CHERRY eHealth Terminal ST-1506, AFxZ FW 3.0.0, HW 4.0.0

CSV information ?

Status active
Valid from 11.05.2022
Valid until 10.05.2027
Scheme 🇩🇪 DE
Manufacturer Cherry GmbH
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ADV_TDS.3, ALC_TAT.1, AVA_VAN.4, EAL3+, ADV_IMP.1, ADV_FSP.4
Maintenance updates CHERRY eHealth Terminal ST-1506, AFxZ FW 3.0.24, HW 4.0.0 (23.05.2022) Certification report
CHERRY eHealth Terminal ST-1506, AFxZ FW 3.0.28, HW 4.0.0 (03.11.2022) Certification report

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-1124-V2-2022

Certificate ?

Extracted keywords

Security level
EAL 3, EAL 4, EAL 2, EAL 3 augmented
Security Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, ALC_FLR, AVA_VAN.4
Certificates
BSI-DSZ-CC-1124-V2-2022

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Title Certificate BSI-DSZ-CC-1124-V2-2022
Subject CHERRY eHealth Terminal ST-1506
Keywords "Common Criteria, Certification, Zertifizierung, Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01, 22 May 2017, eHealth: Smart Card Readers, Cherry Digital Health GmbH"
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20220512080830+02'00'
Modification date D:20220513083417+02'00'
Pages 1
Creator Writer
Producer LibreOffice 6.3

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, AES-, HPC
Asymmetric Algorithms
ECDHE, ECDSA, ECC, DHE, Diffie-Hellman, DH
Hash functions
SHA256, SHA384, SHA-256, SHA-2
Protocols
SSH, TLS, TLS 1.2, TLS v1.2
Randomness
RNG
Elliptic Curves
P-256, P-384, brainpoolP384r1, brainpoolP256r1
Block cipher modes
CBC, GCM

Security level
EAL 3, EAL 4, EAL 2, EAL 1, EAL 2+, EAL3+, EAL 3 augmented
Security Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, ALC_FLR, ALC_DEL.1, ATE_FUN, ATE_IND, AVA_VAN.4, AVA_VAN
Security Functional Requirements (SFR)
FCS_CKM.1, FCS_COP.1, FIA_UAU.5, FMT_SMR.1
Protection profiles
BSI-CC-PP-0032-V2-2015-MA-01
Certificates
BSI-DSZ-CC-1124-V2-2022, BSI-DSZ-CC-1124-2021, CC-1124-2021
Evaluation facilities
TÜV Informationstechnik
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, 7] Evaluation Technical Report, Version 2, 2022-04-21, ETR SUMMARY, TÜV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, 2022-03-21, ALC_CMS_SW, V1.13, 2022-04-06, BOM, V4.0.0, 2022-03-07 Bibliography V4.5, 2022-04-07 (confidential document) [10] eHealth Terminal ST-1506 - Handbuch für Administratoren (Teilenummer: 64410079) , Version 4, 11] Common-Criteria-3.1 Dokument, ALC_DEL.1, Version 0.9, 2020-10-27 Cherry Digital Health GmbH, (confidential document) [12] gematik, Übergreifende Spezifikation Verwendung kryptographischer Algorithmen in der

Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, 7] Evaluation Technical Report, Version 2, 2022-04-21, ETR SUMMARY, TÜV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, 2022-03-21, ALC_CMS_SW, V1.13, 2022-04-06, BOM, V4.0.0, 2022-03-07 Bibliography V4.5, 2022-04-07 (confidential document) [10] eHealth Terminal ST-1506 - Handbuch für Administratoren (Teilenummer: 64410079) , Version 4, 11] Common-Criteria-3.1 Dokument, ALC_DEL.1, Version 0.9, 2020-10-27 Cherry Digital Health GmbH, (confidential document) [12] gematik, Übergreifende Spezifikation Verwendung kryptographischer Algorithmen in der

Standards
FIPS 197, FIPS PUB 180-2, FIPS 180-4, PKCS#1, AIS 32, RFC 5246, RFC 8017, RFC 4492, RFC 5639, RFC 4226, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, X.509
Technical reports
BSI TR-03111, BSI 7148

File metadata

Title Certification Report BSI-DSZ-CC-1124-V2-2022
Subject CHERRY eHealth Terminal ST-1506
Keywords "Common Criteria, Certification, Zertifizierung, Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01, 22 May 2017, eHealth: Smart Card Readers, Cherry Digital Health GmbH"
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20220512080830+02'00'
Modification date D:20220512084750+02'00'
Pages 28
Creator Writer
Producer LibreOffice 6.3

Frontpage

Certificate ID BSI-DSZ-CC-1124-V2-2022
Certified item CHERRY eHealth Terminal ST-1506 AFxZ FW 3.0.0, HW 4.0.0
Certification lab BSI
Developer Cherry Digital Health GmbH

References

Outgoing
  • BSI-DSZ-CC-1124-2021 - active - eHealth Card Terminal with Touchscreen Display, ST-1506, AFxZ 2.0.0:4.0.0
Incoming

Security target ?

Extracted keywords

Symmetric Algorithms
AES, HPC
Asymmetric Algorithms
ECDSA, ECC, DH, Diffie-Hellman
Hash functions
SHA-256
Protocols
TLS, IPsec, VPN
Randomness
PRNG
Elliptic Curves
P-256, P-384, brainpoolP256r1, brainpoolP384r1
Block cipher modes
GCM
TLS cipher suites
TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA

Operating System name
JCOP 4
Vendor
NXP

Security level
EAL3+, EAL 3, EAL6+, EAL3, EAL3 augmented, EAL 3 augmented
Claims
O.ACCESS_CONTROL, O.PIN_ENTRY, O.MANAGEMENT, O.SECURE_CHANNEL, O.STATE, O.PROTECTION, T.COM, T.PIN, T.DATA, T.F-CONNECTOR, A.PUSH_SERVER, A.ENV, A.ADMIN, A.CONNECTOR, A.SM, OE.ENV, OE.ADMIN, OE.CONNECTOR, OE.SM, OE.PUSH_SERVER, OSP.PIN_ENTRY
Security Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_ARC.1, AGD_OPE.1, AGD_PRE.1, ALC_TAT.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.4, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FCS_CKM, FCS_CKM.4, FCS_COP, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4.1, FDP_IFF.1, FDP_ACC, FDP_ACF, FDP_IFC, FDP_IFF, FDP_RIP.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACF.1, FDP_IFC.1, FDP_RIP.1.1, FIA_AFL.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.1, FIA_UAU.5, FIA_UAU.7, FIA_UID.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FMT_MSA, FMT_MSA.2, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3, FMT_MSA.1, FMT_MSA.2.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_PHP.3, FPT_FLS.1, FPT_ITT.1, FPT_PHP.1, FPT_TST.1, FPT_FLS.1.1, FPT_ITT.1.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTA_TAB, FTA_TAB.1, FTP_ITC, FTP_TRP, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP-0098-2020, BSI-CC-PP-0032-V2-2015-MA01, BSI-CC-PP-0098-2018, BSI-CC-PP-0098
Certificates
NSCIB-CC-180212-CR2

Side-channel analysis
physical tampering

Standards
FIPS 197, PKCS#1, AIS 20, AIS 31, RFC 5246, RFC 5289, RFC 8017, RFC 8422, X.509
Technical reports
BSI TR-03111

File metadata

Title Security Target EAL3+ for eHealth Terminal ST-1506
Subject CC-Evaluierung EAL3 augmented
Keywords Security Target, eHealth Terminal ST-1506, Cherry
Author [email protected]
Creation date D:20220406160207+02'00'
Modification date D:20220512092406+02'00'
Pages 79
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

Heuristics ?

Certificate ID: BSI-DSZ-CC-1124-V2-2022

Extracted SARs

ASE_ECD.1, ALC_DEL.1, AVA_VAN.4, AGD_PRE.1, ADV_IMP.1, ALC_LCD.1, ADV_FSP.4, ATE_FUN.1, ASE_REQ.2, ALC_TAT.1, ASE_CCL.1, ASE_OBJ.2, ATE_COV.2, ADV_ARC.1, ALC_CMC.3, ATE_IND.2, ALC_DVS.1, ATE_DPT.1, ALC_CMS.3, ASE_SPD.1, AGD_OPE.1, ASE_INT.1, ASE_TSS.1, ADV_TDS.3

References ?

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f341596a0c67fc8974c2e341616fdc7c351af99e34cd692bc643e3c2a618cfd6', 'txt_hash': 'c173cda883aeb651b20f01625cca0ab7508df526d5780d22cb8fff5f4cc00d71'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ad041a46b40215bad1102925fdb8ff3ef7c67ce3763b718c1944bf1d2fc32519', 'txt_hash': '80c2479f5f0a76a14491aabed8495541b3797e439301c05ad24f92a93e6a2d90'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1219376, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 79, '/Author': '[email protected]', '/CreationDate': "D:20220406160207+02'00'", '/Creator': 'Microsoft® Word 2016', '/Keywords': 'Security Target, eHealth Terminal ST-1506, Cherry', '/ModDate': "D:20220512092406+02'00'", '/Producer': 'Microsoft® Word 2016', '/Subject': 'CC-Evaluierung EAL3 augmented', '/Title': 'Security Target EAL3+ for eHealth Terminal ST-1506', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.cherry.de/']}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 365142, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20220512080830+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01, 22 May 2017, eHealth: Smart Card Readers, Cherry Digital Health GmbH"', '/ModDate': "D:20220513083417+02'00'", '/Producer': 'LibreOffice 6.3', '/Subject': 'CHERRY eHealth Terminal ST-1506', '/Title': 'Certificate BSI-DSZ-CC-1124-V2-2022', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {'NL': {'NSCIB-CC-180212-CR2': 4}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0098-2020': 1, 'BSI-CC-PP-0032-V2-2015-MA01': 4, 'BSI-CC-PP-0098-2018': 1, 'BSI-CC-PP-0098': 1}}, 'cc_security_level': {'EAL': {'EAL3+': 1, 'EAL 3': 3, 'EAL6+': 1, 'EAL3': 1, 'EAL3 augmented': 1, 'EAL 3 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 5, 'ADV_IMP.1': 6, 'ADV_TDS.3': 5, 'ADV_ARC.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_TAT.1': 5, 'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.4': 5}, 'ASE': {'ASE_TSS': 2, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FCS': {'FCS_CKM': 24, 'FCS_CKM.4': 32, 'FCS_COP': 52, 'FCS_CKM.1': 14, 'FCS_CKM.2': 4, 'FCS_COP.1': 10, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_IFF.1': 16, 'FDP_ACC': 27, 'FDP_ACF': 27, 'FDP_IFC': 21, 'FDP_IFF': 22, 'FDP_RIP.1': 9, 'FDP_ITC.1': 15, 'FDP_ITC.2': 12, 'FDP_ACC.1': 12, 'FDP_ACF.1': 14, 'FDP_IFC.1': 13, 'FDP_RIP.1.1': 1}, 'FIA': {'FIA_AFL.1': 8, 'FIA_ATD.1': 7, 'FIA_SOS.1': 8, 'FIA_UAU.1': 10, 'FIA_UAU.5': 7, 'FIA_UAU.7': 8, 'FIA_UID.1': 14, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 2, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MSA': 40, 'FMT_MSA.2': 10, 'FMT_SMF.1': 13, 'FMT_SMR.1': 24, 'FMT_MSA.3': 14, 'FMT_MSA.1': 8, 'FMT_MSA.2.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_PHP.3': 11, 'FPT_FLS.1': 8, 'FPT_ITT.1': 8, 'FPT_PHP.1': 10, 'FPT_TST.1': 10, 'FPT_FLS.1.1': 1, 'FPT_ITT.1.1': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTA': {'FTA_TAB': 7, 'FTA_TAB.1': 1}, 'FTP': {'FTP_ITC': 7, 'FTP_TRP': 8, 'FTP_ITC.1': 4, 'FTP_TRP.1': 3}}, 'cc_claims': {'O': {'O.ACCESS_CONTROL': 9, 'O.PIN_ENTRY': 6, 'O.MANAGEMENT': 8, 'O.SECURE_CHANNEL': 4, 'O.STATE': 7, 'O.PROTECTION': 9}, 'T': {'T.COM': 3, 'T.PIN': 6, 'T.DATA': 3, 'T.F-CONNECTOR': 4}, 'A': {'A.PUSH_SERVER': 4, 'A.ENV': 7, 'A.ADMIN': 3, 'A.CONNECTOR': 3, 'A.SM': 4}, 'OE': {'OE.ENV': 11, 'OE.ADMIN': 4, 'OE.CONNECTOR': 6, 'OE.SM': 2, 'OE.PUSH_SERVER': 4}, 'OSP': {'OSP.PIN_ENTRY': 5}}, 'vendor': {'NXP': {'NXP': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 4}, 'HPC': {'HPC': 11}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 6}, 'ECC': {'ECC': 7}}, 'FF': {'DH': {'DH': 2, 'Diffie-Hellman': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 28}}, 'IPsec': {'IPsec': 1}, 'VPN': {'VPN': 11}}, 'randomness': {'PRNG': {'PRNG': 2}}, 'cipher_mode': {'GCM': {'GCM': 1}}, 'ecc_curve': {'NIST': {'P-256': 2, 'P-384': 4}, 'Brainpool': {'brainpoolP256r1': 3, 'brainpoolP384r1': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_DHE_RSA_WITH_AES_128_CBC_SHA': 4, 'TLS_DHE_RSA_WITH_AES_256_CBC_SHA': 4, 'TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256': 1, 'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384': 1, 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA': 1, 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA': 1}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 7}}, 'technical_report_id': {'BSI': {'BSI TR-03111': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {'JCOP': {'JCOP 4': 2}}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 197': 1}, 'PKCS': {'PKCS#1': 4}, 'BSI': {'AIS 20': 1, 'AIS 31': 1}, 'RFC': {'RFC 5246': 3, 'RFC 5289': 1, 'RFC 8017': 1, 'RFC 8422': 1}, 'X509': {'X.509': 5}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1124-V2-2022': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 3': 1, 'EAL 4': 1, 'EAL 2': 1, 'EAL 3 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'ALC': {'ALC_TAT.1': 1, 'ALC_FLR': 1}, 'AVA': {'AVA_VAN.4': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to 1124V2b_pdf.pdf.
    • The cert_filename property was set to 1124V2c_pdf.pdf.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1124-V3-2023']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1124-V3-2023']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1124-2021']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1124-2021']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}]} values added.
    • The scheme_data property was set to None.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1124V2a_pdf.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1124V2b_pdf.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}]} values discarded.
    • The scheme_data property was set to {'cert_id': 'BSI-DSZ-CC-1124-V3-2023', 'product': 'CHERRY eHealth Terminal ST-1506, AFxZ FW 3.0.0, HW 4.0.0', 'vendor': 'Cherry GmbH', 'certification_date': '06.06.2023', 'category': 'eHealth', 'url': 'https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Gesundheitswesen_Kartenlesegeraete/1124_1124V2_1124V3.html', 'enhanced': {'product': 'CHERRY eHealth Terminal ST-1506, AFxZ FW 3.0.0, HW 4.0.0', 'applicant': 'Cherry GmbH\nCherrystraße 2\n91275 Auerbach/Opf', 'evaluation_facility': 'TÜV Informationstechnik GmbH', 'assurance_level': 'EAL3+,ADV_FSP.4,ADV_IMP.1,ADV_TDS.3,ALC_TAT.1,AVA_VLA.4', 'certification_date': '06.06.2023', 'expiration_date': '05.06.2028', 'entries': [{'id': 'BSI', 'description': '4.0.0'}, {'id': 'BSI-DSZ-CC-1124-V3-2023-MA-01 (Ausstellungsdatum / Certification Date 05.01.2024)\nMaintenance Report / Maintenancereport\nDas CHERRY eHealth Terminal ST-1506, FW 4.0.23, HW 4.0.0 wurde aufgrund von Usability-Aspekten (Display-Layout und Handling) sowie zur Verbesserung der Kompatibilität mit dem Konnektor geändert. Diese Änderungen modifizieren keine sicherheitsrelevanten Funktionen im Quellcode und wirken sich nur auf die Benutzeroberfläche aus. Die Änderungen sind daher auch mit einer Aktualisierung des Benutzerhandbuchs verbunden. Die Konfigurationsmanagementverfahren erforderten eine Änderung der Produktkennung. Daher wurde die Versionsnummer von FW 4.0.0, HW 4.0.0 auf FW 4.0.23, HW 4.0.0 geändert.', 'description': '4.0.0'}, {'id': 'BSI-DSZ-CC-1124-V3-2023 (Ausstellungsdatum / Certification Date 06.06.2023, gültig bis / valid until 05.06.2028)', 'description': '- Passive and active physical protection.'}, {'id': 'BSI-DSZ-CC-1124-V2-2022-MA-02 (Ausstellungsdatum / Certification Date 03.11.2022)\nMaintenance Report / Maintenancereport\nDas CHERRY eHealth Terminal ST-1506, AFxZ FW 3.0.28, HW 4.0.0 würde in Hinsicht auf eine Anforderung an die Metadaten der SSL-Verbindung angepasst. Konfigurations-Management Vorgaben erfordern daher auch die Änderung der Produkt-ID. Dementsprechend hat sich die Versionsnummer von AFxZ FW 3.0.24, HW 4.0.0 nach AFxZ FW 3.0.28, HW 4.0.0 geändert. Außerdem wurde ein Dokument welches Teile der sicheren Auslieferungskette beschreibt, redaktionell angepasst.', 'description': '4.0.0. Furthermore an document related to the secure delivery chain has been editorially changed.'}, {'id': 'BSI-DSZ-CC-1124-V2-2022-MA-01 (Ausstellungsdatum / Certification Date 23.05.2022)\nMaintenance Report / Maintenancereport\nDas CHERRY eHealth Terminal ST-1506, AFxZ FW 3.0.24, HW 4.0.0 würde in Hinsicht der Konnektor-Interoperabilität (TLS-Timeout, SICCT Request Command) angepasst. Konfigurations-Management Vorgaben erfordern daher auch die Änderung der Produkt-ID. Dementsprechend hat sich die Versionsnummer von AFxZ FW 3.0.0, HW 4.0.0 in AFxZ FW 3.0.24, HW 4.0.0 geändert.', 'description': '4.0.0.'}, {'id': 'BSI-DSZ-CC-1124-V2-2022 (Ausstellungsdatum / Certification Date 11.05.2022, gültig bis / valid until 10.05.2027)', 'description': 'Certificate'}, {'id': 'Zugriff'}, {'id': 'Sichere'}, {'id': 'Sichere'}, {'id': 'Unterstützung'}, {'id': 'Benutzerauthentifizieung,'}, {'id': 'Management'}, {'id': 'Passiver und aktiver physischer Schutz.'}, {'id': 'Access'}, {'id': 'Secure'}, {'id': 'Secure'}, {'id': 'Enforcement'}, {'id': 'User'}, {'id': 'Management'}, {'id': 'Passive'}, {'id': 'BSI-DSZ-CC-1124-2021-MA-04 (Ausstellungsdatum / Certification Date 16.03.2022)\nMaintenance Report / Maintenancereport\nDas CHERRY eHealth Terminal ST-1506, FW 2.0.20 HW 4.0.0 wurde in Hinsicht der konkreten Bestückung der Platine des Mainboards geändert. Diese deckt eine zweite Bestückungsmöglichkeit ab, ohne die Funktionalität zu verändern. Die TOE Hardware Version 4.0.0 besteht jetzt aus den PCB Versionen 2.2.7 oder 2.2.8.', 'description': 'versions 2.2.7 or 2.2.8.'}, {'id': 'BSI-DSZ-CC-1124-2021-MA-03 (Ausstellungsdatum / Certification Date 13.10.2021)\nMaintenance Report / Maintenancereport\nDer CHERRY eHealth Terminal ST-1506, FW 2.0.20, HW 4.0.0 wurde in Hinsicht auf einen Timeout-Wert geändert. Konfigurations-Management Vorgaben erfordern daher auch die Änderung der Produkt-ID, bei der sich die Versionsnummer von 2.0.17 in 2.0.20 geändert hat.', 'description': 'The CHERRY eHealth Terminal ST-1506, FW 2.0.20, HW 4.0.0 was changed due to a extension of a timeout value. Configuration Management procedures required a change in the product identifier. Therefore the version number changed from 2.0.17 to 2.0.20.'}, {'id': 'BSI-DSZ-CC-1124-2021-MA-02 (Ausstellungsdatum / Certification Date 03.08.2021)\nMaintenance Report / Maintenancereport\nDie Änderung am zertifizierten Produkt betreffen kleinere Anpassungen, wie Display-Texte und Return Codes. Diese aktualisierte Produktversion wird durch eine neue Versionsnummer kenntlich gemacht.', 'description': 'The change to the certified product is at the level of minor fixes covering e.g. display-text layout and return codes. The identification of the maintained product is indicated by a new version number compared to the certified product.'}, {'id': 'BSI-DSZ-CC-1124-2021-MA-01 (Ausstellungsdatum / Certification Date 17.05.2021)\nMaintenance Report / Maintenancereport\nDas eHealth Karten-Terminal mit Touchscreen Display, ST-1506, AFxZ 2.0.4:4.0.0 wurde auf der Ebene des Power Management geändert. Dementsprechend hat sich die Versionsnummer von AFxZ 2.0.0:4.0.0 zu AFxZ 2.0.4:4.0.0 geändert.', 'description': 'The eHealth Card Terminal with Touchscreen Display, ST-1506, AFxZ 2.0.4:4.0.0 was changed on power management level. Therefore the version number changed from AFxZ 2.0.0:4.0.0 to AFxZ 2.0.4:4.0.0.'}, {'id': 'BSI-DSZ-CC-1124-2021 (Ausstellungsdatum / Certification Date 15.04.2021, gültig bis / valid until 14.04.2026)', 'description': 'Certificate'}], 'report_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1124V3a_pdf.pdf?__blob=publicationFile&v=2', 'target_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1124V3b_pdf.pdf?__blob=publicationFile&v=2', 'cert_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1124V3c_pdf.pdf?__blob=publicationFile&v=2', 'description': 'The TOE is the card terminal eHealth Terminal ST-1506 with 2 ID1 Slots (HPC and eGK) and 2 SMC Slots (SM-KT (supporting SMC-B and SMC-KT cards) and SMC-A), 720p touchscreen (also used for secure pin entry) and LAN interfaces for the use in the German healthcare system with HPC and eGK.\nIt addresses the security services provided by this terminal:\nAccess to one or more slots for smart cards,\n\nSecure network connectivity,Secure PIN entry functionality,Enforcement of the encryption of communication,User authentication,Management functionality including update of Firmware,Passive and active physical protection.'}, 'subcategory': 'Card reader'}.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name CHERRY eHealth Terminal ST-1506, AFxZ FW 3.0.0, HW 4.0.0 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1124V2c_pdf.pdf",
  "dgst": "3f55c39f12a8566e",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-1124-V2-2022",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "3.0.0",
        "4.0.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1124-V3-2023"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1124-2021"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1124-V3-2023"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1124-2021"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2022-05-23",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1124V2ma1a_pdf.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "CHERRY eHealth Terminal ST-1506, AFxZ FW 3.0.24, HW 4.0.0"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2022-11-03",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1124V2ma2a_pdf.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "CHERRY eHealth Terminal ST-1506, AFxZ FW 3.0.28, HW 4.0.0"
      }
    ]
  },
  "manufacturer": "Cherry GmbH",
  "manufacturer_web": "https://www.cherrycorp.com/",
  "name": "CHERRY eHealth Terminal ST-1506, AFxZ FW 3.0.0, HW 4.0.0",
  "not_valid_after": "2027-05-10",
  "not_valid_before": "2022-05-11",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "1124V2c_pdf.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1124-V2-2022": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "ALC": {
          "ALC_FLR": 1,
          "ALC_TAT.1": 1
        },
        "AVA": {
          "AVA_VAN.4": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 3": 1,
          "EAL 3 augmented": 1,
          "EAL 4": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20220512080830+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01, 22 May 2017, eHealth: Smart Card Readers, Cherry Digital Health GmbH\"",
      "/ModDate": "D:20220513083417+02\u002700\u0027",
      "/Producer": "LibreOffice 6.3",
      "/Subject": "CHERRY eHealth Terminal ST-1506",
      "/Title": "Certificate BSI-DSZ-CC-1124-V2-2022",
      "pdf_file_size_bytes": 365142,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "1124V2a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.4",
        "cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 conformant",
        "cert_id": "BSI-DSZ-CC-1124-V2-2022",
        "cert_item": "CHERRY eHealth Terminal ST-1506 AFxZ FW 3.0.0, HW 4.0.0",
        "cert_lab": "BSI",
        "developer": "Cherry Digital Health GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC- PP-0032-V2-2015-MA-01, 22 May 2017"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDH": {
            "ECDHE": 3
          },
          "ECDSA": {
            "ECDSA": 9
          }
        },
        "FF": {
          "DH": {
            "DH": 1,
            "DHE": 2,
            "Diffie-Hellman": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1124-2021": 2,
          "BSI-DSZ-CC-1124-V2-2022": 15
        },
        "NL": {
          "CC-1124-2021": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0032-V2-2015-MA-01": 3
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_FSP.4": 4,
          "ADV_IMP.1": 4,
          "ADV_TDS.3": 4
        },
        "ALC": {
          "ALC_DEL.1": 1,
          "ALC_FLR": 3,
          "ALC_TAT.1": 4
        },
        "ATE": {
          "ATE_FUN": 1,
          "ATE_IND": 3
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.4": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 2,
          "EAL 2+": 1,
          "EAL 3": 4,
          "EAL 3 augmented": 3,
          "EAL 4": 4,
          "EAL3+": 1
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM.1": 2,
          "FCS_COP.1": 5
        },
        "FIA": {
          "FIA_UAU.5": 2
        },
        "FMT": {
          "FMT_SMR.1": 1
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          "11] Common-Criteria-3.1 Dokument, ALC_DEL.1, Version 0.9, 2020-10-27 Cherry Digital Health GmbH, (confidential document) [12] gematik, \u00dcbergreifende Spezifikation Verwendung kryptographischer Algorithmen in der": 1,
          "2022-03-21, ALC_CMS_SW, V1.13, 2022-04-06, BOM, V4.0.0, 2022-03-07 Bibliography V4.5, 2022-04-07 (confidential document) [10] eHealth Terminal ST-1506 - Handbuch f\u00fcr Administratoren (Teilenummer: 64410079) , Version 4": 1,
          "7] Evaluation Technical Report, Version 2, 2022-04-21, ETR SUMMARY, T\u00dcV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "GCM": {
          "GCM": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 1
        },
        "TLS": {
          "TLS": {
            "TLS": 2,
            "TLS 1.2": 2,
            "TLS v1.2": 1
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {
        "Brainpool": {
          "brainpoolP256r1": 2,
          "brainpoolP384r1": 5
        },
        "NIST": {
          "P-256": 4,
          "P-384": 6
        }
      },
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 3
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-2": 1,
            "SHA-256": 3,
            "SHA256": 5,
            "SHA384": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 32": 1
        },
        "FIPS": {
          "FIPS 180-4": 5,
          "FIPS 197": 2,
          "FIPS PUB 180-2": 2
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        },
        "PKCS": {
          "PKCS#1": 2
        },
        "RFC": {
          "RFC 4226": 1,
          "RFC 4492": 1,
          "RFC 5246": 2,
          "RFC 5639": 1,
          "RFC 8017": 2
        },
        "X509": {
          "X.509": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 3,
            "AES-": 4
          },
          "HPC": {
            "HPC": 3
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1,
          "BSI TR-03111": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20220512080830+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01, 22 May 2017, eHealth: Smart Card Readers, Cherry Digital Health GmbH\"",
      "/ModDate": "D:20220512084750+02\u002700\u0027",
      "/Producer": "LibreOffice 6.3",
      "/Subject": "CHERRY eHealth Terminal ST-1506",
      "/Title": "Certification Report BSI-DSZ-CC-1124-V2-2022",
      "pdf_file_size_bytes": 1013982,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/AIS",
          "https://www.cherry.de/eHealth",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/zertifizierung",
          "https://www.bsi.bund.de/",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "https://www.sogis.eu/",
          "http://www.commoncriteriaportal.org/cc/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 28
    },
    "st_filename": "1124V2b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 7
          },
          "ECDSA": {
            "ECDSA": 6
          }
        },
        "FF": {
          "DH": {
            "DH": 2,
            "Diffie-Hellman": 2
          }
        }
      },
      "cc_cert_id": {
        "NL": {
          "NSCIB-CC-180212-CR2": 4
        }
      },
      "cc_claims": {
        "A": {
          "A.ADMIN": 3,
          "A.CONNECTOR": 3,
          "A.ENV": 7,
          "A.PUSH_SERVER": 4,
          "A.SM": 4
        },
        "O": {
          "O.ACCESS_CONTROL": 9,
          "O.MANAGEMENT": 8,
          "O.PIN_ENTRY": 6,
          "O.PROTECTION": 9,
          "O.SECURE_CHANNEL": 4,
          "O.STATE": 7
        },
        "OE": {
          "OE.ADMIN": 4,
          "OE.CONNECTOR": 6,
          "OE.ENV": 11,
          "OE.PUSH_SERVER": 4,
          "OE.SM": 2
        },
        "OSP": {
          "OSP.PIN_ENTRY": 5
        },
        "T": {
          "T.COM": 3,
          "T.DATA": 3,
          "T.F-CONNECTOR": 4,
          "T.PIN": 6
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0032-V2-2015-MA01": 4,
          "BSI-CC-PP-0098": 1,
          "BSI-CC-PP-0098-2018": 1,
          "BSI-CC-PP-0098-2020": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 5,
          "ADV_IMP.1": 6,
          "ADV_TDS.3": 5
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.3": 1,
          "ALC_CMS.3": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 5
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS": 2,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.4": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 3": 3,
          "EAL 3 augmented": 2,
          "EAL3": 1,
          "EAL3 augmented": 1,
          "EAL3+": 1,
          "EAL6+": 1
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM": 24,
          "FCS_CKM.1": 14,
          "FCS_CKM.2": 4,
          "FCS_CKM.4": 32,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 52,
          "FCS_COP.1": 10
        },
        "FDP": {
          "FDP_ACC": 27,
          "FDP_ACC.1": 12,
          "FDP_ACF": 27,
          "FDP_ACF.1": 14,
          "FDP_IFC": 21,
          "FDP_IFC.1": 13,
          "FDP_IFF": 22,
          "FDP_IFF.1": 16,
          "FDP_ITC.1": 15,
          "FDP_ITC.2": 12,
          "FDP_RIP.1": 9,
          "FDP_RIP.1.1": 1
        },
        "FIA": {
          "FIA_AFL.1": 8,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 2,
          "FIA_ATD.1": 7,
          "FIA_ATD.1.1": 1,
          "FIA_SOS.1": 8,
          "FIA_SOS.1.1": 1,
          "FIA_UAU.1": 10,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.5": 7,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.7": 8,
          "FIA_UAU.7.1": 1,
          "FIA_UID.1": 14,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_MSA": 40,
          "FMT_MSA.1": 8,
          "FMT_MSA.2": 10,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 14,
          "FMT_SMF.1": 13,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 24,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FLS.1": 8,
          "FPT_FLS.1.1": 1,
          "FPT_ITT.1": 8,
          "FPT_ITT.1.1": 1,
          "FPT_PHP.1": 10,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 11,
          "FPT_PHP.3.1": 1,
          "FPT_TST.1": 10,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTA": {
          "FTA_TAB": 7,
          "FTA_TAB.1": 1
        },
        "FTP": {
          "FTP_ITC": 7,
          "FTP_ITC.1": 4,
          "FTP_TRP": 8,
          "FTP_TRP.1": 3
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "GCM": {
          "GCM": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IPsec": {
          "IPsec": 1
        },
        "TLS": {
          "TLS": {
            "TLS": 28
          }
        },
        "VPN": {
          "VPN": 11
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {
        "Brainpool": {
          "brainpoolP256r1": 3,
          "brainpoolP384r1": 2
        },
        "NIST": {
          "P-256": 2,
          "P-384": 4
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 4": 2
        }
      },
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 7
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 1,
          "AIS 31": 1
        },
        "FIPS": {
          "FIPS 197": 1
        },
        "PKCS": {
          "PKCS#1": 4
        },
        "RFC": {
          "RFC 5246": 3,
          "RFC 5289": 1,
          "RFC 8017": 1,
          "RFC 8422": 1
        },
        "X509": {
          "X.509": 5
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 4
          },
          "HPC": {
            "HPC": 11
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03111": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {
        "TLS": {
          "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 4,
          "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": 4,
          "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 1,
          "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 1,
          "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": 1,
          "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": 1
        }
      },
      "vendor": {
        "NXP": {
          "NXP": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "[email protected]",
      "/CreationDate": "D:20220406160207+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/Keywords": "Security Target, eHealth Terminal ST-1506, Cherry",
      "/ModDate": "D:20220512092406+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Subject": "CC-Evaluierung EAL3 augmented",
      "/Title": "Security Target EAL3+ for eHealth Terminal ST-1506",
      "pdf_file_size_bytes": 1219376,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.cherry.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 79
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1124V2a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL3+",
      "ADV_IMP.1",
      "ADV_FSP.4",
      "AVA_VAN.4",
      "ADV_TDS.3",
      "ALC_TAT.1"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1124V2b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "ad041a46b40215bad1102925fdb8ff3ef7c67ce3763b718c1944bf1d2fc32519",
      "txt_hash": "80c2479f5f0a76a14491aabed8495541b3797e439301c05ad24f92a93e6a2d90"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "46d58c196fe2eb8f973842d27a5da10c696c5c42a0b11180e74d38eca31c5ba1",
      "txt_hash": "82de32da9a15fadffa08001e2a713bfd4185ae58a068dfae4854464867de5194"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "f341596a0c67fc8974c2e341616fdc7c351af99e34cd692bc643e3c2a618cfd6",
      "txt_hash": "c173cda883aeb651b20f01625cca0ab7508df526d5780d22cb8fff5f4cc00d71"
    }
  },
  "status": "active"
}