict({'id': 'BSI-DSZ-CC-0822-V3-2021-MA-01', 'description': 'version number remains the same as the alternative components have the same behaviour as the original one.'}), frozendict({'id': 'BSI-DSZ-CC-0822-V3-2021', 'description': 'The previoulsly certified TOE was changed and re-certified to implement minor security-relevant optimizations.'}), frozendict({'id': 'BSI-DSZ-CC-0822-V2-2020', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-0822-2019-MA-01 (20.11.2019)', 'description': 'Certificate invalid'}), frozendict({'id': 'BSI-DSZ-CC-0822-2019 (25.09.2019)', 'description': 'Certificate invalid'})]
- evaluation_facility: TÜV Informationstechnik GmbH
- expiration_date: 19.12.2032
- product: SMARTY IQ-LTE, Version 1.4
- protection_profile: Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI-CC-PP-0073-2014
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte08/0822V6a_pdf.pdf?__blob=publicationFile&v=2
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte08/0822V6b_pdf.html?nn=456626
- product: SMARTY IQ-LTE, Version 1.4
- subcategory: (Smart Meter Gateway)
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartMeter_Gateway/0822_0822V2_0822V3_0822V4_0822V5_0822V6.html
- vendor: Sagemcom Dr. Neuhaus GmbH
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0957-V2-2016 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0957-V2-2016, BSI-DSZ-CC-0978-2016 |
heuristics/protection_profiles |
43ce79b420f23a00 |
6346b04de6859db3 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0073b_pdf.pdf |
pdf_data/cert_filename |
|
0822V6c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0822-V6-2024: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 2
- EAL 4 augmented: 1
- EAL 5: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, SMGW, Smartmeter Gateway, Sagemcom, Dr. Neuhaus, Smart Grid"
- /Subject: Common Criteria, Certification, Zertifizierung, SMGW, Smartmeter Gateway, Sagemcom, Dr. Neuhaus, Smart Grid
- /Title: Certificate BSI-DSZ-CC-0822-V6-2024
- pdf_file_size_bytes: 335622
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0515_erpt.pdf |
0822V6a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.2 and AVA_VAN.5 valid until: 19 December 2032
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0822-V6-2024
- cert_item: SMARTY IQ-LTE, Version 1.4
- cert_lab: BSI
- developer: Sagemcom Dr. Neuhaus GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI- CC-PP-0073-2014
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0515-01: 1
- Certification No. C0515: 1
|
- DE:
- BSI-DSZ-CC-0822-V5-2023: 3
- BSI-DSZ-CC-0822-V6-2024: 14
- BSI-DSZ-CC-0957-: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0073-2014: 3
- BSI-CC-PP-0077-V2-2015: 2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 4
- EAL2 augmented: 3
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 8
- EAL 4 augmented: 3
- EAL 5: 3
- EAL 5+: 1
- EAL 6: 1
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.ADMIN: 2
- A.USER: 1
- T:
- T.CONF: 4
- T.DOC: 4
- T.FUNC: 2
- T.PROT: 2
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-03109: 1
- BSI TR-03116: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
|
- BSI:
- AIS 32: 1
- AIS 34: 2
- AIS 38: 1
- AIS 46: 2
- AIS 48: 1
- FIPS:
- FIPS 186-4: 1
- FIPS PUB 180-4: 1
- FIPS PUB 186: 1
- FIPS180-4: 3
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- RFC:
- RFC 2104: 1
- RFC 5246: 1
- RFC 5639: 1
- RFC 5652: 1
- RFC 8289: 1
- RFC 8422: 1
- RFC2104: 2
- RFC4493: 6
- RFC5084: 2
- RFC5246: 6
- RFC5288: 2
- RFC5289: 3
- RFC5639: 6
- RFC5652: 4
- RFC6033: 2
- RFC6090: 4
- RFC6161: 2
- RFC8422: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 23 / 27 Certification Report BSI-DSZ-CC-0822-V6-2024 [9] Configuration list for the TOE (confidential documents): filelist_OS, 2024-11-12 filelist_sln8209, 2024-11-12 8209SE011_SMGw_CPU_USB, Version 3.3: 1
- Technical Report BSI-DSZ-CC-0822-V6, Version 1, 2024-11-15, TÜV Informationstechnik GmbH, (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20160712093056+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20160712093348+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 425288
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 36
|
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, SMGW, Smartmeter Gateway, Sagemcom, Dr. Neuhaus, Smart Grid"
- /Subject: Common Criteria, Certification, Zertifizierung, SMGW, Smartmeter Gateway, Sagemcom, Dr. Neuhaus, Smart Grid
- /Title: Certification Report BSI-DSZ-CC-0822-V6-2024
- pdf_file_size_bytes: 661868
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 27
|
pdf_data/st_filename |
c0515_est.pdf |
0822V6b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0957-V2-2016: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0073: 4
- BSI-CC-PP-0077-2013: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 2
- EAL 2 augmented: 1
- EAL2: 2
- EAL2 augmented: 1
|
- EAL:
- EAL 4: 5
- EAL 4 augmented: 2
- EAL4: 1
- EAL4 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 5
- APE:
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 6
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_STG.1: 10
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 2
- FAU_STG.4: 13
- FAU_STG.4.1: 2
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 9
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 4
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 23
- FDP_ACC.1.1: 2
- FDP_ACF.1: 18
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC: 1
- FDP_IFC.1: 2
- FDP_IFF: 1
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_SOS.1: 18
- FIA_SOS.1.1: 2
- FIA_UAU.1: 11
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 8
- FIA_UAU.7.1: 1
- FIA_UID.1: 20
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 14
- FMT_MOF.1.1: 1
- FMT_MSA.1: 21
- FMT_MSA.1.1: 2
- FMT_MSA.3: 15
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 9
- FMT_MTD.1.1: 2
- FMT_SMF: 2
- FMT_SMF.1: 20
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 25
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FDI_EXP: 3
- FPT_FDI_EXP.1: 10
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 7
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 9
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_ARP: 10
- FAU_ARP.1: 1
- FAU_CON.1.2: 1
- FAU_GEN: 39
- FAU_GEN.1: 17
- FAU_GEN.2: 10
- FAU_GEN.2.1: 1
- FAU_SAA: 15
- FAU_SAA.1: 4
- FAU_SAR: 30
- FAU_SAR.1: 6
- FAU_STG: 34
- FAU_STG.1: 8
- FAU_STG.2: 10
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FAU_STG.3: 3
- FAU_STG.4: 3
- FCO:
- FCO_NRO: 3
- FCO_NRO.1: 1
- FCO_NRO.2: 11
- FCO_NRO.2.1: 1
- FCO_NRO.2.2: 1
- FCO_NRO.2.3: 1
- FCS:
- FCS_CKM: 51
- FCS_CKM.1: 16
- FCS_CKM.2: 6
- FCS_CKM.4: 30
- FCS_CKM.4.1: 1
- FCS_COP: 68
- FCS_COP.1: 11
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 9
- FDP_ACC.2: 12
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 1
- FDP_ACF.1: 11
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 29
- FDP_IFC.1: 12
- FDP_IFC.2: 4
- FDP_IFF: 26
- FDP_IFF.1: 18
- FDP_ITC.1: 12
- FDP_ITC.2: 12
- FDP_RIP: 2
- FDP_RIP.1: 1
- FDP_RIP.2: 8
- FDP_RIP.2.1: 1
- FDP_SDI: 2
- FDP_SDI.1: 1
- FDP_SDI.2: 9
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_AFL: 3
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 3
- FIA_ATD.1: 13
- FIA_ATD.1.1: 1
- FIA_UAU: 5
- FIA_UAU.1: 2
- FIA_UAU.2: 9
- FIA_UAU.2.1: 1
- FIA_UAU.5: 9
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 10
- FIA_UAU.6.1: 1
- FIA_UID: 3
- FIA_UID.1: 8
- FIA_UID.2: 14
- FIA_UID.2.1: 1
- FIA_USB: 3
- FIA_USB.1: 9
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA: 64
- FMT_MSA.1: 9
- FMT_MSA.3: 12
- FMT_SMF: 2
- FMT_SMF.1: 19
- FMT_SMF.1.1: 1
- FMT_SMR: 3
- FMT_SMR.1: 29
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_CON: 6
- FPR_CON.1: 12
- FPR_CON.1.1: 3
- FPR_CON.1.2: 3
- FPR_PSE: 3
- FPR_PSE.1: 9
- FPR_PSE.1.1: 1
- FPR_PSE.1.2: 1
- FPR_PSE.1.3: 1
- FPT:
- FPT_FLS: 3
- FPT_FLS.1: 9
- FPT_FLS.1.1: 2
- FPT_PHP: 3
- FPT_PHP.1: 8
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_RPL: 3
- FPT_RPL.1: 10
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_STM: 3
- FPT_STM.1: 20
- FPT_STM.1.1: 1
- FPT_TST: 3
- FPT_TST.1: 10
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.ADMIN: 6
- A.USER: 3
- D:
- D.CONF: 7
- D.DOC: 37
- D.FUNC: 21
- D.PROT: 8
- O:
- O.AUDIT: 6
- O.CONF: 12
- O.DOC: 13
- O.FUNC: 6
- O.HDD: 9
- O.INTERFACE: 6
- O.PROT: 6
- O.SOFTWARE: 6
- O.USER: 11
- O.USER_AUTHORIZED: 1
- OE:
- OE.ADMIN: 6
- OE.AUDIT: 3
- OE.AUDIT_ACCESS: 3
- OE.AUDIT_STORAGE: 3
- OE.INTERFACE: 3
- OE.PHYISCAL: 1
- OE.PHYSICAL: 2
- OE.USER: 12
- T:
- T.CONF: 6
- T.DOC: 6
- T.FUNC: 3
- T.PROT: 3
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- JH:
- SHA:
- SHA2:
- SHA-256: 3
- SHA-384: 2
- SHA256: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- NIST P-256: 2
- NIST P-384: 1
- P-256: 2
- P-384: 1
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- malfunction: 3
- physical tampering: 2
|
pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI 7586: 1
- BSI TR-02102-2: 1
- BSI TR-03109: 1
- BSI TR-03109-1: 9
- BSI TR-03109-2: 1
- BSI TR-03109-3: 1
- BSI TR-03109-4: 1
- BSI TR-03111: 1
- BSI TR-03116-3: 1
- BSI TR-03116-4: 1
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- FIPS:
- FIPS 140-2: 1
- FIPS 180-4: 3
- FIPS 197: 6
- RFC:
- RFC 2104: 4
- RFC 4493: 5
- RFC 5084: 3
- RFC 5246: 4
- RFC 5289: 4
- RFC 5652: 1
- RFC 5905: 3
- RFC5246: 2
- RFC5905: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
- curves:
- SECP256R1: 2
- SECP384R1: 1
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: e08884
- /CreationDate: D:20160707134105+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20160707134105+09'00'
- /Producer: Acrobat Distiller 15.0 (Windows)
- /Title: Microsoft Word - 【C0515】英文_ASE_MinervaSBK-2.00-160622.docx
- pdf_file_size_bytes: 547422
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 79
|
- /Author: Federal Office for Information Security
- /Keywords: Smart Meter System, Gateway, Common Criteria, Smart Meter Gateway PP
- /Subject: Schutzprofil für die Kommunikationseinheit eines intelligenten Messsystems für Stoff- und Energiemengen
- /Title: Sagemcom Dr. Neuhaus SMARTY IQ-LTE Security Target
- pdf_file_size_bytes: 2020364
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 112
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |