name |
X0mail |
SMARTY IQ-LTE, Version 1.0 |
category |
Other Devices and Systems |
Other Devices and Systems |
scheme |
NO |
DE |
status |
archived |
active |
not_valid_after |
01.09.2019 |
26.11.2025 |
not_valid_before |
23.02.2010 |
27.11.2020 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0822V2c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20100223_SERTIT-008CR_issue201.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0822V2a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/XOmail_Version_14.2_Security_Target_739_20597_aaaa_sc_ed10-public.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0822V2b_pdf.pdf |
manufacturer |
Thales Norway AS |
Sagemcom Dr. Neuhaus GmbH |
manufacturer_web |
https://www.thales.no/ |
https://sagemcom.com |
security_level |
EAL4 |
EAL4+, ALC_FLR.2, AVA_VAN.5 |
dgst |
f310fe4b0c9c7eb1 |
98e9dd8819d3c48b |
heuristics/cert_id |
SERTIT-014 |
BSI-DSZ-CC-0822-V2-2020 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_RCR.1, AVA_VLA.2, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ADV_FSP.2, ALC_CMC.4, AVA_SOF.1, ADV_IMP.1, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AVA_MSU.2, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, AGD_ADM.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_DVS.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ASE_CCL.1, ADV_SPM.1 |
ATE_COV.2, ASE_TSS.1, ASE_INT.1, ATE_FUN.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_ARC.1, AGD_OPE.1, ASE_REQ.2, ASE_CCL.1, ALC_CMC.4, ALC_FLR.2, ADV_IMP.1 |
heuristics/extracted_versions |
- |
1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0822-V3-2021 |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0822-V4-2023, BSI-DSZ-CC-0822-V6-2024, BSI-DSZ-CC-0822-V3-2021, BSI-DSZ-CC-0822-V5-2023 |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
6346b04de6859db3 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0073b_pdf.pdf |
pdf_data/cert_filename |
|
0822V2c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0822-V2-2020: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 2
- EAL 4 augmented: 1
- EAL 5: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20201215113915+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smartmeter Gateway, SMGW, Smart Metering"
- /ModDate: D:20201215171214+01'00'
- /Producer: LibreOffice 6.3
- /Subject: Certification Report SMARTY IQ-LTE, Version 1.0 from Sagemcom Dr. Neuhaus GmbH
- /Title: Certification Report BSI-DSZ-CC-0822-V2-2020
- pdf_file_size_bytes: 247236
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
20100223_SERTIT-008CR_issue201.0.pdf |
0822V2a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by AVA_VAN.5 and ALC_FLR.2
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0822-V2-2020
- cert_item: SMARTY IQ-LTE, Version 1.0
- cert_lab: BSI
- developer: Sagemcom Dr. Neuhaus GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI-CC-PP-0073-2014
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0822-2019: 3
- BSI-DSZ-CC-0822-V2-2020: 15
- BSI-DSZ-CC-0957-: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0073-2014: 4
- BSI-CC-PP-0077-V2-2015: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 3
- EAL 4 augmented: 1
- EAL 4+: 17
- EAL1: 1
- EAL4+: 3
- EAL7: 1
