This page was not yet optimized for use on mobile devices.
Digital Tachograph - Vehicle Unit (VU PP) Version 1.15
Web information ?
Status: activeCertification date: 2021-06-30
Scheme: 🇩🇪
Category: Other Devices and Systems
Security level: AVA_VAN.5, EAL4+, ATE_DPT.2
Certification report ?
Extracted keywords
Security level
EAL 4, EAL 2, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR, ATE_DPT.2, AVA_VAN.5, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.2, APE_ECD.1, APE_REQ.2Protection profiles
BSI-CC-PP-0094-V2-2021, BSI-CC-PP-0094-2017, BSI-CC-PP-0094-V2-, BSI-CC-PP-0094-V2Evaluation facilities
Deutsche Telekom SecurityCertification process
June 2021, Evaluation Technical Report – Summary BSI-CC-PP-0094-V2, Deutsche Telekom Security GmbH (confidential document) [8] Commission Implementing Regulation (EU) 2016/799 of 18 March 2016 implementing Regulation (EUStandards
AIS 27, AIS 32, AIS 38, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065Technical reports
BSI 7148File metadata
Title | Certification Report BSI-CC-PP-0094-V2-2021 |
---|---|
Subject | Digital Tachograph – Vehicle Unit (VU PP), Version 1.15 developed by European Commission - Joint Research Centre |
Keywords | "Common Criteria, Certification, Zertifizierung, Protection Profile, Schutzprofil" |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Creation date | D:20210701114348+02'00' |
Modification date | D:20210701124342+02'00' |
Pages | 16 |
Creator | Writer |
Producer | LibreOffice 6.3 |
Profile ?
Extracted keywords
Symmetric Algorithms
AES, DES, TDESAsymmetric Algorithms
ECDSA, ECCHash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA-2Schemes
MACRandomness
RNGElliptic Curves
P-256, P-384, P-521, NIST P-256, NIST P-384, NIST P-521, secp256r1, secp384r1, secp521r1, brainpoolP256r1, brainpoolP384r1, brainpoolP512r1Block cipher modes
CBCSecurity level
EAL4, EAL4 augmentedClaims
OE.EOLSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_TDS.3, ADV_FSP.4, ADV_IMP.1, AGD_OPE.1, AGD_PRE.1, ATE_DPT.2, ATE_FUN.1, ATE_DPT.1, AVA_VAN.5Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.4, FAU_STG.3, FAU_STG.4.1, FCO_NRO.1, FCO_NRO.1.1, FCO_NRO.1.2, FCO_NRO.1.3, FCS_RNG, FCS_RNG.1, FCS_CKM.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.4, FCS_CKM.2, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ETC.2, FDP_IFC.1, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_ITC.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_ITC.2, FDP_ITC.2.1, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITC.2.5, FDP_ITT.1, FDP_ITT.1.1, FDP_RIP.1, FDP_RIP.1.1, FDP_RIP, FDP_SDI.2, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_MSA.3, FIA_SOS.2, FIA_UID.1, FIA_AFL.1, FIA_UAU.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1, FIA_ATD.1.1, FIA_UAU.3, FIA_UAU.3.1, FIA_UAU.3.2, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_UAU.6.1, FIA_UID.2, FIA_UID.2.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.2, FIA_UAU.2.1, FMT_MSA.3, FMT_MSA.1, FMT_SMR.1, FMT_SMF.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MOF.1, FMT_MOF.1.1, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FPT_TDC.1, FPT_FLS.1, FPT_FLS.1.1, FPT_PHP.2, FPT_PHP.1, FPT_PHP.2.1, FPT_PHP.2.2, FPT_PHP.2.3, FPT_PHP.3, FPT_PHP.3.1, FPT_STM.1.1, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_TDC.1.1, FPT_TDC.1.2, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3Protection profiles
BSI-CC-PP-0057, BSI-CC-PP-0094-V2, BSI-CC-PP-0093Side-channel analysis
physical tampering, malfunction, reverse engineeringCertification process
Out of scope, ECC Generated by MSCA; obtained by VU in MSCA_VU-EGF certificate during coupling to an EGF Out of scope for this PP Not applicable VU non-volatile memory (conditional, possibly multiple, 20 RSA Generated by ERCA; inserted in VU by manufacturer at the end of the manufacturing phase Out of scope for this PP Not applicable VU non- volatile memory Card.PK (conditional, possibly multiple) Card, by card or card manufacturer; obtained by VU in card certificate during mutual authentication Out of scope for this PP Not applicable VU non- volatile memory MS.PK (conditional, possibly multiple) Public, foreign) MSCA; obtained by VU in MS certificate presented by a card during mutual authentication Out of scope for this PP Not applicable VU non- volatile memory Table 18 First-generation asymmetric keys, 23 . ECC Generated by ERCA; inserted in VU by manufacturer at the end of the manufacturing phase Out of scope for this PP Not applicable VU non-volatile memory Common Criteria Protection Profile Digital, 23 ECC Generated by ERCA; inserted in VU by manufacturer at the end of the manufacturing phase Out of scope for this PP Not applicable VU non-volatile memory (conditional; only present if existing at time of, C as part of the EUR.Link.C; obtained by VU during mutual authentication towards such card or EGF Out of scope for this PP Not applicable VU general non- volatile memory (conditional; only if the VU has, by card or card manufacturer; obtained by VU in card certificate during mutual authentication Out of scope for this PP Not applicable VU non-volatile memory(conditional, possibly multiple) Common Criteria, obtained by VU in EGF certificate during mutual authentication as part of the coupling process Out of scope for this PP Not applicable VU non-volatile memory (conditional, possibly multiple) MSCA_Card.PK, 23 ECC Generated by MSCA; obtained by VU in MSCA_Card certificate during mutual authentication Out of scope for this PP Not applicable VU non-volatile memory (conditional, possibly multiple) MSCA_VU- EGF.PK, 23 . ECC Generated by MSCA; obtained by VU in MSCA_VU-EGF certificate during coupling to an EGF Out of scope for this PP Not applicable VU non-volatile memory (conditional, possibly multiple) Table 21, Note: as explained in [5] Annex 1C, Appendix 11, section 12.2, a VU contains only one K M-VU. Out of scope for this PP Made unavailable when the VU has reached end of life VU non- volatile memory K M-WC, key generations). However, a VU will retrieve only one of these keys during the pairing process. Out of scope for this PP Made unavailable at the latest by end of calibration phase Not permanently stored; only, under K M ) at the end of the manufacturing phase; obtained and decrypted by VU during pairing Out of scope for this PP Made unavailable at the latest by end of calibration phase Not permanently stored; only, received from VU manufacturer; inserted by VU manufacturer at the end of the manufacturing phase Out of scope for this PP Made unavailable when the VU has reached end of life VU non- volatile memory 34 Common, received from VU manufacturer; inserted by VU manufacturer at the end of the manufacturing phase Out of scope for this PP Made unavailable when the VU has reached end of life VU non- volatile memory Table 22Standards
FIPS PUB 46-3, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
Title | Digital Tachograph – Vehicle Unit (VU PP) |
---|---|
Subject | Common Criteria Protection Profile, 2021 update for the Smart Tachograph version 2 |
Keywords | Digital Tachograph; Vehicle Unit VU; Common Criteria; Protection Profile; Smart Tachograph version 2 |
Author | European Commission. DG JRC – Directorate E – Space, Security and Migration. Cyber and Digital Citizens’ Security Unit E3 |
Creation date | D:20210622172645+02'00' |
Modification date | D:20210622173940+02'00' |
Pages | 118 |
Producer | Microsoft: Print To PDF |
References ?
Updates ?
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name Digital Tachograph - Vehicle Unit (VU PP) Version 1.15 was processed.
Raw data
{
"_id": "d3d381970c60f694",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "d3d381970c60f694",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "pp0094V2b_pdf.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 14
},
"ECDSA": {
"ECDSA": 1
}
}
},
"cc_cert_id": {},
"cc_claims": {
"OE": {
"OE.EOL": 4
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0057": 1,
"BSI-CC-PP-0093": 1,
"BSI-CC-PP-0094-V2": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 2,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 2
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ATE": {
"ATE_DPT.1": 1,
"ATE_DPT.2": 7,
"ATE_FUN.1": 1
},
"AVA": {
"AVA_VAN.5": 7
}
},
"cc_security_level": {
"EAL": {
"EAL4": 14,
"EAL4 augmented": 5
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 11,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAR.1": 5,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_STG.1": 9,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.3": 1,
"FAU_STG.4": 5,
"FAU_STG.4.1": 1
},
"FCO": {
"FCO_NRO.1": 5,
"FCO_NRO.1.1": 1,
"FCO_NRO.1.2": 1,
"FCO_NRO.1.3": 1
},
"FCS": {
"FCS_CKM.1": 42,
"FCS_CKM.1.1": 2,
"FCS_CKM.2": 16,
"FCS_CKM.2.1": 2,
"FCS_CKM.4": 39,
"FCS_CKM.4.1": 2,
"FCS_COP.1": 33,
"FCS_COP.1.1": 6,
"FCS_RNG": 5,
"FCS_RNG.1": 28,
"FCS_RNG.1.1": 8,
"FCS_RNG.1.2": 8
},
"FDP": {
"FDP_ACC.1": 57,
"FDP_ACC.1.1": 5,
"FDP_ACF.1": 41,
"FDP_ACF.1.1": 10,
"FDP_ACF.1.2": 5,
"FDP_ACF.1.3": 5,
"FDP_ACF.1.4": 5,
"FDP_ETC.2": 7,
"FDP_ETC.2.1": 1,
"FDP_ETC.2.2": 1,
"FDP_ETC.2.3": 1,
"FDP_ETC.2.4": 1,
"FDP_IFC.1": 10,
"FDP_ITC.1": 25,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_ITC.2": 33,
"FDP_ITC.2.1": 1,
"FDP_ITC.2.2": 1,
"FDP_ITC.2.3": 1,
"FDP_ITC.2.4": 1,
"FDP_ITC.2.5": 1,
"FDP_ITT.1": 6,
"FDP_ITT.1.1": 1,
"FDP_MSA.3": 4,
"FDP_RIP": 1,
"FDP_RIP.1": 8,
"FDP_RIP.1.1": 1,
"FDP_SDI.1": 3,
"FDP_SDI.2": 17,
"FDP_SDI.2.1": 3,
"FDP_SDI.2.2": 3
},
"FIA": {
"FIA_AFL.1": 25,
"FIA_AFL.1.1": 6,
"FIA_AFL.1.2": 4,
"FIA_ATD.1": 15,
"FIA_ATD.1.1": 3,
"FIA_SOS.2": 1,
"FIA_UAU.1": 21,
"FIA_UAU.1.1": 2,
"FIA_UAU.1.2": 2,
"FIA_UAU.2": 10,
"FIA_UAU.2.1": 2,
"FIA_UAU.3": 4,
"FIA_UAU.3.1": 1,
"FIA_UAU.3.2": 1,
"FIA_UAU.5": 5,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 5,
"FIA_UAU.6.1": 1,
"FIA_UID.1": 13,
"FIA_UID.2": 14,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF.1": 25,
"FMT_MOF.1.1": 5,
"FMT_MSA.1": 20,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 34,
"FMT_MSA.3.1": 5,
"FMT_MSA.3.2": 5,
"FMT_MTD.1": 8,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 26,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 41,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS.1": 4,
"FPT_FLS.1.1": 1,
"FPT_PHP.1": 1,
"FPT_PHP.2": 5,
"FPT_PHP.2.1": 1,
"FPT_PHP.2.2": 1,
"FPT_PHP.2.3": 2,
"FPT_PHP.3": 5,
"FPT_PHP.3.1": 1,
"FPT_STM.1": 10,
"FPT_STM.1.1": 1,
"FPT_TDC.1": 13,
"FPT_TDC.1.1": 2,
"FPT_TDC.1.2": 2,
"FPT_TST.1": 6,
"FPT_TST.1.1": 2,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 2
},
"FTP": {
"FTP_ITC.1": 19,
"FTP_ITC.1.1": 4,
"FTP_ITC.1.2": 4,
"FTP_ITC.1.3": 4,
"FTP_TRP.1": 2
}
},
"certification_process": {
"OutOfScope": {
" ECC Generated by MSCA; obtained by VU in MSCA_VU-EGF certificate during coupling to an EGF Out of scope for this PP Not applicable VU non-volatile memory (conditional, possibly multiple": 1,
"20 RSA Generated by ERCA; inserted in VU by manufacturer at the end of the manufacturing phase Out of scope for this PP Not applicable VU non- volatile memory Card.PK (conditional, possibly multiple) Card": 1,
"23 . ECC Generated by ERCA; inserted in VU by manufacturer at the end of the manufacturing phase Out of scope for this PP Not applicable VU non-volatile memory Common Criteria Protection Profile Digital": 1,
"23 . ECC Generated by MSCA; obtained by VU in MSCA_VU-EGF certificate during coupling to an EGF Out of scope for this PP Not applicable VU non-volatile memory (conditional, possibly multiple) Table 21": 1,
"23 ECC Generated by ERCA; inserted in VU by manufacturer at the end of the manufacturing phase Out of scope for this PP Not applicable VU non-volatile memory (conditional; only present if existing at time of": 1,
"23 ECC Generated by MSCA; obtained by VU in MSCA_Card certificate during mutual authentication Out of scope for this PP Not applicable VU non-volatile memory (conditional, possibly multiple) MSCA_VU- EGF.PK": 1,
"C as part of the EUR.Link.C; obtained by VU during mutual authentication towards such card or EGF Out of scope for this PP Not applicable VU general non- volatile memory (conditional; only if the VU has": 1,
"Note: as explained in [5] Annex 1C, Appendix 11, section 12.2, a VU contains only one K M-VU. Out of scope for this PP Made unavailable when the VU has reached end of life VU non- volatile memory K M-WC": 1,
"Out of scope": 15,
"by card or card manufacturer; obtained by VU in card certificate during mutual authentication Out of scope for this PP Not applicable VU non- volatile memory MS.PK (conditional, possibly multiple) Public": 1,
"by card or card manufacturer; obtained by VU in card certificate during mutual authentication Out of scope for this PP Not applicable VU non-volatile memory(conditional, possibly multiple) Common Criteria": 1,
"foreign) MSCA; obtained by VU in MS certificate presented by a card during mutual authentication Out of scope for this PP Not applicable VU non- volatile memory Table 18 First-generation asymmetric keys": 1,
"key generations). However, a VU will retrieve only one of these keys during the pairing process. Out of scope for this PP Made unavailable at the latest by end of calibration phase Not permanently stored; only": 1,
"obtained by VU in EGF certificate during mutual authentication as part of the coupling process Out of scope for this PP Not applicable VU non-volatile memory (conditional, possibly multiple) MSCA_Card.PK": 1,
"received from VU manufacturer; inserted by VU manufacturer at the end of the manufacturing phase Out of scope for this PP Made unavailable when the VU has reached end of life VU non- volatile memory 34 Common": 1,
"received from VU manufacturer; inserted by VU manufacturer at the end of the manufacturing phase Out of scope for this PP Made unavailable when the VU has reached end of life VU non- volatile memory Table 22": 1,
"under K M ) at the end of the manufacturing phase; obtained and decrypted by VU during pairing Out of scope for this PP Made unavailable at the latest by end of calibration phase Not permanently stored; only": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 4
}
},
"device_model": {},
"ecc_curve": {
"Brainpool": {
"brainpoolP256r1": 1,
"brainpoolP384r1": 1,
"brainpoolP512r1": 1
},
"NIST": {
"NIST P-256": 1,
"NIST P-384": 1,
"NIST P-521": 1,
"P-256": 1,
"P-384": 1,
"P-521": 1,
"secp256r1": 1,
"secp384r1": 1,
"secp521r1": 1
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 3
},
"SHA2": {
"SHA-2": 2,
"SHA-256": 2,
"SHA-384": 2,
"SHA-512": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 38
}
},
"side_channel_analysis": {
"FI": {
"malfunction": 1,
"physical tampering": 5
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 5,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
},
"FIPS": {
"FIPS PUB 46-3": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 16
}
},
"DES": {
"3DES": {
"TDES": 3
},
"DES": {
"DES": 3
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "European Commission. DG JRC \u2013 Directorate E \u2013 Space, Security and Migration. Cyber and Digital Citizens\u2019 Security Unit E3",
"/CreationDate": "D:20210622172645+02\u002700\u0027",
"/Keywords": "Digital Tachograph; Vehicle Unit VU; Common Criteria; Protection Profile; Smart Tachograph version 2",
"/ModDate": "D:20210622173940+02\u002700\u0027",
"/Producer": "Microsoft: Print To PDF",
"/Subject": "Common Criteria Protection Profile, 2021 update for the Smart Tachograph version 2",
"/Title": "Digital Tachograph \u2013 Vehicle Unit (VU PP)",
"pdf_file_size_bytes": 2703441,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 118
},
"report_filename": "pp0094V2a_pdf.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0094-2017": 3,
"BSI-CC-PP-0094-V2": 1,
"BSI-CC-PP-0094-V2-": 1,
"BSI-CC-PP-0094-V2-2021": 8
}
},
"cc_sar": {
"ALC": {
"ALC_FLR": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"ATE": {
"ATE_DPT.2": 2
},
"AVA": {
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 3,
"EAL 4 augmented": 2
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"June 2021, Evaluation Technical Report \u2013 Summary BSI-CC-PP-0094-V2, Deutsche Telekom Security GmbH (confidential document) [8] Commission Implementing Regulation (EU) 2016/799 of 18 March 2016 implementing Regulation (EU": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"DeutscheTelekom": {
"Deutsche Telekom Security": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 27": 1,
"AIS 32": 1,
"AIS 38": 1
},
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
}
},
"symmetric_crypto": {},
"technical_report_id": {
"BSI": {
"BSI 7148": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20210701114348+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Protection Profile, Schutzprofil\"",
"/ModDate": "D:20210701124342+02\u002700\u0027",
"/Producer": "LibreOffice 6.3",
"/Subject": "Digital Tachograph \u2013 Vehicle Unit (VU PP), Version 1.15 developed by European Commission - Joint Research Centre",
"/Title": "Certification Report BSI-CC-PP-0094-V2-2021",
"pdf_file_size_bytes": 412374,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.sogis.eu/",
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/",
"https://www.bsi.bund.de/zertifizierung",
"https://www.commoncriteriaportal.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 16
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ad6e4d25852d08da6fd160b29ebfb9cd6bbe3ff8e7fb18d19871a11e59471248",
"txt_hash": "71351170bb7550305010c853a86d9f2d0d9b2b7b3676fd42da1631ef911c6eda"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "6c2ce990ec436050c99f0791e811bf38cc37cc20f672a6dd052329f297c9be56",
"txt_hash": "a4f1361d1dba53a0a118a6485785323c3d05f1bea0c9616abae456d475c75fc2"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Other Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "Digital Tachograph - Vehicle Unit (VU PP) Version 1.15",
"not_valid_after": null,
"not_valid_before": "2021-06-30",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0094V2b_pdf.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0094V2a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"ATE_DPT.2",
"EAL4+"
]
},
"status": "active",
"version": "1.15"
}
}