This page was not yet optimized for use on mobile
devices.
Cherry SmartTerminal ST-2xxx Firmware Version 6.01
CSV information
| Status | archived |
|---|---|
| Valid from | 06.08.2010 |
| Valid until | 01.09.2019 |
| Scheme | 🇩🇪 DE |
| Manufacturer | ZF Electronics GmbH |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | EAL3+, ADV_LLD.1, AVA_VLA.4, AVA_MSU.3, ALC_TAT.1, ADO_DEL.2, ADV_IMP.1 |
Heuristics summary
Certificate ID: BSI-DSZ-CC-0660-2010
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Asymmetric Algorithms
RSA-2048, RSA 2048Hash functions
SHA-256Security level
EAL 3, EAL 4, EAL4, EAL1, EAL3+, EAL5+, EAL6, EAL3, EAL5, EAL7, EAL2, EAL 3 augmented, ITSEC EvaluationSecurity Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ACM_AUT.1, ACM_CAP.3, ACM_SCP.1, ADO_DEL.2, ADO_DEL, ADO_IGS, ADO_IGS.1, ADV_IMP.1, ADV_LLD.1, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM, AGD_USR, ALC_TAT.1, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ALC_DVS.1, ALC_LCD.1, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_VLA.4, AVA_VAN.4, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA, AVA_VLA.2, AVA_VLA.3, APE_DES, APE_ENV, APE_INT, APE_OBJ, APE_REQ, APE_SRE, ASE_DES, ASE_ENV, ASE_INT, ASE_OBJ, ASE_PPC, ASE_REQ, ASE_SRE, ASE_TSSCertificates
BSI-DSZ-CC-0660-2010, BSI-DSZ-CC-0477-2007, BSI-DSZ-CC-0592Evaluation facilities
TÜV InformationstechnikCertification process
Report, Version 7, 23 July 2010, Evaluation Technical Report (ETR), TÜV-Informationstechnik GmbH (confidential document) [8] Configuration lists for the TOE (confidential documents): • Configuration Item Record, VersionStandards
AIS 34, AIS 32, AIS 38, ISO/IEC 7816-4, ISO/IEC 7816-8, ISO/IEC 15408:2005Technical reports
BSI 7125, BSI 7148, BSI 7149File metadata
| Title | Certification Report BSI-DSZ-CC-0660-2010 |
|---|---|
| Subject | Common Criteria Certification |
| Keywords | "Common Criteria, Certification, Zertifizierung, QES, Kartenleser, SmartCard Terminal, qualifizierte Signatur, SAK, SmartTerminal ST-2000, Cherry" |
| Author | Bundesamt für Sicherheit in der Informationstechnik |
| Creation date | D:20100906144945+02'00' |
| Modification date | D:20100907134136+02'00' |
| Pages | 38 |
| Creator | Writer |
| Producer | OpenOffice.org 3.1 |
Frontpage
| Certificate ID | BSI-DSZ-CC-0660-2010 |
|---|---|
| Certified item | Cherry SmartTerminal ST-2xxx; Firmwareversion: 6.01 |
| Certification lab | BSI |
| Developer | ZF Electronics GmbH |
References
Outgoing- BSI-DSZ-CC-0477-2007 - archived - Chipkartenterminal SmartTerminal ST-2xxx Firmware Version 5.11
Security target
Extracted keywords
Hash functions
SHA-256Security level
EAL3+, EAL3, EAL 3+Security Assurance Requirements (SAR)
ACM_CAP.3, ACM_SCP.1, ADO_DEL.2, ADO_IGS.1, ADV_IMP.1, ADV_LLD.1, ADV_FSP.1, ADV_HLD.2, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ALC_TAT.1, ALC_DVS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_IND.1, AVA_MSU.3, AVA_VLA.4, AVA_MSU.1, AVA_VLA.1, AVA_SOF.1, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1Security Functional Requirements (SFR)
FCS_CKM.4, FCS_COP, FCS_COP.1, FCS_COP.1.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.2, FDP_ITC.1, FDP_ACC, FDP_ACF, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP, FDP_RIP.2.1, FMT_MSA.3, FMT_MSA.2, FPT_PHP.1, FPT_PHP, FPT_PHP.1.1, FPT_PHP.1.2, FTA_TAB.1, FTA_TAB, FTA_TAB.1.1, FTP_PHP.1Certificates
BSI-DSZ-CC-0660, BSI-DSZ-CC-0477Evaluation facilities
TÜV InformationstechnikStandards
FIPS180-2, PKCS #1, ISO/IEC 7816-4, ISO/IEC 7816-8, ISO/IEC 10118-3, ISO/IEC 15408, ISO/IEC 14888-2File metadata
| Title | Sicherheitsvorgaben ST-2xxx |
|---|---|
| Keywords | Cherry SmartTerminal ST-2xxx; Chipkartenterminal; Bestätigung nach Signaturgesetz SigG; Cherry GmbH; Common Criteria; Sicherheitsvorgaben; Security Target |
| Author | ZF Electronics GmbH |
| Creation date | D:20100630130908+02'00' |
| Modification date | D:20100630134934+02'00' |
| Pages | 36 |
| Creator | PDFCreator Version 0.9.2 |
| Producer | AFPL Ghostscript 8.54 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-0660-2010Extracted SARs
ADV_FSP.1, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.3, AVA_SOF.1, AVA_VAN.4, AVA_VLA.4References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "020d8d1c59244978",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0660-2010",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL3+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_PPC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_LLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_DES",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ENV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"6.01"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0477-2007"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0309-2006",
"BSI-DSZ-CC-0477-2007"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "ZF Electronics GmbH",
"manufacturer_web": "https://www.cherry.de",
"name": "Cherry SmartTerminal ST-2xxx Firmware Version 6.01",
"not_valid_after": "2019-09-01",
"not_valid_before": "2010-08-06",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0660a_pdf.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-0660-2010",
"cert_item": "Cherry SmartTerminal ST-2xxx; Firmwareversion: 6.01",
"cert_lab": "BSI",
"developer": "ZF Electronics GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {
"RSA": {
"RSA 2048": 1,
"RSA-2048": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0477-2007": 3,
"BSI-DSZ-CC-0592": 6,
"BSI-DSZ-CC-0660-2010": 20
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_AUT": 2,
"ACM_AUT.1": 1,
"ACM_CAP": 2,
"ACM_CAP.3": 1,
"ACM_SCP": 2,
"ACM_SCP.1": 1
},
"ADO": {
"ADO_DEL": 2,
"ADO_DEL.2": 5,
"ADO_IGS": 2,
"ADO_IGS.1": 1
},
"ADV": {
"ADV_FSP": 2,
"ADV_HLD": 2,
"ADV_IMP": 2,
"ADV_IMP.1": 4,
"ADV_INT": 2,
"ADV_LLD": 2,
"ADV_LLD.1": 4,
"ADV_RCR": 2,
"ADV_SPM": 2
},
"AGD": {
"AGD_ADM": 2,
"AGD_USR": 2
},
"ALC": {
"ALC_DVS": 2,
"ALC_DVS.1": 1,
"ALC_FLR": 2,
"ALC_LCD": 1,
"ALC_LCD.1": 1,
"ALC_TAT": 2,
"ALC_TAT.1": 5
},
"APE": {
"APE_DES": 1,
"APE_ENV": 1,
"APE_INT": 1,
"APE_OBJ": 1,
"APE_REQ": 1,
"APE_SRE": 1
},
"ASE": {
"ASE_DES": 1,
"ASE_ENV": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_PPC": 1,
"ASE_REQ": 1,
"ASE_SRE": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 2,
"ATE_DPT": 2,
"ATE_FUN": 2,
"ATE_IND": 2
},
"AVA": {
"AVA_CCA": 2,
"AVA_MSU": 2,
"AVA_MSU.3": 5,
"AVA_SOF": 3,
"AVA_VAN.4": 1,
"AVA_VLA": 3,
"AVA_VLA.2": 1,
"AVA_VLA.3": 1,
"AVA_VLA.4": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 3": 4,
"EAL 3 augmented": 3,
"EAL 4": 6,
"EAL1": 6,
"EAL2": 3,
"EAL3": 4,
"EAL3+": 1,
"EAL4": 9,
"EAL5": 6,
"EAL5+": 1,
"EAL6": 4,
"EAL7": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"Report, Version 7, 23 July 2010, Evaluation Technical Report (ETR), T\u00dcV-Informationstechnik GmbH (confidential document) [8] Configuration lists for the TOE (confidential documents): \u2022 Configuration Item Record, Version": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 2
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 5
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 32": 1,
"AIS 34": 3,
"AIS 38": 1
},
"ISO": {
"ISO/IEC 15408:2005": 3,
"ISO/IEC 7816-4": 6,
"ISO/IEC 7816-8": 4
}
},
"symmetric_crypto": {},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7148": 1,
"BSI 7149": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20100906144945+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, QES, Kartenleser, SmartCard Terminal, qualifizierte Signatur, SAK, SmartTerminal ST-2000, Cherry\"",
"/ModDate": "D:20100907134136+02\u002700\u0027",
"/Producer": "OpenOffice.org 3.1",
"/Subject": "Common Criteria Certification",
"/Title": "Certification Report BSI-DSZ-CC-0660-2010",
"pdf_file_size_bytes": 802824,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 38
},
"st_filename": "0660b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0477": 1,
"BSI-DSZ-CC-0660": 3
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_CAP.3": 3,
"ACM_SCP.1": 3
},
"ADO": {
"ADO_DEL.2": 6,
"ADO_IGS.1": 3
},
"ADV": {
"ADV_FSP.1": 3,
"ADV_HLD.2": 3,
"ADV_IMP.1": 6,
"ADV_LLD.1": 6,
"ADV_RCR.1": 3
},
"AGD": {
"AGD_ADM.1": 3,
"AGD_USR.1": 3
},
"ALC": {
"ALC_DVS.1": 3,
"ALC_TAT.1": 6
},
"ASE": {
"ASE_DES.1": 1,
"ASE_ENV.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.1": 1,
"ASE_PPC.1": 1,
"ASE_REQ.1": 1,
"ASE_SRE.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 3,
"ATE_DPT.1": 3,
"ATE_FUN.1": 3,
"ATE_IND.1": 1,
"ATE_IND.2": 2
},
"AVA": {
"AVA_MSU.1": 1,
"AVA_MSU.3": 7,
"AVA_SOF.1": 3,
"AVA_VLA.1": 1,
"AVA_VLA.4": 7
}
},
"cc_security_level": {
"EAL": {
"EAL 3+": 1,
"EAL3": 3,
"EAL3+": 6
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM.4": 4,
"FCS_COP": 3,
"FCS_COP.1": 9,
"FCS_COP.1.1": 2
},
"FDP": {
"FDP_ACC": 1,
"FDP_ACC.1": 14,
"FDP_ACF": 1,
"FDP_ACF.1": 9,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_ITC.1": 4,
"FDP_RIP": 1,
"FDP_RIP.2": 8,
"FDP_RIP.2.1": 1
},
"FMT": {
"FMT_MSA.2": 4,
"FMT_MSA.3": 3
},
"FPT": {
"FPT_PHP": 1,
"FPT_PHP.1": 3,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1
},
"FTA": {
"FTA_TAB": 1,
"FTA_TAB.1": 8,
"FTA_TAB.1.1": 1
},
"FTP": {
"FTP_PHP.1": 4
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 1
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 6
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS180-2": 1
},
"ISO": {
"ISO/IEC 10118-3": 2,
"ISO/IEC 14888-2": 1,
"ISO/IEC 15408": 2,
"ISO/IEC 7816-4": 4,
"ISO/IEC 7816-8": 16
},
"PKCS": {
"PKCS #1": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "ZF Electronics GmbH",
"/CreationDate": "D:20100630130908+02\u002700\u0027",
"/Creator": "PDFCreator Version 0.9.2",
"/Keywords": "Cherry SmartTerminal ST-2xxx; Chipkartenterminal; Best\u00e4tigung nach Signaturgesetz SigG; Cherry GmbH; Common Criteria; Sicherheitsvorgaben; Security Target",
"/ModDate": "D:20100630134934+02\u002700\u0027",
"/Producer": "AFPL Ghostscript 8.54",
"/Title": "Sicherheitsvorgaben ST-2xxx",
"pdf_file_size_bytes": 286652,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 36
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0660a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ADO_DEL.2",
"EAL3+",
"ADV_LLD.1",
"AVA_MSU.3",
"ADV_IMP.1",
"ALC_TAT.1",
"AVA_VLA.4"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0660b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"json_hash": null,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "eb99d42dc0bb1367efc72058c5c654fd4ce1ce967d35d72a1870936991c84352",
"txt_hash": "4aaf01580d26a934f8dcf685b3758b3065fe1ca6d85f5546d1cea7200228955d"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "c5141392fea6b06d3ddafa83d43d5942a86de7905553bbde6fe55a1d477681e2",
"txt_hash": "9a64236db9bbfa0365a995537e359ef84ea03639870f59062167e4992364e7ca"
}
},
"status": "archived"
}