name |
Motorola Solutions RFS7000-GR Wireless LAN Switch and AP-7131N Wireless Access Point |
Sm@rtCafé® Expert 7.0 EAL 6+ C1 |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
US |
DE |
status |
archived |
active |
not_valid_after |
28.03.2016 |
29.05.2025 |
not_valid_before |
28.03.2014 |
29.05.2020 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1092c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10472-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1092a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10472-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1092b_pdf.pdf |
manufacturer |
Motorola Solutions, Inc. |
Veridos GmbH - Identity Solutions by Giesecke & Devrient and Bundesdruckerei |
manufacturer_web |
https://www.motorolasolutions.com |
https://www.veridos.com |
security_level |
EAL2+, ALC_FLR.2 |
EAL6+, ALC_FLR.1 |
dgst |
778473e553d9d55f |
e4256d8111c60a46 |
heuristics/cert_id |
CCEVS-VR-VID-10472-2014 |
BSI-DSZ-CC-1092-2020 |
heuristics/cert_lab |
US |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1, ADV_SPM.1 |
ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ASE_TSS.1, ALC_FLR.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ATE_FUN.2, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_IMP.2, ALC_CMC.5, ASE_REQ.2, ADV_INT.3, ASE_INT.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1 |
heuristics/extracted_versions |
- |
7.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1028-2017, BSI-DSZ-CC-0951-V4-2019 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1028-2017, BSI-DSZ-CC-0951-V3-2018, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0951-2015, BSI-DSZ-CC-0951-V2-2017, BSI-DSZ-CC-0868-2014, BSI-DSZ-CC-0951-V4-2019 |
heuristics/scheme_data |
- category: Wireless LAN
- certification_date: 28.03.2014
- evaluation_facility: UL Verification Services Inc. (Formerly InfoGard)
- expiration_date: 28.03.2016
- id: CCEVS-VR-VID10472
- product: Motorola Solutions RFS7000-GR Wireless LAN Switch and AP-7131N Wireless Access Point
- scheme: US
- url: https://www.niap-ccevs.org/product/10472
- vendor: Motorola Mobility LLC
|
- category: Smart Cards and similar devices
- cert_id: BSI-DSZ-CC-1092-2020
- certification_date: 29.05.2020
- enhanced:
- applicant: Veridos GmbH - Identity Solutions by Giesecke & Devrient and Bundesdruckerei Oranienstraße 91 10969 Berlin
- assurance_level: EAL6+,ALC_FLR.1
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1092c_pdf.pdf?__blob=publicationFile&v=1
- certification_date: 29.05.2020
- description: The Target of Evaluation (TOE), the Sm@rtCafé® Expert 7.0 EAL 6+ C1 is a dual-interface, contact based or a pure contactless smart card with a Java Card operating system (OS). The composite TOE is a multi-purpose Java Card platform where applets of different kind can be installed. Since a post-issuance installation of applets is possible, the TOE corresponds to an open configuration, as defined in the PP. Depending on the installed applets, the entire product (consisting of the TOE plus applets) can be used as a government card (like an ID card or a passport), a payment card, a signature card and for other purposes. The composite TOE is based on the certified Integrated Circuit (IC) M5073 G11 (Certification ID BSI-DSZ-CC-0951-V4-2019). The composite TOE comprises the underlying hardware IC, the operating system including the G+D crypto library and according TOE guidance documents. The Biometric API is not part of the TOE and can be part of the product or not.
- evaluation_facility: TÜV Informationstechnik GmbH
- expiration_date: 28.05.2025
- product: Sm@rtCafé® Expert 7.0 EAL 6+ C1
- protection_profile: Java Card Protection Profile - Open Configuration, December 2017, Version 3.0.5, BSI-CC-PP-0099-2017
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1092a_pdf.pdf?__blob=publicationFile&v=1
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1092b_pdf.pdf?__blob=publicationFile&v=1
- product: Sm@rtCafé® Expert 7.0 EAL 6+ C1
- subcategory: Operating systems and applications
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_Betriebssysteme_Anwendungen/1092.html
- vendor: Veridos GmbH - Identity Solutions by Giesecke & Devrient and Bundesdruckerei
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0951-V4-2019 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0951-V4-2019 |
heuristics/protection_profiles |
{} |
94167fd161e87d71 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099b_pdf.pdf |
pdf_data/cert_filename |
|
1092c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 5: 1
- EAL 6: 1
- EAL 6 augmented: 1
- EAL 6+: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20200608084917+02'00'
- /Creator: Writer
- /Keywords: Common Criteria, Certification, Zertifizierung, Smart Card, Java Card
- /ModDate: D:20200608085041+02'00'
- /Producer: LibreOffice 6.2
- /Subject: Sm@rtCafé® Expert 7.0 EAL 6+C1
- /Title: Certificate BSI-DSZ-CC-1092-2020
- pdf_file_size_bytes: 296860
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
st_vid10472-vr.pdf |
1092a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- US:
- cert_id: CCEVS-VR-VID10472-2014
- cert_item: Motorola Solutions, Inc. RFS7000-GR Wireless LAN Switch and AP-7131N Wireless Access Point
- cert_lab: US NIAP
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1092-2020
- cert_item: Sm@rtCafé® Expert 7.0 EAL 6+ C1
- cert_lab: BSI
- developer: Veridos GmbH - Identity Solutions by Giesecke+Devrient and Bundesdruckerei
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Java Card Protection Profile - Open Configuration, December 2017, Version 3.0.5, BSI-CC-PP-0099- 2017
- US:
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10472-2014: 1
|
- DE:
- BSI-DSZ-CC-0951-V4-2019: 1
- BSI-DSZ-CC-1028-2017: 3
- BSI-DSZ-CC-1092-: 1
- BSI-DSZ-CC-1092-2020: 23
- BSI-DSZ-CC-S-0127-: 1
- BSI-DSZ-CC-S-0127-2019: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0099-: 1
- BSI-CC-PP-0099-2017: 3
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 1
- EAL 5: 4
- EAL 5+: 1
- EAL 6: 5
- EAL 6 augmented: 3
- EAL 6+: 18
- EAL6: 1
- EAL6 augmented: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ALC:
- ALC_CMC.5: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 3
- ALC_FLR.1: 5
- ALC_LCD.1: 1
- ALC_TAT.3: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
- FCO:
- FCS:
- FCS_CKM.1: 5
- FCS_COP.1: 30
- FCS_COP.1.1: 16
- FCS_RNG.1: 2
- FIA:
- FPT:
- FTP:
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NO_EVIL: 1
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TOE_NO_BYPASS: 1
- T:
- T.ACCIDENTAL_ADMIN_ERROR: 1
- T.ACCIDENTAL_CRYPTO_COMPROMISE: 1
- T.MASQUERADE: 1
- T.POOR_DESIGN: 1
- T.POOR_IMPLEMENTATION: 1
- T.POOR_TEST: 1
- T.RESIDUAL_DATA: 1
- T.TSF_COMPROMISE: 1
- T.UNATTENDED_SESSION: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTH_ACCESS_POINT: 1
- T.UNAUTH_ADMIN_ACCESS: 1
|
|
pdf_data/report_keywords/vendor |
|
- GD:
- G&D: 1
- G+D: 2
- Giesecke & Devrient: 4
- Giesecke+Devrient: 13
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 1
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 4
- TÜViT: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3-DES: 6
- 3DES: 17
- TDEA: 1
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 24: 1
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
- BSI:
- AIS 1: 1
- AIS 20: 2
- AIS 25: 3
- AIS 26: 2
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 6
- AIS 37: 2
- AIS 46: 2
- AIS 47: 1
- AIS20: 1
- AIS31: 1
- FIPS:
- FIPS 197: 9
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- FIPS180-4: 14
- FIPS186-4: 4
- FIPS197: 1
- FIPS46-3: 1
- ISO:
- ISO/IEC 11770-3: 1
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18031:2011: 1
- ISO/IEC 18045: 4
- ISO/IEC9796-2: 1
- NIST:
- PKCS:
- RFC:
- SCP:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 04.2020, Security Target Sm@rtCafé® Expert 7.0 EAL 6+ C1, Giesecke+Devrient Mobile Security GmbH (confidential document) 7 specifically • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung: 1
- 36 for Sm@rtCafé® Expert 7.0 EAL 6+ C1, Version 6, 25.05.2020, BSI-DSZ-CC-1092- 2020, TÜViT GmbH (confidential document) [11] Configuration list for the TOE, Version 1.5, 18.05.2020, Giesecke+Devrient Mobile Security: 1
- Sm@rtCafé® Expert 7.0 EAL 6+ C1, Version 6, 25.05.2020, TÜV Informationstechnik GmbH (confidential document) [8] Java Card Protection Profile - Open Configuration, December 2017, Version 3.0.5: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- confidential document) [12] Preparative Procedures Sm@rtCafé® Expert Expert 7.0 EAL 6+ C1 Version 2.1 , 15.04.2020: 1
- “Evaluation Technical Report for Composite Evaluation (ETR Comp)”, TÜV Informationstechnik GmbH (confidential document) [16] GlobalPlatform Card Specification Version 2.2.1, January 2011 [17] GlobalPlatform Card Common: 1
|
pdf_data/report_metadata |
- /Author: Steve Wilson
- /Company: InfoGard Laboratories
- /CreationDate: D:20140331160855-04'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /Keywords:
- /ModDate: D:20140331160902-04'00'
- /Producer: Adobe PDF Library 10.0
- /SourceModified: D:20140331200839
- /Subject:
- /Title: D
- pdf_file_size_bytes: 166987
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20200608083506+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smart Card, Java Card"
- /ModDate: D:20200608084737+02'00'
- /Producer: LibreOffice 6.2
- /Subject: Sm@rtCafé® Expert 7.0 EAL 6+C1
- /Title: Certification Report BSI-DSZ-CC-1092-2020
- pdf_file_size_bytes: 1019539
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 37
|
pdf_data/st_filename |
st_vid10472-st.pdf |
1092b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0951-V4-: 1
- BSI-DSZ-CC-0951-V4-2019: 2
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 6
- EAL1: 4
- EAL2: 8
- EAL2 augmented: 4
- EAL2+: 2
- EAL3: 4
- EAL5: 4
- EAL6: 2
- EAL7: 4
|
- EAL:
- EAL 4+: 1
- EAL 6: 3
- EAL 6 augmented: 2
- EAL 6+: 147
- EAL6: 4
- EAL6 augmented: 2
- EAL6+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 12
- ADV_FSP: 2
- ADV_FSP.1: 2
- ADV_FSP.2: 26
- ADV_IMP: 2
- ADV_INT: 2
- ADV_SPM: 4
- ADV_SPM.1: 4
- ADV_TDS: 2
- ADV_TDS.1: 20
- AGD:
- AGD_OPE: 4
- AGD_OPE.1: 18
- AGD_PRE: 2
- AGD_PRE.1: 16
- ALC:
- ALC_CMC: 2
- ALC_CMC.2: 8
- ALC_CMS: 2
- ALC_CMS.2: 8
- ALC_DEL: 2
- ALC_DEL.1: 8
- ALC_DVS: 2
- ALC_FLR: 2
- ALC_FLR.2: 18
- ALC_TAT: 2
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 2
- ASE_ECD: 2
- ASE_ECD.1: 2
- ASE_INT: 2
- ASE_INT.1: 2
- ASE_OBJ: 2
- ASE_OBJ.2: 2
- ASE_REQ: 2
- ASE_REQ.2: 2
- ASE_SPD: 2
- ASE_SPD.1: 2
- ASE_TSS: 2
- ASE_TSS.1: 2
- ATE:
- ATE_COV: 2
- ATE_COV.1: 14
- ATE_COV.2: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_FUN.1: 12
- ATE_IND: 2
- ATE_IND.2: 6
- AVA:
|
- ADV:
- ADV_ARC: 6
- ADV_ARC.1: 5
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 3
- ADV_FSP.5: 9
- ADV_IMP.1: 5
- ADV_IMP.2: 1
- ADV_INT.3: 1
- ADV_SPM.1: 3
- ADV_TDS.1: 2
- ADV_TDS.3: 3
- ADV_TDS.4: 5
- ADV_TDS.5: 2
- AGD:
- AGD_OPE.1: 7
- AGD_PRE.1: 5
- ALC:
- ALC_CMC.5: 3
- ALC_CMS.1: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 4
- ALC_FLR.1: 7
- ALC_LCD.1: 3
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.3: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 3
- ASE_INT.2: 2
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 3
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 2
- ATE_COV.3: 1
- ATE_DPT.1: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 5
- ATE_FUN.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 36
- FAU_GEN.1: 22
- FAU_GEN.1.1: 3
- FAU_GEN.1.2: 2
- FAU_GEN.2: 16
- FAU_GEN.2.1: 2
- FAU_SEL.1: 16
- FAU_SEL.1.1: 2
- FAU_UAU.1: 2
- FCS:
- FCS_CKM: 4
- FCS_CKM.1: 68
- FCS_CKM.1.1: 7
- FCS_CKM.2: 18
- FCS_CKM.2.1: 9
- FCS_CKM.4: 52
- FCS_CKM.4.1: 2
- FCS_CKM_EXT.2: 2
- FCS_COP: 6
- FCS_COP.1: 81
- FCS_COP.1.1: 37
- FCS_PEAP_EXT: 5
- FCS_PEAP_EXT.1: 28
- FCS_PEAP_EXT.1.1: 2
- FCS_PEAP_EXT.1.2: 4
- FCS_PEAP_EXT.1.3: 4
- FCS_PEAP_EXT.1.4: 4
- FCS_RAD_EXT: 5
- FCS_RAD_EXT.1: 28
- FCS_RAD_EXT.1.1: 4
- FCS_RAD_EXT.1.2: 4
- FCS_RAD_EXT.1.3: 4
- FCS_SFTP_EXT: 4
- FCS_SFTP_EXT.1: 30
- FCS_SFTP_EXT.1.1: 2
- FCS_SFTP_EXT.1.2: 4
- FCS_SSH_EXT: 4
- FCS_SSH_EXT.1: 39
- FCS_SSH_EXT.1.1: 4
- FCS_SSH_EXT.1.2: 4
- FCS_SSH_EXT.1.3: 4
- FCS_SSH_EXT.1.4: 4
- FCS_SSH_EXT.1.5: 4
- FCS_SSH_EXT.1.6: 4
- FCS_SSH_EXT.1.7: 4
- FCS_SSH_EXT.1.8: 4
- FCS_SSH_EXT.1.9: 4
- FCS_TLS_EXT: 4
- FCS_TLS_EXT.1: 61
- FCS_TLS_EXT.1.1: 4
- FCS_TTLS_EXT.1: 1
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF: 2
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 4
- FDP_IFC.1: 48
- FDP_IFC.1.1: 5
- FDP_IFF: 43
- FDP_IFF.1: 44
- FDP_ITC.1: 18
- FDP_ITC.2: 14
- FDP_PUD: 2
- FDP_RIP: 4
- FDP_RIP.1: 18
- FDP_RIP.1.1: 2
- FIA:
- FIA_AFL: 4
- FIA_AFL.1: 16
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD: 4
- FIA_ATD.1: 29
- FIA_ATD.1.1: 5
- FIA_UAU: 12
- FIA_UAU.1: 38
- FIA_UAU.1.1: 6
- FIA_UAU.1.2: 4
- FIA_UAU.4: 7
- FIA_UAU.4.1: 1
- FIA_UAU.5: 1
- FIA_UAU.5.1: 1
- FIA_UID: 4
- FIA_UID.1: 8
- FIA_UID.2: 21
- FIA_UID.2.1: 2
- FIA_USB: 4
- FIA_USB.1: 16
- FIA_USB.1.1: 2
- FIA_USB.1.2: 2
- FIA_USB.1.3: 2
- FMT:
- FMT_MOF: 4
- FMT_MOF.1: 93
- FMT_MOF.1.1: 12
- FMT_MSA: 5
- FMT_MSA.1: 19
- FMT_MSA.1.1: 1
- FMT_MSA.2: 58
- FMT_MSA.2.1: 2
- FMT_MSA.3: 49
- FMT_MSA.3.1: 5
- FMT_MSA.3.2: 5
- FMT_MTD: 4
- FMT_MTD.1: 40
- FMT_MTD.1.1: 5
- FMT_REV.1: 1
- FMT_SMF: 4
- FMT_SMF.1: 105
- FMT_SMF.1.1: 12
- FMT_SMR: 4
- FMT_SMR.1: 43
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_ITC_EXT.1: 2
- FPT_ITC_EXT.1.1: 2
- FPT_ITC_EXT.1.2: 2
- FPT_ITC_EXT.1.3: 2
- FPT_ITT: 2
- FPT_ITT.1: 7
- FPT_ITT.1.1: 1
- FPT_STM: 4
- FPT_STM.1: 2
- FPT_STM_EXT.1: 4
- FPT_STM_EXT.1.1: 4
- FPT_TST: 4
- FPT_TST.1: 32
- FPT_TST.1.1: 4
- FPT_TST.1.2: 4
- FPT_TST.1.3: 4
- FPT_TST.2: 2
- FPT_TST_EXT: 8
- FPT_TST_EXT.1: 22
- FPT_TST_EXT.1.1: 4
- FPT_TST_EXT.1.2: 4
- FTA:
- FTA_SSL: 4
- FTA_SSL.3: 14
- FTA_SSL.3.1: 4
- FTA_TAB: 4
- FTA_TAB.1: 14
- FTA_TAB.1.1: 2
- FTA_TSE: 2
- FTA_TSE.1: 8
- FTA_TSE.1.1: 1
- FTP:
- FTP_ITC: 4
- FTP_ITC.1: 2
- FTP_ITC_EXT: 4
- FTP_ITC_EXT.1: 23
- FTP_ITC_EXT.1.1: 2
- FTP_ITC_EXT.1.2: 2
- FTP_ITC_EXT.1.3: 2
- FTP_TRP: 2
- FTP_TRP.1: 8
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_ARP.1: 21
- FAU_ARP.1.1: 1
- FAU_SAA.1: 3
- FAU_SAS.1: 1
- FCO:
- FCS:
- FCS_CKM: 10
- FCS_CKM.1: 35
- FCS_CKM.2: 4
- FCS_CKM.4: 30
- FCS_CKM.4.1: 1
- FCS_COP: 12
- FCS_COP.1: 117
- FCS_RNG: 5
- FCS_RNG.1: 13
- FCS_RNG.1.1: 5
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 28
- FDP_ACC.1: 11
- FDP_ACC.2: 5
- FDP_ACF: 27
- FDP_ACF.1: 14
- FDP_IFC: 27
- FDP_IFC.1: 13
- FDP_IFC.2: 2
- FDP_IFF: 19
- FDP_IFF.1: 17
- FDP_ITC: 12
- FDP_ITC.1: 7
- FDP_ITC.2: 19
- FDP_ITT.1: 1
- FDP_RIP: 138
- FDP_RIP.1: 11
- FDP_ROL: 16
- FDP_ROL.1: 5
- FDP_SDC.1: 2
- FDP_SDI: 16
- FDP_SDI.1: 2
- FDP_SDI.2: 3
- FDP_UIT: 9
- FDP_UIT.1: 2
- FIA:
- FIA_API.1: 1
- FIA_ATD: 10
- FIA_ATD.1: 2
- FIA_UID: 16
- FIA_UID.1: 9
- FIA_UID.2: 1
- FIA_USB: 9
- FIA_USB.1: 3
- FMT:
- FMT_LIM: 4
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MSA: 101
- FMT_MSA.1: 10
- FMT_MSA.2: 2
- FMT_MSA.3: 17
- FMT_MTD: 22
- FMT_MTD.1: 2
- FMT_MTD.3: 1
- FMT_SMF: 22
- FMT_SMF.1: 20
- FMT_SMF.1.1: 1
- FMT_SMR: 35
- FMT_SMR.1: 32
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 10
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 39
- FPT_FLS.1: 21
- FPT_FLS.1.1: 2
- FPT_ITT.1: 2
- FPT_PHP.3: 9
- FPT_PHP.3.1: 3
- FPT_RCV: 13
- FPT_RCV.3: 10
- FPT_TDC.1: 8
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 2
- FPT_TST.1: 9
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 1
- FRU:
- FTP:
- FTP_ITC: 14
- FTP_ITC.1: 8
- FTP_ITC.1.1: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NO_EVIL: 6
- A.NO_GENERAL_PURPOSE: 2
- A.PHYSICAL: 4
- A.TOE_NO_BYPASS: 3
- O:
- O.ADMIN_GUIDANCE: 14
- O.AUDIT_GENERATION: 8
- O.CONFIGURATION_: 3
- O.CONFIGURATION_DENTIFICATION: 6
- O.CONFIGURATION_IDENTIFICATION: 6
- O.CORRECT_: 1
- O.CORRECT_TSF_OPERATION: 7
- O.CRYPTOGRAPHY: 14
- O.CRYPTOGRAPHY_VALIDATED: 8
- O.DISPLAY_BANNER: 14
- O.DOCUMENTED_: 3
- O.DOCUMENTED_DESIGN: 8
- O.MANAGE: 20
- O.MEDIATE: 12
- O.PARTIAL_FUNCTIONAL_TESTING: 16
- O.RESIDUAL_: 1
- O.RESIDUAL_INFORMATION: 9
- O.ROGUE_AP_DETECTION: 14
- O.SELF_PROTECTION: 19
- O.TIME_STAMPS: 8
- O.TOE_ACCESS: 14
- O.VULNERABILITY_: 3
- O.VULNERABILITY_ANALYSIS: 5
- OE:
- OE.AUDIT_PROTECTION: 6
- OE.AUDIT_REVIEW: 6
- OE.MANAGE: 10
- OE.NO_EVIL: 8
- OE.NO_GENERAL_PURPOSE: 6
- OE.PHYSICAL: 6
- OE.PROTECT_MGMT_COMMS: 6
- OE.RESIDUAL_INFORMATION: 6
- OE.SELF_PROTECTION: 9
- OE.TIME_STAMPS: 6
- OE.TOE_ACCESS: 8
- OE.TOE_NO_BYPASS: 6
- OSP:
- T:
- T.ACCIDENTAL_: 2
- T.ACCIDENTAL_ADMIN_: 7
- T.ACCIDENTAL_ADMIN_ERROR: 7
- T.ACCIDENTAL_CRYPTO_COMPROMISE: 9
- T.MASQUERADE: 12
- T.POOR_DESIGN: 6
- T.POOR_IMPLEMENTATION: 6
- T.POOR_TEST: 4
- T.RESIDUAL_DATA: 8
- T.TSF_COMPROMISE: 14
- T.UNATTENDED_: 3
- T.UNATTENDED_SESSION: 3
- T.UNAUTHORIZED_: 2
- T.UNAUTHORIZED_ACCESS: 9
- T.UNAUTH_ACCESS_POINT: 2
- T.UNAUTH_ADMIN_ACCESS: 14
- T.UNAUTH_AP: 2
|
- A:
- A.APPLET: 4
- A.DELETION: 5
- A.VERIFICATION: 4
- D:
- D.APP_I_DATA: 2
- D.CRYPTO: 2
- D.PIN: 1
- D.SEC_DATA: 1
- O:
- O.AES: 1
- O.ALARM: 22
- O.APPLET: 15
- O.CARD-: 7
- O.CARD-MANAGEMENT: 26
- O.CIPHER: 15
- O.CODE_PKG: 13
- O.DELETION: 17
- O.FIREWALL: 43
- O.GLOBAL_ARRAYS: 1
- O.GLOBAL_ARRAYS_CONFID: 19
