CASA 1.0

CSV information ?

Status active
Valid from 17.12.2019
Valid until 17.12.2027
Scheme 🇩🇪 DE
Manufacturer EMH metering GmbH & Co. KG
Category Other Devices and Systems
Security level AVA_VAN.5, ALC_FLR.2, EAL4+
Protection profiles
Maintenance updates CASA 1.0Software Version: 30000000__X026cHardware Version: 10 301 / 10 302 / 10 303 / 10 304 (24.06.2020) Certification report

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0919-2019

Certificate ?

Extracted keywords

Symmetric Algorithms
AES, CMAC
Asymmetric Algorithms
ECC
Hash functions
SHA256, SHA384, SHA512, SHA-256, SHA-384, SHA-512
Protocols
SSH, TLS
Elliptic Curves
secp256r1, secp384r1, brainpoolP256r1, brainpoolP384r1, brainpoolP512r1
Block cipher modes
GCM

Security level
EAL 4, EAL 5, EAL 2, EAL 1, EAL 2+, EAL 5+, EAL 6, EAL 4 augmented
Security Assurance Requirements (SAR)
ALC_FLR.2, ALC_FLR, AVA_VAN.5
Protection profiles
BSI-CC-PP-0073-2014, BSI-CC-PP- 0077-V2
Certificates
BSI-DSZ-CC-0919-2019, CC-19-175197
Evaluation facilities
TÃœV Informationstechnik, TÃœViT
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, 1, 2019-12-16, EVALUATION TECHNICAL REPORT SUMMARY (ETR SUMMARY), TÜV Informationstechnik GmbH (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, list for the TOE CASA-Konfigurationsliste, Version 9, 2019-12-16, Konfigurationsliste (confidential document) [10] CASA (CASA-AGD) Benutzerhandbuch für Letztverbraucher (LV), Version 1.17, 2019-12-16 [11

Side-channel analysis
side-channel
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, 1, 2019-12-16, EVALUATION TECHNICAL REPORT SUMMARY (ETR SUMMARY), TÜV Informationstechnik GmbH (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, list for the TOE CASA-Konfigurationsliste, Version 9, 2019-12-16, Konfigurationsliste (confidential document) [10] CASA (CASA-AGD) Benutzerhandbuch für Letztverbraucher (LV), Version 1.17, 2019-12-16 [11

Standards
FIPS 197, FIPS 180-4, FIPS180-4, FIPS 140-2, AIS 34, AIS 46, AIS 48, AIS 1, AIS 14, AIS 19, AIS 32, RFC5289, RFC 2104, RFC 5639, RFC 3394, RFC 5084, RFC 4493, RFC 5289, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065
Technical reports
BSI TR-03109, BSI TR-03109-1, BSI TR-03109-3, BSI 7148

File metadata

Title: Certification Report BSI-DSZ-CC-0919-2019
Subject: Common Criteria Certification
Keywords: Common Criteria, Certification, Zertifizierung, Smart Meter Gateway, CASA 1.0, EMH metering GmbH & Co. KG
Author: Bundesamt für Sicherheit in der Informationstechnik
Creation date: D:20191220155127+01'00'
Modification date: D:20191220160028+01'00'
Pages: 27
Creator: Writer
Producer: LibreOffice 6.2

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, CMAC
Asymmetric Algorithms
ECC
Hash functions
SHA256, SHA384, SHA512, SHA-256, SHA-384, SHA-512
Protocols
SSH, TLS
Elliptic Curves
secp256r1, secp384r1, brainpoolP256r1, brainpoolP384r1, brainpoolP512r1
Block cipher modes
GCM

Security level
EAL 4, EAL 5, EAL 2, EAL 1, EAL 2+, EAL 5+, EAL 6, EAL 4 augmented
Security Assurance Requirements (SAR)
ALC_FLR.2, ALC_FLR, AVA_VAN.5
Protection profiles
BSI-CC-PP-0073-2014, BSI-CC-PP- 0077-V2
Certificates
BSI-DSZ-CC-0919-2019, CC-19-175197
Evaluation facilities
TÃœV Informationstechnik, TÃœViT
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, 1, 2019-12-16, EVALUATION TECHNICAL REPORT SUMMARY (ETR SUMMARY), TÜV Informationstechnik GmbH (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, list for the TOE CASA-Konfigurationsliste, Version 9, 2019-12-16, Konfigurationsliste (confidential document) [10] CASA (CASA-AGD) Benutzerhandbuch für Letztverbraucher (LV), Version 1.17, 2019-12-16 [11

Side-channel analysis
side-channel
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, 1, 2019-12-16, EVALUATION TECHNICAL REPORT SUMMARY (ETR SUMMARY), TÜV Informationstechnik GmbH (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, list for the TOE CASA-Konfigurationsliste, Version 9, 2019-12-16, Konfigurationsliste (confidential document) [10] CASA (CASA-AGD) Benutzerhandbuch für Letztverbraucher (LV), Version 1.17, 2019-12-16 [11

Standards
FIPS 197, FIPS 180-4, FIPS180-4, FIPS 140-2, AIS 34, AIS 46, AIS 48, AIS 1, AIS 14, AIS 19, AIS 32, RFC5289, RFC 2104, RFC 5639, RFC 3394, RFC 5084, RFC 4493, RFC 5289, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065
Technical reports
BSI TR-03109, BSI TR-03109-1, BSI TR-03109-3, BSI 7148

File metadata

Title: Certification Report BSI-DSZ-CC-0919-2019
Subject: Common Criteria Certification
Keywords: Common Criteria, Certification, Zertifizierung, Smart Meter Gateway, CASA 1.0, EMH metering GmbH & Co. KG
Author: Bundesamt für Sicherheit in der Informationstechnik
Creation date: D:20191220155127+01'00'
Modification date: D:20191220160028+01'00'
Pages: 27
Creator: Writer
Producer: LibreOffice 6.2

Frontpage

Certificate ID: BSI-DSZ-CC-0919-2019
Certified item: CASA 1.0
Certification lab: BSI
Developer: EMH metering GmbH & Co. KG

References

Incoming

Security target ?

Extracted keywords

Symmetric Algorithms
AES, CMAC
Asymmetric Algorithms
ECDSA, ECC
Hash functions
SHA-256, SHA-512, SHA-384
Schemes
MAC
Protocols
TLS, TLS 1.2
Elliptic Curves
P-256, P-384, ansip384r1, NIST P-256, NIST P-384, secp256r1, secp384r1, prime256v1, brainpoolP256r1, brainpoolP384r1, brainpoolP512r1
Block cipher modes
GCM
TLS cipher suites
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384

Security level
EAL 4, EAL4, EAL 4 augmented, EAL4 augmented
Claims
OE.SM, OSP.SM
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_IMP.1, AGD_OPE.1, ALC_FLR.2, ALC_CMC.4, ALC_DEL.1, ALC_LCD.1, ATE_COV.2, ATE_FUN.1, AVA_VAN.5, ASE_CCL.1, ASE_INT.1, ASE_REQ.2, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN, FAU_ARP, FAU_SAA, FAU_SAR, FAU_STG, FAU_GEN.2, FAU_STG.2, FAU_ARP.1, FAU_SAA.1, FAU_GEN.1, FAU_SAR.1, FAU_STG.4, FAU_STG.3, FAU_STG.1, FAU_GEN.2.1, FAU_STG.2.1, FAU_STG.2.2, FAU_STG.2.3, FAU_CON.1.2, FCO_NRO, FCO_NRO.2, FCO_NRO.2.1, FCO_NRO.2.2, FCO_NRO.2.3, FCO_NRO.1, FCS_CKM, FCS_COP, FCS_CKM.4, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4.1, FDP_IFC, FDP_ACC.2, FDP_ACF.1, FDP_IFF, FDP_RIP.2, FDP_SDI.2, FDP_ITC.1, FDP_ITC.2, FDP_ACC, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACC.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.2, FDP_IFC.1, FDP_IFF.1, FDP_IFF.1.3, FDP_RIP, FDP_RIP.2.1, FDP_RIP.1, FDP_SDI, FDP_SDI.2.1, FDP_SDI.2.2, FDP_SDI.1, FIA_UAU.6, FIA_ATD, FIA_AFL, FIA_UAU, FIA_UID, FIA_USB, FIA_ATD.1, FIA_AFL.1, FIA_UAU.2, FIA_UAU.5, FIA_UID.2, FIA_USB.1, FIA_UID.1, FIA_ATD.1.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1, FIA_UAU.2.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6.1, FIA_UID.2.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_SMR, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA, FMT_MSA.3, FMT_MOF, FMT_MOF.1.1, FMT_SMF, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.1, FPR_CON, FPR_CON.1, FPR_PSE, FPR_CON.1.2, FPR_CON.1.1, FPR_PSE.1, FPR_PSE.1.1, FPR_PSE.1.2, FPR_PSE.1.3, FPT_FLS, FPT_RPL, FPT_STM, FPT_TST, FPT_PHP, FPT_FLS.1, FPT_RPL.1, FPT_STM.1, FPT_TST.1, FPT_PHP.1, FPT_FLS.1.1, FPT_RPL.1.1, FPT_RPL.1.2, FPT_STM.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.1.1, FPT_PHP.1.2, FPT_SDI.2, FTP_ITC, FTP_ITC.1
Protection profiles
BSI-CC-PP-0077-2013, BSI-CC-PP- 0073, BSI-CC-PP-0077-V2
Evaluation facilities
TÃœV Informationstechnik

Side-channel analysis
physical tampering, malfunction

Standards
FIPS 180-4, FIPS 197, FIPS 140-2, RFC 5289, RFC 5246, RFC 2104, RFC 5639, RFC 3394, RFC 3565, RFC 5084, RFC 4493, RFC 5905, RFC 2616, RFC5246
Technical reports
BSI TR-03109, BSI TR-03109-1

File metadata

Title: CASA 1.0 Security Target
Subject: CASA-ST
Keywords: SMGW SmartMetering Version: 2.00
Author: EMH metering GmbH & Co. KG
Creation date: D:20191216100008+01'00'
Modification date: D:20191216100008+01'00'
Pages: 132
Creator: LaTeX with hyperref package
Producer: pdfTeX-1.40.18

References

Incoming

Heuristics ?

Certificate ID: BSI-DSZ-CC-0919-2019

Extracted SARs

ASE_CCL.1, ASE_INT.1, ADV_ARC.1, AGD_OPE.1, ASE_REQ.2, ALC_DEL.1, ATE_FUN.1, ALC_FLR.2, ADV_IMP.1, AVA_VAN.5, ASE_TSS.1, ATE_COV.2, ALC_CMC.4, ALC_LCD.1

References ?

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'd5cdd8adb2612d438610c2b88671c7f57c9b87d7170b11a321afadb808a91519', 'txt_hash': '6da4cb526050e0040493790aec3d3daa21cff542215ad1e578f0f104f48e087a'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7ca2ec4cc4c1801fdbebbe7e47daf8e6829a159c9c3cf0adcf030e1f7b4d646d', 'txt_hash': 'a408b02562cd2b9c04a5e7e5046451f84df406ba907dea846359336366dbb7e0'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'd5cdd8adb2612d438610c2b88671c7f57c9b87d7170b11a321afadb808a91519', 'txt_hash': '6da4cb526050e0040493790aec3d3daa21cff542215ad1e578f0f104f48e087a'}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': {'pdf_file_size_bytes': 427011, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 27, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20191220155127+01'00'", '/Creator': 'Writer', '/Keywords': 'Common Criteria, Certification, Zertifizierung, Smart Meter Gateway, CASA 1.0, EMH metering GmbH & Co. KG', '/ModDate': "D:20191220160028+01'00'", '/Producer': 'LibreOffice 6.2', '/Subject': 'Common Criteria Certification', '/Title': 'Certification Report BSI-DSZ-CC-0919-2019', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/AIS', 'https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/zertifizierungsreporte', 'https://www.sogis.eu/', 'https://www.bsi.bund.de/', 'http://www.commoncriteriaportal.org/cc/']}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0919-2019': 14}, 'NL': {'CC-19-175197': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0073-2014': 3, 'BSI-CC-PP- 0077-V2': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 8, 'EAL 5': 3, 'EAL 2': 2, 'EAL 1': 1, 'EAL 2+': 1, 'EAL 5+': 1, 'EAL 6': 1, 'EAL 4 augmented': 3}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 4, 'ALC_FLR': 3}, 'AVA': {'AVA_VAN.5': 5}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'TUV': {'TÃœV Informationstechnik': 3, 'TÃœViT': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 4}}, 'constructions': {'MAC': {'CMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 3}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA256': 1, 'SHA384': 1, 'SHA512': 1, 'SHA-256': 1, 'SHA-384': 1, 'SHA-512': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 4}, 'TLS': {'TLS': {'TLS': 4}}}, 'randomness': {}, 'cipher_mode': {'GCM': {'GCM': 2}}, 'ecc_curve': {'NIST': {'secp256r1': 1, 'secp384r1': 1}, 'Brainpool': {'brainpoolP256r1': 1, 'brainpoolP384r1': 1, 'brainpoolP512r1': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side-channel': 2}}, 'technical_report_id': {'BSI': {'BSI TR-03109': 1, 'BSI TR-03109-1': 1, 'BSI TR-03109-3': 1, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 197': 5, 'FIPS 180-4': 2, 'FIPS180-4': 1, 'FIPS 140-2': 1}, 'BSI': {'AIS 34': 3, 'AIS 46': 2, 'AIS 48': 2, 'AIS 1': 1, 'AIS 14': 1, 'AIS 19': 1, 'AIS 32': 1}, 'RFC': {'RFC5289': 1, 'RFC 2104': 3, 'RFC 5639': 3, 'RFC 3394': 3, 'RFC 5084': 3, 'RFC 4493': 3, 'RFC 5289': 2}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, '1, 2019-12-16, EVALUATION TECHNICAL REPORT SUMMARY (ETR SUMMARY), TÃœV Informationstechnik GmbH (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014': 1, 'list for the TOE CASA-Konfigurationsliste, Version 9, 2019-12-16, Konfigurationsliste (confidential document) [10] CASA (CASA-AGD) Benutzerhandbuch für Letztverbraucher (LV), Version 1.17, 2019-12-16 [11': 1}}}, 'cert_filename': '0919a_pdf.pdf'}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0919-2019', 'cert_item': 'CASA 1.0', 'developer': 'EMH metering GmbH & Co. KG', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI- CC-PP-0073-2014', 'cc_version': 'PP conformant Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 4 augmented by AVA_VAN.5 and ALC_FLR.2'}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'NL': {'CC-19-175197': 1}}, '__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0919-2019': 14}}}}} data.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0919-2019': 28}}}, '__delete__': ['NL']}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The st_keywords property was updated, with the {'cc_cert_id': {}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'NL': {'CC-19-175197': 1}}, '__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0919-2019': 14}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'CA': {'62056-6-1': 4, '65056-6-2': 1, '62056-6-2': 3}}} data.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
    • The report_references property was updated, with the {'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0919-V3-2023']}}} data.
  • 21.09.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'cert_id': 'BSI-DSZ-CC-0919-V2-2021', 'product': 'CASA 1.0', 'vendor': 'EMH metering GmbH & Co.KG', 'certification_date': '30.03.2021', 'category': 'Intelligent measuring systems', 'url': 'https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartMeter_Gateway/0919_0919V2.html', 'enhanced': {'product': 'CASA 1.0', 'applicant': 'EMH metering GmbH & Co.KG\nMatthias Göbel\nNeu-Galliner Weg 1\n19258 Gallin', 'evaluation_facility': 'TÃœV Informationstechnik GmbH', 'assurance_level': 'EAL4+,AVA_VAN.5,ALC_FLR.2', 'protection_profile': 'Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI-CC-PP-0073-2014', 'certification_date': '30.03.2021', 'expiration_date': '29.03.2029', 'entries': [{'id': 'BSI-DSZ-CC-0919-V2-2021-RA-01', 'description': 'Certification Date'}, {'id': 'BSI-DSZCC-0919-V2-2021-MA-02', 'description': 'Security Target'}, {'id': 'BSI-DSZ-CC-0919-V2-2021-MA-01', 'description': 'The product CASA 1.0 was changed to improve the implementation representation regarding system stability and connectivity.. Therefore the software version number changed from 30100000__X026e to 30100000__X026f. The changes had no effect on the certified security functionality'}, {'id': 'BSI-DSZ-CC-0919-V2-2021', 'description': 'The changes led to a new Software Version 30100000__X026e. The Hardware Version (10 301 / 10 302 / 10 303 / 10 304) is still the same.'}, {'id': 'BSI-DSZ-CC-0919-2019-RA-01', 'description': 'Certification Date 16.12.2021'}, {'id': 'BSI-DSZ-CC-0919-2019-MA-01', 'description': 'The product CASA 1.0 was changed to correct the tariffing of meter data. Therefore the software version number changed from 30000000__X026b to 30000000__X026c. The changes had no effect on the certified security functionality.'}, {'id': 'BSI-DSZ-CC-0919-2019', 'description': 'Certificate'}], 'report_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0919V2a_pdf.pdf?__blob=publicationFile&v=2', 'target_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0919V2b_pdf.pdf?__blob=publicationFile&v=2', 'cert_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0919V2c_pdf.pdf?__blob=publicationFile&v=2', 'description': 'The Target of Evaluation (TOE) is uniquely identified as CASA 1.0. This Smartmeter Gateway is the communication unit used within an intelligent metering system and is represented by the product CASA except for the integrated Security Module and external communication interfaces. The main functionality of the Gateway is the reception and the storage of measured values and status of the connected meters as well as the processing and the transfer of these measurements and status values to authorized entities.'}, 'subcategory': '(Smart Meter Gateway)'}}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2020-06-24', 'maintenance_title': 'CASA 1.0Software Version: 30000000__X026cHardware Version: 10 301 / 10 302 / 10 303 / 10 304', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/0919ma1a_pdf.pdf', 'maintenance_st_link': None}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 7ca2ec4cc4c1801fdbebbe7e47daf8e6829a159c9c3cf0adcf030e1f7b4d646d.
    • The st_txt_hash property was set to a408b02562cd2b9c04a5e7e5046451f84df406ba907dea846359336366dbb7e0.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 2143082, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 132, '/Author': 'EMH metering GmbH & Co. KG', '/Title': 'CASA 1.0 Security Target', '/Subject': 'CASA-ST', '/Creator': 'LaTeX with hyperref package', '/Producer': 'pdfTeX-1.40.18', '/Keywords': 'SMGW SmartMetering Version: 2.00', '/CreationDate': "D:20191216100008+01'00'", '/ModDate': "D:20191216100008+01'00'", '/Trapped': '/False', '/PTEX.Fullbanner': 'This is pdfTeX, Version 3.14159265-2.6-1.40.18 (TeX Live 2017) kpathsea version 6.2.3', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.jtc1sc27.din.de/sce/sd6']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0077-2013': 3, 'BSI-CC-PP- 0073': 1, 'BSI-CC-PP-0077-V2': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 5, 'EAL4': 1, 'EAL 4 augmented': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_IMP.1': 1}, 'AGD': {'AGD_OPE.1': 1}, 'ALC': {'ALC_FLR.2': 6, 'ALC_CMC.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_FUN.1': 1}, 'AVA': {'AVA_VAN.5': 7}, 'ASE': {'ASE_CCL.1': 1, 'ASE_INT.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 38, 'FAU_ARP': 10, 'FAU_SAA': 11, 'FAU_SAR': 30, 'FAU_STG': 32, 'FAU_GEN.2': 8, 'FAU_STG.2': 16, 'FAU_ARP.1': 1, 'FAU_SAA.1': 4, 'FAU_GEN.1': 22, 'FAU_SAR.1': 7, 'FAU_STG.4': 3, 'FAU_STG.3': 3, 'FAU_STG.1': 7, 'FAU_GEN.2.1': 1, 'FAU_STG.2.1': 1, 'FAU_STG.2.2': 1, 'FAU_STG.2.3': 1, 'FAU_CON.1.2': 1}, 'FCO': {'FCO_NRO': 3, 'FCO_NRO.2': 9, 'FCO_NRO.2.1': 1, 'FCO_NRO.2.2': 1, 'FCO_NRO.2.3': 1, 'FCO_NRO.1': 1}, 'FCS': {'FCS_CKM': 46, 'FCS_COP': 62, 'FCS_CKM.4': 32, 'FCS_CKM.1': 17, 'FCS_CKM.2': 6, 'FCS_COP.1': 11, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_IFC': 29, 'FDP_ACC.2': 11, 'FDP_ACF.1': 10, 'FDP_IFF': 25, 'FDP_RIP.2': 9, 'FDP_SDI.2': 8, 'FDP_ITC.1': 12, 'FDP_ITC.2': 12, 'FDP_ACC': 2, 'FDP_ACC.2.1': 1, 'FDP_ACC.2.2': 1, 'FDP_ACC.1': 9, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 6, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 3, 'FDP_IFC.2': 4, 'FDP_IFC.1': 12, 'FDP_IFF.1': 25, 'FDP_IFF.1.3': 1, 'FDP_RIP': 2, 'FDP_RIP.2.1': 1, 'FDP_RIP.1': 1, 'FDP_SDI': 2, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_SDI.1': 1}, 'FIA': {'FIA_UAU.6': 11, 'FIA_ATD': 3, 'FIA_AFL': 3, 'FIA_UAU': 5, 'FIA_UID': 3, 'FIA_USB': 3, 'FIA_ATD.1': 13, 'FIA_AFL.1': 8, 'FIA_UAU.2': 9, 'FIA_UAU.5': 7, 'FIA_UID.2': 12, 'FIA_USB.1': 8, 'FIA_UID.1': 8, 'FIA_ATD.1.1': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.1': 2, 'FIA_UAU.2.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6.1': 1, 'FIA_UID.2.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_SMR': 3, 'FMT_MOF.1': 10, 'FMT_SMF.1': 19, 'FMT_SMR.1': 30, 'FMT_MSA': 61, 'FMT_MSA.3': 12, 'FMT_MOF': 1, 'FMT_MOF.1.1': 1, 'FMT_SMF': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.1': 9}, 'FPR': {'FPR_CON': 6, 'FPR_CON.1': 10, 'FPR_PSE': 2, 'FPR_CON.1.2': 4, 'FPR_CON.1.1': 3, 'FPR_PSE.1': 8, 'FPR_PSE.1.1': 3, 'FPR_PSE.1.2': 2, 'FPR_PSE.1.3': 2}, 'FPT': {'FPT_FLS': 3, 'FPT_RPL': 3, 'FPT_STM': 3, 'FPT_TST': 3, 'FPT_PHP': 3, 'FPT_FLS.1': 10, 'FPT_RPL.1': 8, 'FPT_STM.1': 19, 'FPT_TST.1': 10, 'FPT_PHP.1': 9, 'FPT_FLS.1.1': 1, 'FPT_RPL.1.1': 1, 'FPT_RPL.1.2': 1, 'FPT_STM.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_SDI.2': 2}, 'FTP': {'FTP_ITC': 33, 'FTP_ITC.1': 9}}, 'cc_claims': {'OE': {'OE.SM': 4}, 'OSP': {'OSP.SM': 5}}, 'vendor': {}, 'eval_facility': {'TUV': {'TÃœV Informationstechnik': 23}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 9}}, 'constructions': {'MAC': {'CMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 2, 'SHA-512': 2, 'SHA-384': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 12}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 41, 'TLS 1.2': 5}}}, 'randomness': {}, 'cipher_mode': {'GCM': {'GCM': 2}}, 'ecc_curve': {'NIST': {'P-256': 3, 'P-384': 3, 'ansip384r1': 3, 'NIST P-256': 3, 'NIST P-384': 3, 'secp256r1': 3, 'secp384r1': 3, 'prime256v1': 3}, 'Brainpool': {'brainpoolP256r1': 3, 'brainpoolP384r1': 3, 'brainpoolP512r1': 3}}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256': 3, 'TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384': 3, 'TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256': 3, 'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384': 3}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 2, 'malfunction': 2}}, 'technical_report_id': {'BSI': {'BSI TR-03109': 1, 'BSI TR-03109-1': 2}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 180-4': 4, 'FIPS 197': 6, 'FIPS 140-2': 4}, 'RFC': {'RFC 5289': 5, 'RFC 5246': 4, 'RFC 2104': 4, 'RFC 5639': 7, 'RFC 3394': 4, 'RFC 3565': 3, 'RFC 5084': 6, 'RFC 4493': 6, 'RFC 5905': 4, 'RFC 2616': 3, 'RFC5246': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to 0919b_pdf.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]} values added.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/0919b_pdf.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]} values discarded.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0919a_pdf.pdf, code: 408'].
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is https://www.commoncriteriaportal.org/files/epfiles/0919a_pdf.pdf.

    The manufacturer_web was updated.

    • The new value is https://emh-metering.de.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for the Gateway of a Smart Metering System', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0073b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['SMARTMETERGATEWAYPP_V1.3']}}]}.

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 7ca2ec4cc4c1801fdbebbe7e47daf8e6829a159c9c3cf0adcf030e1f7b4d646d.
    • The st_txt_hash property was set to a408b02562cd2b9c04a5e7e5046451f84df406ba907dea846359336366dbb7e0.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 2143082, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 132, '/Author': 'EMH metering GmbH & Co. KG', '/Title': 'CASA 1.0 Security Target', '/Subject': 'CASA-ST', '/Creator': 'LaTeX with hyperref package', '/Producer': 'pdfTeX-1.40.18', '/Keywords': 'SMGW SmartMetering Version: 2.00', '/CreationDate': "D:20191216100008+01'00'", '/ModDate': "D:20191216100008+01'00'", '/Trapped': '/False', '/PTEX.Fullbanner': 'This is pdfTeX, Version 3.14159265-2.6-1.40.18 (TeX Live 2017) kpathsea version 6.2.3', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.jtc1sc27.din.de/sce/sd6']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0077-2013': 3, 'BSI-CC-PP- 0073': 1, 'BSI-CC-PP-0077-V2': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 5, 'EAL4': 1, 'EAL 4 augmented': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_IMP.1': 1}, 'AGD': {'AGD_OPE.1': 1}, 'ALC': {'ALC_FLR.2': 6, 'ALC_CMC.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_FUN.1': 1}, 'AVA': {'AVA_VAN.5': 7}, 'ASE': {'ASE_CCL.1': 1, 'ASE_INT.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 38, 'FAU_ARP': 10, 'FAU_SAA': 11, 'FAU_SAR': 30, 'FAU_STG': 32, 'FAU_GEN.2': 8, 'FAU_STG.2': 16, 'FAU_ARP.1': 1, 'FAU_SAA.1': 4, 'FAU_GEN.1': 22, 'FAU_SAR.1': 7, 'FAU_STG.4': 3, 'FAU_STG.3': 3, 'FAU_STG.1': 7, 'FAU_GEN.2.1': 1, 'FAU_STG.2.1': 1, 'FAU_STG.2.2': 1, 'FAU_STG.2.3': 1, 'FAU_CON.1.2': 1}, 'FCO': {'FCO_NRO': 3, 'FCO_NRO.2': 9, 'FCO_NRO.2.1': 1, 'FCO_NRO.2.2': 1, 'FCO_NRO.2.3': 1, 'FCO_NRO.1': 1}, 'FCS': {'FCS_CKM': 46, 'FCS_COP': 62, 'FCS_CKM.4': 32, 'FCS_CKM.1': 17, 'FCS_CKM.2': 6, 'FCS_COP.1': 11, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_IFC': 29, 'FDP_ACC.2': 11, 'FDP_ACF.1': 10, 'FDP_IFF': 25, 'FDP_RIP.2': 9, 'FDP_SDI.2': 8, 'FDP_ITC.1': 12, 'FDP_ITC.2': 12, 'FDP_ACC': 2, 'FDP_ACC.2.1': 1, 'FDP_ACC.2.2': 1, 'FDP_ACC.1': 9, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 6, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 3, 'FDP_IFC.2': 4, 'FDP_IFC.1': 12, 'FDP_IFF.1': 25, 'FDP_IFF.1.3': 1, 'FDP_RIP': 2, 'FDP_RIP.2.1': 1, 'FDP_RIP.1': 1, 'FDP_SDI': 2, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_SDI.1': 1}, 'FIA': {'FIA_UAU.6': 11, 'FIA_ATD': 3, 'FIA_AFL': 3, 'FIA_UAU': 5, 'FIA_UID': 3, 'FIA_USB': 3, 'FIA_ATD.1': 13, 'FIA_AFL.1': 8, 'FIA_UAU.2': 9, 'FIA_UAU.5': 7, 'FIA_UID.2': 12, 'FIA_USB.1': 8, 'FIA_UID.1': 8, 'FIA_ATD.1.1': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.1': 2, 'FIA_UAU.2.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6.1': 1, 'FIA_UID.2.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_SMR': 3, 'FMT_MOF.1': 10, 'FMT_SMF.1': 19, 'FMT_SMR.1': 30, 'FMT_MSA': 61, 'FMT_MSA.3': 12, 'FMT_MOF': 1, 'FMT_MOF.1.1': 1, 'FMT_SMF': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.1': 9}, 'FPR': {'FPR_CON': 6, 'FPR_CON.1': 10, 'FPR_PSE': 2, 'FPR_CON.1.2': 4, 'FPR_CON.1.1': 3, 'FPR_PSE.1': 8, 'FPR_PSE.1.1': 3, 'FPR_PSE.1.2': 2, 'FPR_PSE.1.3': 2}, 'FPT': {'FPT_FLS': 3, 'FPT_RPL': 3, 'FPT_STM': 3, 'FPT_TST': 3, 'FPT_PHP': 3, 'FPT_FLS.1': 10, 'FPT_RPL.1': 8, 'FPT_STM.1': 19, 'FPT_TST.1': 10, 'FPT_PHP.1': 9, 'FPT_FLS.1.1': 1, 'FPT_RPL.1.1': 1, 'FPT_RPL.1.2': 1, 'FPT_STM.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_SDI.2': 2}, 'FTP': {'FTP_ITC': 33, 'FTP_ITC.1': 9}}, 'cc_claims': {'OE': {'OE.SM': 4}, 'OSP': {'OSP.SM': 5}}, 'vendor': {}, 'eval_facility': {'TUV': {'TÃœV Informationstechnik': 23}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 9}}, 'constructions': {'MAC': {'CMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 2, 'SHA-512': 2, 'SHA-384': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 12}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 41, 'TLS 1.2': 5}}}, 'randomness': {}, 'cipher_mode': {'GCM': {'GCM': 2}}, 'ecc_curve': {'NIST': {'P-256': 3, 'P-384': 3, 'ansip384r1': 3, 'NIST P-256': 3, 'NIST P-384': 3, 'secp256r1': 3, 'secp384r1': 3, 'prime256v1': 3}, 'Brainpool': {'brainpoolP256r1': 3, 'brainpoolP384r1': 3, 'brainpoolP512r1': 3}}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256': 3, 'TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384': 3, 'TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256': 3, 'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384': 3}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 2, 'malfunction': 2}}, 'technical_report_id': {'BSI': {'BSI TR-03109': 1, 'BSI TR-03109-1': 2}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 180-4': 4, 'FIPS 197': 6, 'FIPS 140-2': 4}, 'RFC': {'RFC 5289': 5, 'RFC 5246': 4, 'RFC 2104': 4, 'RFC 5639': 7, 'RFC 3394': 4, 'RFC 3565': 3, 'RFC 5084': 6, 'RFC 4493': 6, 'RFC 5905': 4, 'RFC 2616': 3, 'RFC5246': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to 0919b_pdf.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]} values added.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is None.

    The manufacturer_web was updated.

    • The new value is None.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'SMARTMETERGATEWAYPP_V1.3', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}]}.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/0919b_pdf.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]} values discarded.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0919a_pdf.pdf, code: nok'].
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for the Gateway of a Smart Metering System', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0073b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['SMARTMETERGATEWAYPP_V1.3']}}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for the Gateway of a Smart Metering System', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0073b_pdf.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '0919a_pdf.pdf', 'st_filename': '0919b_pdf.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0919-2019': 28}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL 4': 8}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.2': 4}}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 4}}}}, 'constructions': {'__update__': {'MAC': {'__update__': {'CMAC': 1}}}}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__update__': {'SHA256': 1, 'SHA384': 1}}}}}}, 'crypto_scheme': {}, 'cipher_mode': {'__update__': {'GCM': {'__update__': {'GCM': 2}}}, '__delete__': ['CBC', 'CCM']}, 'technical_report_id': {'__update__': {'BSI': {'__insert__': {'BSI TR-03109': 1}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'ISO': {'__update__': {'ISO/IEC 18045': 4}}}}, 'certification_process': {'__update__': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, '1, 2019-12-16, EVALUATION TECHNICAL REPORT SUMMARY (ETR SUMMARY), TÃœV Informationstechnik GmbH (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014': 1, 'list for the TOE CASA-Konfigurationsliste, Version 9, 2019-12-16, Konfigurationsliste (confidential document) [10] CASA (CASA-AGD) Benutzerhandbuch für Letztverbraucher (LV), Version 1.17, 2019-12-16 [11': 1}}}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL 4': 5}}}}, 'cc_sar': {'__update__': {'ADV': {'__delete__': ['ADV_FSP.4', 'ADV_TDS.3']}, 'AGD': {'__delete__': ['AGD_PRE.1']}, 'ALC': {'__update__': {'ALC_FLR.2': 6}, '__delete__': ['ALC_CMS.4', 'ALC_DVS.1', 'ALC_TAT.1']}, 'ATE': {'__delete__': ['ATE_DPT.1', 'ATE_IND.2']}, 'AVA': {'__update__': {'AVA_VAN.5': 7}}, 'ASE': {'__delete__': ['ASE_ECD.1', 'ASE_OBJ.2', 'ASE_SPD.1']}}}, 'cc_sfr': {'__update__': {'FAU': {'__insert__': {'FAU_ARP.1': 1, 'FAU_SAR.1': 7, 'FAU_STG.4': 3}, '__update__': {'FAU_GEN.2': 8, 'FAU_ARP': 10, 'FAU_SAA.1': 4, 'FAU_GEN': 38, 'FAU_SAA': 11, 'FAU_GEN.1': 22, 'FAU_SAR': 30, 'FAU_STG': 32}}, 'FCO': {'__update__': {'FCO_NRO': 3}}, 'FCS': {'__update__': {'FCS_CKM.4': 32, 'FCS_CKM': 46, 'FCS_COP.1': 11, 'FCS_COP': 62, 'FCS_CKM.1': 17}}, 'FDP': {'__insert__': {'FDP_IFC.2': 4}, '__update__': {'FDP_ACF.1': 10, 'FDP_ACC': 2, 'FDP_IFC': 29, 'FDP_IFF.1': 25, 'FDP_IFF': 25, 'FDP_RIP': 2, 'FDP_SDI': 2}}, 'FIA': {'__update__': {'FIA_ATD': 3, 'FIA_AFL': 3, 'FIA_UAU': 5, 'FIA_UID': 3, 'FIA_USB': 3, 'FIA_ATD.1': 13, 'FIA_UAU.2': 9, 'FIA_UAU.5': 7, 'FIA_UAU.1': 2}}, 'FMT': {'__insert__': {'FMT_MOF': 1}, '__update__': {'FMT_SMR': 3, 'FMT_SMF.1': 19, 'FMT_MSA.3': 12, 'FMT_SMF': 2, 'FMT_MSA': 61, 'FMT_MSA.1': 9}}, 'FPR': {'__update__': {'FPR_CON': 6, 'FPR_CON.1': 10}}, 'FPT': {'__update__': {'FPT_FLS': 3, 'FPT_RPL': 3, 'FPT_STM': 3, 'FPT_TST': 3, 'FPT_PHP': 3}}, 'FTP': {'__insert__': {'FTP_ITC.1': 9}, '__update__': {'FTP_ITC': 33}}}}, 'vendor': {}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 9}, '__delete__': ['AES-128']}}}, 'constructions': {'__update__': {'MAC': {'__update__': {'CMAC': 1}}}}}}, 'asymmetric_crypto': {'__delete__': ['FF']}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__delete__': ['SHA256', 'SHA384', 'SHA512']}}}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 12}}}}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'TLS': {'__update__': {'TLS': 41}}}}}}, 'cipher_mode': {'__update__': {'GCM': {'__update__': {'GCM': 2}}}, '__delete__': ['CBC', 'CCM']}, 'tls_cipher_suite': {'__update__': {'TLS': {'__update__': {'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384': 3}}}}, 'technical_report_id': {'__update__': {'BSI': {'__insert__': {'BSI TR-03109': 1}}}}, 'tee_name': {}} data.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}]} values discarded.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for the Gateway of a Smart Metering System', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0073b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['SMARTMETERGATEWAYPP_V1.3']}}]}.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2020-06-24', 'maintenance_title': 'CASA 1.0Software Version: 30000000__X026cHardware Version: 10 301 / 10 302 / 10 303 / 10 304', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/0919ma1a_pdf.pdf', 'maintenance_st_link': None}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/AIS', 'https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/zertifizierungsreporte', 'https://www.sogis.eu/', 'https://www.bsi.bund.de/', 'http://www.commoncriteriaportal.org/cc/']}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.jtc1sc27.din.de/sce/sd6']}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0919-2019': 54}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0073-2014': 3, 'BSI-CC-PP- 0077-V2': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 7, 'EAL 5': 3, 'EAL 2': 2, 'EAL 1': 1, 'EAL 2+': 1, 'EAL 5+': 1, 'EAL 6': 1, 'EAL 4 augmented': 3}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 3, 'ALC_FLR': 3}, 'AVA': {'AVA_VAN.5': 5}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'TUV': {'TÃœV Informationstechnik': 3, 'TÃœViT': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 5}}, 'constructions': {'MAC': {'CMAC': 13}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 3}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA256': 3, 'SHA384': 3, 'SHA512': 1, 'SHA-256': 1, 'SHA-384': 1, 'SHA-512': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 4}}, 'crypto_protocol': {'SSH': {'SSH': 4}, 'TLS': {'TLS': {'TLS': 4}}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 1}, 'GCM': {'GCM': 6}, 'CCM': {'CCM': 1}}, 'ecc_curve': {'NIST': {'secp256r1': 1, 'secp384r1': 1}, 'Brainpool': {'brainpoolP256r1': 1, 'brainpoolP384r1': 1, 'brainpoolP512r1': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side-channel': 2}}, 'technical_report_id': {'BSI': {'BSI TR-03109-1': 1, 'BSI TR-03109-3': 1, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 197': 5, 'FIPS 180-4': 2, 'FIPS180-4': 1, 'FIPS 140-2': 1}, 'BSI': {'AIS 34': 3, 'AIS 46': 2, 'AIS 48': 2, 'AIS 1': 1, 'AIS 14': 1, 'AIS 19': 1, 'AIS 32': 1}, 'RFC': {'RFC5289': 1, 'RFC 2104': 3, 'RFC 5639': 3, 'RFC 3394': 3, 'RFC 5084': 3, 'RFC 4493': 3, 'RFC 5289': 2}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 17065': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'identiality being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'ion 1, 2019-12-16, EVALUATION TECHNICAL REPORT SUMMARY (ETR SUMMARY), TÃœV Informationstechnik GmbH (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014': 1, 'onfiguration list for the TOE CASA-Konfigurationsliste, Version 9, 2019-12-16, Konfigurationsliste (confidential document) [10] CASA (CASA-AGD) Benutzerhandbuch für Letztverbraucher (LV), Version 1.17, 2019-12-16 [11': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0077-2013': 3, 'BSI-CC-PP- 0073': 1, 'BSI-CC-PP-0077-V2': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 4, 'EAL4': 1, 'EAL 4 augmented': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 5, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 6}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.2': 9, 'FAU_STG.2': 16, 'FAU_ARP': 1, 'FAU_SAA.1': 2, 'FAU_GEN': 4, 'FAU_SAA': 1, 'FAU_GEN.1': 12, 'FAU_SAR': 3, 'FAU_STG': 4, 'FAU_STG.3': 3, 'FAU_STG.1': 7, 'FAU_GEN.2.1': 1, 'FAU_STG.2.1': 1, 'FAU_STG.2.2': 1, 'FAU_STG.2.3': 1, 'FAU_CON.1.2': 1}, 'FCO': {'FCO_NRO': 2, 'FCO_NRO.2': 9, 'FCO_NRO.2.1': 1, 'FCO_NRO.2.2': 1, 'FCO_NRO.2.3': 1, 'FCO_NRO.1': 1}, 'FCS': {'FCS_CKM.4': 33, 'FCS_CKM': 4, 'FCS_CKM.2': 6, 'FCS_COP.1': 6, 'FCS_COP': 4, 'FCS_CKM.1': 14, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ACC.2': 11, 'FDP_ACF.1': 12, 'FDP_RIP.2': 9, 'FDP_SDI.2': 8, 'FDP_ITC.1': 12, 'FDP_ITC.2': 12, 'FDP_ACC': 1, 'FDP_ACC.2.1': 1, 'FDP_ACC.2.2': 1, 'FDP_ACC.1': 9, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 6, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 3, 'FDP_IFC': 2, 'FDP_IFC.1': 12, 'FDP_IFF.1': 4, 'FDP_IFF': 2, 'FDP_IFF.1.3': 1, 'FDP_RIP': 1, 'FDP_RIP.2.1': 1, 'FDP_RIP.1': 1, 'FDP_SDI': 1, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_SDI.1': 1}, 'FIA': {'FIA_UAU.6': 11, 'FIA_ATD': 2, 'FIA_AFL': 2, 'FIA_UAU': 2, 'FIA_UID': 2, 'FIA_USB': 2, 'FIA_ATD.1': 12, 'FIA_AFL.1': 8, 'FIA_UAU.2': 10, 'FIA_UAU.5': 8, 'FIA_UID.2': 12, 'FIA_USB.1': 8, 'FIA_UID.1': 8, 'FIA_ATD.1.1': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.1': 3, 'FIA_UAU.2.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6.1': 1, 'FIA_UID.2.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_SMR': 2, 'FMT_MOF.1': 10, 'FMT_SMF.1': 23, 'FMT_SMR.1': 30, 'FMT_MSA.3': 6, 'FMT_MOF.1.1': 1, 'FMT_SMF': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA': 3, 'FMT_MSA.1': 6}, 'FPR': {'FPR_CON': 5, 'FPR_CON.1': 9, 'FPR_PSE': 2, 'FPR_CON.1.2': 4, 'FPR_CON.1.1': 3, 'FPR_PSE.1': 8, 'FPR_PSE.1.1': 3, 'FPR_PSE.1.2': 2, 'FPR_PSE.1.3': 2}, 'FPT': {'FPT_FLS': 2, 'FPT_RPL': 2, 'FPT_STM': 2, 'FPT_TST': 2, 'FPT_PHP': 2, 'FPT_FLS.1': 10, 'FPT_RPL.1': 8, 'FPT_STM.1': 19, 'FPT_TST.1': 10, 'FPT_PHP.1': 9, 'FPT_FLS.1.1': 1, 'FPT_RPL.1.1': 1, 'FPT_RPL.1.2': 1, 'FPT_STM.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_SDI.2': 2}, 'FTP': {'FTP_ITC': 2}}, 'cc_claims': {'OE': {'OE.SM': 4}, 'OSP': {'OSP.SM': 5}}, 'vendor': {'STMicroelectronics': {'STM': 23}}, 'eval_facility': {'TUV': {'TÃœV Informationstechnik': 23}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 10, 'AES-128': 1}}, 'constructions': {'MAC': {'CMAC': 18}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 4}}, 'FF': {'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA256': 8, 'SHA384': 7, 'SHA512': 2, 'SHA-256': 2, 'SHA-512': 2, 'SHA-384': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 19}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 67, 'TLS 1.2': 5}}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 1}, 'GCM': {'GCM': 9}, 'CCM': {'CCM': 1}}, 'ecc_curve': {'NIST': {'P-256': 3, 'P-384': 3, 'ansip384r1': 3, 'NIST P-256': 3, 'NIST P-384': 3, 'secp256r1': 3, 'secp384r1': 3, 'prime256v1': 3}, 'Brainpool': {'brainpoolP256r1': 3, 'brainpoolP384r1': 3, 'brainpoolP512r1': 3}}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256': 3, 'TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384': 3, 'TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256': 3, 'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384': 2}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 2, 'malfunction': 2}}, 'technical_report_id': {'BSI': {'BSI TR-03109-1': 2}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 180-4': 4, 'FIPS 197': 6, 'FIPS 140-2': 4}, 'RFC': {'RFC 5289': 5, 'RFC 5246': 4, 'RFC 2104': 4, 'RFC 5639': 7, 'RFC 3394': 4, 'RFC 3565': 3, 'RFC 5084': 6, 'RFC 4493': 6, 'RFC 5905': 4, 'RFC 2616': 3, 'RFC5246': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': 'd5cdd8adb2612d438610c2b88671c7f57c9b87d7170b11a321afadb808a91519', 'st_pdf_hash': '7ca2ec4cc4c1801fdbebbe7e47daf8e6829a159c9c3cf0adcf030e1f7b4d646d', 'report_txt_hash': '6da4cb526050e0040493790aec3d3daa21cff542215ad1e578f0f104f48e087a', 'st_txt_hash': 'a408b02562cd2b9c04a5e7e5046451f84df406ba907dea846359336366dbb7e0'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_block_cipher_modes': {'__insert__': {'CCM': 1}}} data.
    • The st_keywords property was updated, with the {'rules_block_cipher_modes': {'__insert__': {'CCM': 1}}, 'rules_ecc_curves': {'__insert__': {'NIST P-256': 3, 'NIST P-384': 3}}} data.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0919-V2-2021']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0919-V2-2021']}, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['1.0']}.
    • The directly_affected_by property was set to {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0919-V2-2021']}.
  • 01.02.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Protection Profile for the Gateway of a Smart Metering System', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0073b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['SMARTMETERGATEWAYPP_V1.3']}}]}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name CASA 1.0 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/0919a_pdf.pdf",
  "dgst": "4b6ca7acb7423b57",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0919-2019",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0919-V2-2021"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0919-V2-2021",
          "BSI-DSZ-CC-0919-V3-2023"
        ]
      },
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2020-06-24",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/0919ma1a_pdf.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "CASA 1.0Software Version: 30000000__X026cHardware Version: 10 301 / 10 302 / 10 303 / 10 304"
      }
    ]
  },
  "manufacturer": "EMH metering GmbH \u0026 Co. KG",
  "manufacturer_web": "https://emh-metering.de",
  "name": "CASA 1.0",
  "not_valid_after": "2027-12-17",
  "not_valid_before": "2019-12-17",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "0919a_pdf.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0919-2019": 14
        },
        "NL": {
          "CC-19-175197": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0077-V2": 1,
          "BSI-CC-PP-0073-2014": 3
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 3,
          "ALC_FLR.2": 4
        },
        "AVA": {
          "AVA_VAN.5": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 2,
          "EAL 2+": 1,
          "EAL 4": 8,
          "EAL 4 augmented": 3,
          "EAL 5": 3,
          "EAL 5+": 1,
          "EAL 6": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "1, 2019-12-16, EVALUATION TECHNICAL REPORT SUMMARY (ETR SUMMARY), T\u00dcV Informationstechnik GmbH (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
          "list for the TOE CASA-Konfigurationsliste, Version 9, 2019-12-16, Konfigurationsliste (confidential document) [10] CASA (CASA-AGD) Benutzerhandbuch f\u00fcr Letztverbraucher (LV), Version 1.17, 2019-12-16 [11": 1
        }
      },
      "cipher_mode": {
        "GCM": {
          "GCM": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 4
        },
        "TLS": {
          "TLS": {
            "TLS": 4
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {
        "Brainpool": {
          "brainpoolP256r1": 1,
          "brainpoolP384r1": 1,
          "brainpoolP512r1": 1
        },
        "NIST": {
          "secp256r1": 1,
          "secp384r1": 1
        }
      },
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 3,
          "T\u00dcViT": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA-512": 1,
            "SHA256": 1,
            "SHA384": 1,
            "SHA512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "SCA": {
          "side-channel": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 1": 1,
          "AIS 14": 1,
          "AIS 19": 1,
          "AIS 32": 1,
          "AIS 34": 3,
          "AIS 46": 2,
          "AIS 48": 2
        },
        "FIPS": {
          "FIPS 140-2": 1,
          "FIPS 180-4": 2,
          "FIPS 197": 5,
          "FIPS180-4": 1
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        },
        "RFC": {
          "RFC 2104": 3,
          "RFC 3394": 3,
          "RFC 4493": 3,
          "RFC 5084": 3,
          "RFC 5289": 2,
          "RFC 5639": 3,
          "RFC5289": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 4
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 1
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1,
          "BSI TR-03109": 1,
          "BSI TR-03109-1": 1,
          "BSI TR-03109-3": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20191220155127+01\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "Common Criteria, Certification, Zertifizierung, Smart Meter Gateway, CASA 1.0, EMH metering GmbH \u0026 Co. KG",
      "/ModDate": "D:20191220160028+01\u002700\u0027",
      "/Producer": "LibreOffice 6.2",
      "/Subject": "Common Criteria Certification",
      "/Title": "Certification Report BSI-DSZ-CC-0919-2019",
      "pdf_file_size_bytes": 427011,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/zertifizierung",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "https://www.sogis.eu/",
          "http://www.commoncriteriaportal.org/cc/",
          "https://www.bsi.bund.de/AIS",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 27
    },
    "report_filename": "0919a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by AVA_VAN.5 and ALC_FLR.2",
        "cc_version": "PP conformant Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-0919-2019",
        "cert_item": "CASA 1.0",
        "cert_lab": "BSI",
        "developer": "EMH metering GmbH \u0026 Co. KG",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI- CC-PP-0073-2014"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0919-2019": 14
        },
        "NL": {
          "CC-19-175197": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0077-V2": 1,
          "BSI-CC-PP-0073-2014": 3
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 3,
          "ALC_FLR.2": 4
        },
        "AVA": {
          "AVA_VAN.5": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 2,
          "EAL 2+": 1,
          "EAL 4": 8,
          "EAL 4 augmented": 3,
          "EAL 5": 3,
          "EAL 5+": 1,
          "EAL 6": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "1, 2019-12-16, EVALUATION TECHNICAL REPORT SUMMARY (ETR SUMMARY), T\u00dcV Informationstechnik GmbH (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
          "list for the TOE CASA-Konfigurationsliste, Version 9, 2019-12-16, Konfigurationsliste (confidential document) [10] CASA (CASA-AGD) Benutzerhandbuch f\u00fcr Letztverbraucher (LV), Version 1.17, 2019-12-16 [11": 1
        }
      },
      "cipher_mode": {
        "GCM": {
          "GCM": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 4
        },
        "TLS": {
          "TLS": {
            "TLS": 4
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {
        "Brainpool": {
          "brainpoolP256r1": 1,
          "brainpoolP384r1": 1,
          "brainpoolP512r1": 1
        },
        "NIST": {
          "secp256r1": 1,
          "secp384r1": 1
        }
      },
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 3,
          "T\u00dcViT": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA-512": 1,
            "SHA256": 1,
            "SHA384": 1,
            "SHA512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "SCA": {
          "side-channel": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 1": 1,
          "AIS 14": 1,
          "AIS 19": 1,
          "AIS 32": 1,
          "AIS 34": 3,
          "AIS 46": 2,
          "AIS 48": 2
        },
        "FIPS": {
          "FIPS 140-2": 1,
          "FIPS 180-4": 2,
          "FIPS 197": 5,
          "FIPS180-4": 1
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        },
        "RFC": {
          "RFC 2104": 3,
          "RFC 3394": 3,
          "RFC 4493": 3,
          "RFC 5084": 3,
          "RFC 5289": 2,
          "RFC 5639": 3,
          "RFC5289": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 4
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 1
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1,
          "BSI TR-03109": 1,
          "BSI TR-03109-1": 1,
          "BSI TR-03109-3": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20191220155127+01\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "Common Criteria, Certification, Zertifizierung, Smart Meter Gateway, CASA 1.0, EMH metering GmbH \u0026 Co. KG",
      "/ModDate": "D:20191220160028+01\u002700\u0027",
      "/Producer": "LibreOffice 6.2",
      "/Subject": "Common Criteria Certification",
      "/Title": "Certification Report BSI-DSZ-CC-0919-2019",
      "pdf_file_size_bytes": 427011,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/zertifizierung",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "https://www.sogis.eu/",
          "http://www.commoncriteriaportal.org/cc/",
          "https://www.bsi.bund.de/AIS",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 27
    },
    "st_filename": "0919b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 4
          },
          "ECDSA": {
            "ECDSA": 1
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "OE": {
          "OE.SM": 4
        },
        "OSP": {
          "OSP.SM": 5
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0073": 1,
          "BSI-CC-PP-0077-2013": 3,
          "BSI-CC-PP-0077-V2": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_IMP.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_DEL.1": 1,
          "ALC_FLR.2": 6,
          "ALC_LCD.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_INT.1": 1,
          "ASE_REQ.2": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_FUN.1": 1
        },
        "AVA": {
          "AVA_VAN.5": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 5,
          "EAL 4 augmented": 2,
          "EAL4": 1,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP": 10,
          "FAU_ARP.1": 1,
          "FAU_CON.1.2": 1,
          "FAU_GEN": 38,
          "FAU_GEN.1": 22,
          "FAU_GEN.2": 8,
          "FAU_GEN.2.1": 1,
          "FAU_SAA": 11,
          "FAU_SAA.1": 4,
          "FAU_SAR": 30,
          "FAU_SAR.1": 7,
          "FAU_STG": 32,
          "FAU_STG.1": 7,
          "FAU_STG.2": 16,
          "FAU_STG.2.1": 1,
          "FAU_STG.2.2": 1,
          "FAU_STG.2.3": 1,
          "FAU_STG.3": 3,
          "FAU_STG.4": 3
        },
        "FCO": {
          "FCO_NRO": 3,
          "FCO_NRO.1": 1,
          "FCO_NRO.2": 9,
          "FCO_NRO.2.1": 1,
          "FCO_NRO.2.2": 1,
          "FCO_NRO.2.3": 1
        },
        "FCS": {
          "FCS_CKM": 46,
          "FCS_CKM.1": 17,
          "FCS_CKM.2": 6,
          "FCS_CKM.4": 32,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 62,
          "FCS_COP.1": 11
        },
        "FDP": {
          "FDP_ACC": 2,
          "FDP_ACC.1": 9,
          "FDP_ACC.2": 11,
          "FDP_ACC.2.1": 1,
          "FDP_ACC.2.2": 1,
          "FDP_ACF.1": 10,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 6,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 3,
          "FDP_IFC": 29,
          "FDP_IFC.1": 12,
          "FDP_IFC.2": 4,
          "FDP_IFF": 25,
          "FDP_IFF.1": 25,
          "FDP_IFF.1.3": 1,
          "FDP_ITC.1": 12,
          "FDP_ITC.2": 12,
          "FDP_RIP": 2,
          "FDP_RIP.1": 1,
          "FDP_RIP.2": 9,
          "FDP_RIP.2.1": 1,
          "FDP_SDI": 2,
          "FDP_SDI.1": 1,
          "FDP_SDI.2": 8,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1
        },
        "FIA": {
          "FIA_AFL": 3,
          "FIA_AFL.1": 8,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD": 3,
          "FIA_ATD.1": 13,
          "FIA_ATD.1.1": 1,
          "FIA_UAU": 5,
          "FIA_UAU.1": 2,
          "FIA_UAU.2": 9,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.5": 7,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6": 11,
          "FIA_UAU.6.1": 1,
          "FIA_UID": 3,
          "FIA_UID.1": 8,
          "FIA_UID.2": 12,
          "FIA_UID.2.1": 1,
          "FIA_USB": 3,
          "FIA_USB.1": 8,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MOF": 1,
          "FMT_MOF.1": 10,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 61,
          "FMT_MSA.1": 9,
          "FMT_MSA.3": 12,
          "FMT_SMF": 2,
          "FMT_SMF.1": 19,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 3,
          "FMT_SMR.1": 30,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_CON": 6,
          "FPR_CON.1": 10,
          "FPR_CON.1.1": 3,
          "FPR_CON.1.2": 4,
          "FPR_PSE": 2,
          "FPR_PSE.1": 8,
          "FPR_PSE.1.1": 3,
          "FPR_PSE.1.2": 2,
          "FPR_PSE.1.3": 2
        },
        "FPT": {
          "FPT_FLS": 3,
          "FPT_FLS.1": 10,
          "FPT_FLS.1.1": 1,
          "FPT_PHP": 3,
          "FPT_PHP.1": 9,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_RPL": 3,
          "FPT_RPL.1": 8,
          "FPT_RPL.1.1": 1,
          "FPT_RPL.1.2": 1,
          "FPT_SDI.2": 2,
          "FPT_STM": 3,
          "FPT_STM.1": 19,
          "FPT_STM.1.1": 1,
          "FPT_TST": 3,
          "FPT_TST.1": 10,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 33,
          "FTP_ITC.1": 9
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "GCM": {
          "GCM": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 41,
            "TLS 1.2": 5
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 12
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Brainpool": {
          "brainpoolP256r1": 3,
          "brainpoolP384r1": 3,
          "brainpoolP512r1": 3
        },
        "NIST": {
          "NIST P-256": 3,
          "NIST P-384": 3,
          "P-256": 3,
          "P-384": 3,
          "ansip384r1": 3,
          "prime256v1": 3,
          "secp256r1": 3,
          "secp384r1": 3
        }
      },
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 23
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 2,
            "SHA-384": 1,
            "SHA-512": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "malfunction": 2,
          "physical tampering": 2
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 4,
          "FIPS 180-4": 4,
          "FIPS 197": 6
        },
        "RFC": {
          "RFC 2104": 4,
          "RFC 2616": 3,
          "RFC 3394": 4,
          "RFC 3565": 3,
          "RFC 4493": 6,
          "RFC 5084": 6,
          "RFC 5246": 4,
          "RFC 5289": 5,
          "RFC 5639": 7,
          "RFC 5905": 4,
          "RFC5246": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 9
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 1
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03109": 1,
          "BSI TR-03109-1": 2
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {
        "TLS": {
          "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256": 3,
          "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 3,
          "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384": 3,
          "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 3
        }
      },
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "EMH metering GmbH \u0026 Co. KG",
      "/CreationDate": "D:20191216100008+01\u002700\u0027",
      "/Creator": "LaTeX with hyperref package",
      "/Keywords": "SMGW SmartMetering Version: 2.00",
      "/ModDate": "D:20191216100008+01\u002700\u0027",
      "/PTEX.Fullbanner": "This is pdfTeX, Version 3.14159265-2.6-1.40.18 (TeX Live 2017) kpathsea version 6.2.3",
      "/Producer": "pdfTeX-1.40.18",
      "/Subject": "CASA-ST",
      "/Title": "CASA 1.0 Security Target",
      "/Trapped": "/False",
      "pdf_file_size_bytes": 2143082,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.jtc1sc27.din.de/sce/sd6"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 132
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "SMARTMETERGATEWAYPP_V1.3"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0073b_pdf.pdf",
        "pp_name": "Protection Profile for the Gateway of a Smart Metering System"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/0919a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "AVA_VAN.5",
      "ALC_FLR.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/0919b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "d5cdd8adb2612d438610c2b88671c7f57c9b87d7170b11a321afadb808a91519",
      "txt_hash": "6da4cb526050e0040493790aec3d3daa21cff542215ad1e578f0f104f48e087a"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "d5cdd8adb2612d438610c2b88671c7f57c9b87d7170b11a321afadb808a91519",
      "txt_hash": "6da4cb526050e0040493790aec3d3daa21cff542215ad1e578f0f104f48e087a"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "7ca2ec4cc4c1801fdbebbe7e47daf8e6829a159c9c3cf0adcf030e1f7b4d646d",
      "txt_hash": "a408b02562cd2b9c04a5e7e5046451f84df406ba907dea846359336366dbb7e0"
    }
  },
  "status": "active"
}