Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Juniper EX4600 and QFX5100 with JUNOS 14.1X53d30
CCEVS-VR-VID-10681-2015
TCOS Smart Meter Security Module Version 1.0 Release 1/P60C144PVA
BSI-DSZ-CC-0957-2015
name Juniper EX4600 and QFX5100 with JUNOS 14.1X53d30 TCOS Smart Meter Security Module Version 1.0 Release 1/P60C144PVA
category Network and Network-Related Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US DE
not_valid_after 28.02.2018 10.02.2025
not_valid_before 28.12.2015 09.02.2015
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10681-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10681-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0957a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10681-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0957b_pdf.pdf
manufacturer Juniper Networks, Inc. T-Systems International GMBH
manufacturer_web https://www.juniper.net/ https://www.t-systems.de/
security_level {} AVA_VAN.5, EAL4+
dgst af3038487cee6710 d6739d0e1ce9ed2c
heuristics/cert_id CCEVS-VR-VID-10681-2015 BSI-DSZ-CC-0957-2015
heuristics/cert_lab US BSI
heuristics/cpe_matches cpe:2.3:o:juniper:junos:14.1:r4:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x55:d16:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53:d51:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53:-:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53:d45:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1:-:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53:d121:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1r7:*:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53:d20:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x51:d60:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1:r1:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53:d10:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x55:-:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1:r5:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53:d52:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53:d49:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53:d50:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53:d43:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1:r3:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1:r8-s3:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53-d10:*:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53-d27:*:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53:d30:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53:d40:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1:r9:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1:r6:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53:d34:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x51:-:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53:d26:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53:d53:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53:d47:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53:d15:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x55:d35:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53:d16:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53:r1:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53:d48:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53:d27:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x50:*:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1:r2:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x55:d30:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x55:d20:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1:r8:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53:d42:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53-d26:*:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53:d54:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53-d25:*:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x50:d60:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53:d107:