STARCOS 3.4 Health eGK C1

CSV information ?

Status archived
Valid from 30.04.2009
Valid until 01.09.2019
Scheme 🇩🇪 DE
Manufacturer G+D Mobile Security GmbH
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_DVS.2, EAL4+, AVA_VLA.4, AVA_MSU.3
Maintenance updates STARCOS 3.4 Health eGK C2 (20.08.2009) Certification report Security target
STARCOS 3.4 Health eGK C3 (14.09.2010) Certification report Security target
STARCOS 3.4 Health eGK C4 (19.07.2011) Certification report Security target

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0533-2009

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
DES, Triple-DES
Asymmetric Algorithms
RSA 2048
Hash functions
SHA-256
Randomness
RNG

Operating System name
STARCOS 3
Vendor
NXP, Giesecke & Devrient, G&D

Security level
EAL 4, EAL4, EAL 1, EAL 7, EAL5+, EAL1, EAL3, EAL5, EAL7, EAL2, EAL6, EAL 4 augmented
Security Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ADO_DEL, ADO_IGS, ADO_DEL.2, ADO_IGS.1, ADV_IMP.2, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM, AGD_USR, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_FUN, ATE_IND, ATE_COV, ATE_DPT, AVA_MSU.3, AVA_VLA.4, AVA_VLA, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA.2, AVA_VLA.3, APE_DES, APE_ENV, APE_INT, APE_OBJ, APE_REQ, APE_SRE, ASE_DES, ASE_ENV, ASE_INT, ASE_OBJ, ASE_PPC, ASE_REQ, ASE_SRE, ASE_TSS
Protection profiles
BSI-PP-0020-V2-2007-, BSI-PP-0020-V2-2007-MA02
Certificates
BSI-DSZ-CC-0533-2009, BSI-DSZ-CC-0406-2007, BSI-DSZ-CC-0410-2007-MA-04, BSI-DSZ-CC-430-2008, BSI-DSZ-CC-0410-2007
Evaluation facilities
TÃœV Informationstechnik
Certification process
Version 1.0, 16.04.2009, Security Target STARCOS 3.4 Health eGK C1, Giesecke & Devrient GmbH (confidential document) [7] Evaluation Technical Report, Version 3, 23.04.2009, Evaluation Technikal Report for STARCOS 3, Health eGK C1, TÃœV Informationstechnik GmbH (confidential document) [8] Configuration list for the TOE, Version 1.7, 16.04.2009, Configuration List STARCOS 3.4 Health, C1 (confidential document) [9] Security Target BSI-DSZ-CC-0533-2009, Version 1.0, 16.04.2009, Security Target Lite STARCOS 3, P5CD080V0B Secure Smart Card Controller, Version 1.1, 23.04.2008, BSI-DSZ-CC-430-2008, T-Systems (confidential document) [12] Certification Report for NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B and

Side-channel analysis
DPA, SPA, physical tampering, malfunction, DFA, JIL
Certification process
Version 1.0, 16.04.2009, Security Target STARCOS 3.4 Health eGK C1, Giesecke & Devrient GmbH (confidential document) [7] Evaluation Technical Report, Version 3, 23.04.2009, Evaluation Technikal Report for STARCOS 3, Health eGK C1, TÃœV Informationstechnik GmbH (confidential document) [8] Configuration list for the TOE, Version 1.7, 16.04.2009, Configuration List STARCOS 3.4 Health, C1 (confidential document) [9] Security Target BSI-DSZ-CC-0533-2009, Version 1.0, 16.04.2009, Security Target Lite STARCOS 3, P5CD080V0B Secure Smart Card Controller, Version 1.1, 23.04.2008, BSI-DSZ-CC-430-2008, T-Systems (confidential document) [12] Certification Report for NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B and

Standards
FIPS 180-2, FIPS PUB 46-3, AIS 34, AIS 31, AIS 1, AIS 14, AIS 19, AIS 25, AIS 26, AIS 36, AIS 37, AIS38, AIS 20, AIS20, AIS31, AIS 35, AIS 32, AIS 38, ISO/IEC 15408:2005
Technical reports
BSI TR-03116, BSI 7125, BSI 7148, BSI 7149

File metadata

Title Certification Report BSI-DSZ-CC-0533-2009
Subject Common Criteria Zertifizierung
Keywords "STARCOS 3.4 Health eGK C1, Giesecke & Devrient GmbH, Common Criteria, Zertifizierung, Certification"
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20090512075200+02'00'
Modification date D:20090518112427+02'00'
Pages 38
Creator Writer
Producer StarOffice 9

Frontpage

Certificate ID BSI-DSZ-CC-0533-2009
Certified item STARCOS 3.4 Health eGK C1
Certification lab BSI
Developer Giesecke & Devrient GmbH

References

Outgoing
  • BSI-DSZ-CC-0406-2007 - archived - STARCOS 3.2 eGK Version 1.0
  • BSI-DSZ-CC-0410-2007 - archived - NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B and P5CC080V0B each with specific IC Dedicated Software

Security target ?

Extracted keywords

Symmetric Algorithms
AES, HPC, DES, Triple-DES, TDES, 3-DES
Asymmetric Algorithms
RSA2048
Hash functions
SHA-256, SHA-224, SHA-2
Schemes
MAC
Protocols
SSL
Randomness
TRNG
Block cipher modes
CBC

Operating System name
STARCOS 3
Vendor
NXP, NXP Semiconductors, Giesecke & Devrient, G&D

Security level
EAL4, EAL4 augmented
Security Assurance Requirements (SAR)
ADO_IGS.1, ADV_IMP.2, ADV_SPM.1, ADV_LLD.1, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ADV_IMP.1, AGD_ADM.1, AGD_USR.1, ALC_TAT.1, AVA_MSU.3, AVA_VLA.4
Security Functional Requirements (SFR)
FCS_RND, FCS_RND.1, FCS_RND.1.1, FCS_CKM.1, FCS_CKM, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF, FDP_ITC.1, FDP_ITC.2, FDP_ACC.2, FDP_ACF.1, FDP_UCT.1, FDP_ACC.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1, FDP_RIP, FDP_RIP.1.1, FDP_SDI.2, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_UIT.1, FDP_UCT.1.1, FDP_IFC.1, FDP_UIT.1.1, FDP_UIT.1.2, FIA_UAU.4, FIA_AFL.1, FIA_AFL, FIA_UAU.1, FIA_ATD.1, FIA_ATD.1.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_MSA.2, FMT_MTD.1, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_LIM.2.1, FMT_MTD, FMT_MSA.1, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_RVM.1, FPT_SEP.1, FPT_FLS.1.1, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_AMT.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3
Protection profiles
BSI-PP-0020-V2_5-2008, BSI-PP-0002, BSI-PP-****, BSI-PP-0005-, BSI-PP-0006-2002T, BSI-PP-0002-2001
Certificates
BSI-DSZ-CC-0410-2007, BSI-DSZ-CC-0410-2007-MA-04, CC-0410-2007
Certification process
out of scope, FDP_ACF.1 Note by the ST-author 32: Keys and other data for creation of qualified signatures are out of scope of this Security Target. The TOE shall meet the requirement “Security attribute based access

Side-channel analysis
physical probing, side channels, side channel, DPA, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineering, Bleichenbacher attack
Certification process
out of scope, FDP_ACF.1 Note by the ST-author 32: Keys and other data for creation of qualified signatures are out of scope of this Security Target. The TOE shall meet the requirement “Security attribute based access

Standards
FIPS PUB 46-3, AIS20, AIS31, AIS 20, ISO/IEC 7816-4, X.509, CCMB-2005-08-001, CCMB-2005-08-002, CCIMB-2005-08-001, CCIMB-2005-08-002, CCIMB-2005-08-003, CCIMB-2005-08-004
Technical reports
BSI TR-03116

File metadata

Title Security Target Lite, STARCOS 3.4 Health eGK C1
Keywords Common Criteria; CC; eGK; Gesundheitskarte; Giesecke & Devrient; G&D
Author Giesecke & Devrient GmbH
Creation date D:20090416131128+02'00'
Modification date D:20090514102835+02'00'
Pages 108
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 7.0 (Windows)

References

Outgoing
  • BSI-DSZ-CC-0410-2007 - archived - NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B and P5CC080V0B each with specific IC Dedicated Software

Heuristics ?

Certificate ID: BSI-DSZ-CC-0533-2009

Extracted SARs

AVA_MSU.3, ADV_FSP.1, ADV_HLD.2, ALC_TAT.1, ALC_DVS.2, ADV_SPM.1, ADV_LLD.1, AVA_VLA.4, AGD_USR.1, ADV_IMP.2, ADV_RCR.1, ALC_LCD.1, AGD_ADM.1

References ?

