CONEXA 3.0, SW: v3.80.0-cc, HW V01.00 & V01.01

CSV information ?

Status active
Valid from 08.02.2024
Valid until 07.02.2032
Scheme 🇩🇪 DE
Manufacturer Theben Smart Energy GmbH
Category Other Devices and Systems
Security level ALC_FLR.2, EAL4+
Maintenance updates CONEXA 3.0 Version 1.5, Software: v3.80.3-cc, Hardware: HW V01.00 & V01.01 (19.04.2024) Certification report Security target

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0918-V6-2024

Certificate ?

Extracted keywords

Security level
EAL 4, EAL 5, EAL 2, EAL 4 augmented
Security Assurance Requirements (SAR)
ALC_FLR.2, ALC_FLR, AVA_VAN.5
Certificates
BSI-DSZ-CC-0918-V6-2024

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Title Certification Report BSI-DSZ-CC-0918-V6-2024
Subject Common Criteria, Certification, Zertifizierung, Smart Meter Gateway, SMGW, Theben, Conexa
Keywords "Common Criteria, Certification, Zertifizierung, Smart Meter Gateway, SMGW, Theben, Conexa"
Author Bundesamt fĂĽr Sicherheit in der Informationstechnik
Pages 1

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, HMAC, CMAC
Asymmetric Algorithms
ECC, Diffie-Hellman
Hash functions
SHA-256, SHA-384, SHA-512
Schemes
MAC
Protocols
SSH, TLS 1.2, TLS
Elliptic Curves
secp256r1, secp384r1, brainpoolP256r1, brainpoolP384r1, brainpoolP512r1
Block cipher modes
CBC, GCM

Security level
EAL 4, EAL 5, EAL 2, EAL 1, EAL 5+, EAL 6, EAL 4 augmented
Security Assurance Requirements (SAR)
ALC_FLR.2, ALC_FLR, ALC_CMS.4, AVA_VAN.5
Protection profiles
BSI-CC-PP-0073-2014
Certificates
BSI-DSZ-CC-0918-V6-2024, BSI-DSZ-CC-0918-V5-, BSI-DSZ-CC-0918-V5-2023, BSI-DSZ-CC-0957-V2-2016
Evaluation facilities
TĂśV Informationstechnik, T-Systems International

Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Smart Energy GmbH [7] ETR Summary CONEXA 1.5, Version 2, 31.01.2024, TÜV Informationstechnik GmbH, (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, ALC_CMS.4 Konfigurationsliste Smart Meter Gateway CONEXA 3.0 Version 1.0, Theben Smart Energy GmbH (confidential document) [10] Configuration list for the TOE SW, “ASSURANCE LIFE CYCLE – CONFIGURATION MANAGEMENT” DER, 3.0 (ALC_CMS.4) FÜR FIRMWARE VERSION 3.80.0-cc, 2024-01-19, Theben Smart Energy GmbH (confidential document) [11] Handbuch CONEXA 3.0 für Gateway Administrator, Version 2.12.1, 2023-09-04, Theben Smart, Report – Smart Meter Gateway CONEXA 3.0, Version 1.0, 2024-01- 23, Theben Smart Energy GmbH (confidential document) [20] Technische Richtlinie BSI TR-03109-1 Anforderungen an die Interoperabilität der

Standards
FIPS 197, FIPS 180-4, AIS 34, AIS 46, AIS 48, AIS 32, AIS 38, RFC 5246, RFC 4493, RFC 5289, RFC 2104, RFC 5639, RFC 5114, RFC 3394, RFC 5084, RFC5246, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065
Technical reports
BSI TR-02102, BSI TR-03109-1, BSI TR-03109-3, BSI TR-02102-1, BSI TR-03116, BSI 7148

File metadata

Title Certification Report BSI-DSZ-CC-0918-V6-2024
Subject Common Criteria, Certification, Zertifizierung, Smart Meter Gateway, SMGW, Theben, Conexa
Keywords "Common Criteria, Certification, Zertifizierung, Smart Meter Gateway, SMGW, Theben, Conexa"
Author Bundesamt fĂĽr Sicherheit in der Informationstechnik
Pages 27

Frontpage

Certificate ID BSI-DSZ-CC-0918-V6-2024
Certified item CONEXA 3.0 SW: v3.80.0-cc, HW V01.00 & V01.01
Certification lab BSI
Developer Theben Smart Energy GmbH

References

Outgoing

Security target ?

Extracted keywords

Symmetric Algorithms
AES
Asymmetric Algorithms
ECDSA, ECC, Diffie-Hellman
Hash functions
SHA-256, SHA-384
Schemes
MAC
Protocols
TLS, TLS 1.2
Randomness
PRNG, RNG
Elliptic Curves
P-256, P-384, NIST P-256, NIST P-384, secp256r1, secp384r1
Block cipher modes
GCM
TLS cipher suites
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384

Security level
EAL 4, EAL4, EAL 4 augmented, EAL4 augmented
Claims
OE.SM, OSP.SM
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_IMP.1, ADV_FSP.4, AGD_OPE.1, ALC_FLR.2, ALC_CMC.4, ALC_DEL.1, ALC_LCD.1, ATE_COV.2, ATE_FUN.1, AVA_VAN.5, ASE_CCL.1, ASE_INT.1, ASE_REQ.2, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP, FAU_GEN, FAU_SAA, FAU_SAR, FAU_STG, FAU_GEN.2, FAU_STG.2, FAU_ARP.1, FAU_SAA.1, FAU_GEN.1, FAU_SAR.1, FAU_STG.4, FAU_STG.3, FAU_STG.1, FAU_GEN.2.1, FAU_STG.2.1, FAU_STG.2.2, FAU_STG.2.3, FCO_NRO, FCO_NRO.2, FCO_NRO.2.1, FCO_NRO.2.2, FCO_NRO.2.3, FCO_NRO.1, FCS_CKM, FCS_COP, FCS_CKM.4, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_COP.1.1, FCS_CKM.4.1, FDP_IFC, FDP_ACC.2, FDP_ACF.1, FDP_IFF, FDP_RIP.2, FDP_SDI.2, FDP_ITC.1, FDP_ITC.2, FDP_ACC, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACC.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.2, FDP_IFC.1, FDP_IFF.1, FDP_IFF.1.3, FDP_RIP, FDP_RIP.2.1, FDP_RIP.1, FDP_SDI, FDP_SDI.2.1, FDP_SDI.2.2, FDP_SDI.1, FIA_ATD, FIA_AFL, FIA_UAU, FIA_UID, FIA_USB, FIA_ATD.1, FIA_AFL.1, FIA_UAU.2, FIA_UAU.5, FIA_UAU.6, FIA_UID.2, FIA_USB.1, FIA_UID.1, FIA_ATD.1.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1, FIA_UAU.2.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6.1, FIA_UID.2.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_SMR, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA, FMT_MSA.3, FMT_MOF, FMT_MOF.1.1, FMT_SMF, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.1, FPR_CON, FPR_CON.1, FPR_PSE, FPR_CON.1.2, FPR_CON.1.1, FPR_PSE.1, FPR_PSE.1.1, FPR_PSE.1.2, FPR_PSE.1.3, FPT_FLS, FPT_RPL, FPT_STM, FPT_TST, FPT_PHP, FPT_FLS.1, FPT_RPL.1, FPT_STM.1, FPT_TST.1, FPT_PHP.1, FPT_FLS.1.1, FPT_RPL.1.1, FPT_RPL.1.2, FPT_STM.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.1.1, FPT_PHP.1.2, FTP_ITC, FTP_ITC.1
Protection profiles
BSI-CC-PP-0077, BSI-CC-PP-0073
Certificates
BSI-DSZ-CC-0957-V2-2016
Evaluation facilities
T-Systems International

Side-channel analysis
physical tampering, malfunction

Standards
FIPS 180-4, FIPS 197, FIPS 140-2, RFC 5289, RFC 5246, RFC 2104, RFC 4493, RFC 5084, RFC 5905, RFC 2616, RFC 5114, RFC 5639, RFC 3394, RFC5246
Technical reports
BSI TR-03109, BSI TR-03109-1

File metadata

Title Security Target v1.95.3 - CONEXA 3.0
Subject Security Target
Author Theben Smart Energy GmbH
Pages 131

References

Outgoing

Heuristics ?

Certificate ID: BSI-DSZ-CC-0918-V6-2024

Extracted SARs

ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, AGD_OPE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_FLR.2, ALC_LCD.1, ASE_CCL.1, ASE_INT.1, ASE_REQ.2, ASE_TSS.1, ATE_COV.2, ATE_FUN.1, AVA_VAN.5

Certificate versions

Name Certificate ID
Previous
CONEXA 3.0 Version 1.0 BSI-DSZ-CC-0918-2020 Compare
CONEXA 3.0 Version 1.1 BSI-DSZ-CC-0918-V2-2021 Compare
CONEXA 3.0 Version 1.2 BSI-DSZ-CC-0918-V3-2022 Compare
CONEXA 3.0 Version 1.3 BSI-DSZ-CC-0918-V4-2022 Compare
CONEXA 3.0 Version 1.4 BSI-DSZ-CC-0918-V5-2023 Compare

Similar certificates

Name Certificate ID
IFX_CCI_00004Fh, IFX_CCI_000050h, IFX_CCI_000051h, IFX_CCI_000052h, IFX_CCI_000053h, IFX_CCI_000054h, IFX_CCI_000055h, IFX_CCI_000056h, IFX_CCI_000057h, IFX_CCI_000058h, IFX_CCI_00005Ch design step S11 with firmware 80.310.03.0 & 80.310.03.1, optional NRG SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 and v2.11.003, optional ACL v3.33.003 and v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and guidance BSI-DSZ-CC-1156-V3-2022 Compare
IFX_CCI_00002Dh, IFX_CCI_000039h, IFX_CCI_00003Ah, IFX_CCI_000044h, IFX_CCI_000045h, IFX_CCI_000046h, IFX_CCI_000047h, IFX_CCI_000048h, IFX_CCI_000049h, IFX_CCI_00004Ah, IFX_CCI_00004Bh, IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh design step T11 with firmware 80.306.16.0 & 80.306.16.1, optional NRG SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 and v2.11.003, optional ACL v3.33.003 and v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and guidance BSI-DSZ-CC-1107-V3-2022 Compare
IFX_CCI_00002Dh, 000039h, 00003Ah, 000044h, 000045h, 000046h, 000047h, 000048h, 000049h, 00004Ah, 00004Bh, 00004Ch, 00004Dh, 00004Eh design step T11 with firmware 80.306.16.0, 80.306.16.1 or 80.312.02.0, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 or v2.11.003, optional ACL v3.35.001, v3.34.000, v3.33.003 or v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and user guidance BSI-DSZ-CC-1107-V5-2024 Compare
IFX_CCI_00004Fh, IFX_CCI_000050h, IFX_CCI_000051h, IFX_CCI_000052h, IFX_CCI_000053h, IFX_CCI_000054h, IFX_CCI_000055h, IFX_CCI_000056h, IFX_CCI_000057h, IFX_CCI_000058h, IFX_CCI_00005Ch design step S11 with firmware 80.310.03.0 and 80.310.03.1, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 and v2.11.003, optional ACL v3.33.003 and 3.35.001 and v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and user guidance BSI-DSZ-CC-1156-V4-2024 Compare
IFX_CCI_00002Dh, IFX_CCI_000039h, IFX_CCI_00003Ah, IFX_CCI_000044h, IFX_CCI_000045h, IFX_CCI_000046h, IFX_CCI_000047h, IFX_CCI_000048h, IFX_CCI_000049h, IFX_CCI_00004Ah, IFX_CCI_00004Bh, IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh design step T11 with firmware 80.306.16.0 & 80.306.16.1 & 80.312.02.0, optional NRG SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 and v2.11.003, optional ACL v3.34.000 and v3.33.003 and v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and guidance BSI-DSZ-CC-1107-V4-2023 Compare
IFX_CCI_00003Bh, IFX_CCI_000043h, IFX_CCI_00005Dh, IFX_CCI_00005Eh, IFX_CCI_00005Fh, IFX_CCI_000060h, IFX_CCI_000061h, IFX_CCI_000062h, IFX_CCI_000063h, IFX_CCI_000064h design step S11 with firmware 80.309.05.0, optional NRG™ SW 05.03.4097, opt. HSL v3.52.9708, UMSLC lib v01.30.0564, opt. SCL v2.15.000, opt. ACL v3.34.000 and v3.33.003, opt. RCL v1.10.007, opt. HCL v1.13.002 and user guidance BSI-DSZ-CC-1169-V3-2024 Compare
Infineon IFX_CCI_00003Fh IFX_CCI_000059h IFX_CCI_00005Bh IFX_CCI_00003Ch IFX_CCI_00003Dh IFX_CCI_00005Ah design step G11 and H11 with optional HSL v2.01.6198, optional SCL v2.13.001, optional ACL v3.03.003, optional ACL v3.04.001, optional HCL v1.13.001, optional RCL v1.10.006 and with specific IC-dedicated firmware identifier 80.203.00.3 and Flash Loader v8.06.001 NSCIB-CC-2200060-01-CR Compare
Showing 5 out of 7.

Scheme data ?

Cert Id BSI-DSZ-CC-0918-V6-2024
Product CONEXA 3.0, SW: v3.80.0-cc, HW V01.00 & V01.01
Vendor Theben Smart Energy GmbH (vormals: Theben AG)
Certification Date 08.02.2024
Category Intelligent measuring systems
Url https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartMeter_Gateway/0918_0918V2_0918V3_0918V4_0918V5_0918V6.html
Enhanced
Product CONEXA 3.0, SW: v3.80.0-cc, HW V01.00 & V01.01
Applicant Theben Smart Energy GmbH (vormals: Theben AG) HohenbergstraĂźe 32 72401 Haigerloch
Evaluation Facility TĂśV Informationstechnik GmbH
Assurance Level EAL4+,ALC_FLR.2,AVA_VAN.5
Protection Profile Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI-CC-PP-0073-2014
Certification Date 08.02.2024
Expiration Date 07.02.2032
Entries [frozendict({'id': 'BSI-DSZ-CC-0918-V6-2024-MA-01', 'description': 'The maintenance consists of a bug fix that was necessary to eliminate problems with connection interruptions both when tariffing with compact profiles and during network Management.'}), frozendict({'id': 'BSI-DSZ-CC-0918-V6-2024 (Ausstellungsdatum / Certification Date 08.02.2024, gültig bis / valid until 07.02.2032)', 'description': ', some software adjustments and adjustment of kernel-hardening. And last but not least the boot process was improved, some further adjustments with impact on documentation and editorial changes were made.'}), frozendict({'id': 'BSI-DSZ-CC-0918-V5-2023-MA-02', 'description': 'The change to the certified product is at the level of vendor’s renaming.'}), frozendict({'id': 'BSI-DSZ-CC-0918-V5-2023-MA-01', 'description': 'The description of the secure delivery procedure was extended due to adding an alternative delivery procedure (cardbox delivery).'}), frozendict({'id': 'BSI-DSZ-CC-0918-V5-2023 (Ausstellungsdatum / Certification Date 11.05.2023, gültig bis / valid until 10.05.2031)', 'description': 'The focus of this re-evaluation was on certification obligations following BSI-K-TR-0507-2022, mobile phone signal validation without tools, adaption reaction of >36h no time synchronization and some further small changes, adjustments and updates.'}), frozendict({'id': 'BSI-DSZ-CC-0918-V4-2022-MA-03'}), frozendict({'id': 'BSI-DSZ-CC-0918-V4-2022-MA-02', 'description': 'The assembly space for the Fakra socket was adapted.'}), frozendict({'id': 'BSI-DSZ-CC-0918-V4-2022-MA-01', 'description': 'The order of the configuration parameters regarding the LTE module were corrected.'}), frozendict({'id': 'BSI-DSZ-CC-0918-V4-2022 (Ausstellungsdatum / Certification Date 08.03.2022, gültig bis / valid until 07.03.2030)', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-0918-V3-2022 (Ausstellungsdatum / Certification Date 24.01.2022, gültig bis / valid until 23.01.2030)', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-0918-V2-2021 (Ausstellungsdatum / Certification Date 01.07.2021, gültig bis / valid until 30.06.2029)', 'description': '), Version 1.1 was enhanced due to the new tariff use cases (TAF) 9, 10 and 14. Further optimizations and some minor bugfixing were also performed.'}), frozendict({'id': 'BSI-DSZ-CC-0918-2020-MA-01', 'description': 'alive values. Therefore the version number changed for the Software from v3.33.0-cc to v3.33.3-cc.'})]
Report Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0918V6a_pdf.pdf?__blob=publicationFile&v=1
Target Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0918V6b_pdf.pdf?__blob=publicationFile&v=1
Cert Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0918V6c_pdf.pdf?__blob=publicationFile&v=2
Description The Target of Evaluation (TOE) is the Smart Meter Gateway (SMGW) CONEXA 3.0, Version 1.0. The Smart Meter Gateway is the communication unit in a smart metering system. The main functionality of the gateway is the reception and the storage of measured consumption and status values of the connected meters as well as the processing and the transfer of these consumption and status values to authorized entities.
Subcategory (Smart Meter Gateway)

References ?

Updates ?

  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': ['BSI-DSZ-CC-0918-2020', 'BSI-DSZ-CC-0918-V2-2021', 'BSI-DSZ-CC-0918-V3-2022', 'BSI-DSZ-CC-0918-V4-2022', 'BSI-DSZ-CC-0918-V5-2023'], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'certification_date': '2024-02-08', 'enhanced': {'__update__': {'applicant': 'Theben Smart Energy GmbH (vormals: Theben AG) HohenbergstraĂźe 32 72401 Haigerloch', 'certification_date': '2024-02-08', 'expiration_date': '2032-02-07', 'entries': {'1': {'__update__': {'id': 'BSI-DSZ-CC-0918-V6-2024 (Ausstellungsdatum / Certification Date 08.02.2024, gĂĽltig bis / valid until 07.02.2032)'}}, '4': {'__update__': {'id': 'BSI-DSZ-CC-0918-V5-2023 (Ausstellungsdatum / Certification Date 11.05.2023, gĂĽltig bis / valid until 10.05.2031)'}}, '8': {'__update__': {'id': 'BSI-DSZ-CC-0918-V4-2022 (Ausstellungsdatum / Certification Date 08.03.2022, gĂĽltig bis / valid until 07.03.2030)'}}, '9': {'__update__': {'id': 'BSI-DSZ-CC-0918-V3-2022 (Ausstellungsdatum / Certification Date 24.01.2022, gĂĽltig bis / valid until 23.01.2030)'}}, '10': {'__update__': {'id': 'BSI-DSZ-CC-0918-V2-2021 (Ausstellungsdatum / Certification Date 01.07.2021, gĂĽltig bis / valid until 30.06.2029)'}}}, 'description': 'The Target of Evaluation (TOE) is the Smart Meter Gateway (SMGW) CONEXA 3.0, Version 1.0. The Smart Meter Gateway is the communication unit in a smart metering system. The main functionality of the gateway is the reception and the storage of measured consumption and status values of the connected meters as well as the processing and the transfer of these consumption and status values to authorized entities.'}}} data.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '787e531aad090ed839278fcad592cf51afa0c051ace9f6f9d7f4fa30fbf95e20', 'txt_hash': 'f9dba75b5963aff4c372f177654451d02a8ddd928593d9a8c70c7315f92f02dd'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '28b29b29fe28358deb3347adcc10a486b1ba821df893007920951e40e8c9f3c1', 'txt_hash': '260d5bd231c06afd14c5bae7c226393522b8dd8423cc59e9bb28924a392c401f'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'a6de31c6d6a8ab37487745d9545a880a16a8a2bce724f5016f4711461ec529fe', 'txt_hash': 'c9a0d9dfd58f54925e53c4c82494327a7752e9446931ddb3457d98dadec1ad48'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 497994, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 27, '/Author': 'Bundesamt fĂĽr Sicherheit in der Informationstechnik', '/Keywords': '"Common Criteria, Certification, Zertifizierung, Smart Meter Gateway, SMGW, Theben, Conexa"', '/Subject': 'Common Criteria, Certification, Zertifizierung, Smart Meter Gateway, SMGW, Theben, Conexa', '/Title': 'Certification Report BSI-DSZ-CC-0918-V6-2024', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/', 'https://www.commoncriteriaportal.org/', 'https://www.sogis.eu/', 'https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/zertifizierungsreporte', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/AIS']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1738755, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 131, '/Author': 'Theben Smart Energy GmbH', '/Subject': 'Security Target', '/Title': 'Security Target v1.95.3 - CONEXA 3.0', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf', 'https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf', 'http://www.jtc1sc27.din.de/sce/sd6']}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 337823, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Bundesamt fĂĽr Sicherheit in der Informationstechnik', '/Keywords': '"Common Criteria, Certification, Zertifizierung, Smart Meter Gateway, SMGW, Theben, Conexa"', '/Subject': 'Common Criteria, Certification, Zertifizierung, Smart Meter Gateway, SMGW, Theben, Conexa', '/Title': 'Certification Report BSI-DSZ-CC-0918-V6-2024', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0918-V6-2024', 'cert_item': 'CONEXA 3.0 SW: v3.80.0-cc, HW V01.00 & V01.01', 'developer': 'Theben Smart Energy GmbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI- CC-PP-0073-2014', 'cc_version': 'PP conformant Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.2 and AVA_VAN.5 valid until: 07 February 2032'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0918-V6-2024': 14, 'BSI-DSZ-CC-0918-V5-': 1, 'BSI-DSZ-CC-0918-V5-2023': 2, 'BSI-DSZ-CC-0957-V2-2016': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0073-2014': 3}}, 'cc_security_level': {'EAL': {'EAL 4': 8, 'EAL 5': 3, 'EAL 2': 3, 'EAL 1': 1, 'EAL 5+': 1, 'EAL 6': 1, 'EAL 4 augmented': 3}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 5, 'ALC_FLR': 3, 'ALC_CMS.4': 2}, 'AVA': {'AVA_VAN.5': 5}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'TUV': {'TĂśV Informationstechnik': 3}, 'TSystems': {'T-Systems International': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 4}}, 'constructions': {'MAC': {'HMAC': 1, 'CMAC': 2}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 4}}, 'FF': {'DH': {'Diffie-Hellman': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 1, 'SHA-384': 1, 'SHA-512': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'SSH': {'SSH': 3}, 'TLS': {'TLS': {'TLS 1.2': 1, 'TLS': 4}}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 1}, 'GCM': {'GCM': 3}}, 'ecc_curve': {'NIST': {'secp256r1': 1, 'secp384r1': 1}, 'Brainpool': {'brainpoolP256r1': 1, 'brainpoolP384r1': 1, 'brainpoolP512r1': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI TR-03109-1': 1, 'BSI TR-03109-3': 1, 'BSI TR-02102-1': 1, 'BSI TR-03116': 1, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 197': 7, 'FIPS 180-4': 4}, 'BSI': {'AIS 34': 2, 'AIS 46': 2, 'AIS 48': 2, 'AIS 32': 1, 'AIS 38': 1}, 'RFC': {'RFC 5246': 3, 'RFC 4493': 6, 'RFC 5289': 3, 'RFC 2104': 3, 'RFC 5639': 3, 'RFC 5114': 3, 'RFC 3394': 3, 'RFC 5084': 3, 'RFC5246': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Smart Energy GmbH [7] ETR Summary CONEXA 1.5, Version 2, 31.01.2024, TĂśV Informationstechnik GmbH, (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014': 1, 'ALC_CMS.4 Konfigurationsliste Smart Meter Gateway CONEXA 3.0 Version 1.0, Theben Smart Energy GmbH (confidential document) [10] Configuration list for the TOE SW, “ASSURANCE LIFE CYCLE – CONFIGURATION MANAGEMENT” DER': 1, '3.0 (ALC_CMS.4) FĂśR FIRMWARE VERSION 3.80.0-cc, 2024-01-19, Theben Smart Energy GmbH (confidential document) [11] Handbuch CONEXA 3.0 fĂĽr Gateway Administrator, Version 2.12.1, 2023-09-04, Theben Smart': 1, 'Report – Smart Meter Gateway CONEXA 3.0, Version 1.0, 2024-01- 23, Theben Smart Energy GmbH (confidential document) [20] Technische Richtlinie BSI TR-03109-1 Anforderungen an die Interoperabilität der': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0957-V2-2016': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0077': 1, 'BSI-CC-PP-0073': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 5, 'EAL4': 1, 'EAL 4 augmented': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_IMP.1': 1, 'ADV_FSP.4': 1}, 'AGD': {'AGD_OPE.1': 1}, 'ALC': {'ALC_FLR.2': 6, 'ALC_CMC.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_FUN.1': 1}, 'AVA': {'AVA_VAN.5': 7}, 'ASE': {'ASE_CCL.1': 1, 'ASE_INT.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP': 10, 'FAU_GEN': 38, 'FAU_SAA': 11, 'FAU_SAR': 30, 'FAU_STG': 32, 'FAU_GEN.2': 8, 'FAU_STG.2': 15, 'FAU_ARP.1': 1, 'FAU_SAA.1': 4, 'FAU_GEN.1': 22, 'FAU_SAR.1': 7, 'FAU_STG.4': 3, 'FAU_STG.3': 3, 'FAU_STG.1': 8, 'FAU_GEN.2.1': 1, 'FAU_STG.2.1': 1, 'FAU_STG.2.2': 1, 'FAU_STG.2.3': 1}, 'FCO': {'FCO_NRO': 3, 'FCO_NRO.2': 9, 'FCO_NRO.2.1': 1, 'FCO_NRO.2.2': 1, 'FCO_NRO.2.3': 1, 'FCO_NRO.1': 1}, 'FCS': {'FCS_CKM': 44, 'FCS_COP': 63, 'FCS_CKM.4': 32, 'FCS_CKM.1': 16, 'FCS_CKM.2': 6, 'FCS_COP.1': 10, 'FCS_COP.1.1': 1, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_IFC': 29, 'FDP_ACC.2': 11, 'FDP_ACF.1': 11, 'FDP_IFF': 25, 'FDP_RIP.2': 9, 'FDP_SDI.2': 8, 'FDP_ITC.1': 12, 'FDP_ITC.2': 12, 'FDP_ACC': 2, 'FDP_ACC.2.1': 1, 'FDP_ACC.2.2': 1, 'FDP_ACC.1': 9, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 4, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 3, 'FDP_IFC.2': 4, 'FDP_IFC.1': 12, 'FDP_IFF.1': 24, 'FDP_IFF.1.3': 1, 'FDP_RIP': 2, 'FDP_RIP.2.1': 1, 'FDP_RIP.1': 1, 'FDP_SDI': 2, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_SDI.1': 1}, 'FIA': {'FIA_ATD': 3, 'FIA_AFL': 3, 'FIA_UAU': 5, 'FIA_UID': 3, 'FIA_USB': 3, 'FIA_ATD.1': 13, 'FIA_AFL.1': 8, 'FIA_UAU.2': 8, 'FIA_UAU.5': 7, 'FIA_UAU.6': 8, 'FIA_UID.2': 12, 'FIA_USB.1': 8, 'FIA_UID.1': 8, 'FIA_ATD.1.1': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.1': 2, 'FIA_UAU.2.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6.1': 1, 'FIA_UID.2.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_SMR': 3, 'FMT_MOF.1': 10, 'FMT_SMF.1': 19, 'FMT_SMR.1': 30, 'FMT_MSA': 64, 'FMT_MSA.3': 12, 'FMT_MOF': 1, 'FMT_MOF.1.1': 1, 'FMT_SMF': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.1': 9}, 'FPR': {'FPR_CON': 6, 'FPR_CON.1': 10, 'FPR_PSE': 2, 'FPR_CON.1.2': 5, 'FPR_CON.1.1': 3, 'FPR_PSE.1': 8, 'FPR_PSE.1.1': 3, 'FPR_PSE.1.2': 2, 'FPR_PSE.1.3': 2}, 'FPT': {'FPT_FLS': 3, 'FPT_RPL': 3, 'FPT_STM': 3, 'FPT_TST': 3, 'FPT_PHP': 3, 'FPT_FLS.1': 10, 'FPT_RPL.1': 8, 'FPT_STM.1': 18, 'FPT_TST.1': 9, 'FPT_PHP.1': 8, 'FPT_FLS.1.1': 1, 'FPT_RPL.1.1': 1, 'FPT_RPL.1.2': 1, 'FPT_STM.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1}, 'FTP': {'FTP_ITC': 30, 'FTP_ITC.1': 9}}, 'cc_claims': {'OE': {'OE.SM': 4}, 'OSP': {'OSP.SM': 5}}, 'vendor': {}, 'eval_facility': {'TSystems': {'T-Systems International': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 7}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 5}}, 'FF': {'DH': {'Diffie-Hellman': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 12, 'SHA-384': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 9}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 62, 'TLS 1.2': 5}}}, 'randomness': {'PRNG': {'PRNG': 1}, 'RNG': {'RNG': 1}}, 'cipher_mode': {'GCM': {'GCM': 2}}, 'ecc_curve': {'NIST': {'P-256': 3, 'P-384': 3, 'NIST P-256': 3, 'NIST P-384': 3, 'secp256r1': 3, 'secp384r1': 3}}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256': 2, 'TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384': 2, 'TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256': 2, 'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384': 2}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 4, 'malfunction': 2}}, 'technical_report_id': {'BSI': {'BSI TR-03109': 1, 'BSI TR-03109-1': 2}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 180-4': 8, 'FIPS 197': 12, 'FIPS 140-2': 3}, 'RFC': {'RFC 5289': 6, 'RFC 5246': 7, 'RFC 2104': 6, 'RFC 4493': 8, 'RFC 5084': 4, 'RFC 5905': 4, 'RFC 2616': 5, 'RFC 5114': 5, 'RFC 5639': 5, 'RFC 3394': 3, 'RFC5246': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0918-V6-2024': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 2, 'EAL 5': 1, 'EAL 2': 1, 'EAL 4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 1, 'ALC_FLR': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 0918V6a_pdf.pdf.
    • The st_filename property was set to 0918V6b_pdf.pdf.
    • The cert_filename property was set to 0918V6c_pdf.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-0918-V6-2024.
    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0957-V2-2016']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0978-2016', 'BSI-DSZ-CC-0957-V2-2016']}} data.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0918-V5-2023', 'BSI-DSZ-CC-0957-V2-2016']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0918-V5-2023', 'BSI-DSZ-CC-0666-2012', 'BSI-DSZ-CC-0918-V4-2022', 'BSI-DSZ-CC-0918-V3-2022', 'BSI-DSZ-CC-0957-2015', 'BSI-DSZ-CC-0978-2016', 'BSI-DSZ-CC-0845-2012', 'BSI-DSZ-CC-0845-V2-2013', 'BSI-DSZ-CC-0918-V2-2021', 'BSI-DSZ-CC-0918-2020', 'BSI-DSZ-CC-0957-V2-2016']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0918V6a_pdf.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0918V6b_pdf.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0978-2016']}}} data.
    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0666-2012', 'BSI-DSZ-CC-0957-2015', 'BSI-DSZ-CC-0845-V2-2013', 'BSI-DSZ-CC-0845-2012']}}} data.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name CONEXA 3.0, SW: v3.80.0-cc, HW V01.00 & V01.01 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0918V6c_pdf.pdf",
  "dgst": "df3f2ac26199d021",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0918-V6-2024",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "01.01",
        "3.0",
        "01.00",
        "3.80.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [
      "BSI-DSZ-CC-0918-2020",
      "BSI-DSZ-CC-0918-V2-2021",
      "BSI-DSZ-CC-0918-V3-2022",
      "BSI-DSZ-CC-0918-V4-2022",
      "BSI-DSZ-CC-0918-V5-2023"
    ],
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0957-V2-2016",
          "BSI-DSZ-CC-0918-V5-2023"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0978-2016",
          "BSI-DSZ-CC-0918-2020",
          "BSI-DSZ-CC-0918-V2-2021",
          "BSI-DSZ-CC-0957-V2-2016",
          "BSI-DSZ-CC-0957-2015",
          "BSI-DSZ-CC-0918-V3-2022",
          "BSI-DSZ-CC-0845-2012",
          "BSI-DSZ-CC-0918-V4-2022",
          "BSI-DSZ-CC-0845-V2-2013",
          "BSI-DSZ-CC-0918-V5-2023",
          "BSI-DSZ-CC-0666-2012"
        ]
      }
    },
    "scheme_data": {
      "category": "Intelligent measuring systems",
      "cert_id": "BSI-DSZ-CC-0918-V6-2024",
      "certification_date": "2024-02-08",
      "enhanced": {
        "applicant": "Theben Smart Energy GmbH (vormals: Theben AG) Hohenbergstra\u00dfe 32 72401 Haigerloch",
        "assurance_level": "EAL4+,ALC_FLR.2,AVA_VAN.5",
        "cert_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0918V6c_pdf.pdf?__blob=publicationFile\u0026v=2",
        "certification_date": "2024-02-08",
        "description": "The Target of Evaluation (TOE) is the Smart Meter Gateway (SMGW) CONEXA 3.0, Version 1.0. The Smart Meter Gateway is the communication unit in a smart metering system. The main functionality of the gateway is the reception and the storage of measured consumption and status values of the connected meters as well as the processing and the transfer of these consumption and status values to authorized entities.",
        "entries": [
          {
            "description": "The maintenance consists of a bug fix that was necessary to eliminate problems with connection interruptions both when tariffing with compact profiles and during network Management.",
            "id": "BSI-DSZ-CC-0918-V6-2024-MA-01"
          },
          {
            "description": ", some software adjustments and adjustment of kernel-hardening. And last but not least the boot process was improved, some further adjustments with impact on documentation and editorial changes were made.",
            "id": "BSI-DSZ-CC-0918-V6-2024 (Ausstellungsdatum / Certification Date 08.02.2024, g\u00fcltig bis / valid until 07.02.2032)"
          },
          {
            "description": "The change to the certified product is at the level of vendor\u2019s renaming.",
            "id": "BSI-DSZ-CC-0918-V5-2023-MA-02"
          },
          {
            "description": "The description of the secure delivery procedure was extended due to adding an alternative delivery procedure (cardbox delivery).",
            "id": "BSI-DSZ-CC-0918-V5-2023-MA-01"
          },
          {
            "description": "The focus of this re-evaluation was on certification obligations following BSI-K-TR-0507-2022, mobile phone signal validation without tools, adaption reaction of \u003e36h no time synchronization and some further small changes, adjustments and updates.",
            "id": "BSI-DSZ-CC-0918-V5-2023 (Ausstellungsdatum / Certification Date 11.05.2023, g\u00fcltig bis / valid until 10.05.2031)"
          },
          {
            "id": "BSI-DSZ-CC-0918-V4-2022-MA-03"
          },
          {
            "description": "The assembly space for the Fakra socket was adapted.",
            "id": "BSI-DSZ-CC-0918-V4-2022-MA-02"
          },
          {
            "description": "The order of the configuration parameters regarding the LTE module were corrected.",
            "id": "BSI-DSZ-CC-0918-V4-2022-MA-01"
          },
          {
            "description": "Certificate",
            "id": "BSI-DSZ-CC-0918-V4-2022 (Ausstellungsdatum / Certification Date 08.03.2022, g\u00fcltig bis / valid until 07.03.2030)"
          },
          {
            "description": "Certificate",
            "id": "BSI-DSZ-CC-0918-V3-2022 (Ausstellungsdatum / Certification Date 24.01.2022, g\u00fcltig bis / valid until 23.01.2030)"
          },
          {
            "description": "), Version 1.1 was enhanced due to the new tariff use cases (TAF) 9, 10 and 14. Further optimizations and some minor bugfixing were also performed.",
            "id": "BSI-DSZ-CC-0918-V2-2021 (Ausstellungsdatum / Certification Date 01.07.2021, g\u00fcltig bis / valid until 30.06.2029)"
          },
          {
            "description": "alive values. Therefore the version number changed for the Software from v3.33.0-cc to v3.33.3-cc.",
            "id": "BSI-DSZ-CC-0918-2020-MA-01"
          }
        ],
        "evaluation_facility": "T\u00dcV Informationstechnik GmbH",
        "expiration_date": "2032-02-07",
        "product": "CONEXA 3.0, SW: v3.80.0-cc, HW V01.00 \u0026 V01.01",
        "protection_profile": "Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI-CC-PP-0073-2014",
        "report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0918V6a_pdf.pdf?__blob=publicationFile\u0026v=1",
        "target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0918V6b_pdf.pdf?__blob=publicationFile\u0026v=1"
      },
      "product": "CONEXA 3.0, SW: v3.80.0-cc, HW V01.00 \u0026 V01.01",
      "subcategory": "(Smart Meter Gateway)",
      "url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartMeter_Gateway/0918_0918V2_0918V3_0918V4_0918V5_0918V6.html",
      "vendor": "Theben Smart Energy GmbH (vormals: Theben AG)"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0957-V2-2016"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0978-2016",
          "BSI-DSZ-CC-0957-V2-2016"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2024-04-19",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0918V6ma1a_pdf.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0918V6ma1b_pdf.pdf",
        "maintenance_title": "CONEXA 3.0 Version 1.5, Software: v3.80.3-cc, Hardware: HW V01.00 \u0026 V01.01"
      }
    ]
  },
  "manufacturer": "Theben Smart Energy GmbH",
  "manufacturer_web": "https://www.theben.de",
  "name": "CONEXA 3.0, SW: v3.80.0-cc, HW V01.00 \u0026 V01.01",
  "not_valid_after": "2032-02-07",
  "not_valid_before": "2024-02-08",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "0918V6c_pdf.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0918-V6-2024": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 1,
          "ALC_FLR.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 4": 2,
          "EAL 4 augmented": 1,
          "EAL 5": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, Smart Meter Gateway, SMGW, Theben, Conexa\"",
      "/Subject": "Common Criteria, Certification, Zertifizierung, Smart Meter Gateway, SMGW, Theben, Conexa",
      "/Title": "Certification Report BSI-DSZ-CC-0918-V6-2024",
      "pdf_file_size_bytes": 337823,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "0918V6a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.2 and AVA_VAN.5 valid until: 07 February 2032",
        "cc_version": "PP conformant Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-0918-V6-2024",
        "cert_item": "CONEXA 3.0 SW: v3.80.0-cc, HW V01.00 \u0026 V01.01",
        "cert_lab": "BSI",
        "developer": "Theben Smart Energy GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI- CC-PP-0073-2014"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 4
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0918-V5-": 1,
          "BSI-DSZ-CC-0918-V5-2023": 2,
          "BSI-DSZ-CC-0918-V6-2024": 14,
          "BSI-DSZ-CC-0957-V2-2016": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0073-2014": 3
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_CMS.4": 2,
          "ALC_FLR": 3,
          "ALC_FLR.2": 5
        },
        "AVA": {
          "AVA_VAN.5": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 3,
          "EAL 4": 8,
          "EAL 4 augmented": 3,
          "EAL 5": 3,
          "EAL 5+": 1,
          "EAL 6": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "3.0 (ALC_CMS.4) F\u00dcR FIRMWARE VERSION 3.80.0-cc, 2024-01-19, Theben Smart Energy GmbH (confidential document) [11] Handbuch CONEXA 3.0 f\u00fcr Gateway Administrator, Version 2.12.1, 2023-09-04, Theben Smart": 1,
          "ALC_CMS.4 Konfigurationsliste Smart Meter Gateway CONEXA 3.0 Version 1.0, Theben Smart Energy GmbH (confidential document) [10] Configuration list for the TOE SW, \u201cASSURANCE LIFE CYCLE \u2013 CONFIGURATION MANAGEMENT\u201d DER": 1,
          "Report \u2013 Smart Meter Gateway CONEXA 3.0, Version 1.0, 2024-01- 23, Theben Smart Energy GmbH (confidential document) [20] Technische Richtlinie BSI TR-03109-1 Anforderungen an die Interoperabilit\u00e4t der": 1,
          "Smart Energy GmbH [7] ETR Summary CONEXA 1.5, Version 2, 31.01.2024, T\u00dcV Informationstechnik GmbH, (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        },
        "GCM": {
          "GCM": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 3
        },
        "TLS": {
          "TLS": {
            "TLS": 4,
            "TLS 1.2": 1
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Brainpool": {
          "brainpoolP256r1": 1,
          "brainpoolP384r1": 1,
          "brainpoolP512r1": 1
        },
        "NIST": {
          "secp256r1": 1,
          "secp384r1": 1
        }
      },
      "eval_facility": {
        "TSystems": {
          "T-Systems International": 1
        },
        "TUV": {
          "T\u00dcV Informationstechnik": 3
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 32": 1,
          "AIS 34": 2,
          "AIS 38": 1,
          "AIS 46": 2,
          "AIS 48": 2
        },
        "FIPS": {
          "FIPS 180-4": 4,
          "FIPS 197": 7
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        },
        "RFC": {
          "RFC 2104": 3,
          "RFC 3394": 3,
          "RFC 4493": 6,
          "RFC 5084": 3,
          "RFC 5114": 3,
          "RFC 5246": 3,
          "RFC 5289": 3,
          "RFC 5639": 3,
          "RFC5246": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 4
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 2,
            "HMAC": 1
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1,
          "BSI TR-02102": 1,
          "BSI TR-02102-1": 1,
          "BSI TR-03109-1": 1,
          "BSI TR-03109-3": 1,
          "BSI TR-03116": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, Smart Meter Gateway, SMGW, Theben, Conexa\"",
      "/Subject": "Common Criteria, Certification, Zertifizierung, Smart Meter Gateway, SMGW, Theben, Conexa",
      "/Title": "Certification Report BSI-DSZ-CC-0918-V6-2024",
      "pdf_file_size_bytes": 497994,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.sogis.eu/",
          "https://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/",
          "https://www.bsi.bund.de/zertifizierung",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "https://www.bsi.bund.de/AIS",
          "http://www.commoncriteriaportal.org/cc/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 27
    },
    "st_filename": "0918V6b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 5
          },
          "ECDSA": {
            "ECDSA": 1
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0957-V2-2016": 1
        }
      },
      "cc_claims": {
        "OE": {
          "OE.SM": 4
        },
        "OSP": {
          "OSP.SM": 5
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0073": 1,
          "BSI-CC-PP-0077": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_DEL.1": 1,
          "ALC_FLR.2": 6,
          "ALC_LCD.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_INT.1": 1,
          "ASE_REQ.2": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_FUN.1": 1
        },
        "AVA": {
          "AVA_VAN.5": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 5,
          "EAL 4 augmented": 2,
          "EAL4": 1,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP": 10,
          "FAU_ARP.1": 1,
          "FAU_GEN": 38,
          "FAU_GEN.1": 22,
          "FAU_GEN.2": 8,
          "FAU_GEN.2.1": 1,
          "FAU_SAA": 11,
          "FAU_SAA.1": 4,
          "FAU_SAR": 30,
          "FAU_SAR.1": 7,
          "FAU_STG": 32,
          "FAU_STG.1": 8,
          "FAU_STG.2": 15,
          "FAU_STG.2.1": 1,
          "FAU_STG.2.2": 1,
          "FAU_STG.2.3": 1,
          "FAU_STG.3": 3,
          "FAU_STG.4": 3
        },
        "FCO": {
          "FCO_NRO": 3,
          "FCO_NRO.1": 1,
          "FCO_NRO.2": 9,
          "FCO_NRO.2.1": 1,
          "FCO_NRO.2.2": 1,
          "FCO_NRO.2.3": 1
        },
        "FCS": {
          "FCS_CKM": 44,
          "FCS_CKM.1": 16,
          "FCS_CKM.2": 6,
          "FCS_CKM.4": 32,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 63,
          "FCS_COP.1": 10,
          "FCS_COP.1.1": 1
        },
        "FDP": {
          "FDP_ACC": 2,
          "FDP_ACC.1": 9,
          "FDP_ACC.2": 11,
          "FDP_ACC.2.1": 1,
          "FDP_ACC.2.2": 1,
          "FDP_ACF.1": 11,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 4,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 3,
          "FDP_IFC": 29,
          "FDP_IFC.1": 12,
          "FDP_IFC.2": 4,
          "FDP_IFF": 25,
          "FDP_IFF.1": 24,
          "FDP_IFF.1.3": 1,
          "FDP_ITC.1": 12,
          "FDP_ITC.2": 12,
          "FDP_RIP": 2,
          "FDP_RIP.1": 1,
          "FDP_RIP.2": 9,
          "FDP_RIP.2.1": 1,
          "FDP_SDI": 2,
          "FDP_SDI.1": 1,
          "FDP_SDI.2": 8,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1
        },
        "FIA": {
          "FIA_AFL": 3,
          "FIA_AFL.1": 8,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD": 3,
          "FIA_ATD.1": 13,
          "FIA_ATD.1.1": 1,
          "FIA_UAU": 5,
          "FIA_UAU.1": 2,
          "FIA_UAU.2": 8,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.5": 7,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6": 8,
          "FIA_UAU.6.1": 1,
          "FIA_UID": 3,
          "FIA_UID.1": 8,
          "FIA_UID.2": 12,
          "FIA_UID.2.1": 1,
          "FIA_USB": 3,
          "FIA_USB.1": 8,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MOF": 1,
          "FMT_MOF.1": 10,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 64,
          "FMT_MSA.1": 9,
          "FMT_MSA.3": 12,
          "FMT_SMF": 2,
          "FMT_SMF.1": 19,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 3,
          "FMT_SMR.1": 30,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_CON": 6,
          "FPR_CON.1": 10,
          "FPR_CON.1.1": 3,
          "FPR_CON.1.2": 5,
          "FPR_PSE": 2,
          "FPR_PSE.1": 8,
          "FPR_PSE.1.1": 3,
          "FPR_PSE.1.2": 2,
          "FPR_PSE.1.3": 2
        },
        "FPT": {
          "FPT_FLS": 3,
          "FPT_FLS.1": 10,
          "FPT_FLS.1.1": 1,
          "FPT_PHP": 3,
          "FPT_PHP.1": 8,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_RPL": 3,
          "FPT_RPL.1": 8,
          "FPT_RPL.1.1": 1,
          "FPT_RPL.1.2": 1,
          "FPT_STM": 3,
          "FPT_STM.1": 18,
          "FPT_STM.1.1": 1,
          "FPT_TST": 3,
          "FPT_TST.1": 9,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 30,
          "FTP_ITC.1": 9
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "GCM": {
          "GCM": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 62,
            "TLS 1.2": 5
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 9
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "NIST P-256": 3,
          "NIST P-384": 3,
          "P-256": 3,
          "P-384": 3,
          "secp256r1": 3,
          "secp384r1": 3
        }
      },
      "eval_facility": {
        "TSystems": {
          "T-Systems International": 3
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 12,
            "SHA-384": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 1
        },
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "malfunction": 2,
          "physical tampering": 4
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 3,
          "FIPS 180-4": 8,
          "FIPS 197": 12
        },
        "RFC": {
          "RFC 2104": 6,
          "RFC 2616": 5,
          "RFC 3394": 3,
          "RFC 4493": 8,
          "RFC 5084": 4,
          "RFC 5114": 5,
          "RFC 5246": 7,
          "RFC 5289": 6,
          "RFC 5639": 5,
          "RFC 5905": 4,
          "RFC5246": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 7
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03109": 1,
          "BSI TR-03109-1": 2
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {
        "TLS": {
          "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256": 2,
          "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 2,
          "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384": 2,
          "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 2
        }
      },
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Theben Smart Energy GmbH",
      "/Subject": "Security Target",
      "/Title": "Security Target v1.95.3 - CONEXA 3.0",
      "pdf_file_size_bytes": 1738755,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf",
          "https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf",
          "http://www.jtc1sc27.din.de/sce/sd6"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 131
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0918V6a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.2",
      "EAL4+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0918V6b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "a6de31c6d6a8ab37487745d9545a880a16a8a2bce724f5016f4711461ec529fe",
      "txt_hash": "c9a0d9dfd58f54925e53c4c82494327a7752e9446931ddb3457d98dadec1ad48"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "787e531aad090ed839278fcad592cf51afa0c051ace9f6f9d7f4fa30fbf95e20",
      "txt_hash": "f9dba75b5963aff4c372f177654451d02a8ddd928593d9a8c70c7315f92f02dd"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "28b29b29fe28358deb3347adcc10a486b1ba821df893007920951e40e8c9f3c1",
      "txt_hash": "260d5bd231c06afd14c5bae7c226393522b8dd8423cc59e9bb28924a392c401f"
    }
  },
  "status": "active"
}