This page was not yet optimized for use on mobile
devices.
Trusted Audio Switch with fiber optic (TAS-FO) version 1.0
CSV information
| Status | archived |
|---|---|
| Valid from | 31.01.2020 |
| Valid until | 31.01.2025 |
| Scheme | 🇩🇪 DE |
| Manufacturer | Rohde & Schwarz Topex S.A. |
| Category | Network and Network-Related Devices and Systems |
| Security level | EAL4 |
Heuristics summary
Certificate ID: BSI-DSZ-CC-1081-2020
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Security level
EAL 4, EAL 2Certificates
BSI-DSZ-CC-1081-2020Standards
ISO/IEC 15408, ISO/IEC 18045Certification report
Extracted keywords
Hash functions
SHA-256Schemes
MACSecurity level
EAL 4, EAL 2, EAL 1, EAL 2+Claims
ASecurity Assurance Requirements (SAR)
AGD_PRE.1, AGD_PRE, AGD_OPE.1, AGD_OPE, ALC_FLR, ALC_CMS.4Certificates
BSI-DSZ-CC-1081-2020Evaluation facilities
SRC Security Research & ConsultingCertification process
out of scope, handled in the TOE. • A.TEMPEST_Evaluation: The TOE is evaluated against TEMPEST attacks, which are out of scope of the CC evaluation. ◦ OE.TEMPEST_Evalutation: The TOE shall be a subject to a TEMPEST evaluation, being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, 1.9, 16.12.2019, Evaluation Technical Report (ETR), SRC Security Research & Consulting GmbH, (confidential document) [8] Configuration list for the TOE, Edition 2, Revision 3, 25.11.2019, ALC_CMS.4 Problem tracking, coverage R&S Trusted Audio Switch TAS-FO, Rhode & Schwarz (confidential document) [9] AGD_PRE.1 Preparative procedures R&S Trusted Audio Switch TAS-FO; Silvia Voinea, Rohde &Standards
AIS 1, AIS 14, AIS 19, AIS 23, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065Technical reports
BSI 7148File metadata
| Title | Certification Report BSI-DSZ-CC-xxxx-200x |
|---|---|
| Subject | Certification Report |
| Keywords | Common Criteria, Certification, Zertifizierung, trusted Audio Switch with fiber optic (TAS-FO) version 1.0, Rohde & Schwarz Topex S.A. |
| Author | Bundesamt fĂĽr Sicherheit in der Informationstechnik |
| Creation date | D:20200205115042+01'00' |
| Modification date | D:20200205152928+01'00' |
| Pages | 26 |
| Creator | Writer |
| Producer | LibreOffice 6.2 |
Frontpage
| Certificate ID | BSI-DSZ-CC-1081-2020 |
|---|---|
| Certified item | Trusted Audio Switch with fiber optic (TAS-FO) version 1.0 |
| Certification lab | BSI |
| Developer | Rohde & Schwarz Topex S.A |
References
Incoming- BSI-DSZ-CC-1081-V2-2020 - archived - Trusted Audio Switch with fiber optic (TAS-FO) version 2.0
Security target
Extracted keywords
Vendor
NXPSecurity level
EAL4, EAL 4Claims
A.PU, A.RED_PU, OE.PU, OE.RED_PU, OE.RECSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DEL, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_SAA.1, FAU_ARP.1.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_GEN.1, FDP_ETC.1, FDP_IFC, FDP_IFF, FDP_ITC, FDP_IFC.1, FDP_IFF.1, FDP_IFF.5, FDP_ITC.1, FDP_ETC.1.1, FDP_ETC.1.2, FMT_MSA, FMT_SMF.1, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1.1, FMT_SMR.1, FPT_FLS, FPT_FLS.1Certificates
BSI-DSZ-CC-1081Side-channel analysis
physical tampering, Malfunction, malfunctionCertification process
out of scope, handled by the TOE. A.TEMPEST_Evaluation The TOE is evaluated against TEMPEST attacks, which are out of scope of the CC evaluation. The TEMPEST evaluation shall prevent unacceptable compromisingFile metadata
| Subject | SIP |
|---|---|
| Author | Dan Lefter |
| Creation date | D:20200207163224+01'00' |
| Modification date | D:20200207163224+01'00' |
| Pages | 60 |
| Creator | Microsoft® Word 2016 |
| Producer | Microsoft® Word 2016 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-1081-2020Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3Similar certificates
| Name | Certificate ID | |
|---|---|---|
| Trusted Audio Switch with fiber optic (TAS-FO) version 2.0 | BSI-DSZ-CC-1081-V2-2020 | Compare |
| Trusted Audio Switch with fiber optic (TAS-FO)Version 2.0 | BSI-DSZ-CC-1081-V3-2025 | Compare |
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1081c_pdf.pdf",
"dgst": "1549338911d5a764",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-1081-2020",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1081-V2-2020"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1081-V2-2020",
"BSI-DSZ-CC-1081-V3-2025"
]
},
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Rohde \u0026 Schwarz Topex S.A.",
"manufacturer_web": "https://www.rohde-schwarz.com",
"name": "Trusted Audio Switch with fiber optic (TAS-FO) version 1.0",
"not_valid_after": "2025-01-31",
"not_valid_before": "2020-01-31",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "1081c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1081-2020": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "1081a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 4",
"cc_version": "Product specific Security Target Common Criteria Part 2 conformant",
"cert_id": "BSI-DSZ-CC-1081-2020",
"cert_item": "Trusted Audio Switch with fiber optic (TAS-FO) version 1.0",
"cert_lab": "BSI",
"developer": "Rohde \u0026 Schwarz Topex S.A",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "None"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1081-2020": 14
}
},
"cc_claims": {
"A": {
"A": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 2,
"AGD_PRE": 3,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMS.4": 1,
"ALC_FLR": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 2,
"EAL 2+": 1,
"EAL 4": 5
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"1.9, 16.12.2019, Evaluation Technical Report (ETR), SRC Security Research \u0026 Consulting GmbH, (confidential document) [8] Configuration list for the TOE, Edition 2, Revision 3, 25.11.2019, ALC_CMS.4 Problem tracking": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
"coverage R\u0026S Trusted Audio Switch TAS-FO, Rhode \u0026 Schwarz (confidential document) [9] AGD_PRE.1 Preparative procedures R\u0026S Trusted Audio Switch TAS-FO; Silvia Voinea, Rohde \u0026": 1
},
"OutOfScope": {
"handled in the TOE. \u2022 A.TEMPEST_Evaluation: The TOE is evaluated against TEMPEST attacks, which are out of scope of the CC evaluation. \u25e6 OE.TEMPEST_Evalutation: The TOE shall be a subject to a TEMPEST evaluation": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"SRC": {
"SRC Security Research \u0026 Consulting": 3
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 1": 1,
"AIS 14": 1,
"AIS 19": 1,
"AIS 23": 1
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
}
},
"symmetric_crypto": {},
"technical_report_id": {
"BSI": {
"BSI 7148": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20200205115042+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "Common Criteria, Certification, Zertifizierung, trusted Audio Switch with fiber optic (TAS-FO) version 1.0, Rohde \u0026 Schwarz Topex S.A.",
"/ModDate": "D:20200205152928+01\u002700\u0027",
"/Producer": "LibreOffice 6.2",
"/Subject": "Certification Report",
"/Title": "Certification Report BSI-DSZ-CC-xxxx-200x",
"pdf_file_size_bytes": 659965,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/AIS",
"https://www.sogis.eu/",
"https://www.bsi.bund.de/",
"https://www.bsi.bund.de/zertifizierung",
"https://www.bsi.bund.de/zertifizierungsreporte",
"http://www.commoncriteriaportal.org/cc/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 26
},
"st_filename": "1081b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1081": 1
}
},
"cc_claims": {
"A": {
"A.PU": 3,
"A.RED_PU": 2
},
"OE": {
"OE.PU": 4,
"OE.REC": 4,
"OE.RED_PU": 4
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 2,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.3": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 2,
"EAL4": 6
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 10,
"FAU_ARP.1.1": 1,
"FAU_GEN.1": 1,
"FAU_SAA.1": 10,
"FAU_SAA.1.1": 1,
"FAU_SAA.1.2": 1
},
"FDP": {
"FDP_ETC.1": 12,
"FDP_ETC.1.1": 1,
"FDP_ETC.1.2": 1,
"FDP_IFC": 46,
"FDP_IFC.1": 6,
"FDP_IFF": 67,
"FDP_IFF.1": 22,
"FDP_IFF.5": 6,
"FDP_ITC": 26,
"FDP_ITC.1": 11
},
"FMT": {
"FMT_MSA": 59,
"FMT_MSA.1": 6,
"FMT_MSA.3": 9,
"FMT_SMF.1": 13,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 7
},
"FPT": {
"FPT_FLS": 16,
"FPT_FLS.1": 2
}
},
"certification_process": {
"OutOfScope": {
"handled by the TOE. A.TEMPEST_Evaluation The TOE is evaluated against TEMPEST attacks, which are out of scope of the CC evaluation. The TEMPEST evaluation shall prevent unacceptable compromising": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"Malfunction": 4,
"malfunction": 9,
"physical tampering": 3
}
},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 2
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Dan Lefter",
"/CreationDate": "D:20200207163224+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/ModDate": "D:20200207163224+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"/Subject": "SIP",
"pdf_file_size_bytes": 2346723,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 60
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1081a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL4"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1081b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "5ef00161af4ded436e7522c5077534eb5bbde023eaf83897b1122a9482bebc7a",
"txt_hash": "a67eaf55277ae8d722d45d54aee0141b696041230207f1c6eed12c01a385188f"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "d285944710843d68f9084123d0885546b1d4aa596d1cb699bc83cde9ebdeed90",
"txt_hash": "9df6fdb5e4fd2671fb2b819caefaecb7ec54ef8c1507231582ac94f63bdd5ed3"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "75c1289bb912cd648019db242f84772276b7c825ced6615984d1de78986f84e9",
"txt_hash": "6c231700095c643694a621f6ee43798288ff1a12a47b6dffa9eeefc142894bf5"
}
},
"status": "archived"
}