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 8
- EAL 4 augmented: 3
- EAL 5: 3
- EAL 5+: 1
- EAL 6: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 6
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
- FDP:
- FDP_IFC.2: 2
- FDP_IFF.1: 2
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-03109: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 32: 1
- AIS 34: 2
- AIS 46: 1
- AIS 48: 1
- AIS34: 1
- FIPS:
- FIPS 186-4: 1
- FIPS PUB 180-4: 1
- FIPS PUB 186: 1
- FIPS180-4: 3
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- RFC:
- RFC 2104: 1
- RFC 5246: 1
- RFC 5639: 1
- RFC 5652: 1
- RFC 8289: 1
- RFC 8422: 1
- RFC2104: 2
- RFC4493: 6
- RFC5084: 2
- RFC5246: 6
- RFC5288: 2
- RFC5289: 3
- RFC5639: 6
- RFC5652: 4
- RFC6033: 2
- RFC6090: 4
- RFC6161: 2
- RFC8422: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 5, 2020-11-20, Evaluation Technical Report Summary (ETR Summary), TÜV Informationstechnik GmbH (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014: 1
- 9] Configuration list for the TOE (confidential documents) filelist_OS_TFS, 2018-07-09 filelist_sln8209, 2019-10-16 8209SE011_SMGw_CPU_USB.xls, Version 3.3: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20100315130843
- /ModDate: D:20100315130843
- pdf_file_size_bytes: 542517
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20210726131714+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smartmeter Gateway, SMGW, Smart Metering"
- /ModDate: D:20210726133707+02'00'
- /Producer: LibreOffice 6.3
- /Subject: Certification Report SMARTY IQ-LTE, Version 1.0 from Sagemcom Dr. Neuhaus GmbH
- /Title: Certification Report BSI-DSZ-CC-0822-V2-2020
- pdf_file_size_bytes: 792731
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, http://tools.ietf.org/html/rfc5652, https://www.bsi.bund.de/AIS, http://www.sogisportal.eu/, https://tools.ietf.org/html/rfc5289, http://www.commoncriteriaportal.org/, http://www.ietf.org/rfc/rfc5246.txt, https://www.bsi.bund.de/zertifizierung, https://tools.ietf.org/html/rfc4493, https://www.bsi.bund.de/zertifizierungsreporte, https://tools.ietf.org/html/rfc5084, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 28
|
pdf_data/st_filename |
XOmail_Version_14.2_Security_Target_739_20597_aaaa_sc_ed10-public.pdf |
0822V2b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0073: 1
- BSI-CC-PP-0077-2013: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 5
- EAL 4 augmented: 2
- EAL4: 1
- EAL4 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 10
- ACM_AUT.1.1: 1
- ACM_CAP.3: 1
- ACM_CAP.4: 20
- ACM_SCP.2: 7
- ADO:
- ADO_DEL.1: 1
- ADO_DEL.2: 11
- ADO_IGS.1: 13
- ADV:
- ADV_DVS.1: 1
- ADV_FSP.1: 7
- ADV_FSP.2: 12
- ADV_HLD.1: 2
- ADV_HLD.2: 17
- ADV_IMP.1: 11
- ADV_LLD.1: 18
- ADV_RCR.1: 9
- ADV_SPM.1: 15
- AGD:
- AGD_ADM.1: 22
- AGD_USR.1: 16
- ALC:
- ALC_DVS.1: 9
- ALC_LCD.1: 9
- ALC_TAT.1: 6
- ATE:
- ATE_COV.2: 8
- ATE_DPT.1: 7
- ATE_FUN.1: 15
- ATE_IND.2: 10
- AVA:
- AVA_MSU.2: 15
- AVA_SOF.1: 10
- AVA_VLA.2: 15
|
- ADV:
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 6
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 9
- FAU_ARP.1.1: 1
- FAU_GEN.1: 33
- FAU_GEN.1.1: 1
- FAU_GEN.2: 16
- FAU_GEN.2.1: 1
- FAU_SAA.1: 8
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1: 20
- FAU_SAR.2: 15
- FAU_STG.1: 21
- FAU_STG.3: 15
- FAU_STG.4: 9
- FDP:
- FDP_ACC.1: 11
- FDP_ACC.1.1: 1
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ETC.2: 10
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 4
- FDP_IFC.2: 9
- FDP_IFC.2.1: 1
- FDP_IFC.2.2: 1
- FDP_IFF.2: 10
- FDP_IFF.2.1: 1
- FDP_IFF.2.2: 2
- FDP_IFF.2.3: 1
- FDP_IFF.2.4: 1
- FDP_IFF.2.5: 1
- FDP_IFF.2.6: 1
- FDP_IFF.2.7: 1
- FDP_ITC.2: 10
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_ITT.1: 5
- FDP_ITT.1.1: 1
- FDP_RIP.2: 9
- FDP_RIP.2.1: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_UAU.2: 17
- FIA_UAU.2.1: 2
- FIA_UAU.5: 9
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 4
- FIA_UID.2: 24
- FIA_USB.1: 13
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 10
- FMT_MSA.1.1: 1
- FMT_MSA.3: 12
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 8
- FMT_MTD.1.1: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 2
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_ITT.1: 5
- FPT_ITT.1.1: 1
- FPT_RCV.1: 8
- FPT_RCV.1.1: 1
- FPT_RCV.2: 11
- FPT_RCV.2.1: 1
- FPT_RCV.2.2: 1
- FPT_RCV.4: 9
- FPT_RCV.4.1: 1
- FPT_RVM.1: 9
- FPT_RVM.1.1: 1
- FPT_SEP.3: 10
- FPT_SEP.3.1: 1
- FPT_SEP.3.2: 1
- FPT_SEP.3.3: 1
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FPT_TDC.1: 14
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TSE.1: 1
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 8
- FTA_SSL.3.1: 1
- FTA_TSE.1: 19
- FTP:
- FTP_ITC.1: 2
- FTP_TRP.1: 2
|
- FAU:
- FAU_ARP: 10
- FAU_ARP.1: 1
- FAU_CON.1.2: 1
- FAU_GEN: 39
- FAU_GEN.1: 17
- FAU_GEN.2: 10
- FAU_GEN.2.1: 1
- FAU_SAA: 15
- FAU_SAA.1: 4
- FAU_SAR: 30
- FAU_SAR.1: 6
- FAU_STG: 34
- FAU_STG.1: 8
- FAU_STG.2: 10
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FAU_STG.3: 3
- FAU_STG.4: 3
- FCO:
- FCO_NRO: 3
- FCO_NRO.1: 1
- FCO_NRO.2: 10
- FCO_NRO.2.1: 1
- FCO_NRO.2.2: 1
- FCO_NRO.2.3: 1
- FCS:
- FCS_CKM: 51
- FCS_CKM.1: 16
- FCS_CKM.2: 6
- FCS_CKM.4: 30
- FCS_CKM.4.1: 1
- FCS_COP: 68
- FCS_COP.1: 11
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 9
- FDP_ACC.2: 12
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 1
- FDP_ACF.1: 11
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 29
- FDP_IFC.1: 12
- FDP_IFC.2: 4
- FDP_IFF: 26
- FDP_IFF.1: 18
- FDP_ITC.1: 12
- FDP_ITC.2: 12
- FDP_RIP: 2
- FDP_RIP.1: 1
- FDP_RIP.2: 8
- FDP_RIP.2.1: 1
- FDP_SDI: 2
- FDP_SDI.1: 1
- FDP_SDI.2: 9
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_AFL: 3
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 3
- FIA_ATD.1: 13
- FIA_ATD.1.1: 1
- FIA_UAU: 5
- FIA_UAU.1: 2
- FIA_UAU.2: 9
- FIA_UAU.2.1: 1
- FIA_UAU.5: 9
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 10
- FIA_UAU.6.1: 1
- FIA_UID: 3
- FIA_UID.1: 8
- FIA_UID.2: 14
- FIA_UID.2.1: 1
- FIA_USB: 3
- FIA_USB.1: 9
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA: 64
- FMT_MSA.1: 9
- FMT_MSA.3: 12
- FMT_SMF: 2
- FMT_SMF.1: 19
- FMT_SMF.1.1: 1
- FMT_SMR: 3
- FMT_SMR.1: 29
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_CON: 6
- FPR_CON.1: 12
- FPR_CON.1.1: 3
- FPR_CON.1.2: 3
- FPR_PSE: 3
- FPR_PSE.1: 8
- FPR_PSE.1.1: 1
- FPR_PSE.1.2: 1
- FPR_PSE.1.3: 1
- FPT:
- FPT_FLS: 3
- FPT_FLS.1: 9
- FPT_FLS.1.1: 2
- FPT_PHP: 3
- FPT_PHP.1: 8
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_RPL: 3
- FPT_RPL.1: 10
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_STM: 3
- FPT_STM.1: 20
- FPT_STM.1.1: 1
- FPT_TST: 3
- FPT_TST.1: 10
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADM_TRAINING: 4
- A.AUDIT_REVIEW: 3
- A.CONFIDENCE: 4
- A.INVALIDATE: 3
- A.NETWORK: 4
- A.NOTIFY: 3
- A.OS: 5
- A.PHYSICAL: 4
- A.PHYSICAL_LOC: 3
- A.USR_TRAINING: 3
- O:
- O.ACCESS_HIST: 13
- O.AUDIT: 13
- O.AUTO_LOGOUT: 10
- O.CMD_ACL: 7
- O.CMD_LOG: 16
- O.DAC: 8
- O.DIG_SIGN: 3
- O.ID_AUTH: 14
- O.LABELLING: 8
- O.LOCK: 8
- O.MAC: 9
- O.MAC_INTEGRITY: 10
- O.MANAGE: 6
- O.MESSAGING: 8
- O.RECOVER: 9
- O.REF_MONITOR: 8
- O.RESOURCE_SHARE: 7
- O.REUSE: 9
- O.ROLES: 10
- O.ROLE_MNG: 7
- O.SELF_TEST: 8
- OE:
- OE.ACCOUNTABLE: 11
- OE.AUDIT: 13
- OE.ID_AUTH: 8
- OE.NETWORK: 17
- OE.PHYSICAL: 1
- OE.TRAF_SEPARATION: 11
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- JH:
- SHA:
- SHA2:
- SHA-256: 3
- SHA-384: 2
- SHA256: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- NIST P-256: 1
- NIST P-384: 1
- P-256: 1
- P-384: 1
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 6
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 4
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 6
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 4
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- malfunction: 3
- physical tampering: 2
|
pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI 7586: 1
- BSI TR-02102-2: 1
- BSI TR-03109: 1
- BSI TR-03109-1: 8
- BSI TR-03109-2: 1
- BSI TR-03109-3: 1
- BSI TR-03109-4: 1
- BSI TR-03111: 1
- BSI TR-03116-3: 1
- BSI TR-03116-4: 1
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- ISO:
- RFC:
|
- BSI:
- FIPS:
- FIPS 140-2: 1
- FIPS 180-4: 3
- FIPS 197: 6
- RFC:
- RFC 2104: 4
- RFC 4493: 5
- RFC 5084: 3
- RFC 5246: 4
- RFC 5289: 4
- RFC 5652: 1
- RFC 5905: 3
- RFC5246: 2
- RFC5905: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
- curves:
- SECP256R1: 1
- SECP384R1: 1
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- MLS environment The protection of the LANs to which the MMHS servers and clients are connected is out of scope of this Security Target. It is assumed that the confidentiality of information is protected using: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
- /Author: Thales Norway AS
- /CreationDate: D:20090430154245+02'00'
- /Creator: PDFCreator Version 0.9.3
- /Keywords:
- /ModDate: D:20090430154245
- /Producer: AFPL Ghostscript 8.13
- /Subject:
- /Title: XOmail Version 14.2 Security Target ed 10-public
- pdf_file_size_bytes: 2346280
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 111
|
- /Author: Dr. Neuhaus Telekommunikation
- /CreationDate: D:20201030160445+01'00'
- /Creator: Microsoft® Office Word 2007
- /Keywords: Smart Meter System,Gateway,Common Criteria,Smart Meter Gateway PP
- /ModDate: D:20201030160445+01'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: Schutzprofil für die Kommunikationseinheit eines intelligenten Messsystems für Stoff- und Energiemengen
- /Title: Protection Profile for the Gateway of a Smart Metering System (Smart Meter Gateway PP)
- pdf_file_size_bytes: 1647828
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 111
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |