Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Kyocera ECOSYS MA4000cifx/MA4000cifxG/ MA3500cifx/MA3500cifxG, Kyocera TASKalfa MA4500ci/MA3500ci, Copystar CS MA4500ci, TA Triumph Adler P-C4067i MFP/P3567i MFP/458ci/358ci, UTAX P-C4067i MFP/P3567i MFP/458ci/358ci with SSD and with system firmware: 2Z7_S0IS.C03.002:
CSEC2021010
SMARTY IQ-GPRS / LTE, Version 1.4
BSI-DSZ-CC-0822-V6-2024
name Kyocera ECOSYS MA4000cifx/MA4000cifxG/ MA3500cifx/MA3500cifxG, Kyocera TASKalfa MA4500ci/MA3500ci, Copystar CS MA4500ci, TA Triumph Adler P-C4067i MFP/P3567i MFP/458ci/358ci, UTAX P-C4067i MFP/P3567i MFP/458ci/358ci with SSD and with system firmware: 2Z7_S0IS.C03.002: SMARTY IQ-GPRS / LTE, Version 1.4
category Multi-Function Devices Other Devices and Systems
scheme SE DE
not_valid_after 14.09.2028 19.12.2032
not_valid_before 14.09.2023 20.12.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CCRAcertificate_KyoceraMA4000.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0822V6c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20Kyocera%20MA4000_1-0_21FMV6803-26.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0822V6a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_ECOSYS_MA4000cifx_v102.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0822V6b_pdf.pdf
manufacturer KYOCERA Document Solutions Inc. Sagemcom Dr. Neuhaus GmbH
manufacturer_web https://www.kyoceradocumentsolutions.com/ https://sagemcom.com
security_level EAL2+, ALC_FLR.2 EAL4+, ALC_FLR.2, AVA_VAN.5
dgst ad39419f023e12f9 4b7dcf610d994944
heuristics/cert_id CSEC2021010 BSI-DSZ-CC-0822-V6-2024
heuristics/cert_lab [] BSI
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ATE_COV.2, ASE_TSS.1, ASE_INT.1, ATE_FUN.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_ARC.1, AGD_OPE.1, ASE_REQ.2, ASE_CCL.1, ALC_CMC.4, ALC_FLR.2, ADV_IMP.1
heuristics/extracted_versions 03.002 1.4
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0822-V5-2023
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0822-V2-2020, BSI-DSZ-CC-0822-V4-2023, BSI-DSZ-CC-0822-V3-2021, BSI-DSZ-CC-0822-V5-2023
heuristics/scheme_data
  • category: Intelligent measuring systems
  • cert_id: BSI-DSZ-CC-0822-V6-2024
  • certification_date: 20.12.2024
  • enhanced:
    • applicant: Sagemcom Dr. Neuhaus GmbH Papenreye 65 22453 Hamburg
    • assurance_level: EAL4+,AVA_VAN.5,ALC_FLR.2
    • cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte08/0822V6c_pdf.pdf?__blob=publicationFile&v=2
    • certification_date: 20.12.2024
    • entries: [frozendict({'id': 'BSI-DSZ-CC-0822-V6-2024', 'description': 'The focus of this recertification was on the introduction of a new LTE-Modul for WAN-communication, the GWA-change process implementation following FNN requirements and the introduction of proxy-profiles and communication scenario HKS3 with SOCKSv5.'}), frozendict({'id': 'BSI-DSZ-CC-0822-V5-2023', 'description': 'components.'}), frozendict({'id': 'BSI-DSZ-CC-0822-V4-2023', 'description': 'The focus of this recertification was on the update of the operating system and some libraries, the implementation of changed and added tariff use cases (TAF 2, TAF 9, TAF 10, TAF 14), the support of IPv6 and the support of firmware download.'}), frozendict({'id': 'BSI-DSZ-CC-0822-V3-2021-RA-02', 'description': 'The CC-certificate BSI-DSZ-CC-0822-V3-2021 remains valid for 2 further years.'}), frozendict({'id': 'BSI-DSZ-CC-0822-V3-2021-RA-01', 'description': 'Successful Re-Assessment with update of the vulnerability analysis.'}), frozendict({'id': 'BSI-DSZ-CC-0822-V3-2021-MA-02', 'description': 'Security Target'}), frozendict({'id': 'BSI-DSZ-CC-0822-V3-2021-MA-01', 'description': 'version number remains the same as the alternative components have the same behaviour as the original one.'}), frozendict({'id': 'BSI-DSZ-CC-0822-V3-2021', 'description': 'The previoulsly certified TOE was changed and re-certified to implement minor security-relevant optimizations.'}), frozendict({'id': 'BSI-DSZ-CC-0822-V2-2020', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-0822-2019-MA-01 (20.11.2019)', 'description': 'Certificate invalid'}), frozendict({'id': 'BSI-DSZ-CC-0822-2019 (25.09.2019)', 'description': 'Certificate invalid'})]
    • evaluation_facility: TÜV Informationstechnik GmbH
    • expiration_date: 19.12.2032
    • product: SMARTY IQ-LTE, Version 1.4
    • protection_profile: Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI-CC-PP-0073-2014
    • report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte08/0822V6a_pdf.pdf?__blob=publicationFile&v=2
    • target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte08/0822V6b_pdf.html?nn=456626
  • product: SMARTY IQ-LTE, Version 1.4
  • subcategory: (Smart Meter Gateway)
  • url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartMeter_Gateway/0822_0822V2_0822V3_0822V4_0822V5_0822V6.html
  • vendor: Sagemcom Dr. Neuhaus GmbH
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0957-V2-2016
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0957-V2-2016, BSI-DSZ-CC-0978-2016
heuristics/protection_profiles {} 6346b04de6859db3
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0073b_pdf.pdf
pdf_data/cert_filename CCRAcertificate_KyoceraMA4000.pdf 0822V6c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • SE:
    • CSEC2021010: 1
  • DE:
    • BSI-DSZ-CC-0822-V6-2024: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
  • EAL:
    • EAL 2: 1
    • EAL 4: 2
    • EAL 4 augmented: 1
    • EAL 5: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.2: 1
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/eval_facility
  • Combitech:
    • Combitech AB: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20230914141124+02'00'
  • /Creator: RICOH MP C4504ex
  • /ModDate: D:20230914141124+02'00'
  • /Producer: RICOH MP C4504ex
  • pdf_file_size_bytes: 2761816
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Federal Office for Information Security
  • /Keywords: "Common Criteria, Certification, Zertifizierung, SMGW, Smartmeter Gateway, Sagemcom, Dr. Neuhaus, Smart Grid"
  • /Subject: Common Criteria, Certification, Zertifizierung, SMGW, Smartmeter Gateway, Sagemcom, Dr. Neuhaus, Smart Grid
  • /Title: Certificate BSI-DSZ-CC-0822-V6-2024
  • pdf_file_size_bytes: 335622
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename Certification Report Kyocera MA4000_1-0_21FMV6803-26.pdf 0822V6a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.2 and AVA_VAN.5 valid until: 19 December 2032
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0822-V6-2024
    • cert_item: SMARTY IQ-LTE, Version 1.4
    • cert_lab: BSI
    • developer: Sagemcom Dr. Neuhaus GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI- CC-PP-0073-2014
pdf_data/report_keywords/cc_cert_id
  • SE:
    • CSEC2021010: 18
  • DE:
    • BSI-DSZ-CC-0822-V5-2023: 3
    • BSI-DSZ-CC-0822-V6-2024: 14
    • BSI-DSZ-CC-0957-: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0073-2014: 3
    • BSI-CC-PP-0077-V2-2015: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
    • EAL 2 augmented: 1
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 4: 8
    • EAL 4 augmented: 3
    • EAL 5: 3
    • EAL 5+: 1
    • EAL 6: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 2
  • ASE:
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ALC:
    • ALC_FLR: 3
    • ALC_FLR.2: 4
  • AVA:
    • AVA_VAN.5: 5
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.DADMIN_TRUST: 1
    • A.NETWORK: 1
    • A.USER_EDUCATION: 1
  • T:
    • T.IMAGE_DATA: 1
    • T.NETWORK: 1
    • T.SETTING_DATA: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • Combitech:
    • Combitech AB: 4
  • TUV:
    • TÜV Informationstechnik: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
      • AES-: 2
  • constructions:
    • MAC:
      • CMAC: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDSA:
      • ECDSA: 3
pdf_data/report_keywords/hash_function
  • JH:
    • JH: 1
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 1
  • TLS:
    • TLS:
      • TLS: 12
pdf_data/report_keywords/cipher_mode
  • GCM:
    • GCM: 2
pdf_data/report_keywords/vulnerability
  • CVE:
    • CVE-2022-1026: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-03109: 1
    • BSI TR-03116: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
  • ISO:
    • ISO/IEC 17025: 2
  • BSI:
    • AIS 32: 1
    • AIS 34: 2
    • AIS 38: 1
    • AIS 46: 2
    • AIS 48: 1
  • FIPS:
    • FIPS 186-4: 1
    • FIPS PUB 180-4: 1
    • FIPS PUB 186: 1
    • FIPS180-4: 3
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • RFC:
    • RFC 2104: 1
    • RFC 5246: 1
    • RFC 5639: 1
    • RFC 5652: 1
    • RFC 8289: 1
    • RFC 8422: 1
    • RFC2104: 2
    • RFC4493: 6
    • RFC5084: 2
    • RFC5246: 6
    • RFC5288: 2
    • RFC5289: 3
    • RFC5639: 6
    • RFC5652: 4
    • RFC6033: 2
    • RFC6090: 4
    • RFC6161: 2
    • RFC8422: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 23 / 27 Certification Report BSI-DSZ-CC-0822-V6-2024 [9] Configuration list for the TOE (confidential documents): filelist_OS, 2024-11-12 filelist_sln8209, 2024-11-12 8209SE011_SMGw_CPU_USB, Version 3.3: 1
    • Technical Report BSI-DSZ-CC-0822-V6, Version 1, 2024-11-15, TÜV Informationstechnik GmbH, (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
pdf_data/report_metadata
  • /Author: Jerry Johansson
  • /CreationDate: D:20230913134356+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20230913134356+02'00'
  • /Producer: Microsoft® Word 2016
  • /Subject: 21FMV6803-26
  • /Title: Certification Report Kyocera MA4000
  • pdf_file_size_bytes: 348141
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename ST_ECOSYS_MA4000cifx_v102.pdf 0822V6b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0957-V2-2016: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0073: 4
    • BSI-CC-PP-0077-2013: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 7
    • EAL2 augmented: 1
  • EAL:
    • EAL 4: 5
    • EAL 4 augmented: 2
    • EAL4: 1
    • EAL4 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_IMP.1: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 6
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.5: 7
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 28
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 3
    • FCS_CKM.4: 13
    • FCS_COP.1: 27
    • FCS_COP.1.1: 3
  • FDP:
    • FDP_ACC.1: 11
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 8
    • FDP_IFC.1: 11
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 8
    • FDP_ITC.1: 3
    • FDP_ITC.2: 3
  • FIA:
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 10
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 18
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 18
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 14
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 17
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 15
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FTA:
    • FTA_SSL.3: 8
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_ARP: 10
    • FAU_ARP.1: 1
    • FAU_CON.1.2: 1
    • FAU_GEN: 39
    • FAU_GEN.1: 17
    • FAU_GEN.2: 10
    • FAU_GEN.2.1: 1
    • FAU_SAA: 15
    • FAU_SAA.1: 4
    • FAU_SAR: 30
    • FAU_SAR.1: 6
    • FAU_STG: 34
    • FAU_STG.1: 8
    • FAU_STG.2: 10
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
    • FAU_STG.3: 3
    • FAU_STG.4: 3
  • FCO:
    • FCO_NRO: 3
    • FCO_NRO.1: 1
    • FCO_NRO.2: 11
    • FCO_NRO.2.1: 1
    • FCO_NRO.2.2: 1
    • FCO_NRO.2.3: 1
  • FCS:
    • FCS_CKM: 51
    • FCS_CKM.1: 16
    • FCS_CKM.2: 6
    • FCS_CKM.4: 30
    • FCS_CKM.4.1: 1
    • FCS_COP: 68
    • FCS_COP.1: 11
  • FDP:
    • FDP_ACC: 2
    • FDP_ACC.1: 9
    • FDP_ACC.2: 12
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 11
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC: 29
    • FDP_IFC.1: 12
    • FDP_IFC.2: 4
    • FDP_IFF: 26
    • FDP_IFF.1: 18
    • FDP_ITC.1: 12
    • FDP_ITC.2: 12
    • FDP_RIP: 2
    • FDP_RIP.1: 1
    • FDP_RIP.2: 8
    • FDP_RIP.2.1: 1
    • FDP_SDI: 2
    • FDP_SDI.1: 1
    • FDP_SDI.2: 9
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_AFL: 3
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 3
    • FIA_ATD.1: 13
    • FIA_ATD.1.1: 1
    • FIA_UAU: 5
    • FIA_UAU.1: 2
    • FIA_UAU.2: 9
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 9
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 10
    • FIA_UAU.6.1: 1
    • FIA_UID: 3
    • FIA_UID.1: 8
    • FIA_UID.2: 14
    • FIA_UID.2.1: 1
    • FIA_USB: 3
    • FIA_USB.1: 9
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MSA: 64
    • FMT_MSA.1: 9
    • FMT_MSA.3: 12
    • FMT_SMF: 2
    • FMT_SMF.1: 19
    • FMT_SMF.1.1: 1
    • FMT_SMR: 3
    • FMT_SMR.1: 29
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_CON: 6
    • FPR_CON.1: 12
    • FPR_CON.1.1: 3
    • FPR_CON.1.2: 3
    • FPR_PSE: 3
    • FPR_PSE.1: 9
    • FPR_PSE.1.1: 1
    • FPR_PSE.1.2: 1
    • FPR_PSE.1.3: 1
  • FPT:
    • FPT_FLS: 3
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 2
    • FPT_PHP: 3
    • FPT_PHP.1: 8
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_RPL: 3
    • FPT_RPL.1: 10
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_STM: 3
    • FPT_STM.1: 20
    • FPT_STM.1.1: 1
    • FPT_TST: 3
    • FPT_TST.1: 10
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 32
    • FTP_ITC.1: 9
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 5
    • A.DADMIN_TRUST: 4
    • A.NETWORK: 3
    • A.NETWROK: 1
    • A.USER_EDUCATION: 5
  • O:
    • O.ACCESS_CONTROL: 7
    • O.FAX_CONTROL: 6
    • O.NETWORK_ENCRYPTION: 6
    • O.SETTING_DATA: 6
    • O.SSD_ENCRYPTION: 6
  • OE:
    • OE.ACCESS: 4
    • OE.DADMIN_TRUST: 3
    • OE.NETWORK_PROTECTION: 3
    • OE.USER_EDUCATION: 3
  • T:
    • T.IMAGE_DATA: 3
    • T.NETWORK: 4
    • T.SETTING_DATA: 4
  • OE:
    • OE.SM: 4
  • OSP:
    • OSP.SM: 5
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 14
  • DES:
    • 3DES:
      • 3DES: 5
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
  • AES_competition:
    • AES:
      • AES: 3
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDHE: 2
  • FF:
    • DH:
      • DH: 1
      • DHE: 2
      • Diffie-Hellman: 4
  • RSA:
    • RSA 2048: 1
  • ECC:
    • ECC:
      • ECC: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-256: 4
      • SHA-384: 3
      • SHA-512: 2
  • JH:
    • JH: 1
  • SHA:
    • SHA2:
      • SHA-256: 3
      • SHA-384: 2
      • SHA256: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 8
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKEv1: 7
  • IPsec:
    • IPsec: 7
  • TLS:
    • SSL:
      • SSL: 1
      • SSLv1.0: 1
      • SSLv2.0: 1
      • SSLv3.0: 1
    • TLS:
      • TLS: 17
      • TLS1.2: 1
      • TLS1.3: 1
      • TLSv1.0: 1
      • TLSv1.1: 1
      • TLSv1.2: 2
      • TLSv1.3: 3
  • TLS:
    • TLS:
      • TLS: 40
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • GCM:
    • GCM: 1
  • GCM:
    • GCM: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • NIST P-256: 2
    • NIST P-384: 1
    • P-256: 2
    • P-384: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 1
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 3
    • physical tampering: 2
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI 7586: 1
    • BSI TR-02102-2: 1
    • BSI TR-03109: 1
    • BSI TR-03109-1: 9
    • BSI TR-03109-2: 1
    • BSI TR-03109-3: 1
    • BSI TR-03109-4: 1
    • BSI TR-03111: 1
    • BSI TR-03116-3: 1
    • BSI TR-03116-4: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 180-4: 3
    • FIPS 186-4: 2
    • FIPS 197: 4
    • FIPS 46-3: 1
    • FIPS PUB 180-4: 3
    • FIPS PUB 197: 3
  • NIST:
    • SP 800-135: 3
    • SP 800-67: 1
  • PKCS:
    • PKCS #1: 1
  • RFC:
    • RFC 2104: 2
    • RFC 2409: 2
    • RFC 5114: 1
    • RFC2409: 2
    • RFC5246: 11
    • RFC5288: 4
    • RFC5289: 4
    • RFC8439: 3
    • RFC8446: 3
  • BSI:
    • AIS20: 1
    • AIS31: 1
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 180-4: 3
    • FIPS 197: 6
  • RFC:
    • RFC 2104: 4
    • RFC 4493: 5
    • RFC 5084: 3
    • RFC 5246: 4
    • RFC 5289: 4
    • RFC 5652: 1
    • RFC 5905: 3
    • RFC5246: 2
    • RFC5905: 1
pdf_data/st_keywords/javacard_api_const
  • curves:
    • SECP256R1: 2
    • SECP384R1: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • in case forwarding to the internal network fails, the TOE would prints the data. In this case it is out of scope of forwarding to the internal network and the security objective is fulfilled. FMT_MSA.1 (b: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Federal Office for Information Security
  • /Keywords: Smart Meter System, Gateway, Common Criteria, Smart Meter Gateway PP
  • /Subject: Schutzprofil für die Kommunikationseinheit eines intelligenten Messsystems für Stoff- und Energiemengen
  • /Title: Sagemcom Dr. Neuhaus SMARTY IQ-LTE Security Target
  • pdf_file_size_bytes: 2020364
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 112
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different