This page was not yet optimized for use on mobile devices.
PikeOS Separation Kernel 4.2.2
CSV information ?
Status | archived |
---|---|
Valid from | 10.12.2018 |
Valid until | 09.12.2023 |
Scheme | 🇩🇪 DE |
Manufacturer | SYSGO AG |
Category | Operating Systems |
Security level | ALC_FLR.3, EAL3 |
Maintenance updates | PikeOS 4.2.3 (18.03.2019) Certification report Security target |
Heuristics summary ?
Certificate ID: BSI-DSZ-CC-1041-2018
Certificate ?
Extracted keywords
Security level
EAL 3, EAL 2, EAL 3 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.3, ALC_FLRCertificates
BSI-DSZ-CC-1041-2018Standards
ISO/IEC 15408, ISO/IEC 18045File metadata
Title | Certification Report BSI-DSZ-CC-1041-2018 |
---|---|
Subject | Zertifizierung Operating System; Urkunde |
Keywords | "Common Criteria, Certification, Zertifizierung, SYSGO AG, PikeOS, Separation Kernel" |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Creation date | D:20181213114818+01'00' |
Modification date | D:20181213121418+01'00' |
Pages | 1 |
Creator | Writer |
Producer | LibreOffice 5.2 |
Certification report ?
Extracted keywords
Trusted Execution Environments
PSPSecurity level
EAL 3, EAL 2, EAL 1, EAL 4, EAL 2+, EAL 3 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.3, ALC_FLRCertificates
BSI-DSZ-CC-1041-2018Evaluation facilities
atsecCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Report, Version 3, 21.11.2018, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] Configuration list for the TOE, 03.09.2018, Master Document List, 16162-9101- MDL.xlsxStandards
AIS 32, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065Technical reports
BSI 7148File metadata
Title | Certification Report BSI-DSZ-CC-1041-2018 |
---|---|
Subject | Zertifizierung Operating System |
Keywords | "Common Criteria, Certification, Zertifizierung, SYSGO AG, PikeOS, Separation Kernel" |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Creation date | D:20181213114735+01'00' |
Modification date | D:20181214111737+01'00' |
Pages | 29 |
Creator | Writer |
Producer | LibreOffice 5.2 |
Frontpage
Certificate ID | BSI-DSZ-CC-1041-2018 |
---|---|
Certified item | PikeOS Separation Kernel 4.2.2 |
Certification lab | BSI |
Developer | SYSGO AG |
References
Incoming- BSI-DSZ-CC-1041-V2-2022 - active - PikeOS Separation Kernel, 4.2.4
Security target ?
Extracted keywords
Trusted Execution Environments
PSPSecurity level
EAL 3, EAL 3+, EAL 3 augmentedClaims
T.DISCLOSURE, T.MODIFICATION, T.DEPLETION, T.EXECUTION, A.PRIVILEGED_EXECUTABLES, A.HARDWARE, A.EXCLUSIVE_RESOURCES, A.PHYSICAL, A.TRUSTWORTHY_PERSONNEL, OT.CONFIDENTIALITY, OT.INTEGRITY, OT.RESOURCE_AVAILABILITY, OT.API_PROTECTION, OT.RESOURCE_AVAILABILIT, OE.PRIVILEGED_EXECUTABLES, OE.HARDWARE, OE.EXCLUSIVE_RESOURCES, OE.PHYSICAL, OE.TRUSTWORTHY_PERSONNELSecurity Assurance Requirements (SAR)
ALC_FLR.3, AVA_VAN.2Security Functional Requirements (SFR)
FDP_ACF, FDP_ACF.1, FDP_ACC.2, FDP_ACC, FDP_IFC.2, FDP_IFF.1, FIA_UID.2, FMT_MSA.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MTD, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FRU_RSA, FRU_RSA.2File metadata
Title | Security Target |
---|---|
Subject | PikeOS Separation Kernel v4.2.2 |
Author | Dominic Eschweiler |
Creation date | D:20181122132307+01'00' |
Modification date | D:20181122132319+01'00' |
Pages | 47 |
Creator | Acrobat PDFMaker 15 for Word |
Producer | Adobe PDF Library 15.0 |
Heuristics ?
Certificate ID: BSI-DSZ-CC-1041-2018
Extracted SARs
AVA_VAN.2, ALC_FLR.3References ?
Updates ?
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7b70b0e2130bf8bd102f3fde6e8750d9cf23e74ebce2b48c3ecc5b740e6169b3', 'txt_hash': '8173437d2b23ee02f702d3ccca08b65759d972fe41b243bba551dd4f8f3e38bd'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'a99baf9feb219895dc67a36f4fc8edd7dc8c6fd3fccd8b09ec0e22045c248cd3', 'txt_hash': 'c2d04e0e529f6595f335453760ea717235f9aeccdbe6f80d1ee664a09933d4d2'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e5ef667b1afa358d601cbeec89e37d50900637e1b84ed4c276b822b3a16e758d', 'txt_hash': 'ec554ec391f5cd72bba3335de93a02ad9d2d7a2f53d993cb58a5ecfc18b67b99'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 1387625, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 29, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20181213114735+01'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, SYSGO AG, PikeOS, Separation Kernel"', '/ModDate': "D:20181214111737+01'00'", '/Producer': 'LibreOffice 5.2', '/Subject': 'Zertifizierung Operating System', '/Title': 'Certification Report BSI-DSZ-CC-1041-2018', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/AIS', 'https://www.bsi.bund.de/zertifizierungsreporte', 'http://www.sogisportal.eu/']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 452300, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 47, '/Author': 'Dominic Eschweiler', '/BuildID': 'S5400', '/Company': '', '/CreationDate': "D:20181122132307+01'00'", '/Creator': 'Acrobat PDFMaker 15 for Word', '/DOORS-Baseline': 'N.A.', '/DocID': '00101-8000-ST', '/Keywords': '', '/ModDate': "D:20181122132319+01'00'", '/Producer': 'Adobe PDF Library 15.0', '/Revision': '20.6', '/SourceModified': 'D:20181122121241', '/Status': 'App', '/Subject': 'PikeOS Separation Kernel v4.2.2', '/SupplierCode': 'N.A.', '/TemplateAuthor': 'HJT', '/TemplateDate': '2012-09-10', '/TemplateID': '00014-9102-BOOK_ENG', '/TemplateRevision': '01.3', '/Title': 'Security Target', '/Ziel': '4.2.2', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 901999, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20181213114818+01'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, SYSGO AG, PikeOS, Separation Kernel"', '/ModDate': "D:20181213121418+01'00'", '/Producer': 'LibreOffice 5.2', '/Subject': 'Zertifizierung Operating System; Urkunde', '/Title': 'Certification Report BSI-DSZ-CC-1041-2018', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-1041-2018', 'cert_item': 'PikeOS Separation Kernel 4.2.2', 'developer': 'SYSGO AG', 'cert_lab': 'BSI', 'ref_protection_profiles': 'None', 'cc_version': 'Product specific Security Target Common Criteria Part 2 conformant', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 3 augmented by ALC_FLR.3'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1041-2018': 15}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 3': 4, 'EAL 2': 2, 'EAL 1': 1, 'EAL 4': 1, 'EAL 2+': 1, 'EAL 3 augmented': 3}}, 'cc_sar': {'ALC': {'ALC_FLR.3': 4, 'ALC_FLR': 3}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'atsec': {'atsec': 3}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {'AMD': {'PSP': 4}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 32': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Report, Version 3, 21.11.2018, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] Configuration list for the TOE, 03.09.2018, Master Document List, 16162-9101- MDL.xlsx': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 3': 5, 'EAL 3+': 1, 'EAL 3 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.3': 4}, 'AVA': {'AVA_VAN.2': 3}}, 'cc_sfr': {'FDP': {'FDP_ACF': 31, 'FDP_ACF.1': 28, 'FDP_ACC.2': 13, 'FDP_ACC': 14, 'FDP_IFC.2': 8, 'FDP_IFF.1': 11}, 'FIA': {'FIA_UID.2': 6}, 'FMT': {'FMT_MSA.1': 6, 'FMT_MSA.3': 7, 'FMT_MSA.3.1': 2, 'FMT_MTD': 12, 'FMT_MTD.1': 3, 'FMT_SMF.1': 5, 'FMT_SMR.1': 7}, 'FRU': {'FRU_RSA': 10, 'FRU_RSA.2': 4}}, 'cc_claims': {'T': {'T.DISCLOSURE': 4, 'T.MODIFICATION': 4, 'T.DEPLETION': 4, 'T.EXECUTION': 4}, 'A': {'A.PRIVILEGED_EXECUTABLES': 3, 'A.HARDWARE': 3, 'A.EXCLUSIVE_RESOURCES': 3, 'A.PHYSICAL': 3, 'A.TRUSTWORTHY_PERSONNEL': 3}, 'OT': {'OT.CONFIDENTIALITY': 6, 'OT.INTEGRITY': 4, 'OT.RESOURCE_AVAILABILITY': 5, 'OT.API_PROTECTION': 5, 'OT.RESOURCE_AVAILABILIT': 1}, 'OE': {'OE.PRIVILEGED_EXECUTABLES': 3, 'OE.HARDWARE': 2, 'OE.EXCLUSIVE_RESOURCES': 3, 'OE.PHYSICAL': 2, 'OE.TRUSTWORTHY_PERSONNEL': 3}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'AMD': {'PSP': 30}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The cert_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1041-2018': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 3': 1, 'EAL 2': 1, 'EAL 3 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.3': 1, 'ALC_FLR': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
1041a_pdf.pdf
. - The st_filename property was set to
1041b_pdf.pdf
. - The cert_filename property was set to
1041c_pdf.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['BSI']
. - The cert_id property was set to
BSI-DSZ-CC-1041-2018
. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1041-V2-2022']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1041-V2-2022']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1041a_pdf.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1041b_pdf.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The report_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}]}
values discarded.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name PikeOS Separation Kernel 4.2.2 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Operating Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1041c_pdf.pdf",
"dgst": "bcd676cbe8f74379",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-1041-2018",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"4.2.2"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1041-V2-2022"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1041-V2-2022"
]
},
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2019-03-18",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1041ma1a_pdf.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1041ma1b_pdf.pdf",
"maintenance_title": "PikeOS 4.2.3"
}
]
},
"manufacturer": "SYSGO AG",
"manufacturer_web": "https://www.sysgo.com",
"name": "PikeOS Separation Kernel 4.2.2",
"not_valid_after": "2023-12-09",
"not_valid_before": "2018-12-10",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "1041c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1041-2018": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 1,
"ALC_FLR.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 3": 1,
"EAL 3 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20181213114818+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, SYSGO AG, PikeOS, Separation Kernel\"",
"/ModDate": "D:20181213121418+01\u002700\u0027",
"/Producer": "LibreOffice 5.2",
"/Subject": "Zertifizierung Operating System; Urkunde",
"/Title": "Certification Report BSI-DSZ-CC-1041-2018",
"pdf_file_size_bytes": 901999,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "1041a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 3 augmented by ALC_FLR.3",
"cc_version": "Product specific Security Target Common Criteria Part 2 conformant",
"cert_id": "BSI-DSZ-CC-1041-2018",
"cert_item": "PikeOS Separation Kernel 4.2.2",
"cert_lab": "BSI",
"developer": "SYSGO AG",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "None"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1041-2018": 15
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 3,
"ALC_FLR.3": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 2,
"EAL 2+": 1,
"EAL 3": 4,
"EAL 3 augmented": 3,
"EAL 4": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"Report, Version 3, 21.11.2018, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] Configuration list for the TOE, 03.09.2018, Master Document List, 16162-9101- MDL.xlsx": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"atsec": {
"atsec": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 32": 1
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
}
},
"symmetric_crypto": {},
"technical_report_id": {
"BSI": {
"BSI 7148": 1
}
},
"tee_name": {
"AMD": {
"PSP": 4
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20181213114735+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, SYSGO AG, PikeOS, Separation Kernel\"",
"/ModDate": "D:20181214111737+01\u002700\u0027",
"/Producer": "LibreOffice 5.2",
"/Subject": "Zertifizierung Operating System",
"/Title": "Certification Report BSI-DSZ-CC-1041-2018",
"pdf_file_size_bytes": 1387625,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.bsi.bund.de/AIS",
"https://www.bsi.bund.de/zertifizierung",
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/",
"http://www.sogisportal.eu/",
"https://www.bsi.bund.de/zertifizierungsreporte",
"http://www.commoncriteriaportal.org/cc/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 29
},
"st_filename": "1041b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.EXCLUSIVE_RESOURCES": 3,
"A.HARDWARE": 3,
"A.PHYSICAL": 3,
"A.PRIVILEGED_EXECUTABLES": 3,
"A.TRUSTWORTHY_PERSONNEL": 3
},
"OE": {
"OE.EXCLUSIVE_RESOURCES": 3,
"OE.HARDWARE": 2,
"OE.PHYSICAL": 2,
"OE.PRIVILEGED_EXECUTABLES": 3,
"OE.TRUSTWORTHY_PERSONNEL": 3
},
"OT": {
"OT.API_PROTECTION": 5,
"OT.CONFIDENTIALITY": 6,
"OT.INTEGRITY": 4,
"OT.RESOURCE_AVAILABILIT": 1,
"OT.RESOURCE_AVAILABILITY": 5
},
"T": {
"T.DEPLETION": 4,
"T.DISCLOSURE": 4,
"T.EXECUTION": 4,
"T.MODIFICATION": 4
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.3": 4
},
"AVA": {
"AVA_VAN.2": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 3": 5,
"EAL 3 augmented": 1,
"EAL 3+": 1
}
},
"cc_sfr": {
"FDP": {
"FDP_ACC": 14,
"FDP_ACC.2": 13,
"FDP_ACF": 31,
"FDP_ACF.1": 28,
"FDP_IFC.2": 8,
"FDP_IFF.1": 11
},
"FIA": {
"FIA_UID.2": 6
},
"FMT": {
"FMT_MSA.1": 6,
"FMT_MSA.3": 7,
"FMT_MSA.3.1": 2,
"FMT_MTD": 12,
"FMT_MTD.1": 3,
"FMT_SMF.1": 5,
"FMT_SMR.1": 7
},
"FRU": {
"FRU_RSA": 10,
"FRU_RSA.2": 4
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {
"AMD": {
"PSP": 30
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Dominic Eschweiler",
"/BuildID": "S5400",
"/Company": "",
"/CreationDate": "D:20181122132307+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 15 for Word",
"/DOORS-Baseline": "N.A.",
"/DocID": "00101-8000-ST",
"/Keywords": "",
"/ModDate": "D:20181122132319+01\u002700\u0027",
"/Producer": "Adobe PDF Library 15.0",
"/Revision": "20.6",
"/SourceModified": "D:20181122121241",
"/Status": "App",
"/Subject": "PikeOS Separation Kernel v4.2.2",
"/SupplierCode": "N.A.",
"/TemplateAuthor": "HJT",
"/TemplateDate": "2012-09-10",
"/TemplateID": "00014-9102-BOOK_ENG",
"/TemplateRevision": "01.3",
"/Title": "Security Target",
"/Ziel": "4.2.2",
"pdf_file_size_bytes": 452300,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 47
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1041a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL3",
"ALC_FLR.3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1041b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "e5ef667b1afa358d601cbeec89e37d50900637e1b84ed4c276b822b3a16e758d",
"txt_hash": "ec554ec391f5cd72bba3335de93a02ad9d2d7a2f53d993cb58a5ecfc18b67b99"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "7b70b0e2130bf8bd102f3fde6e8750d9cf23e74ebce2b48c3ecc5b740e6169b3",
"txt_hash": "8173437d2b23ee02f702d3ccca08b65759d972fe41b243bba551dd4f8f3e38bd"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "a99baf9feb219895dc67a36f4fc8edd7dc8c6fd3fccd8b09ec0e22045c248cd3",
"txt_hash": "c2d04e0e529f6595f335453760ea717235f9aeccdbe6f80d1ee664a09933d4d2"
}
},
"status": "archived"
}