This page was not yet optimized for use on mobile devices.
SLB9670_1.2 v6.40.0190.00
CSV information ?
Status | archived |
---|---|
Valid from | 16.04.2015 |
Valid until | 16.04.2020 |
Scheme | 🇩🇪 DE |
Manufacturer | Infineon Technologies AG |
Category | Trusted Computing |
Security level | AVA_VAN.4, EAL4+, ALC_FLR.1 |
Protection profiles | |
Maintenance updates | Infineon Technologies AG Trusted Platform Module SLB9670_1.2, v6.40.0190.00, v6.41.0197.00, v6.41.0198.00, v6.42.0204.00 and v6.42.0205.00 (23.02.2017) Certification report Security target |
Infineon Technologies AG Trusted Platform Module SLB9670_1.2, v6.40.0190.00 and v6.41.0197.00 and v6.41.0198.00 (03.05.2016) Certification report Security target |
Heuristics summary ?
Certificate ID: BSI-DSZ-CC-0958-2015
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, HMACAsymmetric Algorithms
RSA2048Hash functions
SHA-1, SHA-256Schemes
MAC, Key AgreementRandomness
TRNG, RNG, RNDBlock cipher modes
CBC, CTRVendor
Infineon Technologies AG, Infineon, Infineon TechnologiesSecurity level
EAL 4, EAL 1, EAL 2, EAL5+, EAL6, EAL 3, EAL 5, EAL 6, EAL 7, EAL 4 augmented, ITSEC EvaluationClaims
O.C, R.OSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_FLR.1, ALC_FLR, ALC_DVS, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_DVS.2, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_TAT, ATE_FUN, ATE_IND, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, AVA_VAN.4, AVA_VAN, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.5, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0030-2008-MA-02Certificates
BSI-DSZ-CC-0958-2015Evaluation facilities
TÃœV Informationstechnik, TÃœViT, TUViTSide-channel analysis
side channel, SPA, DPA, physical tampering, Fault Injection, JILCertification process
and certification procedure is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the product or resulting from the evaluation and certification, Documentation - Configuration Management SLB9670_1.2, Infineon Technologies AG, V0.4, 2015-03-31 (confidential document) 8 Specifically: • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung, 9] Evaluation Technical Report BSI-DSZ-CC-0958-2015, V2, 2015-04-14, TÜV Informationstechnik GmbH (confidential document) [10] Evaluation Documentation - SLB9670_1.2 Literature_Reference, Infineon Technologies AG, V0.6, confidential document) [11] RFC 2104, HMAC: Keyed-Hashing for Message Authentication, http://www.ietf.org/rfc/rfc2104.txtStandards
FIPS180-2, FIPS197, SP 800-108, PKCS#1, PKCS #1, AIS20, AIS31, AIS 34, AIS 20, AIS 31, AIS 1, AIS 14, AIS 19, AIS 25, AIS 26, AIS 32, AIS 37, AIS 38, AIS 41, AIS 46, RFC2104, RFC 2104, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065Technical reports
BSI TR-02102, BSI 7138, BSI 7125, BSI 7148File metadata
Title | Certification Report BSI-DSZ-CC-0958-2015 |
---|---|
Subject | Common Criteria Zertifizierung |
Keywords | "Common Criteria, Certification, Zertifizierung, TPM, Infineon" |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Creation date | D:20150422071632+02'00' |
Modification date | D:20150422144720+02'00' |
Pages | 42 |
Creator | Writer |
Producer | LibreOffice 4.2 |
Frontpage
Certificate ID | BSI-DSZ-CC-0958-2015 |
---|---|
Certified item | SLB9670_1.2 v6.40.0190.00 |
Certification lab | BSI |
Developer | Infineon Technologies AG |
References
Incoming- BSI-DSZ-CC-1021-2016 - archived - Infineon Technologies AG Trusted Platform Module SLB9670_2.0 v7.60.2677.00
- BSI-DSZ-CC-0958-V2-2017 - archived - Infineon Technologies AG Trusted Platform Module SLB9670_1.2 v6.43.0243.00, v6.43.0244.00, v6.43.0245.00 and v6.43.0246.00
Security target ?
Extracted keywords
Symmetric Algorithms
AES, Triple-DES, HMACAsymmetric Algorithms
RSA-2048, RSA2048, RSA 512, ECCHash functions
SHA-1Schemes
MACRandomness
RNG, RNDBlock cipher modes
CBC, CTRVendor
Infineon Technologies AG, Infineon TechnologiesSecurity level
EAL4, EAL4 augmentedSecurity Assurance Requirements (SAR)
ADV_VAN.4, ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS, ALC_FLR.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.4, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FCO_NRO, FCO_NRO.1, FCS_RNG.1, FCS_RNG, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1, FCS_CKM.4.1, FCS_COP, FDP_ITC.1, FDP_ITC.2, FDP_ACF, FDP_ACC.1, FDP_ACF.1, FDP_IFC.1, FDP_ACC, FDP_RIP.1, FDP_ETC.2, FDP_UCT, FDP_UIT, FDP_TDC.1, FDP_UCT.1, FDP_UIT.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.4, FIA_UAU.6, FIA_USB.1, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA.3, FMT_MSA, FMT_MSA.1, FMT_SMR.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MTD, FMT_MTD.1, FPR_UNL.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_FLS.1, FPT_FLS.1.1, FPT_PHP.3, FPT_PHP.3.1, FPT_STM.1, FPT_TST.1Protection profiles
BSI-CC-PP-0030-2008-MA-02, BSI-PP-0030-2008-MA-02Side-channel analysis
physical probing, DPA, SPA, DFAStandards
FIPS PUB 140-1, FIPS PUB 197, FIPS PUB 180-2, FIPS 180-1, PKCS#1, PKCS #1, AIS 20, RFC3447, RFC2104, RFC 2104, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Title | Microsoft Word - SLB9670_SecTar.doc |
---|---|
Author | Noller |
Creation date | D:20150331095209+02'00' |
Modification date | D:20150331095216+02'00' |
Pages | 66 |
Creator | Microsoft Word - SLB9670_SecTar.doc |
Producer | Nuance PDF Create 8 |
Heuristics ?
Certificate ID: BSI-DSZ-CC-0958-2015
Extracted SARs
ASE_CCL.1, ALC_DEL.1, AVA_VAN.4, ALC_CMC.4, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ADV_ARC.1, ASE_TSS.1, ADV_TDS.3, ASE_SPD.1, ASE_REQ.2, ALC_CMS.4, ALC_TAT.1, ADV_IMP.1, ATE_COV.2, APE_INT.1, AGD_OPE.1, ALC_DVS.1, APE_CCL.1, APE_REQ.2, APE_ECD.1, ASE_ECD.1, ADV_INT.3, ADV_SPM.1, ADV_FSP.4, ASE_INT.1, APE_OBJ.2, ADV_VAN.4, APE_SPD.1, AGD_PRE.1, ALC_LCD.1, ALC_FLR.1, ASE_OBJ.2References ?
Updates ?
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PC Client Specific Trusted Platform Module Family 1.2; Level 2, Version 1.1', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0030b.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['BSI-CC-PP-030-2008']}}]}
.
- The new value is
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '616cd6fa62f92830f5ee3905d8dc41d2724eda60637798ee0490e2641a1da78c', 'txt_hash': '691813e244dcaa4f829c4ffca24ecd5ecf7a1544fcead8d41663b7e7bb92bd34'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '8e947b567157b3e15beaf1d05855cb530d3aa1bc44258afaff8a4c774f28ff59', 'txt_hash': 'b6251dc69d30058acec74308f47213f3af5ed871b30b3223695f5dc39c7fcc3a'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 1466603, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 42, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20150422071632+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, TPM, Infineon"', '/ModDate': "D:20150422144720+02'00'", '/Producer': 'LibreOffice 4.2', '/Subject': 'Common Criteria Zertifizierung', '/Title': 'Certification Report BSI-DSZ-CC-0958-2015', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.d/', 'https://www.bsi.bund.de/', 'https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/', 'http://www.ietf.org/rfc/rfc2104.txt']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1316328, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 66, '/Creator': 'Microsoft Word - SLB9670_SecTar.doc', '/Producer': 'Nuance PDF Create 8', '/CreationDate': "D:20150331095209+02'00'", '/ModDate': "D:20150331095216+02'00'", '/Author': 'Noller', '/Title': 'Microsoft Word - SLB9670_SecTar.doc', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.infineon.com/', 'http://www.ietf.org/rfc/rfc2104.txt', 'http://www.rsa.com/']}}
. - The report_frontpage property was set to
{'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0958-2015', 'cert_item': 'SLB9670_1.2 v6.40.0190.00', 'developer': 'Infineon Technologies AG', 'cert_lab': 'BSI', 'ref_protection_profiles': 'TCG Protection Profile PC Client Specific TPM, Family 1.2; Level 2 Revision 116, Version: 1.3; 14 July, 2014, BSI-CC-PP-0030-2008-MA-02', 'cc_version': 'PP conformant plus product specific extensions Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.1 and AVA_VAN.4 Valid until (*): 15 April 2020 SOGIS Recognition Agreement'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0958-2015': 24}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0030-2008-MA-02': 4}}, 'cc_security_level': {'EAL': {'EAL 4': 13, 'EAL 1': 7, 'EAL 2': 4, 'EAL5+': 1, 'EAL6': 1, 'EAL 3': 4, 'EAL 5': 6, 'EAL 6': 3, 'EAL 7': 4, 'EAL 4 augmented': 3}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.1': 1, 'ADV_FSP.2': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.5': 1, 'ADV_FSP.6': 1, 'ADV_IMP.1': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_INT.2': 1, 'ADV_INT.3': 1, 'ADV_SPM.1': 1, 'ADV_TDS.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.4': 1, 'ADV_TDS.5': 1, 'ADV_TDS.6': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.1': 7, 'ALC_FLR': 3, 'ALC_DVS': 2, 'ALC_CMC.1': 1, 'ALC_CMC.2': 1, 'ALC_CMC.3': 1, 'ALC_CMC.4': 2, 'ALC_CMC.5': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 2, 'ALC_CMS.5': 1, 'ALC_DEL.1': 2, 'ALC_DVS.1': 2, 'ALC_DVS.2': 1, 'ALC_FLR.2': 1, 'ALC_FLR.3': 1, 'ALC_LCD.1': 2, 'ALC_LCD.2': 1, 'ALC_TAT.1': 2, 'ALC_TAT.2': 1, 'ALC_TAT.3': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_FUN': 3, 'ATE_IND': 2, 'ATE_COV.1': 1, 'ATE_COV.2': 1, 'ATE_COV.3': 1, 'ATE_DPT.1': 1, 'ATE_DPT.2': 1, 'ATE_DPT.3': 1, 'ATE_DPT.4': 1, 'ATE_FUN.1': 1, 'ATE_FUN.2': 1, 'ATE_IND.1': 1, 'ATE_IND.2': 1, 'ATE_IND.3': 1, 'ATE_COV': 1, 'ATE_DPT': 1}, 'AVA': {'AVA_VAN.4': 6, 'AVA_VAN': 3, 'AVA_VAN.1': 1, 'AVA_VAN.2': 1, 'AVA_VAN.3': 1, 'AVA_VAN.5': 1}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.C': 2}, 'R': {'R.O': 2}}, 'vendor': {'Infineon': {'Infineon Technologies AG': 15, 'Infineon': 4, 'Infineon Technologies': 9}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 3, 'TÜViT': 1, 'TUViT': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 6}}, 'constructions': {'MAC': {'HMAC': 5}}}, 'asymmetric_crypto': {'RSA': {'RSA2048': 1}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}, 'SHA2': {'SHA-256': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 1}, 'KA': {'Key Agreement': 2}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RNG': 3, 'RND': 1}}, 'cipher_mode': {'CBC': {'CBC': 2}, 'CTR': {'CTR': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 1, 'SPA': 1, 'DPA': 2}, 'FI': {'physical tampering': 1, 'Fault Injection': 1}, 'other': {'JIL': 1}}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 7138': 2, 'BSI 7125': 2, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS180-2': 5, 'FIPS197': 2}, 'NIST': {'SP 800-108': 1}, 'PKCS': {'PKCS#1': 6, 'PKCS #1': 1}, 'BSI': {'AIS20': 2, 'AIS31': 1, 'AIS 34': 2, 'AIS 20': 2, 'AIS 31': 2, 'AIS 1': 1, 'AIS 14': 1, 'AIS 19': 1, 'AIS 25': 1, 'AIS 26': 1, 'AIS 32': 1, 'AIS 37': 1, 'AIS 38': 1, 'AIS 41': 1, 'AIS 46': 1}, 'RFC': {'RFC2104': 4, 'RFC 2104': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'and certification procedure is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the product or resulting from the evaluation and certification': 1, 'Documentation - Configuration Management SLB9670_1.2, Infineon Technologies AG, V0.4, 2015-03-31 (confidential document) 8 Specifically: • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung': 1, '9] Evaluation Technical Report BSI-DSZ-CC-0958-2015, V2, 2015-04-14, TÜV Informationstechnik GmbH (confidential document) [10] Evaluation Documentation - SLB9670_1.2 Literature_Reference, Infineon Technologies AG, V0.6': 1, 'confidential document) [11] RFC 2104, HMAC: Keyed-Hashing for Message Authentication, http://www.ietf.org/rfc/rfc2104.txt': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0030-2008-MA-02': 1, 'BSI-PP-0030-2008-MA-02': 1}}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_VAN.4': 1, 'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS': 1, 'ALC_FLR.1': 3, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.4': 2}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 3}, 'FCO': {'FCO_NRO': 4, 'FCO_NRO.1': 1}, 'FCS': {'FCS_RNG.1': 22, 'FCS_RNG': 4, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM': 8, 'FCS_CKM.2': 2, 'FCS_COP.1': 6, 'FCS_CKM.4': 10, 'FCS_CKM.1': 9, 'FCS_CKM.4.1': 1, 'FCS_COP': 19}, 'FDP': {'FDP_ITC.1': 5, 'FDP_ITC.2': 8, 'FDP_ACF': 25, 'FDP_ACC.1': 9, 'FDP_ACF.1': 30, 'FDP_IFC.1': 1, 'FDP_ACC': 18, 'FDP_RIP.1': 2, 'FDP_ETC.2': 3, 'FDP_UCT': 4, 'FDP_UIT': 4, 'FDP_TDC.1': 1, 'FDP_UCT.1': 1, 'FDP_UIT.1': 1}, 'FIA': {'FIA_UID.1': 5, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 5, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.5': 4, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_AFL.1': 4, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.4': 2, 'FIA_UAU.6': 3, 'FIA_USB.1': 3}, 'FMT': {'FMT_SMF.1': 4, 'FMT_SMF.1.1': 1, 'FMT_MSA.3': 17, 'FMT_MSA': 36, 'FMT_MSA.1': 7, 'FMT_SMR.1': 8, 'FMT_MSA.2': 4, 'FMT_MSA.2.1': 1, 'FMT_MTD': 8, 'FMT_MTD.1': 1}, 'FPR': {'FPR_UNL.1': 3}, 'FPT': {'FPT_TDC.1': 3, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_FLS.1': 4, 'FPT_FLS.1.1': 1, 'FPT_PHP.3': 4, 'FPT_PHP.3.1': 1, 'FPT_STM.1': 3, 'FPT_TST.1': 3}}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies AG': 12, 'Infineon Technologies': 5}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 21}}, 'DES': {'3DES': {'Triple-DES': 1}}, 'constructions': {'MAC': {'HMAC': 8}}}, 'asymmetric_crypto': {'RSA': {'RSA-2048': 1, 'RSA2048': 1, 'RSA 512': 5}, 'ECC': {'ECC': {'ECC': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 32}}}, 'crypto_scheme': {'MAC': {'MAC': 4}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 14, 'RND': 1}}, 'cipher_mode': {'CBC': {'CBC': 4}, 'CTR': {'CTR': 2}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 2, 'DPA': 1, 'SPA': 1}, 'FI': {'DFA': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 140-1': 3, 'FIPS PUB 197': 3, 'FIPS PUB 180-2': 3, 'FIPS 180-1': 1}, 'PKCS': {'PKCS#1': 5, 'PKCS #1': 1}, 'BSI': {'AIS 20': 1}, 'RFC': {'RFC3447': 4, 'RFC2104': 3, 'RFC 2104': 1}, 'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
0958a_pdf.pdf
. - The st_filename property was set to
0958b_pdf.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['BSI']
. - The cert_id property was set to
BSI-DSZ-CC-0958-2015
. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1021-2016', 'BSI-DSZ-CC-0958-V2-2017']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1021-V2-2017', 'BSI-DSZ-CC-0958-V2-2017', 'BSI-DSZ-CC-1058-2018', 'BSI-DSZ-CC-1057-2018', 'BSI-DSZ-CC-1086-2018', 'BSI-DSZ-CC-1021-2016', 'BSI-DSZ-CC-1100-2018']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_VAN', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0958a_pdf.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0958b_pdf.pdf
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The report_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_VAN', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}
values discarded.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name SLB9670_1.2 v6.40.0190.00 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Trusted Computing",
"cert_link": null,
"dgst": "017c2e6dd07883c5",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0958-2015",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_VAN",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"6.40.0190.00",
"1.2"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0958-V2-2017",
"BSI-DSZ-CC-1021-2016"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1021-V2-2017",
"BSI-DSZ-CC-1021-2016",
"BSI-DSZ-CC-1058-2018",
"BSI-DSZ-CC-1086-2018",
"BSI-DSZ-CC-1100-2018",
"BSI-DSZ-CC-0958-V2-2017",
"BSI-DSZ-CC-1057-2018"
]
},
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2017-02-23",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0958ma2a_pdf.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0958ma2b_pdf.pdf",
"maintenance_title": "Infineon Technologies AG Trusted Platform Module SLB9670_1.2, v6.40.0190.00, v6.41.0197.00, v6.41.0198.00, v6.42.0204.00 and v6.42.0205.00"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2016-05-03",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0958ma1a_pdf.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0958ma1b_pdf.pdf",
"maintenance_title": "Infineon Technologies AG Trusted Platform Module SLB9670_1.2, v6.40.0190.00 and v6.41.0197.00 and v6.41.0198.00"
}
]
},
"manufacturer": "Infineon Technologies AG",
"manufacturer_web": "https://www.infineon.com/",
"name": "SLB9670_1.2 v6.40.0190.00",
"not_valid_after": "2020-04-16",
"not_valid_before": "2015-04-16",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0958a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.1 and AVA_VAN.4 Valid until (*): 15 April 2020 SOGIS Recognition Agreement",
"cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-0958-2015",
"cert_item": "SLB9670_1.2 v6.40.0190.00",
"cert_lab": "BSI",
"developer": "Infineon Technologies AG",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "TCG Protection Profile PC Client Specific TPM, Family 1.2; Level 2 Revision 116, Version: 1.3; 14 July, 2014, BSI-CC-PP-0030-2008-MA-02"
}
},
"report_keywords": {
"asymmetric_crypto": {
"RSA": {
"RSA2048": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0958-2015": 24
}
},
"cc_claims": {
"O": {
"O.C": 2
},
"R": {
"R.O": 2
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0030-2008-MA-02": 4
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 1,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 1,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 2,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 2,
"ALC_CMS.5": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 2,
"ALC_DVS": 2,
"ALC_DVS.1": 2,
"ALC_DVS.2": 1,
"ALC_FLR": 3,
"ALC_FLR.1": 7,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 2,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 2,
"ALC_TAT.2": 1,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_COV.3": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 1,
"ATE_DPT.4": 1,
"ATE_FUN": 3,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND": 2,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 3,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 6,
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 7,
"EAL 2": 4,
"EAL 3": 4,
"EAL 4": 13,
"EAL 4 augmented": 3,
"EAL 5": 6,
"EAL 6": 3,
"EAL 7": 4,
"EAL5+": 1,
"EAL6": 1
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"9] Evaluation Technical Report BSI-DSZ-CC-0958-2015, V2, 2015-04-14, T\u00dcV Informationstechnik GmbH (confidential document) [10] Evaluation Documentation - SLB9670_1.2 Literature_Reference, Infineon Technologies AG, V0.6": 1,
"Documentation - Configuration Management SLB9670_1.2, Infineon Technologies AG, V0.4, 2015-03-31 (confidential document) 8 Specifically: \u2022 AIS 1, Version 13, Durchf\u00fchrung der Ortsbesichtigung in der Entwicklungsumgebung": 1,
"and certification procedure is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the product or resulting from the evaluation and certification": 1,
"confidential document) [11] RFC 2104, HMAC: Keyed-Hashing for Message Authentication, http://www.ietf.org/rfc/rfc2104.txt": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"CTR": {
"CTR": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 2
},
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"TUViT": 1,
"T\u00dcV Informationstechnik": 3,
"T\u00dcViT": 1
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 4
},
"SHA2": {
"SHA-256": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 1,
"RNG": 3
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Fault Injection": 1,
"physical tampering": 1
},
"SCA": {
"DPA": 2,
"SPA": 1,
"side channel": 1
},
"other": {
"JIL": 1
}
},
"standard_id": {
"BSI": {
"AIS 1": 1,
"AIS 14": 1,
"AIS 19": 1,
"AIS 20": 2,
"AIS 25": 1,
"AIS 26": 1,
"AIS 31": 2,
"AIS 32": 1,
"AIS 34": 2,
"AIS 37": 1,
"AIS 38": 1,
"AIS 41": 1,
"AIS 46": 1,
"AIS20": 2,
"AIS31": 1
},
"FIPS": {
"FIPS180-2": 5,
"FIPS197": 2
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
},
"NIST": {
"SP 800-108": 1
},
"PKCS": {
"PKCS #1": 1,
"PKCS#1": 6
},
"RFC": {
"RFC 2104": 1,
"RFC2104": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 6
}
},
"constructions": {
"MAC": {
"HMAC": 5
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7138": 2,
"BSI 7148": 1,
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 4,
"Infineon Technologies": 9,
"Infineon Technologies AG": 15
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20150422071632+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, TPM, Infineon\"",
"/ModDate": "D:20150422144720+02\u002700\u0027",
"/Producer": "LibreOffice 4.2",
"/Subject": "Common Criteria Zertifizierung",
"/Title": "Certification Report BSI-DSZ-CC-0958-2015",
"pdf_file_size_bytes": 1466603,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ietf.org/rfc/rfc2104.txt",
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/zertifizierung",
"https://www.bsi.bund.d/",
"https://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 42
},
"st_filename": "0958b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
}
},
"RSA": {
"RSA 512": 5,
"RSA-2048": 1,
"RSA2048": 1
}
},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0030-2008-MA-02": 1,
"BSI-PP-0030-2008-MA-02": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1,
"ADV_VAN.4": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_FLR.1": 3,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.4": 2
}
},
"cc_security_level": {
"EAL": {
"EAL4": 2,
"EAL4 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 3
},
"FCO": {
"FCO_NRO": 4,
"FCO_NRO.1": 1
},
"FCS": {
"FCS_CKM": 8,
"FCS_CKM.1": 9,
"FCS_CKM.2": 2,
"FCS_CKM.4": 10,
"FCS_CKM.4.1": 1,
"FCS_COP": 19,
"FCS_COP.1": 6,
"FCS_RNG": 4,
"FCS_RNG.1": 22,
"FCS_RNG.1.1": 2,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC": 18,
"FDP_ACC.1": 9,
"FDP_ACF": 25,
"FDP_ACF.1": 30,
"FDP_ETC.2": 3,
"FDP_IFC.1": 1,
"FDP_ITC.1": 5,
"FDP_ITC.2": 8,
"FDP_RIP.1": 2,
"FDP_TDC.1": 1,
"FDP_UCT": 4,
"FDP_UCT.1": 1,
"FDP_UIT": 4,
"FDP_UIT.1": 1
},
"FIA": {
"FIA_AFL.1": 4,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_UAU.1": 5,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.4": 2,
"FIA_UAU.5": 4,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 3,
"FIA_UID.1": 5,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_USB.1": 3
},
"FMT": {
"FMT_MSA": 36,
"FMT_MSA.1": 7,
"FMT_MSA.2": 4,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 17,
"FMT_MTD": 8,
"FMT_MTD.1": 1,
"FMT_SMF.1": 4,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 8
},
"FPR": {
"FPR_UNL.1": 3
},
"FPT": {
"FPT_FLS.1": 4,
"FPT_FLS.1.1": 1,
"FPT_PHP.3": 4,
"FPT_PHP.3.1": 1,
"FPT_STM.1": 3,
"FPT_TDC.1": 3,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST.1": 3
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 4
},
"CTR": {
"CTR": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 4
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 32
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 1,
"RNG": 14
}
},
"side_channel_analysis": {
"FI": {
"DFA": 1
},
"SCA": {
"DPA": 1,
"SPA": 1,
"physical probing": 2
}
},
"standard_id": {
"BSI": {
"AIS 20": 1
},
"CC": {
"CCMB-2012-09-001": 2,
"CCMB-2012-09-002": 2,
"CCMB-2012-09-003": 2,
"CCMB-2012-09-004": 1
},
"FIPS": {
"FIPS 180-1": 1,
"FIPS PUB 140-1": 3,
"FIPS PUB 180-2": 3,
"FIPS PUB 197": 3
},
"PKCS": {
"PKCS #1": 1,
"PKCS#1": 5
},
"RFC": {
"RFC 2104": 1,
"RFC2104": 3,
"RFC3447": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 21
}
},
"DES": {
"3DES": {
"Triple-DES": 1
}
},
"constructions": {
"MAC": {
"HMAC": 8
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon Technologies": 5,
"Infineon Technologies AG": 12
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Noller",
"/CreationDate": "D:20150331095209+02\u002700\u0027",
"/Creator": "Microsoft Word - SLB9670_SecTar.doc",
"/ModDate": "D:20150331095216+02\u002700\u0027",
"/Producer": "Nuance PDF Create 8",
"/Title": "Microsoft Word - SLB9670_SecTar.doc",
"pdf_file_size_bytes": 1316328,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ietf.org/rfc/rfc2104.txt",
"http://www.rsa.com/",
"http://www.infineon.com/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 66
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL4+",
"pp_ids": {
"_type": "Set",
"elements": [
"BSI-CC-PP-030-2008"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0030b.pdf",
"pp_name": "PC Client Specific Trusted Platform Module Family 1.2; Level 2, Version 1.1"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0958a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.4",
"ALC_FLR.1",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0958b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "616cd6fa62f92830f5ee3905d8dc41d2724eda60637798ee0490e2641a1da78c",
"txt_hash": "691813e244dcaa4f829c4ffca24ecd5ecf7a1544fcead8d41663b7e7bb92bd34"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "8e947b567157b3e15beaf1d05855cb530d3aa1bc44258afaff8a4c774f28ff59",
"txt_hash": "b6251dc69d30058acec74308f47213f3af5ed871b30b3223695f5dc39c7fcc3a"
}
},
"status": "archived"
}