This page was not yet optimized for use on mobile
devices.
Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version 1.03
Web information
| Status | active |
|---|---|
| Valid from | 11.12.2009 |
| Scheme | 🇩🇪 DE |
| Category | Products for Digital Signatures |
| Security level | EAL4+ |
Certification report
Extracted keywords
Security level
EAL 4, EAL1, EAL3, EAL5, EAL7, EAL2, EAL4, EAL6, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_DVS.2, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.2, APE_ECD.1, APE_REQ.2, APE_OBJ.1, APE_REQ.1, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0059-2009Evaluation facilities
SRC Security Research & ConsultingCertification process
Creation Device – Part 2: Device with Key Generation“, SRC Security Research & Consulting GmbH (confidential document) [6] Protection Profiles for Secure Signature Creation Device – Part 2: Device with Key GenerationStandards
AIS 32Technical reports
BSI 7125, BSI 2, BSI 7148, BSI 7149File metadata
| Title | Certification Report BSI-CC-PP-0059-2009 |
|---|---|
| Subject | Protection Profile, Certification, |
| Keywords | Schutzprofil, PP, Protection Profile, Certification, Zertifzierung, Protection Profiles for Secure Signature Creation Device - Part 2: Device with Key Generation, Version 1.03, CEN/ISSS - Information Society Standardization System |
| Author | Bundesamt für Sicherheit in der Informationstechnik |
| Creation date | D:20100407081616+02'00' |
| Modification date | D:20100407151701+02'00' |
| Pages | 28 |
| Creator | Writer |
| Producer | OpenOffice.org 3.1 |
Protection Profile
Extracted keywords
Security level
EAL 4, EAL 4+, EAL4, EAL4 augmentedClaims
A.CGA, A.SCA, OE.HID_VADSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC, FDP_ACF.1, FDP_ACC.1, FDP_ACF, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI, FDP_SDI.1, FDP_SDI.2, FDP_IFC.1, FDP_AFC, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FMT_MSA.3, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4, FMT_MSA.4.1, FMT_MTD, FMT_MTD.1, FMT_MTD.1.1, FPT_TST.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TST, FPT_PHP.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_TEE.1Protection profiles
BSI-CC-PP-0059, BSI-PP-0006-2002TSide-channel analysis
SPA, DPA, timing attacks, physical tampering, DFA, fault injectionStandards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003File metadata
| Title | Protection profiles for Secure signature creation device — Part 2: Device with key generation |
|---|---|
| Subject | Protection Profile, Schutzprofil |
| Keywords | Protection Profile, BSI-CC-PP-0059-2009, Secure Signature-Creation, Device |
| Author | CEN/TC 224 |
| Creation date | D:20100330081414+02'00' |
| Modification date | D:20100330081536+02'00' |
| Pages | 46 |
| Creator | Acrobat PDFMaker 8.1 für Word |
| Producer | Acrobat Distiller 8.1.0 (Windows) |
References
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.- A.E.T. SafeSign IC PKI applet on JCOP 3 P60 eIDAS QSCD v3.0.1.11 active
- A.E.T. SafeSign IC PKI applet on JCOP 4 P71 eIDAS QSCD v3.0.1.12 active
- ACOS-IDv2.0 SSCD (A) CB-Comm (v2.0 SSCD (A)) active
- ACOS-IDv2.0 SSCD (A) CL-TC-Comm (v2.0 SSCD (A)) active
- ACOS-IDv2.1 SSCD (A) CB-Comm (Version 2.1 SSCD (A)) active
- ACOS-IDv2.1 SSCD (A) CL-TC-Comm (Version 2.1 SSCD (A)) active
- ACOS-IDv4.1 SSCD (A) CB-Comm (version 4.1 SSCD (A)) (ANSSI-CC-2025/17) active
- ACOS-IDv4.1 SSCD (A) CL-TC-Comm (version 4.1 SSCD (A)) (ANSSI-CC-2025/18) active
- AKD eID 2.0 SSCD active
- AKD eID Card 1.0 archived
- ASapp-QSCD (OSB) v1.0 archived
- ASapp-QSCD v1.0 archived
- Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7793 A12 et G12 archived
- Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 archived
- Applet ID.me v1.12 sur la plateforme IDeal Citiz v2.1 archived
- Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA (Version du patch : 1.3) archived
- Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA (Version du patch : 1.3) archived
- Application IAS V4.2.0.D sur la plateforme Javacard ouverte MultiApp V3.1S masquée sur le composant P60D144JVA (version du patch: 1.4) archived
- BELPIC V1.8 applet on MultiApp V4.1 (Révision 1.0) (ANSSI-CC-2019/31-R01) active
- BELPIC V1.8 applet on MultiApp V4.1 Platform Révision 1.0 archived
- BelPIC V1.8 on MultiApp V5.0 Platform active
- CELES-c001 Machine Readable Electronic Document SSCD Application, version 1 (CELES-c001_1) archived
- CardOS DI V5.4 QES Version 1.0 active
- CardOS DI V5.4 QES Version 1.0 archived
- CardOS V5.3 QES, V1.0 archived
- CardOS V6.0 ID R1.0 active
- CardOS V6.0 ID R1.1 active
- CardOS V6.0 ID R1.2 active
- CardOS V6.1 ID R1.0 active
- ChipDoc P60 on JCOP 3 SECID P60 (OSAà SSCD chargé sur composant P6022J VB, Version v7b1 archived
- ChipDoc v2 on JCOP 3 P60 in SSCD configuration archived
- ChipDoc v2 on JCOP 3 P60 in SSCD configuration (v7b4_2) (ANSSI-CC-2023/38) active
- ChipDoc v3 on JCOP 4 P71 in SSCD configuration archived
- ChipDoc v3 on JCOP 4 P71 in SSCD configuration archived
- ChipDoc v3 on JCOP 4 P71 in SSCD configuration (Version 3.0.0.52) (ANSSI-CC-2020/73-R01) active
- ChipDoc v3.1 on JCOP 4 P71 in SSCD configuration archived
- ChipDoc v3.1 on JCOP 4 P71 in SSCD configuration (Version 3.1.6.52) (ANSSI-CC-2021/20-R01) active
- ChipDoc v3.1 on JCOP 4 P71 in SSCD configuration (v2) active
- ChipDoc v3.1 on JCOP 4 P71 in SSCD configuration Version 3.1.6.52 archived
- ChipDoc v3.2 on JCOP 4 P71 in SSCD configuration (Version 3.2.0.52) (ANSSI-CC-2025/03) active
- ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52) (ANSSI-CC-2023/12-R01) active
- ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration(Version 4.0.1.52) active
- ChipDoc v4.1 on JCOP 4.5 P71 in SSCD configuration Version 4.1.1.52 (ANSSI-CC-2023/69) active
- CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1 (code SAAAAR : 203523) active
- CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2 (code SAAAAR : 203523) active
- CombICAO Applet v3 on ID-One Cosmo X (SSCD Configuration) SAAAAR : 203742 archived
- CombICAO Applet v3 on ID-One Cosmo X (SSCD Configuration) SAAAAR : 203742 active
- CombICAO Applet v3 on ID-One Cosmo X (SSCD Configuration) SAAAAR : 203742 (ANSSI-CC-2023/51) active
- DNIe version 4.0 active
- DNIe-DSCF (dispositivo seguro de creación de firma) versión 3.0 archived
- HID Global S.p.A. HIDApp-eDoc suite eIDAS eSign Application Version 3_00 active
- HID Global S.p.A. SOMA-c016 Machine Readable Electronic Document eIDAS QSCD Application, version 4 active
- IAS Classic V4.4 with MOC Server 1.1 on MultiApp V4 active
- IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A (ANSSI-CC-2023/57 ) active
- IAS Classic v5.0 with MOC Server v3.0 on MultiApp v4.2 Version 5.0.0.A.C, version 3.0.1A archived
- IAS Classic v5.2 on MultiApp V5.0 active
- IAS Classic v5.2 on MultiApp V5.0 (versions 5.2.0.A.C version 2 et 5.2.0.A.O version 2) (ANSSI-CC-2025/46) active
- IAS Classic v5.2.3 with MOC Server v3.1.1 on MultiApp V5.2 Versions 5.2.3.A.C et 5.2.3.A.O (ANSSI-CC-2025/40) active
- IAS ECC V2 en configuration #1 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N – Large R2 masquée sur le composant NXP P6022M VB active
- IAS ECC V2 en configuration #2 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N – Large R2 masquée sur le composant NXP P6022M VB active
- IAS ECC V2 en configuration #3 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N – Large R2 masquée sur le composant NXP P6022M VB active
- IAS ECC V2 en configuration #4 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N – Large R2 masquée sur le composant NXP P6022M VB active
- IAS ECC V2, Version 1.3 en configuration #3 sur la plateforme ID-One Cosmo v8.2 archived
- IAS ECC V2, Version 1.3 en configuration #4 sur la plateforme ID-One Cosmo v8.2 archived
- IAS ECC V2, version 1.3 en configuration #1 sur la plateforme ID-One Cosmo v8.2 archived
- IAS ECC V2, version 1.3 en configuration #1 sur la plateforme ID-One Cosmo v8.2 archived
- IAS ECC V2, version 1.3 en configuration #2 sur la plateforme ID-One Cosmo v8.2 archived
- IAS ECC V2, version 1.3 en configuration #2 sur la plateforme ID-One Cosmo v8.2 archived
- IAS ECC V2, version 1.3 en configuration #3 sur la plateforme ID-One Cosmo v8.2 archived
- IAS ECC V2, version 1.3 en configuration #4 sur la plateforme ID-One Cosmo v8.2 archived
- IAS ECC v2, version 1.3, in configuration #1 on ID-One Cosmo v8.2 open platform on NXP P6022M VB (Identification de l’application : F0 02 02 13) (ANSSI-CC-2020/50-R01) active
- IAS ECC v2, version 1.3, in configuration #2 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’application : F0 02 02 13 (ANSSI-CC-2020/51-R01) active
- IAS ECC v2, version 1.3, in configuration #3 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’application : F0 02 02 13 (ANSSI-CC-2020/52-R01) active
- IAS ECC v2, version 1.3, in configuration #4 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’application : F0 02 02 13 (ANSSI-CC-2020/53-R01) active
- ID&Trust CNS Card: NXP JCOP 2.4.2 R3 Smart Card with ID&Trust HTCNS v1.03 archived
- ID-A v1.0 on ID-ONE COSMO X Code SAAAR de l’applet : 417692 Code SAAAR du Common package : 417641 archived
- ID-A v1.0 on ID-ONE COSMO X Codes SAAAAR applet : 417692 et 417693 ; Code SAAAR du Common package : 417641 active
- ID-A v1.0 on ID-One Cosmo J (SAAAAR : 417701, 418402 et 417652) active
- ID-A v1.0 on ID-One Cosmo X Codes SAAAAR : 417692, 417693 active
- ID-A v1.1 on ID-One Cosmo X active
- ID-One CNS v2 archived
- ID-One Cosmo X embedding VITALE application version 2.1.5 active
- ID-One Cosmo X embedding VITALE application(version 2.1.5 archived
- ID-One Cosmo v8.2 embedding VITALE application (Version 2.0.83) archived
- ID-One Cosmo v9.1 embedding VITALE application version 2.1.4 active
- ID-One Cosmo v9.1 embedding VITALE application(version 2.1.4)(ANSSI-CC-2022/33-R01) active
- ID-One eIDAS v1.0 en configuration SSCD-2 sur les composants P60x080PVC/PVG archived
- ID-One eIDAS v1.0 en configuration SSCD-2 sur les composants P60x144PVA/PVE archived
- ID.me 1.28 on IDeal Citiz MOSID V2.1.1 archived
- IDeal Citiz v2.3-n embedding ID.me 1.6-n application (ID.me 1.6-n / 2.1.6.0.0) archived
- IDentity Applet v3.4-p1/QSCD on NXP JCOP 4 P71 active
- IDentity Applet v3.4-p2/QSCD on NXP JCOP 4 P71 active
- IDentity Applet v3.4-p2/eIDAS on NXP JCOP 4 P71 active
- IDentity Applet v3.4/QSCD on NXP JCOP 4 P71 archived
- IDentity Applet v3.4/eIDAS on NXP JCOP 4 P71 archived
- Idemia CombICAO Applet in SSCD configuration on Cosmo V9 archived
- Idemia ID-A v1.1 on ID-One Cosmo X active
- Idemia ID-Oneâ„¢ CNS V2 on Cosmo V9.1 active
- Infineon Technologies AG Secure Signature Creation Device with Key generation (SSCD) configuration of SECORAâ„¢ ID v2.01 Infineon Applet Collection-eSign V1.0 active
- Infineon eID-OSv1.0 SSCD (A) CB-Comm (version 1.0 SSCD (A)) (ANSSI-CC-2025/21) active
- Infineon eID-OSv1.0 SSCD (A) CL-TC-Comm (version 1.0 SSCD (A)) (ANSSI-CC-2025/22) active
- JPKI applet on JCOP 6.2 v1.1 active
- JPKI applet on TESS v5.1 S3NSEN6 v1.0 active
- JPKI applet v1.0 on Combo CE 4.2.3 ST54J/K active
- JPKI applet v1.0 on Connected eSE 5.3.4 ST54L active
- JPKI applet v1.0 on JCOP 4.1 active
- JPKI applet v1.0 on JCOP 5.1 active
- JPKI applet v1.0 on JCOP 5.2 active
- JPKI applet v1.0 on JCOP 6.2 active
- JPKI applet v1.0 on JCOP 8.9 active
- JPKI applet v1.0 on Sm@rtSIM CX Copernicus ST54J/K active
- MTCOS Pro 2.5 SSCD / P60D145VB_J (P6022y VB) archived
- MTCOS Pro 2.5 SSCD / SLE78CLFX400VPHM/BPHM/7PHM (M7892) archived
- MTCOS Pro 2.6 QSCD/SSCD / SLC37 (V11) active
- MTCOS Pro 2.6 SSCD / P71D352 (N7121) active
- MaskTech eSign Applet on Secora ID S v1.1 active
- MobileID on Dakota IOT, version 09AF41 active
- NXP ASEPCOS-CNS v1.84 in SSCD Configuration on NXP P60D080PVG Dual Interface Microcontroller archived
- NXP JAVA OS1 ChipDoc v1.0 SSCD (J3K080/J2K080) archived
- NXP JCOP 3 SECID P40 ChipDoc-Lite in SSCD Configuration (version 1.0.10) archived
- NXP eDoc Suite v3.0 - cryptovision ePasslet Suite - Java Card applet configuration providing Secure Signature Device with Key generation (SSCD) archived
- NXP eDoc Suite v3.5 on JCOP4 P71 - cryptovision ePasslet Suite – Java Card applet configuration providing Secure Signature Creation Device with Key generation (SSCD) archived
- NXP eDoc Suite v3.5 on JCOP4 P71 - cryptovision ePasslet Suite – Java Card applet configuration providing Secure Signature Creation Device with Key generation (SSCD) active
- NXP eDoc Suite v4.0 on JCOP4.5 P71 - cryptovision ePasslet Suite – Java Card applet configuration providing Secure Signature Creation Device with Key generation (SSCD) active
- PWPW SmartApp-ID 5.0 (SIGN configuration) active
- Pasaporte electrónico versión 4.0 active
- Permiso de Residencia versión 4.0 active
- Produit IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 Version 5.2.1.A.C et 5.2.1.A.O ( ANSSI-CC-2023/42 ) active
- SECORA™ ID X Applet Collection with ePasslet Suite v3.5 by cryptovision GmbH, version 1.0– Java Card applet configuration providing Secure Signature Creation Device with Key generation (SSCD) active
- SECORA™ ID X v2 Applet Collection with ePasslet Suite v4.0 by cryptovision GmbH, version 1.0 – Java Card applet configuration providing Secure Signature Creation Device with Key generation (SSCD) active
- SOMA-c007 Machine Readable Electronic Document SSCD Application (SOMA-c007_2) version 2 archived
- SOMA-c007 Machine Readable Electronic Document SSCD Application version 4 active
- SOMA-c016 Machine Readable Electronic Document eIDAS QSCD Application, version 3 archived
- STARCOS 3.5 ID ECC C1 archived
- STARCOS 3.5 ID ECC C1R archived
- STMicroelectronics JSIGN3 V1.1.4 archived
- STMicroelectronics JSIGN4 V1.0.4 active
- SafeSign IC PKI applet on JCOP 4 P71 eIDAS QSCD 3.0.1.12, 3.0.1.13 and 3.0.1.14 active
- SmartApp SIGN 2.2 archived
- TC-FNMT version 5.6 active
- The Government of Japan JPKI applet on Connected eSE 5.3.4 ST54L v1.1 active
- The Government of Japan JPKI applet on Connected eSE 5.3.4 ST54L v1.1 active
- Veridos Suite v3.0 – cryptovision ePasslet Suite – Java Card applet configuration providing Secure Signature Creation Device with Key generation (SSCD) archived
- cv act ePasslet Suite v2.1 – Java Card applet configuration providing Secure Signature Device with Key generation (SSCD) archived
- cv act ePasslet/ePKI v3.6 archived
Updates Feed
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile was first processed.
Raw data
{
"_id": "d918b28fd7bb5d79",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "d918b28fd7bb5d79",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "pp0059b_pdf.pdf",
"pp_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CGA": 4,
"A.SCA": 4
},
"OE": {
"OE.HID_VAD": 3
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0059": 1,
"BSI-PP-0006-2002T": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 3,
"ADV_FSP.4": 2,
"ADV_IMP.1": 2,
"ADV_TDS.3": 2
},
"AGD": {
"AGD_OPE.1": 2,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 2,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 2,
"EAL 4+": 1,
"EAL4": 7,
"EAL4 augmented": 4
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 2
},
"FCS": {
"FCS_CKM.1": 13,
"FCS_CKM.1.1": 3,
"FCS_CKM.2": 2,
"FCS_CKM.4": 10,
"FCS_CKM.4.1": 2,
"FCS_COP.1": 6,
"FCS_COP.1.1": 3
},
"FDP": {
"FDP_ACC": 23,
"FDP_ACC.1": 17,
"FDP_ACF": 13,
"FDP_ACF.1": 19,
"FDP_AFC": 4,
"FDP_IFC.1": 8,
"FDP_ITC.1": 4,
"FDP_ITC.2": 4,
"FDP_RIP.1": 4,
"FDP_RIP.1.1": 1,
"FDP_SDI": 11,
"FDP_SDI.1": 2,
"FDP_SDI.2": 4
},
"FIA": {
"FIA_AFL.1": 4,
"FIA_AFL.1.1": 2,
"FIA_AFL.1.2": 1,
"FIA_UAU.1": 7,
"FIA_UAU.1.1": 2,
"FIA_UAU.1.2": 1,
"FIA_UID.1": 9,
"FIA_UID.1.1": 2,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MOF.1": 5,
"FMT_MOF.1.1": 1,
"FMT_MSA": 11,
"FMT_MSA.1": 5,
"FMT_MSA.2": 6,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 15,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MSA.4": 6,
"FMT_MSA.4.1": 1,
"FMT_MTD": 10,
"FMT_MTD.1": 2,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 20,
"FMT_SMF.1.1": 2,
"FMT_SMR.1": 22,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS.1": 5,
"FPT_FLS.1.1": 2,
"FPT_PHP.1": 5,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_PHP.3": 5,
"FPT_PHP.3.1": 2,
"FPT_TEE.1": 1,
"FPT_TST": 1,
"FPT_TST.1": 9,
"FPT_TST.1.1": 2,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"DFA": 1,
"fault injection": 1,
"physical tampering": 10
},
"SCA": {
"DPA": 3,
"SPA": 3,
"timing attacks": 3
}
},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 2,
"CCMB-2009-07-002": 2,
"CCMB-2009-07-003": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "CEN/TC 224",
"/Company": "afnor",
"/CreationDate": "D:20100330081414+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 8.1 f\u00fcr Word",
"/Keywords": "Protection Profile, BSI-CC-PP-0059-2009, Secure Signature-Creation, Device",
"/ModDate": "D:20100330081536+02\u002700\u0027",
"/Producer": "Acrobat Distiller 8.1.0 (Windows)",
"/SourceModified": "D:20100330054815",
"/Subject": "Protection Profile, Schutzprofil",
"/Title": "Protection profiles for Secure signature creation device \u2014 Part 2: Device with key generation",
"pdf_file_size_bytes": 517242,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 46
},
"report_filename": "pp0059a_pdf.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0059-2009": 15
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 1,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 1,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 1,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 1,
"ALC_FLR": 1,
"ALC_FLR.1": 1,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 1,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 1,
"ALC_TAT.2": 1,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 2,
"APE_ECD.1": 2,
"APE_INT.1": 2,
"APE_OBJ.1": 1,
"APE_OBJ.2": 2,
"APE_REQ.1": 1,
"APE_REQ.2": 2,
"APE_SPD.1": 2
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_COV.3": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 1,
"ATE_DPT.4": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND": 1,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 4,
"EAL 4 augmented": 2,
"EAL1": 6,
"EAL2": 3,
"EAL3": 4,
"EAL4": 4,
"EAL5": 6,
"EAL6": 3,
"EAL7": 4
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"Creation Device \u2013 Part 2: Device with Key Generation\u201c, SRC Security Research \u0026 Consulting GmbH (confidential document) [6] Protection Profiles for Secure Signature Creation Device \u2013 Part 2: Device with Key Generation": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"SRC": {
"SRC Security Research \u0026 Consulting": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 32": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {
"BSI": {
"BSI 2": 1,
"BSI 7125": 2,
"BSI 7148": 1,
"BSI 7149": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20100407081616+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "Schutzprofil, PP, Protection Profile, Certification, Zertifzierung, Protection Profiles for Secure Signature Creation Device - Part 2: Device with Key Generation, Version 1.03, CEN/ISSS - Information Society Standardization System",
"/ModDate": "D:20100407151701+02\u002700\u0027",
"/Producer": "OpenOffice.org 3.1",
"/Subject": "Protection Profile, Certification, ",
"/Title": "Certification Report BSI-CC-PP-0059-2009",
"pdf_file_size_bytes": 770510,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 28
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "8791c39e538f2635f80bf50a013f8af8520563964b747775f325c425e59e5513",
"txt_hash": "dded9375b8012acec3e3b8a0d8efc6ae045df74e91c6b3058eb74f41405f062a"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "c415b13279c67724fc744619b9cac17848b2f1f51acdc07eec68df6d234e8173",
"txt_hash": "37a64de975a2fe1a4e2c2d131287007fa9f73c7e0d3318faa36ece522631ba3d"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Products for Digital Signatures",
"is_collaborative": false,
"maintenances": [
[
"2016-06-30",
"EN 419211-2:2013 - Protection profiles for secure signature creation device - Part 2: Device with key generation",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059_ma2a_pdf.pdf"
],
[
"2012-02-21",
"Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation Version 2.01",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059_ma1a_pdf.pdf"
]
],
"name": "Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version 1.03",
"not_valid_after": null,
"not_valid_before": "2009-12-11",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+"
]
},
"status": "active",
"version": "1.03"
}
}