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53-d30:*:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x55:d25:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53:d35:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53-d35:*:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53-d15:*:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53:d44:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1:r7:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53:d46:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53:d38:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:14.1x53:d25:*:*:*:*:*:* {}
heuristics/related_cves CVE-2015-7748, CVE-2021-0215, CVE-2022-22245, CVE-2023-36840, CVE-2018-0008, CVE-2022-22215, CVE-2024-39511, CVE-2019-0053, CVE-2024-39514, CVE-2014-6449, CVE-2023-44182, CVE-2023-28962, CVE-2016-4922, CVE-2017-2347, CVE-2014-3818, CVE-2024-21591, CVE-2023-44184, CVE-2015-5360, CVE-2023-28964, CVE-2023-36839, CVE-2017-2312, CVE-2020-1606, CVE-2017-10602, CVE-2022-22244, CVE-2014-6450, CVE-2022-22242, CVE-2014-6447, CVE-2023-44185, CVE-2020-1631, CVE-2023-44178, CVE-2017-2345, CVE-2016-4923, CVE-2014-3819, CVE-2015-7751, CVE-2018-0021, CVE-2019-0012, CVE-2022-22163, CVE-2023-22407, CVE-2016-1260, CVE-2014-6385, CVE-2021-31372, CVE-2022-22181, CVE-2015-3003, CVE-2022-22176, CVE-2016-1279, CVE-2017-10601, CVE-2014-6383, CVE-2016-1277, CVE-2023-36843, CVE-2022-22208, CVE-2018-0031, CVE-2015-5359, CVE-2024-39555, CVE-2024-39549, CVE-2023-22406, CVE-2023-22391, CVE-2021-31362, CVE-2017-2302, CVE-2016-1271, CVE-2023-22395, CVE-2022-22246, CVE-2017-10621, CVE-2023-44186, CVE-2022-22173, CVE-2016-1275, CVE-2016-1258, CVE-2019-0062, CVE-2024-39556, CVE-2019-0039, CVE-2018-0007, CVE-2015-3004, CVE-2023-4481, CVE-2022-22156, CVE-2020-1656, CVE-2014-6378, CVE-2017-2348, CVE-2020-1643, CVE-2016-1267, CVE-2023-28979, CVE-2017-10618, CVE-2017-10615, CVE-2020-1630, CVE-2022-22220, CVE-2016-4924, CVE-2017-2314, CVE-2024-30397, CVE-2016-1280, CVE-2019-0036, CVE-2023-44177, CVE-2023-44197, CVE-2023-28975, CVE-2018-0019, CVE-2015-5358, CVE-2024-39517, CVE-2015-5362, CVE-2022-22162, CVE-2017-10614, CVE-2016-1257, CVE-2018-0003, CVE-2016-1270, CVE-2018-0004, CVE-2019-0047, CVE-2004-0468, CVE-2022-22243, CVE-2023-36842, CVE-2023-36841, CVE-2018-0020, CVE-2016-1256, CVE-2017-2303, CVE-2023-44176, CVE-2018-0001, CVE-2016-1263, CVE-2017-10613, CVE-2017-2315, CVE-2023-28963, CVE-2016-1264, CVE-2022-22197, CVE-2018-0050, CVE-2022-22224, CVE-2024-39558, CVE-2022-22241, CVE-2025-21590, CVE-2017-2344, CVE-2014-6379, CVE-2018-0022, CVE-2018-0052, CVE-2015-7752, CVE-2016-1261, CVE-2023-44201, CVE-2016-4921, CVE-2014-6384, CVE-2022-22238, CVE-2024-39528, CVE-2024-21594, CVE-2020-1639, CVE-2017-2301, CVE-2024-30380, CVE-2016-1269, CVE-2023-44175, CVE-2014-3816, CVE-2023-44194, CVE-2015-7749 {}
heuristics/extracted_sars ALC_CMS.1, ASE_CCL.1, AGD_PRE.1, ADV_FSP.1, ASE_INT.1, AVA_VAN.1, ASE_ECD.1, ASE_REQ.2, ATE_IND.1, ASE_TSS.1, ALC_CMC.1, ASE_OBJ.2, AGD_OPE.1 ADV_ARC.1, AVA_VAN.5, ATE_COV.2, ATE_IND.3, AGD_OPE.1, ATE_DPT.1, ADV_IMP.1, ALC_DVS.1, APE_SPD.1, ASE_TSS.2, ASE_REQ.2, ADV_SPM.1, APE_REQ.2, ALC_TAT.1, APE_INT.1, AGD_PRE.1, ASE_CCL.1, ALC_CMS.4, ASE_ECD.1, ADV_INT.3, ADV_TDS.3, ALC_DEL.1, APE_CCL.1, ASE_OBJ.2, ALC_FLR.1, ADV_FSP.4, ASE_INT.1, APE_ECD.1, ASE_SPD.1, ATE_FUN.1, APE_OBJ.2, ALC_CMC.4, ALC_LCD.1
heuristics/extracted_versions 14.1 1.0
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0957-V2-2016
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0845-V2-2013
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0919-V3-2023, BSI-DSZ-CC-0918-V7-2025, BSI-DSZ-CC-0831-V7-2023, BSI-DSZ-CC-0831-V2-2020, BSI-DSZ-CC-0831-V8-2024, BSI-DSZ-CC-0918-V6-2024, BSI-DSZ-CC-0831-V9-2024, BSI-DSZ-CC-0831-V3-2021, BSI-DSZ-CC-0831-V5-2022, BSI-DSZ-CC-0919-V2-2021, BSI-DSZ-CC-0918-V4-2022, BSI-DSZ-CC-0831-V4-2021, BSI-DSZ-CC-1035-2017, BSI-DSZ-CC-0831-V6-2023, BSI-DSZ-CC-0918-V5-2023, BSI-DSZ-CC-0831, BSI-DSZ-CC-0957-V2-2016
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0666-2012, BSI-DSZ-CC-0845-V2-2013, BSI-DSZ-CC-0845-2012
heuristics/protection_profiles ac9abe3d5c5a31f0 15eda6dafddbf8ca
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0077V2b_pdf.pdf
pdf_data/cert_filename st_vid10681-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10681-2015: 1
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
pdf_data/cert_keywords/cc_sar
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /CreationDate: D:20151231084801-05'00'
  • /ModDate: D:20151231084817-05'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 179001
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid10681-vr.pdf 0957a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • US:
    • cert_id: CCEVS-VR-VID10681-2015
    • cert_item: Juniper Networks, Inc. Juniper Networks EX4600 and QFX5100 Switches Running Junos OS 14.1X53-D30
    • cert_lab: US NIAP
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by AVA_VAN.5 Valid until (*): 9 February 2025 SOGIS Recognition Agreement
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0957-2015
    • cert_item: TCOS Smart Meter Security Module Version 1.0 Release 1/P60C144PVA
    • cert_lab: BSI
    • developer: T-Systems International GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP) - Schutzprofil für das Sicherheitsmodul der Kommunikationseinheit eines intelligenten Messsystems für Stoff- und Energiemengen Version 1.03, 11 December 2014, BSI-CC-PP-0077-V2-2015
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10681-2015: 1
  • DE:
    • BSI-DSZ-CC-00845-V2-2013: 1
    • BSI-DSZ-CC-0845-V2-2013: 4
    • BSI-DSZ-CC-0957-2015: 24
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0077-V2-2015: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 7
    • EAL 2: 4
    • EAL 3: 4
    • EAL 4: 13
    • EAL 4 augmented: 3
    • EAL 5: 10
    • EAL 5+: 1
    • EAL 6: 4
    • EAL 7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 2
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 1
    • ALC_FLR: 3
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 2
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 4
    • FCS_COP: 6
    • FCS_RNG.1: 1
  • FIA:
    • FIA_UAU.4: 1
    • FIA_UAU.5: 1
    • FIA_UID.1: 1
  • FTP:
    • FTP_ITC.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.NO_GENERAL_PURPOSE: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
  • T:
    • T.ADMIN_ERROR: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
    • T.UNDETECTED_ACTIONS: 1
    • T.USER_DATA_REUSE: 1
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 11
    • NXP Semiconductors: 4
pdf_data/report_keywords/eval_facility
  • SRC:
    • SRC Security Research & Consulting: 3
  • TSystems:
    • T-Systems International: 13
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • constructions:
    • MAC:
      • CMAC: 3
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
  • ECC:
    • ECC:
      • ECC: 3
    • ECDSA:
      • ECDSA: 6
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 1
    • SHA2:
      • SHA-256: 1
pdf_data/report_keywords/crypto_scheme
  • KA:
    • KA: 1
    • Key Agreement: 8
  • MAC:
    • MAC: 3
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 9
    • SSHv2: 3
  • TLS:
    • SSL:
      • SSL: 2
  • PACE:
    • PACE: 7
  • TLS:
    • TLS:
      • TLS: 6
pdf_data/report_keywords/randomness
  • RNG:
    • RBG: 1
    • RNG: 1
  • RNG:
    • RNG: 2
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 3
pdf_data/report_keywords/ecc_curve
  • NIST:
    • P-256: 2
pdf_data/report_keywords/crypto_engine
  • SmartMX:
    • SmartMX2: 2
pdf_data/report_keywords/vulnerability
  • CVE:
    • CVE-2004-0468: 1
    • CVE-2006-3529: 1
    • CVE-2007-6372: 1
    • CVE-2013-4684: 1
    • CVE-2013-4686: 1
    • CVE-2013-4687: 1
    • CVE-2013-4688: 1
    • CVE-2013-6170: 1
    • CVE-2014-0612: 1
    • CVE-2014-0613: 1
    • CVE-2014-0614: 1
    • CVE-2014-0616: 1
    • CVE-2014-0618: 1
    • CVE-2014-2713: 1
    • CVE-2014-2714: 1
    • CVE-2014-3815: 1
    • CVE-2014-3817: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 2
    • malfunction: 1
  • SCA:
    • side channel: 2
  • other:
    • JIL: 2
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7138: 2
    • BSI 7148: 1
    • BSI TR-03109-2: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • BSI:
    • AIS 1: 1
    • AIS 20: 3
    • AIS 25: 1
    • AIS 26: 3
    • AIS 31: 1
    • AIS 32: 1
    • AIS 34: 2
    • AIS 36: 4
    • AIS 46: 1
    • AIS36: 1
  • FIPS:
    • FIPS 180-2: 2
    • FIPS 186: 5
    • FIPS 197: 2
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • RFC:
    • RFC 5639: 5
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • SSH). Telnet, File Transfer Protocol (FTP), and Secure Socket Layer (SSL) are out of scope and are not used in the evaluated configuration: 1
    • Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), and Secure Socket Layer (SSL) are out of scope and are not used in the evaluated configuration. 8 4.5 Security Management The TOE provides an: 1
    • out of scope: 1
  • ConfidentialDocument:
    • 1.0 Release 1/P60C144PVA, Version 1.0, 9 February 2015, SRC Security Research & Consulting GmbH (confidential document) [9] Configuration List BSI-DSZ-CC-0957-2015, Konfigurationsliste von TCOS Smart Meter Security: 1
    • Version 1.0 Release 1/P60C144PVA, Version 1.1, 6 February 2015, T-Systems International GmbH (confidential document) 9 specifically • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung: 1
    • and certification procedure is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the product or resulting from the evaluation and certification: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20150212092005+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Smart Meter Security Module"
  • /ModDate: D:20150212110928+01'00'
  • /Producer: LibreOffice 4.2
  • /Subject: Common Criteria Zertifizierung
  • /Title: Certification Report BSI-DSZ-CC-0957-2015
  • pdf_file_size_bytes: 1269846
  • pdf_hyperlinks: http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/, https://www.bsi.bund.de/zertifizierung
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
pdf_data/st_filename st_vid10681-st.pdf 0957b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0957: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0035-2007: 1
    • BSI-CC-PP-0073-2014: 1
    • BSI-CC-PP-0077-V2-2015: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 5
    • EAL 6: 1
    • EAL 6 augmented: 1
    • EAL 6+: 1
    • EAL4: 4
    • EAL4 augmented: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 3
    • ADV_TDS: 2
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 3
    • ALC_DVS.1: 1
    • ALC_FLR.1: 2
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_TSS.2: 2
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.5: 10
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 5
    • FAU_GEN.1: 7
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 1
    • FAU_STG_EXT.1: 11
    • FAU_STG_EXT.1.1: 2
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 19
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 1
    • FCS_CKM.4: 7
    • FCS_CKM_EXT: 1
    • FCS_CKM_EXT.4: 20
    • FCS_CKM_EXT.4.1: 1
    • FCS_COP.1: 46
    • FCS_COP.1.1: 4
    • FCS_RBG_EXT.1: 15
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_SSH_EXT.1: 14
    • FCS_SSH_EXT.1.1: 2
    • FCS_SSH_EXT.1.2: 2
    • FCS_SSH_EXT.1.3: 2
    • FCS_SSH_EXT.1.4: 2
    • FCS_SSH_EXT.1.5: 2
    • FCS_SSH_EXT.1.6: 2
    • FCS_SSH_EXT.1.7: 2
    • FCS_TLS_EXT.1: 2
  • FDP:
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
    • FDP_RIP.2: 5
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_PMG_EXT.1: 11
    • FIA_PMG_EXT.1.1: 2
    • FIA_PSK_EXT.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 3
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT.2: 11
    • FIA_UAU_EXT.2.1: 2
    • FIA_UIA_EXT.1: 17
    • FIA_UIA_EXT.1.1: 2
    • FIA_UIA_EXT.1.2: 2
    • FIA_UID.1: 5
  • FMT:
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 2
    • FMT_SMR.2: 5
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT.1: 9
    • FPT_APW_EXT.1.1: 4
    • FPT_APW_EXT.1.2: 2
    • FPT_SKP_EXT.1: 11
    • FPT_SKP_EXT.1.1: 2
    • FPT_SSP.1: 1
    • FPT_SSP.2: 1
    • FPT_STM.1: 7
    • FPT_STM.1.1: 1
    • FPT_TRP.1: 1
    • FPT_TST.1: 1
    • FPT_TST_EXT.1: 11
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT.1: 11
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 2
  • FTA:
    • FTA_EXT_SSL.1: 1
    • FTA_SSL: 1
    • FTA_SSL.3: 5
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 4
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT.1: 9
    • FTA_SSL_EXT.1.1: 3
    • FTA_SSL_EXT.4: 1
    • FTA_TAB.1: 7
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_SAS.1: 1
  • FCS:
    • FCS_CKM: 49
    • FCS_CKM.1: 16
    • FCS_CKM.2: 8
    • FCS_CKM.4: 45
    • FCS_CKM.4.1: 1
    • FCS_COP: 59
    • FCS_COP.1: 17
    • FCS_RNG: 6
    • FCS_RNG.1: 20
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC.1: 13
    • FDP_ACC.2: 17
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF: 2
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ETC.1: 7
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_IFC: 1
    • FDP_IFC.1: 8
    • FDP_ITC: 8
    • FDP_ITC.1: 20
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 14
    • FDP_ITT.1: 1
    • FDP_RIP: 1
    • FDP_RIP.1: 7
    • FDP_RIP.1.1: 1
    • FDP_SDI: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 7
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT.1: 8
    • FDP_UIT: 1
    • FDP_UIT.1: 7
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 3
    • FIA_SOS.1.1: 1
    • FIA_UAU: 18
    • FIA_UAU.1: 5
    • FIA_UAU.4: 6
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 6
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID: 1
    • FIA_UID.1: 14
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_LIM: 6
    • FMT_LIM.1: 25
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 23
    • FMT_LIM.2.1: 2
    • FMT_MSA.1: 2
    • FMT_MSA.3: 6
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 6
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 6
    • FPT_EMS.1: 15
    • FPT_EMS.1.1: 2
    • FPT_EMS.1.2: 2
    • FPT_FLS: 1
    • FPT_FLS.1: 11
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP: 1
    • FPT_PHP.3: 10
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ICT.1: 4
    • FTP_ITC: 1
    • FTP_ITC.1: 10
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_GENERAL_PURPOSE: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
  • O:
    • O.DISPLAY_BANNER: 1
    • O.PROTECTED_COMMUNICATIONS: 1
    • O.RESIDUAL_INFORMATION_CLEARING: 1
    • O.SESSION_LOCK: 1
    • O.SYSTEM_MONITORING: 1
    • O.TOE_ADMINISTRATION: 1
    • O.TSF_SELF_TEST: 1
    • O.VERIFIABLE_UPDATES: 1
  • OE:
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.ADMIN_ERROR: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
    • T.UNDETECTED_ACTIONS: 1
    • T.USER_DATA_REUSE: 1
  • O:
    • O.FW_HW: 1
    • O.HW_AES: 4
    • O.MEM_ACCESS: 3
    • O.PACE: 5
    • O.RND: 3
    • O.SFR_ACCESS: 3
  • OE:
    • OE.PACE: 1
  • OSP:
    • OSP.SM: 1
  • T:
    • T.RND: 1
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 2
    • NXP Semiconductors: 1
pdf_data/st_keywords/eval_facility
  • TSystems:
    • T-Systems International: 78
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
  • DES:
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC: 6
  • AES_competition:
    • AES:
      • AES: 16
  • DES:
    • 3DES:
      • TDES: 3
      • Triple-DES: 2
    • DES:
      • DES: 4
  • constructions:
    • MAC:
      • CMAC: 4
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 11
  • FF:
    • DH:
      • DH: 2
    • DSA:
      • DSA: 2
  • ECC:
    • ECC:
      • ECC: 11
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 19
  • FF:
    • DH:
      • DH: 13
      • Diffie-Hellman: 5
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
      • SHA1: 2
    • SHA2:
      • SHA-2: 5
      • SHA-256: 5
      • SHA-512: 2
      • SHA256: 2
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
    • Key exchange: 1
  • MAC:
    • MAC: 2
  • KA:
    • Key Agreement: 17
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 1
  • IPsec:
    • IPsec: 2
  • SSH:
    • SSH: 73
    • SSHv2: 10
  • TLS:
    • SSL:
      • SSL: 3
    • TLS:
      • TLS: 3
  • PACE:
    • PACE: 66
  • TLS:
    • TLS:
      • TLS: 28
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 3
  • RNG:
    • RBG: 4
    • RNG: 6
  • RNG:
    • RND: 4
    • RNG: 8
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CBC:
    • CBC: 4
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 6
    • P-384: 4
    • P-521: 4
  • Brainpool:
    • brainpoolP256r1: 2
    • brainpoolP384r1: 2
    • brainpoolP512r1: 2
  • NIST:
    • NIST P-256: 1
    • NIST P-384: 1
    • P-256: 13
    • P-384: 15
    • secp256r1: 1
    • secp384r1: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • Malfunction: 12
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 3
    • physical tampering: 5
  • SCA:
    • DPA: 2
    • Leak-Inherent: 4
    • Physical Probing: 2
    • SPA: 2
    • physical probing: 2
    • side channel: 1
    • side channels: 1
    • side-channels: 1
    • timing attacks: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03109: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS PUB 186-3: 3
    • FIPS PUB 197: 1
    • FIPS140: 1
    • FIPS197: 1
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-38D: 1
  • RFC:
    • RFC 4251: 2
    • RFC 4252: 1
    • RFC 4253: 3
    • RFC 4254: 1
    • RFC 4741: 1
    • RFC 6668: 1
    • RFC4251: 1
    • RFC4252: 1
    • RFC4253: 3
    • RFC4254: 1
    • RFC5656: 3
    • RFC6668: 2
  • BSI:
    • AIS 36: 1
    • AIS36: 3
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • FIPS:
    • FIPS PUB 186-3: 1
    • FIPS186: 10
    • FIPS197: 3
  • ISO:
    • ISO/IEC 7810:2003: 1
  • RFC:
    • RFC 5639: 1
    • RFC5639: 11
  • X509:
    • X.509: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT: 1
    • i.e. it is not bound to port 80). Although use of this application is out of scope of the evaluation, the daemon supporting the service cannot be disabled: 1
    • including Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT) The TOE provides an Authorized Administrator role that is responsible: 1
    • out of scope: 2
    • the HTTP traffic arrives (i.e. it is not bound to port 80). Although use of this application is out of scope of the evaluation, the daemon supporting the service cannot be disabled. This service can only: 1
  • OutOfScope:
    • entities. 72 As these external entities only indirectly interact with the TOE, these entities are out of scope for this ST. 73 During its pre-operational phases the TOE interacts with the Integrator and the: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Denise Cater
  • /CreationDate: D:20151210100023Z
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20151228094136-05'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Junos OS 13.3R1.8, Junos OS 13.2X50-D19 and Junos OS 13.2X51-D20
  • /Title: Security Target
  • pdf_file_size_bytes: 1293501
  • pdf_hyperlinks: http://www.juniper.net/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 58
  • /Author: T-Systems International GmbH
  • /CreationDate: D:20150209010001
  • /Creator: PScript5.dll Version 5.2.2
  • /Keywords: TCOS Security Module, Sicherheitsmodul, Smart Meter
  • /ModDate: D:20150209135248+01'00'
  • /Producer: TeleSec ps2pdf
  • /Subject: TCOS Smart Meter Security Module Version 1.0 Release 1
  • /Title: Security Target TCOS Smart Meter Security Module (NXP)
  • pdf_file_size_bytes: 631545
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 75
state/cert/convert_garbage True False
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different