name |
SUSE Linux Enterprise Server Version 12 |
Sm@rtCafé® Expert 7.0 EAL 6+ C1 |
category |
Operating Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
DE |
DE |
status |
archived |
active |
not_valid_after |
24.02.2021 |
29.05.2025 |
not_valid_before |
24.02.2016 |
29.05.2020 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1092c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0962a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1092a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0962b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1092b_pdf.pdf |
manufacturer |
SUSE LLC |
Veridos GmbH - Identity Solutions by Giesecke & Devrient and Bundesdruckerei |
manufacturer_web |
https://www.suse.com |
https://www.veridos.com |
security_level |
EAL4+, ALC_FLR.3 |
EAL6+, ALC_FLR.1 |
dgst |
6bc623917fc5cad1 |
e4256d8111c60a46 |
heuristics/cert_id |
BSI-DSZ-CC-0962-2016 |
BSI-DSZ-CC-1092-2020 |
heuristics/cert_lab |
BSI |
BSI |
heuristics/cpe_matches |
cpe:2.3:o:suse:suse_linux_enterprise_server:12:-:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
CVE-2015-8778, CVE-2014-9584, CVE-2016-1693, CVE-2015-8779, CVE-2014-7169, CVE-2014-2494, CVE-2016-2799, CVE-2016-3715, CVE-2016-1678, CVE-2020-6428, CVE-2016-1703, CVE-2015-2695, CVE-2014-9761, CVE-2015-4495, CVE-2015-5154, CVE-2018-12116, CVE-2016-2324, CVE-2014-6464, CVE-2014-8160, CVE-2016-1680, CVE-2015-7976, CVE-2015-0382, CVE-2015-8126, CVE-2020-15705, CVE-2016-1690, CVE-2014-4287, CVE-2016-9957, CVE-2015-4000, CVE-2016-1676, CVE-2016-1961, CVE-2016-2793, CVE-2021-45082, CVE-2014-6474, CVE-2016-1694, CVE-2015-5239, CVE-2016-8568, CVE-2016-0651, CVE-2014-6469, CVE-2016-1286, CVE-2015-2697, CVE-2016-1677, CVE-2016-1285, CVE-2016-1974, CVE-2016-1654, CVE-2015-3340, CVE-2016-2802, CVE-2019-18902, CVE-2014-6478, CVE-2020-6424, CVE-2018-19052, CVE-2015-0391, CVE-2016-2792, CVE-2014-6496, CVE-2015-6855, CVE-2014-9854, CVE-2015-4902, CVE-2015-0381, CVE-2020-5504, CVE-2015-4106, CVE-2016-1700, CVE-2016-1698, CVE-2020-15706, CVE-2016-1692, CVE-2014-4260, CVE-2016-2315, CVE-2016-2794, CVE-2016-2790, CVE-2014-3673, CVE-2016-2798, CVE-2011-3172, CVE-2016-0668, CVE-2014-6463, CVE-2016-1685, CVE-2016-1689, CVE-2015-0272, CVE-2015-5006, CVE-2015-2737, CVE-2020-6449, CVE-2016-1699, CVE-2016-2791, CVE-2010-5298, CVE-2014-7815, CVE-2016-1682, CVE-2016-7966, CVE-2015-2590, CVE-2016-8569, CVE-2018-12122, CVE-2016-2796, CVE-2018-16873, CVE-2016-2795, CVE-2021-41817, CVE-2016-5118, CVE-2015-5300, CVE-2015-1283, CVE-2015-0192, CVE-2015-3209, CVE-2016-0264, CVE-2016-1695, CVE-2016-2801, CVE-2018-16874, CVE-2016-1687, CVE-2016-1651, CVE-2016-1697, CVE-2023-29552, CVE-2014-6555, CVE-2016-0718, CVE-2014-6559, CVE-2020-14147, CVE-2020-6426, CVE-2016-1672, CVE-2014-6505, CVE-2020-6429, CVE-2014-9585, CVE-2016-1681, CVE-2016-5325, CVE-2016-1701, CVE-2015-1241, CVE-2014-6551, CVE-2015-2808, CVE-2016-1691, CVE-2015-2696, CVE-2020-6422, CVE-2019-15624, CVE-2014-2978, CVE-2016-1674, CVE-2019-18903, CVE-2014-6564, CVE-2015-7547, CVE-2016-9959, CVE-2016-2800, CVE-2014-6271, CVE-2019-18901, CVE-2021-4166, CVE-2016-5131, CVE-2014-6520, CVE-2015-8776, CVE-2015-0432, CVE-2014-6494, CVE-2014-6568, CVE-2016-1960, CVE-2016-2782, CVE-2020-15707, CVE-2014-3470, CVE-2016-5244, CVE-2016-1688, CVE-2016-3714, CVE-2016-9958, CVE-2016-1653, CVE-2021-41819, CVE-2016-2797, CVE-2002-20001, CVE-2015-8567, CVE-2014-6530, CVE-2016-1964, CVE-2016-2806, CVE-2019-18897, CVE-2016-7099, CVE-2015-0374, CVE-2016-0642, CVE-2015-5041, CVE-2014-4258, CVE-2014-6495, CVE-2016-3718, CVE-2016-1656, CVE-2015-2738, CVE-2014-9116, CVE-2016-1702, CVE-2016-1652, CVE-2014-0198, CVE-2016-1977, CVE-2014-0221, CVE-2016-1659, CVE-2016-1683, CVE-2016-1655, CVE-2016-1679, CVE-2014-6507, CVE-2016-1675, CVE-2015-2734, CVE-2016-1602, CVE-2014-2977, CVE-2014-6484, CVE-2020-8013, CVE-2014-4207, CVE-2016-1673, CVE-2016-1686, CVE-2016-2178, CVE-2020-6427, CVE-2016-3427, CVE-2016-2807, CVE-2016-1696 |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 |
ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ASE_TSS.1, ALC_FLR.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ATE_FUN.2, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_IMP.2, ALC_CMC.5, ASE_REQ.2, ADV_INT.3, ASE_INT.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1 |
heuristics/extracted_versions |
12 |
7.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0852-2013 |
BSI-DSZ-CC-1028-2017, BSI-DSZ-CC-0951-V4-2019 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0852-2013, BSI-DSZ-CC-0787-2013 |
BSI-DSZ-CC-1028-2017, BSI-DSZ-CC-0951-V3-2018, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0951-2015, BSI-DSZ-CC-0951-V2-2017, BSI-DSZ-CC-0868-2014, BSI-DSZ-CC-0951-V4-2019 |
heuristics/scheme_data |
|
- category: Smart Cards and similar devices
- cert_id: BSI-DSZ-CC-1092-2020
- certification_date: 29.05.2020
- enhanced:
- applicant: Veridos GmbH - Identity Solutions by Giesecke & Devrient and Bundesdruckerei Oranienstraße 91 10969 Berlin
- assurance_level: EAL6+,ALC_FLR.1
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1092c_pdf.pdf?__blob=publicationFile&v=1
- certification_date: 29.05.2020
- description: The Target of Evaluation (TOE), the Sm@rtCafé® Expert 7.0 EAL 6+ C1 is a dual-interface, contact based or a pure contactless smart card with a Java Card operating system (OS). The composite TOE is a multi-purpose Java Card platform where applets of different kind can be installed. Since a post-issuance installation of applets is possible, the TOE corresponds to an open configuration, as defined in the PP. Depending on the installed applets, the entire product (consisting of the TOE plus applets) can be used as a government card (like an ID card or a passport), a payment card, a signature card and for other purposes. The composite TOE is based on the certified Integrated Circuit (IC) M5073 G11 (Certification ID BSI-DSZ-CC-0951-V4-2019). The composite TOE comprises the underlying hardware IC, the operating system including the G+D crypto library and according TOE guidance documents. The Biometric API is not part of the TOE and can be part of the product or not.
- evaluation_facility: TÜV Informationstechnik GmbH
- expiration_date: 28.05.2025
- product: Sm@rtCafé® Expert 7.0 EAL 6+ C1
- protection_profile: Java Card Protection Profile - Open Configuration, December 2017, Version 3.0.5, BSI-CC-PP-0099-2017
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1092a_pdf.pdf?__blob=publicationFile&v=1
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1092b_pdf.pdf?__blob=publicationFile&v=1
- product: Sm@rtCafé® Expert 7.0 EAL 6+ C1
- subcategory: Operating systems and applications
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_Betriebssysteme_Anwendungen/1092.html
- vendor: Veridos GmbH - Identity Solutions by Giesecke & Devrient and Bundesdruckerei
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0951-V4-2019 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0951-V4-2019 |
heuristics/protection_profiles |
70cdc8b0cf910af7 |
94167fd161e87d71 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0067b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099b_pdf.pdf |
pdf_data/cert_filename |
|
1092c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 5: 1
- EAL 6: 1
- EAL 6 augmented: 1
- EAL 6+: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20200608084917+02'00'
- /Creator: Writer
- /Keywords: Common Criteria, Certification, Zertifizierung, Smart Card, Java Card
- /ModDate: D:20200608085041+02'00'
- /Producer: LibreOffice 6.2
- /Subject: Sm@rtCafé® Expert 7.0 EAL 6+C1
- /Title: Certificate BSI-DSZ-CC-1092-2020
- pdf_file_size_bytes: 296860
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
0962a_pdf.pdf |
1092a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.3 SOGIS Recognition Agreement
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0962-2016
- cert_item: SUSE Linux Enterprise Server Version 12
- cert_lab: BSI
- developer: SUSE LLC
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Operating System Protection Profile, Version 2.0, 01 June 2010, BSI-CC-PP-0067-2010, OSPP Extended Packages: Advanced Management, Advanced Audit, and Virtualization all Version 2.0, 28 May 2010
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1092-2020
- cert_item: Sm@rtCafé® Expert 7.0 EAL 6+ C1
- cert_lab: BSI
- developer: Veridos GmbH - Identity Solutions by Giesecke+Devrient and Bundesdruckerei
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Java Card Protection Profile - Open Configuration, December 2017, Version 3.0.5, BSI-CC-PP-0099- 2017
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0852-2013: 3
- BSI-DSZ-CC-0962-2016: 24
|
- DE:
- BSI-DSZ-CC-0951-V4-2019: 1
- BSI-DSZ-CC-1028-2017: 3
- BSI-DSZ-CC-1092-: 1
- BSI-DSZ-CC-1092-2020: 23
- BSI-DSZ-CC-S-0127-: 1
- BSI-DSZ-CC-S-0127-2019: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0099-: 1
- BSI-CC-PP-0099-2017: 3
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 7
- EAL 2: 4
- EAL 3: 4
- EAL 4: 10
- EAL 4 augmented: 3
- EAL 5: 6
- EAL 6: 3
- EAL 7: 4
- EAL4+: 1
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 1
- EAL 5: 4
- EAL 5+: 1
- EAL 6: 5
- EAL 6 augmented: 3
- EAL 6+: 18
- EAL6: 1
- EAL6 augmented: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 3
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 5
- ALC_LCD.1: 1
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 1
|
- ADV:
- ALC:
- ALC_CMC.5: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 3
- ALC_FLR.1: 5
- ALC_LCD.1: 1
- ALC_TAT.3: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
- FCO:
- FCS:
- FCS_CKM.1: 5
- FCS_COP.1: 30
- FCS_COP.1.1: 16
- FCS_RNG.1: 2
- FIA:
- FPT:
- FTP:
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- GD:
- G&D: 1
- G+D: 2
- Giesecke & Devrient: 4
- Giesecke+Devrient: 13
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 1
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 4
- TÜViT: 1
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- 3DES: 1
- TDEA: 1
- TDES: 2
- Triple-DES: 1
- constructions:
- MAC:
- CMAC: 1
- HMAC: 20
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
- AES_competition:
- DES:
- 3DES:
- 3-DES: 6
- 3DES: 17
- TDEA: 1
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-256: 8
- SHA-384: 8
- SHA-512: 6
- SHA256: 1
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
- IKE:
- IKE: 12
- IKEv1: 2
- IKEv2: 15
- IPsec:
- SSH:
- TLS:
- VPN:
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
- Brainpool:
- NIST:
- NIST P-256: 1
- NIST P-384: 1
- NIST P-521: 1
- P-256: 13
- P-384: 13
- P-521: 13
- secp192r1: 1
- secp224r1: 1
- secp256r1: 1
- secp384r1: 1
- secp521r1: 1
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
- BSI:
- BSI 24: 1
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- FIPS:
- FIPS 186-4: 6
- FIPS180-3: 2
- FIPS180-4: 14
- FIPS186-4: 7
- FIPS197: 4
- FIPS198-1: 4
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- NIST:
- SP 800-38A: 2
- SP 800-67: 1
- PKCS:
- RFC:
- RFC 4253: 1
- RFC 5996: 1
- RFC2104: 2
- RFC2404: 2
- RFC2409: 2
- RFC2451: 1
- RFC2898: 1
- RFC3280: 1
- RFC3447: 6
- RFC3526: 4
- RFC3602: 1
- RFC3686: 1
- RFC4106: 2
- RFC4109: 1
- RFC4251: 3
- RFC4252: 5
- RFC4253: 10
- RFC4301: 1
- RFC4303: 2
- RFC4304: 1
- RFC4307: 4
- RFC4309: 2
- RFC4344: 2
- RFC4419: 1
- RFC4595: 1
- RFC4754: 1
- RFC4868: 3
- RFC5077: 1
- RFC5114: 7
- RFC5116: 4
- RFC5280: 1
- RFC5282: 5
- RFC5639: 1
- RFC5647: 2
- RFC5656: 2
- RFC5903: 3
- RFC5930: 1
- RFC5996: 9
- RFC6668: 1
- RFC6954: 2
- RFC6989: 1
- RFC7296: 1
- RFC7427: 2
- X509:
|
- BSI:
- AIS 1: 1
- AIS 20: 2
- AIS 25: 3
- AIS 26: 2
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 6
- AIS 37: 2
- AIS 46: 2
- AIS 47: 1
- AIS20: 1
- AIS31: 1
- FIPS:
- FIPS 197: 9
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- FIPS180-4: 14
- FIPS186-4: 4
- FIPS197: 1
- FIPS46-3: 1
- ISO:
- ISO/IEC 11770-3: 1
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18031:2011: 1
- ISO/IEC 18045: 4
- ISO/IEC9796-2: 1
- NIST:
- PKCS:
- RFC:
- SCP:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Version 3, Date 2016-02-18, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] Operating System Protection Profile, Version 2.0, 01 June 2010, BSI-CC-PP-0067-2010, OSPP: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- the TOE, Version n/a, Date 2016-02-18, MASTER CM List, File name “sles12-cmlist-master-v1.zip”, (confidential document) [10] Guidance documentation for the TOE, Version 1.14, Date February 17, 2016, Common Criteria: 1
|
- ConfidentialDocument:
- 04.2020, Security Target Sm@rtCafé® Expert 7.0 EAL 6+ C1, Giesecke+Devrient Mobile Security GmbH (confidential document) 7 specifically • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung: 1
- 36 for Sm@rtCafé® Expert 7.0 EAL 6+ C1, Version 6, 25.05.2020, BSI-DSZ-CC-1092- 2020, TÜViT GmbH (confidential document) [11] Configuration list for the TOE, Version 1.5, 18.05.2020, Giesecke+Devrient Mobile Security: 1
- Sm@rtCafé® Expert 7.0 EAL 6+ C1, Version 6, 25.05.2020, TÜV Informationstechnik GmbH (confidential document) [8] Java Card Protection Profile - Open Configuration, December 2017, Version 3.0.5: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- confidential document) [12] Preparative Procedures Sm@rtCafé® Expert Expert 7.0 EAL 6+ C1 Version 2.1 , 15.04.2020: 1
- “Evaluation Technical Report for Composite Evaluation (ETR Comp)”, TÜV Informationstechnik GmbH (confidential document) [16] GlobalPlatform Card Specification Version 2.2.1, January 2011 [17] GlobalPlatform Card Common: 1
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20160309133823+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Linux-basiertes Betriebssystem, Operating System Protection Profile, Virtualization"
- /ModDate: D:20160310135451+01'00'
- /Producer: LibreOffice 4.2
- /Subject: SUSE Linux EnterpriseServer 12
- /Title: Certification Report BSI-DSZ-CC-0962-2016
- pdf_file_size_bytes: 1649059
- pdf_hyperlinks: https://download.suse.com/Download?buildid=FdQP4afr8G0~, https://www.bsi.bund.de/AIS, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://download.suse.com/Download?buildid=vfg4TGVmOvs~, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 46
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20200608083506+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smart Card, Java Card"
- /ModDate: D:20200608084737+02'00'
- /Producer: LibreOffice 6.2
- /Subject: Sm@rtCafé® Expert 7.0 EAL 6+C1
- /Title: Certification Report BSI-DSZ-CC-1092-2020
- pdf_file_size_bytes: 1019539
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 37
|
pdf_data/st_filename |
0962b_pdf.pdf |
1092b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0951-V4-: 1
- BSI-DSZ-CC-0951-V4-2019: 2
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 3
- EAL4 augmented: 1
|
- EAL:
- EAL 4+: 1
- EAL 6: 3
- EAL 6 augmented: 2
- EAL 6+: 147
- EAL6: 4
- EAL6 augmented: 2
- EAL6+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 5
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 18
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 6
- ADV_ARC.1: 5
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 3
- ADV_FSP.5: 9
- ADV_IMP.1: 5
- ADV_IMP.2: 1
- ADV_INT.3: 1
- ADV_SPM.1: 3
- ADV_TDS.1: 2
- ADV_TDS.3: 3
- ADV_TDS.4: 5
- ADV_TDS.5: 2
- AGD:
- AGD_OPE.1: 7
- AGD_PRE.1: 5
- ALC:
- ALC_CMC.5: 3
- ALC_CMS.1: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 4
- ALC_FLR.1: 7
- ALC_LCD.1: 3
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.3: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 3
- ASE_INT.2: 2
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 3
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 2
- ATE_COV.3: 1
- ATE_DPT.1: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 5
- ATE_FUN.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_SAR.3: 7
- FAU_SAR.3.1: 1
- FAU_SEL.1: 9
- FAU_SEL.1.1: 1
- FAU_STG.1: 12
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 8
- FAU_STG.3.1: 1
- FAU_STG.4: 9
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 50
- FCS_CKM.1.1: 4
- FCS_CKM.2: 24
- FCS_CKM.2.1: 2
- FCS_CKM.4: 16
- FCS_CKM.4.1: 1
- FCS_COP.1: 26
- FCS_COP.1.1: 2
- FCS_RNG: 2
- FCS_RNG.1: 52
- FCS_RNG.1.1: 5
- FCS_RNG.1.2: 6
- FDP:
- FDP_ACC.1: 38
- FDP_ACC.1.1: 3
- FDP_ACC.2: 19
- FDP_ACC.2.1: 2
- FDP_ACC.2.2: 2
- FDP_ACF.1: 41
- FDP_ACF.1.1: 5
- FDP_ACF.1.2: 5
- FDP_ACF.1.3: 5
- FDP_ACF.1.4: 5
- FDP_CDP: 5
- FDP_CDP.1: 14
- FDP_CDP.1.1: 2
- FDP_ETC.2: 8
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 14
- FDP_IFC.2: 20
- FDP_IFC.2.1: 2
- FDP_IFC.2.2: 2
- FDP_IFF.1: 29
- FDP_IFF.1.1: 3
- FDP_IFF.1.2: 3
- FDP_IFF.1.3: 3
- FDP_IFF.1.4: 3
- FDP_IFF.1.5: 3
- FDP_ITC.1: 5
- FDP_ITC.2: 23
- FDP_ITC.2.1: 2
- FDP_ITC.2.2: 2
- FDP_ITC.2.3: 2
- FDP_ITC.2.4: 2
- FDP_ITC.2.5: 2
- FDP_RIP.2: 13
- FDP_RIP.2.1: 1
- FDP_RIP.3: 13
- FDP_RIP.3.1: 1
- FDP_UCT: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 20
- FIA_ATD.1.1: 2
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 12
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 10
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UID.1: 14
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FIA_USB.2: 7
- FIA_USB.2.1: 1
- FIA_USB.2.2: 1
- FIA_USB.2.3: 1
- FIA_USB.2.4: 1
- FMT:
- FMT_MSA.1: 48
- FMT_MSA.1.1: 5
- FMT_MSA.3: 51
- FMT_MSA.3.1: 7
- FMT_MSA.3.2: 7
- FMT_MSA.4: 6
- FMT_MSA.4.1: 1
- FMT_MTD.1: 142
- FMT_MTD.1.1: 21
- FMT_REV.1: 15
- FMT_REV.1.1: 2
- FMT_REV.1.2: 2
- FMT_SMF.1: 34
- FMT_SMF.1.1: 1
- FMT_SMR.1: 43
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FPT_TDC.1: 22
- FPT_TDC.1.1: 2
- FPT_TDC.1.2: 2
- FTA:
- FTA_SSL.1: 7
- FTA_SSL.1.1: 1
- FTA_SSL.1.2: 1
- FTA_SSL.2: 7
- FTA_SSL.2.1: 1
- FTA_SSL.2.2: 1
- FTP:
- FTP_ITC.1: 12
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 2
|
- FAU:
- FAU_ARP.1: 21
- FAU_ARP.1.1: 1
- FAU_SAA.1: 3
- FAU_SAS.1: 1
- FCO:
- FCS:
- FCS_CKM: 10
- FCS_CKM.1: 35
- FCS_CKM.2: 4
- FCS_CKM.4: 30
- FCS_CKM.4.1: 1
- FCS_COP: 12
- FCS_COP.1: 117
- FCS_RNG: 5
- FCS_RNG.1: 13
- FCS_RNG.1.1: 5
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 28
- FDP_ACC.1: 11
- FDP_ACC.2: 5
- FDP_ACF: 27
- FDP_ACF.1: 14
- FDP_IFC: 27
- FDP_IFC.1: 13
- FDP_IFC.2: 2
- FDP_IFF: 19
- FDP_IFF.1: 17
- FDP_ITC: 12
- FDP_ITC.1: 7
- FDP_ITC.2: 19
- FDP_ITT.1: 1
- FDP_RIP: 138
- FDP_RIP.1: 11
- FDP_ROL: 16
- FDP_ROL.1: 5
- FDP_SDC.1: 2
- FDP_SDI: 16
- FDP_SDI.1: 2
- FDP_SDI.2: 3
- FDP_UIT: 9
- FDP_UIT.1: 2
- FIA:
- FIA_API.1: 1
- FIA_ATD: 10
- FIA_ATD.1: 2
- FIA_UID: 16
- FIA_UID.1: 9
- FIA_UID.2: 1
- FIA_USB: 9
- FIA_USB.1: 3
- FMT:
- FMT_LIM: 4
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MSA: 101
- FMT_MSA.1: 10
- FMT_MSA.2: 2
- FMT_MSA.3: 17
- FMT_MTD: 22
- FMT_MTD.1: 2
- FMT_MTD.3: 1
- FMT_SMF: 22
- FMT_SMF.1: 20
- FMT_SMF.1.1: 1
- FMT_SMR: 35
- FMT_SMR.1: 32
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 10
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 39
- FPT_FLS.1: 21
- FPT_FLS.1.1: 2
- FPT_ITT.1: 2
- FPT_PHP.3: 9
- FPT_PHP.3.1: 3
- FPT_RCV: 13
- FPT_RCV.3: 10
- FPT_TDC.1: 8
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 2
- FPT_TST.1: 9
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 1
- FRU:
- FTP:
- FTP_ITC: 14
- FTP_ITC.1: 8
- FTP_ITC.1.1: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.AUTHUSER: 3
- A.CONNECT: 5
- A.DETECT: 3
- A.IT: 2
- A.KEYS: 3
- A.MANAGE: 5
- A.PEER: 6
- A.PHYSICAL: 4
- A.TRAINEDUSER: 3
- O:
- O.ANALYZE_AUDIT: 5
- O.AUDITING: 15
- O.COMP: 31
- O.CP: 18
- O.CRYPTO: 18
- O.DISCRETIONARY: 11
- O.MANAGE: 26
- O.NETWORK: 13
- O.REMOTE_AUDIT: 8
- O.ROLE: 17
- O.SUBJECT: 11
- O.TRUSTED_CHANNEL: 5
- OE:
- OE.ADMIN: 6
- OE.INFO_PROTECT: 9
- OE.INSTALL: 4
- OE.IT: 3
- OE.MAINTENANCE: 3
- OE.PHYSICAL: 3
- OE.RECOVER: 4
- OE.REMOTE: 4
- OE.TRUSTED: 5
- T:
- T.ACCESS: 24
- T.COMM: 4
- T.IA: 6
- T.INFOFLOW: 4
- T.RESTRICT: 3
- T.ROLE: 6
- T.UNOBSERVED_AUDIT: 4
|
- A:
- A.APPLET: 4
- A.DELETION: 5
- A.VERIFICATION: 4
- D:
- D.APP_I_DATA: 2
- D.CRYPTO: 2
- D.PIN: 1
- D.SEC_DATA: 1
- O:
- O.AES: 1
- O.ALARM: 22
- O.APPLET: 15
- O.CARD-: 7
- O.CARD-MANAGEMENT: 26
- O.CIPHER: 15
- O.CODE_PKG: 13
- O.DELETION: 17
- O.FIREWALL: 43
- O.GLOBAL_ARRAYS: 1
- O.GLOBAL_ARRAYS_CONFID: 19
- O.GLOBAL_ARRAYS_INTEG: 9
- O.INSTALL: 16
- O.JAVAOBJECT: 44
- O.KEY-: 8
- O.KEY-MNGT: 15
- O.LOAD: 18
- O.NATIVE: 14
- O.OBJ-DELETION: 9
- O.OPERATE: 36
- O.PIN-: 5
- O.PIN-MNGT: 18
- O.PINMNGT: 1
- O.REALLOCATION: 18
- O.RESOURCES: 23
- O.RND: 4
- O.RNG: 11
- O.SCP: 64
- O.SID: 33
- O.TDES: 2
- O.TRANSACTION: 19
- OE:
- OE.APPLET: 9
- OE.CARD-MANAGEMENT: 5
- OE.CODE-: 5
- OE.CODE-EVIDENCE: 14
- OE.SCP: 13
- OE.VERIFICATION: 38
- OP:
- OP.ARRAY_AASTORE: 3
- OP.ARRAY_ACCESS: 4
- OP.ARRAY_LENGTH: 4
- OP.CREATE: 7
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.INSTANCE_FIELD: 3
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 6
- OP.PUT: 5
- OP.PUTFIELD: 1
- OP.PUTSTATIC: 1
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- R:
- T:
- T.CONFID-: 8
- T.CONFID-APPLI-: 1
- T.CONFID-APPLI-DATA: 16
- T.CONFID-JCS-CODE: 3
- T.CONFID-JCS-DATA: 4
- T.DELETION: 4
- T.EXE-CODE: 6
- T.EXECODE: 1
- T.INSTALL: 5
- T.INTEG-: 10
- T.INTEG-APPLI-: 4
- T.INTEG-APPLI-CODE: 4
- T.INTEG-APPLI-DATA: 12
- T.INTEG-JCS-: 2
- T.INTEG-JCS-CODE: 5
- T.INTEG-JCS-DATA: 3
- T.INTEG-JCSCODE: 1
- T.INTEGAPPLI-CODE: 2
- T.INTEGAPPLI-DATA: 1
- T.INTEGJCS-DATA: 6
- T.NATIVE: 5
- T.OBJ-DELETION: 2
- T.OBJDELETION: 1
- T.PHYSICAL: 3
- T.RESOURCES: 7
- T.SECURE_DELETION: 8
- T.SID: 16
|
pdf_data/st_keywords/vendor |
|
- GD:
- G&D: 10
- G+D: 4
- Giesecke & Devrient: 2
- Giesecke+Devrient: 8
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 21
- AES-256: 2
- AES128: 1
- AES256: 1
- DES:
- constructions:
|
- AES_competition:
- DES:
- 3DES:
- 3-DES: 7
- 3DES: 3
- TDEA: 1
- TDES: 3
- Triple-DES: 4
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 3
- SHA-256: 6
- SHA-384: 5
- SHA-512: 5
- SHA256: 1
- SHA384: 1
- SHA512: 1
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 3
- SHA-256: 4
- SHA-384: 4
- SHA-512: 3
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 21
- IKEv1: 1
- IKEv2: 19
- IPsec:
- SSH:
- TLS:
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- Brainpool:
- brainpoolP224r1: 1
- brainpoolP256r1: 1
- brainpoolP384r1: 1
- brainpoolP512r1: 1
- NIST:
- P-256: 1
- P-384: 1
- P-521: 1
- curve P-256: 1
- curve P-384: 1
- curve P-521: 1
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- physical tampering: 5
- SCA:
- Leak-Inherent: 2
- physical probing: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- FIPS:
- FIPS 140-2: 20
- FIPS 186-4: 1
- FIPS PUB 186-3: 2
- FIPS PUB 186-4: 6
- FIPS180-4: 2
- FIPS197: 2
- RFC:
- RFC 2460: 1
- RFC 3484: 1
- RFC 3542: 1
- RFC 4213: 1
- RFC 4252: 4
- RFC 4253: 3
- RFC 768: 1
- RFC 791: 2
- RFC 792: 1
- RFC 793: 1
- RFC2409: 2
- RFC3526: 4
- RFC3602: 3
- RFC4106: 4
- RFC4252: 6
- RFC4253: 14
- RFC4301: 4
- RFC4303: 5
- RFC4306: 2
- RFC4307: 7
- RFC4309: 4
- RFC4419: 3
- RFC4753: 2
- RFC5114: 3
- RFC5647: 2
- RFC5656: 4
- RFC5996: 5
- RFC6668: 2
- RFC6954: 3
|
- BSI:
- AIS 20: 1
- AIS 31: 2
- AIS20: 4
- AIS31: 2
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- FIPS:
- FIPS 140-2: 1
- FIPS 186-4: 7
- FIPS 197: 10
- FIPS180-4: 3
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816: 2
- ISO/IEC 9796-2: 1
- PKCS:
- PKCS1: 12
- PKCS3: 1
- PKCS5: 3
- RFC:
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- javacard:
- javacard.framework: 5
- javacard.framework.applet: 1
- javacard.security: 7
- javacardx:
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users that cannot be used to store: 1
- PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation: 1
- as Port Address Translation (PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation. Furthermore, packet mangling support is provided with IPTables which is also: 1
- out of scope: 3
|
- OutOfScope:
- Dependencies: No dependencies. 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 9: 1
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 5
- shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 10 The implemented ECDH key agreement is reduced to scalar multiplication, checking for: 1
- with ECDH is part of this SFR. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 Security Functional Requirements Security Target Lite Sm@rtCafé® Expert 7.0 EAL 6+: 1
|
pdf_data/st_metadata |
- /Author: Stephan Mueller (generated by CCTool version 2.8.1.5)
- /CreationDate: D:20160311084710Z
- /Creator: Unknown
- /Keywords: Security Target, Common Criteria, Linux Distribution
- /ModDate: D:20160311084710Z
- /Producer: XEP 4.18 build 20100322
- /Subject: SUSE Linux Enterprise Server
- /Title: Security Target for SUSE Linux Enterprise Server 12 including KVM virtualization (version 2.10 as of 2016-02-12)
- /Trapped: /False
- /application: CCTool version x.y
- pdf_file_size_bytes: 1285618
- pdf_hyperlinks: http://tools.ietf.org/html/rfc2409, http://tools.ietf.org/html/rfc5114, http://tools.ietf.org/html/rfc5656, http://tools.ietf.org/html/rfc4753, http://tools.ietf.org/html/rfc3526, http://tools.ietf.org/html/rfc4301, http://tools.ietf.org/html/rfc3602, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R4.pdf, http://tools.ietf.org/html/rfc4252, http://tools.ietf.org/html/rfc4253, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R4.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R4.pdf, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, http://tools.ietf.org/html/rfc5996, http://tools.ietf.org/html/rfc4303, http://tools.ietf.org/html/rfc5647, http://tools.ietf.org/html/rfc4306, http://tools.ietf.org/html/rfc4419, http://www.ietf.org/rfc/rfc6954.txt, http://tools.ietf.org/html/rfc4307, http://tools.ietf.org/html/rfc6668, http://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf, http://www.ietf.org/rfc/rfc4309.txt, http://www.ietf.org/rfc/rfc4106.txt
- pdf_is_encrypted: False
- pdf_number_of_pages: 122
|
- /Author: Dr. Ulrich Stutenbäumer (Giesecke+Devrient Mobile Security GmbH)
- /Category: Public
- /Chip: M5073 G11
- /Comments: Final
- /Company: GuD
- /CreationDate: D:20200518130755+02'00'
- /Creator: Acrobat PDFMaker 19 für Word
- /HWManufacturer: Infineon
- /Keywords: dual-interface, contact based or pure contactless smart card, Javacard operating system (OS), multi-purpose Java card, post-issuance installation of applets, open configuration, Java Card System Protection Profile (Open Configuration), government card, ID card, passport, payment card, signature card
- /ModDate: D:20200518132406+02'00'
- /Producer: Adobe PDF Library 19.21.90
- /ProductName: Sm@rtCafé® Expert 7.0 EAL 6+ C1
- /SourceModified: D:20200518110720
- /Subject: Common Criteria Security Target Lite in version 4.7 from 18.05.2020
- /TOE: Sm@rtCafé® Expert 7.0 EAL 6+ C1
- /Title: Security Target Lite Sm@rtCafé® Expert 7.0 EAL 6+ C1
- pdf_file_size_bytes: 1543454
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 130
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |