This page was not yet optimized for use on mobile devices.
SMGW Version 2.2
CSV information ?
Status | active |
---|---|
Valid from | 08.11.2024 |
Valid until | 07.11.2031 |
Scheme | đ©đȘ DE |
Manufacturer | Power Plus Communications AG |
Category | Other Devices and Systems |
Security level | EAL4+, ALC_FLR.2, AVA_VAN.5 |
Protection profiles |
Heuristics summary ?
Certificate ID: BSI-DSZ-CC-0831
Certificate ?
Extracted keywords
Security level
EAL 4, EAL 5, EAL 2, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.2, ALC_FLR, AVA_VAN.5Standards
ISO/IEC 15408, ISO/IEC 18045File metadata
Title | Certification Report BSI-DSZ-CC-0831-V10-2024 |
---|---|
Subject | Common Criteria, Certification, Zertifizierung, Smartmeter Gateway, SMGW, Smart Grid, PPC, Power Plus Communications |
Keywords | "Common Criteria, Certification, Zertifizierung, Smartmeter Gateway, SMGW, Smart Grid, PPC, Power Plus Communications" |
Author | Federal Office for Information Security |
Pages | 1 |
Certification report ?
Extracted keywords
Symmetric Algorithms
CMACAsymmetric Algorithms
ECCHash functions
SHA-256, SHA-384, SHA-512, SHA2Protocols
SSH, TLSLibraries
OpenSSLSecurity level
EAL 4, EAL 5, EAL 2, EAL 1, EAL 5+, EAL 6, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.2, ALC_FLR, AVA_VAN.5Protection profiles
BSI-CC-PP-0073-2014Certificates
BSI-DSZ-CC-0831-V9-2024, BSI-DSZ-CC-0957-V2-2016, BSI-DSZ-CC-1217-2024Evaluation facilities
TĂV InformationstechnikSide-channel analysis
physical tamperingCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, AG [7] Evaluation Technical Report, Version 2, 2024-10-25, TĂV Informationstechnik GmbH (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, list for the TOE, Version v174, 2024-10-02, EVG-CM-List, Power Plus Communications AG (confidential document) [10] Handbuch fĂŒr Verbraucher, Smart Meter Gateway, Version 4.15, 2024-08-15, Power PlusStandards
FIPS180-4, AIS 34, AIS 46, AIS 1, AIS 32, AIS 38, AIS 48, RFC3565, RFC5652, RFC6033, RFC4493, RFC5084, RFC5246, RFC5288, RFC2104, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065Technical reports
BSI TR-03109-1, BSI TR-03116-3, BSI TR-02102-1, BSI 7148File metadata
Title | Certification Report BSI-DSZ-CC-0831-V10-2024 |
---|---|
Subject | Common Criteria, Certification, Zertifizierung, Smartmeter Gateway, SMGW, Smart Grid, PPC, Power Plus Communications |
Keywords | "Common Criteria, Certification, Zertifizierung, Smartmeter Gateway, SMGW, Smart Grid, PPC, Power Plus Communications" |
Author | Federal Office for Information Security |
Pages | 25 |
Frontpage
Certificate ID | BSI-DSZ-CC-0831-V10-2024 |
---|---|
Certified item | SMGW Version 2.2 |
Certification lab | BSI |
Developer | Power Plus Communications AG |
References
Outgoing- BSI-DSZ-CC-1217-2024 - active - TCOS eEnergy Security Module Version 2.0 Release 1/P71
- BSI-DSZ-CC-0831-V9-2024 - active - SMGW Version 2.1.1
- BSI-DSZ-CC-0957-V2-2016 - active - TCOS Smart Meter Security Module Version 1.0 Release 1/P60C144PVA
Security target ?
Extracted keywords
Symmetric Algorithms
AES, AES-, CMACAsymmetric Algorithms
ECDSA, ECC, Diffie-HellmanHash functions
SHA-256, SHA-384, SHA-512Schemes
MAC, Key AgreementProtocols
TLS, TLS 1.2, PACEElliptic Curves
P-256, P-384, NIST P-256, NIST P-384Block cipher modes
CBC, GCM, XTSTLS cipher suites
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384Security level
EAL 4+, EAL4, EAL 4, EAL 2605, EAL4 augmented, EAL 4 augmentedClaims
OE.SM, OSP.SMSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_IMP.1, AGD_GWA, AGD_SEC, AGD_OPE.1, ALC_FLR.2, ALC_CMC.4, ALC_CMS.4, ALC_DVS.1, ALC_TAT.1, ATE_COV.2, ATE_FUN.1, AVA_VAN.5, ASE_CCL.1, ASE_INT.1, ASE_REQ.2, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP, FAU_GEN, FAU_SAA, FAU_SAR, FAU_STG, FAU_GEN.2, FAU_STG.2, FAU_ARP.1, FAU_SAA.1, FAU_GEN.1, FAU_SAA.1.1, FAU_SAR.1, FAU_STG.4, FAU_STG.3, FAU_STG.1, FAU_GEN.2.1, FAU_STG.2.1, FAU_STG.2.2, FAU_STG.2.3, FCO_NRO, FCO_NRO.2, FCO_NRO.2.1, FCO_NRO.2.2, FCO_NRO.2.3, FCO_NRO.1, FCS_CKM, FCS_COP, FCS_CKM.4, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4.1, FDP_IFC, FDP_ACC.2, FDP_ACF.1, FDP_IFF, FDP_RIP.2, FDP_SDI.2, FDP_ITC.1, FDP_ITC.2, FDP_ACC, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACC.1, FDP_ACF, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.2, FDP_IFC.1, FDP_IFF.1, FDP_IFF.1.3, FDP_RIP, FDP_RIP.2.1, FDP_RIP.1, FDP_SDI, FDP_SDI.2.1, FDP_SDI.2.2, FDP_SDI.1, FIA_ATD, FIA_AFL, FIA_UAU, FIA_UID, FIA_USB, FIA_ATD.1, FIA_AFL.1, FIA_UAU.2, FIA_UAU.5, FIA_UAU.6, FIA_UID.2, FIA_USB.1, FIA_UID.1, FIA_ATD.1.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1, FIA_UAU.2.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6.1, FIA_UID.2.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_SMR, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA, FMT_MSA.3, FMT_MOF, FMT_MOF.1.1, FMT_SMF, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.1, FPR_CON, FPR_CON.1, FPR_PSE, FPR_CON.1.2, FPR_CON.1.1, FPR_PSE.1, FPR_PSE.1.1, FPR_PSE.1.2, FPR_PSE.1.3, FPT_FLS, FPT_RPL, FPT_STM, FPT_TST, FPT_PHP, FPT_FLS.1, FPT_RPL.1, FPT_STM.1, FPT_TST.1, FPT_PHP.1, FPT_FLS.1.1, FPT_RPL.1.1, FPT_RPL.1.2, FPT_STM.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.1.1, FPT_PHP.1.2, FTP_ITC, FTP_ITC.1Certificates
CC-1217-2024Side-channel analysis
physical tampering, malfunctionStandards
FIPS 140-3, FIPS 180-4, FIPS 197, RFC 5246, RFC 2104, RFC 5639, RFC 5114, RFC 5289, RFC 3565, RFC 4493, RFC 5084, RFC 5652, RFC 3394, RFC 7616, RFC 2616, RFC 5083, ISO/IEC 10116:2006, X.509, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003Technical reports
BSI TR-02102, BSI TR-03109, BSI TR-03109-1, BSI TR-03109-2, BSI TR-03109-3, BSI TR-03109-4, BSI TR-03109-6, BSI TR-03111, BSI TR-03116-3File metadata
Title | Security Target SMGW Version 2.2 |
---|---|
Pages | 173 |
References
Incoming- BSI-DSZ-CC-0831-V4-2021 - active - SMGW Version 1.2
- BSI-DSZ-CC-0831-V5-2022 - active - SMGW Version 2.0
- BSI-DSZ-CC-0831-2018 - archived - SMGW-Integrationsmodul, Version 1.0
Heuristics ?
Certificate ID: BSI-DSZ-CC-0831
Extracted SARs
ADV_ARC.1, ADV_IMP.1, AGD_OPE.1, ALC_CMC.4, ALC_CMS.4, ALC_DVS.1, ALC_FLR.2, ALC_TAT.1, ASE_CCL.1, ASE_INT.1, ASE_REQ.2, ASE_TSS.1, ATE_COV.2, ATE_FUN.1, AVA_VAN.5Scheme data ?
