This page was not yet optimized for use on mobile devices.
Protection Profile Standard Reader - Smart Card Reader with PIN-Pad supporting eID based on Extended Access Control
CSV information ?
Status: activeCertification date: 2014-01-13 00:00:00
Scheme: 🇩🇪
Category: ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level: EAL3+
Frontpage information ?
Protection Profile ID: BSI-CC-PP-0083Title: Protection Profile — Standard Reader - Smart Card Reader with PIN-Pad supporting eID based on Extended Access Control
Version: 1.0 Date 29.11.2013
Security level: The assurance level for this PP is EAL3 augmented with ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ALC_TAT.1 and AVA_VAN.3
Protection profile ?
Extracted keywords
Algorithms
AES, Diffie-Hellman, RNGProtection profiles
CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004, BSI-CC-PP-0083Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_TAT.1, ATE_DPT.1, AVA_VAN.3Security Functional Requirements (SFR)
FCS_RNG, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1, FCS_RNG.1, FDP_ACC.1, FDP_IFC.1, FDP_IFF.1, FDP_ITC.1, FDP_ITC.2, FDP_RIP.1, FIA_API, FIA_API.1, FIA_UID.1, FIA_UID.2, FMT_MSA.1, FMT_MSA.3, FMT_SMR.1, FPT_FLS.1, FPT_PHP.1, FPT_TST.1Standards
FIPS PUB 197, ISO/IEC 7816-4, PKCS#3, RFC 4493, RFC 4493, RFC4493Technical reports
BSI TR-03119References ?
No references are available for this protection profile.
Raw data
{
"_id": "fb7c24896eb4cde16b19",
"csv_scan": {
"cc_archived_date": null,
"cc_category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cc_certification_date": "2014-01-13 00:00:00",
"cc_pp_name": "Protection Profile Standard Reader - Smart Card Reader with PIN-Pad supporting eID based on Extended Access Control",
"cc_pp_version": "Version 1.0",
"cc_security_level": "EAL3+",
"cert_status": "active",
"link_pp_document": "https://www.commoncriteriaportal.org/files/ppfiles/pp0083b_pdf.pdf",
"link_pp_report": "https://www.commoncriteriaportal.org/files/ppfiles/pp0083a_pdf.pdf",
"maintainance_updates": [],
"scheme": "DE"
},
"frontpage_scan": [
{
"cc_security_level": "The assurance level for this PP is EAL3 augmented with ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ALC_TAT.1 and AVA_VAN.3",
"cc_version": "3.1 (Revision 4",
"keywords": "Card Reader, eID, EAC, PACE, nPA, Smart Card, Standard Reader",
"match_rules": [
"PP reference.+?Title:? (?P\u003cpp_title\u003e.+)?Sponsor:? (?P\u003cpp_sponsor\u003e.+)?CC Version:? (?P\u003ccc_version\u003e.+)?Assurance Level:? (?P\u003ccc_security_level\u003e.+)?General Status:? (?P\u003cpp_general_status\u003e.+)Version Number:? (?P\u003cpp_version_number\u003e.+)?Registration:? (?P\u003cpp_id\u003e.+)Keywords:? (?P\u003ckeywords\u003e.+?)?(?:page \\d of \\d\\d|1\\.2(\\.)? TOE [oO]verview|TOE Overview)"
],
"pp_general_status": "final",
"pp_id": "BSI-CC-PP-0083",
"pp_registrator_simplified": "BSI",
"pp_sponsor": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"pp_title": "Protection Profile \u2014 Standard Reader - Smart Card Reader with PIN-Pad supporting eID based on Extended Access Control",
"pp_version_number": "1.0 Date 29.11.2013"
}
],
"keywords_scan": {
"block_cipher_modes": {
"CBC": {
"CBC": {
"count": 2
}
}
},
"rules_IC_data_groups": {},
"rules_cert_id": {},
"rules_certification_process": {
".{0,100}[oO]ut of [sS]cope.{0,100}": {
"ch supports the interoperability between TOE and host computer and an update functionality. This is out of scope of this Protection Profile. Bundesamt f\u00fcr Sicherheit in der Informationstechnik 7 85 90 95 \fCommon": {
"count": 1
},
"iant to BSI [TR-03110] and [TR-03127]. The TOE may support additional types of smart cards. This is out of scope of this Protection Profile. Driver-Software The TOE may be delivered together with a driver": {
"count": 1
}
},
"[\\.\\(].{0,100}?.[oO]ut of [sS]cope..{0,100}?[\\.\\)]": {
". The TOE may support additional types of smart cards. This is out of scope of this Protection Profile": {
"count": 1
},
". This is out of scope of this Protection Profile": {
"count": 1
}
},
"[oO]ut of [sS]cope": {
"out of scope": {
"count": 2
}
}
},
"rules_cplc": {},
"rules_crypto_algs": {
"AES[-]*(?:128|192|256|)": {
"AES": {
"count": 9
}
},
"Diffie-Hellman": {
"Diffie-Hellman": {
"count": 2
}
},
"RN[GD]": {
"RNG": {
"count": 5
}
}
},
"rules_crypto_engines": {},
"rules_crypto_libs": {},
"rules_defenses": {
"[pP]hysical [tT]ampering": {
"physical tampering": {
"count": 2
}
}
},
"rules_device_id": {},
"rules_ecc_curves": {},
"rules_javacard": {},
"rules_os": {},
"rules_other": {},
"rules_protection_profiles": {
"BSI-(?:CC[-_]|)PP[-_]*.+?": {
"BSI-CC-PP-0083": {
"count": 2
}
},
"CCMB-20[0-9]+?-[0-9]+?-[0-9]+?": {
"CCMB-2012-09-001": {
"count": 2
},
"CCMB-2012-09-002": {
"count": 2
},
"CCMB-2012-09-003": {
"count": 2
},
"CCMB-2012-09-004": {
"count": 2
}
}
},
"rules_security_assurance_components": {
"ADV_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"ADV_ARC.1": {
"count": 1
},
"ADV_FSP.4": {
"count": 8
},
"ADV_IMP.1": {
"count": 8
},
"ADV_TDS.1": {
"count": 1
},
"ADV_TDS.3": {
"count": 9
}
},
"AGD_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"AGD_OPE.1": {
"count": 1
},
"AGD_PRE.1": {
"count": 1
}
},
"ALC_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"ALC_TAT.1": {
"count": 6
}
},
"ATE_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"ATE_DPT.1": {
"count": 1
}
},
"AVA_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"AVA_VAN.3": {
"count": 5
}
}
},
"rules_security_functional_components": {
"FCS_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FCS_CKM.1": {
"count": 9
},
"FCS_CKM.2": {
"count": 2
},
"FCS_CKM.4": {
"count": 15
},
"FCS_COP.1": {
"count": 4
},
"FCS_RNG": {
"count": 5
},
"FCS_RNG.1": {
"count": 11
}
},
"FDP_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FDP_ACC.1": {
"count": 2
},
"FDP_IFC.1": {
"count": 8
},
"FDP_IFF.1": {
"count": 6
},
"FDP_ITC.1": {
"count": 11
},
"FDP_ITC.2": {
"count": 6
},
"FDP_RIP.1": {
"count": 7
}
},
"FIA_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FIA_API": {
"count": 5
},
"FIA_API.1": {
"count": 11
},
"FIA_UID.1": {
"count": 5
},
"FIA_UID.2": {
"count": 9
}
},
"FMT_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FMT_MSA.1": {
"count": 4
},
"FMT_MSA.3": {
"count": 9
},
"FMT_SMR.1": {
"count": 8
}
},
"FPT_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FPT_FLS.1": {
"count": 6
},
"FPT_PHP.1": {
"count": 6
},
"FPT_TST.1": {
"count": 6
}
}
},
"rules_security_level": {
"EAL[ ]*[0-9+]+?": {
"EAL3": {
"count": 11
}
},
"EAL[ ]*[0-9] augmented+?": {
"EAL3 augmented": {
"count": 2
}
}
},
"rules_standard_id": {
"FIPS ?(?:PUB )?[0-9]+?": {
"FIPS PUB 197": {
"count": 1
}
},
"ISO/IEC[ ]*[0-9]+[-]*[0-9]*": {
"ISO/IEC 7816-4": {
"count": 1
}
},
"PKCS[ #]*[1-9]+": {
"PKCS#3": {
"count": 3
}
},
"RFC [0-9]+": {
"RFC 4493": {
"count": 1
}
},
"RFC[ ]*[0-9]+?": {
"RFC 4493": {
"count": 1
},
"RFC4493": {
"count": 2
}
}
},
"rules_technical_reports": {
"BSI[ ]*TR-[0-9]+?(?:-[0-9]+?|)": {
"BSI TR-03119": {
"count": 1
}
}
},
"rules_vendor": {},
"rules_vulnerabilities": {}
},
"pp_analysis": {
"separate_profiles": []
},
"processed": {
"cc_pp_csvid": [],
"cert_id": ""
}
}