Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6
BSI-DSZ-CC-0772-2014
ZEMO VML-GK2, V.3.1.0 FW-Version 3.1.0, HW-Version 2.0.0
BSI-DSZ-CC-0623-V2-2018
name - Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6 ZEMO VML-GK2, V.3.1.0 FW-Version 3.1.0, HW-Version 2.0.0
category Data Protection ICs, Smart Cards and Smart Card-Related Devices and Systems
not_valid_before 2014-11-07 2018-06-28
not_valid_after 2019-11-08 2023-06-28
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V2b_pdf.pdf
manufacturer Kanguru Solutions ZEMO GmbH
manufacturer_web https://www.kanguru.com https://zemo.de
security_level ALC_FLR.1, EAL2+ ALC_TAT.1, AVA_VAN.5, ADV_IMP.1, ADV_TDS.3, EAL3+, ADV_FSP.4
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V2a_pdf.pdf
cert_link None https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V2c_pdf.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Schutzprofil fur USB-Datentrager, Version 1.4', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0025b.pdf', 'pp_ids': frozenset({'SCHUTZPROFIL_USB-DATENTRAGER_V1.4'})}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System (MobCT&...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0052b_pdf.pdf', 'pp_ids': None})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2015, 1, 20), 'maintenance_title': 'Kanguru Defender Elite 200 and Kanguru Defender 2000, firmware version 2.05.10', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1b_pdf.pdf'})
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash None 4a3678441b2f22730cb9cba6377a58c2d030a333d21d764a282d3943ebc36bb1
state/cert/txt_hash None 43a7deaeb8a72848561d3093baa42ac716edabf8b9494ed5d2c1ac8c1581eecf
state/report/pdf_hash 16e52e72927a5eee7124e6fde0c186c1d3d113e733e6116f5fdfcc44278c5b57 b6a20fdb363fb4d53985da7690334cd55f2ace0d4100fb59d817bf8de79b29db
state/report/txt_hash 8cb2309bdc02367be25c3961b565d25c9f78b2d7cdce20c08213092f4a2eff82 ffef3a44dc8aba01fc48136edb22253e4a98978382bf744d9b6af603bfe8f400
state/st/pdf_hash 077d27d1e2e9eafc65cbb9d302bc66883e2dd06e21ea816741ca25fe7f7dcd7d 1c1f1dfcb476742441e058ce3f64f3395ae6be31a6ea70656f0d0d48202c41ce
state/st/txt_hash 74714db4c60a8332c3603aaae83a1c8ec3cbea7950400f562332e8ccdcc98147 0c3fec560cbc5b2d27c3d2e9cbe5a6b4f3192f54c4c2f573c61b1cb3684213ba
heuristics/cert_id BSI-DSZ-CC-0772-2014 BSI-DSZ-CC-0623-V2-2018
heuristics/extracted_versions 2.0.0.0, 1.2.1.8, 3.2.0.3, 02.03.10, 5.0.2.6 2.0.0, 3.1.0
pdf_data/cert_filename None 0623V2c_pdf.pdf
pdf_data/cert_keywords None
  • cc_cert_id:
    • DE:
      • BSI-DSZ-CC-0623-V2-2018: 1
  • cc_protection_profile_id:
    • BSI:
      • BSI-CC-PP-0052-2015: 1
  • cc_security_level:
    • EAL:
      • EAL 3: 1
      • EAL 4: 1
      • EAL 2: 1
      • EAL 3 augmented: 1
  • cc_sar:
    • ADV:
      • ADV_FSP.4: 1
      • ADV_IMP.1: 1
      • ADV_TDS.3: 1
    • ALC:
      • ALC_TAT.1: 1
    • AVA:
      • AVA_VAN.5: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
  • eval_facility:
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
    • ISO:
      • ISO/IEC 15408: 2
      • ISO/IEC 18045: 2
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
pdf_data/cert_metadata None
  • pdf_file_size_bytes: 900741
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20180702105442+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Mobile Card Terminal, MobCT"
  • /ModDate: D:20180710144522+02'00'
  • /Producer: LibreOffice 5.2
  • /Subject: ZEMO VML-GK2, FW-Version 3.1.0, HW-Version 2.0.0, ZEMO GmbH
  • /Title: Certification Report BSI-DSZ-CC-0623-V2-2018
  • pdf_hyperlinks:
pdf_data/report_filename 0772a_pdf.pdf 0623V2a_pdf.pdf
pdf_data/report_frontpage/DE
  • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
  • cert_id: BSI-DSZ-CC-0772-2014
