Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English), Version 11.0.3000.0 (including Service Pack 1)
BSI-DSZ-CC-0811-2013
NXP Smart Card Controller P5CD081V1A and its major configurations P5CC081V1A, P5CN081V1A, P5CD041V1A, P5CD021V1A and P5CD016V1A each with IC dedicated Software
BSI-DSZ-CC-0555-2009
name Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English), Version 11.0.3000.0 (including Service Pack 1) NXP Smart Card Controller P5CD081V1A and its major configurations P5CC081V1A, P5CN081V1A, P5CD041V1A, P5CD021V1A and P5CD016V1A each with IC dedicated Software
category Databases ICs, Smart Cards and Smart Card-Related Devices and Systems
not_valid_before 19.02.2013 10.11.2009
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0811a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0555a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0811b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0555b_pdf.pdf
manufacturer Microsoft Corporation NXP Semiconductors
manufacturer_web https://www.microsoft.com https://www.nxp.com/
security_level ALC_FLR.2, EAL4+ EAL5+
dgst c068a098bbcc7e17 1f3ad7a74ca0a6bd
heuristics/cert_id BSI-DSZ-CC-0811-2013 BSI-DSZ-CC-0555-2009
heuristics/direct_transitive_cves {} CVE-2021-3011
heuristics/indirect_transitive_cves {} CVE-2021-3011
heuristics/extracted_sars ADV_IMP.2, ADV_ARC.1, ATE_COV.2, ALC_CMC.5, AGD_OPE.1, ALC_FLR.2, APE_SPD.1, ASE_TSS.2, ASE_REQ.2, ADV_SPM.1, APE_REQ.2, APE_INT.1, ALC_DVS.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ALC_CMS.4, ASE_ECD.1, ADV_INT.3, ADV_TDS.3, ALC_DEL.1, APE_CCL.1, ASE_OBJ.2, AVA_VAN.3, ATE_DPT.4, ALC_LCD.2, ADV_FSP.4, ASE_INT.1, APE_ECD.1, ALC_TAT.3, ASE_SPD.1, ATE_FUN.1, APE_OBJ.2 AVA_VAN.5, ADV_ARC.1, ATE_COV.2, ADV_FSP.5, AGD_OPE.1, ATE_DPT.3, ALC_FLR.3, ADV_IMP.1, ADV_TDS.4, APE_SPD.1, ASE_TSS.2, ASE_REQ.2, ADV_SPM.1, APE_REQ.2, APE_INT.1, ALC_DVS.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_ECD.1, ALC_DEL.1, APE_CCL.1, ASE_OBJ.2, ASE_INT.1, APE_ECD.1, ADV_INT.2, ALC_TAT.2, ASE_SPD.1, ATE_FUN.1, APE_OBJ.2, ALC_CMS.5, ALC_CMC.4, ALC_LCD.1
heuristics/extracted_versions 11.0.3000.0 -
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0642-2011, 2011-13-INF-1092, BSI-DSZ-CC-0746-2012, ANSSI-CC-2011/73, ANSSI-CC-2014/01, ANSSI-CC-2013/70, ANSSI-CC-2011/27, ANSSI-CC-2012/28, BSI-DSZ-CC-0784-2013, 2011-12-INF-1089, ANSSI-CC-2012/24, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0799-2012, ANSSI-CC-2012/80, ANSSI-CC-2011/05, BSI-DSZ-CC-0812-2012, ANSSI-CC-2012/30, ANSSI-CC-2012/67, ANSSI-CC-2014/02, ANSSI-CC-2014/03, 2011-15-INF-1098, BSI-DSZ-CC-0703-2011, ANSSI-CC-2013/08, BSI-DSZ-CC-0675-2011, ANSSI-CC-2010/40, ANSSI-CC-2012/66, BSI-DSZ-CC-0747-2011, ANSSI-CC-2011/76, BSI-DSZ-CC-0797-2012, ANSSI-CC-2012/36, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0702-2011, CRP272, ANSSI-CC-2012/76, ANSSI-CC-2011/28, ANSSI-CC-2013/31, 2012-8-INF-1198, BSI-DSZ-CC-0745-2012, 2012-9-INF-1200, BSI-DSZ-CC-0857-2013, 2011-14-INF-1095, BSI-DSZ-CC-0748-2011, BSI-DSZ-CC-0633-2010
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0642-2011, 2011-13-INF-1092, ANSSI-CC-2010/58, BSI-DSZ-CC-0857-V2-2015, BSI-DSZ-CC-0741-2011, BSI-DSZ-CC-0742-2011, BSI-DSZ-CC-0746-2012, ANSSI-CC-2011/73, ANSSI-CC-2019/38, ANSSI-CC-2013/70, ANSSI-CC-2014/01, ANSSI-CC-2011/27, ANSSI-CC-2012/28, BSI-DSZ-CC-0866-V2-2014, 2011-12-INF-1089, BSI-DSZ-CC-0633-V2-2014, BSI-DSZ-CC-0784-2013, ANSSI-CC-2012/24, NSCIB-CC-15-67351-CR, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0731-2011, ANSSI-CC-2012/80, ANSSI-CC-2012/71, ANSSI-CC-2011/05, BSI-DSZ-CC-0812-2012, ANSSI-CC-2012/30, ANSSI-CC-2012/67, NSCIB-CC-13-37761-CR2, BSI-DSZ-CC-0864-2012, ANSSI-CC-2012/10, ANSSI-CC-2014/02, BSI-DSZ-CC-0821-2014, BSI-DSZ-CC-0825-2017, ANSSI-CC-2014/03, ANSSI-CC-2016/69, BSI-DSZ-CC-0860-2013, 2011-15-INF-1098, BSI-DSZ-CC-0703-2011, BSI-DSZ-CC-0866-2013, BSI-DSZ-CC-0750-2011, Certificate Number: 2012/80, ANSSI-CC-2013/08, BSI-DSZ-CC-0743-2011, BSI-DSZ-CC-0675-2011, ANSSI-CC-2011/64, ANSSI-CC-2010/40, BSI-DSZ-CC-0747-2011, ANSSI-CC-2011/76, ANSSI-CC-2012/66, BSI-DSZ-CC-0797-2012, ANSSI-CC-2012/36, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0867-2014, BSI-DSZ-CC-0702-2011, CRP272, BSI-DSZ-CC-0744-2011, ANSSI-CC-2012/76, 2012-8-INF-1198, ANSSI-CC-2011/28, ANSSI-CC-2013/31, BSI-DSZ-CC-0745-2012, 2012-9-INF-1200, BSI-DSZ-CC-0857-2013, 2011-14-INF-1095, BSI-DSZ-CC-0748-2011, BSI-DSZ-CC-0783-2013, BSI-DSZ-CC-0633-2010
heuristics/st_references/directly_referenced_by {} BSI-DSZ-CC-0642-2011, BSI-DSZ-CC-0746-2012, ANSSI-CC-2011/73, ANSSI-CC-2014/01, ANSSI-CC-2013/70, ANSSI-CC-2011/27, ANSSI-CC-2012/28, BSI-DSZ-CC-0784-2013, ANSSI-CC-2012/24, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0799-2012, ANSSI-CC-2012/80, ANSSI-CC-2011/05, BSI-DSZ-CC-0812-2012, ANSSI-CC-2012/30, ANSSI-CC-2012/67, ANSSI-CC-2013/29, ANSSI-CC-2014/02, ANSSI-CC-2014/03, ANSSI-CC-2013/08, BSI-DSZ-CC-0675-2011, ANSSI-CC-2010/40, ANSSI-CC-2012/66, BSI-DSZ-CC-0747-2011, ANSSI-CC-2011/76, BSI-DSZ-CC-0797-2012, ANSSI-CC-2012/36, BSI-DSZ-CC-0798-2012, ANSSI-CC-2012/76, ANSSI-CC-2013/31, BSI-DSZ-CC-0745-2012, ANSSI-CC-2013/30, BSI-DSZ-CC-0748-2011, ANSSI-CC-2011/28
heuristics/st_references/indirectly_referenced_by {} BSI-DSZ-CC-0642-2011, 2011-13-INF-1092, ANSSI-CC-2010/58, BSI-DSZ-CC-0746-2012, ANSSI-CC-2011/73, ANSSI-CC-2014/01, ANSSI-CC-2013/70, ANSSI-CC-2011/27, ANSSI-CC-2012/28, BSI-DSZ-CC-0784-2013, 2011-12-INF-1089, ANSSI-CC-2012/24, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0799-2012, ANSSI-CC-2012/80, ANSSI-CC-2012/71, ANSSI-CC-2011/05, BSI-DSZ-CC-0812-2012, ANSSI-CC-2012/30, ANSSI-CC-2012/67, ANSSI-CC-2013/29, ANSSI-CC-2014/02, ANSSI-CC-2014/03, ANSSI-CC-2016/69, 2011-15-INF-1098, ANSSI-CC-2013/08, BSI-DSZ-CC-0675-2011, ANSSI-CC-2010/40, ANSSI-CC-2012/66, BSI-DSZ-CC-0747-2011, ANSSI-CC-2011/76, BSI-DSZ-CC-0797-2012, ANSSI-CC-2012/36, BSI-DSZ-CC-0798-2012, ANSSI-CC-2012/76, CRP272, ANSSI-CC-2013/31, BSI-DSZ-CC-0745-2012, ANSSI-CC-2013/30, 2011-14-INF-1095, BSI-DSZ-CC-0748-2011, ANSSI-CC-2011/28
heuristics/protection_profiles 61018742063aaca9 {}
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_dbms_v1.3.pdf {}
pdf_data/report_filename 0811a_pdf.pdf 0555a_pdf.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0811-2013
    • cert_item: Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English), Version 11.0.3000.0 (including Service Pack 1
    • cert_lab: BSI
    • developer: Microsoft Corporation
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • DE:
    • cert_id: BSI-DSZ-CC-0555-2009
    • cert_item: NXP Smart Card Controller P5CD081V1A and its major configurations P5CC081V1A, P5CN081V1A, P5CD041V1A, P5CD021V1A and P5CD016V1A each with IC dedicated Software
    • cert_lab: BSI
    • developer: NXP Semiconductors Germany GmbH Business Line Identification
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0811: 1
    • BSI-DSZ-CC-0811-2013: 19
  • DE:
    • BSI-DSZ-CC-0555: 1
    • BSI-DSZ-CC-0555-2009: 18
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0035: 1
    • BSI-CC-PP-0035-2007: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 6
    • EAL 4 augmented: 3
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 6
    • EAL4+: 2
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 1: 1
    • EAL 4: 5
    • EAL 5: 4
    • EAL 5 augmented: 3
    • EAL 7: 1
    • EAL1: 6
    • EAL2: 3
    • EAL3: 4
    • EAL4: 6
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_ADD: 1
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 5
    • ALC_FLR.3: 1
    • ALC_LCD.1: 1
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 2
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 7
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 2
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 5
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_claims
  • O:
    • O.C: 1
  • R:
    • R.O: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 23
    • Microsoft Corporation: 8
  • NXP:
    • NXP: 19
    • NXP Semiconductors: 12
  • Philips:
    • Philips: 1
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
  • DES:
    • 3DES:
      • Triple-DES: 6
    • DES:
      • DES: 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 17
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 4
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
  • SCA:
    • DPA: 1
    • physical probing: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 2
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 32: 1
  • BSI:
    • AIS 20: 1
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 3
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 3
    • AIS 36: 3
    • AIS 38: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816: 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English) 11.0.3000.0 (confidential document) [8] Microsoft SQL ServerTM 2012 Books Online (BOL); File name: 1
  • ConfidentialDocument:
    • Secure Smart Card Controller, Version 1.0, 30.09.2009, BSI-DSZ-CC-0555, T-Systems GEI GmbH (confidential document) [12] Data Sheet, P5CD016/021/041 and P5Cx081, Secure dual interface and contact PKI Smart Card: 1
    • T-Systems Gei GmbH (confidential document) [8] Configuration List for the P5CD016/021/041 and P5Cx081 family, Rev. 1.0, NXP Semiconductors: 1
    • and P5Cx081V1A NXP Secure Smart Card, NXP Semiconductors, Business Line Identification (confidential document) [7] Evaluation Technical Report, V. 1.2, 3th November 2009, NXP P5CD081V1A Secure Smart Card: 1
pdf_data/report_metadata
  • /Author: Federal Office for Information Security
  • /CreationDate: D:20130306131843+01'00'
  • /Creator: Writer
  • /Keywords: "Microsoft SQL Server 2012 Database Engine Enterprise Edition x64, Version 11.0.3000.0"
  • /ModDate: D:20130307064603+01'00'
  • /Producer: OpenOffice.org 3.2
  • /Subject: Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English), Version 11.0.3000.0 (including Service Pack 1)
  • /Title: Certification Report BSI-DSZ-CC-0811-2013
  • pdf_file_size_bytes: 935036
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20091123125521+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, NXP Smart Card Controller P5CD081V1A and its major configurations P5CC081V1A, P5CN081V1A, P5CD041V1A, P5CD021V1A and P5CD016V1A each with IC dedicated Software, NXP Semiconductors Germany GmbH"
  • /ModDate: D:20091207095523+01'00'
  • /Producer: StarOffice 9
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0555-2009
  • pdf_file_size_bytes: 795041
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
pdf_data/st_filename 0811b_pdf.pdf 0555b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0811: 1
  • DE:
    • BSI-DSZ-CC-0555: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0035: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 2
    • EAL 4 augmented: 1
    • EAL2: 1
    • EAL4: 1
    • EAL4 augmented: 1
    • EAL4+: 58
  • EAL:
    • EAL 5: 3
    • EAL 5 augmented: 1
    • EAL4: 3
    • EAL4 augmented: 1
    • EAL4+: 1
    • EAL5: 32
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.4: 1
    • ADV_TDS.3: 2
  • AGD:
    • AGD_ADD: 3
    • AGD_OPE.1: 4
    • AGD_PRE: 1
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 6
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 5
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 4
    • ADV_FSP.4: 3
    • ADV_FSP.5: 11
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMS: 4
    • ALC_CMS.4: 3
    • ALC_CMS.5: 5
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.2: 5
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 11
    • FAU_GEN.1: 2
    • FAU_GEN.2: 1
    • FAU_SEL: 8
    • FAU_SEL.1: 1
    • FAU_STG: 3
    • FAU_STG.1: 2
    • FAU_STG.3: 1
    • FAU_STG.4: 1
    • FAU_STG_EXP: 2
    • FAU_STG_EXP.5: 14
    • FAU_STG_EXP.5.1: 2
  • FDP:
    • FDP_ACC.1: 10
    • FDP_ACC.1.1: 1
    • FDP_ACF: 9
    • FDP_ACF.1: 4
    • FDP_IFC.1: 1
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 2
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 8
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 11
    • FIA_UID.2: 12
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 7
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 4
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 7
    • FMT_MTD.1.1: 1
    • FMT_REV.1: 14
    • FMT_REV.1.1: 4
    • FMT_REV.1.2: 2
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT.1: 1
    • FPT_STM.1: 1
    • FPT_TRC.1.1: 1
    • FPT_TRC.1.2: 1
  • FTA:
    • FTA_MCS.1: 5
    • FTA_MCS.1.1: 1
    • FTA_MCS.1.2: 1
    • FTA_TSE.1: 5
    • FTA_TSE.1.1: 1
  • FAU:
    • FAU_SAS.1: 5
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM.1: 5
    • FCS_CKM.4: 3
    • FCS_COP.1: 22
    • FCS_COP.1.1: 2
    • FCS_RNG.1: 4
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC.1: 33
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 30
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 10
    • FDP_ITC.1: 5
    • FDP_ITC.2: 5
    • FDP_ITT.1: 6
  • FMT:
    • FMT_LIM.1: 3
    • FMT_LIM.2: 3
    • FMT_MSA.1: 25
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 18
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_SMF.1: 14
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 7
  • FPT:
    • FPT_FLS.1: 7
    • FPT_ITT.1: 6
    • FPT_PHP.3: 7
  • FRU:
    • FRU_FLT.2: 7
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_EVIL: 3
    • A.NO_GENERAL_PURPOSE: 3
    • A.PHYSICAL: 3
  • O:
    • O.ACCESS_HISTORY: 5
    • O.ADMIN_GUIDANCE: 6
    • O.ADMIN_ROLE: 5
    • O.AUDIT_: 1
    • O.AUDIT_GENERATION: 3
    • O.CONFIGURATION_I: 1
    • O.CONFIGURATION_IDE: 2
    • O.CONFIGURATION_IDENTI: 2
    • O.CONFIGURATION_IDENTIFICATI: 1
    • O.CONFIGURATION_IDENTIFICATION: 1
    • O.DOCUMENTED_: 1
    • O.DOCUMENTED_DES: 1
    • O.DOCUMENTED_DESIG: 1
    • O.DOCUMENTED_DESIGN: 4
    • O.INTERNAL_TOE_DO: 1
    • O.INTERNAL_TOE_DOM: 1
    • O.INTERNAL_TOE_DOMAIN: 1
    • O.INTERNAL_TOE_DOMAINS: 1
    • O.MANAGE: 7
    • O.MEDIATE: 4
    • O.PARTIAL_FUNCTION: 1
    • O.PARTIAL_FUNCTIONA: 2
    • O.PARTIAL_FUNCTIONAL_T: 2
    • O.PARTIAL_FUNCTIONAL_TEST: 2
    • O.PARTIAL_SELF_PR: 1
    • O.PARTIAL_SELF_PROT: 1
    • O.PARTIAL_SELF_PROTECT: 1
    • O.PARTIAL_SELF_PROTECTION: 1
    • O.RESIDUAL_INFORM: 1
    • O.RESIDUAL_INFORMAT: 2
    • O.RESIDUAL_INFORMATION: 4
    • O.TOE_ACCESS: 6
    • O.VULNERABILITY_: 1
    • O.VULNERABILITY_ANA: 3
    • O.VULNERABILITY_ANALYSI: 3
    • O.VULNERABILITY_ANALYSIS: 2
  • OE:
    • OE.NO_EVIL: 4
    • OE.NO_GENERAL_: 2
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.PHYSICAL: 4
  • T:
    • T.ACCIDENTAL_ADMIN_: 1
    • T.ACCIDENTAL_ADMIN_ERROR: 2
    • T.MASQUERADE: 3
    • T.POOR_DESIGN: 3
    • T.POOR_IMPLEMENTATION: 3
    • T.POOR_TEST: 3
    • T.RESIDUAL_DATA: 3
    • T.TSF_COMPROMISE: 3
    • T.UNAUTHORIZED_ACCESS: 3
    • T.UNIDENTIFIED_ACTIONS: 3
  • O:
    • O.HW_AES: 7
    • O.MEM_ACCESS: 9
    • O.MF_FW: 7
    • O.RND: 3
    • O.SFR_ACCESS: 7
  • T:
    • T.RND: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 11
    • Microsoft Corporation: 2
  • NXP:
    • NXP: 82
    • NXP Semiconductors: 19
  • Philips:
    • Philips: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 34
  • DES:
    • 3DES:
      • TDEA: 3
      • Triple-DEA: 1
      • Triple-DES: 9
    • DES:
      • DEA: 2
      • DES: 26
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 5
    • RNG: 8
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 10
    • fault injection: 5
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 13
    • Physical Probing: 2
    • physical probing: 1
    • timing attacks: 2
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 3
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 3
    • FIPS PUB 46: 1
    • FIPS PUB 46-3: 3
  • ISO:
    • ISO/IEC 14443: 16
    • ISO/IEC 18092: 2
    • ISO/IEC 7816: 10
pdf_data/st_metadata
  • /Author: Astrid Schweer
  • /CreationDate: 21.09.2009 14:55:13
  • /CreationDate--Text: 21.09.2009 14:55:13
  • /Creator: FreePDF XP 3.26 - http://shbox.de
  • /Keywords: Security Evaluation, Security Functional Requirements, Security Functions, Assurance Level
  • /ModDate: D:20091130182015+01'00'
  • /Producer: AFPL Ghostscript 7.04
  • /Subject: Common Criteria Evaluation
  • /Title: Security Target Lite
  • pdf_file_size_bytes: 487711
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 67
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different