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ea174f4386fc672773bfe8f5513fa0adf89c86f32cfa3af5856c63727d1ce08b', 'txt_hash': '159e61f55403a1090919c77d1db3981b41761497062def59a0fddeefd2d09e06'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '9675a981d592a4172fbeb40eae302556f512ef5303e9f59e5f2851204065e0aa', 'txt_hash': 'e72a4f2d924de51f94a277aa788814809aa3f06688a9432a09518716dfbd927c'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 403782, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 38, '/CreationDate': "D:20090512075200+02'00'", '/Subject': 'Common Criteria Zertifizierung', '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/Creator': 'Writer', '/Keywords': '"STARCOS 3.4 Health eGK C1, Giesecke & Devrient GmbH, Common Criteria, Zertifizierung, Certification"', '/Producer': 'StarOffice 9', '/ModDate': "D:20090518112427+02'00'", '/Title': 'Certification Report BSI-DSZ-CC-0533-2009', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.bsi.bund.de/', 'https://certificates.gi-de.com/']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 382562, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 108, '/Author': 'Giesecke & Devrient GmbH', '/CreationDate': "D:20090416131128+02'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/Keywords': 'Common Criteria; CC; eGK; Gesundheitskarte; Giesecke & Devrient; G&D', '/ModDate': "D:20090514102835+02'00'", '/Producer': 'Acrobat Distiller 7.0 (Windows)', '/Title': 'Security Target Lite, STARCOS 3.4 Health eGK C1', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0533-2009', 'cert_item': 'STARCOS 3.4 Health eGK C1', 'developer': 'Giesecke & Devrient GmbH', 'cert_lab': 'BSI'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0533-2009': 22, 'BSI-DSZ-CC-0406-2007': 3, 'BSI-DSZ-CC-0410-2007-MA-04': 1, 'BSI-DSZ-CC-430-2008': 1, 'BSI-DSZ-CC-0410-2007': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0020-V2-2007-': 2, 'BSI-PP-0020-V2-2007-MA02': 2}}, 'cc_security_level': {'EAL': {'EAL 4': 9, 'EAL4': 7, 'EAL 1': 1, 'EAL 7': 1, 'EAL5+': 1, 'EAL1': 5, 'EAL3': 4, 'EAL5': 6, 'EAL7': 4, 'EAL2': 3, 'EAL6': 3, 'EAL 4 augmented': 3}}, 'cc_sar': {'ACM': {'ACM_AUT': 2, 'ACM_CAP': 2, 'ACM_SCP': 2, 'ACM_AUT.1': 1, 'ACM_CAP.4': 1, 'ACM_SCP.2': 1}, 'ADO': {'ADO_DEL': 2, 'ADO_IGS': 2, 'ADO_DEL.2': 1, 'ADO_IGS.1': 1}, 'ADV': {'ADV_IMP.2': 5, 'ADV_FSP': 2, 'ADV_HLD': 2, 'ADV_IMP': 2, 'ADV_INT': 2, 'ADV_LLD': 2, 'ADV_RCR': 2, 'ADV_SPM': 2}, 'AGD': {'AGD_ADM': 2, 'AGD_USR': 2}, 'ALC': {'ALC_DVS': 2, 'ALC_FLR': 2, 'ALC_LCD': 1, 'ALC_TAT': 2, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_FUN': 4, 'ATE_IND': 5, 'ATE_COV': 2, 'ATE_DPT': 2}, 'AVA': {'AVA_MSU.3': 5, 'AVA_VLA.4': 6, 'AVA_VLA': 6, 'AVA_CCA': 2, 'AVA_MSU': 2, 'AVA_SOF': 3, 'AVA_VLA.2': 1, 'AVA_VLA.3': 1}, 'APE': {'APE_DES': 1, 'APE_ENV': 1, 'APE_INT': 1, 'APE_OBJ': 1, 'APE_REQ': 1, 'APE_SRE': 1}, 'ASE': {'ASE_DES': 1, 'ASE_ENV': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_PPC': 1, 'ASE_REQ': 1, 'ASE_SRE': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP': 7}, 'GD': {'Giesecke & Devrient': 19, 'G&D': 2}}, 'eval_facility': {'TUV': {'TÃœV Informationstechnik': 3}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}, '3DES': {'Triple-DES': 2}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 1}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'DPA': 1, 'SPA': 1}, 'FI': {'physical tampering': 1, 'malfunction': 1, 'DFA': 1}, 'other': {'JIL': 5}}, 'technical_report_id': {'BSI': {'BSI TR-03116': 2, 'BSI 7125': 2, 'BSI 7148': 1, 'BSI 7149': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {'STARCOS': {'STARCOS 3': 37}}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 180-2': 1, 'FIPS PUB 46-3': 1}, 'BSI': {'AIS 34': 4, 'AIS 31': 2, 'AIS 1': 1, 'AIS 14': 1, 'AIS 19': 1, 'AIS 25': 2, 'AIS 26': 3, 'AIS 36': 3, 'AIS 37': 1, 'AIS38': 1, 'AIS 20': 2, 'AIS20': 1, 'AIS31': 1, 'AIS 35': 2, 'AIS 32': 1, 'AIS 38': 1}, 'ISO': {'ISO/IEC 15408:2005': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'Version 1.0, 16.04.2009, Security Target STARCOS 3.4 Health eGK C1, Giesecke & Devrient GmbH (confidential document) [7] Evaluation Technical Report, Version 3, 23.04.2009, Evaluation Technikal Report for STARCOS 3': 1, 'Health eGK C1, TÃœV Informationstechnik GmbH (confidential document) [8] Configuration list for the TOE, Version 1.7, 16.04.2009, Configuration List STARCOS 3.4 Health': 1, 'C1 (confidential document) [9] Security Target BSI-DSZ-CC-0533-2009, Version 1.0, 16.04.2009, Security Target Lite STARCOS 3': 1, 'P5CD080V0B Secure Smart Card Controller, Version 1.1, 23.04.2008, BSI-DSZ-CC-430-2008, T-Systems (confidential document) [12] Certification Report for NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B and': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0410-2007': 2, 'BSI-DSZ-CC-0410-2007-MA-04': 1}, 'NL': {'CC-0410-2007': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0020-V2_5-2008': 1, 'BSI-PP-0002': 2, 'BSI-PP-****': 1, 'BSI-PP-0005-': 1, 'BSI-PP-0006-2002T': 1, 'BSI-PP-0002-2001': 1}}, 'cc_security_level': {'EAL': {'EAL4': 11, 'EAL4 augmented': 2}}, 'cc_sar': {'ADO': {'ADO_IGS.1': 1}, 'ADV': {'ADV_IMP.2': 6, 'ADV_SPM.1': 2, 'ADV_LLD.1': 2, 'ADV_RCR.1': 1, 'ADV_FSP.1': 2, 'ADV_HLD.2': 1, 'ADV_IMP.1': 1}, 'AGD': {'AGD_ADM.1': 2, 'AGD_USR.1': 2}, 'ALC': {'ALC_TAT.1': 1}, 'AVA': {'AVA_MSU.3': 5, 'AVA_VLA.4': 6}}, 'cc_sfr': {'FCS': {'FCS_RND': 9, 'FCS_RND.1': 13, 'FCS_RND.1.1': 4, 'FCS_CKM.1': 24, 'FCS_CKM': 7, 'FCS_CKM.2': 2, 'FCS_COP.1': 27, 'FCS_CKM.4': 26, 'FCS_CKM.4.1': 3, 'FCS_COP': 44}, 'FDP': {'FDP_ACC.2.1': 4, 'FDP_ACC.2.2': 4, 'FDP_ACF': 1, 'FDP_ITC.1': 16, 'FDP_ITC.2': 15, 'FDP_ACC.2': 12, 'FDP_ACF.1': 13, 'FDP_UCT.1': 11, 'FDP_ACC.1': 7, 'FDP_ACF.1.1': 3, 'FDP_ACF.1.2': 3, 'FDP_ACF.1.3': 3, 'FDP_ACF.1.4': 3, 'FDP_RIP.1': 11, 'FDP_RIP': 14, 'FDP_RIP.1.1': 2, 'FDP_SDI.2': 5, 'FDP_SDI.1': 2, 'FDP_SDI.2.1': 3, 'FDP_SDI.2.2': 3, 'FDP_UIT.1': 6, 'FDP_UCT.1.1': 3, 'FDP_IFC.1': 4, 'FDP_UIT.1.1': 3, 'FDP_UIT.1.2': 3}, 'FIA': {'FIA_UAU.4': 8, 'FIA_AFL.1': 25, 'FIA_AFL': 42, 'FIA_UAU.1': 14, 'FIA_ATD.1': 7, 'FIA_ATD.1.1': 3, 'FIA_UID.1': 8, 'FIA_UID.1.1': 3, 'FIA_UID.1.2': 3, 'FIA_UAU.1.1': 3, 'FIA_UAU.1.2': 3, 'FIA_UAU.4.1': 3}, 'FMT': {'FMT_LIM': 6, 'FMT_LIM.1': 20, 'FMT_LIM.2': 19, 'FMT_LIM.1.1': 4, 'FMT_MSA.2': 19, 'FMT_MTD.1': 19, 'FMT_MSA.3': 2, 'FMT_SMF.1': 19, 'FMT_SMR.1': 19, 'FMT_SMF.1.1': 3, 'FMT_SMR.1.1': 3, 'FMT_SMR.1.2': 3, 'FMT_LIM.2.1': 3, 'FMT_MTD': 27, 'FMT_MSA.1': 1}, 'FPT': {'FPT_FLS.1': 9, 'FPT_TST.1': 11, 'FPT_PHP.3': 9, 'FPT_RVM.1': 10, 'FPT_SEP.1': 10, 'FPT_FLS.1.1': 3, 'FPT_PHP.3.1': 3, 'FPT_TST.1.1': 3, 'FPT_TST.1.2': 3, 'FPT_TST.1.3': 3, 'FPT_AMT.1': 2, 'FPT_RVM.1.1': 3, 'FPT_SEP.1.1': 3, 'FPT_SEP.1.2': 3}, 'FTP': {'FTP_ITC.1': 14, 'FTP_TRP.1': 4, 'FTP_ITC.1.1': 3, 'FTP_ITC.1.2': 3, 'FTP_ITC.1.3': 3}}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP': 10, 'NXP Semiconductors': 2}, 'GD': {'Giesecke & Devrient': 8, 'G&D': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}, 'HPC': {'HPC': 16}}, 'DES': {'DES': {'DES': 1}, '3DES': {'Triple-DES': 3, 'TDES': 3, '3-DES': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA2048': 1}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 1, 'SHA-224': 1, 'SHA-2': 5}}}, 'crypto_scheme': {'MAC': {'MAC': 16}}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}}}, 'randomness': {'TRNG': {'TRNG': 1}}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 5, 'side channels': 2, 'side channel': 1, 'DPA': 1}, 'FI': {'Physical Tampering': 2, 'physical tampering': 7, 'Physical tampering': 1, 'Malfunction': 3, 'malfunction': 4, 'fault injection': 1}, 'other': {'reverse engineering': 1, 'Bleichenbacher attack': 1}}, 'technical_report_id': {'BSI': {'BSI TR-03116': 2}}, 'device_model': {}, 'tee_name': {}, 'os_name': {'STARCOS': {'STARCOS 3': 16}}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 1}, 'BSI': {'AIS20': 2, 'AIS31': 2, 'AIS 20': 1}, 'ISO': {'ISO/IEC 7816-4': 1}, 'X509': {'X.509': 6}, 'CC': {'CCMB-2005-08-001': 1, 'CCMB-2005-08-002': 1, 'CCIMB-2005-08-001': 1, 'CCIMB-2005-08-002': 1, 'CCIMB-2005-08-003': 1, 'CCIMB-2005-08-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'FDP_ACF.1 Note by the ST-author 32: Keys and other data for creation of qualified signatures are out of scope of this Security Target. The TOE shall meet the requirement “Security attribute based access': 1}}}.
    • The report_filename property was set to 0533a.pdf.
    • The st_filename property was set to 0533b.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-0533-2009.
    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0410-2007']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0410-2007']}} data.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0406-2007', 'BSI-DSZ-CC-0410-2007']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0169-2002', 'BSI-DSZ-CC-0406-2007', 'BSI-DSZ-CC-0410-2007', 'BSI-DSZ-CC-0322-2005', 'BSI-DSZ-CC-0404-2007', 'BSI-DSZ-CC-0266-2005', 'BSI-DSZ-CC-0223-2003']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0533a.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0533b.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0410-2007']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0169-2002', 'BSI-DSZ-CC-0410-2007', 'BSI-DSZ-CC-0322-2005', 'BSI-DSZ-CC-0404-2007', 'BSI-DSZ-CC-0266-2005', 'BSI-DSZ-CC-0223-2003']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name STARCOS 3.4 Health eGK C1 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "14a5c53ecf382027",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0533-2009",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "3.4"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0406-2007",
          "BSI-DSZ-CC-0410-2007"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0322-2005",
          "BSI-DSZ-CC-0404-2007",
          "BSI-DSZ-CC-0223-2003",
          "BSI-DSZ-CC-0169-2002",
          "BSI-DSZ-CC-0406-2007",
          "BSI-DSZ-CC-0410-2007",
          "BSI-DSZ-CC-0266-2005"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0410-2007"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0410-2007"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2011-07-19",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0533_ma3a_pdf.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0533_ma3b_pdf.pdf",
        "maintenance_title": "STARCOS 3.4 Health eGK C4"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2010-09-14",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0533_ma2a_pdf.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0533_ma2b_pdf.pdf",
        "maintenance_title": "STARCOS 3.4 Health eGK C3"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2009-08-20",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0533_ma1a_pdf.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0533_ma1b_pdf.pdf",
        "maintenance_title": "STARCOS 3.4 Health eGK C2"
      }
    ]
  },
  "manufacturer": "G+D Mobile Security GmbH",
  "manufacturer_web": "https://www.gi-de.com/de/de/mobile-security/",
  "name": "STARCOS 3.4 Health eGK C1",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2009-04-30",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "0533a.pdf",
    "report_frontpage": {
      "DE": {
        "cert_id": "BSI-DSZ-CC-0533-2009",
        "cert_item": "STARCOS 3.4 Health eGK C1",
        "cert_lab": "BSI",
        "developer": "Giesecke \u0026 Devrient GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ]
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "RSA": {
          "RSA 2048": 1
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0406-2007": 3,
          "BSI-DSZ-CC-0410-2007": 1,
          "BSI-DSZ-CC-0410-2007-MA-04": 1,
          "BSI-DSZ-CC-0533-2009": 22,
          "BSI-DSZ-CC-430-2008": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0020-V2-2007-": 2,
          "BSI-PP-0020-V2-2007-MA02": 2
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 2,
          "ACM_AUT.1": 1,
          "ACM_CAP": 2,
          "ACM_CAP.4": 1,
          "ACM_SCP": 2,
          "ACM_SCP.2": 1
        },
        "ADO": {
          "ADO_DEL": 2,
          "ADO_DEL.2": 1,
          "ADO_IGS": 2,
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_FSP": 2,
          "ADV_HLD": 2,
          "ADV_IMP": 2,
          "ADV_IMP.2": 5,
          "ADV_INT": 2,
          "ADV_LLD": 2,
          "ADV_RCR": 2,
          "ADV_SPM": 2
        },
        "AGD": {
          "AGD_ADM": 2,
          "AGD_USR": 2
        },
        "ALC": {
          "ALC_DVS": 2,
          "ALC_DVS.1": 1,
          "ALC_FLR": 2,
          "ALC_LCD": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT": 2,
          "ALC_TAT.1": 1
        },
        "APE": {
          "APE_DES": 1,
          "APE_ENV": 1,
          "APE_INT": 1,
          "APE_OBJ": 1,
          "APE_REQ": 1,
          "APE_SRE": 1
        },
        "ASE": {
          "ASE_DES": 1,
          "ASE_ENV": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_PPC": 1,
          "ASE_REQ": 1,
          "ASE_SRE": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 2,
          "ATE_DPT": 2,
          "ATE_FUN": 4,
          "ATE_IND": 5
        },
        "AVA": {
          "AVA_CCA": 2,
          "AVA_MSU": 2,
          "AVA_MSU.3": 5,
          "AVA_SOF": 3,
          "AVA_VLA": 6,
          "AVA_VLA.2": 1,
          "AVA_VLA.3": 1,
          "AVA_VLA.4": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 4": 9,
          "EAL 4 augmented": 3,
          "EAL 7": 1,
          "EAL1": 5,
          "EAL2": 3,
          "EAL3": 4,
          "EAL4": 7,
          "EAL5": 6,
          "EAL5+": 1,
          "EAL6": 3,
          "EAL7": 4
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "C1 (confidential document) [9] Security Target BSI-DSZ-CC-0533-2009, Version 1.0, 16.04.2009, Security Target Lite STARCOS 3": 1,
          "Health eGK C1, T\u00dcV Informationstechnik GmbH (confidential document) [8] Configuration list for the TOE, Version 1.7, 16.04.2009, Configuration List STARCOS 3.4 Health": 1,
          "P5CD080V0B Secure Smart Card Controller, Version 1.1, 23.04.2008, BSI-DSZ-CC-430-2008, T-Systems (confidential document) [12] Certification Report for NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B and": 1,
          "Version 1.0, 16.04.2009, Security Target STARCOS 3.4 Health eGK C1, Giesecke \u0026 Devrient GmbH (confidential document) [7] Evaluation Technical Report, Version 3, 23.04.2009, Evaluation Technikal Report for STARCOS 3": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 3
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "STARCOS": {
          "STARCOS 3": 37
        }
      },
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1,
          "malfunction": 1,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 1,
          "SPA": 1
        },
        "other": {
          "JIL": 5
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 1": 1,
          "AIS 14": 1,
          "AIS 19": 1,
          "AIS 20": 2,
          "AIS 25": 2,
          "AIS 26": 3,
          "AIS 31": 2,
          "AIS 32": 1,
          "AIS 34": 4,
          "AIS 35": 2,
          "AIS 36": 3,
          "AIS 37": 1,
          "AIS 38": 1,
          "AIS20": 1,
          "AIS31": 1,
          "AIS38": 1
        },
        "FIPS": {
          "FIPS 180-2": 1,
          "FIPS PUB 46-3": 1
        },
        "ISO": {
          "ISO/IEC 15408:2005": 3
        }
      },
      "symmetric_crypto": {
        "DES": {
          "3DES": {
            "Triple-DES": 2
          },
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7125": 2,
          "BSI 7148": 1,
          "BSI 7149": 1,
          "BSI TR-03116": 2
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "GD": {
          "G\u0026D": 2,
          "Giesecke \u0026 Devrient": 19
        },
        "NXP": {
          "NXP": 7
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20090512075200+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"STARCOS 3.4 Health eGK C1, Giesecke \u0026 Devrient GmbH, Common Criteria, Zertifizierung, Certification\"",
      "/ModDate": "D:20090518112427+02\u002700\u0027",
      "/Producer": "StarOffice 9",
      "/Subject": "Common Criteria Zertifizierung",
      "/Title": "Certification Report BSI-DSZ-CC-0533-2009",
      "pdf_file_size_bytes": 403782,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.bsi.bund.de/",
          "https://certificates.gi-de.com/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 38
    },
    "st_filename": "0533b.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "RSA": {
          "RSA2048": 1
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0410-2007": 2,
          "BSI-DSZ-CC-0410-2007-MA-04": 1
        },
        "NL": {
          "CC-0410-2007": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-****": 1,
          "BSI-PP-0002": 2,
          "BSI-PP-0002-2001": 1,
          "BSI-PP-0005-": 1,
          "BSI-PP-0006-2002T": 1,
          "BSI-PP-0020-V2_5-2008": 1
        }
      },
      "cc_sar": {
        "ADO": {
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_FSP.1": 2,
          "ADV_HLD.2": 1,
          "ADV_IMP.1": 1,
          "ADV_IMP.2": 6,
          "ADV_LLD.1": 2,
          "ADV_RCR.1": 1,
          "ADV_SPM.1": 2
        },
        "AGD": {
          "AGD_ADM.1": 2,
          "AGD_USR.1": 2
        },
        "ALC": {
          "ALC_TAT.1": 1
        },
        "AVA": {
          "AVA_MSU.3": 5,
          "AVA_VLA.4": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 11,
          "EAL4 augmented": 2
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM": 7,
          "FCS_CKM.1": 24,
          "FCS_CKM.2": 2,
          "FCS_CKM.4": 26,
          "FCS_CKM.4.1": 3,
          "FCS_COP": 44,
          "FCS_COP.1": 27,
          "FCS_RND": 9,
          "FCS_RND.1": 13,
          "FCS_RND.1.1": 4
        },
        "FDP": {
          "FDP_ACC.1": 7,
          "FDP_ACC.2": 12,
          "FDP_ACC.2.1": 4,
          "FDP_ACC.2.2": 4,
          "FDP_ACF": 1,
          "FDP_ACF.1": 13,
          "FDP_ACF.1.1": 3,
          "FDP_ACF.1.2": 3,
          "FDP_ACF.1.3": 3,
          "FDP_ACF.1.4": 3,
          "FDP_IFC.1": 4,
          "FDP_ITC.1": 16,
          "FDP_ITC.2": 15,
          "FDP_RIP": 14,
          "FDP_RIP.1": 11,
          "FDP_RIP.1.1": 2,
          "FDP_SDI.1": 2,
          "FDP_SDI.2": 5,
          "FDP_SDI.2.1": 3,
          "FDP_SDI.2.2": 3,
          "FDP_UCT.1": 11,
          "FDP_UCT.1.1": 3,
          "FDP_UIT.1": 6,
          "FDP_UIT.1.1": 3,
          "FDP_UIT.1.2": 3
        },
        "FIA": {
          "FIA_AFL": 42,
          "FIA_AFL.1": 25,
          "FIA_ATD.1": 7,
          "FIA_ATD.1.1": 3,
          "FIA_UAU.1": 14,
          "FIA_UAU.1.1": 3,
          "FIA_UAU.1.2": 3,
          "FIA_UAU.4": 8,
          "FIA_UAU.4.1": 3,
          "FIA_UID.1": 8,
          "FIA_UID.1.1": 3,
          "FIA_UID.1.2": 3
        },
        "FMT": {
          "FMT_LIM": 6,
          "FMT_LIM.1": 20,
          "FMT_LIM.1.1": 4,
          "FMT_LIM.2": 19,
          "FMT_LIM.2.1": 3,
          "FMT_MSA.1": 1,
          "FMT_MSA.2": 19,
          "FMT_MSA.3": 2,
          "FMT_MTD": 27,
          "FMT_MTD.1": 19,
          "FMT_SMF.1": 19,
          "FMT_SMF.1.1": 3,
          "FMT_SMR.1": 19,
          "FMT_SMR.1.1": 3,
          "FMT_SMR.1.2": 3
        },
        "FPT": {
          "FPT_AMT.1": 2,
          "FPT_FLS.1": 9,
          "FPT_FLS.1.1": 3,
          "FPT_PHP.3": 9,
          "FPT_PHP.3.1": 3,
          "FPT_RVM.1": 10,
          "FPT_RVM.1.1": 3,
          "FPT_SEP.1": 10,
          "FPT_SEP.1.1": 3,
          "FPT_SEP.1.2": 3,
          "FPT_TST.1": 11,
          "FPT_TST.1.1": 3,
          "FPT_TST.1.2": 3,
          "FPT_TST.1.3": 3
        },
        "FTP": {
          "FTP_ITC.1": 14,
          "FTP_ITC.1.1": 3,
          "FTP_ITC.1.2": 3,
          "FTP_ITC.1.3": 3,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {
        "OutOfScope": {
          "FDP_ACF.1 Note by the ST-author 32: Keys and other data for creation of qualified signatures are out of scope of this Security Target. The TOE shall meet the requirement \u201cSecurity attribute based access": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 1
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 16
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-2": 5,
            "SHA-224": 1,
            "SHA-256": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "STARCOS": {
          "STARCOS 3": 16
        }
      },
      "pq_crypto": {},
      "randomness": {
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 3,
          "Physical Tampering": 2,
          "Physical tampering": 1,
          "fault injection": 1,
          "malfunction": 4,
          "physical tampering": 7
        },
        "SCA": {
          "DPA": 1,
          "physical probing": 5,
          "side channel": 1,
          "side channels": 2
        },
        "other": {
          "Bleichenbacher attack": 1,
          "reverse engineering": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 1,
          "AIS20": 2,
          "AIS31": 2
        },
        "CC": {
          "CCIMB-2005-08-001": 1,
          "CCIMB-2005-08-002": 1,
          "CCIMB-2005-08-003": 1,
          "CCIMB-2005-08-004": 1,
          "CCMB-2005-08-001": 1,
          "CCMB-2005-08-002": 1
        },
        "FIPS": {
          "FIPS PUB 46-3": 1
        },
        "ISO": {
          "ISO/IEC 7816-4": 1
        },
        "X509": {
          "X.509": 6
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          },
          "HPC": {
            "HPC": 16
          }
        },
        "DES": {
          "3DES": {
            "3-DES": 1,
            "TDES": 3,
            "Triple-DES": 3
          },
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03116": 2
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "GD": {
          "G\u0026D": 1,
          "Giesecke \u0026 Devrient": 8
        },
        "NXP": {
          "NXP": 10,
          "NXP Semiconductors": 2
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Giesecke \u0026 Devrient GmbH",
      "/CreationDate": "D:20090416131128+02\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/Keywords": "Common Criteria; CC; eGK; Gesundheitskarte; Giesecke \u0026 Devrient; G\u0026D",
      "/ModDate": "D:20090514102835+02\u002700\u0027",
      "/Producer": "Acrobat Distiller 7.0 (Windows)",
      "/Title": "Security Target Lite, STARCOS 3.4 Health eGK C1",
      "pdf_file_size_bytes": 382562,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 108
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0533a.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "AVA_MSU.3",
      "AVA_VLA.4",
      "ALC_DVS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0533b.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "ea174f4386fc672773bfe8f5513fa0adf89c86f32cfa3af5856c63727d1ce08b",
      "txt_hash": "159e61f55403a1090919c77d1db3981b41761497062def59a0fddeefd2d09e06"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "9675a981d592a4172fbeb40eae302556f512ef5303e9f59e5f2851204065e0aa",
      "txt_hash": "e72a4f2d924de51f94a277aa788814809aa3f06688a9432a09518716dfbd927c"
    }
  },
  "status": "archived"
}