SMGW Version 1.1

CSV information ?

Status active
Valid from 30.10.2020
Valid until 29.10.2025
Scheme 🇩🇪 DE
Manufacturer OpenLimit SignCubes AG
Category Other Devices and Systems
Security level EAL4+, AVA_VAN.5, ALC_FLR.2
Protection profiles

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0831-V2-2020

Certification report ?

Extracted keywords

Symmetric Algorithms
CMAC
Asymmetric Algorithms
ECC
Hash functions
SHA-256, SHA-384, SHA-512, SHA2
Protocols
SSH, TLS

Security level
EAL 4, EAL 5, EAL 2, EAL 1, EAL 2+, EAL 5+, EAL 6, EAL 4 augmented
Security Assurance Requirements (SAR)
ALC_FLR.2, ALC_FLR, AVA_VAN.5
Protection profiles
BSI-CC-PP-0073-2014
Certificates
BSI-DSZ-CC-0831-2018, BSI-DSZ-CC-0831-V2-2020, BSI-DSZ-CC-0957-V2-2016
Evaluation facilities
TÜV Informationstechnik
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Version 1.1 [7] Evaluation Technical Report, Version 2, 2020-10-27, TÜV Informationstechnik GmbH (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, 9] Configuration list for the TOE, EVG-CM-List, 2020-10-08 (confidential document) [10] Handbuch für Verbraucher, SMGW Version 1.1, Version 4.2, 2020-09-16 [11] Handbuch für

Side-channel analysis
physical tampering
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Version 1.1 [7] Evaluation Technical Report, Version 2, 2020-10-27, TÜV Informationstechnik GmbH (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, 9] Configuration list for the TOE, EVG-CM-List, 2020-10-08 (confidential document) [10] Handbuch für Verbraucher, SMGW Version 1.1, Version 4.2, 2020-09-16 [11] Handbuch für

Standards
FIPS180-4, AIS 34, AIS 46, AIS 1, AIS 32, AIS 38, AIS 48, RFC3565, RFC5652, RFC6033, RFC4493, RFC5084, RFC5246, RFC5288, RFC2104, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065
Technical reports
BSI TR-02102-1, BSI TR-03109-1, BSI TR-03116-3, BSI 7148

File metadata

Title: Certification Report BSI-DSZ-CC-0831-V2-2020
Subject: Certification Report
Keywords: "Common Criteria, Certification, Zertifizierung, OpenLimit SignCubes GmbH, PPC, Power Plus Communications AG, SMGW, Smartmeter Gateway, SmartGrid"
Author: Bundesamt für Sicherheit in der Informationstechnik
Creation date: D:20201110142122+01'00'
Modification date: D:20201110143928+01'00'
Pages: 24
Creator: Writer
Producer: LibreOffice 6.3

Frontpage

Certificate ID: BSI-DSZ-CC-0831-V2-2020
Certified item: SMGW, Version 1.1
Certification lab: BSI
Developer: OpenLimit SignCubes GmbH sponsored by Power Plus Communications AG

References

Outgoing Incoming

Security target ?

Extracted keywords

Symmetric Algorithms
AES, CMAC
Asymmetric Algorithms
ECDSA, ECC, Diffie-Hellman
Hash functions
SHA-256, SHA-384, SHA-512
Schemes
MAC
Protocols
TLS, TLS 1.2, PACE
Elliptic Curves
P-256, P-384, NIST P-256, NIST P-384
Block cipher modes
CBC, GCM, XTS
TLS cipher suites
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384

Security level
EAL 4+, EAL4, EAL 4, EAL4 augmented, EAL 4 augmented
Claims
OE.SM, OSP.SM
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_IMP.1, AGD_GWA, AGD_SEC, AGD_OPE.1, ALC_FLR.2, ALC_CMC.4, ALC_DEL.1, ALC_LCD.1, ATE_COV.2, ATE_FUN.1, AVA_VAN.5, ASE_CCL.1, ASE_INT.1, ASE_REQ.2, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP, FAU_GEN, FAU_SAA, FAU_SAR, FAU_STG, FAU_GEN.2, FAU_STG.2, FAU_ARP.1, FAU_SAA.1, FAU_GEN.1, FAU_SAA.1.1, FAU_SAR.1, FAU_STG.4, FAU_STG.3, FAU_STG.1, FAU_GEN.2.1, FAU_STG.2.1, FAU_STG.2.2, FAU_STG.2.3, FCO_NRO, FCO_NRO.2, FCO_NRO.2.1, FCO_NRO.2.2, FCO_NRO.2.3, FCO_NRO.1, FCS_CKM, FCS_COP, FCS_CKM.4, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4.1, FDP_IFC, FDP_ACC.2, FDP_ACF.1, FDP_IFF, FDP_RIP.2, FDP_SDI.2, FDP_ITC.1, FDP_ITC.2, FDP_ACC, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACC.1, FDP_ACF, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.2, FDP_IFC.1, FDP_IFF.1, FDP_IFF.1.3, FDP_RIP, FDP_RIP.2.1, FDP_RIP.1, FDP_SDI, FDP_SDI.2.1, FDP_SDI.2.2, FDP_SDI.1, FIA_UAU.6, FIA_ATD, FIA_AFL, FIA_UAU, FIA_UID, FIA_USB, FIA_ATD.1, FIA_AFL.1, FIA_UAU.2, FIA_UAU.5, FIA_UID.2, FIA_USB.1, FIA_UID.1, FIA_ATD.1.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1, FIA_UAU.2.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6.1, FIA_UID.2.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_SMR, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA, FMT_MSA.3, FMT_MOF, FMT_MOF.1.1, FMT_SMF, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.1, FPR_CON, FPR_CON.1, FPR_PSE, FPR_CON.1.2, FPR_CON.1.1, FPR_PSE.1, FPR_PSE.1.1, FPR_PSE.1.2, FPR_PSE.1.3, FPT_FLS, FPT_RPL, FPT_STM, FPT_TST, FPT_PHP, FPT_FLS.1, FPT_RPL.1, FPT_STM.1, FPT_TST.1, FPT_PHP.1, FPT_FLS.1.1, FPT_RPL.1.1, FPT_RPL.1.2, FPT_STM.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.1.1, FPT_PHP.1.2, FTP_ITC, FTP_ITC.1

Side-channel analysis
physical tampering, malfunction

Standards
FIPS 140-3, FIPS 180-4, FIPS 197, RFC 5246, RFC 2104, RFC 5639, RFC 5114, RFC 5289, RFC 3565, RFC 4493, RFC 5084, RFC 5652, RFC 3394, RFC 7616, RFC 2616, RFC 5083, ISO/IEC 10116:2006, X.509, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003
Technical reports
BSI TR-02102, BSI TR-03109, BSI TR-03109-1, BSI TR-03109-2, BSI TR-03109-3, BSI TR-03109-4, BSI TR-03109-6, BSI TR-03111, BSI TR-03116-3

File metadata

Title: Security Target SMGW Version 1.1
Keywords: Security Target SMGW Version 1.1
Author: Stefan Dörpinghaus
Creation date: D:20201124181309+01'00'
Modification date: D:20201124181309+01'00'
Pages: 154
Creator: Microsoft® Word für Microsoft 365
Producer: Microsoft® Word für Microsoft 365

References

Outgoing
Incoming

Heuristics ?

Certificate ID: BSI-DSZ-CC-0831-V2-2020

Extracted SARs

ASE_CCL.1, ALC_LCD.1, ASE_TSS.1, AVA_VAN.5, ADV_IMP.1, ASE_REQ.2, ATE_COV.2, ALC_FLR.2, ADV_ARC.1, ATE_FUN.1, ASE_INT.1, ALC_DEL.1, AGD_OPE.1, ALC_CMC.4

References ?

Updates ?

  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name SMGW Version 1.1 was processed.

  • 01.02.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Protection Profile for the Gateway of a Smart Metering System', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0073b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['SMARTMETERGATEWAYPP_V1.3']}}]}.
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['1.1']}.
    • The directly_affected_by property was set to {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0831-V3-2021']}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0957-V2-2016']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0957-V2', 'BSI-DSZ-CC-0957-V2-2016', 'BSI-DSZ-CC-0978-2016']}}, 'report_references': {'_type': 'References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0831-V3-2021']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0831-V3-2021', 'BSI-DSZ-CC-0831-V4-2021']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0957-V2-2016', 'BSI-DSZ-CC-0831-2018']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0978-2016', 'BSI-DSZ-CC-00845-V2-2013', 'BSI-DSZ-CC-0957-2015', 'BSI-DSZ-CC-0957-V2-2016', 'BSI-DSZ-CC-0831-2018', 'BSI-DSZ-CC-0666-2012', 'BSI-DSZ-CC-0845-2012', 'BSI-DSZ-CC-0845-V2', 'BSI-DSZ-CC-0845-V2-2013']}}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}]}}.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '8261126d8faf8050c4b744fc80229fbf59837727fe1d839f162e52c291406f17', 'st_pdf_hash': '805211a1bf75660c1f91655358d59d3c6813b3e2c5f334410f80a8b29519bc2b', 'report_txt_hash': 'c7805980e36de475ab419d2f27fc85fd0bd9e981d3b371c37035738a46e6e273', 'st_txt_hash': '7da74e9f74b9eec952bf76b70b477f580d91e89c175da43cd7949c82743ec079'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {'ECC': 2}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-256': 1, 'SHA-384': 1, 'SHA-512': 1, 'SHA256': 2, 'SHA384': 2}, 'rules_crypto_schemes': {'MAC': 4, 'TLS': 5}, 'rules_randomness': {}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {'physical tampering': 1}} values inserted.
    • The st_keywords property was updated, with the {'rules_block_cipher_modes': {'__insert__': {'CCM': 1, 'XTS': 2}}, 'rules_ecc_curves': {'__insert__': {'NIST P-256': 2, 'NIST P-384': 2}}} data.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/zertifizierungsreporte', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/AIS', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/zertifizierung', 'https://service.ppc-ag.de/', 'https://www.sogis.eu/']}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.rfc-editor.org/rfc/rfc4493.txt', 'http://rfc-editor.org/rfc/rfc7616.txt', 'http://www.ietf.org/rfc/rfc5289.txt', 'http://rfc-editor.org/rfc/rfc3565.txt', 'http://fc12.ifca.ai/pre-proceedings/paper_49.pdf', 'http://de.wikipedia.org/wiki/Open_Metering_System', 'http://rfc-editor.org/rfc/rfc2104.txt', 'http://www.ietf.org/rfc/rfc5114.txt', 'http://rfc-editor.org/rfc/rfc2616.txt', 'http://www.usb.org/developers/docs/usb20_docs/%23usb20spec', 'http://www.ietf.org/rfc/rfc5084.txt', 'http://www.ietf.org/rfc/rfc5246.txt', 'http://rfc-editor.org/rfc/rfc3394.txt', 'http://www.ietf.org/rfc/rfc5639.txt', 'http://www.ietf.org/rfc/rfc5652.txt', 'http://www.ietf.org/rfc/rfc5083.txt', 'http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf', 'http://de.wikipedia.org/wiki/Ethernet', 'http://en.wikipedia.org/wiki/Network_interface_device']}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0831-2018': 4, 'BSI-DSZ-CC-0831-V2-2020': 48, 'BSI-DSZ-CC-0957-V2-2016': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0073-2014': 3}}, 'cc_security_level': {'EAL': {'EAL 4': 7, 'EAL 5': 3, 'EAL 2': 2, 'EAL 1': 1, 'EAL 2+': 1, 'EAL 5+': 1, 'EAL 6': 1, 'EAL 4 augmented': 3}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 3, 'ALC_FLR': 3}, 'AVA': {'AVA_VAN.5': 5}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 3}}, 'symmetric_crypto': {'constructions': {'MAC': {'CMAC': 4}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 1, 'SHA-384': 1, 'SHA-512': 1, 'SHA256': 2, 'SHA384': 2, 'SHA2': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 4}, 'KA': {'KA': 1}}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'TLS': {'TLS': 5}}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 1}, 'GCM': {'GCM': 2}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 1}}, 'technical_report_id': {'BSI': {'BSI TR-02102-1': 2, 'BSI TR-03109-1': 1, 'BSI TR-03116-3': 1, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS180-4': 3}, 'BSI': {'AIS 34': 2, 'AIS 46': 2, 'AIS 1': 1, 'AIS 32': 1, 'AIS 38': 1, 'AIS 48': 1}, 'RFC': {'RFC3565': 1, 'RFC5652': 2, 'RFC6033': 1, 'RFC4493': 3, 'RFC5084': 1, 'RFC5246': 4, 'RFC5288': 1, 'RFC2104': 2}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 17065': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'identiality being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'W Version 1.1 [7] Evaluation Technical Report, Version 2, 2020-10-27, TÜV Informationstechnik GmbH (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014': 1, 'BSI-CC-PP-0073-2014 [9] Configuration list for the TOE, EVG-CM-List, 2020-10-08 (confidential document) [10] Handbuch für Verbraucher, SMGW Version 1.1, Version 4.2, 2020-09-16 [11] Handbuch für': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0957-V2-2016': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4+': 1, 'EAL4': 1, 'EAL 4': 3, 'EAL4 augmented': 1, 'EAL 4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_GWA': 2, 'AGD_SEC': 3, 'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 5, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 6}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.2': 9, 'FAU_STG.2': 13, 'FAU_ARP': 1, 'FAU_SAA.1': 2, 'FAU_GEN': 4, 'FAU_SAA': 1, 'FAU_GEN.1': 12, 'FAU_SAR': 3, 'FAU_STG': 4, 'FAU_STG.3': 3, 'FAU_STG.1': 7, 'FAU_GEN.2.1': 1, 'FAU_STG.2.1': 1, 'FAU_STG.2.2': 1, 'FAU_STG.2.3': 1}, 'FCO': {'FCO_NRO': 2, 'FCO_NRO.2': 10, 'FCO_NRO.2.1': 1, 'FCO_NRO.2.2': 1, 'FCO_NRO.2.3': 1, 'FCO_NRO.1': 1}, 'FCS': {'FCS_CKM.4': 33, 'FCS_CKM': 4, 'FCS_CKM.2': 6, 'FCS_COP.1': 6, 'FCS_COP': 5, 'FCS_CKM.1': 14, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ACC.2': 10, 'FDP_ACF.1': 11, 'FDP_RIP.2': 9, 'FDP_SDI.2': 8, 'FDP_ITC.1': 12, 'FDP_ITC.2': 12, 'FDP_ACC': 1, 'FDP_ACC.2.1': 1, 'FDP_ACC.2.2': 1, 'FDP_ACC.1': 9, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC': 2, 'FDP_IFC.1': 12, 'FDP_IFF.1': 4, 'FDP_IFF': 2, 'FDP_IFF.1.3': 1, 'FDP_RIP': 1, 'FDP_RIP.2.1': 1, 'FDP_RIP.1': 1, 'FDP_SDI': 1, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_SDI.1': 1}, 'FIA': {'FIA_UAU.6': 8, 'FIA_ATD': 2, 'FIA_AFL': 2, 'FIA_UAU': 2, 'FIA_UID': 2, 'FIA_USB': 2, 'FIA_ATD.1': 11, 'FIA_AFL.1': 7, 'FIA_UAU.2': 8, 'FIA_UAU.5': 7, 'FIA_UID.2': 11, 'FIA_USB.1': 11, 'FIA_UID.1': 8, 'FIA_ATD.1.1': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.1': 3, 'FIA_UAU.2.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6.1': 1, 'FIA_UID.2.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_SMR': 2, 'FMT_MOF.1': 9, 'FMT_SMF.1': 22, 'FMT_SMR.1': 29, 'FMT_MSA.3': 6, 'FMT_MOF': 1, 'FMT_MOF.1.1': 1, 'FMT_SMF': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA': 3, 'FMT_MSA.1': 6}, 'FPR': {'FPR_CON': 5, 'FPR_CON.1': 9, 'FPR_PSE': 2, 'FPR_CON.1.2': 4, 'FPR_CON.1.1': 2, 'FPR_PSE.1': 8, 'FPR_PSE.1.1': 1, 'FPR_PSE.1.2': 1, 'FPR_PSE.1.3': 1}, 'FPT': {'FPT_FLS': 2, 'FPT_RPL': 2, 'FPT_STM': 2, 'FPT_TST': 2, 'FPT_PHP': 2, 'FPT_FLS.1': 8, 'FPT_RPL.1': 10, 'FPT_STM.1': 17, 'FPT_TST.1': 9, 'FPT_PHP.1': 7, 'FPT_FLS.1.1': 1, 'FPT_RPL.1.1': 1, 'FPT_RPL.1.2': 1, 'FPT_STM.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1}, 'FTP': {'FTP_ITC': 2}}, 'cc_claims': {'OE': {'OE': 3, 'OE.SM': 4}, 'OSP': {'OSP.SM': 5}}, 'vendor': {'STMicroelectronics': {'STM': 21}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 15}}, 'constructions': {'MAC': {'CMAC': 17}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 4}}, 'FF': {'DH': {'Diffie-Hellman': 1}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 6, 'SHA-384': 3, 'SHA256': 4, 'SHA384': 3, 'SHA-512': 3}}}, 'crypto_scheme': {'MAC': {'MAC': 24}, 'KA': {'KA': 1}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 82, 'TLS 1.2': 1}}, 'PACE': {'PACE': 1}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 3}, 'GCM': {'GCM': 4}, 'CCM': {'CCM': 1}, 'XTS': {'XTS': 2}}, 'ecc_curve': {'NIST': {'P-256': 2, 'P-384': 2, 'NIST P-256': 2, 'NIST P-384': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256': 2, 'TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384': 2, 'TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256': 2, 'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384': 1}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 4, 'malfunction': 2}}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI TR-03109': 1, 'BSI TR-03109-1': 7, 'BSI TR-03109-2': 1, 'BSI TR-03109-3': 1, 'BSI TR-03109-4': 1, 'BSI TR-03109-6': 1, 'BSI TR-03111': 1, 'BSI TR-03116-3': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-3': 1, 'FIPS 180-4': 1, 'FIPS 197': 1}, 'RFC': {'RFC 5246': 12, 'RFC 2104': 4, 'RFC 5639': 8, 'RFC 5114': 6, 'RFC 5289': 4, 'RFC 3565': 3, 'RFC 4493': 5, 'RFC 5084': 3, 'RFC 5652': 4, 'RFC 3394': 3, 'RFC 7616': 3, 'RFC 2616': 3, 'RFC 5083': 2}, 'ISO': {'ISO/IEC 10116:2006': 1}, 'X509': {'X.509': 4}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for the Gateway of a Smart Metering System', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0073b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['SMARTMETERGATEWAYPP_V1.3']}}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '0831V2a_pdf.pdf', 'st_filename': '0831V2b_pdf.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0831-2018': 6, 'BSI-DSZ-CC-0831-V2-2020': 26}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL 4': 8}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.2': 4}}}}, 'symmetric_crypto': {'__update__': {'constructions': {'__update__': {'MAC': {'__update__': {'CMAC': 3}}}}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__update__': {'SHA2': 1}, '__delete__': ['SHA256', 'SHA384']}}}}}, 'crypto_scheme': {}, 'cipher_mode': {}, 'tee_name': {}, 'standard_id': {'__update__': {'ISO': {'__update__': {'ISO/IEC 18045': 4}}}}, 'certification_process': {'__update__': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Version 1.1 [7] Evaluation Technical Report, Version 2, 2020-10-27, TÜV Informationstechnik GmbH (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014': 1, '9] Configuration list for the TOE, EVG-CM-List, 2020-10-08 (confidential document) [10] Handbuch für Verbraucher, SMGW Version 1.1, Version 4.2, 2020-09-16 [11] Handbuch für': 1}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL 4': 4}}}}, 'cc_sar': {'__update__': {'ADV': {'__delete__': ['ADV_FSP.4', 'ADV_TDS.3']}, 'AGD': {'__delete__': ['AGD_PRE.1']}, 'ALC': {'__update__': {'ALC_FLR.2': 6}, '__delete__': ['ALC_CMS.4', 'ALC_DVS.1', 'ALC_TAT.1']}, 'ATE': {'__delete__': ['ATE_DPT.1', 'ATE_IND.2']}, 'AVA': {'__update__': {'AVA_VAN.5': 7}}, 'ASE': {'__delete__': ['ASE_ECD.1', 'ASE_OBJ.2', 'ASE_SPD.1']}}}, 'cc_sfr': {'__update__': {'FAU': {'__insert__': {'FAU_ARP.1': 1, 'FAU_SAA.1.1': 1, 'FAU_SAR.1': 7, 'FAU_STG.4': 3}, '__update__': {'FAU_GEN.2': 8, 'FAU_ARP': 10, 'FAU_SAA.1': 3, 'FAU_GEN': 37, 'FAU_SAA': 10, 'FAU_GEN.1': 17, 'FAU_SAR': 28, 'FAU_STG': 29}}, 'FCO': {'__update__': {'FCO_NRO': 3}}, 'FCS': {'__update__': {'FCS_CKM.4': 32, 'FCS_CKM': 42, 'FCS_COP.1': 11, 'FCS_COP': 58, 'FCS_CKM.1': 17}}, 'FDP': {'__insert__': {'FDP_ACF': 1, 'FDP_IFC.2': 4}, '__update__': {'FDP_ACF.1': 9, 'FDP_ACC': 2, 'FDP_IFC': 27, 'FDP_IFF.1': 19, 'FDP_IFF': 22, 'FDP_RIP': 2, 'FDP_SDI': 2}}, 'FIA': {'__update__': {'FIA_ATD': 3, 'FIA_AFL': 3, 'FIA_UAU': 5, 'FIA_UID': 3, 'FIA_USB': 3, 'FIA_ATD.1': 12, 'FIA_UAU.2': 7, 'FIA_UAU.5': 6, 'FIA_UAU.1': 2, 'FIA_UAU.5.2': 2}}, 'FMT': {'__update__': {'FMT_SMR': 3, 'FMT_SMF.1': 18, 'FMT_SMR.1': 28, 'FMT_MSA.3': 12, 'FMT_MOF': 2, 'FMT_SMF': 2, 'FMT_MSA': 55, 'FMT_MSA.1': 9}}, 'FPR': {'__update__': {'FPR_CON': 6, 'FPR_CON.1': 10}}, 'FPT': {'__update__': {'FPT_FLS': 3, 'FPT_RPL': 3, 'FPT_STM': 3, 'FPT_TST': 3, 'FPT_PHP': 3}}, 'FTP': {'__insert__': {'FTP_ITC.1': 9}, '__update__': {'FTP_ITC': 27}}}}, 'cc_claims': {'__update__': {'OE': {'__delete__': ['OE']}}}, 'vendor': {}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 14}}}}, 'constructions': {'__update__': {'MAC': {'__update__': {'CMAC': 11}}}}}}, 'asymmetric_crypto': {'__update__': {'FF': {'__delete__': ['DSA']}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__delete__': ['SHA256', 'SHA384']}}}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 7}}}, '__delete__': ['KA']}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'TLS': {'__update__': {'TLS': 61}}}}}}, 'cipher_mode': {'__update__': {'CBC': {'__update__': {'CBC': 2}}, 'GCM': {'__update__': {'GCM': 2}}, 'XTS': {'__update__': {'XTS': 1}}}, '__delete__': ['CCM']}, 'tls_cipher_suite': {'__update__': {'TLS': {'__update__': {'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384': 2}}}}, 'tee_name': {}} data.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]} values discarded.
  • 28.09.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0845-V2', 'BSI-DSZ-CC-00845-V2-2013']}}} data.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for the Gateway of a Smart Metering System', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0073b_pdf.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for the Gateway of a Smart Metering System', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0073b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['SMARTMETERGATEWAYPP_V1.3']}}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.

Raw data

{
  "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert",
  "category": "Other Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/0831V2c_pdf.pdf",
  "dgst": "89d1f7ab8b77e41d",
  "heuristics": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics",
    "cert_id": "BSI-DSZ-CC-0831-V2-2020",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_dependency_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.1"
      ]
    },
    "indirect_dependency_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0831-V3-2021"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0957-V2-2016",
          "BSI-DSZ-CC-0831-2018"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0831-V4-2021",
          "BSI-DSZ-CC-0831-V3-2021"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0845-V2-2013",
          "BSI-DSZ-CC-0978-2016",
          "BSI-DSZ-CC-0957-V2-2016",
          "BSI-DSZ-CC-0845-2012",
          "BSI-DSZ-CC-0831-2018",
          "BSI-DSZ-CC-0666-2012",
          "BSI-DSZ-CC-0957-2015"
        ]
      }
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "OpenLimit SignCubes AG",
  "manufacturer_web": "https://www.openlimit.com/",
  "name": "SMGW Version 1.1",
  "not_valid_after": "2025-10-29",
  "not_valid_before": "2020-10-30",
  "pdf_data": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData",
    "report_filename": "0831V2a_pdf.pdf",
    "report_frontpage": {
      "anssi": {},
      "bsi": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by AVA_VAN.5 and ALC_FLR.2",
        "cc_version": "PP conformant Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-0831-V2-2020",
        "cert_item": "SMGW, Version 1.1",
        "cert_lab": "BSI",
        "developer": "OpenLimit SignCubes GmbH sponsored by Power Plus Communications AG",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI- CC-PP-0073-2014"
      },
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0831-2018": 6,
          "BSI-DSZ-CC-0831-V2-2020": 26,
          "BSI-DSZ-CC-0957-V2-2016": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0073-2014": 3
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 3,
          "ALC_FLR.2": 4
        },
        "AVA": {
          "AVA_VAN.5": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 2,
          "EAL 2+": 1,
          "EAL 4": 8,
          "EAL 4 augmented": 3,
          "EAL 5": 3,
          "EAL 5+": 1,
          "EAL 6": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "9] Configuration list for the TOE, EVG-CM-List, 2020-10-08 (confidential document) [10] Handbuch f\u00fcr Verbraucher, SMGW Version 1.1, Version 4.2, 2020-09-16 [11] Handbuch f\u00fcr": 1,
          "Version 1.1 [7] Evaluation Technical Report, Version 2, 2020-10-27, T\u00dcV Informationstechnik GmbH (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 2
        },
        "TLS": {
          "TLS": {
            "TLS": 5
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 3
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA-512": 1,
            "SHA2": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 1": 1,
          "AIS 32": 1,
          "AIS 34": 2,
          "AIS 38": 1,
          "AIS 46": 2,
          "AIS 48": 1
        },
        "FIPS": {
          "FIPS180-4": 3
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        },
        "RFC": {
          "RFC2104": 2,
          "RFC3565": 1,
          "RFC4493": 3,
          "RFC5084": 1,
          "RFC5246": 4,
          "RFC5288": 1,
          "RFC5652": 2,
          "RFC6033": 1
        }
      },
      "symmetric_crypto": {
        "constructions": {
          "MAC": {
            "CMAC": 3
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1,
          "BSI TR-02102-1": 2,
          "BSI TR-03109-1": 1,
          "BSI TR-03116-3": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20201110142122+01\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, OpenLimit SignCubes GmbH, PPC, Power Plus Communications AG, SMGW, Smartmeter Gateway, SmartGrid\"",
      "/ModDate": "D:20201110143928+01\u002700\u0027",
      "/Producer": "LibreOffice 6.3",
      "/Subject": "Certification Report",
      "/Title": "Certification Report BSI-DSZ-CC-0831-V2-2020",
      "pdf_file_size_bytes": 605699,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/AIS",
          "http://www.commoncriteriaportal.org/",
          "http://www.commoncriteriaportal.org/cc/",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "https://www.sogis.eu/",
          "https://service.ppc-ag.de/",
          "https://www.bsi.bund.de/zertifizierung"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 24
    },
    "st_filename": "0831V2b_pdf.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 4
          },
          "ECDSA": {
            "ECDSA": 1
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 1
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "OE": {
          "OE.SM": 4
        },
        "OSP": {
          "OSP.SM": 5
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_IMP.1": 1
        },
        "AGD": {
          "AGD_GWA": 2,
          "AGD_OPE.1": 1,
          "AGD_SEC": 3
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_DEL.1": 1,
          "ALC_FLR.2": 6,
          "ALC_LCD.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_INT.1": 1,
          "ASE_REQ.2": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_FUN.1": 1
        },
        "AVA": {
          "AVA_VAN.5": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 4,
          "EAL 4 augmented": 1,
          "EAL 4+": 1,
          "EAL4": 1,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP": 10,
          "FAU_ARP.1": 1,
          "FAU_GEN": 37,
          "FAU_GEN.1": 17,
          "FAU_GEN.2": 8,
          "FAU_GEN.2.1": 1,
          "FAU_SAA": 10,
          "FAU_SAA.1": 3,
          "FAU_SAA.1.1": 1,
          "FAU_SAR": 28,
          "FAU_SAR.1": 7,
          "FAU_STG": 29,
          "FAU_STG.1": 7,
          "FAU_STG.2": 13,
          "FAU_STG.2.1": 1,
          "FAU_STG.2.2": 1,
          "FAU_STG.2.3": 1,
          "FAU_STG.3": 3,
          "FAU_STG.4": 3
        },
        "FCO": {
          "FCO_NRO": 3,
          "FCO_NRO.1": 1,
          "FCO_NRO.2": 10,
          "FCO_NRO.2.1": 1,
          "FCO_NRO.2.2": 1,
          "FCO_NRO.2.3": 1
        },
        "FCS": {
          "FCS_CKM": 42,
          "FCS_CKM.1": 17,
          "FCS_CKM.2": 6,
          "FCS_CKM.4": 32,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 58,
          "FCS_COP.1": 11
        },
        "FDP": {
          "FDP_ACC": 2,
          "FDP_ACC.1": 9,
          "FDP_ACC.2": 10,
          "FDP_ACC.2.1": 1,
          "FDP_ACC.2.2": 1,
          "FDP_ACF": 1,
          "FDP_ACF.1": 9,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC": 27,
          "FDP_IFC.1": 12,
          "FDP_IFC.2": 4,
          "FDP_IFF": 22,
          "FDP_IFF.1": 19,
          "FDP_IFF.1.3": 1,
          "FDP_ITC.1": 12,
          "FDP_ITC.2": 12,
          "FDP_RIP": 2,
          "FDP_RIP.1": 1,
          "FDP_RIP.2": 9,
          "FDP_RIP.2.1": 1,
          "FDP_SDI": 2,
          "FDP_SDI.1": 1,
          "FDP_SDI.2": 8,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1
        },
        "FIA": {
          "FIA_AFL": 3,
          "FIA_AFL.1": 7,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD": 3,
          "FIA_ATD.1": 12,
          "FIA_ATD.1.1": 1,
          "FIA_UAU": 5,
          "FIA_UAU.1": 2,
          "FIA_UAU.2": 7,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.5": 6,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 2,
          "FIA_UAU.6": 8,
          "FIA_UAU.6.1": 1,
          "FIA_UID": 3,
          "FIA_UID.1": 8,
          "FIA_UID.2": 11,
          "FIA_UID.2.1": 1,
          "FIA_USB": 3,
          "FIA_USB.1": 11,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MOF": 2,
          "FMT_MOF.1": 9,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 55,
          "FMT_MSA.1": 9,
          "FMT_MSA.3": 12,
          "FMT_SMF": 2,
          "FMT_SMF.1": 18,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 3,
          "FMT_SMR.1": 28,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_CON": 6,
          "FPR_CON.1": 10,
          "FPR_CON.1.1": 2,
          "FPR_CON.1.2": 4,
          "FPR_PSE": 2,
          "FPR_PSE.1": 8,
          "FPR_PSE.1.1": 1,
          "FPR_PSE.1.2": 1,
          "FPR_PSE.1.3": 1
        },
        "FPT": {
          "FPT_FLS": 3,
          "FPT_FLS.1": 8,
          "FPT_FLS.1.1": 1,
          "FPT_PHP": 3,
          "FPT_PHP.1": 7,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_RPL": 3,
          "FPT_RPL.1": 10,
          "FPT_RPL.1.1": 1,
          "FPT_RPL.1.2": 1,
          "FPT_STM": 3,
          "FPT_STM.1": 17,
          "FPT_STM.1.1": 1,
          "FPT_TST": 3,
          "FPT_TST.1": 9,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 27,
          "FTP_ITC.1": 9
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "GCM": {
          "GCM": 2
        },
        "XTS": {
          "XTS": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 1
        },
        "TLS": {
          "TLS": {
            "TLS": 61,
            "TLS 1.2": 1
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 7
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "NIST P-256": 2,
          "NIST P-384": 2,
          "P-256": 2,
          "P-384": 2
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 6,
            "SHA-384": 3,
            "SHA-512": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "malfunction": 2,
          "physical tampering": 4
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        },
        "FIPS": {
          "FIPS 140-3": 1,
          "FIPS 180-4": 1,
          "FIPS 197": 1
        },
        "ISO": {
          "ISO/IEC 10116:2006": 1
        },
        "RFC": {
          "RFC 2104": 4,
          "RFC 2616": 3,
          "RFC 3394": 3,
          "RFC 3565": 3,
          "RFC 4493": 5,
          "RFC 5083": 2,
          "RFC 5084": 3,
          "RFC 5114": 6,
          "RFC 5246": 12,
          "RFC 5289": 4,
          "RFC 5639": 8,
          "RFC 5652": 4,
          "RFC 7616": 3
        },
        "X509": {
          "X.509": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 14
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 11
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-02102": 1,
          "BSI TR-03109": 1,
          "BSI TR-03109-1": 7,
          "BSI TR-03109-2": 1,
          "BSI TR-03109-3": 1,
          "BSI TR-03109-4": 1,
          "BSI TR-03109-6": 1,
          "BSI TR-03111": 1,
          "BSI TR-03116-3": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {
        "TLS": {
          "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256": 2,
          "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 2,
          "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384": 2,
          "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 2
        }
      },
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Stefan D\u00f6rpinghaus",
      "/CreationDate": "D:20201124181309+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word f\u00fcr Microsoft 365",
      "/Keywords": "Security Target SMGW Version 1.1",
      "/ModDate": "D:20201124181309+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word f\u00fcr Microsoft 365",
      "/Title": "Security Target SMGW Version 1.1",
      "pdf_file_size_bytes": 2049773,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://rfc-editor.org/rfc/rfc2616.txt",
          "http://www.usb.org/developers/docs/usb20_docs/%23usb20spec",
          "http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf",
          "http://de.wikipedia.org/wiki/Open_Metering_System",
          "http://en.wikipedia.org/wiki/Network_interface_device",
          "http://fc12.ifca.ai/pre-proceedings/paper_49.pdf",
          "http://rfc-editor.org/rfc/rfc3565.txt",
          "http://rfc-editor.org/rfc/rfc2104.txt",
          "http://www.ietf.org/rfc/rfc5084.txt",
          "http://www.ietf.org/rfc/rfc5639.txt",
          "http://www.rfc-editor.org/rfc/rfc4493.txt",
          "http://www.ietf.org/rfc/rfc5246.txt",
          "http://rfc-editor.org/rfc/rfc7616.txt",
          "http://de.wikipedia.org/wiki/Ethernet",
          "http://www.ietf.org/rfc/rfc5114.txt",
          "http://www.ietf.org/rfc/rfc5083.txt",
          "http://rfc-editor.org/rfc/rfc3394.txt",
          "http://www.ietf.org/rfc/rfc5652.txt",
          "http://www.ietf.org/rfc/rfc5289.txt"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 154
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "SMARTMETERGATEWAYPP_V1.3"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0073b_pdf.pdf",
        "pp_name": "Protection Profile for the Gateway of a Smart Metering System"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/0831V2a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "AVA_VAN.5",
      "ALC_FLR.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/0831V2b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState",
    "errors": [],
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "8261126d8faf8050c4b744fc80229fbf59837727fe1d839f162e52c291406f17",
    "report_txt_hash": "c7805980e36de475ab419d2f27fc85fd0bd9e981d3b371c37035738a46e6e273",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "805211a1bf75660c1f91655358d59d3c6813b3e2c5f334410f80a8b29519bc2b",
    "st_txt_hash": "7da74e9f74b9eec952bf76b70b477f580d91e89c175da43cd7949c82743ec079"
  },
  "status": "active"
}