Infineon Technologies AG Trusted Platform Module SLB9670_2.0 v7.40.2098.00
CSV information ?
Status | archived |
---|---|
Valid from | 28.01.2016 |
Valid until | 28.02.2021 |
Scheme | 🇩🇪 DE |
Manufacturer | Infineon Technologies AG |
Category | Trusted Computing |
Security level | AVA_VAN.4, EAL4+, ALC_FLR.1 |
Maintenance updates | Infineon Technologies AG Trusted Platform Module SLB9670_2.0 v7.40.2098.00 and v7.41.2375.00 (31.05.2016) Certification report Security target |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AESAsymmetric Algorithms
ECCHash functions
SHA-1, SHA-256Schemes
MACProtocols
PGPRandomness
RNGVendor
Infineon Technologies AG, Infineon Technologies, Infineon, Infineon AGSecurity level
EAL 4, EAL 1, EAL 2, EAL 3, EAL 5, EAL 6, EAL 7, EAL 4 augmented, ITSEC EvaluationClaims
O.C, R.OSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_FLR.1, ALC_FLR, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_DVS.2, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_FUN, ATE_COV.2, ATE_DPT.1, ATE_IND, ATE_COV.1, ATE_COV.3, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, AVA_VAN.4, AVA_VAN, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.5, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSProtection profiles
ANSSI-CC-PP-2015/07Certificates
BSI-DSZ-CC-0998-2016, BSI-DSZ-CC-0965-2015, ANSSI-CC-PP-2015/07Evaluation facilities
TÜV InformationstechnikSide-channel analysis
side channel, SPA, DPA, physical tampering, Fault Injection, JILCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, to the certified TOE Version v7.40.2098.00. TOE Delivery The delivery of the TOE related confidential documentation (No. 2 to 4 in Table 2) is done from the Infineon Technologies department AE at the site, Technical Report Summary, TÜV Informationtechnik GmbH – Evaluation Body for IT Security, (confidential document) [8] Protection Profile, TPM Library specification Family “2.0”, Level 0 Revision 1.16, December 10Standards
AIS20, AIS 25, AIS 26, AIS 20, AIS 31, AIS 32, AIS 38, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065Technical reports
BSI TR-02102, BSI 7148File metadata
Title | Certification Report BSI-DSZ-CC-0998-2016 |
---|---|
Subject | BSI-DSZ-CC-0998-2016 |
Keywords | "Common Criteria, Certification, Zertifizierung, TPM, Trusted Platform Module" |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Creation date | D:20160223154441+01'00' |
Modification date | D:20160225113948+01'00' |
Pages | 44 |
Creator | Writer |
Producer | LibreOffice 4.2 |
Frontpage
Certificate ID | BSI-DSZ-CC-0998-2016 |
---|---|
Certified item | Infineon Technologies AG Trusted Platform Module SLB9670_2.0, v7.40.2098.00 |
Certification lab | BSI |
Developer | Infineon Technologies AG |
References
Outgoing- BSI-DSZ-CC-0965-2015 - archived - Trusted Platform Module SLB9665_2.0 v5.51.2098.00
- BSI-DSZ-CC-1021-2016 - archived - Infineon Technologies AG Trusted Platform Module SLB9670_2.0 v7.60.2677.00
Security target ?
Extracted keywords
Symmetric Algorithms
AES, Triple-DES, HMACAsymmetric Algorithms
RSA-2048, RSA 1024, ECDH, ECDSA, ECCHash functions
SHA-1, SHA-256Schemes
MAC, Key AgreementRandomness
DRBG, RNGElliptic Curves
P-256, Curve P-256Block cipher modes
CBC, CFBVendor
Infineon Technologies AG, Infineon Technologies, InfineonSecurity level
EAL4, EAL4 augmentedSecurity Assurance Requirements (SAR)
ADV_VAN.4, ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS, ALC_FLR.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.4, ASE_INT, ASE_CCL, ASE_SPD, ASE_OBJ, ASE_ECD, ASE_REQ, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FCO_NRO, FCS_RNG.1, FCS_CKM, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1, FCS_CKM.4.1, FCS_COP, FCS_RNG, FCS_RNG.1.1, FCS_RNG.1.2, FDP_ACC.1, FDP_IFC.1, FDP_ITC.1, FDP_ITC.2, FDP_ACF, FDP_ACF.1, FDP_UIT, FDP_UIT.1, FDP_RIP.1, FDP_ACC, FDP_SDI.1, FDP_ETC, FDP_ITC, FDP_UCT, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_SOS.2, FIA_AFL, FIA_UAU.1, FIA_UAU.5, FIA_UAU.6, FIA_USB.1, FIA_MSA, FMT_MSA.2, FMT_MSA.1, FMT_SMR.1, FMT_MSA.2.1, FMT_MSA.3, FMT_MSA, FMT_MTD, FMT_SMF.1, FMT_MOF, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS, FPT_FLS.1, FPT_PHP.3, FPT_PHP.3.1, FPT_STM.1, FTP_ITC.1, FTP_TRP.1, FTP_ITCProtection profiles
ANSSI-CC-PP-2014, ANSSI-CC-PP-2015/07Certificates
ANSSI-CC-PP-2015/07Side-channel analysis
physical probing, DPA, SPA, DFAStandards
FIPS PUB 140-2, FIPS PUB 180-4, FIPS PUB 186-3, FIPS PUB 186-4, FIPS 180-2, SP 800-108, NIST SP 800-90A, PKCS#1, AIS20, RFC3447, RFC 3447, RFC 2104, ISO/IEC 15946-1, ISO/IEC 9797-2, ISO/IEC 14888-3, ISO/IEC 10118-3, ISO/IEC 10116:2006, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Title | CC EAL4+ moderate Certification Security Target |
---|---|
Subject | Security Target SLB9670_2.0 |
Keywords | Infineon, CCS, Security Target, EAL4+, moderate, SLB967x, SLB9670, SPI, Trusted Computing, TPM 2.0, Trusted Platform Module |
Author | Jürgen Noller |
Creation date | D:20151106080724 |
Modification date | D:20151106080724 |
Pages | 59 |
Creator | Microsoft® Office Word 2007 |
Producer | Microsoft® Office Word 2007 |
Heuristics ?
Extracted SARs
ASE_CCL.1, ALC_DEL.1, ALC_CMC.4, AVA_VAN.4, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ASE_TSS.1, ADV_TDS.3, ADV_ARC.1, ASE_SPD.1, ASE_REQ.2, ALC_CMS.4, ADV_IMP.1, ALC_TAT.1, ATE_COV.2, APE_INT.1, AGD_OPE.1, ALC_DVS.1, APE_CCL.1, APE_REQ.2, APE_ECD.1, ASE_ECD.1, ADV_INT.3, ADV_SPM.1, ADV_FSP.4, ASE_INT.1, APE_OBJ.2, ADV_VAN.4, AGD_PRE.1, APE_SPD.1, ALC_LCD.1, ALC_FLR.1, ASE_OBJ.2Similar certificates
References ?
Updates ?
-
09.11.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__insert__': {'FR': {'ANSSI-CC-PP-2015/07': 1}}}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'FR': {'ANSSI-CC-PP-2015/07': 1}}}
data.
- The report_keywords property was updated, with the
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '46732ec4d32bcda3c4b8f0f938cea27e5b21b65feef8881c34c672cb17a05d71', 'txt_hash': 'a7a2cbf6af172a07837797474626f8ae7030842c70d0acc8c6c079241e9d6df4'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b9276dbfc87872c311c061f289a41bb8e9448187f0d627c5410252d03d4d11ca', 'txt_hash': 'cf982351b5d8419a997f679bfd3ca2df3fa99b6f2eee1717c581603538981129'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 1422506, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 44, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20160223154441+01'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, TPM, Trusted Platform Module"', '/ModDate': "D:20160225113948+01'00'", '/Producer': 'LibreOffice 4.2', '/Subject': 'BSI-DSZ-CC-0998-2016', '/Title': 'Certification Report BSI-DSZ-CC-0998-2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.trustedcomputinggroup.org/', 'https://www.bsi.bund.de/', 'https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/', 'http://www.sogisportal.eu/', 'https://www.bsi.bund.de/AIS', 'https://www.bsi.bund.de/zertifizierungsreporte']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 973191, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 59, '/Title': 'CC EAL4+ moderate Certification Security Target', '/Author': 'Jürgen Noller', '/Subject': 'Security Target SLB9670_2.0', '/Keywords': 'Infineon, CCS, Security Target, EAL4+, moderate, SLB967x, SLB9670, SPI, Trusted Computing, TPM 2.0, Trusted Platform Module', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20151106080724', '/ModDate': 'D:20151106080724', '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.infineon.com/', 'http://www.rsa.com/', 'http://www.bsi.bund.de/']}}
. - The report_frontpage property was set to
{'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0998-2016', 'cert_item': 'Infineon Technologies AG Trusted Platform Module SLB9670_2.0, v7.40.2098.00', 'developer': 'Infineon Technologies AG', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Protection Profile, TPM Library specification Family “2.0”, Level 0 Revision 1.16, December 10, 2014, Version 1.0, Trusted Computing Group', 'cc_version': 'PP conformant plus product specific extensions', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.1, AVA_VAN.4 SOGIS Recognition Agreement'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0998-2016': 24, 'BSI-DSZ-CC-0965-2015': 3}}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2015/07': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 13, 'EAL 1': 7, 'EAL 2': 4, 'EAL 3': 4, 'EAL 5': 6, 'EAL 6': 3, 'EAL 7': 4, 'EAL 4 augmented': 3}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.1': 1, 'ADV_FSP.2': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.5': 1, 'ADV_FSP.6': 1, 'ADV_IMP.1': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_INT.2': 1, 'ADV_INT.3': 1, 'ADV_SPM.1': 1, 'ADV_TDS.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.4': 1, 'ADV_TDS.5': 1, 'ADV_TDS.6': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.1': 7, 'ALC_FLR': 3, 'ALC_CMC.1': 1, 'ALC_CMC.2': 1, 'ALC_CMC.3': 1, 'ALC_CMC.4': 2, 'ALC_CMC.5': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 2, 'ALC_CMS.5': 1, 'ALC_DEL.1': 2, 'ALC_DVS.1': 2, 'ALC_DVS.2': 1, 'ALC_FLR.2': 1, 'ALC_FLR.3': 1, 'ALC_LCD.1': 2, 'ALC_LCD.2': 1, 'ALC_TAT.1': 2, 'ALC_TAT.2': 1, 'ALC_TAT.3': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_FUN': 3, 'ATE_COV.2': 2, 'ATE_DPT.1': 2, 'ATE_IND': 2, 'ATE_COV.1': 1, 'ATE_COV.3': 1, 'ATE_DPT.2': 1, 'ATE_DPT.3': 1, 'ATE_DPT.4': 1, 'ATE_FUN.1': 1, 'ATE_FUN.2': 1, 'ATE_IND.1': 1, 'ATE_IND.2': 1, 'ATE_IND.3': 1, 'ATE_COV': 1, 'ATE_DPT': 1}, 'AVA': {'AVA_VAN.4': 6, 'AVA_VAN': 3, 'AVA_VAN.1': 1, 'AVA_VAN.2': 1, 'AVA_VAN.3': 1, 'AVA_VAN.5': 1}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.C': 2}, 'R': {'R.O': 2}}, 'vendor': {'Infineon': {'Infineon Technologies AG': 19, 'Infineon Technologies': 10, 'Infineon': 5, 'Infineon AG': 1}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 2}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-256': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'PGP': {'PGP': 2}}, 'randomness': {'RNG': {'RNG': 2}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 1, 'SPA': 1, 'DPA': 1}, 'FI': {'physical tampering': 1, 'Fault Injection': 1}, 'other': {'JIL': 2}}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS20': 1, 'AIS 25': 2, 'AIS 26': 2, 'AIS 20': 2, 'AIS 31': 2, 'AIS 32': 1, 'AIS 38': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'to the certified TOE Version v7.40.2098.00. TOE Delivery The delivery of the TOE related confidential documentation (No. 2 to 4 in Table 2) is done from the Infineon Technologies department AE at the site': 1, 'Technical Report Summary, TÜV Informationtechnik GmbH – Evaluation Body for IT Security, (confidential document) [8] Protection Profile, TPM Library specification Family “2.0”, Level 0 Revision 1.16, December 10': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2014': 1, 'ANSSI-CC-PP-2015/07': 1}}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_VAN.4': 1, 'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS': 1, 'ALC_FLR.1': 3, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.4': 2}, 'ASE': {'ASE_INT': 2, 'ASE_CCL': 2, 'ASE_SPD': 2, 'ASE_OBJ': 2, 'ASE_ECD': 2, 'ASE_REQ': 2, 'ASE_TSS': 2, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FCO': {'FCO_NRO': 6}, 'FCS': {'FCS_RNG.1': 12, 'FCS_CKM': 24, 'FCS_CKM.2': 6, 'FCS_COP.1': 16, 'FCS_CKM.4': 20, 'FCS_CKM.1': 17, 'FCS_CKM.4.1': 1, 'FCS_COP': 43, 'FCS_RNG': 1, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2}, 'FDP': {'FDP_ACC.1': 4, 'FDP_IFC.1': 2, 'FDP_ITC.1': 11, 'FDP_ITC.2': 11, 'FDP_ACF': 30, 'FDP_ACF.1': 8, 'FDP_UIT': 9, 'FDP_UIT.1': 2, 'FDP_RIP.1': 3, 'FDP_ACC': 28, 'FDP_SDI.1': 3, 'FDP_ETC': 7, 'FDP_ITC': 7, 'FDP_UCT': 7}, 'FIA': {'FIA_UID.1': 4, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_SOS.2': 3, 'FIA_AFL': 6, 'FIA_UAU.1': 3, 'FIA_UAU.5': 3, 'FIA_UAU.6': 3, 'FIA_USB.1': 3, 'FIA_MSA': 1}, 'FMT': {'FMT_MSA.2': 4, 'FMT_MSA.1': 1, 'FMT_SMR.1': 4, 'FMT_MSA.2.1': 1, 'FMT_MSA.3': 2, 'FMT_MSA': 64, 'FMT_MTD': 6, 'FMT_SMF.1': 3, 'FMT_MOF': 3}, 'FPT': {'FPT_TST.1': 6, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_FLS': 7, 'FPT_FLS.1': 1, 'FPT_PHP.3': 4, 'FPT_PHP.3.1': 1, 'FPT_STM.1': 3}, 'FTP': {'FTP_ITC.1': 1, 'FTP_TRP.1': 1, 'FTP_ITC': 3}}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies AG': 14, 'Infineon Technologies': 5, 'Infineon': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 22}}, 'DES': {'3DES': {'Triple-DES': 1}}, 'constructions': {'MAC': {'HMAC': 28}}}, 'asymmetric_crypto': {'RSA': {'RSA-2048': 1, 'RSA 1024': 1}, 'ECC': {'ECDH': {'ECDH': 3}, 'ECDSA': {'ECDSA': 6}, 'ECC': {'ECC': 25}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 21}, 'SHA2': {'SHA-256': 21}}}, 'crypto_scheme': {'MAC': {'MAC': 2}, 'KA': {'Key Agreement': 1}}, 'crypto_protocol': {}, 'randomness': {'PRNG': {'DRBG': 11}, 'RNG': {'RNG': 13}}, 'cipher_mode': {'CBC': {'CBC': 1}, 'CFB': {'CFB': 7}}, 'ecc_curve': {'NIST': {'P-256': 3, 'Curve P-256': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 2, 'DPA': 1, 'SPA': 1}, 'FI': {'DFA': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 140-2': 3, 'FIPS PUB 180-4': 1, 'FIPS PUB 186-3': 1, 'FIPS PUB 186-4': 1, 'FIPS 180-2': 2}, 'NIST': {'SP 800-108': 2, 'NIST SP 800-90A': 2}, 'PKCS': {'PKCS#1': 12}, 'BSI': {'AIS20': 1}, 'RFC': {'RFC3447': 42, 'RFC 3447': 1, 'RFC 2104': 1}, 'ISO': {'ISO/IEC 15946-1': 3, 'ISO/IEC 9797-2': 3, 'ISO/IEC 14888-3': 1, 'ISO/IEC 10118-3': 1, 'ISO/IEC 10116:2006': 2}, 'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
0998a_pdf.pdf
. - The st_filename property was set to
0998b_pdf.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['BSI']
. - The cert_id property was set to
BSI-DSZ-CC-0998-2016
. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1021-2016']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1021-V2-2017', 'BSI-DSZ-CC-1058-2018', 'BSI-DSZ-CC-1057-2018', 'BSI-DSZ-CC-1086-2018', 'BSI-DSZ-CC-1021-2016', 'BSI-DSZ-CC-1100-2018']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0965-2015']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0965-2015']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_VAN', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0998a_pdf.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0998b_pdf.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The report_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_VAN', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The report_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data.
- The report_references property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Infineon Technologies AG Trusted Platform Module SLB9670_2.0 v7.40.2098.00 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Trusted Computing",
"cert_link": null,
"dgst": "359a85057d8b2ff5",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0998-2016",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_VAN",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2.0",
"7.40.2098.00"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1021-2016"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0965-2015"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1100-2018",
"BSI-DSZ-CC-1021-2016",
"BSI-DSZ-CC-1058-2018",
"BSI-DSZ-CC-1057-2018",
"BSI-DSZ-CC-1021-V2-2017",
"BSI-DSZ-CC-1086-2018"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0965-2015"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2016-05-31",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0998ma1a_pdf.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0998ma1b_pdf.pdf",
"maintenance_title": "Infineon Technologies AG Trusted Platform Module SLB9670_2.0 v7.40.2098.00 and v7.41.2375.00"
}
]
},
"manufacturer": "Infineon Technologies AG",
"manufacturer_web": "https://www.infineon.com/",
"name": "Infineon Technologies AG Trusted Platform Module SLB9670_2.0 v7.40.2098.00",
"not_valid_after": "2021-02-28",
"not_valid_before": "2016-01-28",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0998a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.1, AVA_VAN.4 SOGIS Recognition Agreement",
"cc_version": "PP conformant plus product specific extensions",
"cert_id": "BSI-DSZ-CC-0998-2016",
"cert_item": "Infineon Technologies AG Trusted Platform Module SLB9670_2.0, v7.40.2098.00",
"cert_lab": "BSI",
"developer": "Infineon Technologies AG",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "Protection Profile, TPM Library specification Family \u201c2.0\u201d, Level 0 Revision 1.16, December 10, 2014, Version 1.0, Trusted Computing Group"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 4
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0965-2015": 3,
"BSI-DSZ-CC-0998-2016": 24
},
"FR": {
"ANSSI-CC-PP-2015/07": 1
}
},
"cc_claims": {
"O": {
"O.C": 2
},
"R": {
"R.O": 2
}
},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2015/07": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 1,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 1,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 2,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 2,
"ALC_CMS.5": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 2,
"ALC_DVS": 1,
"ALC_DVS.1": 2,
"ALC_DVS.2": 1,
"ALC_FLR": 3,
"ALC_FLR.1": 7,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 2,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 2,
"ALC_TAT.2": 1,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 2,
"ATE_COV.3": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 2,
"ATE_DPT.2": 1,
"ATE_DPT.3": 1,
"ATE_DPT.4": 1,
"ATE_FUN": 3,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND": 2,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 3,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 6,
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 7,
"EAL 2": 4,
"EAL 3": 4,
"EAL 4": 13,
"EAL 4 augmented": 3,
"EAL 5": 6,
"EAL 6": 3,
"EAL 7": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"Technical Report Summary, T\u00dcV Informationtechnik GmbH \u2013 Evaluation Body for IT Security, (confidential document) [8] Protection Profile, TPM Library specification Family \u201c2.0\u201d, Level 0 Revision 1.16, December 10": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
"to the certified TOE Version v7.40.2098.00. TOE Delivery The delivery of the TOE related confidential documentation (No. 2 to 4 in Table 2) is done from the Infineon Technologies department AE at the site": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PGP": {
"PGP": 2
}
},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 2
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 2
}
},
"side_channel_analysis": {
"FI": {
"Fault Injection": 1,
"physical tampering": 1
},
"SCA": {
"DPA": 1,
"SPA": 1,
"side channel": 1
},
"other": {
"JIL": 2
}
},
"standard_id": {
"BSI": {
"AIS 20": 2,
"AIS 25": 2,
"AIS 26": 2,
"AIS 31": 2,
"AIS 32": 1,
"AIS 38": 1,
"AIS20": 1
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 2
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7148": 1,
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 5,
"Infineon AG": 1,
"Infineon Technologies": 10,
"Infineon Technologies AG": 19
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20160223154441+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, TPM, Trusted Platform Module\"",
"/ModDate": "D:20160225113948+01\u002700\u0027",
"/Producer": "LibreOffice 4.2",
"/Subject": "BSI-DSZ-CC-0998-2016",
"/Title": "Certification Report BSI-DSZ-CC-0998-2016",
"pdf_file_size_bytes": 1422506,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.bsi.bund.de/AIS",
"http://www.sogisportal.eu/",
"https://www.bsi.bund.de/zertifizierungsreporte",
"https://www.bsi.bund.de/zertifizierung",
"https://www.bsi.bund.de/",
"https://www.trustedcomputinggroup.org/",
"http://www.commoncriteriaportal.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 44
},
"st_filename": "0998b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 25
},
"ECDH": {
"ECDH": 3
},
"ECDSA": {
"ECDSA": 6
}
},
"RSA": {
"RSA 1024": 1,
"RSA-2048": 1
}
},
"cc_cert_id": {
"FR": {
"ANSSI-CC-PP-2015/07": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2014": 1,
"ANSSI-CC-PP-2015/07": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1,
"ADV_VAN.4": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_FLR.1": 3,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL": 2,
"ASE_CCL.1": 1,
"ASE_ECD": 2,
"ASE_ECD.1": 1,
"ASE_INT": 2,
"ASE_INT.1": 1,
"ASE_OBJ": 2,
"ASE_OBJ.2": 1,
"ASE_REQ": 2,
"ASE_REQ.2": 1,
"ASE_SPD": 2,
"ASE_SPD.1": 1,
"ASE_TSS": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.4": 2
}
},
"cc_security_level": {
"EAL": {
"EAL4": 2,
"EAL4 augmented": 1
}
},
"cc_sfr": {
"FCO": {
"FCO_NRO": 6
},
"FCS": {
"FCS_CKM": 24,
"FCS_CKM.1": 17,
"FCS_CKM.2": 6,
"FCS_CKM.4": 20,
"FCS_CKM.4.1": 1,
"FCS_COP": 43,
"FCS_COP.1": 16,
"FCS_RNG": 1,
"FCS_RNG.1": 12,
"FCS_RNG.1.1": 2,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC": 28,
"FDP_ACC.1": 4,
"FDP_ACF": 30,
"FDP_ACF.1": 8,
"FDP_ETC": 7,
"FDP_IFC.1": 2,
"FDP_ITC": 7,
"FDP_ITC.1": 11,
"FDP_ITC.2": 11,
"FDP_RIP.1": 3,
"FDP_SDI.1": 3,
"FDP_UCT": 7,
"FDP_UIT": 9,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_AFL": 6,
"FIA_MSA": 1,
"FIA_SOS.2": 3,
"FIA_UAU.1": 3,
"FIA_UAU.5": 3,
"FIA_UAU.6": 3,
"FIA_UID.1": 4,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_USB.1": 3
},
"FMT": {
"FMT_MOF": 3,
"FMT_MSA": 64,
"FMT_MSA.1": 1,
"FMT_MSA.2": 4,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 2,
"FMT_MTD": 6,
"FMT_SMF.1": 3,
"FMT_SMR.1": 4
},
"FPT": {
"FPT_FLS": 7,
"FPT_FLS.1": 1,
"FPT_PHP.3": 4,
"FPT_PHP.3.1": 1,
"FPT_STM.1": 3,
"FPT_TST.1": 6,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC": 3,
"FTP_ITC.1": 1,
"FTP_TRP.1": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
},
"CFB": {
"CFB": 7
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"Curve P-256": 1,
"P-256": 3
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 21
},
"SHA2": {
"SHA-256": 21
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 11
},
"RNG": {
"RNG": 13
}
},
"side_channel_analysis": {
"FI": {
"DFA": 1
},
"SCA": {
"DPA": 1,
"SPA": 1,
"physical probing": 2
}
},
"standard_id": {
"BSI": {
"AIS20": 1
},
"CC": {
"CCMB-2012-09-001": 2,
"CCMB-2012-09-002": 2,
"CCMB-2012-09-003": 2,
"CCMB-2012-09-004": 1
},
"FIPS": {
"FIPS 180-2": 2,
"FIPS PUB 140-2": 3,
"FIPS PUB 180-4": 1,
"FIPS PUB 186-3": 1,
"FIPS PUB 186-4": 1
},
"ISO": {
"ISO/IEC 10116:2006": 2,
"ISO/IEC 10118-3": 1,
"ISO/IEC 14888-3": 1,
"ISO/IEC 15946-1": 3,
"ISO/IEC 9797-2": 3
},
"NIST": {
"NIST SP 800-90A": 2,
"SP 800-108": 2
},
"PKCS": {
"PKCS#1": 12
},
"RFC": {
"RFC 2104": 1,
"RFC 3447": 1,
"RFC3447": 42
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 22
}
},
"DES": {
"3DES": {
"Triple-DES": 1
}
},
"constructions": {
"MAC": {
"HMAC": 28
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 2,
"Infineon Technologies": 5,
"Infineon Technologies AG": 14
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "J\u00fcrgen Noller",
"/CreationDate": "D:20151106080724",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/Keywords": "Infineon, CCS, Security Target, EAL4+, moderate, SLB967x, SLB9670, SPI, Trusted Computing, TPM 2.0, Trusted Platform Module",
"/ModDate": "D:20151106080724",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Subject": "Security Target SLB9670_2.0",
"/Title": "CC EAL4+ moderate Certification Security Target",
"pdf_file_size_bytes": 973191,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.infineon.com/",
"http://www.bsi.bund.de/",
"http://www.rsa.com/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 59
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0998a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.1",
"AVA_VAN.4",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0998b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "46732ec4d32bcda3c4b8f0f938cea27e5b21b65feef8881c34c672cb17a05d71",
"txt_hash": "a7a2cbf6af172a07837797474626f8ae7030842c70d0acc8c6c079241e9d6df4"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b9276dbfc87872c311c061f289a41bb8e9448187f0d627c5410252d03d4d11ca",
"txt_hash": "cf982351b5d8419a997f679bfd3ca2df3fa99b6f2eee1717c581603538981129"
}
},
"status": "archived"
}