This page was not yet optimized for use on mobile
devices.
Infineon Technologies AG Trusted Platform Module SLB9670_2.0 v7.60.2677.00
CSV information
| Status | archived |
|---|---|
| Valid from | 27.10.2016 |
| Valid until | 27.10.2021 |
| Scheme | 🇩🇪 DE |
| Manufacturer | Infineon Technologies AG |
| Category | Trusted Computing |
| Security level | EAL4+, AVA_VAN.4, ALC_FLR.1 |
| Maintenance updates | Infineon Technologies AG Trusted Platform Module SLB9670_2.0 v7.60.2677.00, v7.61.2785.00, v7.61.2789.00 (16.12.2016) Certification report Security target |
Heuristics summary
Certificate ID: BSI-DSZ-CC-1021-2016
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
ERROR
Convert pdf to text:
ERROR
Extract keywords:
ERROR
Certification report
Extracted keywords
Symmetric Algorithms
AESAsymmetric Algorithms
ECCHash functions
SHA-1, SHA-256Schemes
MACProtocols
PGPRandomness
RNGVendor
Infineon Technologies AG, Infineon Technologies, InfineonSecurity level
EAL 4, EAL 1, EAL 2, EAL 3, EAL 5, EAL 6, EAL 7, EAL 4 augmented, ITSEC EvaluationClaims
O.C, R.OSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_FLR.1, ALC_FLR, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_DVS.2, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_FUN, ATE_COV.2, ATE_DPT.1, ATE_IND, ATE_COV.1, ATE_COV.3, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, AVA_VAN.4, AVA_VAN, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.5, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSProtection profiles
ANSSI-CC-PP-2015/07Certificates
BSI-DSZ-CC-1021-2016, BSI-DSZ-CC-0998-2016, BSI-DSZ-CC-0958-2015, BSI-DSZ-CC-1021, BSI-DSZ-CC-S-0041-2015, ANSSI-CC-PP-2015/07Evaluation facilities
TĂśV Informationstechnik, TUViTSide-channel analysis
side channel, SPA, DPA, physical tampering, Fault Injection, JILCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Technical Report Summary, TÜV Informationstechnik GmbH – Evaluation Body for IT Security, (confidential document) [8] Protection Profile, TPM Library specification Family “2.0”, Level 0 Revision 1.16, December 10Standards
AIS26, AIS20, AIS 25, AIS 26, AIS 20, AIS 31, AIS 32, AIS 38, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065Technical reports
BSI TR-02102, BSI 7148File metadata
| Title | Certification Report BSI-DSZ-CC-1021-2016 |
|---|---|
| Subject | Trusted Platform Module SLB9670_2.0 v7.60.2677.00 |
| Keywords | "Common Criteria, Certification, Zertifizierung, TPM, Trusted Platform Module, SLB9670, SPI, Infineon" |
| Author | Bundesamt fĂĽr Sicherheit in der Informationstechnik |
| Creation date | D:20161109082055+01'00' |
| Modification date | D:20161109150821+01'00' |
| Pages | 44 |
| Creator | Writer |
| Producer | LibreOffice 4.2 |
Frontpage
| Certificate ID | BSI-DSZ-CC-1021-2016 |
|---|---|
| Certified item | Infineon Technologies AG Trusted Platform Module SLB9670_2.0 v7.60.2677.00 |
| Certification lab | BSI |
| Developer | Infineon Technologies AG |
References
Outgoing- BSI-DSZ-CC-0998-2016 - archived - Infineon Technologies AG Trusted Platform Module SLB9670_2.0 v7.40.2098.00
- BSI-DSZ-CC-0958-2015 - archived - SLB9670_1.2 v6.40.0190.00
- BSI-DSZ-CC-1021-V2-2017 - archived - Infineon Technologies AG Trusted Platform Module SLB9670_2.0 v7.62.3126.00, v7.62.3127.00
Security target
Extracted keywords
Symmetric Algorithms
AES, Triple-DES, HMACAsymmetric Algorithms
RSA-2048, RSA 1024, ECDH, ECDSA, ECCHash functions
SHA-1, SHA-256Schemes
MAC, Key AgreementRandomness
DRBG, RNGElliptic Curves
Curve P-256, P-256Block cipher modes
CBC, CFBVendor
Infineon Technologies AG, Infineon Technologies, InfineonSecurity level
EAL4, EAL4 augmentedSecurity Assurance Requirements (SAR)
ADV_VAN.4, ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS, ALC_FLR.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.4, ASE_INT, ASE_CCL, ASE_SPD, ASE_OBJ, ASE_ECD, ASE_REQ, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FCO_NRO, FCS_RNG.1, FCS_CKM, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1, FCS_CKM.4.1, FCS_COP, FCS_RNG, FCS_RNG.1.1, FCS_RNG.1.2, FDP_ACC.1, FDP_IFC.1, FDP_ITC.1, FDP_ITC.2, FDP_ACF, FDP_ACF.1, FDP_UIT, FDP_UIT.1, FDP_RIP.1, FDP_ACC, FDP_SDI.1, FDP_ETC, FDP_ITC, FDP_UCT, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_SOS.2, FIA_AFL, FIA_UAU.1, FIA_UAU.5, FIA_UAU.6, FIA_USB.1, FIA_MSA, FMT_MSA.2, FMT_MSA.1, FMT_SMR.1, FMT_MSA.2.1, FMT_MSA.3, FMT_MSA, FMT_MTD, FMT_SMF.1, FMT_MOF, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS, FPT_FLS.1, FPT_PHP.3, FPT_PHP.3.1, FPT_STM.1, FTP_ITC.1, FTP_TRP.1, FTP_ITCProtection profiles
ANSSI-CC-PP-2015/07Certificates
ANSSI-CC-PP-2015/07Side-channel analysis
physical probing, DPA, SPA, DFAStandards
FIPS PUB 140-2, FIPS PUB 180-4, FIPS PUB 186-3, FIPS PUB 186-4, FIPS 180-2, SP 800-108, NIST SP 800-90A, PKCS#1, AIS20, RFC3447, RFC 3447, RFC 2104, ISO/IEC 15946-1, ISO/IEC 9797-2, ISO/IEC 14888-3, ISO/IEC 10118-3, ISO/IEC 10116:2006, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004Technical reports
BSI TR-02102File metadata
| Title | CC EAL4+ moderate Certification Security Target |
|---|---|
| Subject | Security Target SLB9670_2.0 |
| Keywords | Infineon, CCS, Security Target, EAL4+, moderate, SLB967x, SLB9670, SPI, Trusted Computing, TPM 2.0, Trusted Platform Module |
| Author | JĂĽrgen Noller |
| Creation date | D:20160817190336+02'00' |
| Modification date | D:20160817190336+02'00' |
| Pages | 60 |
| Creator | Microsoft® Word 2010 |
| Producer | Microsoft® Word 2010 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-1021-2016Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_INT.3, ADV_SPM.1, ADV_TDS.3, ADV_VAN.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_LCD.1, ALC_TAT.1, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.2, APE_SPD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.4Similar certificates
Showing 5 out of 26.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Trusted Computing",
"cert_link": null,
"dgst": "b96030ed157a410a",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-1021-2016",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_VAN",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2.0",
"7.60.2677.00"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1021-V2-2017"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0998-2016",
"BSI-DSZ-CC-0958-2015"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1100-2018",
"BSI-DSZ-CC-1086-2018",
"BSI-DSZ-CC-1057-2018",
"BSI-DSZ-CC-1021-V2-2017",
"BSI-DSZ-CC-1058-2018"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0998-2016",
"BSI-DSZ-CC-0958-2015",
"BSI-DSZ-CC-0965-2015"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2016-12-16",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1021ma1a_pdf.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1021ma1b_pdf.pdf",
"maintenance_title": "Infineon Technologies AG Trusted Platform Module SLB9670_2.0 v7.60.2677.00, v7.61.2785.00, v7.61.2789.00"
}
]
},
"manufacturer": "Infineon Technologies AG",
"manufacturer_web": "https://www.infineon.com/",
"name": "Infineon Technologies AG Trusted Platform Module SLB9670_2.0 v7.60.2677.00",
"not_valid_after": "2021-10-27",
"not_valid_before": "2016-10-27",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "1021a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.1 and AVA_VAN.4",
"cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-1021-2016",
"cert_item": "Infineon Technologies AG Trusted Platform Module SLB9670_2.0 v7.60.2677.00",
"cert_lab": "BSI",
"developer": "Infineon Technologies AG",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "Protection Profile, TPM Library specification Family \u201c2.0\u201d, Level 0 Revision 1.16, December 10, 2014, Version 1.0, Trusted Computing Group"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 4
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0958-2015": 1,
"BSI-DSZ-CC-0998-2016": 5,
"BSI-DSZ-CC-1021": 1,
"BSI-DSZ-CC-1021-2016": 24,
"BSI-DSZ-CC-S-0041-2015": 1
},
"FR": {
"ANSSI-CC-PP-2015/07": 1
}
},
"cc_claims": {
"O": {
"O.C": 1
},
"R": {
"R.O": 1
}
},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2015/07": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 1,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 1,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 2,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 2,
"ALC_CMS.5": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 2,
"ALC_DVS": 1,
"ALC_DVS.1": 2,
"ALC_DVS.2": 1,
"ALC_FLR": 3,
"ALC_FLR.1": 7,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 2,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 2,
"ALC_TAT.2": 1,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 2,
"ATE_COV.3": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 2,
"ATE_DPT.2": 1,
"ATE_DPT.3": 1,
"ATE_DPT.4": 1,
"ATE_FUN": 3,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND": 2,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 3,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 6,
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 7,
"EAL 2": 4,
"EAL 3": 4,
"EAL 4": 13,
"EAL 4 augmented": 3,
"EAL 5": 6,
"EAL 6": 3,
"EAL 7": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"Technical Report Summary, T\u00dcV Informationstechnik GmbH \u2013 Evaluation Body for IT Security, (confidential document) [8] Protection Profile, TPM Library specification Family \u201c2.0\u201d, Level 0 Revision 1.16, December 10": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PGP": {
"PGP": 2
}
},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"TUViT": 2,
"T\u00dcV Informationstechnik": 3
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 2
}
},
"side_channel_analysis": {
"FI": {
"Fault Injection": 1,
"physical tampering": 1
},
"SCA": {
"DPA": 3,
"SPA": 2,
"side channel": 1
},
"other": {
"JIL": 2
}
},
"standard_id": {
"BSI": {
"AIS 20": 2,
"AIS 25": 2,
"AIS 26": 2,
"AIS 31": 2,
"AIS 32": 1,
"AIS 38": 1,
"AIS20": 1,
"AIS26": 1
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 2
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7148": 1,
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 2,
"Infineon Technologies": 12,
"Infineon Technologies AG": 21
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20161109082055+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, TPM, Trusted Platform Module, SLB9670, SPI, Infineon\"",
"/ModDate": "D:20161109150821+01\u002700\u0027",
"/Producer": "LibreOffice 4.2",
"/Subject": "Trusted Platform Module SLB9670_2.0 v7.60.2677.00",
"/Title": "Certification Report BSI-DSZ-CC-1021-2016",
"pdf_file_size_bytes": 1349156,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.sogisportal.eu/",
"https://www.bsi.bund.de/zertifizierungsreporte",
"https://www.bsi.bund.de/AIS",
"https://www.trustedcomputinggroup.org/",
"https://www.bsi.bund.de/zertifizierung",
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 44
},
"st_filename": "1021b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 26
},
"ECDH": {
"ECDH": 4
},
"ECDSA": {
"ECDSA": 7
}
},
"RSA": {
"RSA 1024": 1,
"RSA-2048": 1
}
},
"cc_cert_id": {
"FR": {
"ANSSI-CC-PP-2015/07": 3
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2015/07": 3
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1,
"ADV_VAN.4": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_FLR.1": 3,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL": 2,
"ASE_CCL.1": 1,
"ASE_ECD": 2,
"ASE_ECD.1": 1,
"ASE_INT": 2,
"ASE_INT.1": 1,
"ASE_OBJ": 2,
"ASE_OBJ.2": 1,
"ASE_REQ": 2,
"ASE_REQ.2": 1,
"ASE_SPD": 2,
"ASE_SPD.1": 1,
"ASE_TSS": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.4": 2
}
},
"cc_security_level": {
"EAL": {
"EAL4": 2,
"EAL4 augmented": 1
}
},
"cc_sfr": {
"FCO": {
"FCO_NRO": 6
},
"FCS": {
"FCS_CKM": 25,
"FCS_CKM.1": 17,
"FCS_CKM.2": 6,
"FCS_CKM.4": 20,
"FCS_CKM.4.1": 1,
"FCS_COP": 57,
"FCS_COP.1": 17,
"FCS_RNG": 1,
"FCS_RNG.1": 12,
"FCS_RNG.1.1": 2,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC": 28,
"FDP_ACC.1": 4,
"FDP_ACF": 30,
"FDP_ACF.1": 8,
"FDP_ETC": 7,
"FDP_IFC.1": 2,
"FDP_ITC": 7,
"FDP_ITC.1": 11,
"FDP_ITC.2": 11,
"FDP_RIP.1": 3,
"FDP_SDI.1": 3,
"FDP_UCT": 7,
"FDP_UIT": 9,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_AFL": 6,
"FIA_MSA": 1,
"FIA_SOS.2": 3,
"FIA_UAU.1": 3,
"FIA_UAU.5": 3,
"FIA_UAU.6": 3,
"FIA_UID.1": 4,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_USB.1": 3
},
"FMT": {
"FMT_MOF": 3,
"FMT_MSA": 64,
"FMT_MSA.1": 1,
"FMT_MSA.2": 4,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 2,
"FMT_MTD": 6,
"FMT_SMF.1": 3,
"FMT_SMR.1": 4
},
"FPT": {
"FPT_FLS": 7,
"FPT_FLS.1": 1,
"FPT_PHP.3": 4,
"FPT_PHP.3.1": 1,
"FPT_STM.1": 3,
"FPT_TST.1": 6,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC": 3,
"FTP_ITC.1": 1,
"FTP_TRP.1": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
},
"CFB": {
"CFB": 7
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"Curve P-256": 1,
"P-256": 1
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 21
},
"SHA2": {
"SHA-256": 21
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 11
},
"RNG": {
"RNG": 13
}
},
"side_channel_analysis": {
"FI": {
"DFA": 1
},
"SCA": {
"DPA": 1,
"SPA": 1,
"physical probing": 2
}
},
"standard_id": {
"BSI": {
"AIS20": 1
},
"CC": {
"CCMB-2012-09-001": 2,
"CCMB-2012-09-002": 2,
"CCMB-2012-09-003": 2,
"CCMB-2012-09-004": 1
},
"FIPS": {
"FIPS 180-2": 2,
"FIPS PUB 140-2": 3,
"FIPS PUB 180-4": 1,
"FIPS PUB 186-3": 1,
"FIPS PUB 186-4": 1
},
"ISO": {
"ISO/IEC 10116:2006": 2,
"ISO/IEC 10118-3": 1,
"ISO/IEC 14888-3": 1,
"ISO/IEC 15946-1": 3,
"ISO/IEC 9797-2": 3
},
"NIST": {
"NIST SP 800-90A": 2,
"SP 800-108": 2
},
"PKCS": {
"PKCS#1": 11
},
"RFC": {
"RFC 2104": 1,
"RFC 3447": 1,
"RFC3447": 42
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 22
}
},
"DES": {
"3DES": {
"Triple-DES": 1
}
},
"constructions": {
"MAC": {
"HMAC": 34
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 2,
"Infineon Technologies": 5,
"Infineon Technologies AG": 14
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "J\u00fcrgen Noller",
"/CreationDate": "D:20160817190336+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/Keywords": "Infineon, CCS, Security Target, EAL4+, moderate, SLB967x, SLB9670, SPI, Trusted Computing, TPM 2.0, Trusted Platform Module",
"/ModDate": "D:20160817190336+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"/Subject": "Security Target SLB9670_2.0",
"/Title": "CC EAL4+ moderate Certification Security Target",
"pdf_file_size_bytes": 1051535,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.infineon.com/",
"http://www.rsa.com/",
"http://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 60
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1021a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.1",
"AVA_VAN.4",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1021b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "7157ed35cc3e9bdef4a395e153325e796d261278be0eb180102afb6d62f20c70",
"txt_hash": "b2f7e745c88bff2e72ae4f643e2282f4ef14889bb8e1e4034639ad04b268c5da"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "544f90a2375ce2fae0c8b07b02ce1d0183bb8c5620df7ec331373e67de0e5d6b",
"txt_hash": "6ec663179e318ac0c8708a3e2db0a7b8587f037f85ef67653a33585437337ad1"
}
},
"status": "archived"
}