Cert Id | BSI-DSZ-CC-0831-V10-2024 | |
---|---|---|
Product | SMGW Version 2.2 | |
Vendor | Power Plus Communications AG | |
Certification Date | 08.11.2024 | |
Category | Intelligent measuring systems | |
Url | https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartMeter_Gateway/0831.html | |
Enhanced | ||
Product | SMGW Version 2.2 | |
Applicant | Power Plus Communications AG DudenstraĂe 6 68167 Mannheim | |
Evaluation Facility | TĂV Informationstechnik GmbH | |
Assurance Level | EAL4+,AVA_VAN.5,ALC_FLR.2 | |
Protection Profile | Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI-CC-PP-0073-2014 | |
Certification Date | 08.11.2024 | |
Expiration Date | 07.11.2032 | |
Entries | [frozendict({'id': 'BSI-DSZ-CC-0831-V10-2024', 'description': 'Der Evaluierungsgegenstand ist das Smart Meter Gateway âSMGW Version 2.2â bestehend aus der âSMGW Softwareâ, Version 2.2.2 und der âSMGW Hardwareâ, Version 2.0 und 2B. Das Smart Meter Gateway stellt die Kommunikationseinheit innerhalb eines intelligenten Messsystems dar. Die HauptfunktionalitĂ€t des Gateways besteht im Empfang und der Speicherung von Mess- und Statuswerten angeschlossener ZĂ€hler sowie der Verarbeitung und Versendung dieser Mess- und Statuswerte an berechtigte Instanzen, darĂŒber hinaus stellt das Smart Meter Gateway den sicheren CLS Kommunikationskanal fĂŒr nachgelagerte Systemeinheiten zur VerfĂŒgung. Der Fokus dieser Re-Zertifizierung lag auf der ErgĂ€nzung eines neuen Sicherheitsmoduls, der ErgĂ€nzung der Spannungsversorgung mit 100V und einer Ănderung bezĂŒglich des OpenSSL Padding Bytes.'}), frozendict({'id': 'BSI-DSZ-CC-0831-V9-2024-MA-01', 'description': 'Security Target'}), frozendict({'id': 'BSI-DSZ-CC-0831-V9-2024', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-0831-V8-2024', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-0831-V7-2023-MA-02', 'description': 'Sky-/Safety'}), frozendict({'id': 'BSI-DSZ-CC-0831-V7-2023-MA-01', 'description': 'Maintenance Report'}), frozendict({'id': 'BSI-DSZ-CC-0831-V7-2023', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-0831-V6-2023-MA-01', 'description': 'Maintenance Report'}), frozendict({'id': 'BSI-DSZ-CC-0831-V6-2023', 'description': 'The focus of this re-certification was on changes to the wMBUS-functionality, profile adjustments as well as further improvements.'}), frozendict({'id': 'BSI-DSZ-CC-0831-V5-2022-RA-01', 'description': 'Successful Re-Assessment with update of the vulnerability analysis. The CC-certificate BSI-DSZ-CC-0831-V5-2022 remains valid for 2 further years.'}), frozendict({'id': 'BSI-DSZ-CC-0831-V5-2022-MA-01', 'description': 'Maintenance Report'}), frozendict({'id': 'BSI-DSZ-CC-0831-V5-2022', 'description': 'The focus of this re-certification laid on the update of the linux kernel, a new hardware configuration, optimizations and bugfixing as well as changes in the developpment process.'}), frozendict({'id': 'BSI-DSZ-CC-0831-V4-2021-RA-01', 'description': 'Successful Re-Assessment with update of the vulnerability analysis. The CC-certificate BSI-DSZ-CC-0831-V4-2021 remains valid for 2 further years.'}), frozendict({'id': 'BSI-DSZ-CC-0831-V4-2021-MA-04', 'description': 'Maintenance Report'}), frozendict({'id': 'BSI-DSZ-CC-0831-V4-2021-MA-03', 'description': 'Maintenance Report'}), frozendict({'id': 'BSI-DSZ-CC-0831-V4-2021-MA-02 (Ausstellungsdatum / Certification Date 15.02.2022)', 'description': 'Maintenance Report'}), frozendict({'id': 'BSI', 'description': 'The guidance documentation was updated and the description of the communication adapter was added.'