  • cert_item: Kanguru Defender Elite 200 Kanguru Defender 2000 Universal Kanguru Local Administrator, v3.2.0.3 Kanguru Remote Management Console, v5.0.2.6
  • developer: Kanguru Solutions
  • cert_lab: BSI
  • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
  • cert_id: BSI-DSZ-CC-0623-V2-2018
  • cert_item: ZEMO VML-GK2, FW-Version 3.1.0, HW-Version 2.0.0
  • developer: ZEMO GmbH
  • cert_lab: BSI
  • ref_protection_profiles: Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System (MobCT), Version 1.4, BSI-CC-PP-0052-2015, 19 January 2015
  • cc_version: PP conformant Common Criteria Part 2 extended
  • cc_security_level: Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, and AVA_VAN.5
pdf_data/report_frontpage/DE/cert_id BSI-DSZ-CC-0772-2014 BSI-DSZ-CC-0623-V2-2018
pdf_data/report_frontpage/DE/cert_item Kanguru Defender Elite 200 Kanguru Defender 2000 Universal Kanguru Local Administrator, v3.2.0.3 Kanguru Remote Management Console, v5.0.2.6 ZEMO VML-GK2, FW-Version 3.1.0, HW-Version 2.0.0
pdf_data/report_frontpage/DE/developer Kanguru Solutions ZEMO GmbH
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0772-2014: 22
  • BSI-DSZ-CC-0623-V2-2018: 14
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0025-2006: 4
  • BSI-CC-PP-0052-2015: 3
  • BSI-CC-PP- 0052-2015: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM.1: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_FLR.1: 5
    • ALC_FLR: 3
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 1
    • ALC_LCD.2: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_TAT: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
    • AVA_VAN: 2
  • APE:
    • APE_INT.1: 1
    • APE_CCL.1: 1
    • APE_SPD.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_ECD.1: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
  • ASE:
    • ASE_INT.1: 1
    • ASE_CCL.1: 1
    • ASE_SPD.1: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_ECD.1: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ADV:
    • ADV_FSP.4: 4
    • ADV_IMP.1: 4
    • ADV_TDS.3: 4
  • ALC:
    • ALC_TAT.1: 4
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN.5: 5
pdf_data/report_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.1: 1
  • ADV_FSP.2: 1
  • ADV_FSP.3: 1
  • ADV_FSP.4: 1
  • ADV_FSP.5: 1
  • ADV_FSP.6: 1
  • ADV_IMP.1: 1
  • ADV_IMP.2: 1
  • ADV_INT.1: 1
  • ADV_INT.2: 1
  • ADV_INT.3: 1
  • ADV_SPM.1: 1
  • ADV_TDS.1: 1
  • ADV_TDS.2: 1
  • ADV_TDS.3: 1
  • ADV_TDS.4: 1
  • ADV_TDS.5: 1
  • ADV_TDS.6: 1
  • ADV_ARC: 1
  • ADV_FSP: 1
  • ADV_IMP: 1
  • ADV_INT: 1
  • ADV_SPM: 1
  • ADV_TDS: 1
  • ADV_FSP.4: 4
  • ADV_IMP.1: 4
  • ADV_TDS.3: 4
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP.4 1 4
pdf_data/report_keywords/cc_sar/ADV/ADV_IMP.1 1 4
pdf_data/report_keywords/cc_sar/ADV/ADV_TDS.3 1 4
pdf_data/report_keywords/cc_sar/ALC
  • ALC_FLR.1: 5
  • ALC_FLR: 3
  • ALC_CMC.1: 1
  • ALC_CMC.2: 1
  • ALC_CMC.3: 1
  • ALC_CMC.4: 1
  • ALC_CMC.5: 1
  • ALC_CMS.1: 1
  • ALC_CMS.2: 1
  • ALC_CMS.3: 1
  • ALC_CMS.4: 1
  • ALC_CMS.5: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 1
  • ALC_DVS.2: 1
  • ALC_FLR.2: 1
  • ALC_FLR.3: 1
  • ALC_LCD.1: 1
  • ALC_LCD.2: 1
  • ALC_TAT.1: 1
  • ALC_TAT.2: 1
  • ALC_TAT.3: 1
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
  • ALC_TAT.1: 4
  • ALC_FLR: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR 3 1
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT.1 1 4
pdf_data/report_keywords/cc_sar/AVA
  • AVA_VAN.1: 1
  • AVA_VAN.2: 1
  • AVA_VAN.3: 1
  • AVA_VAN.4: 1
  • AVA_VAN.5: 1
  • AVA_VAN: 2
  • AVA_VAN.5: 5
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 1 5
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 8
    • EAL 1: 7
    • EAL 4: 7
    • EAL2: 2
    • EAL 3: 4
    • EAL 5: 6
    • EAL 6: 3
    • EAL 7: 4
    • EAL 2 augmented: 3
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 3: 4
    • EAL 4: 4
    • EAL 2: 3
    • EAL 1: 1
    • EAL3+: 2
    • EAL 5+: 1
    • EAL 6: 1
    • EAL 3 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 2: 8
  • EAL 1: 7
  • EAL 4: 7
  • EAL2: 2
  • EAL 3: 4
  • EAL 5: 6
  • EAL 6: 3
  • EAL 7: 4
  • EAL 2 augmented: 3
  • EAL 3: 4
  • EAL 4: 4
  • EAL 2: 3
  • EAL 1: 1
  • EAL3+: 2
  • EAL 5+: 1
  • EAL 6: 1
  • EAL 3 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 7 1
pdf_data/report_keywords/cc_security_level/EAL/EAL 2 8 3
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 7 4
pdf_data/report_keywords/cc_security_level/EAL/EAL 6 3 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_COP.1: 1
    • FCS_CKM.1: 1
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC.1: 2
    • FDP_ACF.1: 2
  • FIA:
    • FIA_UID.2: 4
    • FIA_UAU.2: 4
    • FIA_UAU.6: 1
    • FIA_SOS.1: 1
  • FMT:
    • FMT_MTD: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 1
pdf_data/report_keywords/certification_process/ConfidentialDocument
  • Report, Version 8, 2014-10-07, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [9] Evaluated Product User Guide, Version 1.20, 2014-10-02 [10] Kanguru Defender Elite 200 User: 1
  • KRMC Administrator's User Manual, Version 5.0.2, 2013-11-01 [14] Configuration lists for the TOE (confidential documents): a) Configuration list for TOE executables, 2014-09-17 b) Configuration list from Phison: 1
  • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • Report, Version 1.0 10.06.2018, Evaluation Technical Report – Summary, datenschutz cert GmbH, (confidential document) [8] Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System: 1
  • 19 January 2015 [9] Configuration list for the TOE, 18.04.2018, Konfigurationsliste (confidential document) [10] Guidance documentation for the TOE, Version 1.1.4, 18.04.2018, Bedienungsanleitung: 1
pdf_data/report_keywords/cipher_mode
  • GCM:
    • GCM: 2
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 3
pdf_data/report_keywords/hash_function/SHA/SHA2/SHA-256 13 5
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/report_keywords/side_channel_analysis/FI/physical tampering 2 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 20: 2
    • AIS 32: 1
  • ISO:
    • ISO/IEC 17065: 2
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
  • FIPS:
    • FIPS 180-4: 2
    • FIPS PUB 180-4: 1
    • FIPS 197: 1
  • NIST:
    • NIST SP 800-38D: 2
  • PKCS:
    • PKCS#1: 2
    • PKCS #1: 1
  • BSI:
    • AIS 32: 1
    • AIS 34: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 18045: 4
    • ISO/IEC 17065: 2
  • X509:
    • X.509: 1
pdf_data/report_keywords/standard_id/BSI
  • AIS 20: 2
  • AIS 32: 1
  • AIS 32: 1
  • AIS 34: 1
pdf_data/report_keywords/standard_id/ISO/ISO/IEC 15408 2 4
pdf_data/report_keywords/standard_id/ISO/ISO/IEC 18045 2 4
pdf_data/report_keywords/symmetric_crypto/AES_competition
  • AES:
    • AES-256: 1
    • AES: 4
  • AES:
    • AES: 5
  • HPC:
    • HPC: 1
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES
  • AES-256: 1
  • AES: 4
  • AES: 5
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES 4 5
pdf_data/report_keywords/technical_report_id/BSI
  • BSI TR-02102: 1
  • BSI 7138: 2
  • BSI 7125: 2
  • BSI 7148: 1
  • BSI TR-02102: 1
  • BSI 7148: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/report_metadata//CreationDate D:20141121083051+01'00' D:20180705154336+02'00'
pdf_data/report_metadata//Keywords "Common Criteria, Certification, Zertifizierung, encrypted USB storage device, Kanguru Defender" "Common Criteria, Certification, Zertifizierung, Mobile Card Terminal, MobCT"
pdf_data/report_metadata//ModDate D:20141121113713+01'00' D:20180710142720+02'00'
pdf_data/report_metadata//Producer LibreOffice 4.2 LibreOffice 5.2
pdf_data/report_metadata//Subject Common Criteria Certification ZEMO VML-GK2, FW-Version 3.1.0, HW-Version 2.0.0, ZEMO GmbH
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0772-2014 Certification Report BSI-DSZ-CC-0623-V2-2018
pdf_data/report_metadata/pdf_file_size_bytes 1643286 1240729
pdf_data/report_metadata/pdf_number_of_pages 42 26
pdf_data/st_filename 0772b_pdf.pdf 0623V2b_pdf.pdf
pdf_data/st_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0772: 1
  • BSI-DSZ-CC-0623: 2
pdf_data/st_keywords/cc_claims
  • O:
    • O.PIN: 6
    • O.RESIDUAL: 6
    • O.SELFTESTS: 5
    • O.PROTECTION: 8
    • O.AUTH_STATE: 8
    • O.MANAGEMENT: 8
    • O.LOG_CARDS: 3
    • O.LOG_DATA: 5
    • O.TRANSFER: 3
    • O.DMS_CONNECT: 1
    • O.TIME: 5
    • O.SEALING: 3
    • O.DMS_CONNECTION: 4
  • T:
    • T.MAN_HW: 3
    • T.DATA: 3
    • T.ACCESS: 3
    • T.AUTH_STATE: 3
    • T.ADMIN_PIN: 3
    • T.FIRMWARE: 3
  • A:
    • A.MEDIC: 3
    • A.ADMIN: 3
    • A.CARDS: 4
    • A.DMS: 3
    • A.PHYSICAL: 3
    • A.ENVIRONMENT: 3
  • OE:
    • OE.MEDIC: 9
    • OE.ADMIN: 9
    • OE.CARDS: 7
    • OE.DMS: 4
    • OE.PHYSICAL: 5
    • OE.ENVIRONMENT: 6
    • OE.DEVELOPER: 1
  • OSP:
    • OSP.LOG_DATA: 3
    • OSP.TRANSFER: 3
    • OSP.DMS_CONNE: 1
    • OSP.TIME: 3
    • OSP.SEALING: 3
    • OSP.SELFTESTS: 3
    • OSP.EMERGENCY_: 1
    • OSP.LOG_CARD: 1
    • OSP.DMS_CONN: 1
    • OSP.EMERGENC: 1
    • OSP.LOG_CARDS: 1
    • OSP.DMS_CONNECTION: 1
    • OSP.EMERGENCY_DATA: 1
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0025: 6
  • BSI-PP- 0025: 13
  • BSI-CC-PP-0052: 2
  • BSI-CC-PP-0032: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_SPM.1: 2
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_FLR.1: 5
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ASE:
    • ASE_INT.1: 1
    • ASE_CCL.1: 1
    • ASE_SPD.1: 1
    • ASE_OBJ.2: 1
    • ASE_ECD.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
  • ADV:
    • ADV_FSP.4: 5
    • ADV_IMP.1: 5
    • ADV_TDS.3: 5
    • ADV_ARC.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_TAT.1: 5
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sar/ADV
  • ADV_SPM.1: 2
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.1: 1
  • ADV_FSP.4: 5
  • ADV_IMP.1: 5
  • ADV_TDS.3: 5
  • ADV_ARC.1: 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.1: 5
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
  • ALC_TAT.1: 5
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 1
  • ALC_LCD.1: 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_COV.2: 1
  • ATE_DPT.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.2: 1
  • AVA_VAN.5: 8
pdf_data/st_keywords/cc_security_level/EAL
  • EAL2: 4
  • EAL3+: 2
  • EAL 3: 4
  • EAL 3 augmented: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_RNG.1: 15
    • FCS_CKM.1: 9
    • FCS_CKM.4: 9
    • FCS_COP.1: 9
    • FCS_RNG: 2
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 3
    • FCS_CKM.1.1: 1
    • FCS_CKM.4.1: 1
    • FCS_COP.1.1: 1
    • FCS_CKM.2: 1
  • FDP:
    • FDP_ACC.1: 14
    • FDP_ACF.1: 13
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_IFC.1: 1
  • FIA:
    • FIA_UAU.1: 7
    • FIA_UAU.6: 8
    • FIA_SOS.1: 8
    • FIA_UAU.2: 9
    • FIA_UID.2: 10
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.6.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.2.1: 1
    • FIA_UID.2.1: 1
    • FIA_UID.1: 2
  • FMT:
    • FMT_MSA.1: 8
    • FMT_MTD: 12
    • FMT_SMF: 20
    • FMT_SMR.1: 12
    • FMT_SMF.1: 6
    • FMT_MTD.1: 3
    • FMT_MSA.1.1: 1
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 2
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA.3: 1
  • FPT:
    • FPT_FLS.1: 9
    • FPT_RCV.4: 8
    • FPT_PHP.1: 8
    • FPT_RCV.4.1: 2
    • FPT_FLS.1.1: 1
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
  • FCS:
    • FCS_COP.1: 6
    • FCS_CKM.1: 23
    • FCS_CKM.4: 22
    • FCS_COP: 31
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4.1: 1
  • FDP:
    • FDP_SVR: 2
    • FDP_ACF.1: 26
    • FDP_ACF.1.2: 5
    • FDP_ACF.1.4: 6
    • FDP_IFC: 35
    • FDP_IFF: 37
    • FDP_SVR.1.1: 5
    • FDP_SVR.1: 12
    • FDP_SVR.1.2: 3
    • FDP_SVR.1.3: 3
    • FDP_ACC.1: 30
    • FDP_ITC.1: 21
    • FDP_RIP: 15
    • FDP_SDI.2: 9
    • FDP_ITC.2: 9
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.3: 1
    • FDP_IFC.1: 10
    • FDP_IFF.1: 19
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_RIP.1: 2
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_SDI.1: 1
  • FIA:
    • FIA_AFL.1.1: 2
    • FIA_UID.1: 19
    • FIA_UAU.1: 15
    • FIA_AFL.1: 10
    • FIA_SOS.1: 8
    • FIA_UAU.5: 11
    • FIA_UAU.7: 10
    • FIA_AFL.1.2: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.7.1: 2
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MSA.1: 12
    • FMT_MSA.3: 24
    • FMT_MTD.1: 11
    • FMT_MTD.3: 8
    • FMT_SMF.1: 14
    • FMT_SMR.1: 20
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 1
    • FMT_MTD.3.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_PHP.1: 7
    • FPT_STM.1: 12
    • FPT_TST.1: 7
    • FPT_STM.1.1: 1
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.4: 10
    • FTA_SSL.3.1: 2
    • FTA_SSL.4.1: 1
  • FTP:
    • FTP_ITC.1: 1
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RNG.1: 15
  • FCS_CKM.1: 9
  • FCS_CKM.4: 9
  • FCS_COP.1: 9
  • FCS_RNG: 2
  • FCS_RNG.1.1: 3
  • FCS_RNG.1.2: 3
  • FCS_CKM.1.1: 1
  • FCS_CKM.4.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM.2: 1
  • FCS_COP.1: 6
  • FCS_CKM.1: 23
  • FCS_CKM.4: 22
  • FCS_COP: 31
  • FCS_CKM.1.1: 1
  • FCS_CKM.2: 2
  • FCS_CKM.4.1: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 9 23
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 1 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 9 22
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 9 6
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 14
  • FDP_ACF.1: 13
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 2
  • FDP_ITC.2: 2
  • FDP_IFC.1: 1
  • FDP_SVR: 2
  • FDP_ACF.1: 26
  • FDP_ACF.1.2: 5
  • FDP_ACF.1.4: 6
  • FDP_IFC: 35
  • FDP_IFF: 37
  • FDP_SVR.1.1: 5
  • FDP_SVR.1: 12
  • FDP_SVR.1.2: 3
  • FDP_SVR.1.3: 3
  • FDP_ACC.1: 30
  • FDP_ITC.1: 21
  • FDP_RIP: 15
  • FDP_SDI.2: 9
  • FDP_ITC.2: 9
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.3: 1
  • FDP_IFC.1: 10
  • FDP_IFF.1: 19
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_RIP.1: 2
  • FDP_SDI.2.1: 1
  • FDP_SDI.2.2: 1
  • FDP_SDI.1: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 14 30
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 13 26
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 1 5
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 1 6
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 1 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 2 21
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 2 9
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_UAU.1: 7
  • FIA_UAU.6: 8
  • FIA_SOS.1: 8
  • FIA_UAU.2: 9
  • FIA_UID.2: 10
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.6.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.2.1: 1
  • FIA_UID.2.1: 1
  • FIA_UID.1: 2
  • FIA_AFL.1.1: 2
  • FIA_UID.1: 19
  • FIA_UAU.1: 15
  • FIA_AFL.1: 10
  • FIA_SOS.1: 8
  • FIA_UAU.5: 11
  • FIA_UAU.7: 10
  • FIA_AFL.1.2: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.7.1: 2
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 7 15
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 2 19
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MSA.1: 8
  • FMT_MTD: 12
  • FMT_SMF: 20
  • FMT_SMR.1: 12
  • FMT_SMF.1: 6
  • FMT_MTD.1: 3
  • FMT_MSA.1.1: 1
  • FMT_MTD.1.1: 2
  • FMT_SMF.1.1: 2
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA.3: 1
  • FMT_MSA.1: 12
  • FMT_MSA.3: 24
  • FMT_MTD.1: 11
  • FMT_MTD.3: 8
  • FMT_SMF.1: 14
  • FMT_SMR.1: 20
  • FMT_MSA.1.1: 1
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MTD.1.1: 1
  • FMT_MTD.3.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 8 12
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 1 24
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 3 11
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 6 14
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 12 20
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FLS.1: 9
  • FPT_RCV.4: 8
  • FPT_PHP.1: 8
  • FPT_RCV.4.1: 2
  • FPT_FLS.1.1: 1
  • FPT_PHP.1.1: 1
  • FPT_PHP.1.2: 1
  • FPT_PHP.1: 7
  • FPT_STM.1: 12
  • FPT_TST.1: 7
  • FPT_STM.1.1: 1
  • FPT_PHP.1.1: 1
  • FPT_PHP.1.2: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.1 8 7
pdf_data/st_keywords/certification_process/OutOfScope
  • Out of scope: 2
  • 11 1.5.4.3 Out of scope : 1
  • 11 1.5.4.3 Out of scope ........................................................................................... 12 1.5: 1
  • from the KRMC to the device. Commands are queued at the KRMC until polled form the device. 1.5.4.3 Out of scope The TOE supports additional features that are not part of the scope: ● Antivirus solution ●: 1
  • out of scope: 1
  • done by an authorised card that is out of scope of this ST: 1
  • the TOE • Signature generation for emergency data1 on the eHC (done by an authorised card that is out of scope of this ST) 1.4.6 Physical Protection of the TOE The TOE cannot counter physical attacks concerning: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • GCM:
    • GCM: 3
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 40
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-256: 1
  • SHA256: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 14
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering 3 6
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 1
    • AIS 31: 1
  • X509:
    • X.509: 9
pdf_data/st_keywords/symmetric_crypto/AES_competition
  • AES:
    • AES: 3
  • AES:
    • AES: 5
  • HPC:
    • HPC: 13
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 3 5
pdf_data/st_metadata
  • pdf_file_size_bytes: 704587
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 41
  • /Keywords: Security Target, Common Criteria, USB Storage, Encryption, Protected Storage
  • /Subject:
  • /Title: Kanguru Defender Security Target (version 1.10 as of 2014-10-06)
  • /Creator: Unknown
  • /Author: Andreas Siegert (generated by CCTool version 2.8)
  • /Producer: XEP 4.23
  • /application: CCTool version x.y
  • /Trapped: /False
  • /CreationDate: D:20141006150157Z
  • /ModDate: D:20141006150157Z
  • pdf_hyperlinks: http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf
  • pdf_file_size_bytes: 2621577
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 76
  • /Title: ZEMO VML-GK2 ORS.1/OPB.1 Security Target
  • /Subject: ZEMO VML-GK2 CC 3.1-Evaluierung
  • /Creator: Writer
  • /Producer: LibreOffice 5.4
  • /CreationDate: D:20180604110207+02'00'
  • pdf_hyperlinks:
pdf_data/st_metadata//CreationDate D:20141006150157Z D:20180604110207+02'00'
pdf_data/st_metadata//Creator Unknown Writer
pdf_data/st_metadata//Producer XEP 4.23 LibreOffice 5.4
pdf_data/st_metadata//Subject ZEMO VML-GK2 CC 3.1-Evaluierung
pdf_data/st_metadata//Title Kanguru Defender Security Target (version 1.10 as of 2014-10-06) ZEMO VML-GK2 ORS.1/OPB.1 Security Target
pdf_data/st_metadata/pdf_file_size_bytes 704587 2621577
pdf_data/st_metadata/pdf_hyperlinks http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf
pdf_data/st_metadata/pdf_number_of_pages 41 76
dgst eda06ca3c208ebd0 05e617901b9f2ac8