| name |
Lexmark X646dte (firmware revision LC2.MC.P239b), X646e (firmware revision LC2.MC.P239b), X646ef (firmware revision LC2.TI.P239b), X772e (firmware revision LC2.TR.P275), X850e (firmware revision LC2.BE.P238b), X852e (firmware revision LC2.BE.P238b), X854e (firmware revision LC2.BE.P238b), X940e (firmware revision LC.BR.P060) and X945e (firmware revision LC.BR.P060) Multifunction Printers (MFPs) |
STARCOS 3.6 COSGKV C1 |
| category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
US |
DE |
| status |
archived |
archived |
| not_valid_after |
06.09.2012 |
29.12.2020 |
| not_valid_before |
21.09.2007 |
29.12.2015 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10196-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0976a_pdf.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10196-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0976b_pdf.pdf |
| manufacturer |
Lexmark International, Inc. |
G+D Mobile Security GmbH |
| manufacturer_web |
https://www.lexmark.com/ |
https://www.gi-de.com/de/de/mobile-security/ |
| security_level |
EAL2 |
EAL4+, ATE_DPT.2, AVA_VAN.5, ALC_DVS.2 |
| dgst |
ba2d2e8e2932e849 |
40039372a991315f |
| heuristics/cert_id |
CCEVS-VR-0060-2007 |
BSI-DSZ-CC-0976-2015 |
| heuristics/cert_lab |
US |
BSI |
| heuristics/cpe_matches |
cpe:2.3:h:lexmark:x940e:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:x945e:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:x940e_firmware:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:x772e_firmware:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:x945e_firmware:-:*:*:*:*:*:*:* |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
CVE-2011-3269 |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ADV_HLD.1, AVA_VLA.1, ATE_FUN.1, ATE_IND.2, ATE_COV.1, ADV_RCR.1, AGD_ADM.1, AVA_SOF.1, AGD_USR.1, ADV_FSP.1 |
ADV_TDS.3, ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, APE_ECD.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, APE_OBJ.2, ADV_IMP.1, ALC_LCD.1, ADV_FSP.4, ALC_DVS.2, ATE_DPT.2, ASE_SPD.1, APE_INT.1, ATE_COV.2, ADV_INT.3, ALC_TAT.1, APE_CCL.1, AGD_OPE.1, ALC_CMS.4, APE_SPD.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ADV_SPM.1, APE_REQ.2 |
| heuristics/extracted_versions |
- |
3.6 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0976-V2-2018 |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0782-V2-2015, BSI-DSZ-CC-0916-2015 |
| heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1243-2024, BSI-DSZ-CC-0976-V2-2018, BSI-DSZ-CC-0976-V3-2019, BSI-DSZ-CC-0976-V4-2021 |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0782-V2-2015, BSI-DSZ-CC-0879-2014, BSI-DSZ-CC-0916-2015 |
| heuristics/scheme_data |
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10196/
- categories: ['Miscellaneous', ' Multi Function Device']
- category: Miscellaneous
- certification_date: 21.09.2007
- evaluation_facility: COACT, Inc. Labs
- expiration_date:
- id: CCEVS-VR-VID10196
- product: Lexmark X646dte (firmware revision LC2.MC.P239b), X646e (firmware revision LC2.MC.P239b), X646ef (firmware revision LC2.TI.P239b), X772e (firmware revision LC2.TR.P275), X850e (firmware revision LC2.BE.P238b), X852e (firmware revision LC2.BE.P238b), X854e (firmware revision LC2.BE.P238b), X940e (firmware revision LC.BR.P060) and X945e (firmware revision LC.BR.P060) Multifunction Printers (MFPs)
- scheme: US
- url: https://www.niap-ccevs.org/products/10196
- vendor: Lexmark International, Inc.
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0782-V2-2015 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0782-V2-2015 |
| heuristics/protection_profiles |
{} |
ecc28509c30de1a5 |
| maintenance_updates |
- maintenance_date: 08.12.2008
- maintenance_report_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10196-add2.pdf
- maintenance_st_link: None
- maintenance_title: Lexmark X646dte (firmware revision LC2.MC.P239b), X646e (firmware revision LC2.MC.P239b), X646ef (firmware revision LC2.TI.P239b), X772e (firmware revision LC2.TR.P275), X850e (firmware revision LC2.BE.P238b), X852e (firmware revision LC2.BE.P238b), X854e (firmware revision LC2.BE.P238b), X940e (firmware revision LC.BR.P060) and X945e (firmware revision LC.BR.P060) Multifunction Printers (MFPs)
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0082V2b_pdf.pdf |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
st_vid10196-vr.pdf |
0976a_pdf.pdf |
| pdf_data/report_frontpage |
- DE:
- US:
- cert_id: CCEVS-VR-07-0060
- cert_item: Lexmark X646dte (firmware revision LC2.MC.P239b), X646e (firmware revision LC2.MC.P239b), X646ef (firmware revision LC2.TI.P239b), X772e (firmware revision LC2.TR.P275), X850e (firmware revision LC2.BE.P238b), X852e (firmware revision LC2.BE.P238b) and X854e (firmware revision LC2.BE.P238b), X940e (firmware revision LC.BR.P060) and X945e (firmware revision LC.BR.P060) Multifunction Printers (MFPs
- cert_lab: US NIAP
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by AVA_VAN.5, ATE_DPT.2 and ALC_DVS.2 SOGIS Recognition Agreement
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0976-2015
- cert_item: STARCOS 3.6 COSGKV C1
- cert_lab: BSI
- developer: Giesecke & Devrient GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Card Operating System Generation 2 (PP COS G2), Version 1.9, 18 November 2014, BSI-CC-PP-0082-V2-2014
- US:
|
| pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0782-V2-2015: 8
- BSI-DSZ-CC-0916-2015: 3
- BSI-DSZ-CC-0976: 4
- BSI-DSZ-CC-0976-2015: 24
- BSI-DSZ-CC-S-0017-2014: 2
- BSI-DSZ-CC-S-0029-2014: 2
- BSI-DSZ-CC-S-0031-2014: 2
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0082-V2-2014: 4
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL2: 5
|
- EAL:
- EAL 1: 7
- EAL 2: 4
- EAL 3: 4
- EAL 4: 13
- EAL 4 augmented: 3
- EAL 5: 10
- EAL 5+: 1
- EAL 6: 4
- EAL 7: 4
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 3
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 6
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
| pdf_data/report_keywords/cc_sfr |
|
- FCS:
- FCS_CKM.1: 2
- FCS_COP: 2
- FCS_COP.1: 30
- FCS_RNG: 1
- FCS_RNG.1: 1
- FPT:
|
| pdf_data/report_keywords/cc_claims |
- A:
- T:
- T.ACCESS: 1
- T.FAXLINE: 1
- T.NOAUTH: 1
|
|
| pdf_data/report_keywords/vendor |
|
- GD:
- Infineon:
- Infineon: 11
- Infineon Technologies AG: 7
|
| pdf_data/report_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 3
- TUV:
- TÜV Informationstechnik: 1
|
| pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- fault injection: 1
- malfunction: 1
- physical tampering: 1
- SCA:
- DPA: 1
- SPA: 1
- side channel: 1
- other:
|
| pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-03116-1: 1
- BSI TR-03143: 4
- BSI TR-03144: 11
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 20: 3
- AIS 23: 1
- AIS 25: 2
- AIS 26: 3
- AIS 31: 3
- AIS 32: 1
- AIS 34: 2
- AIS 35: 1
- AIS 36: 4
- AIS 38: 1
- FIPS:
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- FIPS PUB 197: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- PKCS:
- RFC:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 2015, Giesecke & Devrient GmbH (confidential document) [11] Guidance Documentation STARCOS 3.6 – Main Document, Version 1.7, 25 July 2015, Giesecke &: 1
- Security Target STARCOS 3.6 COSGKV C1, Version 1.0.7, 10 December 2015, Giesecke & Devrient GmbH (confidential document) [7] Security Target Lite BSI-DSZ-CC-0976, Security Target Lite STARCOS 3.6 COSGKV C1, Version 1.0: 1
- and certification procedure is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- for STARCOS 3.6 COSGKV C1, Version 1.3, 11 December 2015, SRC Security Research & Consulting GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-0976, Configuration List STARCOS 3.6 COSGKV C1, Version 1.2, 11: 1
- procedure BSI-DSZ-CC-0782-V2-2015, Version 7, 21 October 2015, TÜV Informationstechnik GmbH (confidential document) [21] Einführung der Gesundheitskarte, Spezifikation des Card Operating System (COS), Elektrische: 1
|
| pdf_data/report_metadata |
- /Author: Jerome F. Myers
- /Company: The Aerospace Corporation
- /CreationDate: D:20070925121844-04'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /ModDate: D:20070925121921-04'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20070925161731
- /Title: National Information Assurance Partnership
- /_AdHocReviewCycleID: 1911086176
- /_AuthorEmail: [email protected]
- /_AuthorEmailDisplayName: Dignan, David M.
