CHERRY eHealth Terminal ST-1506, FW 4.0.0, HW 4.0.0
CSV information ?
Status | active |
---|---|
Valid from | 06.06.2023 |
Valid until | 05.06.2028 |
Scheme | 🇩🇪 DE |
Manufacturer | Cherry GmbH |
Category | Other Devices and Systems |
Security level | ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, EAL3, ALC_TAT.1, AVA_VAN.4 |
Protection profiles | |
Maintenance updates | CHERRY eHealth Terminal ST-1506, FW 4.0.25, HW 4.0.0 (12.04.2024) Certification report |
CHERRY eHealth Terminal ST-1506, FW 4.0.23, HW 4.0.0 (05.01.2024) Certification report |
Heuristics summary ?
Certificate ?
Extracted keywords
Security level
EAL 3, EAL 4, EAL 2, EAL 3 augmentedSecurity Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, ALC_FLR, AVA_VAN.4Certificates
BSI-DSZ-CC-1124-V3-2023Standards
ISO/IEC 15408, ISO/IEC 18045File metadata
Title | Certificate BSI-DSZ-CC-1124-V3-2023 |
---|---|
Subject | Common Criteria, Certification, Zertifizierung, eHealth, Cherry, Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01 |
Keywords | "Common Criteria, Certification, Zertifizierung, eHealth, Cherry, Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01" |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Pages | 1 |
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, AES-, HPCAsymmetric Algorithms
ECDHE, ECDSA, ECC, Diffie-Hellman, DH, DHEHash functions
SHA256, SHA384, SHA-256, SHA-2Protocols
SSH, TLS, TLS 1.2, TLS v1.2Randomness
RNGElliptic Curves
P-256, P-384, brainpoolP384r1, brainpoolP256r1Block cipher modes
CBC, GCMSecurity level
EAL 3, EAL 4, EAL 2, EAL 1, EAL3+, EAL 3 augmentedClaims
O.PROTECTIONSecurity Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, ALC_FLR, ALC_DEL, ALC_DEL.1, ATE_FUN, ATE_IND, AVA_VAN.4, AVA_VANSecurity Functional Requirements (SFR)
FCS_CKM.1, FCS_COP.1, FCS_CKM, FIA_UAU.5, FMT_SMR.1Protection profiles
BSI-CC-PP-0032-V2-2015-MA-01, BSI-CC-PP-0032-V2-2015-MA-Certificates
BSI-DSZ-CC-1124-V3-2023, BSI-DSZ-CC-1124-V2-, BSI-DSZ-CC-1124-V2-2022Evaluation facilities
TÜV InformationstechnikCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Health GmbH [7] Evaluation Technical Report, Version 1, 2023-04-20, TÜV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, 2023-01-31, ALC_CMS_SW, V2.0, 2023-03-27, BOM, V4.0.0, 2023-02-01, Bibliography V5.4, 2023-04-19 (confidential documents) [10] eHealth Terminal ST-1506 – Kurzanleitung für Benutzer (Teilenummer:64410078), Version 05, 14] Common-Criteria-3.1 Dokument ALC_DEL.1, Version 1.1, 2023-01-27, Cherry Digital Health GmbH, (confidential document) C Excerpts from the Criteria For the meaning of the assurance components and levels the followingStandards
FIPS 197, FIPS PUB 180-2, FIPS 180-4, PKCS#1, AIS 32, AIS 38, RFC 5246, RFC 8017, RFC 4492, RFC 5639, RFC 4226, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, X.509Technical reports
BSI 7148File metadata
Title | Certification Report BSI-DSZ-CC-1124-V3-2023 |
---|---|
Subject | Common Criteria, Certification, Zertifizierung, eHealth, Cherry, Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01 |
Keywords | "Common Criteria, Certification, Zertifizierung, eHealth, Cherry, Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01" |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Pages | 28 |
Frontpage
Certificate ID | BSI-DSZ-CC-1124-V3-2023 |
---|---|
Certified item | CHERRY eHealth Terminal ST-1506 FW 4.0.0, HW 4.0.0 |
Certification lab | BSI |
Developer | Cherry Digital Health GmbH |
References
Outgoing- BSI-DSZ-CC-1124-V2-2022 - active - CHERRY eHealth Terminal ST-1506, AFxZ FW 3.0.0, HW 4.0.0
Security target ?
Extracted keywords
Symmetric Algorithms
AES, HPCAsymmetric Algorithms
ECDSA, ECC, DH, Diffie-HellmanHash functions
SHA-256Protocols
TLS, IPsec, VPNRandomness
PRNGElliptic Curves
P-256, P-384, brainpoolP256r1, brainpoolP384r1Block cipher modes
GCMTLS cipher suites
TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHAOperating System name
JCOP 4Vendor
NXPSecurity level
EAL3+, EAL 3, EAL6+, EAL3, EAL3 augmented, EAL 3 augmentedClaims
O.ACCESS_CONTROL, O.PIN_ENTRY, O.MANAGEMENT, O.SECURE_CHANNEL, O.STATE, O.PROTECTION, T.COM, T.PIN, T.DATA, T.F-CONNECTOR, A.PUSH_SERVER, A.ENV, A.ADMIN, A.CONNECTOR, A.SM, OE.ENV, OE.ADMIN, OE.CONNECTOR, OE.SM, OE.PUSH_SERVER, OSP.PIN_ENTRYSecurity Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_ARC.1, AGD_OPE.1, AGD_PRE.1, ALC_TAT.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.4, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FCS_CKM, FCS_CKM.4, FCS_COP, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4.1, FDP_IFF.1, FDP_ACC, FDP_ACF, FDP_IFC, FDP_IFF, FDP_RIP.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACF.1, FDP_IFC.1, FDP_RIP.1.1, FIA_AFL.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.1, FIA_UAU.5, FIA_UAU.7, FIA_UID.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FMT_SMF.1, FMT_MSA, FMT_MSA.2, FMT_SMR.1, FMT_MSA.3, FMT_MSA.1, FMT_MSA.2.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_PHP.3, FPT_FLS.1, FPT_ITT.1, FPT_PHP.1, FPT_TST.1, FPT_FLS.1.1, FPT_ITT.1.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTA_TAB, FTA_TAB.1, FTP_ITC, FTP_TRP, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-CC-PP-0098-2020, BSI-CC-PP-0032-V2-2015-MA01, BSI-CC-PP-0098-2018, BSI-CC-PP-0098Certificates
NSCIB-CC-180212-CR2, NSCIB-CC-180212-CR5Side-channel analysis
physical tamperingStandards
FIPS 197, PKCS#1, AIS 20, AIS 31, RFC 5246, RFC 5289, RFC 8017, RFC 8422, X.509Technical reports
BSI TR-03111File metadata
Title | Security Target EAL3+ for eHealth Terminal ST-1506 |
---|---|
Subject | Cherry Digital Health GmbH, eHealth Terminal |
Keywords | Cherry, Digital, Health, GmbH;, eHealth, Terminal |
Author | Cherry Digital Health GmbH |
Pages | 77 |
References
Outgoing- NSCIB-CC-180212-CR5 - active - NXP JCOP 4 P71
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.4Certificate versions
Name | Certificate ID | |
---|---|---|
Previous | ||
eHealth Card Terminal with Touchscreen Display, ST-1506, AFxZ 2.0.0:4.0.0 | BSI-DSZ-CC-1124-2021 | Compare |
CHERRY eHealth Terminal ST-1506, AFxZ FW 3.0.0, HW 4.0.0 | BSI-DSZ-CC-1124-V2-2022 | Compare |
Similar certificates
Name | Certificate ID | |
---|---|---|
CHERRY eHealth Terminal ST-1506, AFxZ FW 3.0.0, HW 4.0.0 | BSI-DSZ-CC-1124-V2-2022 | Compare |
Scheme data ?
Cert Id | BSI-DSZ-CC-1124-V3-2023 | |
---|---|---|
Product | CHERRY eHealth Terminal ST-1506, AFxZ FW 3.0.0, HW 4.0.0 | |
Vendor | Cherry GmbH | |
Certification Date | 06.06.2023 | |
Category | eHealth | |
Url | https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Gesundheitswesen_Kartenlesegeraete/1124_1124V2_1124V3.html | |
Enhanced | ||
Product | CHERRY eHealth Terminal ST-1506, AFxZ FW 3.0.0, HW 4.0.0 | |
Applicant | Cherry GmbH Cherrystraße 2 91275 Auerbach/Opf | |
Evaluation Facility | TÜV Informationstechnik GmbH | |
Assurance Level | EAL3+,ADV_FSP.4,ADV_IMP.1,ADV_TDS.3,ALC_TAT.1,AVA_VLA.4 | |
Certification Date | 06.06.2023 | |
Expiration Date | 05.06.2028 | |
Entries | [frozendict({'id': 'BSI', 'description': '4.0.0'}), frozendict({'id': 'BSI-DSZ-CC-1124-V3-2023-MA-01 (Ausstellungsdatum / Certification Date 05.01.2024) Maintenance Report / Maintenancereport Das CHERRY eHealth Terminal ST-1506, FW 4.0.23, HW 4.0.0 wurde aufgrund von Usability-Aspekten (Display-Layout und Handling) sowie zur Verbesserung der Kompatibilität mit dem Konnektor geändert. Diese Änderungen modifizieren keine sicherheitsrelevanten Funktionen im Quellcode und wirken sich nur auf die Benutzeroberfläche aus. Die Änderungen sind daher auch mit einer Aktualisierung des Benutzerhandbuchs verbunden. Die Konfigurationsmanagementverfahren erforderten eine Änderung der Produktkennung. Daher wurde die Versionsnummer von FW 4.0.0, HW 4.0.0 auf FW 4.0.23, HW 4.0.0 geändert.', 'description': '4.0.0'}), frozendict({'id': 'BSI-DSZ-CC-1124-V3-2023 (Ausstellungsdatum / Certification Date 06.06.2023, gültig bis / valid until 05.06.2028)', 'description': '- Passive and active physical protection.'}), frozendict({'id': 'BSI-DSZ-CC-1124-V2-2022-MA-02 (Ausstellungsdatum / Certification Date 03.11.2022) Maintenance Report / Maintenancereport Das CHERRY eHealth Terminal ST-1506, AFxZ FW 3.0.28, HW 4.0.0 würde in Hinsicht auf eine Anforderung an die Metadaten der SSL-Verbindung angepasst. Konfigurations-Management Vorgaben erfordern daher auch die Änderung der Produkt-ID. Dementsprechend hat sich die Versionsnummer von AFxZ FW 3.0.24, HW 4.0.0 nach AFxZ FW 3.0.28, HW 4.0.0 geändert. Außerdem wurde ein Dokument welches Teile der sicheren Auslieferungskette beschreibt, redaktionell angepasst.', 'description': '4.0.0. Furthermore an document related to the secure delivery chain has been editorially changed.'}), frozendict({'id': 'BSI-DSZ-CC-1124-V2-2022-MA-01 (Ausstellungsdatum / Certification Date 23.05.2022) Maintenance Report / Maintenancereport Das CHERRY eHealth Terminal ST-1506, AFxZ FW 3.0.24, HW 4.0.0 würde in Hinsicht der Konnektor-Interoperabilität (TLS-Timeout, SICCT Request Command) angepasst. Konfigurations-Management Vorgaben erfordern daher auch die Änderung der Produkt-ID. Dementsprechend hat sich die Versionsnummer von AFxZ FW 3.0.0, HW 4.0.0 in AFxZ FW 3.0.24, HW 4.0.0 geändert.', 'description': '4.0.0.'}), frozendict({'id': 'BSI-DSZ-CC-1124-V2-2022 (Ausstellungsdatum / Certification Date 11.05.2022, gültig bis / valid until 10.05.2027)', 'description': 'Certificate'}), frozendict({'id': 'Zugriff'}), frozendict({'id': 'Sichere'}), frozendict({'id': 'Sichere'}), frozendict({'id': 'Unterstützung'}), frozendict({'id': 'Benutzerauthentifizieung,'}), frozendict({'id': 'Management'}), frozendict({'id': 'Passiver und aktiver physischer Schutz.'}), frozendict({'id': 'Access'}), frozendict({'id': 'Secure'}), frozendict({'id': 'Secure'}), frozendict({'id': 'Enforcement'}), frozendict({'id': 'User'}), frozendict({'id': 'Management'}), frozendict({'id': 'Passive'}), frozendict({'id': 'BSI-DSZ-CC-1124-2021-MA-04 (Ausstellungsdatum / Certification Date 16.03.2022) Maintenance Report / Maintenancereport Das CHERRY eHealth Terminal ST-1506, FW 2.0.20 HW 4.0.0 wurde in Hinsicht der konkreten Bestückung der Platine des Mainboards geändert. Diese deckt eine zweite Bestückungsmöglichkeit ab, ohne die Funktionalität zu verändern. Die TOE Hardware Version 4.0.0 besteht jetzt aus den PCB Versionen 2.2.7 oder 2.2.8.', 'description': 'versions 2.2.7 or 2.2.8.'}), frozendict({'id': 'BSI-DSZ-CC-1124-2021-MA-03 (Ausstellungsdatum / Certification Date 13.10.2021) Maintenance Report / Maintenancereport Der CHERRY eHealth Terminal ST-1506, FW 2.0.20, HW 4.0.0 wurde in Hinsicht auf einen Timeout-Wert geändert. Konfigurations-Management Vorgaben erfordern daher auch die Änderung der Produkt-ID, bei der sich die Versionsnummer von 2.0.17 in 2.0.20 geändert hat.', 'description': 'The CHERRY eHealth Terminal ST-1506, FW 2.0.20, HW 4.0.0 was changed due to a extension of a timeout value. Configuration Management procedures required a change in the product identifier. Therefore the version number changed from 2.0.17 to 2.0.20.'}), frozendict({'id': 'BSI-DSZ-CC-1124-2021-MA-02 (Ausstellungsdatum / Certification Date 03.08.2021) Maintenance Report / Maintenancereport Die Änderung am zertifizierten Produkt betreffen kleinere Anpassungen, wie Display-Texte und Return Codes. Diese aktualisierte Produktversion wird durch eine neue Versionsnummer kenntlich gemacht.', 'description': 'The change to the certified product is at the level of minor fixes covering e.g. display-text layout and return codes. The identification of the maintained product is indicated by a new version number compared to the certified product.'}), frozendict({'id': 'BSI-DSZ-CC-1124-2021-MA-01 (Ausstellungsdatum / Certification Date 17.05.2021) Maintenance Report / Maintenancereport Das eHealth Karten-Terminal mit Touchscreen Display, ST-1506, AFxZ 2.0.4:4.0.0 wurde auf der Ebene des Power Management geändert. Dementsprechend hat sich die Versionsnummer von AFxZ 2.0.0:4.0.0 zu AFxZ 2.0.4:4.0.0 geändert.', 'description': 'The eHealth Card Terminal with Touchscreen Display, ST-1506, AFxZ 2.0.4:4.0.0 was changed on power management level. Therefore the version number changed from AFxZ 2.0.0:4.0.0 to AFxZ 2.0.4:4.0.0.'}), frozendict({'id': 'BSI-DSZ-CC-1124-2021 (Ausstellungsdatum / Certification Date 15.04.2021, gültig bis / valid until 14.04.2026)', 'description': 'Certificate'})] | |
Report Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1124V3a_pdf.pdf?__blob=publicationFile&v=2 | |
Target Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1124V3b_pdf.pdf?__blob=publicationFile&v=2 | |
Cert Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1124V3c_pdf.pdf?__blob=publicationFile&v=2 | |
Description | The TOE is the card terminal eHealth Terminal ST-1506 with 2 ID1 Slots (HPC and eGK) and 2 SMC Slots (SM-KT (supporting SMC-B and SMC-KT cards) and SMC-A), 720p touchscreen (also used for secure pin entry) and LAN interfaces for the use in the German healthcare system with HPC and eGK. It addresses the security services provided by this terminal: Access to one or more slots for smart cards, Secure network connectivity,Secure PIN entry functionality,Enforcement of the encryption of communication,User authentication,Management functionality including update of Firmware,Passive and active physical protection. | |
Subcategory | Card reader |
References ?
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': ['BSI-DSZ-CC-1124-2021', 'BSI-DSZ-CC-1124-V2-2022'], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'certification_date': '2023-06-06', 'enhanced': {'__update__': {'applicant': 'Cherry GmbH Cherrystraße 2 91275 Auerbach/Opf', 'evaluation_facility': 'TÜV Informationstechnik GmbH', 'certification_date': '2023-06-06', 'expiration_date': '2028-06-05', 'entries': {'1': {'__update__': {'id': 'BSI-DSZ-CC-1124-V3-2023-MA-01 (Ausstellungsdatum / Certification Date 05.01.2024) Maintenance Report / Maintenancereport Das CHERRY eHealth Terminal ST-1506, FW 4.0.23, HW 4.0.0 wurde aufgrund von Usability-Aspekten (Display-Layout und Handling) sowie zur Verbesserung der Kompatibilität mit dem Konnektor geändert. Diese Änderungen modifizieren keine sicherheitsrelevanten Funktionen im Quellcode und wirken sich nur auf die Benutzeroberfläche aus. Die Änderungen sind daher auch mit einer Aktualisierung des Benutzerhandbuchs verbunden. Die Konfigurationsmanagementverfahren erforderten eine Änderung der Produktkennung. Daher wurde die Versionsnummer von FW 4.0.0, HW 4.0.0 auf FW 4.0.23, HW 4.0.0 geändert.'}}, '3': {'__update__': {'id': 'BSI-DSZ-CC-1124-V2-2022-MA-02 (Ausstellungsdatum / Certification Date 03.11.2022) Maintenance Report / Maintenancereport Das CHERRY eHealth Terminal ST-1506, AFxZ FW 3.0.28, HW 4.0.0 würde in Hinsicht auf eine Anforderung an die Metadaten der SSL-Verbindung angepasst. Konfigurations-Management Vorgaben erfordern daher auch die Änderung der Produkt-ID. Dementsprechend hat sich die Versionsnummer von AFxZ FW 3.0.24, HW 4.0.0 nach AFxZ FW 3.0.28, HW 4.0.0 geändert. Außerdem wurde ein Dokument welches Teile der sicheren Auslieferungskette beschreibt, redaktionell angepasst.'}}, '4': {'__update__': {'id': 'BSI-DSZ-CC-1124-V2-2022-MA-01 (Ausstellungsdatum / Certification Date 23.05.2022) Maintenance Report / Maintenancereport Das CHERRY eHealth Terminal ST-1506, AFxZ FW 3.0.24, HW 4.0.0 würde in Hinsicht der Konnektor-Interoperabilität (TLS-Timeout, SICCT Request Command) angepasst. Konfigurations-Management Vorgaben erfordern daher auch die Änderung der Produkt-ID. Dementsprechend hat sich die Versionsnummer von AFxZ FW 3.0.0, HW 4.0.0 in AFxZ FW 3.0.24, HW 4.0.0 geändert.'}}, '20': {'__update__': {'id': 'BSI-DSZ-CC-1124-2021-MA-04 (Ausstellungsdatum / Certification Date 16.03.2022) Maintenance Report / Maintenancereport Das CHERRY eHealth Terminal ST-1506, FW 2.0.20 HW 4.0.0 wurde in Hinsicht der konkreten Bestückung der Platine des Mainboards geändert. Diese deckt eine zweite Bestückungsmöglichkeit ab, ohne die Funktionalität zu verändern. Die TOE Hardware Version 4.0.0 besteht jetzt aus den PCB Versionen 2.2.7 oder 2.2.8.'}}, '21': {'__update__': {'id': 'BSI-DSZ-CC-1124-2021-MA-03 (Ausstellungsdatum / Certification Date 13.10.2021) Maintenance Report / Maintenancereport Der CHERRY eHealth Terminal ST-1506, FW 2.0.20, HW 4.0.0 wurde in Hinsicht auf einen Timeout-Wert geändert. Konfigurations-Management Vorgaben erfordern daher auch die Änderung der Produkt-ID, bei der sich die Versionsnummer von 2.0.17 in 2.0.20 geändert hat.'}}, '22': {'__update__': {'id': 'BSI-DSZ-CC-1124-2021-MA-02 (Ausstellungsdatum / Certification Date 03.08.2021) Maintenance Report / Maintenancereport Die Änderung am zertifizierten Produkt betreffen kleinere Anpassungen, wie Display-Texte und Return Codes. Diese aktualisierte Produktversion wird durch eine neue Versionsnummer kenntlich gemacht.'}}, '23': {'__update__': {'id': 'BSI-DSZ-CC-1124-2021-MA-01 (Ausstellungsdatum / Certification Date 17.05.2021) Maintenance Report / Maintenancereport Das eHealth Karten-Terminal mit Touchscreen Display, ST-1506, AFxZ 2.0.4:4.0.0 wurde auf der Ebene des Power Management geändert. Dementsprechend hat sich die Versionsnummer von AFxZ 2.0.0:4.0.0 zu AFxZ 2.0.4:4.0.0 geändert.'}}}, 'description': 'The TOE is the card terminal eHealth Terminal ST-1506 with 2 ID1 Slots (HPC and eGK) and 2 SMC Slots (SM-KT (supporting SMC-B and SMC-KT cards) and SMC-A), 720p touchscreen (also used for secure pin entry) and LAN interfaces for the use in the German healthcare system with HPC and eGK. It addresses the security services provided by this terminal: Access to one or more slots for smart cards, Secure network connectivity,Secure PIN entry functionality,Enforcement of the encryption of communication,User authentication,Management functionality including update of Firmware,Passive and active physical protection.'}}}
data.
- The scheme_data property was updated, with the
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Common Criteria Protection Profile Electronic Health Card Terminal', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0032V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['EHCT_V3_6']}}]}
.
- The new value is
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7a905f1e699a42c4163a13e2aef95fd422200323690883fdcfab577b84aa6150', 'txt_hash': '8417cdd7fcd8953658eaee46398730da4ffd847e0b6f3b84774fb4ae16d665bc'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '6dd6f35d9106f8430d64e15b283cdf608068a6ea019952761ce01b0ea6c11ac6', 'txt_hash': '2fd7d608e1104b7cb60851d54313509096e9bb7d1d2be18f97b7f34dd59aa068'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '9ae5c46e79d9af572e8d12ca0fe886ea4069988924e96aeb503456bd3bf5185c', 'txt_hash': 'bea90a5a7086b6a520b3b4ac1ac1b510448e4eb045222f38480c9173986516ee'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 748722, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 28, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/Keywords': '"Common Criteria, Certification, Zertifizierung, eHealth, Cherry, Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01"', '/Subject': 'Common Criteria, Certification, Zertifizierung, eHealth, Cherry, Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01', '/Title': 'Certification Report BSI-DSZ-CC-1124-V3-2023', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/', 'https://www.commoncriteriaportal.org/', 'https://www.sogis.eu/', 'https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/zertifizierungsreporte', 'https://www.cherry.de/eHealth', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/AIS']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1137551, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 77, '/Author': 'Cherry Digital Health GmbH', '/Keywords': 'Cherry, Digital, Health, GmbH;, eHealth, Terminal', '/Subject': 'Cherry Digital Health GmbH, eHealth Terminal', '/Title': 'Security Target EAL3+ for eHealth Terminal ST-1506', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.cherry.de/']}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 348337, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/Keywords': '"Common Criteria, Certification, Zertifizierung, eHealth, Cherry, Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01"', '/Subject': 'Common Criteria, Certification, Zertifizierung, eHealth, Cherry, Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01', '/Title': 'Certificate BSI-DSZ-CC-1124-V3-2023', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-1124-V3-2023', 'cert_item': 'CHERRY eHealth Terminal ST-1506 FW 4.0.0, HW 4.0.0', 'developer': 'Cherry Digital Health GmbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC- PP-0032-V2-2015-MA-01, 22 May 2017', 'cc_version': 'PP conformant Common Criteria Part 2 conformant', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.4 valid until: 5 June 2028'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1124-V3-2023': 15, 'BSI-DSZ-CC-1124-V2-': 1, 'BSI-DSZ-CC-1124-V2-2022': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0032-V2-2015-MA-01': 2, 'BSI-CC-PP-0032-V2-2015-MA-': 1}}, 'cc_security_level': {'EAL': {'EAL 3': 4, 'EAL 4': 4, 'EAL 2': 3, 'EAL 1': 1, 'EAL3+': 1, 'EAL 3 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 4, 'ADV_IMP.1': 4, 'ADV_TDS.3': 4}, 'ALC': {'ALC_TAT.1': 4, 'ALC_FLR': 3, 'ALC_DEL': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_FUN': 1, 'ATE_IND': 3}, 'AVA': {'AVA_VAN.4': 5, 'AVA_VAN': 2}}, 'cc_sfr': {'FCS': {'FCS_CKM.1': 1, 'FCS_COP.1': 5, 'FCS_CKM': 1}, 'FIA': {'FIA_UAU.5': 2}, 'FMT': {'FMT_SMR.1': 1}}, 'cc_claims': {'O': {'O.PROTECTION': 1}}, 'vendor': {}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 4, 'AES-': 4}, 'HPC': {'HPC': 3}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDHE': 3}, 'ECDSA': {'ECDSA': 10}, 'ECC': {'ECC': 1}}, 'FF': {'DH': {'Diffie-Hellman': 2, 'DH': 1, 'DHE': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA256': 5, 'SHA384': 2, 'SHA-256': 4, 'SHA-2': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 1}, 'TLS': {'TLS': {'TLS': 2, 'TLS 1.2': 2, 'TLS v1.2': 1}}}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {'CBC': {'CBC': 1}, 'GCM': {'GCM': 3}}, 'ecc_curve': {'NIST': {'P-256': 6, 'P-384': 6}, 'Brainpool': {'brainpoolP384r1': 5, 'brainpoolP256r1': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 197': 2, 'FIPS PUB 180-2': 2, 'FIPS 180-4': 5}, 'PKCS': {'PKCS#1': 3}, 'BSI': {'AIS 32': 1, 'AIS 38': 1}, 'RFC': {'RFC 5246': 2, 'RFC 8017': 2, 'RFC 4492': 1, 'RFC 5639': 1, 'RFC 4226': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}, 'X509': {'X.509': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Health GmbH [7] Evaluation Technical Report, Version 1, 2023-04-20, TÜV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7': 1, '2023-01-31, ALC_CMS_SW, V2.0, 2023-03-27, BOM, V4.0.0, 2023-02-01, Bibliography V5.4, 2023-04-19 (confidential documents) [10] eHealth Terminal ST-1506 – Kurzanleitung für Benutzer (Teilenummer:64410078), Version 05': 1, '14] Common-Criteria-3.1 Dokument ALC_DEL.1, Version 1.1, 2023-01-27, Cherry Digital Health GmbH, (confidential document) C Excerpts from the Criteria For the meaning of the assurance components and levels the following': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {'NL': {'NSCIB-CC-180212-CR2': 2, 'NSCIB-CC-180212-CR5': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0098-2020': 1, 'BSI-CC-PP-0032-V2-2015-MA01': 4, 'BSI-CC-PP-0098-2018': 1, 'BSI-CC-PP-0098': 1}}, 'cc_security_level': {'EAL': {'EAL3+': 1, 'EAL 3': 3, 'EAL6+': 1, 'EAL3': 1, 'EAL3 augmented': 1, 'EAL 3 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 5, 'ADV_IMP.1': 6, 'ADV_TDS.3': 5, 'ADV_ARC.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_TAT.1': 5, 'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.4': 5}, 'ASE': {'ASE_TSS': 2, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FCS': {'FCS_CKM': 24, 'FCS_CKM.4': 32, 'FCS_COP': 52, 'FCS_CKM.1': 14, 'FCS_CKM.2': 4, 'FCS_COP.1': 10, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_IFF.1': 16, 'FDP_ACC': 27, 'FDP_ACF': 27, 'FDP_IFC': 21, 'FDP_IFF': 22, 'FDP_RIP.1': 9, 'FDP_ITC.1': 15, 'FDP_ITC.2': 12, 'FDP_ACC.1': 12, 'FDP_ACF.1': 14, 'FDP_IFC.1': 13, 'FDP_RIP.1.1': 1}, 'FIA': {'FIA_AFL.1': 8, 'FIA_ATD.1': 7, 'FIA_SOS.1': 8, 'FIA_UAU.1': 10, 'FIA_UAU.5': 7, 'FIA_UAU.7': 8, 'FIA_UID.1': 14, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 2, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_SMF.1': 14, 'FMT_MSA': 40, 'FMT_MSA.2': 10, 'FMT_SMR.1': 24, 'FMT_MSA.3': 14, 'FMT_MSA.1': 8, 'FMT_MSA.2.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_PHP.3': 11, 'FPT_FLS.1': 8, 'FPT_ITT.1': 8, 'FPT_PHP.1': 10, 'FPT_TST.1': 10, 'FPT_FLS.1.1': 1, 'FPT_ITT.1.1': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTA': {'FTA_TAB': 7, 'FTA_TAB.1': 1}, 'FTP': {'FTP_ITC': 7, 'FTP_TRP': 8, 'FTP_ITC.1': 4, 'FTP_TRP.1': 3}}, 'cc_claims': {'O': {'O.ACCESS_CONTROL': 9, 'O.PIN_ENTRY': 6, 'O.MANAGEMENT': 8, 'O.SECURE_CHANNEL': 4, 'O.STATE': 7, 'O.PROTECTION': 9}, 'T': {'T.COM': 3, 'T.PIN': 6, 'T.DATA': 3, 'T.F-CONNECTOR': 4}, 'A': {'A.PUSH_SERVER': 4, 'A.ENV': 7, 'A.ADMIN': 3, 'A.CONNECTOR': 3, 'A.SM': 4}, 'OE': {'OE.ENV': 11, 'OE.ADMIN': 4, 'OE.CONNECTOR': 6, 'OE.SM': 2, 'OE.PUSH_SERVER': 4}, 'OSP': {'OSP.PIN_ENTRY': 5}}, 'vendor': {'NXP': {'NXP': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 4}, 'HPC': {'HPC': 11}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 6}, 'ECC': {'ECC': 7}}, 'FF': {'DH': {'DH': 2, 'Diffie-Hellman': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 28}}, 'IPsec': {'IPsec': 1}, 'VPN': {'VPN': 11}}, 'randomness': {'PRNG': {'PRNG': 2}}, 'cipher_mode': {'GCM': {'GCM': 1}}, 'ecc_curve': {'NIST': {'P-256': 2, 'P-384': 4}, 'Brainpool': {'brainpoolP256r1': 3, 'brainpoolP384r1': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_DHE_RSA_WITH_AES_128_CBC_SHA': 4, 'TLS_DHE_RSA_WITH_AES_256_CBC_SHA': 4, 'TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256': 1, 'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384': 1, 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA': 1, 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA': 1}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 7}}, 'technical_report_id': {'BSI': {'BSI TR-03111': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {'JCOP': {'JCOP 4': 2}}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 197': 1}, 'PKCS': {'PKCS#1': 4}, 'BSI': {'AIS 20': 1, 'AIS 31': 1}, 'RFC': {'RFC 5246': 3, 'RFC 5289': 1, 'RFC 8017': 1, 'RFC 8422': 1}, 'X509': {'X.509': 5}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The cert_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1124-V3-2023': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 3': 1, 'EAL 4': 1, 'EAL 2': 1, 'EAL 3 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'ALC': {'ALC_TAT.1': 1, 'ALC_FLR': 1}, 'AVA': {'AVA_VAN.4': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
1124V3a_pdf.pdf
. - The st_filename property was set to
1124V3b_pdf.pdf
. - The cert_filename property was set to
1124V3c_pdf.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['BSI']
. - The cert_id property was set to
BSI-DSZ-CC-1124-V3-2023
. - The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['NSCIB-CC-180212-CR5']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['NSCIB-CC-180212-CR5']}}
data. - The report_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1124-V2-2022']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1124-2021', 'BSI-DSZ-CC-1124-V2-2022']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]}
values added. - The scheme_data property was set to
{'cert_id': 'BSI-DSZ-CC-1124-V3-2023', 'product': 'CHERRY eHealth Terminal ST-1506, AFxZ FW 3.0.0, HW 4.0.0', 'vendor': 'Cherry GmbH', 'certification_date': '06.06.2023', 'category': 'eHealth', 'url': 'https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Gesundheitswesen_Kartenlesegeraete/1124_1124V2_1124V3.html', 'enhanced': {'product': 'CHERRY eHealth Terminal ST-1506, AFxZ FW 3.0.0, HW 4.0.0', 'applicant': 'Cherry GmbH\nCherrystraße 2\n91275 Auerbach/Opf', 'evaluation_facility': 'TÜV Informationstechnik GmbH', 'assurance_level': 'EAL3+,ADV_FSP.4,ADV_IMP.1,ADV_TDS.3,ALC_TAT.1,AVA_VLA.4', 'certification_date': '06.06.2023', 'expiration_date': '05.06.2028', 'entries': [{'id': 'BSI', 'description': '4.0.0'}, {'id': 'BSI-DSZ-CC-1124-V3-2023-MA-01 (Ausstellungsdatum / Certification Date 05.01.2024)\nMaintenance Report / Maintenancereport\nDas CHERRY eHealth Terminal ST-1506, FW 4.0.23, HW 4.0.0 wurde aufgrund von Usability-Aspekten (Display-Layout und Handling) sowie zur Verbesserung der Kompatibilität mit dem Konnektor geändert. Diese Änderungen modifizieren keine sicherheitsrelevanten Funktionen im Quellcode und wirken sich nur auf die Benutzeroberfläche aus. Die Änderungen sind daher auch mit einer Aktualisierung des Benutzerhandbuchs verbunden. Die Konfigurationsmanagementverfahren erforderten eine Änderung der Produktkennung. Daher wurde die Versionsnummer von FW 4.0.0, HW 4.0.0 auf FW 4.0.23, HW 4.0.0 geändert.', 'description': '4.0.0'}, {'id': 'BSI-DSZ-CC-1124-V3-2023 (Ausstellungsdatum / Certification Date 06.06.2023, gültig bis / valid until 05.06.2028)', 'description': '- Passive and active physical protection.'}, {'id': 'BSI-DSZ-CC-1124-V2-2022-MA-02 (Ausstellungsdatum / Certification Date 03.11.2022)\nMaintenance Report / Maintenancereport\nDas CHERRY eHealth Terminal ST-1506, AFxZ FW 3.0.28, HW 4.0.0 würde in Hinsicht auf eine Anforderung an die Metadaten der SSL-Verbindung angepasst. Konfigurations-Management Vorgaben erfordern daher auch die Änderung der Produkt-ID. Dementsprechend hat sich die Versionsnummer von AFxZ FW 3.0.24, HW 4.0.0 nach AFxZ FW 3.0.28, HW 4.0.0 geändert. Außerdem wurde ein Dokument welches Teile der sicheren Auslieferungskette beschreibt, redaktionell angepasst.', 'description': '4.0.0. Furthermore an document related to the secure delivery chain has been editorially changed.'}, {'id': 'BSI-DSZ-CC-1124-V2-2022-MA-01 (Ausstellungsdatum / Certification Date 23.05.2022)\nMaintenance Report / Maintenancereport\nDas CHERRY eHealth Terminal ST-1506, AFxZ FW 3.0.24, HW 4.0.0 würde in Hinsicht der Konnektor-Interoperabilität (TLS-Timeout, SICCT Request Command) angepasst. Konfigurations-Management Vorgaben erfordern daher auch die Änderung der Produkt-ID. Dementsprechend hat sich die Versionsnummer von AFxZ FW 3.0.0, HW 4.0.0 in AFxZ FW 3.0.24, HW 4.0.0 geändert.', 'description': '4.0.0.'}, {'id': 'BSI-DSZ-CC-1124-V2-2022 (Ausstellungsdatum / Certification Date 11.05.2022, gültig bis / valid until 10.05.2027)', 'description': 'Certificate'}, {'id': 'Zugriff'}, {'id': 'Sichere'}, {'id': 'Sichere'}, {'id': 'Unterstützung'}, {'id': 'Benutzerauthentifizieung,'}, {'id': 'Management'}, {'id': 'Passiver und aktiver physischer Schutz.'}, {'id': 'Access'}, {'id': 'Secure'}, {'id': 'Secure'}, {'id': 'Enforcement'}, {'id': 'User'}, {'id': 'Management'}, {'id': 'Passive'}, {'id': 'BSI-DSZ-CC-1124-2021-MA-04 (Ausstellungsdatum / Certification Date 16.03.2022)\nMaintenance Report / Maintenancereport\nDas CHERRY eHealth Terminal ST-1506, FW 2.0.20 HW 4.0.0 wurde in Hinsicht der konkreten Bestückung der Platine des Mainboards geändert. Diese deckt eine zweite Bestückungsmöglichkeit ab, ohne die Funktionalität zu verändern. Die TOE Hardware Version 4.0.0 besteht jetzt aus den PCB Versionen 2.2.7 oder 2.2.8.', 'description': 'versions 2.2.7 or 2.2.8.'}, {'id': 'BSI-DSZ-CC-1124-2021-MA-03 (Ausstellungsdatum / Certification Date 13.10.2021)\nMaintenance Report / Maintenancereport\nDer CHERRY eHealth Terminal ST-1506, FW 2.0.20, HW 4.0.0 wurde in Hinsicht auf einen Timeout-Wert geändert. Konfigurations-Management Vorgaben erfordern daher auch die Änderung der Produkt-ID, bei der sich die Versionsnummer von 2.0.17 in 2.0.20 geändert hat.', 'description': 'The CHERRY eHealth Terminal ST-1506, FW 2.0.20, HW 4.0.0 was changed due to a extension of a timeout value. Configuration Management procedures required a change in the product identifier. Therefore the version number changed from 2.0.17 to 2.0.20.'}, {'id': 'BSI-DSZ-CC-1124-2021-MA-02 (Ausstellungsdatum / Certification Date 03.08.2021)\nMaintenance Report / Maintenancereport\nDie Änderung am zertifizierten Produkt betreffen kleinere Anpassungen, wie Display-Texte und Return Codes. Diese aktualisierte Produktversion wird durch eine neue Versionsnummer kenntlich gemacht.', 'description': 'The change to the certified product is at the level of minor fixes covering e.g. display-text layout and return codes. The identification of the maintained product is indicated by a new version number compared to the certified product.'}, {'id': 'BSI-DSZ-CC-1124-2021-MA-01 (Ausstellungsdatum / Certification Date 17.05.2021)\nMaintenance Report / Maintenancereport\nDas eHealth Karten-Terminal mit Touchscreen Display, ST-1506, AFxZ 2.0.4:4.0.0 wurde auf der Ebene des Power Management geändert. Dementsprechend hat sich die Versionsnummer von AFxZ 2.0.0:4.0.0 zu AFxZ 2.0.4:4.0.0 geändert.', 'description': 'The eHealth Card Terminal with Touchscreen Display, ST-1506, AFxZ 2.0.4:4.0.0 was changed on power management level. Therefore the version number changed from AFxZ 2.0.0:4.0.0 to AFxZ 2.0.4:4.0.0.'}, {'id': 'BSI-DSZ-CC-1124-2021 (Ausstellungsdatum / Certification Date 15.04.2021, gültig bis / valid until 14.04.2026)', 'description': 'Certificate'}], 'report_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1124V3a_pdf.pdf?__blob=publicationFile&v=2', 'target_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1124V3b_pdf.pdf?__blob=publicationFile&v=2', 'cert_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1124V3c_pdf.pdf?__blob=publicationFile&v=2', 'description': 'The TOE is the card terminal eHealth Terminal ST-1506 with 2 ID1 Slots (HPC and eGK) and 2 SMC Slots (SM-KT (supporting SMC-B and SMC-KT cards) and SMC-A), 720p touchscreen (also used for secure pin entry) and LAN interfaces for the use in the German healthcare system with HPC and eGK.\nIt addresses the security services provided by this terminal:\nAccess to one or more slots for smart cards,\n\nSecure network connectivity,Secure PIN entry functionality,Enforcement of the encryption of communication,User authentication,Management functionality including update of Firmware,Passive and active physical protection.'}, 'subcategory': 'Card reader'}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1124V3a_pdf.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1124V3b_pdf.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The report_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}
values discarded. - The scheme_data property was set to
None
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data.
- The st_references property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name CHERRY eHealth Terminal ST-1506, FW 4.0.0, HW 4.0.0 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1124V3c_pdf.pdf",
"dgst": "37bd19fc1419613b",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-1124-V3-2023",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 4
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"4.0.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [
"BSI-DSZ-CC-1124-2021",
"BSI-DSZ-CC-1124-V2-2022"
],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1124-V2-2022"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1124-2021",
"BSI-DSZ-CC-1124-V2-2022"
]
}
},
"scheme_data": {
"category": "eHealth",
"cert_id": "BSI-DSZ-CC-1124-V3-2023",
"certification_date": "2023-06-06",
"enhanced": {
"applicant": "Cherry GmbH Cherrystra\u00dfe 2 91275 Auerbach/Opf",
"assurance_level": "EAL3+,ADV_FSP.4,ADV_IMP.1,ADV_TDS.3,ALC_TAT.1,AVA_VLA.4",
"cert_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1124V3c_pdf.pdf?__blob=publicationFile\u0026v=2",
"certification_date": "2023-06-06",
"description": "The TOE is the card terminal eHealth Terminal ST-1506 with 2 ID1 Slots (HPC and eGK) and 2 SMC Slots (SM-KT (supporting SMC-B and SMC-KT cards) and SMC-A), 720p touchscreen (also used for secure pin entry) and LAN interfaces for the use in the German healthcare system with HPC and eGK. It addresses the security services provided by this terminal: Access to one or more slots for smart cards, Secure network connectivity,Secure PIN entry functionality,Enforcement of the encryption of communication,User authentication,Management functionality including update of Firmware,Passive and active physical protection.",
"entries": [
{
"description": "4.0.0",
"id": "BSI"
},
{
"description": "4.0.0",
"id": "BSI-DSZ-CC-1124-V3-2023-MA-01 (Ausstellungsdatum / Certification Date 05.01.2024) Maintenance Report / Maintenancereport Das CHERRY eHealth Terminal ST-1506, FW 4.0.23, HW 4.0.0 wurde aufgrund von Usability-Aspekten (Display-Layout und Handling) sowie zur Verbesserung der Kompatibilit\u00e4t mit dem Konnektor ge\u00e4ndert. Diese \u00c4nderungen modifizieren keine sicherheitsrelevanten Funktionen im Quellcode und wirken sich nur auf die Benutzeroberfl\u00e4che aus. Die \u00c4nderungen sind daher auch mit einer Aktualisierung des Benutzerhandbuchs verbunden. Die Konfigurationsmanagementverfahren erforderten eine \u00c4nderung der Produktkennung. Daher wurde die Versionsnummer von FW 4.0.0, HW 4.0.0 auf FW 4.0.23, HW 4.0.0 ge\u00e4ndert."
},
{
"description": "- Passive and active physical protection.",
"id": "BSI-DSZ-CC-1124-V3-2023 (Ausstellungsdatum / Certification Date 06.06.2023, g\u00fcltig bis / valid until 05.06.2028)"
},
{
"description": "4.0.0. Furthermore an document related to the secure delivery chain has been editorially changed.",
"id": "BSI-DSZ-CC-1124-V2-2022-MA-02 (Ausstellungsdatum / Certification Date 03.11.2022) Maintenance Report / Maintenancereport Das CHERRY eHealth Terminal ST-1506, AFxZ FW 3.0.28, HW 4.0.0 w\u00fcrde in Hinsicht auf eine Anforderung an die Metadaten der SSL-Verbindung angepasst. Konfigurations-Management Vorgaben erfordern daher auch die \u00c4nderung der Produkt-ID. Dementsprechend hat sich die Versionsnummer von AFxZ FW 3.0.24, HW 4.0.0 nach AFxZ FW 3.0.28, HW 4.0.0 ge\u00e4ndert. Au\u00dferdem wurde ein Dokument welches Teile der sicheren Auslieferungskette beschreibt, redaktionell angepasst."
},
{
"description": "4.0.0.",
"id": "BSI-DSZ-CC-1124-V2-2022-MA-01 (Ausstellungsdatum / Certification Date 23.05.2022) Maintenance Report / Maintenancereport Das CHERRY eHealth Terminal ST-1506, AFxZ FW 3.0.24, HW 4.0.0 w\u00fcrde in Hinsicht der Konnektor-Interoperabilit\u00e4t (TLS-Timeout, SICCT Request Command) angepasst. Konfigurations-Management Vorgaben erfordern daher auch die \u00c4nderung der Produkt-ID. Dementsprechend hat sich die Versionsnummer von AFxZ FW 3.0.0, HW 4.0.0 in AFxZ FW 3.0.24, HW 4.0.0 ge\u00e4ndert."
},
{
"description": "Certificate",
"id": "BSI-DSZ-CC-1124-V2-2022 (Ausstellungsdatum / Certification Date 11.05.2022, g\u00fcltig bis / valid until 10.05.2027)"
},
{
"id": "Zugriff"
},
{
"id": "Sichere"
},
{
"id": "Sichere"
},
{
"id": "Unterst\u00fctzung"
},
{
"id": "Benutzerauthentifizieung,"
},
{
"id": "Management"
},
{
"id": "Passiver und aktiver physischer Schutz."
},
{
"id": "Access"
},
{
"id": "Secure"
},
{
"id": "Secure"
},
{
"id": "Enforcement"
},
{
"id": "User"
},
{
"id": "Management"
},
{
"id": "Passive"
},
{
"description": "versions 2.2.7 or 2.2.8.",
"id": "BSI-DSZ-CC-1124-2021-MA-04 (Ausstellungsdatum / Certification Date 16.03.2022) Maintenance Report / Maintenancereport Das CHERRY eHealth Terminal ST-1506, FW 2.0.20 HW 4.0.0 wurde in Hinsicht der konkreten Best\u00fcckung der Platine des Mainboards ge\u00e4ndert. Diese deckt eine zweite Best\u00fcckungsm\u00f6glichkeit ab, ohne die Funktionalit\u00e4t zu ver\u00e4ndern. Die TOE Hardware Version 4.0.0 besteht jetzt aus den PCB Versionen 2.2.7 oder 2.2.8."
},
{
"description": "The CHERRY eHealth Terminal ST-1506, FW 2.0.20, HW 4.0.0 was changed due to a extension of a timeout value. Configuration Management procedures required a change in the product identifier. Therefore the version number changed from 2.0.17 to 2.0.20.",
"id": "BSI-DSZ-CC-1124-2021-MA-03 (Ausstellungsdatum / Certification Date 13.10.2021) Maintenance Report / Maintenancereport Der CHERRY eHealth Terminal ST-1506, FW 2.0.20, HW 4.0.0 wurde in Hinsicht auf einen Timeout-Wert ge\u00e4ndert. Konfigurations-Management Vorgaben erfordern daher auch die \u00c4nderung der Produkt-ID, bei der sich die Versionsnummer von 2.0.17 in 2.0.20 ge\u00e4ndert hat."
},
{
"description": "The change to the certified product is at the level of minor fixes covering e.g. display-text layout and return codes. The identification of the maintained product is indicated by a new version number compared to the certified product.",
"id": "BSI-DSZ-CC-1124-2021-MA-02 (Ausstellungsdatum / Certification Date 03.08.2021) Maintenance Report / Maintenancereport Die \u00c4nderung am zertifizierten Produkt betreffen kleinere Anpassungen, wie Display-Texte und Return Codes. Diese aktualisierte Produktversion wird durch eine neue Versionsnummer kenntlich gemacht."
},
{
"description": "The eHealth Card Terminal with Touchscreen Display, ST-1506, AFxZ 2.0.4:4.0.0 was changed on power management level. Therefore the version number changed from AFxZ 2.0.0:4.0.0 to AFxZ 2.0.4:4.0.0.",
"id": "BSI-DSZ-CC-1124-2021-MA-01 (Ausstellungsdatum / Certification Date 17.05.2021) Maintenance Report / Maintenancereport Das eHealth Karten-Terminal mit Touchscreen Display, ST-1506, AFxZ 2.0.4:4.0.0 wurde auf der Ebene des Power Management ge\u00e4ndert. Dementsprechend hat sich die Versionsnummer von AFxZ 2.0.0:4.0.0 zu AFxZ 2.0.4:4.0.0 ge\u00e4ndert."
},
{
"description": "Certificate",
"id": "BSI-DSZ-CC-1124-2021 (Ausstellungsdatum / Certification Date 15.04.2021, g\u00fcltig bis / valid until 14.04.2026)"
}
],
"evaluation_facility": "T\u00dcV Informationstechnik GmbH",
"expiration_date": "2028-06-05",
"product": "CHERRY eHealth Terminal ST-1506, AFxZ FW 3.0.0, HW 4.0.0",
"report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1124V3a_pdf.pdf?__blob=publicationFile\u0026v=2",
"target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1124V3b_pdf.pdf?__blob=publicationFile\u0026v=2"
},
"product": "CHERRY eHealth Terminal ST-1506, AFxZ FW 3.0.0, HW 4.0.0",
"subcategory": "Card reader",
"url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Gesundheitswesen_Kartenlesegeraete/1124_1124V2_1124V3.html",
"vendor": "Cherry GmbH"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"NSCIB-CC-180212-CR5"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"NSCIB-CC-180212-CR5"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2024-04-12",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1124V3ma2a_pdf.pdf",
"maintenance_st_link": null,
"maintenance_title": "CHERRY eHealth Terminal ST-1506, FW 4.0.25, HW 4.0.0"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2024-01-05",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1124V3ma1a_pdf.pdf",
"maintenance_st_link": null,
"maintenance_title": "CHERRY eHealth Terminal ST-1506, FW 4.0.23, HW 4.0.0"
}
]
},
"manufacturer": "Cherry GmbH",
"manufacturer_web": "https://www.cherrycorp.com/",
"name": "CHERRY eHealth Terminal ST-1506, FW 4.0.0, HW 4.0.0",
"not_valid_after": "2028-06-05",
"not_valid_before": "2023-06-06",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "1124V3c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1124-V3-2023": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"ALC": {
"ALC_FLR": 1,
"ALC_TAT.1": 1
},
"AVA": {
"AVA_VAN.4": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 3": 1,
"EAL 3 augmented": 1,
"EAL 4": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, eHealth, Cherry, Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01\"",
"/Subject": "Common Criteria, Certification, Zertifizierung, eHealth, Cherry, Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01",
"/Title": "Certificate BSI-DSZ-CC-1124-V3-2023",
"pdf_file_size_bytes": 348337,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "1124V3a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.4 valid until: 5 June 2028",
"cc_version": "PP conformant Common Criteria Part 2 conformant",
"cert_id": "BSI-DSZ-CC-1124-V3-2023",
"cert_item": "CHERRY eHealth Terminal ST-1506 FW 4.0.0, HW 4.0.0",
"cert_lab": "BSI",
"developer": "Cherry Digital Health GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC- PP-0032-V2-2015-MA-01, 22 May 2017"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDH": {
"ECDHE": 3
},
"ECDSA": {
"ECDSA": 10
}
},
"FF": {
"DH": {
"DH": 1,
"DHE": 2,
"Diffie-Hellman": 2
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1124-V2-": 1,
"BSI-DSZ-CC-1124-V2-2022": 2,
"BSI-DSZ-CC-1124-V3-2023": 15
}
},
"cc_claims": {
"O": {
"O.PROTECTION": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0032-V2-2015-MA-": 1,
"BSI-CC-PP-0032-V2-2015-MA-01": 2
}
},
"cc_sar": {
"ADV": {
"ADV_FSP.4": 4,
"ADV_IMP.1": 4,
"ADV_TDS.3": 4
},
"ALC": {
"ALC_DEL": 1,
"ALC_DEL.1": 1,
"ALC_FLR": 3,
"ALC_TAT.1": 4
},
"ATE": {
"ATE_FUN": 1,
"ATE_IND": 3
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.4": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 3,
"EAL 3": 4,
"EAL 3 augmented": 3,
"EAL 4": 4,
"EAL3+": 1
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM": 1,
"FCS_CKM.1": 1,
"FCS_COP.1": 5
},
"FIA": {
"FIA_UAU.5": 2
},
"FMT": {
"FMT_SMR.1": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"14] Common-Criteria-3.1 Dokument ALC_DEL.1, Version 1.1, 2023-01-27, Cherry Digital Health GmbH, (confidential document) C Excerpts from the Criteria For the meaning of the assurance components and levels the following": 1,
"2023-01-31, ALC_CMS_SW, V2.0, 2023-03-27, BOM, V4.0.0, 2023-02-01, Bibliography V5.4, 2023-04-19 (confidential documents) [10] eHealth Terminal ST-1506 \u2013 Kurzanleitung f\u00fcr Benutzer (Teilenummer:64410078), Version 05": 1,
"Health GmbH [7] Evaluation Technical Report, Version 1, 2023-04-20, T\u00dcV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 1
},
"GCM": {
"GCM": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 1
},
"TLS": {
"TLS": {
"TLS": 2,
"TLS 1.2": 2,
"TLS v1.2": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {
"Brainpool": {
"brainpoolP256r1": 2,
"brainpoolP384r1": 5
},
"NIST": {
"P-256": 6,
"P-384": 6
}
},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 3
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-2": 2,
"SHA-256": 4,
"SHA256": 5,
"SHA384": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 32": 1,
"AIS 38": 1
},
"FIPS": {
"FIPS 180-4": 5,
"FIPS 197": 2,
"FIPS PUB 180-2": 2
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
},
"PKCS": {
"PKCS#1": 3
},
"RFC": {
"RFC 4226": 1,
"RFC 4492": 1,
"RFC 5246": 2,
"RFC 5639": 1,
"RFC 8017": 2
},
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 4,
"AES-": 4
},
"HPC": {
"HPC": 3
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7148": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, eHealth, Cherry, Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01\"",
"/Subject": "Common Criteria, Certification, Zertifizierung, eHealth, Cherry, Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01",
"/Title": "Certification Report BSI-DSZ-CC-1124-V3-2023",
"pdf_file_size_bytes": 748722,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.sogis.eu/",
"https://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/",
"https://www.bsi.bund.de/zertifizierung",
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/zertifizierungsreporte",
"https://www.cherry.de/eHealth",
"https://www.bsi.bund.de/AIS",
"http://www.commoncriteriaportal.org/cc/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 28
},
"st_filename": "1124V3b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 7
},
"ECDSA": {
"ECDSA": 6
}
},
"FF": {
"DH": {
"DH": 2,
"Diffie-Hellman": 2
}
}
},
"cc_cert_id": {
"NL": {
"NSCIB-CC-180212-CR2": 2,
"NSCIB-CC-180212-CR5": 2
}
},
"cc_claims": {
"A": {
"A.ADMIN": 3,
"A.CONNECTOR": 3,
"A.ENV": 7,
"A.PUSH_SERVER": 4,
"A.SM": 4
},
"O": {
"O.ACCESS_CONTROL": 9,
"O.MANAGEMENT": 8,
"O.PIN_ENTRY": 6,
"O.PROTECTION": 9,
"O.SECURE_CHANNEL": 4,
"O.STATE": 7
},
"OE": {
"OE.ADMIN": 4,
"OE.CONNECTOR": 6,
"OE.ENV": 11,
"OE.PUSH_SERVER": 4,
"OE.SM": 2
},
"OSP": {
"OSP.PIN_ENTRY": 5
},
"T": {
"T.COM": 3,
"T.DATA": 3,
"T.F-CONNECTOR": 4,
"T.PIN": 6
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0032-V2-2015-MA01": 4,
"BSI-CC-PP-0098": 1,
"BSI-CC-PP-0098-2018": 1,
"BSI-CC-PP-0098-2020": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 5,
"ADV_IMP.1": 6,
"ADV_TDS.3": 5
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.3": 1,
"ALC_CMS.3": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_LCD.1": 1,
"ALC_TAT.1": 5
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.4": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 3": 3,
"EAL 3 augmented": 2,
"EAL3": 1,
"EAL3 augmented": 1,
"EAL3+": 1,
"EAL6+": 1
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM": 24,
"FCS_CKM.1": 14,
"FCS_CKM.2": 4,
"FCS_CKM.4": 32,
"FCS_CKM.4.1": 1,
"FCS_COP": 52,
"FCS_COP.1": 10
},
"FDP": {
"FDP_ACC": 27,
"FDP_ACC.1": 12,
"FDP_ACF": 27,
"FDP_ACF.1": 14,
"FDP_IFC": 21,
"FDP_IFC.1": 13,
"FDP_IFF": 22,
"FDP_IFF.1": 16,
"FDP_ITC.1": 15,
"FDP_ITC.2": 12,
"FDP_RIP.1": 9,
"FDP_RIP.1.1": 1
},
"FIA": {
"FIA_AFL.1": 8,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 2,
"FIA_ATD.1": 7,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 8,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 10,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.5": 7,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.7": 8,
"FIA_UAU.7.1": 1,
"FIA_UID.1": 14,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MSA": 40,
"FMT_MSA.1": 8,
"FMT_MSA.2": 10,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 14,
"FMT_SMF.1": 14,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 24,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS.1": 8,
"FPT_FLS.1.1": 1,
"FPT_ITT.1": 8,
"FPT_ITT.1.1": 1,
"FPT_PHP.1": 10,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_PHP.3": 11,
"FPT_PHP.3.1": 1,
"FPT_TST.1": 10,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTA": {
"FTA_TAB": 7,
"FTA_TAB.1": 1
},
"FTP": {
"FTP_ITC": 7,
"FTP_ITC.1": 4,
"FTP_TRP": 8,
"FTP_TRP.1": 3
}
},
"certification_process": {},
"cipher_mode": {
"GCM": {
"GCM": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IPsec": {
"IPsec": 1
},
"TLS": {
"TLS": {
"TLS": 28
}
},
"VPN": {
"VPN": 11
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {
"Brainpool": {
"brainpoolP256r1": 3,
"brainpoolP384r1": 2
},
"NIST": {
"P-256": 2,
"P-384": 4
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"JCOP": {
"JCOP 4": 2
}
},
"pq_crypto": {},
"randomness": {
"PRNG": {
"PRNG": 2
}
},
"side_channel_analysis": {
"FI": {
"physical tampering": 7
}
},
"standard_id": {
"BSI": {
"AIS 20": 1,
"AIS 31": 1
},
"FIPS": {
"FIPS 197": 1
},
"PKCS": {
"PKCS#1": 4
},
"RFC": {
"RFC 5246": 3,
"RFC 5289": 1,
"RFC 8017": 1,
"RFC 8422": 1
},
"X509": {
"X.509": 5
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 4
},
"HPC": {
"HPC": 11
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-03111": 1
}
},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 4,
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA": 4,
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 1,
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 1,
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": 1,
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": 1
}
},
"vendor": {
"NXP": {
"NXP": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Cherry Digital Health GmbH",
"/Keywords": "Cherry, Digital, Health, GmbH;, eHealth, Terminal",
"/Subject": "Cherry Digital Health GmbH, eHealth Terminal",
"/Title": "Security Target EAL3+ for eHealth Terminal ST-1506",
"pdf_file_size_bytes": 1137551,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.cherry.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 77
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL3+",
"pp_ids": {
"_type": "Set",
"elements": [
"EHCT_V3_6"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0032V2b_pdf.pdf",
"pp_name": "Common Criteria Protection Profile Electronic Health Card Terminal"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1124V3a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.4",
"ADV_IMP.1",
"ADV_TDS.3",
"ADV_FSP.4",
"ALC_TAT.1",
"EAL3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1124V3b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "9ae5c46e79d9af572e8d12ca0fe886ea4069988924e96aeb503456bd3bf5185c",
"txt_hash": "bea90a5a7086b6a520b3b4ac1ac1b510448e4eb045222f38480c9173986516ee"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "7a905f1e699a42c4163a13e2aef95fd422200323690883fdcfab577b84aa6150",
"txt_hash": "8417cdd7fcd8953658eaee46398730da4ffd847e0b6f3b84774fb4ae16d665bc"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "6dd6f35d9106f8430d64e15b283cdf608068a6ea019952761ce01b0ea6c11ac6",
"txt_hash": "2fd7d608e1104b7cb60851d54313509096e9bb7d1d2be18f97b7f34dd59aa068"
}
},
"status": "active"
}