| name |
genuscreen 8.0 |
Veridos ePass Applet on Sm@rtCafé Expert 8.0 C1, Version 1.0 |
| category |
Boundary Protection Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
DE |
NL |
| status |
active |
active |
| not_valid_after |
05.04.2028 |
31.10.2027 |
| not_valid_before |
06.04.2023 |
31.10.2022 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1194c_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-22-0568828-cert.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1194a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0568828-CR-1.0.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1194b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0568828-STLite_v1.1.pdf |
| manufacturer |
genua GmbH |
Veridos GmbH - Identity Solutions by Giesecke & Devrient and Bundesdruckerei |
| manufacturer_web |
https://www.genua.de |
https://www.veridos.com |
| security_level |
EAL4+, ALC_PAM.1, AVA_VAN.4, ASE_TSS.2, ALC_FLR.2 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
| dgst |
700b0783f3fe80bb |
d453697fbdc27702 |
| heuristics/cert_id |
BSI-DSZ-CC-1194-2023 |
NSCIB-CC-0568828-CR |
| heuristics/cert_lab |
BSI |
|
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ADV_TDS.3, ALC_PAM.1, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, AGD_PRE.1, ADV_TAT.1, ATE_IND.2, ATE_DPT.1, AVA_VAN.4, ASE_ECD.1, ADV_IMP.1, ALC_LCD.1, ALC_FLR.2, ASE_SPD.1, ATE_COV.2, ASE_TSS.2, ALC_DVS.1, ALC_TAT.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ADV_FSP.4, ADV_ARC.1 |
ALC_FLR.1, AVA_VAN.5, ALC_DVS.2, ATE_DPT.2 |
| heuristics/extracted_versions |
8.0 |
1.0, 8.0 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1142-2020 |
BSI-DSZ-CC-1107-V3-2022, NSCIB-CC-0289060-CR |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-1142-2020 |
BSI-DSZ-CC-1107-V3-2022, NSCIB-CC-0289060-CR |
| heuristics/scheme_data |
- category: Network and Network related Devices and Systems
- cert_id: BSI-DSZ-CC-1194-2023
- certification_date: 06.04.2023
- enhanced:
- applicant: genua GmbH Domagkstrasse 7 85551 Kirchheim
- assurance_level: EAL4+,AVA_VAN.4,ASE_TSS.2,ALC_PAM.1
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1194c_pdf.pdf?__blob=publicationFile&v=1
- certification_date: 06.04.2023
- description: The TOE makes VPN and firewall functionality available and easy to manage. It protects networks at the border to the Internet by filtering incoming and outgoing data traffic. It protects the data flowing between several protected networks against unauthorised inspection and modification. It consists of software on a number (at least 2) of machines (genuscreen appliances) that work as network filters, hereafter called firewall components, and another machine to manage this network of firewall components. This machine, the management system (genucenter management system), is a central component.
- entries: [frozendict({'id': 'BSI-DSZ-CC-1194-2023-MA-01 (Ausstellungsdatum / Certification Date 17.11.2023) Assurance Continuity Maintenance Report with partial re-evaluation applying ALC_PAM for patch management Assurance Continuity / Maintanance Report', 'description': 'and firewall functionality available and easy to manage. It consists only of software and documentation. It protects networks at the border to the Internet by filtering incoming and outgoing data traffic. It also protects the data flowing between several protected networks against unauthorised inspection and modification.'}), frozendict({'id': 'BSI-DSZ-CC-1194-2023', 'description': 'Certificate'})]
- evaluation_facility: secuvera GmbH
- expiration_date: 05.04.2028
- product: genuscreen 8.0
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1194a_pdf.pdf?__blob=publicationFile&v=1
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1194b_pdf.pdf?__blob=publicationFile&v=1
- product: genuscreen 8.0
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Netzwerk_und_Kommunikationsprodukte/1194.html
- vendor: genua GmbH
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1107-V3-2022 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1107-V3-2022 |
| heuristics/protection_profiles |
{} |
60455fc9564e2545, a33327d40f253f46, b380aabf93b29692 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf |
| pdf_data/cert_filename |
1194c_pdf.pdf |
NSCIB-CC-22-0568828-cert.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0068: 1
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0056: 1
|
| pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 2
- EAL 4 augmented: 1
- EAL 5: 1
|
- EAL:
- EAL2: 1
- EAL4: 1
- EAL4 augmented: 1
- EAL5: 1
- EAL5 augmented: 1
- EAL7: 1
|
| pdf_data/cert_keywords/cc_sar |
- ALC:
- ALC_FLR: 1
- ALC_FLR.2: 1
- ALC_PAM.1: 1
- ASE:
- AVA:
|
- ALC:
- ALC_DVS.2: 2
- ALC_FLR.3: 2
- ATE:
- AVA:
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
- BrightSight:
- SGS:
- SGS: 1
- SGS Brightsight: 1
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
- ISO:
- ISO/IEC 15408-1: 1
- ISO/IEC 15408-2: 1
- ISO/IEC 15408-3: 1
- ISO/IEC 18045: 2
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-1194-2023, firewall and VPN gateway, genuscreen 8.0, genua GmbH
- /Subject: Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-1194-2023, firewall and VPN gateway, genuscreen 8.0, genua GmbH
- /Title: Certificate BSI-DSZ-CC-1194-2023 for genuscreen 8.0 from genua GmbH
- pdf_file_size_bytes: 325879
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: kruitr
- /CreationDate: D:20221115162140+01'00'
- /Creator: Bullzip PDF Printer (11.0.0.2588)
- /ModDate: D:20221115162208+01'00'
- /Producer: PDF Printer / www.bullzip.com / FPG / TUV Rheinland Service GmbH
- /Title: Microsoft Word - NSCIB-CC-22-0568828-cert.doc
- pdf_file_size_bytes: 248278
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
| pdf_data/report_filename |
1194a_pdf.pdf |
NSCIB-CC-0568828-CR-1.0.pdf |
| pdf_data/report_frontpage |
- DE:
- cc_security_level: Common Criteria Part 3 extended EAL 4 augmented by ALC_FLR.2, ASE_TSS.2, AVA_VAN.4 and ALC_PAM.1
- cc_version: Product specific Security Target Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1194-2023
- cert_item: genuscreen 8.0
- cert_lab: BSI
- developer: genua GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: None
- NL:
|
- DE:
- NL:
- cert_id: NSCIB-CC-0568828-CR
- cert_item: ePass Applet on Sm@rtCafé® Expert 8.0 C1, Version 1.0
- cert_lab: SGS Brightsight B.V.
- developer: Giesecke+Devrient Mobile Security GmbH
|
| pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1142-2020: 3
- BSI-DSZ-CC-1194-2023: 15
|
- DE:
- BSI-DSZ-CC-1107-V3-2022: 2
- NL:
- CC-22-0289060: 1
- NSCIB-CC-0289060-CR: 1
- NSCIB-CC-0568828-CR: 13
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0055-2009: 1
- BSI-CC-PP-0056-V2-: 1
- BSI-CC-PP-0068-V2-MA-01: 1
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 8
- EAL 4 augmented: 3
- EAL 5: 3
- EAL 5+: 1
- EAL 6: 1
|
- EAL:
- EAL 5: 1
- EAL 5 augmented: 1
- EAL4: 2
- EAL4 augmented: 1
- EAL4+: 2
- EAL5: 2
- EAL5 augmented: 2
- EAL5+: 2
- EAL54: 1
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 1
|
| pdf_data/report_keywords/cc_sar |
- ALC:
- ALC_FLR: 3
- ALC_FLR.2: 5
- ALC_PAM.1: 5
- ASE:
- AVA:
|
- ADV:
- ALC:
- ALC_DVS.2: 5
- ALC_FLR.1: 1
- ATE:
- ATE_DPT.2: 1
- ATE_DPT.2.5: 1
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 2
- A.HANET: 2
- A.INIT: 2
- A.LOCAL: 2
- A.NOEVIL: 2
- A.PHYSEC: 3
- A.REMOTE_AUTH: 2
- A.REST: 2
- A.SINGEN: 2
- A.TIMESTMP: 2
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
- BrightSight:
- SGS:
- SGS: 2
- SGS Brightsight: 2
|
| pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
- IKE:
- IPsec:
- SSH:
- TLS:
- VPN:
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- other:
- JIL: 4
- JIL-AAPS: 1
- JIL-AM: 1
|
| pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- BSI:
- AIS 20: 2
- AIS 32: 1
- AIS 34: 1
- AIS 38: 1
- AIS 46: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- X509:
|
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- for genuscreen 8.0 from genua GmbH, Version 3, Date: 30.03.2023, secuvera GmbH (confidential document) [8] Guidance documentation for the TOE, genuscreen Installations- und Konfigurationshandbuch: 1
- OutOfScope:
- L2TP VPN, MOBIKE VPN, Dynamic Routing, genucenter HA, Remote Maintenance, getimagesfromcpt) are out of scope of the evaluated configuration. 18 / 26 BSI-DSZ-CC-1194-2023 Certification Report All information: 1
- components were installed on physical hardware, the installation of the TOE on virtual machines is out of scope of the evaluated configuration. For the operational configuration the genuscreens and the: 1
- out of scope: 2
|
|
| pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-1194-2023, firewall and VPN gateway, genuscreen 8.0, genua GmbH
- /Subject: Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-1194-2023, firewall and VPN gateway, genuscreen 8.0, genua GmbH
- /Title: Certification Report BSI-DSZ-CC-1194-2023 for genuscreen 8.0 from genua GmbH
- pdf_file_size_bytes: 525558
- pdf_hyperlinks: https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/, https://www.sogis.eu/
- pdf_is_encrypted: False
- pdf_number_of_pages: 26
|
|
| pdf_data/st_filename |
1194b_pdf.pdf |
NSCIB-CC-0568828-STLite_v1.1.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1107-V3-2022: 2
- NL:
- CC-22-0289060: 1
- NSCIB-CC-22-0289060-CR: 1
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-CC-PP-0099-V2-2020: 1
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 4
- EAL4 augmented: 1
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
- EAL 5 augmented: 1
- EAL 6: 1
- EAL 6 augmented: 1
- EAL4: 3
- EAL4 augmented: 1
- EAL5: 5
- EAL5 augmented: 3
- EAL5+: 1
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 4
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_IMP: 1
- ADV_IMP.1: 3
- ADV_INT: 2
- ADV_SPM: 2
- ADV_TAT.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 2
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 3
- AGD_PRE: 1
- AGD_PRE.1: 3
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.4: 1
- ALC_DEL: 3
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 2
- ALC_FLR: 1
- ALC_FLR.2: 4
- ALC_LCD: 1
- ALC_LCD.1: 2
- ALC_PAM: 30
- ALC_PAM.1: 52
- ALC_TAT: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 3
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.2: 1
- ASE_REQ: 1
- ASE_REQ.1: 2
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.2: 4
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_DPT: 1
- ATE_DPT.1: 2
- ATE_FUN: 1
- ATE_FUN.1: 4
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
|
- ALC:
- ALC_DVS.2: 9
- ALC_FLR.1: 1
- ATE:
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 17
- FAU_GEN.1: 5
- FAU_GEN.2: 1
- FAU_SAR: 10
- FAU_SAR.1: 3
- FAU_SAR.3: 1
- FAU_UPD: 1
- FCS:
- FCS_CKM: 87
- FCS_CKM.1: 20
- FCS_CKM.4: 23
- FCS_COP: 70
- FCS_COP.1: 22
- FCS_RNG: 1
- FCS_RNG.1: 20
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_IFC: 43
- FDP_IFC.1: 31
- FDP_IFC.2: 2
- FDP_IFF: 34
- FDP_IFF.1: 37
- FDP_ITC.1: 2
- FDP_ITT: 21
- FDP_ITT.1: 3
- FIA:
- FIA_ATD: 5
- FIA_ATD.1: 1
- FIA_SOS: 5
- FIA_SOS.1: 1
- FIA_UAU: 10
- FIA_UAU.2: 1
- FIA_UAU.6: 1
- FIA_UID: 5
- FIA_UID.1: 3
- FIA_UID.2: 2
- FMT:
- FMT_MOF: 5
- FMT_MOF.1: 1
- FMT_MSA: 122
- FMT_MSA.1: 24
- FMT_MSA.2: 3
- FMT_MSA.3: 18
- FMT_SMF: 39
- FMT_SMF.1: 22
- FMT_SMR: 6
- FMT_SMR.1: 25
- FPT:
- FPT_ITT: 8
- FPT_ITT.1: 2
- FPT_STM.1: 4
- FPT_TEE: 7
- FPT_TEE.1: 2
- FPT_TRC: 6
- FPT_TRC.1.1: 1
- FPT_TRC.1.2: 1
- FPT_UPD: 31
|
- FAU:
- FAU_ARP.1: 1
- FAU_SAS: 3
- FAU_SAS.1: 6
- FAU_SAS.1.1: 1
- FAU_UAU.4: 1
- FCO:
- FCS:
- FCS_CKM: 16
- FCS_CKM.1: 22
- FCS_CKM.1.1: 1
- FCS_CKM.2: 5
- FCS_CKM.3: 1
- FCS_CKM.4: 23
- FCS_CKM.4.1: 1
- FCS_COP: 51
- FCS_COP.1: 31
- FCS_RND.1: 6
- FCS_RND.1.1: 1
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 10
- FDP_ACC.1: 14
- FDP_ACC.1.1: 1
- FDP_ACF: 9
- FDP_ACF.1: 25
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 2
- FDP_IFC.1: 4
- FDP_IFF: 2
- FDP_ITC: 1
- FDP_ITC.1: 11
- FDP_ITC.2: 11
- FDP_RIP: 15
- FDP_RIP.1: 5
- FDP_RIP.1.1: 1
- FDP_ROL: 1
- FDP_SDI.2: 1
- FDP_UCT: 4
- FDP_UCT.1: 6
- FDP_UCT.1.1: 1
- FDP_UIT: 5
- FDP_UIT.1: 5
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 4
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 5
- FIA_API.1: 4
- FIA_API.1.1: 1
- FIA_ATD: 1
- FIA_UAU: 30
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 11
- FIA_UAU.4.1: 1
- FIA_UAU.5: 10
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 8
- FIA_UAU.6.1: 1
- FIA_UID: 10
- FIA_UID.1: 13
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 1
- FMT:
- FMT_LIM: 6
- FMT_LIM.1: 12
- FMT_LIM.1.1: 3
- FMT_LIM.2: 13
- FMT_LIM.2.1: 4
- FMT_MSA: 9
- FMT_MSA.3: 3
- FMT_MTD: 48
- FMT_MTD.1: 18
- FMT_MTD.3: 6
- FMT_MTD.3.1: 1
- FMT_SMF: 5
- FMT_SMF.1: 22
- FMT_SMF.1.1: 1
- FMT_SMR: 12
- FMT_SMR.1: 18
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPR:
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 7
- FPT_EMS.1.1: 1
- FPT_EMS.1.2: 1
- FPT_FLS: 10
- FPT_FLS.1: 11
- FPT_FLS.1.1: 1
- FPT_PHP.3: 8
- FPT_PHP.3.1: 1
- FPT_RCV: 1
- FPT_TDC.1: 1
- FPT_TST: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 9
- FTP_ITC.1: 8
- FTP_TRP.1: 4
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.HANET: 3
- A.INIT: 3
- A.LOCAL: 3
- A.NOEVIL: 3
- A.PHYSEC: 3
- A.REMOTE_AUTH: 3
- A.REST: 3
- A.SINGEN: 4
- A.TIMESTMP: 3
- O:
- O.AUDREC: 5
- O.AUTH: 10
- O.AVAIL: 7
- O.CONFID: 13
- O.INTEG: 11
- O.MEDIAT: 4
- O.NOREPLAY: 13
- O.PATCH: 3
- OE:
- OE.ADMIN: 2
- OE.CERTKEYS: 3
- OE.HANET: 5
- OE.INIT: 7
- OE.LOCAL: 1
- OE.NOEVIL: 3
- OE.PHYSEC: 4
- OE.REMOTE_AUTH: 2
- OE.REST: 3
- OE.SINGEN: 4
- OE.TIMESTMP: 6
- T:
- T.MEDIAT: 3
- T.MMODIFY: 3
- T.MODIFY: 3
- T.MSNIFF: 3
- T.NOAUTH: 3
- T.SELPRO: 3
- T.SNIFF: 3
|
- A:
- A.APPLET: 1
- A.CAP_FILE: 1
- A.VERIFICATION: 1
- O:
- O.ALARM: 1
- O.ARRAY_VIEWS_CONFID: 1
- O.ARRAY_VIEWS_INTEG: 1
- O.CARD-MANAGEMENT: 1
- O.CIPHER: 1
- O.DELETION: 1
- O.FIREWALL: 1
- O.GLOBAL_ARRAYS_CON: 1
- O.GLOBAL_ARRAYS_INTE: 1
- O.INSTALL: 1
- O.KEY-MNGT: 1
- O.LOAD: 1
- O.NATIVE: 1
- O.OBJ-DELETION: 1
- O.OPERATE: 1
- O.PIN-MNGT: 1
- O.REALLOCATION: 1
- O.RESOURCES: 1
- O.RNG: 1
- O.SCP: 1
- O.SID: 1
- O.TRANSACTION: 1
- OE:
- OE.BAC_PP: 1
- OE.CAP_FILE: 1
- OE.CODE-EVIDENCE: 1
- OE.VERIFICATION: 1
- OT:
- T:
- T.CONFID-APPLI-DATA: 1
- T.CONFID-JCS-CODE: 1
- T.CONFID-JCS-DATA: 1
- T.DELETION: 1
- T.EXE-CODE: 2
- T.INSTALL: 1
- T.INTEG-APPLI-CODE: 2
- T.INTEG-APPLI-DATA: 2
- T.INTEG-JCS-CODE: 1
- T.INTEG-JCS-DATA: 1
- T.NATIVE: 1
- T.OBJ-DELETION: 1
- T.PHYSICAL: 1
- T.RESOURCES: 1
- T.SECURE_DELETION: 1
- T.SID: 2
|
| pdf_data/st_keywords/vendor |
|
- GD:
- G+D: 5
- Giesecke & Devrient: 4
- Giesecke+Devrient: 6
- Infineon:
- Infineon: 3
- Infineon Technologies AG: 1
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 4
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
- AES_competition:
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
- SHA:
- SHA2:
- SHA-256: 2
- SHA-384: 3
- SHA-512: 2
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 2
- SHA-384: 2
- SHA-512: 1
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 83
- IKEv1: 10
- IKEv2: 20
- IPsec:
- SSH:
- TLS:
- VPN:
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 2
- P-384: 2
- P-521: 4
- secp256r1: 1
- secp384r1: 1
- secp521r1: 1
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- malfunction: 2
- physical tampering: 5
- SCA:
- physical probing: 2
- side channel: 2
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 8
- EF.DG1: 14
- EF.DG14: 3
- EF.DG15: 1
- EF.DG16: 14
- EF.DG2: 5
- EF.DG3: 11
- EF.DG4: 11
- EF.DG5: 5
- EF.SOD: 12
|
| pdf_data/st_keywords/standard_id |
- BSI:
- AIS 20: 1
- AIS 31: 1
- AIS20: 2
- AIS31: 1
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ISO:
- PKCS:
- RFC:
- RFC 2104: 1
- RFC 2409: 1
- RFC 2460: 1
- RFC 3414: 1
- RFC 3602: 1
- RFC 4109: 1
- RFC 4253: 1
- RFC 4301: 1
- RFC 4306: 1
- RFC 4307: 1
- RFC 4344: 1
- RFC 4418: 1
- RFC 4754: 1
- RFC 4868: 1
- RFC 5114: 1
- RFC 5280: 1
- RFC 5590: 1
- RFC 5639: 1
- RFC 5656: 1
- RFC 5903: 1
- RFC 6040: 1
- RFC 6151: 1
- RFC 6239: 1
- RFC 6353: 1
- RFC 6668: 1
- RFC 6818: 1
- RFC 6960: 1
- RFC 7296: 1
- RFC 7427: 1
- RFC 7617: 1
- RFC2104: 4
- RFC2409: 2
- RFC2460: 1
- RFC3414: 1
- RFC3602: 4
- RFC4253: 2
- RFC4301: 1
- RFC4307: 1
- RFC4344: 1
- RFC4418: 4
- RFC4754: 2
- RFC4868: 4
- RFC5114: 2
- RFC5280: 1
- RFC5639: 3
- RFC5903: 3
- RFC6239: 3
- RFC6353: 1
- RFC6960: 1
- RFC7296: 2
- RFC8017: 2
- X509:
|
- BSI:
- AIS 20: 1
- AIS 31: 1
- AIS20: 6
- AIS31: 2
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- FIPS:
- FIPS 180-2: 1
- FIPS 180-294: 1
- FIPS 197: 1
- FIPS 46-3: 2
- FIPS PUB 197: 2
- FIPS PUB 46-3: 2
- FIPS197: 1
- ICAO:
- ISO:
- ISO/IEC 14888-3: 4
- ISO/IEC 7816-2: 3
- ISO/IEC 9796-2: 1
- PKCS:
- RFC:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
- OutOfScope:
- 10 No Remote Maintenance The remote maintenance feature using a rendezvous genuscreen appliance is out of scope. 1.4.11.11 No getimagesfromcpt The command line tool getimagesfromcpt must not be used to install: 1
- a smartcard to perform cryptographic operations for IPsec usage. However, usage of the smartcard is out of scope for this TOE. The smartcard can however be used as an entropy source both for genuscreen and: 1
- can, however, be used in certified configurations. If cryptographic functions are used, they are out of scope of the TOE. 1.4.10 Secure Initialisation of genuscreen (Firewall Component) To guarantee that all: 1
- hardware has not been evaluated. Also, operating the genucenter software on a virtual machine is out of scope for this certification. If the virtual genucenter is used, the end user has to ensure that all: 1
- out of scope: 4
|
- OutOfScope:
- No contradiction to this ST. FDP_IFF.1/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality: 1
- No contradiction to this ST. FDP_RIP.1/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality: 1
- No contradiction to this ST. FDP_RIP.1/TRANSIENT IP_SFR No correspondence. Out of scope (internal Java Card functionality: 1
- No contradiction to this ST. FDP_RIP.1/bArray IP_SFR No correspondence. Out of scope (internal Java Card functionality: 1
- No contradiction to this ST. FIA_UID.1/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality: 1
- No contradiction to this ST. FIA_USB.1/AID IP_SFR No correspondence Out of scope (internal Java Card functionality: 1
- No contradiction to this ST. FMT_MSA.3/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality: 1
- No contradiction to this ST. FMT_MSA.3/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality: 1
- No contradiction to this ST. FMT_MTD.3/JCRE IP_SFR No correspondence Out of scope (internal Java Card functionality: 1
- No contradiction to this ST. FMT_SMR.1/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality: 1
- No contradiction to this ST. FMT_SMR.1/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality: 1
- No contradiction to this ST. FMT_SMR.1/Installer IP_SFR No correspondence Out of scope (internal Java Card func tionality: 1
- 20 of 93 Platform Objective Correspondence in this ST References/Remarks O.SID No correspondence Out of scope. No contradiction tothis ST. O.FIREWALL No correspondence Out of scope. No contradiction tothis ST: 1
- 93 Platform SFR Correspondence in this ST References/Remarks FDP_IFC.2/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_IFF.1/CM IP_SFR No: 1
- ADEL) policy on security aspects outside the runtime. FDP_ACC.2/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality: 1
- ADEL) policy on security aspects outside the runtime. FDP_ACC.2/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_ACF.1/ADEL IP_SFR No: 1
- DRG.4) that can be used directly. FDP_RIP.1/ABORT IP_SFR No correspondence. Out of scope (internal Java Card functionality: 1
- FCS_CKM.1.1/RSA, FCS_CKM.1.1/ECC, FCS_CKM.1.1/3DES, FCS_CKM.1.1/AES) All IP_SFRs No crrespondence. Out of scope. The TOE uses the spe- cific Document Basic Access Key Derivation Algorithm: 1
- FCS_CKM.1.1/RSA, FCS_CKM.1.1/ECC, FCS_CKM.1.1/3DES, FCS_CKM.1.1/AES) All IP_SFRs No crrespondence. Out of scope. The TOE uses the spe- cific Document Basic Access Key Derivation Algorithm. There are no: 1
- FDP_RIP.1/ADEL FDP_RIP.1/ODEL FDP_RIP.1/ABORT) All IP_SFRs FMT_MSA.1/JCRE IP_SFR No correspondence Out of scope (internal Java Card Firewall). No contradiction to this ST. FMT_MSA.1/JCVM IP_SFR No correspondence: 1
- FDP_RIP.1/bArray FDP_RIP.1/KEYS FDP_RIP.1/TRANSIENT No correspondence. Out of scope (internal Java Card Firewall). No contradiction to this ST. 3 Conformance Claims Security Target: 1
- G OT.Data-Integrity No contradiction to this ST. O.ARRAY_VIEWS_CONFID No correspondence Out of scope. No contradiction to this ST. O.ARRAY_VIEWS_INTEG No correspondence Out of scope. No contradiction: 1
- Java Card Firewall). No contradiction to this ST. FMT_MSA.2/FIREWALL- JCVM IP_SFR No correspondence Out of scope (internal Java Card Firewall). The resulting requirements for applets are reflected in the User: 1
- No correspondence Out of scope. No contradiction to this ST. O.CARD-MANAGEMENT No correspondence Out of scope. No contradiction to this ST. OT.SCP.IC OT.Prot_Phys-Tamper The objectives are related. No con-: 1
- O.ALARM No correspondence Out of scope. No contradiction to this ST. O.CIPHER No correspondence Indirectly relevant for the correct: 1
- O.REALLOCATION No correspondence Out of scope. No contradiction to this ST. O.RESOURCES No correspondence Out of scope. No contradiction to this: 1
- O.TRANSACTION No correspondence Out of scope. No contradiction to this ST. O.OBJ-DELETION No correspondence Out of scope. No contradiction to: 1
- Out of scope: 86
- Out of scope (internal Java Card Firewall). The resulting requirements for applets are reflected in the User: 1
- Out of scope (internal Java Card fun tionality). No contradiction to this ST. FIA_USB.1/AID IP_SFR No: 1
- Out of scope (internal Java Card fun tionality). No contradiction to this ST. FMT_MTD.3/JCRE IP_SFR No: 1
- Out of scope (internal Java Card func tionality). No contradiction to this ST. FPT_FLS.1/Installer IP_SFR No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. 3 Conformance Claims Security: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. CMGR Security Functional: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/ADEL IP_SFR No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_UIT.1/CM IP_SFR No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FIA_UID.1/CM IP_SFR No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/ADEL IP_SFR No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/CM IP_SFR No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/ADEL IP_SFR No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/CM IP_SFR No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/ADEL IP_SFR No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/CM IP_SFR No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/ADEL IP_SFR No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/CM IP_SFR No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1/ADEL IP_SFR No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FTP_ITC.1/CM IP_SFR No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. ODELG Security Functional: 1
- Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_RIP.1/KEYS IP_SFR No: 1
- Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_RIP.1/TRANSIENT IP_SFR No: 1
- Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_RIP.1/bArray IP_SFR No: 1
- Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_ROL.1/FIREWALL IP_SFR No: 1
- Out of scope (internal Java Card functionality). No contradiction to this ST. FMT_MTD.1/JCRE IP_SFR No: 1
- Out of scope (internal Java Card functionality). No contradiction to this ST. INSTG Security Functional: 1
- Out of scope (internal Java Virtual Machine). No contradiction to this ST. FDP_RIP.1 (FDP_RIP.1/OBJECTS FDP_RIP: 1
- Platform Threat Correspondence in this ST References/Remarks T.CONFID-APPLI-DATA No correspondence Out of scope. No contradiction to this ST. T.CONFID-JCS-CODE No correspondence Out of scope. No contradiction to: 1
- SFR Correspondence in this ST References/Remarks FPT_RCV.3/Installer IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. ADELG Security Functional: 1
- SID.2 No correspondence Out of scope. No contradiction to this ST. T.EXE-CODE.1 No correspondence Out of scope. No contradiction to this ST. T.EXE-CODE.2 No correspondence Out of scope. No contradiction to this: 1
- ST) Firewall Policy (chapter 8.1.1.1 in platform ST) FDP_ACC.2/FIREWALL IP_SFR No correspondence Out of scope (internal Java Card Firewall. The resulting requirements for applets are reflected in the User: 1
- ST. O.DELETION No correspondence Out of scope. No contradiction to this ST. O.LOAD No correspondence Out of scope. No contradiction to this ST. O: 1
- ST. T.INSTALL No correspondence Out of scope. No contradiction to this ST. T.OBJ-DELETION No correspondence Out of scope. No contradiction to: 1
- ST. T.INTEG-JCS-DATA No correspondence Out of scope. No contradiction to this ST. T.SID.1 No correspondence Out of scope. No contradiction to this ST: 1
- T.DELETION No correspondence Out of scope. No contradiction to this ST. T.SECURE_DELETION No correspondence Out of scope. No contradiction to: 1
- T.INTEG-APPLI-DATA T.Forgery No contradiction to this ST. T.INTEG-APPLI-DATA.LOAD No correspondence Out of scope. No contradiction to this ST. T.INTEG-JCS-CODE No correspondence Out of scope. No contradiction to: 1
- T.Information_Leakage No contradiction to this ST. T.INTEG-APPLI-CODE No correspondence Out of scope. No contradiction to this ST. T.INTEG-APPLI-CODE.LOAD No correspondence Out of scope. No: 1
- T.NATIVE No correspondence Out of scope. No contradiction to this ST. T.RESOURCES No correspondence Out of scope. No contradiction to this: 1
- The objectives are related. No con- tradiction to this ST. O.SCP.SUPPORT No correspondence Out of scope. No contradiction to this 3 Conformance Claims Security Target Lite ePass Applet on Sm@rtCafé®: 1
- chapter 8.1.1.1 in platform ST) FDP_ACC.2/FIREWALL IP_SFR No correspondence Out of scope (internal Java Card Firewall: 1
- chapter 8.1.1.4 in platform ST) FIA_ATD.1/AID IP_SFR No correspondence. Out of scope (internal Java Card fun tionality: 1
- complement Java Card OS mechanisms. No contradiction tothis ST. FPT_TDC.1 IP_SFR No correspondence Out of scope (internal Java Card functionality). No contradiction to this ST. FPT_TST.1 RP_SFR-SERV FPT_TST.1: 1
- defined quality metric (DRG.4) that can be used directly. FDP_RIP.1/ABORT IP_SFR No correspondence. Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_RIP.1/APDU IP_SFR No: 1
- for the TOE and are covered by SFRs in the platform ST. FTP_ITC.1/CMGR IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. SCPG Security Functional: 1
- internal Java Card Firew a l l ). No contradiction to this ST. FMT_SMF.1 IP_SFR No correspondence Out of scope (internal Java Card Firewall: 1
- internal Java Card Firewall). No contradiction to this ST. FMT_MSA.1/JCVM IP_SFR No correspondence Out of scope (internal Java Card Firewall: 1
- internal Java Card Firewall). No contradiction to this ST. FMT_SMR.1 IP_SFR No correspondence Out of scope (internal Java Card Firewall). No contradiction to this ST. Application Programming Interface: 1
- internal Java Virtual Machine). No contradiction to this ST. FDP_IFF.1/JCVM IP_SFR No correspondence Out of scope (internal Java Virtual Machine: 1
- managed within Java Card OS). No contradiction to this ST. FCS_CKM.3 IP_SFR No correspondence Out of scope (managed within Java Card OS: 1
- no corresponding objectives for the TOE of this ST. No contradictions. O.KEY-MNGT No correspondence Out of scope. No contradiction to this ST. O.PIN-MNGT No correspondence Out of scope. No contradiction to this: 1
- of the TOE. No contradic- tion to this ST. FMT_MSA.3/FIREWALL IP_SFR No correspondence Out of scope (internal Java Card Firewall). The resulting requirements for applets are reflected in the User: 1
- of the TOE. No contradic- tion to this ST. FMT_MSA.3/JCVM IP_SFR No correspondence Out of scope (internal Java Card Firew a l l ). No contradiction to this ST. FMT_SMF.1 IP_SFR No correspondence: 1
- of the TOE. No contradiction to this ST. FDP_ACF.1/FIREWALL IP_SFR No correspondence Out of scope (internal Java Card Firewall). The resulting requirements for applets are reflected in the User: 1
- of the TOE. No contradiction to this ST. FDP_IFC.1/JCVM IP_SFR No correspondence Out of scope (internal Java Virtual Machine). No contradiction to this ST. FDP_IFF.1/JCVM IP_SFR No: 1
- or that has been modified after bytecode verification. FCO_NRO.2/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. 3 Conformance Claims Security: 1
- owns the deleted objects by invoking a specific API method. FDP_RIP.1/ODEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1/ODEL RP_SFR-SERV: 1
- start-up. AID Management (chapter 8.1.1.4 in platform ST) FIA_ATD.1/AID IP_SFR No correspondence. Out of scope (internal Java Card fun tionality). No contradiction to this ST. FIA_UID.2/AID IP_SFR No: 1
- this ST. O.NATIVE No correspondence Out of scope. No contradiction to this ST. O.OPERATE No correspondence Out of scope. No contradiction to this ST: 1
- to this ST. FCS_CKM.2 IP_SFR No correspondence Out of scope (managed within Java Card OS). No contradiction to this ST. FCS_CKM.3 IP_SFR No correspondence Out: 1
- which addresses security aspects outside the runtime. FDP_ITC.2/Installer IP_SFR No correspondence Out of scope (internal Java Card functionality). No contradiction to this ST. FMT_SMR.1/Installer IP_SFR No: 1
|
| pdf_data/st_metadata |
- /Author: genua GmbH
- /Keywords: firewall, and, VPN, gateway
- /Subject: Common Criteria certification
- /Title: genuscreen 8.0 Security Target
- pdf_file_size_bytes: 402456
- pdf_hyperlinks: http://www.ietf.org/rfc/rfc3602.txt, http://www.ietf.org/rfc/rfc6353.txt, http://dx.doi.org/10.6028/NIST.SP.800-38D, http://dx.doi.org/10.17487/RFC8017, http://www.ecc-brainpool.org/download/Domain-parameters.pdf, http://www.ietf.org/rfc/rfc4253.txt, https://doi.org/10.17487/RFC8017, http://www.ietf.org/rfc/rfc4418.txt, http://dx.doi.org/10.6028/NIST.FIPS.180-4, http://www.ietf.org/rfc/rfc6960.txt, http://www.ietf.org/rfc/rfc4344.txt, https://tools.ietf.org/html/draft-miller-secsh-umac-01, http://www.ietf.org/rfc/rfc3414.txt, http://dx.doi.org/10.6028/NIST.SP.800-38A, http://www.ietf.org/rfc/rfc7296.txt, http://www.ietf.org/rfc/rfc2104.txt, http://www.ietf.org/rfc/rfc5280.txt, https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_20_pdf.html, http://www.ietf.org/rfc/rfc5114.txt, http://www.ietf.org/rfc/rfc5903.txt, http://www.ietf.org/rfc/rfc5639.txt, http://www.ietf.org/rfc/rfc2409.txt, http://www.ietf.org/rfc/rfc4307.txt, http://www.ietf.org/rfc/rfc5656.txt, http://www.ietf.org/rfc/rfc4868.txt, https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_31_pdf.html, http://www.ietf.org/rfc/rfc6239.txt, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, http://www.ietf.org/rfc/rfc2460.txt, http://www.ietf.org/rfc/rfc4301.txt, http://www.ietf.org/rfc/rfc4754.txt, https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_31_Functionality_classes_for_random_number_generators_e.pdf?__blob=publicationFile, http://dx.doi.org/10.6028/NIST.FIPS.186-4
- pdf_is_encrypted: False
- pdf_number_of_pages: 83
|
- /Author: G+D MS / stut
- /Category: Public
- /Chip: SLC37GDA512
- /Comments: Final
- /Company: G+D Mobile Security GmbH
- /CreationDate: D:20220912111407Z00'00'
- /Creator: Acrobat PDFMaker 22 für Word
- /HWManufacturer: Infineon
- /Keywords: Version 1.1/Status 12.09.2022
- /ModDate: D:20221021105718Z00'00'
- /Producer: macOS Version 12.6 (Build 21G115) Quartz PDFContext, AppendMode 1.1
- /ProductName: ePass Applet on Sm@rtCafé® Expert 8.0 C1
- /SourceModified: D:20220912104846
- /Subject: ePass Applet on Sm@rtCafé® Expert 8.0 C1
- /TOE: ePass Applet on Sm@rtCafé® Expert 8.0 C1
- /Title: Security Target Lite
- pdf_file_size_bytes: 1343333
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 93
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
True |
| state/cert/download_ok |
True |
True |
| state/cert/extract_ok |
True |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |