| name |
EROAD System |
STARCOS 3.6 COS C1 |
| category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
NO |
DE |
| status |
archived |
archived |
| not_valid_after |
25.06.2020 |
07.08.2020 |
| not_valid_before |
25.06.2015 |
07.08.2015 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20150625_SERTIT-059_CR_v10.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0916a_pdf.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_EROAD_v1.3_FINAL.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0916b_pdf.pdf |
| manufacturer |
EROAD |
G+D Mobile Security GmbH |
| manufacturer_web |
https://www.eroad.com/ |
https://www.gi-de.com/de/de/mobile-security/ |
| security_level |
EAL2+, ALC_FLR.1 |
EAL4+, ATE_DPT.2, AVA_VAN.5, ALC_DVS.2 |
| dgst |
69552df11adc055e |
207cf3620c83dbb5 |
| heuristics/cert_id |
SERTIT-059 |
BSI-DSZ-CC-0916-2015 |
| heuristics/cert_lab |
[] |
BSI |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ALC_FLR.1, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
ADV_TDS.3, ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, APE_ECD.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, APE_OBJ.2, ADV_IMP.1, ALC_LCD.1, ADV_FSP.4, ALC_DVS.2, ATE_DPT.2, ASE_SPD.1, APE_INT.1, ATE_COV.2, ADV_INT.3, ALC_TAT.1, APE_CCL.1, AGD_OPE.1, ALC_CMS.4, APE_SPD.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ADV_SPM.1, APE_REQ.2 |
| heuristics/extracted_versions |
- |
3.6 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0976-2015 |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0879-2014 |
| heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1243-2024, BSI-DSZ-CC-0976-V3-2019, BSI-DSZ-CC-0976-V4-2021, BSI-DSZ-CC-0976-2015, BSI-DSZ-CC-0976-V2-2018 |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0879-2014 |
| heuristics/scheme_data |
- category: Other Devices and Systems
- certification_date: 25.06.2015
- developer: EROAD
- enhanced:
- category: Other Devices and Systems
- cert_id: SERTIT-059
- certification_date: 25.06.2015
- description: EROAD is a fully integrated technology, tolling and services provider. EROAD is the first company in the world to implement a GPS/cellular based road charging platform across an entire country. EROAD's advanced technology provides road charging, compliance and commercial services with the same platform to lower overall client and delivery costs. EROAD's goal is to offer flexible and powerful solutions based on our innovative technology platform to assist in the creation of a transport sector that is responsive to the evolving needs of business, government and the wider community. The core element of EROAD's satellite-based solution is the secure Ehubo unit which reliably and accurately measures distance and location using multiple sensors. Data is transmitted via a secure cellular link to a back office facility that supports a wide range of regulatory and value-added applications, allowing clients to manage their vehicles and assets in the same web browser. The EROAD Depot is the secure web services and payment gateway, where customers manage their tax and compliance obligations, oversee their fleets, and access a wide range of EROAD services. It provides a comprehensive and evolving suite of reports that can be viewed, saved, exported and downloaded. Within the Depot, users are assigned - roles' which give them access to different functions and, depending on their role, allow them to create and filter fleets to focus on critical information.
- developer: EROAD
- documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/134947-1607951850/SERTIT/Sertifikater/2015/59/20150626_Sertit-059_C.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/134944-1607951845/SERTIT/Sertifikater/2015/59/ST_EROAD_v1.3_FINAL.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/134941-1607951842/SERTIT/Sertifikater/2015/59/20150625_SERTIT-059_CR_v10.pdf'})]})
- evaluation_facility: Advanced Data Security
- expiration_date: 25.06.2020
- level: EAL 2, ALC_FLR.1
- mutual_recognition: CCRA
- product: TOE versions of EROAD OBU:Hardware version: 03Firmware version: 1.18.05;TOE versions of EROAD Application:Software version: 11-11-2014-0239
- sponsor: EROAD
- product: EROAD System
- url: https://sertit.no/certified-products/product-archive/eroad-system
|
|
| heuristics/st_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1068-V4-2023, BSI-DSZ-CC-1067-V5-2024, BSI-DSZ-CC-0950-V2-2018, BSI-DSZ-CC-0950-2017, BSI-DSZ-CC-1068-2020, BSI-DSZ-CC-1067-V3-2022, BSI-DSZ-CC-1068-V3-2022, BSI-DSZ-CC-1068-V5-2024, BSI-DSZ-CC-1067-V4-2023, BSI-DSZ-CC-1068-V2-2022, BSI-DSZ-CC-1067-2020, BSI-DSZ-CC-1067-V2-2022 |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1068-V4-2023, BSI-DSZ-CC-1067-V5-2024, BSI-DSZ-CC-0950-V2-2018, BSI-DSZ-CC-0950-2017, BSI-DSZ-CC-1068-2020, BSI-DSZ-CC-1067-V3-2022, BSI-DSZ-CC-1068-V3-2022, BSI-DSZ-CC-1068-V5-2024, BSI-DSZ-CC-1067-V4-2023, BSI-DSZ-CC-1068-V2-2022, BSI-DSZ-CC-1067-2020, BSI-DSZ-CC-1067-V2-2022 |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
ecc28509c30de1a5 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0082V2b_pdf.pdf |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
20150625_SERTIT-059_CR_v10.pdf |
0916a_pdf.pdf |
| pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by AVA_VAN.5, ATE_DPT.2 and ALC_DVS.2 SOGIS Recognition Agreement
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0916-2015
- cert_item: STARCOS 3.6 COS C1
- cert_lab: BSI
- developer: Giesecke & Devrient GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Card Operating System Generation 2 (PP COS G2), Version 1.9, 18 November 2014, BSI-CC-PP-0082-V2-2014
|
| pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0879: 1
- BSI-DSZ-CC-0879-2014: 5
- BSI-DSZ-CC-0879-2014-MA-01: 5
- BSI-DSZ-CC-0879-MA-01: 1
- BSI-DSZ-CC-0916: 4
- BSI-DSZ-CC-0916-2015: 25
- BSI-DSZ-CC-S-0017-2014: 2
- BSI-DSZ-CC-S-0029-2014: 2
- BSI-DSZ-CC-S-0031-2014: 2
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0082-V2-2014: 4
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 18
- EAL 2 augmented: 18
- EAL 4: 1
- EAL1: 1
- EAL2: 1
- EAL7: 1
|
- EAL:
- EAL 1: 7
- EAL 2: 4
- EAL 3: 4
- EAL 4: 13
- EAL 4 augmented: 3
- EAL 5: 10
- EAL 5+: 1
- EAL 6: 4
- EAL 7: 4
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 3
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 6
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 1
- FAU_GEN.2: 1
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.4: 1
- FCS_COP.1: 1
- FDP:
- FDP_ACC.1: 2
- FDP_ACF.1: 2
- FDP_IFC.1: 1
- FDP_IFF.1: 1
- FIA:
- FIA_ATD.1: 1
- FIA_UAU.1: 1
- FIA_UID.1: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FPT_ITT_EXP.1: 1
- FPT_PHP.2: 1
- FPT_STM.1: 1
|
- FCS:
- FCS_CKM.1: 3
- FCS_COP: 4
- FCS_COP.1: 38
- FCS_RNG: 2
- FCS_RNG.1: 1
- FIA:
- FPT:
- FTP:
|
| pdf_data/report_keywords/cc_claims |
- A:
- O:
- O.ACCESS: 1
- O.ADMINISTRATION: 1
- O.AUDIT: 1
- O.CRYPTOGRAPHY: 1
- O.CRYPTO_VALIDATED: 1
- O.ID_AUTH: 1
- O.INTEGRITY: 1
- O.PROTECT: 1
- O.TAMPER_RESISTANCE: 1
- OE:
- OE.PERSON: 1
- OE.PROTECTION: 1
|
|
| pdf_data/report_keywords/vendor |
|
- GD:
- Infineon:
- Infineon: 12
- Infineon Technologies AG: 8
|
| pdf_data/report_keywords/eval_facility |
- ADS:
- Advanced Data Security: 1
|
- SRC:
- SRC Security Research & Consulting: 3
- TUV:
- TÜV Informationstechnik: 1
|
| pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
- FI:
- malfunction: 2
- physical tampering: 1
|
- FI:
- DFA: 1
- fault injection: 1
- malfunction: 1
- physical tampering: 1
- SCA:
- DPA: 1
- SPA: 1
- side channel: 1
- other:
|
| pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-03110: 1
- BSI TR-03116-1: 1
- BSI TR-03143: 4
- BSI TR-03144: 11
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- ISO:
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 20: 4
- AIS 23: 1
- AIS 25: 2
- AIS 26: 3
- AIS 31: 3
- AIS 32: 1
- AIS 34: 2
- AIS 35: 1
- AIS 36: 4
- AIS 38: 1
- FIPS:
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- FIPS PUB 197: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- PKCS:
- RFC:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
- OutOfScope:
- 1 SERTIT-059 CR Issue 1.0 25 June 2015 Page 15 of 16 these underlying environmental components are out of scope insofar as the TOE is concerned. TOE Documentation The supporting guidance documents evaluated in: 1
- out of scope: 1
|
- ConfidentialDocument:
- 2015, Giesecke & Devrient GmbH (confidential document) [11] Guidance Documentation STARCOS 3.6 – Main Document, Version 1.7, 25 July 2015, Giesecke &: 1
- Security Target STARCOS 3.6 COS C1, Version 1.0.87, 31 July 2015, Giesecke & Devrient GmbH (confidential document) [7] Security Target Lite BSI-DSZ-CC-0916, Security Target Lite STARCOS 3.6 COS C1, Version 1.5, 31: 1
- Summary for STARCOS 3.6 COS C1, Version 1.6, 31 July 2015, SRC Security Research & Consulting GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-0916, Configuration List STARCOS 3.6 COS C1, Version 1.4, 30: 1
- and certification procedure is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- procedure BSI-DSZ-CC-0879-2014, Version 1, 20 December 2013, TÜV Informationstechnik GmbH (confidential document) [23] Einführung der Gesundheitskarte, Spezifikation des Card Operating System (COS), Elektrische: 1
|
| pdf_data/report_metadata |
- /Author: Arne
- /CreationDate: D:20150626141410+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20150626141544+02'00'
- /Producer: Acrobat Distiller 9.5.5 (Windows)
- /Title: Microsoft Word - 20150625 SERTIT-059 CR v.1.0
- pdf_file_size_bytes: 561714
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20150818114030+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, STARCOS 3.6 COS C1, Giesecke & Devrient GmbH"
- /ModDate: D:20150818114542+02'00'
- /Producer: LibreOffice 4.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0916-2015
- pdf_file_size_bytes: 1431907
- pdf_hyperlinks: https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung
- pdf_is_encrypted: False
- pdf_number_of_pages: 48
|
| pdf_data/st_filename |
ST_EROAD_v1.3_FINAL.pdf |
0916b_pdf.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0879-2014-MA-01: 1
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0035-2007: 7
- BSI-CC-PP- 0082-V2: 1
- BSI-CC-PP-0035: 5
- BSI-CC-PP-0035-: 7
- BSI-CC-PP-0035-2007: 51
- BSI-CC-PP-0035-2007-2007: 1
- BSI-CC-PP-0059: 1
- BSI-CC-PP-0071: 1
- BSI-CC-PP-0072: 1
- BSI-CC-PP-0075: 1
- BSI-CC-PP-0082-: 4
- BSI-CC-PP-0082-V2: 34
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0035: 1
- BSI-PP-0035-: 3
- BSI-PP-0035-2007: 5
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2: 5
- EAL2 augmented: 5
|
- EAL:
- EAL4: 14
- EAL4 augmented: 4
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.1: 6
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 9
- ADV_FSP: 2
- ADV_FSP.4: 6
- ADV_IMP: 2
- ADV_IMP.1: 6
- ADV_TDS.3: 3
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 6
- AGD_PRE: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC: 2
- ALC_CMC.4: 1
- ALC_CMS: 2
- ALC_CMS.4: 1
- ALC_DEL: 2
- ALC_DEL.1: 1
- ALC_DVS: 2
- ALC_DVS.2: 11
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- APE:
- ASE:
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 10
- ATE_FUN.1: 6
- ATE_IND.2: 5
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 11
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FCS:
- FCS_CKM.1: 13
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 11
- FCS_CKM.4.1: 1
- FCS_COP.1: 12
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 22
- FDP_ACC.1.1: 2
- FDP_ACF.1: 20
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 12
- FDP_IFC.1.1: 1
- FDP_IFF.1: 8
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 4
- FDP_ITC.2: 4
- FIA:
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 16
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 11
- FMT_MOF.1.1: 1
- FMT_MSA.1: 9
- FMT_MSA.1.1: 1
- FMT_MSA.3: 15
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT_EXP.1: 11
- FPT_ITT_EXP.1.1: 2
- FPT_PHP.2: 8
- FPT_PHP.2.1: 1
- FPT_PHP.2.2: 1
- FPT_PHP.2.3: 1
- FPT_STM.1: 11
- FPT_STM.1.1: 1
|
- FAU:
- FCS:
- FCS_CKM: 86
- FCS_CKM.1: 48
- FCS_CKM.2: 12
- FCS_CKM.4: 81
- FCS_CKM.4.1: 1
- FCS_COP: 238
- FCS_COP.1: 37
- FCS_COP.1.1: 1
- FCS_RNG: 27
- FCS_RNG.1: 27
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 124
- FDP_ACC.1: 44
- FDP_ACF: 110
- FDP_ACF.1: 41
- FDP_IFC: 5
- FDP_IFC.1: 14
- FDP_ITC.1: 44
- FDP_ITC.2: 44
- FDP_ITT: 5
- FDP_ITT.1: 5
- FDP_RIP: 9
- FDP_RIP.1: 12
- FDP_RIP.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 9
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT: 7
- FDP_UCT.1: 1
- FDP_UIT: 8
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 22
- FIA_AFL.1: 4
- FIA_API: 14
- FIA_API.1: 19
- FIA_API.1.1: 2
- FIA_ATD: 10
- FIA_ATD.1: 20
- FIA_ATD.1.1: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU: 49
- FIA_UAU.1: 20
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 11
- FIA_UAU.4.1: 1
- FIA_UAU.5: 18
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 12
- FIA_UAU.6.1: 1
- FIA_UID: 14
- FIA_UID.1: 19
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 33
- FIA_USB.1: 30
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 2
- FMT:
- FMT_LIM: 11
- FMT_LIM.1: 5
- FMT_LIM.2: 4
- FMT_MSA: 68
- FMT_MSA.1: 8
- FMT_MSA.3: 38
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 2
- FMT_MTD: 38
- FMT_MTD.1: 4
- FMT_SMF.1: 51
- FMT_SMF.1.1: 2
- FMT_SMR: 10
- FMT_SMR.1: 41
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 13
- FPT_EMS.1: 17
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS: 5
- FPT_FLS.1: 18
- FPT_FLS.1.1: 1
- FPT_ITE: 17
- FPT_ITE.1: 15
- FPT_ITE.1.1: 2
- FPT_ITE.1.2: 2
- FPT_ITE.2: 16
- FPT_ITE.2.1: 5
- FPT_ITE.2.2: 2
- FPT_ITT: 5
- FPT_ITT.1: 5
- FPT_PHP: 5
- FPT_PHP.3: 6
- FPT_TDC.1: 10
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 2
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FTP:
- FTP_ITC: 22
- FTP_ITC.1: 12
- FTP_ITE: 1
- FTP_TRP.1: 5
|
| pdf_data/st_keywords/cc_claims |
- A:
- O:
- O.ACCESS: 7
- O.ADMINISTRATION: 10
- O.AUDIT: 9
- O.CRYPTOGRAPHY: 10
- O.CRYPTO_VALIDATED: 6
- O.ID_AUTH: 5
- O.INTEGRITY: 8
- O.PROTECT: 10
- O.TAMPER_RESISTANCE: 6
- OE:
- OE.PERSON: 9
- OE.PROTECTION: 4
|
- O:
- O.PACE: 1
- O.PACE_CHIP: 2
- O.RND: 8
- T:
|
| pdf_data/st_keywords/vendor |
|
- GD:
- G&D: 5
- Giesecke & Devrient: 8
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 2
- NXP:
- STMicroelectronics:
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 12
- SHA-384: 6
- SHA-512: 4
|
| pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 1
- Key agreement: 1
- MAC:
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 5
- brainpoolP384r1: 5
- brainpoolP512r1: 4
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
- FI:
- malfunction: 6
- physical tampering: 9
|
- FI:
- DFA: 1
- Malfunction: 20
- malfunction: 1
- physical tampering: 3
- SCA:
- DPA: 2
- Leak-Inherent: 17
- Physical Probing: 2
- SPA: 2
- side channel: 1
- timing attacks: 1
- other:
- Bleichenbacher attack: 1
- JIL: 1
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 7
- FIPS 186-4: 1
- FIPS PUB 140-2: 1
- FIPS PUB 180-4: 1
- FIPS PUB 197: 2
- FIPS PUB 198: 2
|
- BSI:
- CC:
- CCMB-2012-09-001: 3
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 3
- CCMB-2012-09-004: 2
- FIPS:
- FIPS 180-4: 1
- FIPS 197: 3
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816: 2
- ISO/IEC 9797-1: 1
- NIST:
- NIST SP 800-38B: 1
- NIST SP 800-67: 3
- PKCS:
- PKCS #1: 1
- PKCS#3: 1
- PKCS1: 4
- RFC:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
- OutOfScope:
- out of scope: 2
- private, secure, and not exposed. Therefore, these underlying environmental components are out of scope insofar as the TOE is concerned. Further, EROAD security is stand alone, isolated, self-contained: 1
- protects and secures the OBU Gateway and communications with it, but that environment is out of scope insofar as the TOE is concerned. ESP Server The ESP server and associated protocol (Ebox to Server: 1
|
|
| pdf_data/st_metadata |
- /Author: Admin
- /CreationDate: D:20150618214315-07'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20150618214315-07'00'
- /Producer: GPL Ghostscript 8.64
- /Title: Microsoft Word - ST EROAD v1.3 - FINAL.docx
- pdf_file_size_bytes: 1236897
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 42
|
- /Author: Giesecke & Devrient GmbH
- /Bearbeitet von: Alexander Summerer
- /Category: Security Target to BSI-CC-PP-0082-V2
- /Company: Giesecke & Devrient
- /CreationDate: D:20150914143531+02'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /Eigentümer: G&D
- /Erstellt von: Alexander Summerer
- /Gegenstand: Common Criteria Protection Security Target
- /Keywords: V1.5/31.07.15
- /ModDate: D:20150914143614+02'00'
- /Producer: Adobe PDF Library 10.0
- /SourceModified: D:20150914123309
- /Subject: Security Target Lite STARCOS 3.6 COS C1
- /Title: Giesecke&Devrient Security Target to BSI-PP-0082
- pdf_file_size_bytes: 1531647
- pdf_hyperlinks: http://tools.ietf.org/html/rfc5639
- pdf_is_encrypted: False
- pdf_number_of_pages: 173
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |