This page was not yet optimized for use on mobile
devices.
Protection Profile - Secure Signature-Creation Device Type 2, Version 1.04
Web information
| Status | archived |
|---|---|
| Valid from | 01.04.2002 |
| Valid until | 29.01.2013 |
| Scheme | 🇩🇪 DE |
| Category | Products for Digital Signatures |
| Security level | EAL4+ |
Certification report
Extracted keywords
Security level
EAL4, EAL 4, EAL4+, EAL4 augmentedSecurity Assurance Requirements (SAR)
AVA_MSU.3, AVA_VLA.4Security Functional Requirements (SFR)
FCS_CKM.4, FCS_COP.1, FDP_ACC.1, FDP_ACF.1, FDP_ETC.1, FDP_ITC.1, FDP_RIP.1, FDP_SDI.2, FDP_UIT.1, FDP_UCT.1, FIA_AFL.1, FIA_ATD.1, FIA_UAU.1, FIA_UID.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.1, FMT_SMR.1, FPT_AMT.1, FPT_FLS.1, FPT_PHP.1, FPT_PHP.3, FPT_TST.1, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-PP-0005-2002Evaluation facilities
TÜV InformationstechnikStandards
ISO/IEC 15408Technical reports
BSI 7148, BSI 7149File metadata
| Title | PP0005a.PDF |
|---|---|
| Author | Bundesamt für Sicherheit in der Informationstechnik |
| Creation date | D:20020612111214Z |
| Modification date | D:20020614094141+03'00' |
| Pages | 17 |
| Creator | Microsoft Word - PP0005a.doc |
| Producer | Acrobat PDFWriter 4.0 für Windows NT |
Protection Profile
Extracted keywords
Security level
EAL 4+, EAL 4, EAL4, EAL 4 augmented, EAL4 augmentedClaims
A.CGA, A.SCA, OE.HI_VADSecurity Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ACM_CAP.3, ADO_DEL.2, ADO_IGS.1, ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, ADV_FSP.1, ADV_HLD.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VLA.4, AVA_MSU.3, AVA_SOF.1, AVA_SOFSecurity Functional Requirements (SFR)
FAU_GEN, FCS_CKM.4, FCS_COP.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.4.1, FCS_CKM.1.1, FCS_COP, FCS_CKM, FDP_ACC.1, FDP_ACF.1, FDP_ETC.1, FDP_ITC.1, FDP_RIP.1, FDP_SDI.2, FDP_UCT.1, FDP_UIT.1, FDP_ACC, FDP_ACF, FDP_ETC, FDP_RIP.1.1, FDP_ITC, FDP_SDI, FDP_UCT, FDP_UIT, FDP_ACC.1.1, FIA_AFL.1, FIA_ATD.1, FIA_UAU.1, FIA_UID.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA, FPT_AMT.1, FPT_FLS.1, FPT_PHP.1, FPT_PHP.3, FPT_TST.1, FPT_AMT.1.1, FPT_FLS.1.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS, FPT_TRP, FTP_ITC.1, FTP_TRP.1, FTP_ITC, FTP_TRPSide-channel analysis
SPA, DPA, timing attacks, physical tampering, DFAFile metadata
| Title | |
|---|---|
| Creation date | D:20010810112503 |
| Modification date | D:20010810112543+02'00' |
| Pages | 74 |
| Producer | Acrobat Distiller 4.05 for Windows |
References
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.- Applet IAS Classic v3 sur carte à puce MultiApp V2 masquée sur composants de la famille SLE66 archived
- Application IAS Classic v3 sur plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 masquée sur composant P5CC145V0A archived
- Application IAS Classic v3 sur plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 sur composant P5CC081V1A archived
- Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11 archived
- Application IAS V4.2 sur la plateformeJavaCard ouverte MultiApp V3.1 masquée surle composant P60D080PVC(version du patch : 1.4) archived
- Application IAS V4.2.0.B sur la plateforme Javacard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA (version du patch: 1.3) archived
- Application IAS XL sur plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 masquée sur composant P5CC145V0A archived
- Application IAS XL sur plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 sur composant P5CC081V1A archived
- Athena IDProtect/OS755 (release 0355, level 0602, correctif P6) avec application IAS-ECC (version 03, build 02, correctif FA) sur composants SB23YR48/80B archived
- Athena IDProtect/OS755 (release 0355, level0802, correctif P8) avec application IAS-ECC(version 03, build 02, correctif FA) surcomposants SB23YR48/80B archived
- Athena IDProtect/OS755 (release 4016, level0101) avec application IAS-ECC (version 03,build 02, correctif FA) sur composantsSB23YR48/80B archived
- Athena IDProtect/OS755 Key version 9.1.2 on AT90SC25672RCT-USB Microcontroller embedding IDSign applet archived
- Athena IDProtect/OS755 avec application IAS-ECC sur composants SB23YR48/80B archived
- Athena OS755/IDProtect v6 avec application IAS-ECC sur composant AT90SC28872RCU archived
- Athena Smartcard ASEPCOS TS/CNS v1.82, build 0003 on ST23YR48/80 with NesLib v3.0 archived
- Athena Smartcard Solutions Inc. Carte ASEPCOS-TS/CNS DI Système d'exploitation ASEPCOS avec application de signature électronique TS/CNS embarqué sur le microcontrôleur AT90SC12872RCFT archived
- Athena Smartcard Solutions Inc. Carte ASEPCOS-TS/CNS DI, Version 1.80, Build 006. Système d'exploitation ASEPCOS avec application de signature électronique TS/CNS embarqué sur le microcontrôleur AT90SC12872RCFT archived
- Athena Smartcard Solutions, Inc. Carte ASEPCOS-TS/CNS DI, Version 1.81, Build 003 archived
- CC IDeal Citiz SmartCard (on SB23YR48B), version 1.4.5 IAS ECC application with PIN or MOC authentication archived
- CC IDeal Citiz SmartCard (on SB23YR80B), version 1.4.5 IAS ECC application with PIN or MOC authentication archived
- Carte CC IDeal Citiz (sur composants SB23YR80B et SB23YR48B) archived
- Carte IAS ECC v1.0.1 : applet version 6179 sur ID-One Cosmo v7.0.1-n R2.0, masquée sur composants NXP P5CC081 et P5CD081, en configuration Standard ou Standard Dual archived
- Carte IAS ECC v1.0.1 sur ID-One Cosmo v7.0.1-a : applet (version 3124) masquée sur ID-One Cosmo V7.0.1-a (composant Inside Secure) en configuration Standard et Basic avec correctif 075243 archived
- Carte ID-One IAS-ECC v1.0.1 R1 : applet (version 1121) chargée sur Cosmo v7.0-a (composant Atmel) en configuration Large Dual, Large et Standard Dual archived
- Carte ID-One IAS-ECC v1.0.1 R1 : applet (version 1121) chargée sur Cosmo v7.0-n (composant NXP) en configuration Large et Standard (modes dual ou contact) archived
- Carte VITALE 2 - Application ADELE : Composant AT90SC24036RCV masqué par le logiciel SESAM VITALE v1.0.1 avec correctif version 1 archived
- Carte VITALE 2 - Application ADELE : Composant SB23ZL48 masqu� par le logiciel SESAM VITALE v1.0.1 avec correctif version 1 archived
- Carte VITALE 2 - Application ADELE: Composant SB23ZL48 masqué par le logiciel SESAM VITALE v1.0.4 avec correctif version 4 archived
- Carte VITALE 2 - Application VITALE : Composant AT90SC24036RCV masqué par le logiciel SESAM VITALE v1.0.1 avec correctif version 1 archived
- Carte VITALE 2 - Application VITALE : Composant SB23ZL48 masqué par le logiciel SESAM VITALE v1.0.1 avec correctif version 1 archived
- Carte VITALE 2 - Application VITALE: Composant SB23ZL48 masqué par le logiciel SESAM VITALE v1.0.4 avec correctif version 4 archived
- Carte à puce Multiapp ID IAS ECC wafer process : applet de signature v4.2.7.A chargée sur la plate-forme Java Card Multiapp v1.0 avec correctif v1.2 masquée sur microcontrôleur NXP P5CD144 VOB archived
- Gemalto MultiApp ID Citizen 72K (generic configuration) archived
- ID-One CIE (Version 1.0) archived
- IDeal Citiz v2.16-i embarquant l’application VITALE version 1.2.18 active
- MultiApp ID CIE/CNS archived
- Oberthur ID-One IAS-ECC v1.0.1 : applet (v1121) loaded on Cosmo v7.0.1-n in Standard dual, Standard & Basic dual configuration archived
- Oberthur ID-One IAS-ECC v1.0.1 R1 : applet (v1121) loaded on Cosmo v7.0-a in USB configuration archived
- Oberthur ID-One IAS-ECC v1.0.1 R1 : applet (v1121) loaded on Cosmo v7.0-a in standard configuration archived
- SafeNet eToken (Smartcard or USB token) version 9.1.2 Athena IDProtect/OS755 Java Card on INSIDE Secure AT90SC25672RCTUSB Microcontroller embedding IDSign applet archived
- SafeNet eToken - Athena IDProtect/OS755 Java Card on Atmel AT90SC25672RCT-USB Microcontroller embedding IDSign applet archived
- Sagem Sécurité Carte CC IDeal Citiz (sur composant SB23YR48B), version 1.4.5 Application ICAO BAC archived
- Sagem Sécurité Carte CC IDeal Citiz (sur composant SB23YR80B), version 1.4.5 Application IAS archived
Updates Feed
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile was first processed.
Raw data
{
"_id": "9863a376f3bb4175",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "9863a376f3bb4175",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "pp0005b.pdf",
"pp_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CGA": 3,
"A.SCA": 3
},
"OE": {
"OE.HI_VAD": 6
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_AUT.1": 12,
"ACM_CAP.3": 1,
"ACM_CAP.4": 20,
"ACM_SCP.2": 9
},
"ADO": {
"ADO_DEL.2": 13,
"ADO_IGS.1": 11
},
"ADV": {
"ADV_FSP.1": 10,
"ADV_FSP.2": 12,
"ADV_HLD.1": 2,
"ADV_HLD.2": 17,
"ADV_IMP.1": 13,
"ADV_LLD.1": 19,
"ADV_RCR.1": 10,
"ADV_SPM.1": 12
},
"AGD": {
"AGD_ADM.1": 22,
"AGD_USR.1": 18
},
"ALC": {
"ALC_DVS.1": 10,
"ALC_LCD.1": 9,
"ALC_TAT.1": 13
},
"ATE": {
"ATE_COV.2": 9,
"ATE_DPT.1": 6,
"ATE_FUN.1": 15,
"ATE_IND.2": 7
},
"AVA": {
"AVA_MSU.3": 18,
"AVA_SOF": 1,
"AVA_SOF.1": 10,
"AVA_VLA.4": 19
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 21,
"EAL 4 augmented": 2,
"EAL 4+": 74,
"EAL4": 9,
"EAL4 augmented": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1
},
"FCS": {
"FCS_CKM": 15,
"FCS_CKM.1": 14,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 3,
"FCS_CKM.3": 3,
"FCS_CKM.4": 15,
"FCS_CKM.4.1": 1,
"FCS_COP": 18,
"FCS_COP.1": 10
},
"FDP": {
"FDP_ACC": 29,
"FDP_ACC.1": 11,
"FDP_ACC.1.1": 1,
"FDP_ACF": 18,
"FDP_ACF.1": 19,
"FDP_ETC": 4,
"FDP_ETC.1": 4,
"FDP_ITC": 9,
"FDP_ITC.1": 9,
"FDP_RIP.1": 5,
"FDP_RIP.1.1": 1,
"FDP_SDI": 7,
"FDP_SDI.2": 6,
"FDP_UCT": 6,
"FDP_UCT.1": 6,
"FDP_UIT": 14,
"FDP_UIT.1": 14
},
"FIA": {
"FIA_AFL.1": 5,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 4,
"FIA_ATD.1.1": 1,
"FIA_UAU.1": 5,
"FIA_UAU.1.1": 2,
"FIA_UAU.1.2": 1,
"FIA_UID.1": 6,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MOF.1": 7,
"FMT_MOF.1.1": 1,
"FMT_MSA": 7,
"FMT_MSA.1": 4,
"FMT_MSA.2": 14,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 12,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 4,
"FMT_MTD.1.1": 1,
"FMT_SMR.1": 11,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_AMT.1": 6,
"FPT_AMT.1.1": 1,
"FPT_FLS": 1,
"FPT_FLS.1": 5,
"FPT_FLS.1.1": 1,
"FPT_PHP.1": 5,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_PHP.3": 4,
"FPT_PHP.3.1": 1,
"FPT_TRP": 1,
"FPT_TST.1": 6,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC": 26,
"FTP_ITC.1": 28,
"FTP_TRP": 8,
"FTP_TRP.1": 10
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"DFA": 1,
"physical tampering": 5
},
"SCA": {
"DPA": 2,
"SPA": 2,
"timing attacks": 2
}
},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/CreationDate": "D:20010810112503",
"/Creator": "",
"/ModDate": "D:20010810112543+02\u002700\u0027",
"/Producer": "Acrobat Distiller 4.05 for Windows",
"/Title": "\n",
"pdf_file_size_bytes": 294826,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 74
},
"report_filename": "pp0005a.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0005-2002": 8
}
},
"cc_sar": {
"AVA": {
"AVA_MSU.3": 1,
"AVA_VLA.4": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL4": 2,
"EAL4 augmented": 1,
"EAL4+": 1
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM.4": 1,
"FCS_COP.1": 1
},
"FDP": {
"FDP_ACC.1": 1,
"FDP_ACF.1": 1,
"FDP_ETC.1": 1,
"FDP_ITC.1": 1,
"FDP_RIP.1": 1,
"FDP_SDI.2": 1,
"FDP_UCT.1": 1,
"FDP_UIT.1": 1
},
"FIA": {
"FIA_AFL.1": 1,
"FIA_ATD.1": 1,
"FIA_UAU.1": 1,
"FIA_UID.1": 1
},
"FMT": {
"FMT_MOF.1": 1,
"FMT_MSA.1": 1,
"FMT_MSA.2": 1,
"FMT_MSA.3": 1,
"FMT_MTD.1": 1,
"FMT_SMR.1": 1
},
"FPT": {
"FPT_AMT.1": 1,
"FPT_FLS.1": 1,
"FPT_PHP.1": 1,
"FPT_PHP.3": 1,
"FPT_TST.1": 1
},
"FTP": {
"FTP_ITC.1": 1,
"FTP_TRP.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 4
}
},
"symmetric_crypto": {},
"technical_report_id": {
"BSI": {
"BSI 7148": 1,
"BSI 7149": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20020612111214Z",
"/Creator": "Microsoft Word - PP0005a.doc",
"/ModDate": "D:20020614094141+03\u002700\u0027",
"/Producer": "Acrobat PDFWriter 4.0 f\u00fcr Windows NT",
"/Title": "PP0005a.PDF",
"pdf_file_size_bytes": 341047,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 17
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "73f51489dbf2d96626ff485986611bd2d0d8fa144ae4be5ff67a7d68a527eda8",
"txt_hash": "e2f3b389c3f582a35a0aad8d869c639ac6bee639772fb5e7a268b24ee0b5ce83"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b9907dcb083a024630698076c719882d4ba5df7096aed9879c2b887153791e4b",
"txt_hash": "ea1f818406cf8e8dad4c44c67d36f4825f35550de49f8e5b1bf2098a22bb120a"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Products for Digital Signatures",
"is_collaborative": false,
"maintenances": [],
"name": "Protection Profile - Secure Signature-Creation Device Type 2, Version 1.04",
"not_valid_after": "2013-01-29",
"not_valid_before": "2002-04-01",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0005b.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0005a.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+"
]
},
"status": "archived",
"version": "1.04"
}
}