Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.4.6; (Firmware Vers. 1.3.28, HW Vers. 0)

CSV information ?

Status active
Valid from 27.10.2021
Valid until 27.10.2026
Scheme 🇩🇪 DE
Manufacturer Bundesdruckerei GmbH
Category Other Devices and Systems
Security level EAL3

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-1181-2021

Certificate ?

Extracted keywords

Security level
EAL 3, EAL 2
Security Assurance Requirements (SAR)
ALC_FLR
Protection profiles
BSI-CC-PP-0064-
Certificates
BSI-DSZ-CC-1181-2021

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Title Certification Report BSI-DSZ-CC-1181-2021
Subject Bundesdruckerei Document Application withtamper-evident casing
Keywords "Common Criteria, Certification, Zertifizierung, BDr, Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018"
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20211104084818+01'00'
Modification date D:20211108192831+01'00'
Pages 1
Creator Writer
Producer LibreOffice 6.3

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES, CMAC
Asymmetric Algorithms
ECDH, ECDSA
Hash functions
SHA1, SHA-1, SHA256, SHA384, SHA512, SHA224
Schemes
MAC
Protocols
SSH, TLS, PACE
Randomness
RNG
Block cipher modes
CBC

Security level
EAL 3, EAL 2, EAL 1, EAL 4, EAL 2+
Security Assurance Requirements (SAR)
ADV_ARC, ALC_FLR, ATE_FUN, ATE_IND, AVA_VAN
Security Functional Requirements (SFR)
FAU_GEN.1, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FIA_API.1, FIA_UAU.2, FIA_UID.2, FMT_SMR.1, FMT_SMF.1, FMT_MTD, FPT_PHP, FTP_TRP
Protection profiles
BSI-CC-PP-0064-, BSI-CC-PP-0064-V2-2018
Certificates
BSI-DSZ-CC-1181-2021, BSI-DSZ-CC-1161-, BSI-DSZ-CC-1161-2020, BSI-DSZ-CC-1181
Evaluation facilities
TÜV Informationstechnik
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Evaluation Technical Report, Version 1, 2021-10-11, BSI-DSZ-CC-1181, TÜV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile for Document Management Terminal DMT-PP, Security (BSI) [9] Configuration list for the TOE, Version 1.37, 2021-09-29, Bundesdruckerei GmbH (confidential document) [10] Guidance documentation for the TOE, Version 1.195, 2021-09-17, VISOTEC® V- ÄNDERUNGSTERMINAL

Side-channel analysis
physical tampering
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Evaluation Technical Report, Version 1, 2021-10-11, BSI-DSZ-CC-1181, TÜV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile for Document Management Terminal DMT-PP, Security (BSI) [9] Configuration list for the TOE, Version 1.37, 2021-09-29, Bundesdruckerei GmbH (confidential document) [10] Guidance documentation for the TOE, Version 1.195, 2021-09-17, VISOTEC® V- ÄNDERUNGSTERMINAL

Standards
FIPS186-2, FIPS180-4, FIPS PUB 46-3, FIPS 197, FIPS186-4, FIPS197, AIS 48, AIS 20, AIS 32, AIS 38, RFC5246, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, ISO/IEC 9797-, ISO/IEC 15946-, ICAO
Technical reports
BSI 7148

File metadata

Title Certification Report BSI-DSZ-CC-1181-2021
Subject Bundesdruckerei Document Application withtamper-evident casing
Keywords "Common Criteria, Certification, Zertifizierung, BDr, Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018"
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20211105104643+01'00'
Modification date D:20211108154109+01'00'
Pages 29
Creator Writer
Producer LibreOffice 6.3

Frontpage

Certificate ID BSI-DSZ-CC-1181-2021
Certified item Bundesdruckerei Document Application with tamper-evident casing Document Application Version 2.4.6; (Firmware Vers. 1.3.28, HW Vers. 0
Certification lab BSI
Developer Bundesdruckerei GmbH

References

Outgoing
  • BSI-DSZ-CC-1161-2020 - active - Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.3.2; (Firmware Vers. 1.2.28, HW Vers. 0)
Incoming
  • BSI-DSZ-CC-1215-2023 - active - Bundesdruckerei Document Application with tamper-evident casing 2.5.1, Firmware Version 1.5.8, TOE Casing Version 0

Security target ?

Extracted keywords

Symmetric Algorithms
AES, E2, DES, Triple-DES, 3DES, KMAC, CMAC
Asymmetric Algorithms
ECDH, ECDSA, Diffie-Hellman, DH
Hash functions
SHA-1, SHA1, SHA-256, SHA-224, SHA-384, SHA-512, SHA256
Schemes
MAC
Protocols
TLS1.2, TLS 1.2, PACE
Randomness
RNG
Elliptic Curves
P-256, P-384, NIST P-384, secp384r1, secp256r1, secp521r1, prime256v1, brainpoolP224r1, brainpoolP256r1, brainpoolP384r1, brainpoolP512r1
Block cipher modes
CBC

IC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG13, EF.COM, EF.SOD

Security level
EAL 3, EAL4+, EAL3
Claims
A.PKI, R.CRL, OE.PKI, OSP.RNG
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_TDS.2, AGD_OPE.1, ALC_CMC.3, ALC_DEL.1, ALC_LCD.1, ATE_COV.2, ATE_FUN.1, AVA_VAN.5, AVA_VAN.2, APE_ECD, ASE_CCL.1, ASE_INT.1, ASE_REQ.2, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN, FCS_RNG.1, FCS_COP, FCS_CKM, FCS_CKM.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_RNG, FDP_RIP.1, FDP_RIP.1.1, FIA_API.1, FIA_UAU.4, FIA_API, FIA_API.1.1, FIA_UAU.2, FIA_UAU.2.1, FIA_UAU.1, FIA_UAU.4.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_UAU.6.1, FIA_UID.2, FIA_UID.2.1, FIA_UID.1, FMT_MTD, FMT_MTD.1, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_PHP, FPT_PHP.1, FTP_TRP, FTP_TRP.1, FTP_TRP.1.2
Protection profiles
BSI-CC-PP-0064-V2-2018, BSI-CC-PP-0064-
Certificates
BSI-DSZ-CC-1181

Side-channel analysis
physical tampering

Standards
FIPS 180-4, FIPS186-4, FIPS180-4, FIPS186-2, FIPS197, FIPS 186-2, FIPS 186-4, FIPS PUB 197, AIS31, RFC5280, RFC3369, ISO/IEC 14443, ISO/IEC 7816-4, ICAO

File metadata

Title Bundesdruckerei Document Application Common Criteria Evaluation
Subject Security Target
Keywords CC, ST, Common Criteria, Security Target, Inspection System, PA, eAT, ePass
Author Alexander Haferland
Creation date D:20210909141650+02'00'
Modification date D:20210909141650+02'00'
Pages 92
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

Heuristics ?

Certificate ID: BSI-DSZ-CC-1181-2021

Extracted SARs

ATE_COV.2, ASE_REQ.2, AGD_OPE.1, ADV_ARC.1, ADV_TDS.2, ALC_DEL.1, AVA_VAN.5, ASE_CCL.1, ASE_TSS.1, ALC_LCD.1, ALC_CMC.3, ATE_FUN.1, ASE_INT.1

Similar certificates

Name Certificate ID
Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.3.2; (Firmware Vers. 1.2.28, HW Vers. 0) BSI-DSZ-CC-1161-2020 Compare
Bundesdruckerei Document Application with tamper-evident casing, Document Applicatio Vesion 2.2.1; (Firmware Vers. 1.1.12, HW Vers. 0) BSI-DSZ-CC-1125-2019 Compare
Bundesdruckerei Document Application with tamper-evident casing 2.5.1, Firmware Version 1.5.8, TOE Casing Version 0 BSI-DSZ-CC-1215-2023 Compare
Bundesdruckerei Document Application with tamper-evident casing, TOE Version: 2.1.1, Firmware Vesion: 1.0.44 BSI-DSZ-CC-1093 Compare
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6 BSI-DSZ-CC-0772-2014 Compare
NCR E10 New Generation FCR 2.0 (FCR Application Version 2.0, OpenSSL Version 1.0.2d Secure-IC firmware and hardware crypto library Version 0.0.6) 21.0.03/TSE-CCCS-48 Compare
NPCT6xx TPM 2.0 Hardware version FB5C85D and FB5C85E, Firmware version 1.3.0.1, 1.3.1.0 and 1.3.2.8 ANSSI-CC-2017/55 Compare
Xerox WorkCentre 7346 Version: Controller+PS ROM Ver. 1.223.4, IOT ROM Ver 3.2.0, IIT ROM Ver 20.4.3, ADF ROM Ver 11.6.5 JISEC-CC-CRP-C0169 Compare
Bundesdruckerei Document Application, Version: 1.2.1129, Terminal Firmware Version 3.4.8 BSI-DSZ-CC-0932-2014 Compare
Cryptek Inc. DiamondTEK (DiamondCentral (NSC Application S/W version 2.4.0.5, NSD-Prime F/W version 2.4.0.3) and NSD (DiamondLink, DiamondPak, DiamondVPN, DiamondSAT, DiamondUTC) F/W version 2.4.0.3) 04, CP 106), Diamond VPN (also sold as CV100); DiamondSAT CCEVS-VR-0054-2006 Compare
Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1 CCEVS-VR-VID-10443-2012 Compare
DiamondTEK Product (DiamondCentral: NSC Application S/W version 2.0.1; NSD-Prime F/W version 2.1.4) and NSD (DiamondLink, DiamondPak, DiamondVPN) F/W version 2.1.4 CCEVS-VR-0021-2002 Compare
ZEMO VML-GK2, V.3.1.0 FW-Version 3.1.0, HW-Version 2.0.0 BSI-DSZ-CC-0623-V2-2018 Compare
Xerox WorkCentre 7328/7335/7345 Version: Controller+PS ROM Ver.1.221.100 IOT ROM Ver.3.0.4 IIT ROM Ver.20.4.1 ADF ROM Ver.11.6.5 JISEC-CC-CRP-C0137 Compare
Dell C5765dn Color Laser Multifunction Printer Version: Controller ROM Ver. 2.205.1 IOT ROM Ver. 3.0.2 ADF ROM Ver. 11.1.0 Fax ROM Ver. 100.19.0 JISEC-CC-CRP-C0437 Compare
Composite system comprised of ECI LightSoft Software Version 11.2 (build 04113) with fixes NSx1120_4113-100 10, NC1120_4113-100 10 EMS-APT Software Version 4.0 (build 20) with fixes BC0400-01 1, BC0400-02 1, BS0400-01 1, BS0400-02 1; NPT-1010 Software Version 4.0 (build 35); NPT-1020/1021 Software Version 4.0 (build 35); and NPT-1200 Software Version 4.0 (build 35) None Compare
secunet konnektor 2.1.0, Version 4.1.3:2.1.0 BSI-DSZ-CC-1128-V3-2021 Compare
secunet konnektor 2.1.0, Version 4.1.3:2.1.0 BSI-DSZ-CC-1174-2021 Compare
IDeal Citiz v2.3-n embedding ID.me 1.6-n application (ID.me 1.6-n / 2.1.6.0.0) ANSSI-CC-2019/32 Compare
Xerox Color 550/560 Printer Version:Controller ROM Ver. 1.203.1, IOT ROM Ver. 62.23.0, IIT ROM Ver. 6.13.0, ADF ROM Ver. 12.4.0 JISEC-CC-CRP-C0294 Compare
HP BladeSystem c7000 and c3000 Enclosure with Onboard Administrator (running firmware version 3.71), Virtual Connect (running firmware version 4.01), and HP Integrated Lights-Out 3 (version 1.50) 383-4-209 Compare
secunet konnektor 2.0.0, Version 4.1.3:2.0.0 BSI-DSZ-CC-1044-V4-2021 Compare
TPM 2.0 Hardware version FB5C85D, Firmware version 1.3.0.1 ANSSI-CC-2016/15 Compare
Xerox WorkCentre 7232/7242 Version: Controller+PS ROM Ver.1.203.0, IOT ROM Ver.4.7.0, IIT ROM Ver.20.4.1, ADF ROM Ver.20.0.0 JISEC-CC-CRP-C0147 Compare
Microcontrôleur sécurisé ST33H768 révision C,Firmware révision 5, incluant optionnellement la bibliothèque cryptographique Neslib versions 4.1 et 4.1.1 et la bibliothèque MIFARE4Mobile version 2.1.0 ANSSI-CC-2017/01 Compare
Xerox 4112/4127 Copier/Printer Controller+PS ROM Ver. 1.211.8 IOT ROM Ver. 46.18.0 IIT ROM Ver. 15.6.1 IIT Option ROM Ver. 14.0.4 ADF ROM Ver. 12.2.7 JISEC-CC-CRP-C0250 Compare
Microcontrôleur sécurisé ST33G1M2 révision F, Firmware révisions 9 et A, incluant optionnellement la bibliothèque cryptographique Neslib versions 4.1 et 4.1.1 et la bibliothèque MIFARE4Mobile version 2.1.0 ANSSI-CC-2015/61 Compare
Northern Light Video Conferencing System (NLVC) consist of NLVC Client version 6.3.0.0, NLVC Server Webadmin Tool version 7.0.0.1, and NLVC Server version 6.1-0.21 ISCB-5-RPT-C034-CR-v1a Compare
secunet konnektor 2.0.0, Version 4.1.3:2.0.0 (PTV4 - EBK) BSI-DSZ-CC-1163-2021 Compare
HaltDos Mitigation Platform version 1.1 comprising of hdInspector version 1.0, hdDeviceUI version 2.0, hdDetectionService version 1.0 and hdCLI version 2.0. IC3S/BG01/HALTDOS/EAL2/0317/0008 Compare
Xerox WorkCentre 5222/5225/5230 Version: Controller+PS ROM Ver.1.204.4, IOT ROM Ver.11.21.0, IIT ROM Ver.3.7.0, ADF ROM Ver.20.0.0 JISEC-CC-CRP-C0184 Compare
DiamondTEK (DiamondCentral NSC (also sold as CC200) Application S/W Version 2.4.0.5, NSD-Prime F/W Version 2.4.0.3; and NSD (DiamondLink (also sold as CL100), DiamondPak (also sold as CP102, CP104, CP106), Diamond VPN (also sold as CV100); DiamondSAT CCEVS-VR-0139-2005 Compare
SecureSwitch® Fiber Optic Switch Models 1:1, 2:1, 3:1, 4:1, 5:1, 6:1, 7:1, 8:1 Rev A 383-4-410 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1 ANSSI-CC-2018/58v2 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1 ANSSI-CC-2018/56v2 Compare
Market Central SecureSwitch® Fiber Optic Switch Models: A, B, C, D, 1:1, 2:1, 3:1, 4:1, 5:1, 6:1, 7:1 and 8:1 383-4-506 Compare
Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h (Version 4.2.0, Java Card version 3.0.5, GP version 2.3) ANSSI-CC-2020/65v2 Compare
Bittium Tough Mobile C (BTMC). HW version: 9304809A03. SW version: Android 5.1.1. Kernel version: 3.4.0. Build: S2_BSOS_1.1.5C_MR22_sapphire2 2017-25-INF-2751 Compare
EMC® Ionix™ for IT Operations Intelligence (SMARTS®) - SAM 8.1.1, IP 8.1.1, NPM 3.1, SIA 2.3.1.1, EISM 3.0, SAM Adapters 1.3 383-4-187 Compare
Tenable Security Center 3.2 (SC3) with 3D Tool 1.2 (3DT), Log Correlation Engine 2.0.2 (LCE), Passive Vulnerability Scanner 3.0 (PVS), and Nessus Scanner 3.0.4 (Nessus) CCEVS-VR-VID-10273-2010 Compare
Showing 5 out of 40.

Scheme data ?

Cert Id BSI-DSZ-CC-1181-2021
Product Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.4.6; (Firmware Vers. 1.3.28, …
Vendor Bundesdruckerei GmbH
Certification Date 27.10.2021
Category Electronic ID documents
Url https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Hoheitliche_Dokumente-Software_mit_Hardware/1181.html
Enhanced
Product Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.4.6; (Firmware Vers. 1.3.28, HW Vers. 0)
Applicant Bundesdruckerei GmbH Kommandantenstraße 18 10969 Berlin
Evaluation Facility TÜV Informationstechnik GmbH
Assurance Level EAL3
Protection Profile Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018, Version: 2.0, 2018-06-06, Federal Office for Information Security (BSI)
Certification Date 27.10.2021
Expiration Date 26.10.2026
Entries [frozendict({'id': 'BSI-DSZ-CC-1181-2021-MA-02 (Ausstellungsdatum / Certification Date 23.05.2022)', 'description': '"Rest of the terminal firmware (including the Operating System)"'}), frozendict({'id': 'BSI-DSZ-CC-1181-2021-MA-01 (Ausstellungsdatum / Certification Date 09.03.2022)', 'description': 'Vers. 0) was changed due to an update of the Rest of the terminal firmware (including the Operating System). Configuration Management procedures required a change in the product identifier. Therefore the version number of the Firmware changed from 1.3.28 to 1.4.8. The changes also cover an minor update of the user guidance related to this version number.'}), frozendict({'id': 'BSI-DSZ-CC-1181-2021', 'description': 'Certificate'})]
Report Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1181a_pdf.pdf?__blob=publicationFile&v=2
Target Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1181b_pdf.pdf?__blob=publicationFile&v=2
Cert Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1181c_pdf.pdf?__blob=publicationFile&v=2
Description The Target of Evaluation (TOE) is the Bundesdruckerei Document Application with tamper-evident casing 2.4.6. The Document Application is running on a Document Management Terminal (DMT). It is used to read the German Passport (ePass), to read and update the electronic data of the German identification card (“Personalausweis (PA)”) and electronic resident permit (“elektronischer Aufenthaltstitel (eAT)”) as well as to verify the document’s authenticity and the integrity of its data. The TOE is operated by governmental organisations, e.g. municipal office, police, government or other state approved agencies. The TOE is specifically applied in registration offices to allow card holders to verify that their ePass, PA or eAT is working correctly. In case of PA and eAT it is further possible to update the address information of the card holder, the card holder’s PIN for eID applications, and the community ID (“Gemeindeschlüssel”). In addition, the eID application functionality of the PA or eAT can be activated or deactivated. Additionally the TOE ensures secure communication to external control software and provides a tamper-evident enclosure. Necessary protocols for the communication of the TOE with the electronic identity documents like the ePass, PA or eAT are described in [ICAO_9303], [TR-03110-1], [TR-03110-2], and [TR-03110-3].
Subcategory Software with hardware

References ?

Updates ?

  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Protection Profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Common Criteria Protection Profile for Inspection Systems, Version 1.01', 'pp_eal': 'EAL3', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0064b_pdf.pdf', 'pp_ids': None}]}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'd3ea8b3a54f1a6190f13ab86f446e8b7e15be4eded087aa62a93c32ef1ae605e', 'txt_hash': '16b19318b760c2523599b16c51cb8e6d75035a47f9e45dc109e05a5b4c3a2a94'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b5d8d8bd31c47186afa41397f8292f0505452c5fe1535badb9f14d7cf3633326', 'txt_hash': 'c1790a04de2ab290cfb648c47203c9abebed53098d5bfcc4ad767546369e112b'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '1d1da873337d138b0ce159c51f7fc3f45aea16dacbef34f16374d7f8dd3befeb', 'txt_hash': '161cdda16fc7ceeeece0cac20018bc62852a0dc306cef4c926c298d188e93699'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 789441, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 29, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20211105104643+01'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, BDr, Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018"', '/ModDate': "D:20211108154109+01'00'", '/Producer': 'LibreOffice 6.3', '/Subject': 'Bundesdruckerei Document Application withtamper-evident casing', '/Title': 'Certification Report BSI-DSZ-CC-1181-2021', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/zertifizierung', 'https://www.bsi.bund.de/AIS', 'https://www.bsi.bund.de/', 'https://www.sogis.eu/', 'http://www.commoncriteriaportal.org/', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/zertifizierungsreporte']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1655411, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 92, '/Title': 'Bundesdruckerei Document Application Common Criteria Evaluation', '/Author': 'Alexander Haferland', '/Subject': 'Security Target', '/Keywords': 'CC, ST, Common Criteria, Security Target, Inspection System, PA, eAT, ePass', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20210909141650+02'00'", '/ModDate': "D:20210909141650+02'00'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 244679, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20211104084818+01'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, BDr, Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018"', '/ModDate': "D:20211108192831+01'00'", '/Producer': 'LibreOffice 6.3', '/Subject': 'Bundesdruckerei Document Application withtamper-evident casing', '/Title': 'Certification Report BSI-DSZ-CC-1181-2021', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-1181-2021', 'cert_item': 'Bundesdruckerei Document Application with tamper-evident casing Document Application Version 2.4.6; (Firmware Vers. 1.3.28, HW Vers. 0', 'developer': 'Bundesdruckerei GmbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064- V2-2018, Version: 2.0, 2018-06-06, Federal Office for Information Security (BSI', 'cc_version': 'PP conformant Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 3'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1181-2021': 15, 'BSI-DSZ-CC-1161-': 1, 'BSI-DSZ-CC-1161-2020': 2, 'BSI-DSZ-CC-1181': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0064-': 1, 'BSI-CC-PP-0064-V2-2018': 3}}, 'cc_security_level': {'EAL': {'EAL 3': 4, 'EAL 2': 2, 'EAL 1': 1, 'EAL 4': 1, 'EAL 2+': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1}, 'ALC': {'ALC_FLR': 3}, 'ATE': {'ATE_FUN': 1, 'ATE_IND': 5}, 'AVA': {'AVA_VAN': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 1}, 'FIA': {'FIA_UAU.4': 1, 'FIA_UAU.5': 1, 'FIA_UAU.6': 1, 'FIA_API.1': 1, 'FIA_UAU.2': 1, 'FIA_UID.2': 1}, 'FMT': {'FMT_SMR.1': 1, 'FMT_SMF.1': 1, 'FMT_MTD': 3}, 'FPT': {'FPT_PHP': 1}, 'FTP': {'FTP_TRP': 1}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 5}}, 'DES': {'DES': {'DES': 2}, '3DES': {'3DES': 4}}, 'constructions': {'MAC': {'CMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 2}, 'ECDSA': {'ECDSA': 7}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 1, 'SHA-1': 1}, 'SHA2': {'SHA256': 10, 'SHA384': 6, 'SHA512': 1, 'SHA224': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 6}}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'TLS': {'TLS': 1}}, 'PACE': {'PACE': 8}}, 'randomness': {'RNG': {'RNG': 6}}, 'cipher_mode': {'CBC': {'CBC': 6}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 4}}, 'technical_report_id': {'BSI': {'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS186-2': 6, 'FIPS180-4': 8, 'FIPS PUB 46-3': 2, 'FIPS 197': 8, 'FIPS186-4': 1, 'FIPS197': 1}, 'BSI': {'AIS 48': 1, 'AIS 20': 1, 'AIS 32': 1, 'AIS 38': 1}, 'RFC': {'RFC5246': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2, 'ISO/IEC 9797-': 2, 'ISO/IEC 15946-': 6}, 'ICAO': {'ICAO': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Evaluation Technical Report, Version 1, 2021-10-11, BSI-DSZ-CC-1181, TÜV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile for Document Management Terminal DMT-PP': 1, 'Security (BSI) [9] Configuration list for the TOE, Version 1.37, 2021-09-29, Bundesdruckerei GmbH (confidential document) [10] Guidance documentation for the TOE, Version 1.195, 2021-09-17, VISOTEC® V- ÄNDERUNGSTERMINAL': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1181': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0064-V2-2018': 3, 'BSI-CC-PP-0064-': 1}}, 'cc_security_level': {'EAL': {'EAL 3': 4, 'EAL4+': 2, 'EAL3': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1}, 'ALC': {'ALC_CMC.3': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_FUN.1': 1}, 'AVA': {'AVA_VAN.5': 2, 'AVA_VAN.2': 1}, 'APE': {'APE_ECD': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_INT.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 5, 'FAU_GEN.1.1': 3, 'FAU_GEN.1.2': 2, 'FAU_GEN': 1}, 'FCS': {'FCS_RNG.1': 6, 'FCS_COP': 29, 'FCS_CKM': 13, 'FCS_CKM.1': 15, 'FCS_CKM.4': 5, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 25, 'FCS_RNG.1.1': 1, 'FCS_RNG.1.2': 1, 'FCS_RNG': 3}, 'FDP': {'FDP_RIP.1': 4, 'FDP_RIP.1.1': 1}, 'FIA': {'FIA_API.1': 6, 'FIA_UAU.4': 5, 'FIA_API': 1, 'FIA_API.1.1': 1, 'FIA_UAU.2': 6, 'FIA_UAU.2.1': 1, 'FIA_UAU.1': 3, 'FIA_UAU.4.1': 1, 'FIA_UAU.5': 4, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6': 4, 'FIA_UAU.6.1': 1, 'FIA_UID.2': 6, 'FIA_UID.2.1': 1, 'FIA_UID.1': 2}, 'FMT': {'FMT_MTD': 22, 'FMT_MTD.1': 5, 'FMT_SMF.1': 7, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 5, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_PHP': 4, 'FPT_PHP.1': 2}, 'FTP': {'FTP_TRP': 4, 'FTP_TRP.1': 3, 'FTP_TRP.1.2': 1}}, 'cc_claims': {'A': {'A.PKI': 4}, 'R': {'R.CRL': 3}, 'OE': {'OE.PKI': 4}, 'OSP': {'OSP.RNG': 4}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 8}, 'E2': {'E2': 1}}, 'DES': {'DES': {'DES': 1}, '3DES': {'Triple-DES': 4, '3DES': 4}}, 'constructions': {'MAC': {'KMAC': 1, 'CMAC': 2}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 2}, 'ECDSA': {'ECDSA': 1}}, 'FF': {'DH': {'Diffie-Hellman': 1, 'DH': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 7, 'SHA1': 2}, 'SHA2': {'SHA-256': 5, 'SHA-224': 2, 'SHA-384': 2, 'SHA-512': 2, 'SHA256': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 12}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS1.2': 6, 'TLS 1.2': 2}}, 'PACE': {'PACE': 27}}, 'randomness': {'RNG': {'RNG': 25}}, 'cipher_mode': {'CBC': {'CBC': 4}}, 'ecc_curve': {'NIST': {'P-256': 2, 'P-384': 1, 'NIST P-384': 1, 'secp384r1': 3, 'secp256r1': 1, 'secp521r1': 1, 'prime256v1': 2}, 'Brainpool': {'brainpoolP224r1': 1, 'brainpoolP256r1': 2, 'brainpoolP384r1': 2, 'brainpoolP512r1': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 5}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 2, 'EF.DG2': 1, 'EF.DG3': 2, 'EF.DG4': 2, 'EF.DG5': 1, 'EF.DG16': 2, 'EF.DG13': 1, 'EF.COM': 2, 'EF.SOD': 2}}, 'standard_id': {'FIPS': {'FIPS 180-4': 2, 'FIPS186-4': 3, 'FIPS180-4': 3, 'FIPS186-2': 2, 'FIPS197': 2, 'FIPS 186-2': 1, 'FIPS 186-4': 1, 'FIPS PUB 197': 1}, 'BSI': {'AIS31': 2}, 'RFC': {'RFC5280': 1, 'RFC3369': 1}, 'ISO': {'ISO/IEC 14443': 2, 'ISO/IEC 7816-4': 1}, 'ICAO': {'ICAO': 13}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1181-2021': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0064-': 1}}, 'cc_security_level': {'EAL': {'EAL 3': 1, 'EAL 2': 1}}, 'cc_sar': {'ALC': {'ALC_FLR': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 1181a_pdf.pdf.
    • The st_filename property was set to 1181b_pdf.pdf.
    • The cert_filename property was set to 1181c_pdf.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-1181-2021.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1215-2023']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1215-2023']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1161-2020']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1161-2020', 'BSI-DSZ-CC-1093', 'BSI-DSZ-CC-1125-2019']}} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}]}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1181a_pdf.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1181b_pdf.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was set to None.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1093']}}} data.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.4.6; (Firmware Vers. 1.3.28, HW Vers. 0) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1181c_pdf.pdf",
  "dgst": "4be309edc35f4fe0",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-1181-2021",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.3.28",
        "2.4.6"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1215-2023"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1161-2020"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1215-2023"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1125-2019",
          "BSI-DSZ-CC-1161-2020",
          "BSI-DSZ-CC-1093"
        ]
      }
    },
    "scheme_data": {
      "category": "Electronic ID documents",
      "cert_id": "BSI-DSZ-CC-1181-2021",
      "certification_date": "27.10.2021",
      "enhanced": {
        "applicant": "Bundesdruckerei GmbH\nKommandantenstra\u00dfe 18\n10969 Berlin",
        "assurance_level": "EAL3",
        "cert_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1181c_pdf.pdf?__blob=publicationFile\u0026v=2",
        "certification_date": "27.10.2021",
        "description": "The Target of Evaluation (TOE) is the Bundesdruckerei Document Application with tamper-evident casing 2.4.6.\nThe Document Application is running on a Document Management Terminal (DMT). It is used to read the German Passport (ePass), to read and update the electronic data of the German identification card (\u201cPersonalausweis (PA)\u201d) and electronic resident permit (\u201celektronischer Aufenthaltstitel (eAT)\u201d) as well as to verify the document\u2019s authenticity and the integrity of its data.\nThe TOE is operated by governmental organisations, e.g. municipal office, police, government or other state approved agencies. The TOE is specifically applied in registration offices to allow card holders to verify that their ePass, PA or eAT is working correctly. In case of PA and eAT it is further possible to update the address information of the card holder, the card holder\u2019s PIN for eID applications, and the community ID (\u201cGemeindeschl\u00fcssel\u201d). In addition, the eID application functionality of the PA or eAT can be activated or deactivated. Additionally the TOE ensures secure communication to external control software and provides a tamper-evident enclosure.\nNecessary protocols for the communication of the TOE with the electronic identity documents like the ePass, PA or eAT are described in [ICAO_9303], [TR-03110-1], [TR-03110-2], and [TR-03110-3].",
        "entries": [
          {
            "description": "\"Rest of the terminal firmware (including the Operating System)\"",
            "id": "BSI-DSZ-CC-1181-2021-MA-02 (Ausstellungsdatum / Certification Date 23.05.2022)"
          },
          {
            "description": "Vers. 0) was changed due to an update of the Rest of the terminal firmware (including the Operating System). Configuration Management procedures required a change in the product identifier. Therefore the version number of the Firmware changed from 1.3.28 to 1.4.8. The changes also cover an minor update of the user guidance related to this version number.",
            "id": "BSI-DSZ-CC-1181-2021-MA-01 (Ausstellungsdatum / Certification Date 09.03.2022)"
          },
          {
            "description": "Certificate",
            "id": "BSI-DSZ-CC-1181-2021"
          }
        ],
        "evaluation_facility": "T\u00dcV Informationstechnik GmbH",
        "expiration_date": "26.10.2026",
        "product": "Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.4.6; (Firmware Vers. 1.3.28, HW Vers. 0)",
        "protection_profile": "Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018, Version: 2.0, 2018-06-06, Federal Office for Information Security (BSI)",
        "report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1181a_pdf.pdf?__blob=publicationFile\u0026v=2",
        "target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1181b_pdf.pdf?__blob=publicationFile\u0026v=2"
      },
      "product": "Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.4.6; (Firmware Vers. 1.3.28, \u2026",
      "subcategory": "Software with hardware",
      "url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Hoheitliche_Dokumente-Software_mit_Hardware/1181.html",
      "vendor": "Bundesdruckerei GmbH"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Bundesdruckerei GmbH",
  "manufacturer_web": "https://www.bundesdruckerei.de",
  "name": "Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.4.6; (Firmware Vers. 1.3.28, HW Vers. 0)",
  "not_valid_after": "2026-10-27",
  "not_valid_before": "2021-10-27",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "1181c_pdf.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1181-2021": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0064-": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 3": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20211104084818+01\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, BDr, Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018\"",
      "/ModDate": "D:20211108192831+01\u002700\u0027",
      "/Producer": "LibreOffice 6.3",
      "/Subject": "Bundesdruckerei Document Application withtamper-evident casing",
      "/Title": "Certification Report BSI-DSZ-CC-1181-2021",
      "pdf_file_size_bytes": 244679,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "1181a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 3",
        "cc_version": "PP conformant Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-1181-2021",
        "cert_item": "Bundesdruckerei Document Application with tamper-evident casing Document Application Version 2.4.6; (Firmware Vers. 1.3.28, HW Vers. 0",
        "cert_lab": "BSI",
        "developer": "Bundesdruckerei GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064- V2-2018, Version: 2.0, 2018-06-06, Federal Office for Information Security (BSI"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 2
          },
          "ECDSA": {
            "ECDSA": 7
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1161-": 1,
          "BSI-DSZ-CC-1161-2020": 2,
          "BSI-DSZ-CC-1181": 1,
          "BSI-DSZ-CC-1181-2021": 15
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0064-": 1,
          "BSI-CC-PP-0064-V2-2018": 3
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1
        },
        "ALC": {
          "ALC_FLR": 3
        },
        "ATE": {
          "ATE_FUN": 1,
          "ATE_IND": 5
        },
        "AVA": {
          "AVA_VAN": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 2,
          "EAL 2+": 1,
          "EAL 3": 4,
          "EAL 4": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 1
        },
        "FIA": {
          "FIA_API.1": 1,
          "FIA_UAU.2": 1,
          "FIA_UAU.4": 1,
          "FIA_UAU.5": 1,
          "FIA_UAU.6": 1,
          "FIA_UID.2": 1
        },
        "FMT": {
          "FMT_MTD": 3,
          "FMT_SMF.1": 1,
          "FMT_SMR.1": 1
        },
        "FPT": {
          "FPT_PHP": 1
        },
        "FTP": {
          "FTP_TRP": 1
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          "Evaluation Technical Report, Version 1, 2021-10-11, BSI-DSZ-CC-1181, T\u00dcV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile for Document Management Terminal DMT-PP": 1,
          "Security (BSI) [9] Configuration list for the TOE, Version 1.37, 2021-09-29, Bundesdruckerei GmbH (confidential document) [10] Guidance documentation for the TOE, Version 1.195, 2021-09-17, VISOTEC\u00ae V- \u00c4NDERUNGSTERMINAL": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 6
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 8
        },
        "SSH": {
          "SSH": 2
        },
        "TLS": {
          "TLS": {
            "TLS": 1
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 6
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 3
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1,
            "SHA1": 1
          },
          "SHA2": {
            "SHA224": 1,
            "SHA256": 10,
            "SHA384": 6,
            "SHA512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 6
        }
      },
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 4
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 1,
          "AIS 32": 1,
          "AIS 38": 1,
          "AIS 48": 1
        },
        "FIPS": {
          "FIPS 197": 8,
          "FIPS PUB 46-3": 2,
          "FIPS180-4": 8,
          "FIPS186-2": 6,
          "FIPS186-4": 1,
          "FIPS197": 1
        },
        "ICAO": {
          "ICAO": 2
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 15946-": 6,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4,
          "ISO/IEC 9797-": 2
        },
        "RFC": {
          "RFC5246": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 5
          }
        },
        "DES": {
          "3DES": {
            "3DES": 4
          },
          "DES": {
            "DES": 2
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 1
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20211105104643+01\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, BDr, Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018\"",
      "/ModDate": "D:20211108154109+01\u002700\u0027",
      "/Producer": "LibreOffice 6.3",
      "/Subject": "Bundesdruckerei Document Application withtamper-evident casing",
      "/Title": "Certification Report BSI-DSZ-CC-1181-2021",
      "pdf_file_size_bytes": 789441,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/zertifizierung",
          "https://www.sogis.eu/",
          "http://www.commoncriteriaportal.org/cc/",
          "https://www.bsi.bund.de/AIS",
          "https://www.bsi.bund.de/",
          "https://www.bsi.bund.de/zertifizierungsreporte"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 29
    },
    "st_filename": "1181b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 2
          },
          "ECDSA": {
            "ECDSA": 1
          }
        },
        "FF": {
          "DH": {
            "DH": 2,
            "Diffie-Hellman": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1181": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.PKI": 4
        },
        "OE": {
          "OE.PKI": 4
        },
        "OSP": {
          "OSP.RNG": 4
        },
        "R": {
          "R.CRL": 3
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0064-": 1,
          "BSI-CC-PP-0064-V2-2018": 3
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_TDS.2": 1
        },
        "AGD": {
          "AGD_OPE.1": 1
        },
        "ALC": {
          "ALC_CMC.3": 1,
          "ALC_DEL.1": 1,
          "ALC_LCD.1": 1
        },
        "APE": {
          "APE_ECD": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_INT.1": 1,
          "ASE_REQ.2": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_FUN.1": 1
        },
        "AVA": {
          "AVA_VAN.2": 1,
          "AVA_VAN.5": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 3": 4,
          "EAL3": 1,
          "EAL4+": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_GEN.1": 5,
          "FAU_GEN.1.1": 3,
          "FAU_GEN.1.2": 2
        },
        "FCS": {
          "FCS_CKM": 13,
          "FCS_CKM.1": 15,
          "FCS_CKM.4": 5,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 29,
          "FCS_COP.1": 25,
          "FCS_RNG": 3,
          "FCS_RNG.1": 6,
          "FCS_RNG.1.1": 1,
          "FCS_RNG.1.2": 1
        },
        "FDP": {
          "FDP_RIP.1": 4,
          "FDP_RIP.1.1": 1
        },
        "FIA": {
          "FIA_API": 1,
          "FIA_API.1": 6,
          "FIA_API.1.1": 1,
          "FIA_UAU.1": 3,
          "FIA_UAU.2": 6,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.4": 5,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.5": 4,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6": 4,
          "FIA_UAU.6.1": 1,
          "FIA_UID.1": 2,
          "FIA_UID.2": 6,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MTD": 22,
          "FMT_MTD.1": 5,
          "FMT_SMF.1": 7,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 5,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_PHP": 4,
          "FPT_PHP.1": 2
        },
        "FTP": {
          "FTP_TRP": 4,
          "FTP_TRP.1": 3,
          "FTP_TRP.1.2": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 27
        },
        "TLS": {
          "TLS": {
            "TLS 1.2": 2,
            "TLS1.2": 6
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 12
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Brainpool": {
          "brainpoolP224r1": 1,
          "brainpoolP256r1": 2,
          "brainpoolP384r1": 2,
          "brainpoolP512r1": 2
        },
        "NIST": {
          "NIST P-384": 1,
          "P-256": 2,
          "P-384": 1,
          "prime256v1": 2,
          "secp256r1": 1,
          "secp384r1": 3,
          "secp521r1": 1
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 7,
            "SHA1": 2
          },
          "SHA2": {
            "SHA-224": 2,
            "SHA-256": 5,
            "SHA-384": 2,
            "SHA-512": 2,
            "SHA256": 2
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.COM": 2,
          "EF.DG1": 2,
          "EF.DG13": 1,
          "EF.DG16": 2,
          "EF.DG2": 1,
          "EF.DG3": 2,
          "EF.DG4": 2,
          "EF.DG5": 1,
          "EF.SOD": 2
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 25
        }
      },
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 5
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 2
        },
        "FIPS": {
          "FIPS 180-4": 2,
          "FIPS 186-2": 1,
          "FIPS 186-4": 1,
          "FIPS PUB 197": 1,
          "FIPS180-4": 3,
          "FIPS186-2": 2,
          "FIPS186-4": 3,
          "FIPS197": 2
        },
        "ICAO": {
          "ICAO": 13
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 7816-4": 1
        },
        "RFC": {
          "RFC3369": 1,
          "RFC5280": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 8
          },
          "E2": {
            "E2": 1
          }
        },
        "DES": {
          "3DES": {
            "3DES": 4,
            "Triple-DES": 4
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 2,
            "KMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Alexander Haferland",
      "/CreationDate": "D:20210909141650+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/Keywords": "CC, ST, Common Criteria, Security Target, Inspection System, PA, eAT, ePass",
      "/ModDate": "D:20210909141650+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Subject": "Security Target",
      "/Title": "Bundesdruckerei Document Application Common Criteria Evaluation",
      "pdf_file_size_bytes": 1655411,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 92
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL3",
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0064b_pdf.pdf",
        "pp_name": "Common Criteria Protection Profile for Inspection Systems, Version 1.01"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1181a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1181b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "1d1da873337d138b0ce159c51f7fc3f45aea16dacbef34f16374d7f8dd3befeb",
      "txt_hash": "161cdda16fc7ceeeece0cac20018bc62852a0dc306cef4c926c298d188e93699"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "d3ea8b3a54f1a6190f13ab86f446e8b7e15be4eded087aa62a93c32ef1ae605e",
      "txt_hash": "16b19318b760c2523599b16c51cb8e6d75035a47f9e45dc109e05a5b4c3a2a94"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "b5d8d8bd31c47186afa41397f8292f0505452c5fe1535badb9f14d7cf3633326",
      "txt_hash": "c1790a04de2ab290cfb648c47203c9abebed53098d5bfcc4ad767546369e112b"
    }
  },
  "status": "active"
}