Antragsteller | Produktname | Produkttyp | Zertifizierungs-ID |
---|---|---|---|
Banksys N.V. | DEP/PCI Version 3.0 Host Security Module (Hardware & Software) | Sicherheitsmodul | BSI-DSZ-CC-0198 |
IBM Deutschland GmbH | AIX 5.2 | Betriebssystem | BSI-DSZ-CC-0194 |
Zertifikat erteilt von der Zertifizierungsstelle der TÜV Informationstechnik GmbH, anerkannt vom BSI
Hersteller/Vertreiber | Produktname | Produkttyp | Ergebnis Zertifizierungs-ID Datum |
---|---|---|---|
Ricoh Company, LTD; Japan | imagio Neo 350/450 Series | Multifunktionsdrucker | EAL3/niedrig TUVIT-DSZ-CC-9208-2002 28.06.2002 |
Giesecke & Devrient GmbH | Card Manager of the THC JavaCard Version 1.0 | Java Card Manager | E3/hoch TUVIT-DSZ-ITSEC-9136-2002 28.06.2002 |
Reiner Kartengeräte GmbH & Co. KG | cyberJack e-com Version 2.0 | Chipkartenleser | E2/hoch TUVIT-DSZ-ITSEC-9138-2002 03.06.2002 |
Reiner Kartengeräte GmbH & Co. KG | cyberJack pinpad Version 2.0 | Chipkartenleser | E2/hoch TUVIT-DSZ-ITSEC-9137-2002 24.05.2002 |
from
The IT product identified in this certificate has been evaluated at an accredited and licensed/approved evaluation facility using the Common Methodology for IT Security Evaluation, Part 1 Version 0.6, Part 2 Version 1.0, extended by advice of the Certification Body for components beyond EAL4 and smart card specific guidance, for conformance to the Common Criteria for IT Security Evaluation, Version 2.1 (ISO/IEC 15408:1999).
Evaluation Results |
|
---|---|
PP Conformance: | Protection Profile BSI-PP-0002-2001 |
Functionality: | BSI-PP-0002-2001 conformant plus product specific extensions Common Criteria part 2 extended |
Assurance Package: | Common Criteria part 3 conformant EAL5 augmented by: ALC_DVS.2 (Life cycle support – Sufficiency of security measures), AVA_MSU.3 (Vulnerability assessment – Analysis and testing for insecure states), AVA_VLA.4 (Vulnerability assessment – Highly resistant) |
This certificate applies only to the specific version and release of the product in its evaluated configuration and in conjunction with the complete Certification Report.
The evaluation has been conducted in accordance with the provisions of the certification scheme of the Bundesamt für Sicherheit in der Informationstechnik and the conclusions of the evaluation facility in the evaluation technical report are consistent with the evidence adduced.
The notes mentioned on the reverse side are part of this certificate.
Bonn, 23rd August 2002
The President of the Bundesamt für Sicherheit in der
Informationstechnik
Dr. Henze
from
The IT product identified in this certificate has been evaluated at an accredited and licensed/approved evaluation facility using the Common Methodology for IT Security Evaluation, Part 1 Version 0.6, Part 2 Version 1.0, extended by advice of the Certification Body for components beyond EAL4 and smart card specific guidance, for conformance to the Common Criteria for IT Security Evaluation, Version 2.1 (ISO/IEC 15408:1999).
Evaluation Results |
|
---|---|
PP Conformance: | Protection Profile BSI-PP-0002-2001 |
Functionality: | BSI-PP-0002-2001 conformant plus product specific extensions Common Criteria part 2 extended |
Assurance Package: | Common Criteria part 3 conformant EAL5 augmented by: ALC_DVS.2 (Life cycle support – Sufficiency of security measures), AVA_MSU.3 (Vulnerability assessment – Analysis and testing for insecure states), AVA_VLA.4 (Vulnerability assessment – Highly resistant) |
This certificate applies only to the specific version and release of the product in its evaluated configuration and in conjunction with the complete Certification Report.
The evaluation has been conducted in accordance with the provisions of the certification scheme of the Bundesamt für Sicherheit in der Informationstechnik and the conclusions of the evaluation facility in the evaluation technical report are consistent with the evidence adduced.
The notes mentioned on the reverse side are part of this certificate.
Bonn, 23rd August 2002
The President of the Bundesamt für Sicherheit in der
Informationstechnik
Dr. Henze
für das
zu
der Firma
Das Produkt wurde nach den Kriterien für die Bewertung der Sicherheit von Systemen der Informationstechnik (ITSEC), Version 1.2, Juni 1991 und dem Handbuch für die Bewertung der Sicherheit von Systemen der Informationstechnik (ITSEM), Version 1.0, September 1993 evaluiert.
Prüfergebnis |
|
---|---|
Funktionalität: | Identifikation und Authentisierung, Zugriffskontrolle, Vertraulichkeit und Integrität, Beweissicherung und Protokollauswertung |
Evaluationsstufe: | E3 |
Die Bewertung der Mechanismenstärke erfolgte ohne Einbeziehung der für die Ver- und Entschlüsselung eingesetzten Kryptoalgorithmen (vgl. §4 Abs. 3 Nr. 2 BSIG).
Die bestätigte Evaluationsstufe gilt nur unter der Voraussetzung, dass alle Auflagen bzgl. Generierung, Konfiguration und Betrieb, soweit sie im Testatbericht angegeben sind, beachtet werden und das Produkt in der beschriebenen Umgebung betrieben wird.
Dieses Testat gilt nur in Verbindung mit dem vollständigen Report. Die auf der Rückseite aufgeführten Anmerkungen sind Bestandteil dieses Testates.
Bonn, den 25. Juli 2002
Der Präsident des Bundesamtes für Sicherheit in der
Informationstechnik
Dr. Henze
from
The IT product identified in this certificate has been evaluated at an accredited and licensed/approved evaluation facility using the Common Methodology for IT Security Evaluation, Part 1 Version 0.6, Part 2 Version 1.0 for conformance to the Common Criteria for IT Security Evaluation, Version 2.1 (ISO/IEC 15408:1999).
Evaluation Results |
|
---|---|
Functionality: | Product specific Security Target Common Criteria part 2 conformant |
Assurance Package: | Common Criteria part 3 conformant EAL4 |
This certificate applies only to the specific version and release of the product in its evaluated configuration and in conjunction with the complete Certification Report.
The evaluation has been conducted in accordance with the provisions of the certification scheme of the Bundesamt für Sicherheit in der Informationstechnik and the conclusions of the evaluation facility in the evaluation technical report are consistent with the evidence adduced.
The notes mentioned on the reverse side are part of this certificate.
Bonn, 8th July 2002
The President of the Bundesamt für Sicherheit in der
Informationstechnik
Dr. Henze
from
The IT product identified in this certificate has been evaluated at an accredited and licensed/approved evaluation facility using the Common Methodology for IT Security Evaluation, Part 1 Version 0.6, Part 2 Version 1.0, extended by advice of the Certification Body for components beyond EAL4, for conformance to the Common Criteria for IT Security Evaluation, Version 2.1 (ISO/IEC 15408:1999).
Evaluation Results |
|
---|---|
Functionality: | Product specific Security Target Common Criteria part 2 conformant |
Assurance Package: | Common Criteria part 3 conformant EAL5 augmented by: ALC_DVS.2 (Life cycle support – Sufficiency of security measures), AVA_VLA.4 (Vulnerability assessment – Highly resistant) |
This certificate applies only to the specific version and release of the product in its evaluated configuration and in conjunction with the complete Certification Report.
The evaluation has been conducted in accordance with the provisions of the certification scheme of the Bundesamt für Sicherheit in der Informationstechnik and the conclusions of the evaluation facility in the evaluation technical report are consistent with the evidence adduced.
The notes mentioned on the reverse side are part of this certificate.
Bonn, 2nd July 2002
The President of the Bundesamt für Sicherheit in der
Informationstechnik
Dr. Henze
© SecuMedia-Verlags-GmbH, D-55205 Ingelheim,
KES 2002/5, Seite 47