Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Sharp Data Security Kit (AR-FR1/AR-FR2/AR-FR3) for Sharp Imager Family (FR-287, AR-337, AR-407, and AR-507)
CCEVS-VR-0001
STARCOS 3.7 COS HBA-SMC
BSI-DSZ-CC-0976-V4-2021
name Sharp Data Security Kit (AR-FR1/AR-FR2/AR-FR3) for Sharp Imager Family (FR-287, AR-337, AR-407, and AR-507) STARCOS 3.7 COS HBA-SMC
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US DE
status archived active
not_valid_after 07.09.2012 18.06.2026
not_valid_before 01.04.2001 18.06.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0976V4c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid2001-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0976V4a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid2001-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0976V4b_pdf.pdf
manufacturer Sharp Electronics Corporation G+D Mobile Security GmbH
manufacturer_web https://www.sharpusa.com/ https://www.gi-de.com/de/de/mobile-security/
security_level EAL2 EAL4+, ATE_DPT.2, AVA_VAN.5, ALC_DVS.2
dgst c87d9c3b490b122f e86ac89b4f665c58
heuristics/cert_id CCEVS-VR-0001 BSI-DSZ-CC-0976-V4-2021
heuristics/cert_lab [] BSI
heuristics/extracted_sars ATE_FUN.1, ADV_RCR.1, ASE_INT.1, ASE_ENV.1, ATE_IND.2, AGD_USR.1, ASE_REQ.1, ASE_SRE.1, ATE_HLD.1, AVA_VLA.1, ASE_PPC.1, ASE_DES.1, ADV_HLD.1, AGD_ADM.1, ATE_COV.1, AVA_SOF.1, ASE_OBJ.1, ASE_TSS.1, ADV_FSP.1 ADV_TDS.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ALC_FLR.1, ADV_IMP.1, ALC_LCD.1, ALC_DVS.2, ATE_DPT.2, ASE_SPD.1, ATE_COV.2, ALC_TAT.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ASE_TSS.1, ADV_FSP.4, ADV_ARC.1
heuristics/extracted_versions 407, 337, 507, 287 3.7
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-1110-V3-2020, BSI-DSZ-CC-0976-V3-2019
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-0945-V3-2018, BSI-DSZ-CC-1110-2019, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0879-2014, BSI-DSZ-CC-1110-V3-2020, BSI-DSZ-CC-0945-2017, BSI-DSZ-CC-0782-V2-2015, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0945-V2-2018, BSI-DSZ-CC-0976-V3-2019, BSI-DSZ-CC-1110-V2-2019, BSI-DSZ-CC-0976-V2-2018, BSI-DSZ-CC-0976-2015, BSI-DSZ-CC-0916-2015
heuristics/scheme_data
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/2001/
  • categories: ['Multiple Domain Solution']
  • category: Multiple Domain Solution
  • certification_date: 18.04.2001
  • evaluation_facility: DXC.technology
  • expiration_date:
  • id: CCEVS-VR-VID2001
  • product: Sharp Data Security Kit (AR-FR1/AR-FR2/AR-FR3) for the Sharp Imager Family (AR-287, AR-337, AR-407, and AR-507)
  • scheme: US
  • url: https://www.niap-ccevs.org/products/2001
  • vendor: Sharp Electronics Corporation
  • category: eHealth
  • cert_id: BSI-DSZ-CC-0976-V4-2021
  • certification_date: 18.06.2021
  • enhanced:
    • applicant: Giesecke & Devrient GmbH seit 1. Juli 2017 Giesecke+Devrient Mobile Security GmbH seit 1. Juli 2023 Giesecke+Devrient ePayments GmbH Prinzregentenstr. 161 81677 München
    • assurance_level: EAL4+,ALC_DVS.2,ATE_DPT.2,AVA_VAN.5
    • cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0976V4c_pdf.pdf?__blob=publicationFile&v=3
    • certification_date: 18.06.2021
    • description: The Target of Evaluation (TOE) is the product STARCOS 3.6 COSGKV C1 developed by Giesecke & Devrient GmbH. The TOE is a smart card product according to the G2 Card Operating System (G2-COS) specification from gematik. The TOE is intended to be used as a card operating system platform for specific card types and applications of the card generation G2 in the framework of the German health care system, and therefore implements the mandatory part of the G2-COS specification with the base functionality of the operating system platform only. The TOE implements from the PP-0082-V2 the base part without any of the optional packages.
    • entries: [frozendict({'id': 'BSI-DSZ-CC-0976-V4-2021-MA-02 (Ausstellungsdatum / Certification Date 16.06.2025)', 'description': "The maintenance procedure for BSI-DSZ-CC-0976-V4-2021 covers the update of the product life-cycle concerning the involved development and production sites and additionally addresses the update of the Security Target (ST) and user guidance documentation regards the TOE's random number generation functionality. The certified product itself did not change."}), frozendict({'id': 'BSI-DSZ-CC-0976-V4-2021-MA-01 (Ausstellungsdatum / Certification Date 09.05.2022)', 'description': 'The partial ALC re-evaluation for procedure 0976-V4 covers the update of the product life-cycle concerning the involved development and production sites. The certified product itself did not change.'}), frozendict({'id': 'BSI-DSZ-CC-0976-V4-2021 (Ausstellungsdatum / Certification Date 18.06.2021, gültig bis / valid until 17.06.2026) Zertifizierungsreport / Certification Report', 'description': 'Software'}), frozendict({'id': 'BSI', 'description': 'The partial ALC re-evaluation for procedure 0976-V3 covers the update of the product life-cycle concerning the involved development and production sites. The certified product itself did not change.'}), frozendict({'id': 'BSI-DSZ-CC-0976-V3-2019-MA-01 (Ausstellungsdatum / Certification Date 15.06.2021)', 'description': 'Maintenance Report'}), frozendict({'id': 'BSI-DSZ-CC-0976-V3-2019 (Ausstellungsdatum / Certification Date 21.11.2019, gültig bis / valid until 20.11.2024)', 'description': 'Software'}), frozendict({'id': 'BSI-DSZ-CC-0976-V2-2018 (Ausstellungsdatum / Certification Date 20.09.2018, gültig bis / valid until 19.09.2023)', 'description': 'Software'}), frozendict({'id': 'BSI-DSZ-CC-0976-2015-MA-01 (Ausstellungsdatum / Certification Date 02.08.2018)', 'description': 'The changes are related to an update and reevaluation of the product life-cycle caused by changes in the development and porduction sites. The certified product itself did not change.'}), frozendict({'id': 'BSI-DSZ-CC-0976-2015-RA-01 (Ausstellungsdatum / Certification Date 19.09.2017)', 'description': 'Security Target'}), frozendict({'id': 'BSI-DSZ-CC-0976-2015 (Ausstellungsdatum / Certification Date 29.12.2015, gültig bis / valid until 28.12.2020)', 'description': 'Security Target'})]
    • evaluation_facility: SRC Security Research & Consulting GmbH
    • expiration_date: 17.06.2026
    • product: STARCOS 3.7 COS HBA-SMC
    • protection_profile: Card Operating System Generation 2 (PP COS G2), Version 2.1, 10 July 2019, BSI-CC-PP-0082-V4-2019
    • report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0976V4a_pdf.pdf?__blob=publicationFile&v=3
    • target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0976V4b_pdf.pdf?__blob=publicationFile&v=3
  • product: STARCOS 3.7 COS HBA-SMC
  • subcategory: Smartcards
  • url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Gesundheitswesen_SmartCards/0976.html
  • vendor: Giesecke & Devrient GmbH seit 1. Juli 2017 Giesecke+Devrient Mobile Security GmbH seit 1. Juli 2023 Giesecke+Devrient ePayments GmbH
heuristics/st_references/directly_referenced_by {} BSI-DSZ-CC-1067-V5-2024, BSI-DSZ-CC-1067-V3-2022, BSI-DSZ-CC-1068-V3-2022, BSI-DSZ-CC-1068-V5-2024, BSI-DSZ-CC-1067-V4-2023, BSI-DSZ-CC-1068-V4-2023
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-1110-V3-2020
heuristics/st_references/indirectly_referenced_by {} BSI-DSZ-CC-1067-V5-2024, BSI-DSZ-CC-1067-V3-2022, BSI-DSZ-CC-1068-V3-2022, BSI-DSZ-CC-1068-V5-2024, BSI-DSZ-CC-1067-V4-2023, BSI-DSZ-CC-1068-V4-2023
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-1110-V3-2020
heuristics/protection_profiles {} 55ed365edb2c317f
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0082b_pdf.pdf
pdf_data/cert_filename 0976V4c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0976-V4-2021: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0082-V4-: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL 5: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
  • ATE:
    • ATE_DPT.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
  • GD:
    • Giesecke+Devrient: 1
pdf_data/cert_keywords/eval_facility
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
  • STARCOS:
    • STARCOS 3: 1
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20210629121438+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, G2 COS, eHealth, STARCOS 3.7 COS HBA-SMC, Giesecke+Devrient Mobile Security GmbH"
  • /ModDate: D:20210629121708+02'00'
  • /Producer: LibreOffice 6.3
  • /Subject: STARCOS 3.7 COS HBA-SMC from G+D Mobile Security GmbH, Giesecke+Devrient Mobile Security GmbH
  • /Title: Certificate BSI-DSZ-CC-0976-V4-2021
  • pdf_file_size_bytes: 241574
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid2001-vr.pdf 0976V4a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • US:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0976-V4-2021
    • cert_item: STARCOS 3.7 COS HBA-SMC
    • cert_lab: BSI
    • developer: Giesecke+Devrient Mobile Security GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Card Operating System Generation 2 (PP COS G2), Version 2.1, 10 July 2019, BSI-CC-PP-0082-V4- 2019
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-0001: 1
  • DE:
    • BSI-DSZ-CC-0976-V3-2019: 3
    • BSI-DSZ-CC-0976-V4-2021: 26
    • BSI-DSZ-CC-1110-: 2
    • BSI-DSZ-CC-1110-V3-2020: 7
    • BSI-DSZ-CC-S-0128-: 1
    • BSI-DSZ-CC-S-0128-2019: 1
    • BSI-DSZ-CC-S-0132-2019: 1
    • BSI-DSZ-CC-S-0144-2020: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0082-V4-: 1
    • BSI-CC-PP-0082-V4-2019: 3
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
    • EAL 4: 1
    • EAL2: 7
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 2+: 1
    • EAL 4: 5
    • EAL 4 augmented: 3
    • EAL 5: 4
    • EAL 5+: 1
    • EAL 6: 1
    • EAL5+: 1
    • EAL6: 1
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_CAP.2: 8
  • ADO:
    • ADO_DEL.1: 10
    • ADO_IGS: 1
    • ADO_IGS.1: 7
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 8
    • ADV_HLD.1: 7
    • ADV_RCR.1: 7
  • AGD:
    • AGD_ADM.1: 7
    • AGD_USR.1: 6
  • ASE:
    • ASE_DES.1: 6
    • ASE_ENV.1: 7
    • ASE_INT.1: 8
    • ASE_OBJ.1: 7
    • ASE_PPC.1: 5
    • ASE_REQ: 1
    • ASE_REQ.1: 7
    • ASE_SRE.1: 5
    • ASE_TSS: 1
    • ASE_TSS.1: 7
  • ATE:
    • ATE_COV.1: 7
    • ATE_FUN.1: 6
    • ATE_IND.1: 1
    • ATE_IND.2: 12
  • AVA:
    • AVA_SOF.1: 8
    • AVA_VLA.1: 8
  • ADV:
    • ADV_ARC: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 5
    • ALC_FLR: 2
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_DPT.2: 4
  • AVA:
    • AVA_VAN.5: 4
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_RIP.1: 5
  • FCS:
    • FCS_CKM: 4
    • FCS_COP: 29
    • FCS_RNG: 3
    • FCS_RNG.1: 1
  • FIA:
    • FIA_UAU: 2
    • FIA_USB: 1
  • FPT:
    • FPT_ITE.1: 1
  • FTP:
    • FTP_ITC: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.U: 1
pdf_data/report_keywords/vendor
  • GD:
    • G+D: 2
    • Giesecke & Devrient: 3
    • Giesecke+Devrient: 29
  • Infineon:
    • Infineon: 11
    • Infineon Technologies AG: 7
pdf_data/report_keywords/eval_facility
  • SRC:
    • SRC Security Research & Consulting: 3
  • TUV:
    • TÜV Informationstechnik: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 30
    • HPC:
      • HPC: 4
  • constructions:
    • MAC:
      • CMAC: 15
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 10
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 14
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 1
  • RSA:
    • RSA-OAEP: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 3
pdf_data/report_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 3
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 15
pdf_data/report_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 5
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 10
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • fault injection: 1
    • malfunction: 1
    • physical tampering: 1
  • SCA:
    • DPA: 1
    • SPA: 1
    • side channel: 1
  • other:
    • JIL: 6
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-03116-1: 1
    • BSI TR-03143: 5
    • BSI TR-03144: 10
pdf_data/report_keywords/os_name
  • STARCOS:
    • STARCOS 3: 38
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 20: 6
    • AIS 23: 1
    • AIS 25: 4
    • AIS 26: 4
    • AIS 31: 5
    • AIS 32: 1
    • AIS 34: 4
    • AIS 35: 2
    • AIS 36: 5
    • AIS 37: 2
    • AIS 38: 1
    • AIS 46: 2
  • FIPS:
    • FIPS 180-4: 9
    • FIPS 197: 12
    • FIPS PUB 180-4: 1
    • FIPS PUB 197: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18031:2005: 1
    • ISO/IEC 18045: 4
  • PKCS:
    • PKCS#1: 5
  • RFC:
    • RFC 5639: 12
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 1.1, 19 May 2021, Giesecke+Devrient Mobile Security GmbH (confidential document) [11] Guidance Documentation STARCOS 3.7 COS HBA-SMC – Main Document, Version 1.6, 23 March 2021: 1
    • Target STARCOS 3.7 COS HBA-SMC, Version 2.0, 22 April 2021, Giesecke+Devrient Mobile Security GmbH (confidential document) 7 specifically • AIS 1, Version 14, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • design step H13, Version 3.3, 22 April 2020, Infineon Technologies AG, BSI-DSZ-CC-1110-V3-2020 (confidential document) Security Target Lite of the underlying hardware platform, Security Target IFX_CCI_000003h: 1
    • for STARCOS 3.7 COS HBA-SMC, Version 2.9, 2 June 2021, SRC Security Research & Consulting GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-0976-V4-2021, Configuration List STARCOS 3.7 COS HBA-SMC: 1
    • procedure BSI-DSZ-CC-1110-V3-2020, Version 1, 23 April 2020, TÜV Informationstechnik GmbH (confidential document) [21] Einführung der Gesundheitskarte, Spezifikation des Card Operating System (COS), Elektrische: 1
pdf_data/report_metadata
  • /Author: NIAP
  • /CreationDate: Monday, July 16, 2001 2:48:12 PM
  • /Creator: Microsoft Word
  • /Keywords:
  • /Producer: Acrobat PDFWriter 3.02 for Windows
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 358978
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
pdf_data/st_filename st_vid2001-st.pdf 0976V4b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1110-V3-2020: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0082-V4: 2
    • BSI-CC-PP- 0084-2014: 6
    • BSI-CC-PP-0035-2007: 1
    • BSI-CC-PP-0082-V3: 1
    • BSI-CC-PP-0082-V4: 27
    • BSI-CC-PP-0084-: 4
    • BSI-CC-PP-0084-2007: 1
    • BSI-CC-PP-0084-2014: 57
    • BSI-PP-0084-: 2
    • BSI-PP-0084-2014: 8
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 13
  • EAL:
    • EAL 4: 2
    • EAL 6: 2
    • EAL4: 14
    • EAL4 augmented: 4
    • EAL6: 1
    • EAL6+: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.2: 15
  • ADO:
    • ADO_DEL.1: 9
    • ADO_IGS.1: 9
  • ADV:
    • ADV_FSP.1: 26
    • ADV_HLD.1: 16
    • ADV_RCR.1: 11
  • AGD:
    • AGD_ADM: 1
    • AGD_ADM.1: 20
    • AGD_USR.1: 17
  • ATE:
    • ATE_COV.1: 8
    • ATE_FUN.1: 17
    • ATE_HLD.1: 2
    • ATE_IND.2: 11
  • AVA:
    • AVA_SOF.1: 10
    • AVA_VLA.1: 10
  • ADV:
    • ADV_ARC: 2
    • ADV_ARC.1: 9
    • ADV_FSP: 2
    • ADV_FSP.4: 6
    • ADV_IMP: 2
    • ADV_IMP.1: 6
    • ADV_TDS.3: 3
  • AGD:
    • AGD_OPE: 2
    • AGD_OPE.1: 6
    • AGD_PRE: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC: 2
    • ALC_CMC.4: 1
    • ALC_CMS: 2
    • ALC_CMS.4: 1
    • ALC_DEL: 2
    • ALC_DEL.1: 1
    • ALC_DVS: 2
    • ALC_DVS.2: 12
    • ALC_FLR.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD: 2
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 2
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 11
    • ATE_FUN.1: 6
    • ATE_IND.2: 5
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 10
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_UAU: 1
    • FIA_UAU.1: 3
    • FIA_UAU.2: 5
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 5
  • FMT:
    • FMT_MOF.1: 10
    • FMT_MOF.1.1: 2
    • FMT_MTD.1.1: 2
    • FMT_SMR.1: 8
  • FPT:
    • FPT_RVM.1: 8
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 9
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FAU:
    • FAU_SAS: 8
    • FAU_SAS.1: 3
  • FCS:
    • FCS_CKM: 83
    • FCS_CKM.1: 39
    • FCS_CKM.2: 9
    • FCS_CKM.4: 64
    • FCS_CKM.4.1: 1
    • FCS_COP: 189
    • FCS_COP.1: 27
    • FCS_COP.1.1: 1
    • FCS_RNG: 34
    • FCS_RNG.1: 20
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 123
    • FDP_ACC.1: 44
    • FDP_ACF: 110
    • FDP_ACF.1: 41
    • FDP_IFC: 7
    • FDP_IFC.1: 16
    • FDP_ITC.1: 35
    • FDP_ITC.2: 35
    • FDP_ITT: 7
    • FDP_ITT.1: 3
    • FDP_RIP: 9
    • FDP_RIP.1: 12
    • FDP_RIP.1.1: 1
    • FDP_SDC: 8
    • FDP_SDC.1: 3
    • FDP_SDI: 7
    • FDP_SDI.1: 1
    • FDP_SDI.2: 11
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT: 7
    • FDP_UCT.1: 1
    • FDP_UIT: 8
    • FDP_UIT.1: 2
  • FIA:
    • FIA_ACC: 1
    • FIA_ACF: 1
    • FIA_AFL: 22
    • FIA_AFL.1: 4
    • FIA_API: 10
    • FIA_API.1: 16
    • FIA_API.1.1: 1
    • FIA_ATD: 10
    • FIA_ATD.1: 20
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU: 50
    • FIA_UAU.1: 20
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 12
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 17
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 12
    • FIA_UAU.6.1: 1
    • FIA_UID: 14
    • FIA_UID.1: 19
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB: 32
    • FIA_USB.1: 30
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 2
  • FMT:
    • FMT_LIM: 15
    • FMT_LIM.1: 3
    • FMT_LIM.2: 2
    • FMT_MSA: 68
    • FMT_MSA.1: 8
    • FMT_MSA.3: 39
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 38
    • FMT_MTD.1: 4
    • FMT_SMF.1: 51
    • FMT_SMF.1.1: 1
    • FMT_SMR: 9
    • FMT_SMR.1: 41
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_SRM: 1
  • FPT:
    • FPT_EMS: 10
    • FPT_EMS.1: 15
    • FPT_EMS.1.1: 1
    • FPT_EMS.1.2: 1
    • FPT_FLS: 7
    • FPT_FLS.1: 16
    • FPT_FLS.1.1: 1
    • FPT_ITE: 11
    • FPT_ITE.1: 11
    • FPT_ITE.1.1: 1
    • FPT_ITE.1.2: 1
    • FPT_ITE.2: 13
    • FPT_ITE.2.1: 5
    • FPT_ITE.2.2: 1
    • FPT_ITT: 7
    • FPT_ITT.1: 3
    • FPT_PHP: 7
    • FPT_PHP.3: 4
    • FPT_TDC.1: 10
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 2
    • FPT_TST.1: 11
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_FLT: 7
    • FRU_FLT.2: 3
  • FTP:
    • FTP_ITC: 22
    • FTP_ITC.1: 12
    • FTP_ITE: 1
    • FTP_TRP.1: 5
pdf_data/st_keywords/cc_claims
  • A:
    • A.CHANGE: 1
    • A.CHANGE_KOC: 2
    • A.HW_CORRECT: 3
    • A.INSTALL: 3
    • A.MANAGE: 3
    • A.NO_EVIL_ADM: 3
    • A.PROCEDURE: 3
  • O:
    • O.NO_TAMPER: 6
    • O.RESIDUAL: 5
  • OE:
    • OE.CORRECT: 3
    • OE.MANAGE: 8
    • OE.RESIDUAL: 1
  • T:
    • T.RESIDUAL: 3
    • T.TAMPER: 4
  • O:
    • O.AES: 7
    • O.PACE_CHIP: 2
    • O.RND: 8
  • T:
    • T.RND: 5
pdf_data/st_keywords/vendor
  • GD:
    • Giesecke+Devrient: 14
  • Infineon:
    • Infineon: 2
    • Infineon Technologies AG: 2
  • NXP:
    • NXP Semiconductors: 1
  • STMicroelectronics:
    • STMicroelectronics: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 82
    • HPC:
      • HPC: 1
  • constructions:
    • MAC:
      • CMAC: 43
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 16
    • ECDH:
      • ECDH: 6
    • ECDSA:
      • ECDSA: 38
  • FF:
    • DH:
      • DH: 12
      • Diffie-Hellman: 1
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-224: 2
      • SHA-256: 11
      • SHA-384: 6
      • SHA-512: 4
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
    • Key agreement: 1
  • MAC:
    • MAC: 33
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 123
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 15
    • RNG: 38
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
pdf_data/st_keywords/ecc_curve
  • Brainpool:
    • brainpoolP256r1: 4
    • brainpoolP384r1: 4
    • brainpoolP512r1: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • Malfunction: 17
    • malfunction: 1
    • physical tampering: 3
  • SCA:
    • DPA: 1
    • Leak-Inherent: 15
    • Physical Probing: 2
    • SPA: 1
    • side channel: 1
  • other:
    • Bleichenbacher attack: 1
    • JIL: 3
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03111: 3
    • BSI TR-03143: 2
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/st_keywords/os_name
  • STARCOS:
    • STARCOS 3: 179
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS20: 2
    • AIS31: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
    • CCMB-2017-05-001: 1
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 197: 4
    • FIPS PUB 180-4: 1
    • FIPS PUB 197: 1
  • ISO:
    • ISO/IEC 7816: 2
  • NIST:
    • NIST SP 800-38B: 1
  • PKCS:
    • PKCS #1: 2
  • RFC:
    • RFC 5639: 1
    • RFC5639: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • and cryptographic key sizes 2048 bits and 3072 bits modulus length for RSA private key operation is out of scope for the TOE. 371 The TOE shall meet the requirement “Cryptographic operation – CB ECC (FCS_COP.1/CB: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Unknown
  • /CreationDate: Monday, June 25, 2001 6:36:43 AM
  • /Creator: Microsoft Word
  • /Keywords:
  • /Producer: Acrobat PDFWriter 3.02 for Windows
  • /Subject:
  • /Title: CCEVS-ST-VID201.PDF
  • pdf_file_size_bytes: 270679
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 50
  • /Author: Giesecke+Devrient Mobile Security GmbH
  • /CreationDate: D:20210617104602+02'00'
  • /Creator: Microsoft® Word für Microsoft 365
  • /Keywords: Version 1.0/18.05.2021
  • /ModDate: D:20210617104602+02'00'
  • /Producer: Microsoft® Word für Microsoft 365
  • /Subject: Security Target STARCOS 3.7 COS HBA-SMC
  • /Title: G+D MS Security Target to BSI-PP-0082-V4
  • pdf_file_size_bytes: 2539468
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 166
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different