}), frozendict({'id': 'BSI-DSZ-CC-0831-V4-2021', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-0831-V3-2021-MA-01', 'description': 'Certification Report'}), frozendict({'id': 'BSI-DSZ-CC-0831-V3-2021', 'description': 'Target of Evaluation'}), frozendict({'id': 'BSI-DSZ-CC-0831-V2-2020', 'description': 'Target of Evaluation'}), frozendict({'id': 'BSI-DSZ-CC-0831-2018-RA-01'}), frozendict({'id': 'BSI-DSZ-CC-0831-2018-MA-01', 'description': 'Finally, the guidance documentation was updated to reflect the new communication adapters and to include a minor change in the delivery procedure.'}), frozendict({'id': 'BSI-DSZ-CC-0831-2018', 'description': 'Certificate'})] | |
Report Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte08/0831V10a_pdf.pdf?__blob=publicationFile&v=2 | |
Target Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte08/0831V10b_pdf.pdf?__blob=publicationFile&v=2 | |
Description | The target of evaluation (TOE) is the Smart Meter Gateway "SMGW Integrationsmodul Version 1.0". This Smartmeter Gateway is the communication unit used within an intelligent metering system. The main functionality of the Gateway is the reception and the storage of measured values and status of the connected meters as well as the processing and the transfer of these measurements and status values to authorized entities. | |
Subcategory | (Smart Meter Gateway) |
References ?
Updates ?
-
05.02.2025 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The st property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The cert property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data.
The computed heuristics were updated.
- The following values were inserted:
{'protection_profiles': {'_type': 'Set', 'elements': ['6346b04de6859db3']}, 'eal': 'EAL4+'}
. - The prev_certificates property was set to
None
. - The next_certificates property was set to
None
.
- The report property was updated, with the
-
03.02.2025 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name SMGW Version 2.2 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0831V10c_pdf.pdf",
"dgst": "fbefd0a153f669f0",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0831",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2.2"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"6346b04de6859db3"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0831-V9-2024",
"BSI-DSZ-CC-0957-V2-2016",
"BSI-DSZ-CC-1217-2024"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0831-V4-2021",
"BSI-DSZ-CC-0831-V9-2024",
"BSI-DSZ-CC-0845-V2-2013",
"BSI-DSZ-CC-1217-2024",
"BSI-DSZ-CC-0831-V5-2022",
"BSI-DSZ-CC-1149-V3-2023",
"BSI-DSZ-CC-1149-2022",
"BSI-DSZ-CC-1149-V2-2023",
"BSI-DSZ-CC-0978-2016",
"BSI-DSZ-CC-0957-2015",
"BSI-DSZ-CC-0831-V3-2021",
"BSI-DSZ-CC-0845-2012",
"BSI-DSZ-CC-0831-2018",
"BSI-DSZ-CC-0831-V7-2023",
"BSI-DSZ-CC-0831-V2-2020",
"BSI-DSZ-CC-0666-2012",
"BSI-DSZ-CC-0957-V2-2016"
]
}
},
"scheme_data": {
"category": "Intelligent measuring systems",
"cert_id": "BSI-DSZ-CC-0831-V10-2024",
"certification_date": "2024-11-08",
"enhanced": {
"applicant": "Power Plus Communications AG Dudenstra\u00dfe 6 68167 Mannheim",
"assurance_level": "EAL4+,AVA_VAN.5,ALC_FLR.2",
"certification_date": "2024-11-08",
"description": "The target of evaluation (TOE) is the Smart Meter Gateway \"SMGW Integrationsmodul Version 1.0\". This Smartmeter Gateway is the communication unit used within an intelligent metering system. The main functionality of the Gateway is the reception and the storage of measured values and status of the connected meters as well as the processing and the transfer of these measurements and status values to authorized entities.",
"entries": [
{
"description": "Der Evaluierungsgegenstand ist das Smart Meter Gateway \u201cSMGW Version 2.2\u201d bestehend aus der \u201cSMGW Software\u201d, Version 2.2.2 und der \u201cSMGW Hardware\u201d, Version 2.0 und 2B. Das Smart Meter Gateway stellt die Kommunikationseinheit innerhalb eines intelligenten Messsystems dar. Die Hauptfunktionalit\u00e4t des Gateways besteht im Empfang und der Speicherung von Mess- und Statuswerten angeschlossener Z\u00e4hler sowie der Verarbeitung und Versendung dieser Mess- und Statuswerte an berechtigte Instanzen, dar\u00fcber hinaus stellt das Smart Meter Gateway den sicheren CLS Kommunikationskanal f\u00fcr nachgelagerte Systemeinheiten zur Verf\u00fcgung. Der Fokus dieser Re-Zertifizierung lag auf der Erg\u00e4nzung eines neuen Sicherheitsmoduls, der Erg\u00e4nzung der Spannungsversorgung mit 100V und einer \u00c4nderung bez\u00fcglich des OpenSSL Padding Bytes.",
"id": "BSI-DSZ-CC-0831-V10-2024"
},
{
"description": "Security Target",
"id": "BSI-DSZ-CC-0831-V9-2024-MA-01"
},
{
"description": "Certificate",
"id": "BSI-DSZ-CC-0831-V9-2024"
},
{
"description": "Certificate",
"id": "BSI-DSZ-CC-0831-V8-2024"
},
{
"description": "Sky-/Safety",
"id": "BSI-DSZ-CC-0831-V7-2023-MA-02"
},
{
"description": "Maintenance Report",
"id": "BSI-DSZ-CC-0831-V7-2023-MA-01"
},
{
"description": "Certificate",
"id": "BSI-DSZ-CC-0831-V7-2023"
},
{
"description": "Maintenance Report",
"id": "BSI-DSZ-CC-0831-V6-2023-MA-01"
},
{
"description": "The focus of this re-certification was on changes to the wMBUS-functionality, profile adjustments as well as further improvements.",
"id": "BSI-DSZ-CC-0831-V6-2023"
},
{
"description": "Successful Re-Assessment with update of the vulnerability analysis. The CC-certificate BSI-DSZ-CC-0831-V5-2022 remains valid for 2 further years.",
"id": "BSI-DSZ-CC-0831-V5-2022-RA-01"
},
{
"description": "Maintenance Report",
"id": "BSI-DSZ-CC-0831-V5-2022-MA-01"
},
{
"description": "The focus of this re-certification laid on the update of the linux kernel, a new hardware configuration, optimizations and bugfixing as well as changes in the developpment process.",
"id": "BSI-DSZ-CC-0831-V5-2022"
},
{
"description": "Successful Re-Assessment with update of the vulnerability analysis. The CC-certificate BSI-DSZ-CC-0831-V4-2021 remains valid for 2 further years.",
"id": "BSI-DSZ-CC-0831-V4-2021-RA-01"
},
{
"description": "Maintenance Report",
"id": "BSI-DSZ-CC-0831-V4-2021-MA-04"
},
{
"description": "Maintenance Report",
"id": "BSI-DSZ-CC-0831-V4-2021-MA-03"
},
{
"description": "Maintenance Report",
"id": "BSI-DSZ-CC-0831-V4-2021-MA-02 (Ausstellungsdatum / Certification Date 15.02.2022)"
},
{
"description": "The guidance documentation was updated and the description of the communication adapter was added.",
"id": "BSI"
},
{
"description": "Certificate",
"id": "BSI-DSZ-CC-0831-V4-2021"
},
{
"description": "Certification Report",
"id": "BSI-DSZ-CC-0831-V3-2021-MA-01"
},
{
"description": "Target of Evaluation",
"id": "BSI-DSZ-CC-0831-V3-2021"
},
{
"description": "Target of Evaluation",
"id": "BSI-DSZ-CC-0831-V2-2020"
},
{
"id": "BSI-DSZ-CC-0831-2018-RA-01"
},
{
"description": "Finally, the guidance documentation was updated to reflect the new communication adapters and to include a minor change in the delivery procedure.",
"id": "BSI-DSZ-CC-0831-2018-MA-01"
},
{
"description": "Certificate",
"id": "BSI-DSZ-CC-0831-2018"
}
],
"evaluation_facility": "T\u00dcV Informationstechnik GmbH",
"expiration_date": "2032-11-07",
"product": "SMGW Version 2.2",
"protection_profile": "Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI-CC-PP-0073-2014",
"report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte08/0831V10a_pdf.pdf?__blob=publicationFile\u0026v=2",
"target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte08/0831V10b_pdf.pdf?__blob=publicationFile\u0026v=2"
},
"product": "SMGW Version 2.2",
"subcategory": "(Smart Meter Gateway)",
"url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartMeter_Gateway/0831.html",
"vendor": "Power Plus Communications AG"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0831-V4-2021",
"BSI-DSZ-CC-0831-V5-2022",
"BSI-DSZ-CC-0831-2018"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0831-V4-2021",
"BSI-DSZ-CC-0831-V5-2022",
"BSI-DSZ-CC-0831-2018"
]
},
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Power Plus Communications AG",
"manufacturer_web": "https://ppc-ag.de",
"name": "SMGW Version 2.2",
"not_valid_after": "2031-11-07",
"not_valid_before": "2024-11-08",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "0831V10c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 1,
"ALC_FLR.2": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 2,
"EAL 4 augmented": 1,
"EAL 5": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "Federal Office for Information Security",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Smartmeter Gateway, SMGW, Smart Grid, PPC, Power Plus Communications\"",
"/Subject": "Common Criteria, Certification, Zertifizierung, Smartmeter Gateway, SMGW, Smart Grid, PPC, Power Plus Communications",
"/Title": "Certification Report BSI-DSZ-CC-0831-V10-2024",
"pdf_file_size_bytes": 230123,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "0831V10a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.2 and AVA_VAN.5 valid until: 07 November 2032",
"cc_version": "PP conformant Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-0831-V10-2024",
"cert_item": "SMGW Version 2.2",
"cert_lab": "BSI",
"developer": "Power Plus Communications AG",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI- CC-PP-0073-2014"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0831-V9-2024": 3,
"BSI-DSZ-CC-0957-V2-2016": 1,
"BSI-DSZ-CC-1217-2024": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0073-2014": 3
}
},
"cc_sar": {
"ALC": {
"ALC_FLR": 3,
"ALC_FLR.2": 4
},
"AVA": {
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 3,
"EAL 4": 8,
"EAL 4 augmented": 3,
"EAL 5": 3,
"EAL 5+": 1,
"EAL 6": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"AG [7] Evaluation Technical Report, Version 2, 2024-10-25, T\u00dcV Informationstechnik GmbH (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
"list for the TOE, Version v174, 2024-10-02, EVG-CM-List, Power Plus Communications AG (confidential document) [10] Handbuch f\u00fcr Verbraucher, Smart Meter Gateway, Version 4.15, 2024-08-15, Power Plus": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 1
}
},
"crypto_protocol": {
"SSH": {
"SSH": 2
},
"TLS": {
"TLS": {
"TLS": 5
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 3
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 1,
"SHA-384": 1,
"SHA-512": 1,
"SHA2": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"physical tampering": 1
}
},
"standard_id": {
"BSI": {
"AIS 1": 1,
"AIS 32": 1,
"AIS 34": 2,
"AIS 38": 1,
"AIS 46": 2,
"AIS 48": 1
},
"FIPS": {
"FIPS180-4": 3
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
},
"RFC": {
"RFC2104": 2,
"RFC3565": 1,
"RFC4493": 3,
"RFC5084": 1,
"RFC5246": 4,
"RFC5288": 1,
"RFC5652": 2,
"RFC6033": 1
}
},
"symmetric_crypto": {
"constructions": {
"MAC": {
"CMAC": 3
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7148": 1,
"BSI TR-02102-1": 1,
"BSI TR-03109-1": 1,
"BSI TR-03116-3": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Federal Office for Information Security",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Smartmeter Gateway, SMGW, Smart Grid, PPC, Power Plus Communications\"",
"/Subject": "Common Criteria, Certification, Zertifizierung, Smartmeter Gateway, SMGW, Smart Grid, PPC, Power Plus Communications",
"/Title": "Certification Report BSI-DSZ-CC-0831-V10-2024",
"pdf_file_size_bytes": 344953,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.bsi.bund.de/zertifizierungsreporte",
"https://www.bsi.bund.de/AIS",
"https://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/zertifizierung",
"https://www.sogis.eu/",
"http://www.commoncriteriaportal.org/cc/",
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 25
},
"st_filename": "0831V10b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 4
},
"ECDSA": {
"ECDSA": 1
}
},
"FF": {
"DH": {
"Diffie-Hellman": 1
}
}
},
"cc_cert_id": {
"NL": {
"CC-1217-2024": 1
}
},
"cc_claims": {
"OE": {
"OE.SM": 4
},
"OSP": {
"OSP.SM": 5
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_IMP.1": 1
},
"AGD": {
"AGD_GWA": 2,
"AGD_OPE.1": 1,
"AGD_SEC": 3
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DVS.1": 1,
"ALC_FLR.2": 5,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_INT.1": 1,
"ASE_REQ.2": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_FUN.1": 1
},
"AVA": {
"AVA_VAN.5": 7
}
},
"cc_security_level": {
"EAL": {
"EAL 2605": 1,
"EAL 4": 3,
"EAL 4 augmented": 1,
"EAL 4+": 1,
"EAL4": 1,
"EAL4 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP": 10,
"FAU_ARP.1": 1,
"FAU_GEN": 37,
"FAU_GEN.1": 17,
"FAU_GEN.2": 8,
"FAU_GEN.2.1": 1,
"FAU_SAA": 10,
"FAU_SAA.1": 3,
"FAU_SAA.1.1": 1,
"FAU_SAR": 28,
"FAU_SAR.1": 7,
"FAU_STG": 29,
"FAU_STG.1": 7,
"FAU_STG.2": 13,
"FAU_STG.2.1": 1,
"FAU_STG.2.2": 1,
"FAU_STG.2.3": 1,
"FAU_STG.3": 3,
"FAU_STG.4": 3
},
"FCO": {
"FCO_NRO": 3,
"FCO_NRO.1": 1,
"FCO_NRO.2": 10,
"FCO_NRO.2.1": 1,
"FCO_NRO.2.2": 1,
"FCO_NRO.2.3": 1
},
"FCS": {
"FCS_CKM": 41,
"FCS_CKM.1": 17,
"FCS_CKM.2": 6,
"FCS_CKM.4": 33,
"FCS_CKM.4.1": 1,
"FCS_COP": 58,
"FCS_COP.1": 11
},
"FDP": {
"FDP_ACC": 2,
"FDP_ACC.1": 9,
"FDP_ACC.2": 10,
"FDP_ACC.2.1": 1,
"FDP_ACC.2.2": 1,
"FDP_ACF": 1,
"FDP_ACF.1": 9,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC": 27,
"FDP_IFC.1": 12,
"FDP_IFC.2": 4,
"FDP_IFF": 22,
"FDP_IFF.1": 19,
"FDP_IFF.1.3": 1,
"FDP_ITC.1": 12,
"FDP_ITC.2": 12,
"FDP_RIP": 2,
"FDP_RIP.1": 1,
"FDP_RIP.2": 9,
"FDP_RIP.2.1": 1,
"FDP_SDI": 2,
"FDP_SDI.1": 1,
"FDP_SDI.2": 8,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1
},
"FIA": {
"FIA_AFL": 3,
"FIA_AFL.1": 7,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD": 3,
"FIA_ATD.1": 12,
"FIA_ATD.1.1": 1,
"FIA_UAU": 5,
"FIA_UAU.1": 2,
"FIA_UAU.2": 7,
"FIA_UAU.2.1": 1,
"FIA_UAU.5": 6,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 2,
"FIA_UAU.6": 7,
"FIA_UAU.6.1": 1,
"FIA_UID": 3,
"FIA_UID.1": 8,
"FIA_UID.2": 11,
"FIA_UID.2.1": 1,
"FIA_USB": 3,
"FIA_USB.1": 11,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MOF": 2,
"FMT_MOF.1": 9,
"FMT_MOF.1.1": 1,
"FMT_MSA": 55,
"FMT_MSA.1": 9,
"FMT_MSA.3": 12,
"FMT_SMF": 2,
"FMT_SMF.1": 18,
"FMT_SMF.1.1": 1,
"FMT_SMR": 3,
"FMT_SMR.1": 28,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_CON": 6,
"FPR_CON.1": 10,
"FPR_CON.1.1": 2,
"FPR_CON.1.2": 4,
"FPR_PSE": 2,
"FPR_PSE.1": 8,
"FPR_PSE.1.1": 1,
"FPR_PSE.1.2": 1,
"FPR_PSE.1.3": 1
},
"FPT": {
"FPT_FLS": 3,
"FPT_FLS.1": 8,
"FPT_FLS.1.1": 1,
"FPT_PHP": 3,
"FPT_PHP.1": 7,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_RPL": 3,
"FPT_RPL.1": 10,
"FPT_RPL.1.1": 1,
"FPT_RPL.1.2": 1,
"FPT_STM": 3,
"FPT_STM.1": 17,
"FPT_STM.1.1": 1,
"FPT_TST": 3,
"FPT_TST.1": 9,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC": 27,
"FTP_ITC.1": 9
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"GCM": {
"GCM": 2
},
"XTS": {
"XTS": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 1
},
"TLS": {
"TLS": {
"TLS": 61,
"TLS 1.2": 1
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"MAC": {
"MAC": 7
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"NIST P-256": 2,
"NIST P-384": 2,
"P-256": 2,
"P-384": 2
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 7,
"SHA-384": 3,
"SHA-512": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 2,
"physical tampering": 3
}
},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
},
"FIPS": {
"FIPS 140-3": 1,
"FIPS 180-4": 1,
"FIPS 197": 1
},
"ISO": {
"ISO/IEC 10116:2006": 1
},
"RFC": {
"RFC 2104": 4,
"RFC 2616": 3,
"RFC 3394": 3,
"RFC 3565": 3,
"RFC 4493": 5,
"RFC 5083": 2,
"RFC 5084": 3,
"RFC 5114": 6,
"RFC 5246": 12,
"RFC 5289": 4,
"RFC 5639": 8,
"RFC 5652": 4,
"RFC 7616": 3
},
"X509": {
"X.509": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 14,
"AES-": 1
}
},
"constructions": {
"MAC": {
"CMAC": 10
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-02102": 1,
"BSI TR-03109": 1,
"BSI TR-03109-1": 3,
"BSI TR-03109-2": 1,
"BSI TR-03109-3": 1,
"BSI TR-03109-4": 1,
"BSI TR-03109-6": 1,
"BSI TR-03111": 1,
"BSI TR-03116-3": 1
}
},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256": 2,
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 2,
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384": 2,
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 2
}
},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Title": "Security Target SMGW Version 2.2",
"pdf_file_size_bytes": 5040086,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://de.wikipedia.org/wiki/Ethernet",
"http://en.wikipedia.org/wiki/Network_interface_device",
"http://www.ietf.org/rfc/rfc5652.txt",
"http://rfc-editor.org/rfc/rfc2104.txt",
"http://www.ietf.org/rfc/rfc5084.txt",
"http://rfc-editor.org/rfc/rfc3565.txt",
"http://fc12.ifca.ai/pre-proceedings/paper_49.pdf",
"http://www.ietf.org/rfc/rfc5246.txt",
"http://www.usb.org/developers/docs/usb20_docs/%23usb20spec",
"http://www.ietf.org/rfc/rfc5639.txt",
"http://www.ietf.org/rfc/rfc5289.txt",
"http://rfc-editor.org/rfc/rfc7616.txt",
"http://rfc-editor.org/rfc/rfc3394.txt",
"http://de.wikipedia.org/wiki/Open_Metering_System",
"http://www.ietf.org/rfc/rfc5114.txt",
"http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf",
"http://www.ietf.org/rfc/rfc5083.txt",
"http://rfc-editor.org/rfc/rfc2616.txt",
"http://www.rfc-editor.org/rfc/rfc4493.txt",
"http://www.ppc-ag.com/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 173
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0073b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0831V10a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.2",
"AVA_VAN.5",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0831V10b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "5c96254a1c8d83d628d90b487507a7a3aed8bba11f3c8448de31a7d5b8284025",
"txt_hash": "9a120b02b14965026b1abaf1f6617ab4d84315bb0b021af851482e4ecb8622b7"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "9107f5e99f950398fa00be5d843f303a95ad691bed176ab73178bf36a8c61047",
"txt_hash": "4318f6a93ce9ac5d6dbc77d9ffb525f16ac535104c031a588299cf0066b97491"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "07c8426eb3b2fd963aee177e81ad14dd97c8e982dd684bc23512f9d7783fa303",
"txt_hash": "a1f57f5c0d0894c1a1b7381fe570a6e5f7f7cd9c3215307ca645c3abc41664c1"
}
},
"status": "active"
}