- /_EmailSubject: Validation Report for HP MFPs
- /_PreviousAdHocReviewCycleID: 302704411
- pdf_file_size_bytes: 199090
- pdf_hyperlinks: http://www.sans.org/, http://www.cert.org/, http://www.osvdb.org/, http://www.isc2.org/, http://nvd.nist.gov/
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20160107150744+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, eGK, STARCOS, Generation 2, Health Care System"
- /ModDate: D:20160108103345+01'00'
- /Producer: LibreOffice 4.2
- /Subject: eHealth / G2-COS Card Platform from G&D
- /Title: Certification Report BSI-DSZ-CC-0976-2015
- pdf_file_size_bytes: 1362924
- pdf_hyperlinks: https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung
- pdf_is_encrypted: False
- pdf_number_of_pages: 46
|
| pdf_data/st_filename |
st_vid10196-st.pdf |
0976b_pdf.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0782-V2-2015: 2
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0035-2007: 7
- BSI-CC-PP- 0082-V2: 1
- BSI-CC-PP-0035: 5
- BSI-CC-PP-0035-: 9
- BSI-CC-PP-0035-2007: 49
- BSI-CC-PP-0035-2007-2007: 1
- BSI-CC-PP-0059: 1
- BSI-CC-PP-0071: 1
- BSI-CC-PP-0072: 1
- BSI-CC-PP-0075: 1
- BSI-CC-PP-0082-: 3
- BSI-CC-PP-0082-V2: 32
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0035: 1
- BSI-PP-0035-: 3
- BSI-PP-0035-2007: 5
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 14
- EAL4 augmented: 4
|
| pdf_data/st_keywords/cc_sar |
- ACM:
- ADO:
- ADO_DEL.1: 3
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 3
- ADV_HLD.1: 3
- ADV_RCR.1: 3
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 3
- ATE:
- ATE_COV.1: 3
- ATE_FUN.1: 3
- ATE_IND.2: 3
- AVA:
- AVA_SOF.1: 3
- AVA_VLA.1: 3
|
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 9
- ADV_FSP: 2
- ADV_FSP.4: 6
- ADV_IMP: 2
- ADV_IMP.1: 6
- ADV_TDS.3: 3
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 6
- AGD_PRE: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC: 2
- ALC_CMC.4: 1
- ALC_CMS: 2
- ALC_CMS.4: 1
- ALC_DEL: 2
- ALC_DEL.1: 1
- ALC_DVS: 2
- ALC_DVS.2: 11
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- APE:
- ASE:
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 10
- ATE_FUN.1: 6
- ATE_IND.2: 5
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 9
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 10
- FCS_CKM.4.1: 1
- FCS_COP.1: 11
- FCS_COP.1.1: 1
- FDP:
- FDP_DRM_EXP.1: 8
- FDP_DRM_EXP.1.1: 1
- FDP_DRM_EXP.1.2: 1
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FIA:
- FIA_UAU.1: 14
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 8
- FIA_UAU.7.1: 1
- FIA_UID.1: 15
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 8
- FMT_MOF.1.1: 1
- FMT_MSA.2: 3
- FMT_MTD.1: 8
- FMT_MTD.1.1: 1
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FAX_EXP.1: 10
- FPT_FAX_EXP.1.1: 1
- FPT_FAX_EXP.1.2: 1
- FPT_FAX_EXP.1.3: 1
- FPT_RVM.1: 8
- FPT_RVM.1.1: 1
- FPT_SEP.1: 8
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
|
- FAU:
- FCS:
- FCS_CKM: 54
- FCS_CKM.1: 29
- FCS_CKM.2: 9
- FCS_CKM.4: 54
- FCS_CKM.4.1: 1
- FCS_COP: 136
- FCS_COP.1: 24
- FCS_COP.1.1: 1
- FCS_RNG: 12
- FCS_RNG.1: 23
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 101
- FDP_ACC.1: 36
- FDP_ACF: 89
- FDP_ACF.1: 35
- FDP_IFC: 5
- FDP_IFC.1: 9
- FDP_ITC.1: 26
- FDP_ITC.2: 26
- FDP_ITT: 6
- FDP_ITT.1: 4
- FDP_RIP.1: 10
- FDP_RIP.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 9
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_AFL: 22
- FIA_AFL.1: 4
- FIA_API: 6
- FIA_API.1: 16
- FIA_API.1.1: 2
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 15
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 10
- FIA_UAU.4.1: 1
- FIA_UAU.5: 15
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 10
- FIA_UAU.6.1: 1
- FIA_UID.1: 13
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 20
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_LIM: 11
- FMT_LIM.1: 5
- FMT_LIM.2: 4
- FMT_MSA: 59
- FMT_MSA.1: 6
- FMT_MSA.3: 33
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 29
- FMT_MTD.1: 3
- FMT_SMF.1: 48
- FMT_SMF.1.1: 2
- FMT_SMR.1: 33
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 5
- FPT_EMS.1: 12
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS: 5
- FPT_FLS.1: 17
- FPT_FLS.1.1: 1
- FPT_ITE: 9
- FPT_ITE.1: 15
- FPT_ITE.1.1: 2
- FPT_ITE.1.2: 2
- FPT_ITE.2: 13
- FPT_ITE.2.1: 4
- FPT_ITE.2.2: 2
- FPT_ITT: 5
- FPT_ITT.1: 5
- FPT_PHP: 5
- FPT_PHP.3: 6
- FPT_TDC.1: 10
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 2
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FTP:
- FTP_ITC: 9
- FTP_ITC.1: 3
- FTP_ITE: 1
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.LOCATE: 3
- A.NOEVIL: 3
- A.TYPE: 1
- O:
- O.ACCESS: 8
- O.DATAPROTECT: 3
- O.FAX_DESIGN: 6
- O.MANAGE: 6
- O.NOTAMPER: 8
- O.PWDPROTECT: 4
- O.RESTRICT: 6
- OE:
- OE.ENVIRON: 3
- OE.INSTALL: 2
- OE.NOEVILADMIN: 3
- T:
- T.ACCESS: 8
- T.FAXLINE: 5
- T.NOAUTH: 4
- T.TYPE: 2
|
|
| pdf_data/st_keywords/vendor |
|
- GD:
- G&D: 6
- Giesecke & Devrient: 9
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 2
- NXP:
- STMicroelectronics:
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 2
- SHA-256: 12
- SHA-384: 6
- SHA-512: 4
|
| pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 1
- Key agreement: 1
- MAC:
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 2
- brainpoolP384r1: 2
- brainpoolP512r1: 2
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_RSA_WITH_3DES_EDE_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_RC4_128_MD5: 2
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Malfunction: 20
- malfunction: 1
- physical tampering: 3
- SCA:
- DPA: 2
- Leak-Inherent: 17
- Physical Probing: 2
- SPA: 2
- side channel: 1
- timing attacks: 1
- other:
- Bleichenbacher attack: 1
- JIL: 1
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 1
- FIPS 180-2: 1
- FIPS 197: 1
- FIPS 46-3: 2
- RFC:
- RFC 1321: 1
- RFC 2268: 1
- RFC 2631: 1
|
- BSI:
- CC:
- CCMB-2012-09-001: 3
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 3
- CCMB-2012-09-004: 2
- FIPS:
- FIPS 180-4: 1
- FIPS 197: 2
- ISO:
- ISO/IEC 7816: 2
- ISO/IEC 9797-1: 1
- NIST:
- NIST SP 800-38B: 1
- NIST SP 800-67: 2
- PKCS:
- RFC:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /Author: Richard Weins
- /CreationDate: D:20070905104108-04'00'
- /Creator: Acrobat PDFMaker 6.0 for Word
- /ModDate: D:20070905104240-04'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /SourceModified: D:20070905144052
- /Title: LEXMARK SECURITY TARGET
- pdf_file_size_bytes: 627762
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 45
|
- /Author: Giesecke & Devrient GmbH
- /CreationDate: D:20151210183631+01'00'
- /Creator: Microsoft® Word 2010
- /Keywords: Version 1.0.1/10.12.15
- /ModDate: D:20151210183631+01'00'
- /Producer: Microsoft® Word 2010
- /Subject: Security Target Lite STARCOS 3.6 COSGKV C1
- /Title: Giesecke&Devrient Security Target to BSI-PP-0082-V2
- pdf_file_size_bytes: 2396621
- pdf_hyperlinks: http://tools.ietf.org/html/rfc5639
- pdf_is_encrypted: False
- pdf_number_of_pages: 134
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |