STARCOS 3.4 Health AHC C1
CSV information ?
Status | archived |
---|---|
Valid from | 25.01.2010 |
Valid until | 01.09.2019 |
Scheme | 🇩🇪 DE |
Manufacturer | G+D Mobile Security GmbH |
Category | Products for Digital Signatures |
Security level | EAL4+ |
Heuristics summary ?
Certification report ?
Extracted keywords
Symmetric Algorithms
Triple-DESAsymmetric Algorithms
ECDSAHash functions
SHA-256, SHA-2Randomness
RNGOperating System name
STARCOS 3Vendor
NXP, NXP Semiconductors, Giesecke & Devrient, G&DSecurity level
EAL 4, EAL 1, EAL 7, EAL5+, EAL1, EAL3, EAL5, EAL7, EAL2, EAL4, EAL6, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ADV_COMP.1, ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_DVS.2, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ALC_COMP.1, ATE_FUN, ATE_IND, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, AVA_VAN.5, AVA_VAN, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0059-Certificates
BSI-DSZ-CC-0601-2010, BSI-DSZ-CC-0466-2008Evaluation facilities
TÜV Informationstechnik, TÜViTCertification process
out of scope, the cryptographic functionality implemented in the TOE. Hereby, the TOE's SHA-256 functionality was out of scope under the aspect of confidentiality. The primary focus for devising penetration tests was to cover, Version 2.3, 17.12.2009, Security Target STARCOS 3.4 Health AHC C1, Giesecke & Devrient GmbH (confidential document) [7] Security Target BSI-DSZ-CC-0601, Version 2.3, 17.12.2009, Security Target Lite STARCOS 3.4, 8] Evaluation Technical Report STARCOS 3.4 Health AHC C1, Version 3, 17.12.2009, TÜViT GmbH (confidential document) [9] ETR-lite for composition according to AIS 36 for the Product STARCOS 3.4 Health AHC C1, composition according to AIS36 / NXP P5CC052V0A Secure Smart Card Controller, T-Systems GEI GmbH (confidential document) [10] Configuration list for the TOE, Version 1.4, 17.12.2009, Configuration List STARCOS 3.4, AHC C1 (confidential document) 8 specifically • AIS 20, Version 1, 2. December 1999, Funktionalitätsklassen undSide-channel analysis
DPA, SPA, physical tampering, Malfunction, JILCertification process
out of scope, the cryptographic functionality implemented in the TOE. Hereby, the TOE's SHA-256 functionality was out of scope under the aspect of confidentiality. The primary focus for devising penetration tests was to cover, Version 2.3, 17.12.2009, Security Target STARCOS 3.4 Health AHC C1, Giesecke & Devrient GmbH (confidential document) [7] Security Target BSI-DSZ-CC-0601, Version 2.3, 17.12.2009, Security Target Lite STARCOS 3.4, 8] Evaluation Technical Report STARCOS 3.4 Health AHC C1, Version 3, 17.12.2009, TÜViT GmbH (confidential document) [9] ETR-lite for composition according to AIS 36 for the Product STARCOS 3.4 Health AHC C1, composition according to AIS36 / NXP P5CC052V0A Secure Smart Card Controller, T-Systems GEI GmbH (confidential document) [10] Configuration list for the TOE, Version 1.4, 17.12.2009, Configuration List STARCOS 3.4, AHC C1 (confidential document) 8 specifically • AIS 20, Version 1, 2. December 1999, Funktionalitätsklassen undStandards
FIPS 46-3, FIPS 180-2, AIS 34, AIS 1, AIS 14, AIS 19, AIS 20, AIS 25, AIS 26, AIS 36, AIS 37, AIS 38, AIS 35, AIS36, AIS 31, AIS 32Technical reports
BSI 7125, BSI 7148, BSI 7149File metadata
Title: | Certification Report BSI-DSZ-CC-0601-2010 |
---|---|
Subject: | Common Criteria Certification |
Keywords: | Zertifizierung, Common Criteria, STARCOS 3.4 Health AHC C1, G&D, Giesecke & Devrient GmbH |
Author: | Bundesamt für Sicherheit in der Informationstechnik |
Creation date: | D:20100222090038+01'00' |
Modification date: | D:20100222094506+01'00' |
Pages: | 42 |
Creator: | Writer |
Producer: | StarOffice 9 |
Frontpage
Certificate ID: | BSI-DSZ-CC-0601-2010 |
---|---|
Certified item: | STARCOS 3.4 Health AHC C1 |
Certification lab: | BSI |
Developer: | Giesecke & Devrient GmbH |
References
Outgoing- BSI-DSZ-CC-0466-2008 - NXP Smart Card Controller P5CC052V0A with specific IC Dedicated Software
Security target ?
Extracted keywords
Symmetric Algorithms
DESAsymmetric Algorithms
RSA2048, ECDSAHash functions
SHA-2Operating System name
STARCOS 3Vendor
NXP, NXP Semiconductors, Giesecke & Devrient, G&DSecurity level
EAL 4, EAL4+, EAL4, EAL4 augmentedClaims
A.CGA, A.SCA, OT.TOE_SSCD, OT.TOE_TC_SVD_EXP, OE.HID_VAD, OE.CGA_SSCD, OE.CGA_TC_SVDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC, FDP_ACF.1, FDP_ACC.1, FDP_ACF, FDP_DAU, FDP_DAU.1, FDP_DAU.2, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI, FDP_SDI.1, FDP_SDI.2, FDP_IFC.1, FIA_API, FIA_API.1, FIA_API.1.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FMT_MSA.3, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4, FMT_MSA.4.1, FMT_MTD, FMT_MTD.1, FPT_TST.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TST, FPT_PHP.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1Protection profiles
BSI-PP-0002-2001Certificates
BSI-DSZ-CC-0466-2008Side-channel analysis
SPA, DPA, timing attacks, physical tampering, DFA, fault injectionStandards
AIS20, AIS 31, AIS 20, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003File metadata
Title: | Security Target Lite STARCOS 3.4 Health AHC C1, Version 2.3/17.12.09 |
---|---|
Subject: | Security Target Lite STARCOS 3.4 Health AHC C1, Version 2.3/17.12.09 |
Keywords: | Security Target Lite; STARCOS 3.4 Health AHC C1; SSCD |
Author: | Giesecke&Devrient GmbH |
Creation date: | D:20091217144542+01'00' |
Modification date: | D:20091217145337+01'00' |
Pages: | 72 |
Creator: | Acrobat PDFMaker 8.1 für Word |
Producer: | Acrobat Distiller 8.1.0 (Windows) |
References
Outgoing- BSI-DSZ-CC-0466-2008 - NXP Smart Card Controller P5CC052V0A with specific IC Dedicated Software
Heuristics ?
Extracted SARs
ADV_COMP.1, APE_INT.1, APE_ECD.1, ALC_DVS.1, ASE_TSS.1, APE_CCL.1, ATE_FUN.1, ALC_TAT.1, ATE_DPT.1, APE_REQ.2, ASE_CCL.1, ASE_INT.1, ADV_TDS.3, ALC_LCD.1, APE_OBJ.2, ASE_REQ.2, ASE_SPD.1, APE_SPD.1, ALC_CMS.4, ALC_DEL.1, AVA_VAN.5, ADV_SPM.1, AGD_PRE.1, AGD_OPE.1, ASE_OBJ.2, ALC_CMC.4, ATE_IND.2, ADV_INT.3, ADV_IMP.1, ALC_COMP.1, ASE_ECD.1, ALC_FLR.3, ADV_FSP.4, ATE_COV.2, ADV_ARC.1References ?
Updates ?
-
26.04.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'scheme_data': None}
.
- The following values were inserted:
-
11.02.2023 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.cc.CCCertificate
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.InternalState
. - The following properties were deleted:
['errors']
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.PdfData
.
The computed heuristics were updated.
- The following values were inserted:
{'direct_transitive_cves': None, 'indirect_transitive_cves': None}
. - The _type property was set to
sec_certs.sample.cc.CCCertificate.Heuristics
. - The following properties were deleted:
['direct_dependency_cves', 'indirect_dependency_cves']
.
- The new value is
-
05.02.2023 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
[]
.
- The errors property was set to
-
26.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The report_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The report_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The report_extract_ok property was set to
True
. - The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0601a_pdf.pdf, code: 408']
. - The st_pdf_hash property was set to
c60a868729348750c98cfafe4717c7cdaafcb14f39af107add33805e216695c9
. - The report_pdf_hash property was set to
2ed5a61256ecc0c53f766c1a9ebacbd7b34c1537d545cbc83b77f5332ddf1558
. - The st_txt_hash property was set to
108caa2a72bfa9a65b3dd760cd589ebf6b3090c4975e12c7b6d648f0f2c1bb73
. - The report_txt_hash property was set to
c3350e060ae4bb8af1304cd6683a8cfa17cef6b6c671f7fc4f076fe43e301f2a
.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 1082440, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 42, '/CreationDate': "D:20100222090038+01'00'", '/Subject': 'Common Criteria Certification', '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/Creator': 'Writer', '/Keywords': 'Zertifizierung, Common Criteria, STARCOS 3.4 Health AHC C1, G&D, Giesecke & Devrient GmbH', '/Producer': 'StarOffice 9', '/ModDate': "D:20100222094506+01'00'", '/Title': 'Certification Report BSI-DSZ-CC-0601-2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://certificates.gi-de.com/', 'https://www.bsi.bund.de/']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 444187, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 72, '/Author': 'Giesecke&Devrient GmbH', '/Comments': 'Final Version', '/Company': 'Giesecke & Devrient', '/CreationDate': "D:20091217144542+01'00'", '/Creator': 'Acrobat PDFMaker 8.1 für Word', '/Keywords': 'Security Target Lite; STARCOS 3.4 Health AHC C1; SSCD', '/ModDate': "D:20091217145337+01'00'", '/Producer': 'Acrobat Distiller 8.1.0 (Windows)', '/SourceModified': 'D:20091217134518', '/Subject': 'Security Target Lite STARCOS 3.4 Health AHC C1, Version 2.3/17.12.09', '/Title': 'Security Target Lite STARCOS 3.4 Health AHC C1, Version 2.3/17.12.09', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'anssi': {}, 'bsi': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0601-2010', 'cert_item': 'STARCOS 3.4 Health AHC C1', 'developer': 'Giesecke & Devrient GmbH', 'cert_lab': 'BSI'}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0601-2010': 40, 'BSI-DSZ-CC-0466-2008': 6}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0059-': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 11, 'EAL 1': 1, 'EAL 7': 1, 'EAL5+': 1, 'EAL1': 6, 'EAL3': 4, 'EAL5': 6, 'EAL7': 4, 'EAL2': 3, 'EAL4': 4, 'EAL6': 3, 'EAL 4 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_COMP.1': 1, 'ADV_ARC.1': 1, 'ADV_FSP.1': 1, 'ADV_FSP.2': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.5': 1, 'ADV_FSP.6': 1, 'ADV_IMP.1': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_INT.2': 1, 'ADV_INT.3': 1, 'ADV_SPM.1': 1, 'ADV_TDS.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.4': 1, 'ADV_TDS.5': 1, 'ADV_TDS.6': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_CMC.1': 1, 'ALC_CMC.2': 1, 'ALC_CMC.3': 1, 'ALC_CMC.4': 2, 'ALC_CMC.5': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 2, 'ALC_CMS.5': 1, 'ALC_DEL.1': 2, 'ALC_DVS.1': 2, 'ALC_DVS.2': 1, 'ALC_FLR.1': 1, 'ALC_FLR.2': 1, 'ALC_FLR.3': 1, 'ALC_LCD.1': 2, 'ALC_LCD.2': 1, 'ALC_TAT.1': 2, 'ALC_TAT.2': 1, 'ALC_TAT.3': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_TAT': 1, 'ALC_COMP.1': 1}, 'ATE': {'ATE_FUN': 3, 'ATE_IND': 3, 'ATE_COV.1': 1, 'ATE_COV.2': 1, 'ATE_COV.3': 1, 'ATE_DPT.1': 1, 'ATE_DPT.2': 1, 'ATE_DPT.3': 1, 'ATE_DPT.4': 1, 'ATE_FUN.1': 1, 'ATE_FUN.2': 1, 'ATE_IND.1': 1, 'ATE_IND.2': 1, 'ATE_IND.3': 1, 'ATE_COV': 1, 'ATE_DPT': 1}, 'AVA': {'AVA_VAN.5': 6, 'AVA_VAN': 4, 'AVA_VAN.1': 1, 'AVA_VAN.2': 1, 'AVA_VAN.3': 1, 'AVA_VAN.4': 1}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP': 9, 'NXP Semiconductors': 1}, 'GD': {'Giesecke & Devrient': 18, 'G&D': 4}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 2, 'TÜViT': 1}}, 'symmetric_crypto': {'DES': {'3DES': {'Triple-DES': 2}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 9}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 5, 'SHA-2': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'DPA': 1, 'SPA': 1}, 'FI': {'physical tampering': 2, 'Malfunction': 1}, 'other': {'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI 7125': 2, 'BSI 7148': 1, 'BSI 7149': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {'STARCOS': {'STARCOS 3': 44}}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 46-3': 2, 'FIPS 180-2': 1}, 'BSI': {'AIS 34': 3, 'AIS 1': 1, 'AIS 14': 1, 'AIS 19': 1, 'AIS 20': 4, 'AIS 25': 2, 'AIS 26': 2, 'AIS 36': 3, 'AIS 37': 2, 'AIS 38': 2, 'AIS 35': 2, 'AIS36': 1, 'AIS 31': 1, 'AIS 32': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, "the cryptographic functionality implemented in the TOE. Hereby, the TOE's SHA-256 functionality was out of scope under the aspect of confidentiality. The primary focus for devising penetration tests was to cover": 1}, 'ConfidentialDocument': {'Version 2.3, 17.12.2009, Security Target STARCOS 3.4 Health AHC C1, Giesecke & Devrient GmbH (confidential document) [7] Security Target BSI-DSZ-CC-0601, Version 2.3, 17.12.2009, Security Target Lite STARCOS 3.4': 1, '8] Evaluation Technical Report STARCOS 3.4 Health AHC C1, Version 3, 17.12.2009, TÜViT GmbH (confidential document) [9] ETR-lite for composition according to AIS 36 for the Product STARCOS 3.4 Health AHC C1': 1, 'composition according to AIS36 / NXP P5CC052V0A Secure Smart Card Controller, T-Systems GEI GmbH (confidential document) [10] Configuration list for the TOE, Version 1.4, 17.12.2009, Configuration List STARCOS 3.4': 1, 'AHC C1 (confidential document) 8 specifically • AIS 20, Version 1, 2. December 1999, Funktionalitätsklassen und': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0466-2008': 4}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002-2001': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 2, 'EAL4+': 1, 'EAL4': 7, 'EAL4 augmented': 4}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 3, 'ADV_FSP.4': 2, 'ADV_IMP.1': 2, 'ADV_TDS.3': 2}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 2, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 6}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1}, 'FCS': {'FCS_CKM.1': 13, 'FCS_CKM.2': 2, 'FCS_COP.1': 7, 'FCS_CKM.4': 11, 'FCS_CKM.1.1': 2, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ITC.1': 4, 'FDP_ITC.2': 4, 'FDP_ACC': 23, 'FDP_ACF.1': 19, 'FDP_ACC.1': 18, 'FDP_ACF': 14, 'FDP_DAU': 6, 'FDP_DAU.1': 1, 'FDP_DAU.2': 3, 'FDP_RIP.1': 6, 'FDP_RIP.1.1': 1, 'FDP_SDI': 11, 'FDP_SDI.1': 2, 'FDP_SDI.2': 5, 'FDP_IFC.1': 8}, 'FIA': {'FIA_API': 6, 'FIA_API.1': 7, 'FIA_API.1.1': 2, 'FIA_UID.1': 13, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 8, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_AFL.1': 5, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1}, 'FMT': {'FMT_MSA.3': 16, 'FMT_SMR.1': 23, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1': 22, 'FMT_SMF.1.1': 1, 'FMT_MOF.1': 6, 'FMT_MOF.1.1': 1, 'FMT_MSA': 11, 'FMT_MSA.1': 5, 'FMT_MSA.2': 6, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.4': 7, 'FMT_MSA.4.1': 3, 'FMT_MTD': 10, 'FMT_MTD.1': 3}, 'FPT': {'FPT_TST.1': 11, 'FPT_FLS.1': 6, 'FPT_FLS.1.1': 1, 'FPT_TST': 2, 'FPT_PHP.1': 6, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3': 6, 'FPT_PHP.3.1': 2, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC': 6, 'FTP_ITC.1': 4, 'FTP_ITC.1.1': 1}}, 'cc_claims': {'A': {'A.CGA': 3, 'A.SCA': 3}, 'OT': {'OT.TOE_SSCD': 12, 'OT.TOE_TC_SVD_EXP': 5}, 'OE': {'OE.HID_VAD': 3, 'OE.CGA_SSCD': 9, 'OE.CGA_TC_SVD': 9}}, 'vendor': {'NXP': {'NXP': 2, 'NXP Semiconductors': 1}, 'GD': {'Giesecke & Devrient': 7, 'G&D': 5}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA2048': 1}, 'ECC': {'ECDSA': {'ECDSA': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-2': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 2, 'DPA': 2, 'timing attacks': 2}, 'FI': {'physical tampering': 13, 'DFA': 1, 'fault injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {'STARCOS': {'STARCOS 3': 95}}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS20': 1, 'AIS 31': 1, 'AIS 20': 1}, 'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
0601a_pdf.pdf
. - The st_filename property was set to
0601b_pdf.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['BSI']
. - The cert_id property was set to
BSI-DSZ-CC-0601-2010
. - The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0466-2008']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0466-2008']}}
data. - The report_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0466-2008']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0466-2008']}}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
.
- The st_download_ok property was set to
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report_download_ok property was set to
False
. - The report_convert_ok property was set to
False
. - The report_extract_ok property was set to
False
. - The errors property was updated, with the
[[0, 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0601a_pdf.pdf, code: nok'], [2, 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0601a_pdf.pdf, code: nok'], [3, 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/0601b_pdf.pdf, code: 408']]
values inserted. - The report_pdf_hash property was set to
None
. - The report_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The report_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was set to
None
.
- The report_download_ok property was set to
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/0601b_pdf.pdf, code: nok']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}]}
values added.
- The st_download_ok property was set to
-
23.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
c60a868729348750c98cfafe4717c7cdaafcb14f39af107add33805e216695c9
. - The st_txt_hash property was set to
108caa2a72bfa9a65b3dd760cd589ebf6b3090c4975e12c7b6d648f0f2c1bb73
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 444187, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 72, '/Author': 'Giesecke&Devrient GmbH', '/Comments': 'Final Version', '/Company': 'Giesecke & Devrient', '/CreationDate': "D:20091217144542+01'00'", '/Creator': 'Acrobat PDFMaker 8.1 für Word', '/Keywords': 'Security Target Lite; STARCOS 3.4 Health AHC C1; SSCD', '/ModDate': "D:20091217145337+01'00'", '/Producer': 'Acrobat Distiller 8.1.0 (Windows)', '/SourceModified': 'D:20091217134518', '/Subject': 'Security Target Lite STARCOS 3.4 Health AHC C1, Version 2.3/17.12.09', '/Title': 'Security Target Lite STARCOS 3.4 Health AHC C1, Version 2.3/17.12.09', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0466-2008': 4}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002-2001': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 2, 'EAL4+': 1, 'EAL4': 7, 'EAL4 augmented': 4}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 3, 'ADV_FSP.4': 2, 'ADV_IMP.1': 2, 'ADV_TDS.3': 2}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 2, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 6}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1}, 'FCS': {'FCS_CKM.1': 13, 'FCS_CKM.2': 2, 'FCS_COP.1': 7, 'FCS_CKM.4': 11, 'FCS_CKM.1.1': 2, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ITC.1': 4, 'FDP_ITC.2': 4, 'FDP_ACC': 23, 'FDP_ACF.1': 19, 'FDP_ACC.1': 18, 'FDP_ACF': 14, 'FDP_DAU': 6, 'FDP_DAU.1': 1, 'FDP_DAU.2': 3, 'FDP_RIP.1': 6, 'FDP_RIP.1.1': 1, 'FDP_SDI': 11, 'FDP_SDI.1': 2, 'FDP_SDI.2': 5, 'FDP_IFC.1': 8}, 'FIA': {'FIA_API': 6, 'FIA_API.1': 7, 'FIA_API.1.1': 2, 'FIA_UID.1': 13, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 8, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_AFL.1': 5, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1}, 'FMT': {'FMT_MSA.3': 16, 'FMT_SMR.1': 23, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1': 22, 'FMT_SMF.1.1': 1, 'FMT_MOF.1': 6, 'FMT_MOF.1.1': 1, 'FMT_MSA': 11, 'FMT_MSA.1': 5, 'FMT_MSA.2': 6, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.4': 7, 'FMT_MSA.4.1': 3, 'FMT_MTD': 10, 'FMT_MTD.1': 3}, 'FPT': {'FPT_TST.1': 11, 'FPT_FLS.1': 6, 'FPT_FLS.1.1': 1, 'FPT_TST': 2, 'FPT_PHP.1': 6, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3': 6, 'FPT_PHP.3.1': 2, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC': 6, 'FTP_ITC.1': 4, 'FTP_ITC.1.1': 1}}, 'cc_claims': {'A': {'A.CGA': 3, 'A.SCA': 3}, 'OT': {'OT.TOE_SSCD': 12, 'OT.TOE_TC_SVD_EXP': 5}, 'OE': {'OE.HID_VAD': 3, 'OE.CGA_SSCD': 9, 'OE.CGA_TC_SVD': 9}}, 'vendor': {'NXP': {'NXP': 2, 'NXP Semiconductors': 1}, 'GD': {'Giesecke & Devrient': 7, 'G&D': 5}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA2048': 1}, 'ECC': {'ECDSA': {'ECDSA': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-2': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 2, 'DPA': 2, 'timing attacks': 2}, 'FI': {'physical tampering': 13, 'DFA': 1, 'fault injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {'STARCOS': {'STARCOS 3': 95}}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS20': 1, 'AIS 31': 1, 'AIS 20': 1}, 'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
0601b_pdf.pdf
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0466-2008']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0466-2008']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}]}
values added.
- The st_download_ok property was set to
-
23.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0601a_pdf.pdf, code: 408', 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/0601b_pdf.pdf, code: nok']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}]}
values added.
- The st_download_ok property was set to
-
05.10.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'st_convert_garbage': False, 'report_convert_garbage': False}
.
