Antragsteller | Produktname | Produkttyp | Zertifizierungs-ID |
---|---|---|---|
JDT von SD Industries GmbH und LG Electronics Inc. | IrisAccess 3000 | Biometrisches Identifikationssystem | BSI-DSZ-CC-0201 |
Biodata Systems GmbH | Biodata Babylon CC, Version 1.0, | Verschlüsselungsgerät für ISDN (BRI und PRI) | BSI-DSZ-CC-0200 |
Lizenznummer | Name | Vorname | Kontaktinfo |
---|---|---|---|
0004/02 | Geschonneck | Alexander | HiSolutions AG, Bouchéstr. 12, 12435 Berlin |
0005/02 | Kob | Timo | HiSolutions AG, Bouchéstr. 12, 12435 Berlin |
0006/02 | Furter | Armin | TKH Informationsmanagement GmbH, Neufeldstr. 27 F, 3012 Bern (Schweiz) |
0008/02 | Westermann | Michael | PERGIS Systemhaus GmbH, Rheinuferstr. 9, 67061 Ludwigshaven |
0023/02 | Hofmann | Norbert | VIV-IT, Pützbungert 10, 53639 Königswinter |
0025/02 | Dr. Schiel | Uwe | KPMG Consulting AG, Kurfürstendamm 207-208, 10719 Berlin |
0028/02 | Rauch | Norbert | Rauch Consulting Dr.-Dassler-Str. 57, 91074 Herzogenaurach |
0030/02 | Schubert | Wolfgang | SIZ Informatikzentrum der Sparkassenorganisation GmbH, Königswinterer Str. 552, 53227 Bonn |
0031/02 | Dr. Kandels | Jörg | SIZ Informatikzentrum der Sparkassenorganisation GmbH, Königswinterer Str. 552, 53227 Bonn |
0032/02 | Rieger | Benno | SIZ Informatikzentrum der Sparkassenorganisation GmbH, Königswinterer Str.552, 53227 Bonn |
0033/02 | Zemp | Hans | Swiss Infosec AG, Fabrikstr. 2, 3012 Bern (Schweiz) |
0034/02 | Zbinden | Reto | Swiss Infosec AG, Fabrikstr. 2, 3012 Bern (Schweiz) |
0035/02 | Grütter | Matthias | Swiss Infosec AG, Fabrikstr. 2, 3012 Bern (Schweiz) |
0036/02 | Steffen | Achim | Swiss Infosec AG, Fabrikstr. 2, 3012 Bern (Schweiz) |
0037/02 | Stork | Andreas | GenoTec GmbH, Wilhelm-Haas-Platz, 63263 Neu-Isenburg |
Zertifikat erteilt von der Zertifizierungsstelle der TÜV Informationstechnik GmbH, anerkannt vom BSI
Hersteller/Vertreiber | Produktname | Produkttyp | Ergebnis
Zertifizierungs-ID Datum |
---|---|---|---|
Ricoh Company, LTD; Japan | imagio Neo 350/450 Series | Multifunktionsdrucker | EAL3/niedrig
TUVIT-DSZ-CC-9208-2002 28.06.2002 |
Giesecke & Devrient GmbH | Card Manager of the THC JavaCard Version 1.0 | Java Card Manager | E3/hoch
TUVIT-DSZ-ITSEC-9136-2002 28.06.2002 |
Reiner Kartengeräte GmbH & Co. KG | cyberJack e-com Version 2.0 | Chipkartenleser | E2/hoch
TUVIT-DSZ-ITSEC-9138-2002 03.06.2002 |
Reiner Kartengeräte GmbH & Co. KG | cyberJack pinpad Version 2.0 | Chipkartenleser | E2/hoch
TUVIT-DSZ-ITSEC-9137-2002 24.05.2002 |
from
The IT product identified in this certificate has been evaluated at an accredited and licensed/approved evaluation facility using the Common Methodology for IT Security Evaluation, Part 1 Version 0.6, Part 2 Version 1.0, extended by advice of the Certification Body for components beyond EAL4 and smart card specific guidance, for conformance to the Common Criteria for IT Security Evaluation, Version 2.1 (ISO/IEC 15408:1999).
Evaluation Results |
|
---|---|
PP Conformance: | Protection Profile BSI-PP-0002-2001 |
Functionality: | BSI-PP-0002-2001 conformant plus product specific extensions Common Criteria part 2 extended |
Assurance Package: | Common Criteria part 3 conformant
EAL5 augmented by: ALC_DVS.2 (Life cycle support – Sufficiency of security measures), AVA_MSU.3 (Vulnerability assessment – Analysis and testing for insecure states), AVA_VLA.4 (Vulnerability assessment – Highly resistant) |
This certificate applies only to the specific version and release of the product in its evaluated configuration and in conjunction with the complete Certification Report.
The evaluation has been conducted in accordance with the provisions of the certification scheme of the Bundesamt für Sicherheit in der Informationstechnik and the conclusions of the evaluation facility in the evaluation technical report are consistent with the evidence adduced.
The notes mentioned on the reverse side are part of this certificate.
Bonn, 23rd August 2002
The President of the Bundesamt für Sicherheit in der
Informationstechnik
Dr. Henze
from
The IT product identified in this certificate has been evaluated at an accredited and licensed/approved evaluation facility using the Common Methodology for IT Security Evaluation, Part 1 Version 0.6, Part 2 Version 1.0, extended by advice of the Certification Body for components beyond EAL4 and smart card specific guidance, for conformance to the Common Criteria for IT Security Evaluation, Version 2.1 (ISO/IEC 15408:1999).
Evaluation Results |
|
---|---|
PP Conformance: | Protection Profile BSI-PP-0002-2001 |
Functionality: | BSI-PP-0002-2001 conformant plus product specific extensions Common Criteria part 2 extended |
Assurance Package: | Common Criteria part 3 conformant
EAL5 augmented by: ALC_DVS.2 (Life cycle support – Sufficiency of security measures), AVA_MSU.3 (Vulnerability assessment – Analysis and testing for insecure states), AVA_VLA.4 (Vulnerability assessment – Highly resistant) |
This certificate applies only to the specific version and release of the product in its evaluated configuration and in conjunction with the complete Certification Report.
The evaluation has been conducted in accordance with the provisions of the certification scheme of the Bundesamt für Sicherheit in der Informationstechnik and the conclusions of the evaluation facility in the evaluation technical report are consistent with the evidence adduced.
The notes mentioned on the reverse side are part of this certificate.
Bonn, 23rd August 2002
The President of the Bundesamt für Sicherheit in der
Informationstechnik
Dr. Henze
für das
zu
der Firma
Das Produkt wurde nach den Kriterien für die Bewertung der Sicherheit von Systemen der Informationstechnik (ITSEC), Version 1.2, Juni 1991 und dem Handbuch für die Bewertung der Sicherheit von Systemen der Informationstechnik (ITSEM), Version 1.0, September 1993 evaluiert.
Prüfergebnis |
|
---|---|
Funktionalität: | Identifikation und Authentisierung, Zugriffskontrolle, Vertraulichkeit und Integrität, Beweissicherung und Protokollauswertung |
Evaluationsstufe: | E3 |
Die Bewertung der Mechanismenstärke erfolgte ohne Einbeziehung der für die Ver- und Entschlüsselung eingesetzten Kryptoalgorithmen (vgl. §4 Abs. 3 Nr. 2 BSIG).
Die bestätigte Evaluationsstufe gilt nur unter der Voraussetzung, dass alle Auflagen bzgl. Generierung, Konfiguration und Betrieb, soweit sie im Testatbericht angegeben sind, beachtet werden und das Produkt in der beschriebenen Umgebung betrieben wird.
Dieses Testat gilt nur in Verbindung mit dem vollständigen Report. Die auf der Rückseite aufgeführten Anmerkungen sind Bestandteil dieses Testates.
Bonn, den 25. Juli 2002
Der Präsident des Bundesamtes für Sicherheit in der
Informationstechnik
Dr. Henze
from
The IT product identified in this certificate has been evaluated at an accredited and licensed/approved evaluation facility using the Common Methodology for IT Security Evaluation, Part 1 Version 0.6, Part 2 Version 1.0 for conformance to the Common Criteria for IT Security Evaluation, Version 2.1 (ISO/IEC 15408:1999).
Evaluation Results |
|
---|---|
Functionality: | Product specific Security Target
Common Criteria part 2 conformant |
Assurance Package: | Common Criteria part 3 conformant
EAL4 |
This certificate applies only to the specific version and release of the product in its evaluated configuration and in conjunction with the complete Certification Report.
The evaluation has been conducted in accordance with the provisions of the certification scheme of the Bundesamt für Sicherheit in der Informationstechnik and the conclusions of the evaluation facility in the evaluation technical report are consistent with the evidence adduced.
The notes mentioned on the reverse side are part of this certificate.
Bonn, 8th July 2002
The President of the Bundesamt für Sicherheit in der
Informationstechnik
Dr. Henze
from
The IT product identified in this certificate has been evaluated at an accredited and licensed/approved evaluation facility using the Common Methodology for IT Security Evaluation, Part 1 Version 0.6, Part 2 Version 1.0, extended by advice of the Certification Body for components beyond EAL4, for conformance to the Common Criteria for IT Security Evaluation, Version 2.1 (ISO/IEC 15408:1999).
Evaluation Results |
|
---|---|
Functionality: | Product specific Security Target
Common Criteria part 2 conformant |
Assurance Package: | Common Criteria part 3 conformant
EAL5 augmented by: ALC_DVS.2 (Life cycle support – Sufficiency of security measures), AVA_VLA.4 (Vulnerability assessment – Highly resistant) |
This certificate applies only to the specific version and release of the product in its evaluated configuration and in conjunction with the complete Certification Report.
The evaluation has been conducted in accordance with the provisions of the certification scheme of the Bundesamt für Sicherheit in der Informationstechnik and the conclusions of the evaluation facility in the evaluation technical report are consistent with the evidence adduced.
The notes mentioned on the reverse side are part of this certificate.
Bonn, 2nd July 2002
The President of the Bundesamt für Sicherheit in der
Informationstechnik
Dr. Henze
© SecuMedia-Verlags-GmbH, D-55205 Ingelheim,
KES 2002/5, Seite 47