Smart card reader SPR332 firmware version 6.01

CSV information

Status archived
Valid from 19.02.2010
Valid until 01.09.2019
Scheme 🇩🇪 DE
Manufacturer SCM Microsystems GmbH
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL3+

Heuristics summary

Certificate ID: BSI-DSZ-CC-0592-2010

Certificate

certificate could not be downloaded, no link is available.

Certification report

Extracted keywords

Asymmetric Algorithms
RSA-2048
Hash functions
SHA-256

Security level
EAL 3, EAL 4, EAL4, EAL 1, EAL 7, EAL3, EAL3+, EAL5+, EAL1, EAL5, EAL7, EAL2, EAL6, EAL 3 augmented, EAL3 augmented
Security Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL.2, ADO_DEL, ADO_IGS, ADV_IMP.1, ADV_LLD.1, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM, AGD_USR, ALC_TAT.1, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_VLA.4, AVA_VAN.4, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA, AVA_VLA.2, AVA_VLA.3, APE_DES, APE_ENV, APE_INT, APE_OBJ, APE_REQ, APE_SRE, ASE_DES, ASE_ENV, ASE_INT, ASE_OBJ, ASE_PPC, ASE_REQ, ASE_SRE, ASE_TSS
Certificates
BSI-DSZ-CC-0592-2010, BSI-DSZ-CC-0394-2006, BSI-DSZ-CC-0592
Evaluation facilities
TÜV Informationstechnik

Certification process
Report, Version 5, 2009-12-15, EVALUATION TECHNICAL REPORT (ETR), TÜV Informationstechnik GmbH (confidential document) [8] Configuration list for the TOE, Version 3.10, 2009-08-28, Configuration Item Record

Standards
AIS 34, AIS 38, ISO/IEC 7816-4, ISO/IEC 7816-8, ISO/IEC 15408:2005
Technical reports
BSI 7125, BSI 7148, BSI 7149

File metadata

Title Certification Report BSI-DSZ-CC-0592-2010
Subject Common Criteria Certification
Keywords "SCM Microsystems GmbH, smart card reader SPR332 firmware version 6.01, class 2 smart card reader"
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20100308113143+01'00'
Modification date D:20100309113000+01'00'
Pages 34
Creator Writer
Producer OpenOffice.org 3.1

Frontpage

Certificate ID BSI-DSZ-CC-0592-2010
Certified item Smart card reader SPR332 firmware version 6.01
Certification lab BSI
Developer SCM Microsystems GmbH

References

Outgoing

Security target

Extracted keywords

Hash functions
SHA-256

Security level
EAL3+, EAL3
Claims
O.REVEAL, O.SIGNAL, O.INS_BYTE, O.SEAL, O.TRANSFER, O.STORE, O.DOWNLOAD, T.REVEAL, T.STORE, T.DOWNLOAD, T.SEAL, OP.P_ENTRY, OP.L_CONTROL, OP.F_DOWNLD, OP.P_VERIFY, OE.LED, OE.SEAL, OE.FWLOAD, OE.VERSION, OE.STORE, OE.USAGE, OE.UNOBSERV, OE.KEYPAD, OE.ISO_EMV, OE.SIG_APP
Security Assurance Requirements (SAR)
ACM_CAP.3, ACM_SCP.1, ADO_DEL.2, ADO_IGS.1, ADV_IMP.1, ADV_LLD.1, ADV_FSP.1, ADV_HLD.2, ADV_RCR.1, ADV_IMP, AGD_ADM.1, AGD_USR.1, ALC_TAT.1, ALC_DVS.1, ALC_TAT, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.3, AVA_VLA.4, AVA_MSU, AVA_SOF.1
Security Functional Requirements (SFR)
FCS_COP, FCS_CKM.1, FCS_CKM.4, FDP_ACC, FDP_ACF, FDP_ACF.1, FDP_RIP, FDP_ACC.1, FDP_RIP.2, FDP_ITC.1, FMT_MSA.2, FMT_MSA.3, FMT_MOF.1, FPT_PHP, FPT_PHP.1, FTA_TAB, FTA_TAB.1
Certificates
BSI-DSZ-CC-0592

Side-channel analysis
physical tampering

Standards
FIPS180-2, PKCS #1, ISO/IEC 7816-4, ISO/IEC 10118-3, ISO/IEC 7816, ISO/IEC 14888-, CCMB-2005-08-004
Technical reports
BSI 7586, BSI 7500

File metadata

Title Security_Target_SPR332_135
Subject Security Target for the smart card reader SPR 332
Keywords smart card reader, evaluation, SPR332, Common Criteria, Security Target
Author SCM Microsystems GmbH
Creation date D:20090903094043Z
Modification date D:20100308145215+01'00'
Pages 46
Creator FreePDF XP 3.24 - http://shbox.de
Producer AFPL Ghostscript 8.54

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

BSI-DSZ-CC-0592-2010

Extracted SARs

ADV_FSP.1, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.3, AVA_SOF.1, AVA_VAN.4, AVA_VLA.4

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "4dea0e662a7132d0",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0592-2010",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL3+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "6.01"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0394-2006"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0394-2006"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "SCM Microsystems GmbH",
  "manufacturer_web": "https://www.scmmicro.com/",
  "name": "Smart card reader SPR332 firmware version 6.01",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2010-02-19",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "0592a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cert_id": "BSI-DSZ-CC-0592-2010",
        "cert_item": "Smart card reader SPR332 firmware version 6.01",
        "cert_lab": "BSI",
        "developer": "SCM Microsystems GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ]
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "RSA": {
          "RSA-2048": 1
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0394-2006": 2,
          "BSI-DSZ-CC-0592": 1,
          "BSI-DSZ-CC-0592-2010": 17
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 2,
          "ACM_CAP": 2,
          "ACM_SCP": 2
        },
        "ADO": {
          "ADO_DEL": 2,
          "ADO_DEL.2": 4,
          "ADO_IGS": 2
        },
        "ADV": {
          "ADV_FSP": 2,
          "ADV_HLD": 2,
          "ADV_IMP": 2,
          "ADV_IMP.1": 4,
          "ADV_INT": 2,
          "ADV_LLD": 2,
          "ADV_LLD.1": 4,
          "ADV_RCR": 2,
          "ADV_SPM": 2
        },
        "AGD": {
          "AGD_ADM": 2,
          "AGD_USR": 2
        },
        "ALC": {
          "ALC_DVS": 2,
          "ALC_FLR": 2,
          "ALC_LCD": 1,
          "ALC_TAT": 2,
          "ALC_TAT.1": 4
        },
        "APE": {
          "APE_DES": 1,
          "APE_ENV": 1,
          "APE_INT": 1,
          "APE_OBJ": 1,
          "APE_REQ": 1,
          "APE_SRE": 1
        },
        "ASE": {
          "ASE_DES": 1,
          "ASE_ENV": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_PPC": 1,
          "ASE_REQ": 1,
          "ASE_SRE": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 2,
          "ATE_DPT": 2,
          "ATE_FUN": 2,
          "ATE_IND": 2
        },
        "AVA": {
          "AVA_CCA": 2,
          "AVA_MSU": 2,
          "AVA_MSU.3": 5,
          "AVA_SOF": 3,
          "AVA_VAN.4": 1,
          "AVA_VLA": 3,
          "AVA_VLA.2": 1,
          "AVA_VLA.3": 1,
          "AVA_VLA.4": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 2,
          "EAL 3 augmented": 2,
          "EAL 4": 4,
          "EAL 7": 1,
          "EAL1": 5,
          "EAL2": 3,
          "EAL3": 6,
          "EAL3 augmented": 1,
          "EAL3+": 1,
          "EAL4": 7,
          "EAL5": 6,
          "EAL5+": 1,
          "EAL6": 3,
          "EAL7": 4
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "Report, Version 5, 2009-12-15, EVALUATION TECHNICAL REPORT (ETR), T\u00dcV Informationstechnik GmbH (confidential document) [8] Configuration list for the TOE, Version 3.10, 2009-08-28, Configuration Item Record": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 3
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 34": 4,
          "AIS 38": 1
        },
        "ISO": {
          "ISO/IEC 15408:2005": 2,
          "ISO/IEC 7816-4": 1,
          "ISO/IEC 7816-8": 4
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {
        "BSI": {
          "BSI 7125": 2,
          "BSI 7148": 1,
          "BSI 7149": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20100308113143+01\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"SCM Microsystems GmbH, smart card reader SPR332 firmware version 6.01, class 2 smart card reader\"",
      "/ModDate": "D:20100309113000+01\u002700\u0027",
      "/Producer": "OpenOffice.org 3.1",
      "/Subject": "Common Criteria Certification",
      "/Title": "Certification Report BSI-DSZ-CC-0592-2010",
      "pdf_file_size_bytes": 756117,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 34
    },
    "st_filename": "0592b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0592": 46
        }
      },
      "cc_claims": {
        "O": {
          "O.DOWNLOAD": 3,
          "O.INS_BYTE": 4,
          "O.REVEAL": 5,
          "O.SEAL": 5,
          "O.SIGNAL": 4,
          "O.STORE": 3,
          "O.TRANSFER": 2
        },
        "OE": {
          "OE.FWLOAD": 3,
          "OE.ISO_EMV": 1,
          "OE.KEYPAD": 1,
          "OE.LED": 2,
          "OE.SEAL": 3,
          "OE.SIG_APP": 1,
          "OE.STORE": 2,
          "OE.UNOBSERV": 1,
          "OE.USAGE": 2,
          "OE.VERSION": 1
        },
        "OP": {
          "OP.F_DOWNLD": 2,
          "OP.L_CONTROL": 2,
          "OP.P_ENTRY": 2,
          "OP.P_VERIFY": 1
        },
        "T": {
          "T.DOWNLOAD": 3,
          "T.REVEAL": 3,
          "T.SEAL": 2,
          "T.STORE": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_CAP.3": 2,
          "ACM_SCP.1": 1
        },
        "ADO": {
          "ADO_DEL.2": 4,
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_FSP.1": 2,
          "ADV_HLD.2": 2,
          "ADV_IMP": 1,
          "ADV_IMP.1": 3,
          "ADV_LLD.1": 4,
          "ADV_RCR.1": 2
        },
        "AGD": {
          "AGD_ADM.1": 2,
          "AGD_USR.1": 1
        },
        "ALC": {
          "ALC_DVS.1": 2,
          "ALC_TAT": 1,
          "ALC_TAT.1": 2
        },
        "ATE": {
          "ATE_COV.2": 2,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 2,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_MSU": 1,
          "AVA_MSU.3": 3,
          "AVA_SOF.1": 1,
          "AVA_VLA.4": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL3": 3,
          "EAL3+": 2
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM.1": 4,
          "FCS_CKM.4": 4,
          "FCS_COP": 16
        },
        "FDP": {
          "FDP_ACC": 1,
          "FDP_ACC.1": 7,
          "FDP_ACF": 1,
          "FDP_ACF.1": 13,
          "FDP_ITC.1": 4,
          "FDP_RIP": 1,
          "FDP_RIP.2": 6
        },
        "FMT": {
          "FMT_MOF.1": 2,
          "FMT_MSA.2": 4,
          "FMT_MSA.3": 2
        },
        "FPT": {
          "FPT_PHP": 1,
          "FPT_PHP.1": 6
        },
        "FTA": {
          "FTA_TAB": 1,
          "FTA_TAB.1": 6
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 7
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 2
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2005-08-004": 1
        },
        "FIPS": {
          "FIPS180-2": 2
        },
        "ISO": {
          "ISO/IEC 10118-3": 1,
          "ISO/IEC 14888-": 1,
          "ISO/IEC 7816": 2,
          "ISO/IEC 7816-4": 15
        },
        "PKCS": {
          "PKCS #1": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {
        "BSI": {
          "BSI 7500": 1,
          "BSI 7586": 2
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "SCM Microsystems GmbH",
      "/CreationDate": "D:20090903094043Z",
      "/Creator": "FreePDF XP 3.24 - http://shbox.de",
      "/Keywords": "smart card reader, evaluation, SPR332, Common Criteria, Security Target",
      "/ModDate": "D:20100308145215+01\u002700\u0027",
      "/Producer": "AFPL Ghostscript 8.54",
      "/Subject": "Security Target for the smart card reader SPR 332",
      "/Title": "Security_Target_SPR332_135",
      "pdf_file_size_bytes": 315728,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 46
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0592a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL3+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0592b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "json_hash": null,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "210ac2412a4bca80875c37c6e64226496b8fa936f53acc0d011c5666d32968a4",
      "txt_hash": "f954be737d4a0887222625e4d7aa69838287a649d9b03f6b82228f4319f79a9e"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "65291f9a5919265d106d18aba73b82b6ceb07cb2fbcf640edba30cdc71b2d328",
      "txt_hash": "01090c63e7c01dd2a2a406d31f71e98895a80c3d3358ccc0d438da71a1987ec2"
    }
  },
  "status": "archived"
}