- The following values were inserted:
-
24.09.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The following values were inserted:
{'report_filename': '0601a_pdf.pdf', 'st_filename': '0601b_pdf.pdf'}
. - The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0601-2010': 40, 'BSI-DSZ-CC-0466-2008': 6}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL2': 3, 'EAL4': 4, 'EAL6': 3}}}}, 'cc_sar': {'__update__': {'ALC': {'__delete__': ['ALC_LCD']}, 'ATE': {'__update__': {'ATE_FUN': 3}}, 'AVA': {'__update__': {'AVA_VAN.5': 6, 'AVA_VAN': 4}}}}, 'vendor': {'__update__': {'GD': {'__update__': {'Giesecke & Devrient': 18}}}}, 'symmetric_crypto': {'__update__': {'DES': {'__delete__': ['DES']}}}, 'asymmetric_crypto': {'__delete__': ['FF']}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'SPA': 1, 'DPA': 1}}}}, 'tee_name': {}, 'os_name': {'__update__': {'STARCOS': {'STARCOS 3': 44}}}, 'standard_id': {'__update__': {'BSI': {'__update__': {'AIS 38': 2}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__delete__': [". Hereby, the TOE's SHA-256 functionality was out of scope under the aspect of confidentiality"]}, 'ConfidentialDocument': {'Version 2.3, 17.12.2009, Security Target STARCOS 3.4 Health AHC C1, Giesecke & Devrient GmbH (confidential document) [7] Security Target BSI-DSZ-CC-0601, Version 2.3, 17.12.2009, Security Target Lite STARCOS 3.4': 1, '8] Evaluation Technical Report STARCOS 3.4 Health AHC C1, Version 3, 17.12.2009, TÜViT GmbH (confidential document) [9] ETR-lite for composition according to AIS 36 for the Product STARCOS 3.4 Health AHC C1': 1, 'composition according to AIS36 / NXP P5CC052V0A Secure Smart Card Controller, T-Systems GEI GmbH (confidential document) [10] Configuration list for the TOE, Version 1.4, 17.12.2009, Configuration List STARCOS 3.4': 1, 'AHC C1 (confidential document) 8 specifically • AIS 20, Version 1, 2. December 1999, Funktionalitätsklassen und': 1}}}}
data. - The st_keywords property was updated, with the
{'cc_security_level': {'__update__': {'EAL': {'__insert__': {'EAL4+': 1}, '__update__': {'EAL4 augmented': 4}}}}, 'cc_sfr': {'__update__': {'FCS': {'__update__': {'FCS_COP.1': 7, 'FCS_CKM.4': 11}}, 'FDP': {'__insert__': {'FDP_ACC': 23, 'FDP_ACF': 14, 'FDP_DAU': 6, 'FDP_SDI': 11}, '__update__': {'FDP_ACF.1': 19, 'FDP_ACC.1': 18, 'FDP_SDI.2': 5, 'FDP_DAU.2': 3}}, 'FIA': {'__update__': {'FIA_API': 6, 'FIA_API.1': 7, 'FIA_UID.1': 13, 'FIA_UAU.1': 8, 'FIA_AFL.1': 5}}, 'FMT': {'__insert__': {'FMT_MSA': 11, 'FMT_MTD': 10}, '__update__': {'FMT_SMR.1': 23, 'FMT_SMF.1': 22, 'FMT_MSA.2': 6, 'FMT_MSA.1': 5, 'FMT_MSA.4.1': 3, 'FMT_MTD.1': 3}}, 'FTP': {'__insert__': {'FTP_ITC': 6}, '__update__': {'FTP_ITC.1': 4}}}}, 'cc_claims': {'__update__': {'OT': {'__update__': {'OT.TOE_TC_SVD_EXP': 5}}, 'OE': {'__update__': {'OE.CGA_TC_SVD': 9}, '__delete__': ['OE']}}, '__delete__': ['T']}, 'vendor': {'__update__': {'GD': {'__update__': {'G&D': 5}}}}, 'asymmetric_crypto': {'__delete__': ['FF']}, 'side_channel_analysis': {'__update__': {'FI': {'__update__': {'physical tampering': 13}}}}, 'os_name': {'__update__': {'STARCOS': {'STARCOS 3': 95}}}}
data.
- The following values were inserted:
-
28.07.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_extract_ok property was set to
True
. - The errors property was set to
[]
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 444187, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 72, '/Author': 'Giesecke&Devrient GmbH', '/Comments': 'Final Version', '/Company': 'Giesecke & Devrient', '/CreationDate': "D:20091217144542+01'00'", '/Creator': 'Acrobat PDFMaker 8.1 für Word', '/Keywords': 'Security Target Lite; STARCOS 3.4 Health AHC C1; SSCD', '/ModDate': "D:20091217145337+01'00'", '/Producer': 'Acrobat Distiller 8.1.0 (Windows)', '/SourceModified': 'D:20091217134518', '/Subject': 'Security Target Lite STARCOS 3.4 Health AHC C1, Version 2.3/17.12.09', '/Title': 'Security Target Lite STARCOS 3.4 Health AHC C1, Version 2.3/17.12.09', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
.
- The st_extract_ok property was set to
-
18.07.2022 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.common_criteria.CommonCriteriaCert
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData
.
The computed heuristics were updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics
. - The st_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The report_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
.
- The new value is
-
17.07.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_extract_ok property was set to
False
. - The errors property was set to
['Failed to read metadata of certs/targets/pdf/541da571bac5e279.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/541da571bac5e279.pdf, error: can only concatenate list (not "IndirectObject") to list']
.
The PDF extraction data was updated.
- The report_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://certificates.gi-de.com/', 'https://www.bsi.bund.de/']}}
values inserted. - The st_metadata property was set to
None
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0601-2010': 80, 'BSI-DSZ-CC-0466-2008': 4}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0059-': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 11, 'EAL 1': 1, 'EAL 7': 1, 'EAL5+': 1, 'EAL1': 6, 'EAL2': 4, 'EAL3': 4, 'EAL4': 5, 'EAL5': 6, 'EAL6': 4, 'EAL7': 4, 'EAL 4 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_COMP.1': 1, 'ADV_ARC.1': 1, 'ADV_FSP.1': 1, 'ADV_FSP.2': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.5': 1, 'ADV_FSP.6': 1, 'ADV_IMP.1': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_INT.2': 1, 'ADV_INT.3': 1, 'ADV_SPM.1': 1, 'ADV_TDS.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.4': 1, 'ADV_TDS.5': 1, 'ADV_TDS.6': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_CMC.1': 1, 'ALC_CMC.2': 1, 'ALC_CMC.3': 1, 'ALC_CMC.4': 2, 'ALC_CMC.5': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 2, 'ALC_CMS.5': 1, 'ALC_DEL.1': 2, 'ALC_DVS.1': 2, 'ALC_DVS.2': 1, 'ALC_FLR.1': 1, 'ALC_FLR.2': 1, 'ALC_FLR.3': 1, 'ALC_LCD.1': 2, 'ALC_LCD.2': 1, 'ALC_TAT.1': 2, 'ALC_TAT.2': 1, 'ALC_TAT.3': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1, 'ALC_COMP.1': 1}, 'ATE': {'ATE_IND': 3, 'ATE_FUN': 2, 'ATE_COV.1': 1, 'ATE_COV.2': 1, 'ATE_COV.3': 1, 'ATE_DPT.1': 1, 'ATE_DPT.2': 1, 'ATE_DPT.3': 1, 'ATE_DPT.4': 1, 'ATE_FUN.1': 1, 'ATE_FUN.2': 1, 'ATE_IND.1': 1, 'ATE_IND.2': 1, 'ATE_IND.3': 1, 'ATE_COV': 1, 'ATE_DPT': 1}, 'AVA': {'AVA_VAN.5': 5, 'AVA_VAN': 3, 'AVA_VAN.1': 1, 'AVA_VAN.2': 1, 'AVA_VAN.3': 1, 'AVA_VAN.4': 1}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP': 9, 'NXP Semiconductors': 1}, 'GD': {'Giesecke & Devrient': 17, 'G&D': 4}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 2, 'TÜViT': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 2}, '3DES': {'Triple-DES': 2}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 9}}, 'FF': {'DSA': {'DSA': 9}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 5, 'SHA-2': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 2, 'DPA': 2}, 'FI': {'physical tampering': 2, 'Malfunction': 1}, 'other': {'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI 7125': 2, 'BSI 7148': 1, 'BSI 7149': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {'STARCOS': {'STARCOS 3.4': 44}}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 46-3': 2, 'FIPS 180-2': 1}, 'BSI': {'AIS 34': 3, 'AIS 1': 1, 'AIS 14': 1, 'AIS 19': 1, 'AIS 20': 4, 'AIS 25': 2, 'AIS 26': 2, 'AIS 36': 3, 'AIS 37': 2, 'AIS 35': 2, 'AIS36': 1, 'AIS 31': 1, 'AIS 32': 1, 'AIS 38': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, ". Hereby, the TOE's SHA-256 functionality was out of scope under the aspect of confidentiality": 1, "the cryptographic functionality implemented in the TOE. Hereby, the TOE's SHA-256 functionality was out of scope under the aspect of confidentiality. The primary focus for devising penetration tests was to cover": 1}, 'ConfidentialDocument': {'0601, Version 2.3, 17.12.2009, Security Target STARCOS 3.4 Health AHC C1, Giesecke & Devrient GmbH (confidential document) [7] Security Target BSI-DSZ-CC-0601, Version 2.3, 17.12.2009, Security Target Lite STARCOS 3.4': 1, 'ment) [8] Evaluation Technical Report STARCOS 3.4 Health AHC C1, Version 3, 17.12.2009, TÜViT GmbH (confidential document) [9] ETR-lite for composition according to AIS 36 for the Product STARCOS 3.4 Health AHC C1': 1, 'r composition according to AIS36 / NXP P5CC052V0A Secure Smart Card Controller, T-Systems GEI GmbH (confidential document) [10] Configuration list for the TOE, Version 1.4, 17.12.2009, Configuration List STARCOS 3.4': 1, 'Health AHC C1 (confidential document) 8 specifically • AIS 20, Version 1, 2. December 1999, Funktionalitätsklassen und': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0466-2008': 4}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002-2001': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 2, 'EAL4': 7, 'EAL4 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 3, 'ADV_FSP.4': 2, 'ADV_IMP.1': 2, 'ADV_TDS.3': 2}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 2, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 6}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1}, 'FCS': {'FCS_CKM.1': 13, 'FCS_CKM.2': 2, 'FCS_COP.1': 9, 'FCS_CKM.4': 12, 'FCS_CKM.1.1': 2, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ITC.1': 4, 'FDP_ITC.2': 4, 'FDP_ACF.1': 7, 'FDP_ACC.1': 15, 'FDP_DAU.1': 1, 'FDP_RIP.1': 6, 'FDP_RIP.1.1': 1, 'FDP_SDI.1': 2, 'FDP_IFC.1': 8, 'FDP_SDI.2': 1, 'FDP_DAU.2': 1}, 'FIA': {'FIA_API': 3, 'FIA_API.1': 6, 'FIA_API.1.1': 2, 'FIA_UID.1': 16, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 9, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_AFL.1': 4, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1}, 'FMT': {'FMT_MSA.3': 16, 'FMT_SMR.1': 26, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1': 23, 'FMT_SMF.1.1': 1, 'FMT_MOF.1': 6, 'FMT_MOF.1.1': 1, 'FMT_MSA.2': 7, 'FMT_MSA.2.1': 1, 'FMT_MSA.1': 4, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.4': 7, 'FMT_MSA.4.1': 2, 'FMT_MTD.1': 1}, 'FPT': {'FPT_TST.1': 11, 'FPT_FLS.1': 6, 'FPT_FLS.1.1': 1, 'FPT_TST': 2, 'FPT_PHP.1': 6, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3': 6, 'FPT_PHP.3.1': 2, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC.1.1': 1, 'FTP_ITC.1': 1}}, 'cc_claims': {'T': {'T.TOE_SSCD': 12, 'T.TOE_TC_SVD_EXP': 8}, 'A': {'A.CGA': 3, 'A.SCA': 3}, 'OT': {'OT.TOE_SSCD': 12, 'OT.TOE_TC_SVD_EXP': 8}, 'OE': {'OE': 2, 'OE.HID_VAD': 3, 'OE.CGA_SSCD': 9, 'OE.CGA_TC_SVD': 10}}, 'vendor': {'NXP': {'NXP': 2, 'NXP Semiconductors': 1}, 'GD': {'Giesecke & Devrient': 7, 'G&D': 7}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA2048': 1}, 'ECC': {'ECDSA': {'ECDSA': 2}}, 'FF': {'DSA': {'DSA': 6}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-2': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 2, 'DPA': 2, 'timing attacks': 2}, 'FI': {'physical tampering': 11, 'DFA': 1, 'fault injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {'STARCOS': {'STARCOS 3.4': 95}}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS20': 1, 'AIS 31': 1, 'AIS 20': 1}, 'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
.
The computed heuristics were updated.
- The _type property was set to
Heuristics
.
- The st_extract_ok property was set to
-
14.06.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report_pdf_hash': '2ed5a61256ecc0c53f766c1a9ebacbd7b34c1537d545cbc83b77f5332ddf1558', 'st_pdf_hash': 'c60a868729348750c98cfafe4717c7cdaafcb14f39af107add33805e216695c9', 'report_txt_hash': 'c3350e060ae4bb8af1304cd6683a8cfa17cef6b6c671f7fc4f076fe43e301f2a', 'st_txt_hash': '108caa2a72bfa9a65b3dd760cd589ebf6b3090c4975e12c7b6d648f0f2c1bb73'}
.
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'rules_symmetric_crypto': {'DES': 2}, 'rules_asymmetric_crypto': {'ECDSA': 9, 'DSA': 9}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-256': 5}, 'rules_crypto_schemes': {}, 'rules_randomness': {'RNG': 1}, 'rules_tee': {'SE': 1}, 'rules_side_channels': {'Malfunction': 1, 'physical tampering': 2, 'SPA': 1, 'DPA': 2}}
values inserted. - The st_keywords property was updated, with the
{'rules_symmetric_crypto': {'DES': 1}, 'rules_asymmetric_crypto': {'RSA2048': 1, 'ECDSA': 2, 'DSA': 6}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {'physical tampering': 11, 'SPA': 2, 'DPA': 2, 'DFA': 1, 'fault injection': 1, 'timing attacks': 2}}
values inserted.
- The following values were inserted:
-
13.05.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_COMP', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}]}}
.
- The following values were inserted:
-
24.04.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'direct_dependency_cves': None, 'indirect_dependency_cves': None}
.
- The following values were inserted:
-
08.03.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0466-2008']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0466-2008']}}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0466-2008']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0466-2008']}}}
. - The following properties were deleted:
['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting']
.
- The following values were inserted:
-
18.02.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted. - The st_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted.
The computed heuristics were updated.
- The extracted_versions property was set to
{'_type': 'Set', 'elements': ['3.4']}
.
- The report_frontpage property was updated, with the
-
28.01.2022 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name STARCOS 3.4 Health AHC C1 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Products for Digital Signatures",
"cert_link": null,
"dgst": "541da571bac5e279",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"cert_id": "BSI-DSZ-CC-0601-2010",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_REQ",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"3.4"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0466-2008"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0466-2008"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0466-2008"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0466-2008"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "G+D Mobile Security GmbH",
"manufacturer_web": "https://www.gi-de.com/de/de/mobile-security/",
"name": "STARCOS 3.4 Health AHC C1",
"not_valid_after": "2019-09-01",
"not_valid_before": "2010-01-25",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"report_filename": "0601a_pdf.pdf",
"report_frontpage": {
"anssi": {},
"bsi": {
"cert_id": "BSI-DSZ-CC-0601-2010",
"cert_item": "STARCOS 3.4 Health AHC C1",
"cert_lab": "BSI",
"developer": "Giesecke \u0026 Devrient GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
]
},
"canada": {},
"niap": {},
"nscib": {}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 9
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0466-2008": 6,
"BSI-DSZ-CC-0601-2010": 40
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0059-": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_COMP.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 1,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 1,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 2,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 2,
"ALC_CMS.5": 1,
"ALC_COMP.1": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 2,
"ALC_DVS": 1,
"ALC_DVS.1": 2,
"ALC_DVS.2": 1,
"ALC_FLR": 1,
"ALC_FLR.1": 1,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 2,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 2,
"ALC_TAT.2": 1,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_COV.3": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 1,
"ATE_DPT.4": 1,
"ATE_FUN": 3,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND": 3,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 4,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 4": 11,
"EAL 4 augmented": 3,
"EAL 7": 1,
"EAL1": 6,
"EAL2": 3,
"EAL3": 4,
"EAL4": 4,
"EAL5": 6,
"EAL5+": 1,
"EAL6": 3,
"EAL7": 4
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"8] Evaluation Technical Report STARCOS 3.4 Health AHC C1, Version 3, 17.12.2009, T\u00dcViT GmbH (confidential document) [9] ETR-lite for composition according to AIS 36 for the Product STARCOS 3.4 Health AHC C1": 1,
"AHC C1 (confidential document) 8 specifically \u2022 AIS 20, Version 1, 2. December 1999, Funktionalit\u00e4tsklassen und": 1,
"Version 2.3, 17.12.2009, Security Target STARCOS 3.4 Health AHC C1, Giesecke \u0026 Devrient GmbH (confidential document) [7] Security Target BSI-DSZ-CC-0601, Version 2.3, 17.12.2009, Security Target Lite STARCOS 3.4": 1,
"composition according to AIS36 / NXP P5CC052V0A Secure Smart Card Controller, T-Systems GEI GmbH (confidential document) [10] Configuration list for the TOE, Version 1.4, 17.12.2009, Configuration List STARCOS 3.4": 1
},
"OutOfScope": {
"out of scope": 1,
"the cryptographic functionality implemented in the TOE. Hereby, the TOE\u0027s SHA-256 functionality was out of scope under the aspect of confidentiality. The primary focus for devising penetration tests was to cover": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 2,
"T\u00dcViT": 1
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-2": 1,
"SHA-256": 5
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"STARCOS": {
"STARCOS 3": 44
}
},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 1,
"physical tampering": 2
},
"SCA": {
"DPA": 1,
"SPA": 1
},
"other": {
"JIL": 4
}
},
"standard_id": {
"BSI": {
"AIS 1": 1,
"AIS 14": 1,
"AIS 19": 1,
"AIS 20": 4,
"AIS 25": 2,
"AIS 26": 2,
"AIS 31": 1,
"AIS 32": 1,
"AIS 34": 3,
"AIS 35": 2,
"AIS 36": 3,
"AIS 37": 2,
"AIS 38": 2,
"AIS36": 1
},
"FIPS": {
"FIPS 180-2": 1,
"FIPS 46-3": 2
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"Triple-DES": 2
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7148": 1,
"BSI 7149": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"GD": {
"G\u0026D": 4,
"Giesecke \u0026 Devrient": 18
},
"NXP": {
"NXP": 9,
"NXP Semiconductors": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20100222090038+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "Zertifizierung, Common Criteria, STARCOS 3.4 Health AHC C1, G\u0026D, Giesecke \u0026 Devrient GmbH",
"/ModDate": "D:20100222094506+01\u002700\u0027",
"/Producer": "StarOffice 9",
"/Subject": "Common Criteria Certification",
"/Title": "Certification Report BSI-DSZ-CC-0601-2010",
"pdf_file_size_bytes": 1082440,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.bsi.bund.de/",
"https://certificates.gi-de.com/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 42
},
"st_filename": "0601b_pdf.pdf",
"st_frontpage": {
"anssi": {},
"bsi": {},
"canada": {},
"niap": {},
"nscib": {}
},
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 2
}
},
"RSA": {
"RSA2048": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0466-2008": 4
}
},
"cc_claims": {
"A": {
"A.CGA": 3,
"A.SCA": 3
},
"OE": {
"OE.CGA_SSCD": 9,
"OE.CGA_TC_SVD": 9,
"OE.HID_VAD": 3
},
"OT": {
"OT.TOE_SSCD": 12,
"OT.TOE_TC_SVD_EXP": 5
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002-2001": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 3,
"ADV_FSP.4": 2,
"ADV_IMP.1": 2,
"ADV_TDS.3": 2
},
"AGD": {
"AGD_OPE.1": 2,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 2,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 2,
"EAL4": 7,
"EAL4 augmented": 4,
"EAL4+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1
},
"FCS": {
"FCS_CKM.1": 13,
"FCS_CKM.1.1": 2,
"FCS_CKM.2": 2,
"FCS_CKM.4": 11,
"FCS_CKM.4.1": 1,
"FCS_COP.1": 7,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC": 23,
"FDP_ACC.1": 18,
"FDP_ACF": 14,
"FDP_ACF.1": 19,
"FDP_DAU": 6,
"FDP_DAU.1": 1,
"FDP_DAU.2": 3,
"FDP_IFC.1": 8,
"FDP_ITC.1": 4,
"FDP_ITC.2": 4,
"FDP_RIP.1": 6,
"FDP_RIP.1.1": 1,
"FDP_SDI": 11,
"FDP_SDI.1": 2,
"FDP_SDI.2": 5
},
"FIA": {
"FIA_AFL.1": 5,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_API": 6,
"FIA_API.1": 7,
"FIA_API.1.1": 2,
"FIA_UAU.1": 8,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UID.1": 13,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MOF.1": 6,
"FMT_MOF.1.1": 1,
"FMT_MSA": 11,
"FMT_MSA.1": 5,
"FMT_MSA.2": 6,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 16,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MSA.4": 7,
"FMT_MSA.4.1": 3,
"FMT_MTD": 10,
"FMT_MTD.1": 3,
"FMT_SMF.1": 22,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 23,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS.1": 6,
"FPT_FLS.1.1": 1,
"FPT_PHP.1": 6,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_PHP.3": 6,
"FPT_PHP.3.1": 2,
"FPT_TST": 2,
"FPT_TST.1": 11,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC": 6,
"FTP_ITC.1": 4,
"FTP_ITC.1.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-2": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"STARCOS": {
"STARCOS 3": 95
}
},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"DFA": 1,
"fault injection": 1,
"physical tampering": 13
},
"SCA": {
"DPA": 2,
"SPA": 2,
"timing attacks": 2
}
},
"standard_id": {
"BSI": {
"AIS 20": 1,
"AIS 31": 1,
"AIS20": 1
},
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"GD": {
"G\u0026D": 5,
"Giesecke \u0026 Devrient": 7
},
"NXP": {
"NXP": 2,
"NXP Semiconductors": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Giesecke\u0026Devrient GmbH",
"/Comments": "Final Version",
"/Company": "Giesecke \u0026 Devrient",
"/CreationDate": "D:20091217144542+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 8.1 f\u00fcr Word",
"/Keywords": "Security Target Lite; STARCOS 3.4 Health AHC C1; SSCD",
"/ModDate": "D:20091217145337+01\u002700\u0027",
"/Producer": "Acrobat Distiller 8.1.0 (Windows)",
"/SourceModified": "D:20091217134518",
"/Subject": "Security Target Lite STARCOS 3.4 Health AHC C1, Version 2.3/17.12.09",
"/Title": "Security Target Lite STARCOS 3.4 Health AHC C1, Version 2.3/17.12.09",
"pdf_file_size_bytes": 444187,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 72
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/0601a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/0601b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"report_convert_garbage": false,
"report_convert_ok": true,
"report_download_ok": true,
"report_extract_ok": true,
"report_pdf_hash": "2ed5a61256ecc0c53f766c1a9ebacbd7b34c1537d545cbc83b77f5332ddf1558",
"report_txt_hash": "c3350e060ae4bb8af1304cd6683a8cfa17cef6b6c671f7fc4f076fe43e301f2a",
"st_convert_garbage": false,
"st_convert_ok": true,
"st_download_ok": true,
"st_extract_ok": true,
"st_pdf_hash": "c60a868729348750c98cfafe4717c7cdaafcb14f39af107add33805e216695c9",
"st_txt_hash": "108caa2a72bfa9a65b3dd760cd589ebf6b3090c4975e12c7b6d648f0f2c1bb73"
},
"status": "archived"
}