- O.GLOBAL_ARRAYS_INTEG: 9
- O.INSTALL: 16
- O.JAVAOBJECT: 44
- O.KEY-: 8
- O.KEY-MNGT: 15
- O.LOAD: 18
- O.NATIVE: 14
- O.OBJ-DELETION: 9
- O.OPERATE: 36
- O.PIN-: 5
- O.PIN-MNGT: 18
- O.PINMNGT: 1
- O.REALLOCATION: 18
- O.RESOURCES: 23
- O.RND: 4
- O.RNG: 11
- O.SCP: 64
- O.SID: 33
- O.TDES: 2
- O.TRANSACTION: 19
- OE:
- OE.APPLET: 9
- OE.CARD-MANAGEMENT: 5
- OE.CODE-: 5
- OE.CODE-EVIDENCE: 14
- OE.SCP: 13
- OE.VERIFICATION: 38
- OP:
- OP.ARRAY_AASTORE: 3
- OP.ARRAY_ACCESS: 4
- OP.ARRAY_LENGTH: 4
- OP.CREATE: 7
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.INSTANCE_FIELD: 3
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 6
- OP.PUT: 5
- OP.PUTFIELD: 1
- OP.PUTSTATIC: 1
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- R:
- T:
- T.CONFID-: 8
- T.CONFID-APPLI-: 1
- T.CONFID-APPLI-DATA: 16
- T.CONFID-JCS-CODE: 3
- T.CONFID-JCS-DATA: 4
- T.DELETION: 4
- T.EXE-CODE: 6
- T.EXECODE: 1
- T.INSTALL: 5
- T.INTEG-: 10
- T.INTEG-APPLI-: 4
- T.INTEG-APPLI-CODE: 4
- T.INTEG-APPLI-DATA: 12
- T.INTEG-JCS-: 2
- T.INTEG-JCS-CODE: 5
- T.INTEG-JCS-DATA: 3
- T.INTEG-JCSCODE: 1
- T.INTEGAPPLI-CODE: 2
- T.INTEGAPPLI-DATA: 1
- T.INTEGJCS-DATA: 6
- T.NATIVE: 5
- T.OBJ-DELETION: 2
- T.OBJDELETION: 1
- T.PHYSICAL: 3
- T.RESOURCES: 7
- T.SECURE_DELETION: 8
- T.SID: 16
|
pdf_data/st_keywords/vendor |
|
- GD:
- G&D: 10
- G+D: 4
- Giesecke & Devrient: 2
- Giesecke+Devrient: 8
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 17
- AES-: 2
- AES-128: 6
- AES-192: 6
- AES-256: 6
- AES128: 1
- DES:
- 3DES:
- TDEA: 4
- TDES: 1
- Triple-DES: 1
- DES:
- constructions:
- MAC:
- CBC-MAC: 2
- HMAC: 2
- HMAC-SHA-256: 2
|
- AES_competition:
- DES:
- 3DES:
- 3-DES: 7
- 3DES: 3
- TDEA: 1
- TDES: 3
- Triple-DES: 4
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 3
- SHA-256: 4
- SHA-384: 4
- SHA-512: 3
|
pdf_data/st_keywords/crypto_scheme |
- KA:
- Key Agreement: 2
- Key agreement: 2
- KEX:
- MAC:
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 17
- IKEv1: 30
- IKEv2: 6
- IPsec:
- SSH:
- TLS:
- TLS:
- TLS: 96
- TLS 1.0: 14
- TLS 1.1: 2
- TLS 1.2: 2
- TLS v1.1: 6
- TLS v1.2: 6
- TLS1.0: 2
- TLSv1.0: 8
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA: 2
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 10
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 10
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_3DES_EDE_CBC_SHA: 4
- TLS_RSA_WITH_AES_128_CBC_SHA: 13
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 12
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- physical tampering: 5
- SCA:
- Leak-Inherent: 2
- physical probing: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
- FIPS:
- FIPS 140-2: 16
- FIPS 186-2: 2
- FIPS 197: 2
- FIPS 46-3: 2
- FIPS 81: 2
- FIPS PUB 140-2: 4
- FIPS PUB 186-2: 2
- NIST:
- RFC:
- RFC 2346: 4
- RFC 2409: 2
- RFC 2818: 4
- RFC 3146: 1
- RFC 3164: 2
- RFC 3280: 2
- RFC 3602: 2
- RFC 4106: 4
- RFC 4109: 6
- RFC 4252: 8
- RFC 4253: 9
- RFC 4303: 4
- RFC 4346: 2
- RFC 4868: 2
- RFC 4869: 2
- RFC 5216: 5
- RFC 5246: 2
- RFC 5281: 6
- RFC 792: 2
- RFC3164: 1
- RFC3280: 4
- RFC4346: 2
- X509:
|
- BSI:
- AIS 20: 1
- AIS 31: 2
- AIS20: 4
- AIS31: 2
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- FIPS:
- FIPS 140-2: 1
- FIPS 186-4: 7
- FIPS 197: 10
- FIPS180-4: 3
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816: 2
- ISO/IEC 9796-2: 1
- PKCS:
- PKCS1: 12
- PKCS3: 1
- PKCS5: 3
- RFC:
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- javacard:
- javacard.framework: 5
- javacard.framework.applet: 1
- javacard.security: 7
- javacardx:
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- Dependencies: No dependencies. 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 9: 1
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 5
- shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 10 The implemented ECDH key agreement is reduced to scalar multiplication, checking for: 1
- with ECDH is part of this SFR. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 Security Functional Requirements Security Target Lite Sm@rtCafé® Expert 7.0 EAL 6+: 1
|
pdf_data/st_metadata |
- /Author: CRD003
- /CreationDate: D:20140331105449+05'00'
- /Creator: PrimoPDF http://www.primopdf.com
- /ModDate: D:20140331162840-04'00'
- /Producer: Nitro PDF PrimoPDF
- /Title: Microsoft Word - Motorola_RFS7000_-AP7131_Security_Target_v1.51.docx
- pdf_file_size_bytes: 2408502
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 253
|
- /Author: Dr. Ulrich Stutenbäumer (Giesecke+Devrient Mobile Security GmbH)
- /Category: Public
- /Chip: M5073 G11
- /Comments: Final
- /Company: GuD
- /CreationDate: D:20200518130755+02'00'
- /Creator: Acrobat PDFMaker 19 für Word
- /HWManufacturer: Infineon
- /Keywords: dual-interface, contact based or pure contactless smart card, Javacard operating system (OS), multi-purpose Java card, post-issuance installation of applets, open configuration, Java Card System Protection Profile (Open Configuration), government card, ID card, passport, payment card, signature card
- /ModDate: D:20200518132406+02'00'
- /Producer: Adobe PDF Library 19.21.90
- /ProductName: Sm@rtCafé® Expert 7.0 EAL 6+ C1
- /SourceModified: D:20200518110720
- /Subject: Common Criteria Security Target Lite in version 4.7 from 18.05.2020
- /TOE: Sm@rtCafé® Expert 7.0 EAL 6+ C1
- /Title: Security Target Lite Sm@rtCafé® Expert 7.0 EAL 6+ C1
- pdf_file_size_bytes: 1543454
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 130
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |