Electronic Health Card Terminal eHealth GT900 Hardwareversion: 2.1.0, Firmwareversion: 2.0.1

CSV information ?

Status active
Valid from 30.03.2023
Valid until 29.03.2028
Scheme 🇩🇪 DE
Manufacturer GT German Telematics Gesellschaft für Telematikdienste mbH
Category Other Devices and Systems
Security level ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, EAL3+, ALC_TAT.1, AVA_VAN.4
Protection profiles

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-1171-2023

Certificate ?

Extracted keywords

Security level
EAL 3, EAL 4, EAL 2, EAL 3 augmented
Security Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, ALC_FLR, AVA_VAN.4
Certificates
BSI-DSZ-CC-1171-2023

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Title Certificate BSI-DSZ-CC-1171
Subject Common Criteria, Certification, Zertifizierung
Keywords "Common Criteria, Certification, Zertifizierung"
Author Bundesamt für Sicherheit in der Informationstechnik
Pages 1

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, HPC
Hash functions
SHA256
Protocols
TLS, TLS 1.2
Libraries
OpenSSL
Elliptic Curves
secp256r1, secp384r1

Security level
EAL 3, EAL 4, EAL 2, EAL 1, EAL 3 augmented
Claims
A.ENV
Security Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, ALC_FLR, ATE_FUN, ATE_IND, AVA_VAN.4
Security Functional Requirements (SFR)
FCS_COP, FCS_CKM, FCS_CKM.1, FCS_COP.1, FDP_ACF, FDP_IFC, FDP_IFF, FIA_UAU.5, FIA_UAU.7, FMT_SMF.1, FPT_FLS.1, FPT_PHP.1, FPT_PHP.2, FPT_TST.1, FTP_ITC
Protection profiles
BSI-CC-PP-0032-V2-2015-MA-01
Certificates
BSI-DSZ-CC-1171-2023
Evaluation facilities
Deutsche Telekom Security

Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, GmbH [7] Evaluation Technical Report, Version 1.0, 2023-02-16, Deutsche Telekom Security GmbH, (confidential document) [8] Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, GT900 - Dokumentation des Produktlebenszyklus - Konfigurationsliste, gt german telematics GmbH (confidential document) [10] Kurzanleitung Kartenterminal eHealth GT900, gt german telematics GmbH, Version 1.0.1 [11

Standards
PKCS#1, AIS 32, RFC3447, RFC3526, RFC5246, RFC3268, RFC2104, RFC4492, RFC5480, RFC 3447, RFC 5246, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, X.509
Technical reports
BSI 7148

File metadata

Title Certification Report BSI-DSZ-CC-1171
Subject Common Criteria, Certification, Zertifizierung
Keywords "Common Criteria, Certification, Zertifizierung"
Author Bundesamt für Sicherheit in der Informationstechnik
Pages 29

Frontpage

Certificate ID BSI-DSZ-CC-1171-2023
Certified item Electronic Health Card Terminal eHealth GT900 Hardwareversion: 2.1.0, Firmwareversion: 2.0.1
Certification lab BSI
Developer GT German Telematics Gesell. für Telematik mbH

Security target ?

Extracted keywords

Symmetric Algorithms
AES, HPC
Asymmetric Algorithms
RSA4096, ECDH, ECDHE, DH, Diffie-Hellman, DHE
Hash functions
SHA256, SHA-256
Schemes
Key Exchange
Protocols
TLS, TLS 1.2, IKE
Elliptic Curves
P-256, P-384
Block cipher modes
CBC, GCM
TLS cipher suites
TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384

Security level
EAL 3, EAL 3 augmented
Claims
O.ACCESS_, O.PIN_ENTRY, O.MANAGEMENT, O.SECURE_, O.STATE, O.PROTECTION, O.ACCESS_CONTROL, O.SECURE_CHANNEL, T.COM, T.PIN, T.DATA, T.F-CONNECTOR, A.PUSH_SERVER, A.ENV, A.ADMIN, A.CONNECTOR, A.SM, OE.ENV, OE.ADMIN, OE.CONNECTOR, OE.SM, OE.PUSH_SERVER, OSP.PIN_ENTRY
Security Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_ARC.1, AGD_OPE.1, AGD_PRE.1, ALC_TAT.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.4, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FCS_CKM.1, FCS_COP.1, FCS_CKM, FCS_CKM.4, FCS_COP, FCS_CKM.2, FCS_CKM.4.1, FDP_ACF.1, FDP_RIP.1, FDP_ACC, FDP_ACF, FDP_IFC, FDP_IFF, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_IFC.1, FDP_IFF.1, FDP_RIP.1.1, FIA_AFL.1.2, FIA_AFL.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.1, FIA_UAU.5, FIA_UAU.7, FIA_UID.1, FIA_AFL.1.1, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FMT_SMF.1.1, FMT_MSA, FMT_MSA.2, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3, FMT_MSA.1, FMT_MSA.2.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF.1, FPT_FLS.1, FPT_ITT.1, FPT_PHP.1, FPT_PHP, FPT_TST.1, FPT_FLS.1.1, FPT_ITT.1.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.2, FPT_PHP.2.1, FPT_PHP.2.2, FPT_PHP.2.3, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3, FTA_TAB, FTA_TAB.1, FTP_ITC, FTP_TRP, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP-0032, BSI-CC-PP-0032-V2-2015-MA-01, BSI-CC-PP-0032-, BSI-CC-PP-0032-V2-2015-, BSI-CC-PP-0032-V2-2015-MA-, BSI-CC-PP-0082, BSI-CC-PP-0082-V3, BSI-CC-PP-0082-V2, BSI-CC-PP-0046
Certificates
BSI-DSZ-CC-1171
Evaluation facilities
DFKI

Side-channel analysis
physical tampering

Standards
PKCS#1, RFC 3526, RFC 4492, RFC-3268, RFC 3268, RFC 5246, RFC-4346, RFC 4346, RFC-5246, RFC-3447, RFC 3447, RFC-3546, RFC 3546, RFC-3526, ISO/IEC 7816-4, ISO/IEC 7816-8, X.509, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004
Technical reports
BSI TR-03116, BSI TR-03120

File metadata

Title Electronic Health Card Terminal eHealth GT900 Security Target
Author GT German Telematics Gesellschaft für Telematikdienste mbH
Pages 71

Heuristics ?

Certificate ID: BSI-DSZ-CC-1171-2023

Extracted SARs

ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.4

Scheme data ?

Cert Id BSI-DSZ-CC-1171-2023
Product Electronic Health Card Terminal eHealth GT900 Hardwareversion: 2.1.0, Firmwareversion: 2.0.1
Vendor GT German Telematics Gesellschaft für Telematikdienste mbH
Certification Date 30.03.2023
Category eHealth
Url https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Gesundheitswesen_Kartenlesegeraete/1171.html
Enhanced
Product Electronic Health Card Terminal eHealth GT900 Hardwareversion: 2.1.0, Firmwareversion: 2.0.1
Applicant GT German Telematics Gesellschaft für Telematikdienste mbH Libellenstraße 9 14129 Berlin
Evaluation Facility Deutsche Telekom Security GmbH (Bonn)
Assurance Level EAL3+,ADV_FSP.4,ADV_IMP.1,ADV_TDS.3,ALC_TAT.1,AVA_VAN.4
Protection Profile Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01, 22 May 2017
Certification Date 30.03.2023
Expiration Date 29.03.2028
Entries [frozendict({'id': 'BSI-DSZ-CC-1171-2023 (Ausstellungsdatum / Certification Date 30.03.2023, gültig bis / valid until 29.03.2028) Zertifizierungsreport / Certification Report', 'description': 'Certificate'})]
Report Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1171a_pdf.pdf?__blob=publicationFile&v=2
Target Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1171b_pdf.pdf?__blob=publicationFile&v=3
Cert Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1171c_pdf.pdf?__blob=publicationFile&v=2
Description The Target of Evaluation (TOE) is the eHealth Card Terminal GT900 Hardware version: 2.1.0, Firmware version: 2.0.1. It is an eHealth Card Terminal with 2 ID-1 Slots (HPC and eGK) and 2 ID-000 SMC Slots (supporting SMC-KT and SMC-B Cards), a disinfectable liquids resistant 20 key keypad also usable for secure pin entry and LAN + USB interfaces with interoperability to all eHealth Connectors TI 1.0 and to all High Speed Connectors (HSK) for TI 2.0 of the German Healthcare System.
Subcategory Card reader

References ?

No references are available for this certificate.

Updates ?

  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'certification_date': '2023-03-30', 'enhanced': {'__update__': {'applicant': 'GT German Telematics Gesellschaft für Telematikdienste mbH Libellenstraße 9 14129 Berlin', 'evaluation_facility': 'Deutsche Telekom Security GmbH (Bonn)', 'certification_date': '2023-03-30', 'expiration_date': '2028-03-29', 'entries': {'0': {'__update__': {'id': 'BSI-DSZ-CC-1171-2023 (Ausstellungsdatum / Certification Date 30.03.2023, gültig bis / valid until 29.03.2028) Zertifizierungsreport / Certification Report'}}}, 'description': 'The Target of Evaluation (TOE) is the eHealth Card Terminal GT900 Hardware version: 2.1.0, Firmware version: 2.0.1. It is an eHealth Card Terminal with 2 ID-1 Slots (HPC and eGK) and 2 ID-000 SMC Slots (supporting SMC-KT and SMC-B Cards), a disinfectable liquids resistant 20 key keypad also usable for secure pin entry and LAN + USB interfaces with interoperability to all eHealth Connectors TI 1.0 and to all High Speed Connectors (HSK) for TI 2.0 of the German Healthcare System.'}}} data.
  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Protection Profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Common Criteria Protection Profile Electronic Health Card Terminal', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0032V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['EHCT_V3_6']}}]}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '867bc882dcbeab7fe3fe061485457a3d6feefd8082398c8ae39d810f4780af90', 'txt_hash': 'b93297f88f45c122f41aff6a84b8f4de5b40900bc7f3d5616581d2a79bfb61f8'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7e076e468234b4e6e930c02888eca578b8b94aaba74aa5c7dd4fa51f69fbc567', 'txt_hash': '50730df1e19a0f81caf83c73ffe5cb2f736d448f1cdfd7758929ba457c0260f8'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7303abd369f03aae58325cfdc2ec3e9682ce759912cb4419d1dbb9a783ecd809', 'txt_hash': '7c84420505ef469ef049119e8c7cd62e5722966cad0e879ca2f861284a5fe4e6'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 671642, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 29, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/Keywords': '"Common Criteria, Certification, Zertifizierung"', '/Subject': 'Common Criteria, Certification, Zertifizierung', '/Title': 'Certification Report BSI-DSZ-CC-1171', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/', 'https://www.commoncriteriaportal.org/', 'https://www.sogis.eu/', 'https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/zertifizierungsreporte', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/AIS']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 942895, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 71, '/Author': 'GT German Telematics Gesellschaft für Telematikdienste mbH', '/Title': 'Electronic Health Card Terminal eHealth GT900 Security Target', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ietf.org/rfc/rfc3268.txt', 'http://www.ietf.org/rfc/rfc3546.txt', 'http://www.ietf.org/rfc/rfc4346.txt', 'http://www.ietf.org/rfc/rfc3447.txt', 'http://www.ietf.org/rfc/rfc3526.txt', 'http://www.ietf.org/rfc/rfc5246.txt']}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 235615, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/Keywords': '"Common Criteria, Certification, Zertifizierung"', '/Subject': 'Common Criteria, Certification, Zertifizierung', '/Title': 'Certificate BSI-DSZ-CC-1171', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-1171-2023', 'cert_item': 'Electronic Health Card Terminal eHealth GT900 Hardwareversion: 2.1.0, Firmwareversion: 2.0.1', 'developer': 'GT German Telematics Gesell. für Telematik mbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC- PP-0032-V2-2015-MA-01, 22 May 2017', 'cc_version': 'PP conformant Common Criteria Part 2 conformant', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.4'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1171-2023': 15}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0032-V2-2015-MA-01': 3}}, 'cc_security_level': {'EAL': {'EAL 3': 4, 'EAL 4': 3, 'EAL 2': 3, 'EAL 1': 1, 'EAL 3 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 4, 'ADV_IMP.1': 4, 'ADV_TDS.3': 4}, 'ALC': {'ALC_TAT.1': 4, 'ALC_FLR': 3}, 'ATE': {'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.4': 5}}, 'cc_sfr': {'FCS': {'FCS_COP': 4, 'FCS_CKM': 3, 'FCS_CKM.1': 19, 'FCS_COP.1': 21}, 'FDP': {'FDP_ACF': 2, 'FDP_IFC': 2, 'FDP_IFF': 2}, 'FIA': {'FIA_UAU.5': 1, 'FIA_UAU.7': 1}, 'FMT': {'FMT_SMF.1': 1}, 'FPT': {'FPT_FLS.1': 2, 'FPT_PHP.1': 1, 'FPT_PHP.2': 1, 'FPT_TST.1': 1}, 'FTP': {'FTP_ITC': 1}}, 'cc_claims': {'A': {'A.ENV': 1}}, 'vendor': {}, 'eval_facility': {'DeutscheTelekom': {'Deutsche Telekom Security': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}, 'HPC': {'HPC': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA256': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 2, 'TLS 1.2': 10}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {'NIST': {'secp256r1': 5, 'secp384r1': 5}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 1}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS#1': 3}, 'BSI': {'AIS 32': 1}, 'RFC': {'RFC3447': 10, 'RFC3526': 10, 'RFC5246': 10, 'RFC3268': 10, 'RFC2104': 10, 'RFC4492': 5, 'RFC5480': 5, 'RFC 3447': 5, 'RFC 5246': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}, 'X509': {'X.509': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'GmbH [7] Evaluation Technical Report, Version 1.0, 2023-02-16, Deutsche Telekom Security GmbH, (confidential document) [8] Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7': 1, 'GT900 - Dokumentation des Produktlebenszyklus - Konfigurationsliste, gt german telematics GmbH (confidential document) [10] Kurzanleitung Kartenterminal eHealth GT900, gt german telematics GmbH, Version 1.0.1 [11': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1171': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0032': 4, 'BSI-CC-PP-0032-V2-2015-MA-01': 10, 'BSI-CC-PP-0032-': 1, 'BSI-CC-PP-0032-V2-2015-': 1, 'BSI-CC-PP-0032-V2-2015-MA-': 3, 'BSI-CC-PP-0082': 2, 'BSI-CC-PP-0082-V3': 1, 'BSI-CC-PP-0082-V2': 1, 'BSI-CC-PP-0046': 2}}, 'cc_security_level': {'EAL': {'EAL 3': 3, 'EAL 3 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 4, 'ADV_IMP.1': 5, 'ADV_TDS.3': 4, 'ADV_ARC.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_TAT.1': 4, 'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.4': 4}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FCS': {'FCS_CKM.1': 16, 'FCS_COP.1': 13, 'FCS_CKM': 22, 'FCS_CKM.4': 31, 'FCS_COP': 49, 'FCS_CKM.2': 4, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ACF.1': 17, 'FDP_RIP.1': 9, 'FDP_ACC': 24, 'FDP_ACF': 25, 'FDP_IFC': 22, 'FDP_IFF': 23, 'FDP_ITC.1': 15, 'FDP_ITC.2': 12, 'FDP_ACC.1': 15, 'FDP_IFC.1': 12, 'FDP_IFF.1': 14, 'FDP_RIP.1.1': 1}, 'FIA': {'FIA_AFL.1.2': 3, 'FIA_AFL.1': 7, 'FIA_ATD.1': 6, 'FIA_SOS.1': 7, 'FIA_UAU.1': 10, 'FIA_UAU.5': 6, 'FIA_UAU.7': 7, 'FIA_UID.1': 16, 'FIA_AFL.1.1': 1, 'FIA_ATD.1.1': 2, 'FIA_SOS.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_SMF.1.1': 2, 'FMT_MSA': 36, 'FMT_MSA.2': 9, 'FMT_SMF.1': 14, 'FMT_SMR.1': 22, 'FMT_MSA.3': 15, 'FMT_MSA.1': 9, 'FMT_MSA.2.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MOF.1': 3}, 'FPT': {'FPT_FLS.1': 12, 'FPT_ITT.1': 7, 'FPT_PHP.1': 10, 'FPT_PHP': 1, 'FPT_TST.1': 10, 'FPT_FLS.1.1': 1, 'FPT_ITT.1.1': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.2': 9, 'FPT_PHP.2.1': 1, 'FPT_PHP.2.2': 1, 'FPT_PHP.2.3': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_PHP.3': 1}, 'FTA': {'FTA_TAB': 6, 'FTA_TAB.1': 2}, 'FTP': {'FTP_ITC': 6, 'FTP_TRP': 6, 'FTP_ITC.1': 4, 'FTP_TRP.1': 4}}, 'cc_claims': {'O': {'O.ACCESS_': 1, 'O.PIN_ENTRY': 6, 'O.MANAGEMENT': 6, 'O.SECURE_': 1, 'O.STATE': 6, 'O.PROTECTION': 9, 'O.ACCESS_CONTROL': 7, 'O.SECURE_CHANNEL': 3}, 'T': {'T.COM': 3, 'T.PIN': 6, 'T.DATA': 3, 'T.F-CONNECTOR': 3}, 'A': {'A.PUSH_SERVER': 4, 'A.ENV': 7, 'A.ADMIN': 3, 'A.CONNECTOR': 3, 'A.SM': 6}, 'OE': {'OE.ENV': 11, 'OE.ADMIN': 4, 'OE.CONNECTOR': 6, 'OE.SM': 2, 'OE.PUSH_SERVER': 4}, 'OSP': {'OSP.PIN_ENTRY': 5}}, 'vendor': {}, 'eval_facility': {'DFKI': {'DFKI': 13}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 5}, 'HPC': {'HPC': 8}}}, 'asymmetric_crypto': {'RSA': {'RSA4096': 1}, 'ECC': {'ECDH': {'ECDH': 2, 'ECDHE': 2}}, 'FF': {'DH': {'DH': 4, 'Diffie-Hellman': 4, 'DHE': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA256': 1, 'SHA-256': 2}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 1}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 39, 'TLS 1.2': 2}}, 'IKE': {'IKE': 1}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 2}, 'GCM': {'GCM': 2}}, 'ecc_curve': {'NIST': {'P-256': 4, 'P-384': 4}}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_DHE_RSA_WITH_AES_128_CBC_SHA': 3, 'TLS_DHE_RSA_WITH_AES_256_CBC_SHA': 3, 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA': 3, 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA': 3, 'TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384': 2, 'TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256': 2, 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384': 3, 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256': 3, 'TLS_DHE_RSA_WITH_AES_128_CBC_SHA256': 3, 'TLS_DHE_RSA_WITH_AES_256_CBC_SHA256': 3, 'TLS_DHE_RSA_WITH_AES_128_GCM_SHA256': 2, 'TLS_DHE_RSA_WITH_AES_256_GCM_SHA384': 2}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 14}}, 'technical_report_id': {'BSI': {'BSI TR-03116': 1, 'BSI TR-03120': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS#1': 3}, 'RFC': {'RFC 3526': 3, 'RFC 4492': 1, 'RFC-3268': 1, 'RFC 3268': 1, 'RFC 5246': 4, 'RFC-4346': 1, 'RFC 4346': 1, 'RFC-5246': 1, 'RFC-3447': 1, 'RFC 3447': 1, 'RFC-3546': 1, 'RFC 3546': 1, 'RFC-3526': 1}, 'ISO': {'ISO/IEC 7816-4': 3, 'ISO/IEC 7816-8': 3}, 'X509': {'X.509': 5}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1171-2023': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 3': 1, 'EAL 4': 1, 'EAL 2': 1, 'EAL 3 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'ALC': {'ALC_TAT.1': 1, 'ALC_FLR': 1}, 'AVA': {'AVA_VAN.4': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 1171a_pdf.pdf.
    • The st_filename property was set to 1171b_pdf.pdf.
    • The cert_filename property was set to 1171c_pdf.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-1171-2023.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1171a_pdf.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1171b_pdf.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Electronic Health Card Terminal eHealth GT900 Hardwareversion: 2.1.0, Firmwareversion: 2.0.1 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1171c_pdf.pdf",
  "dgst": "9b9f00beba1fbbfc",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-1171-2023",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 4
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.0.1",
        "2.1.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "eHealth",
      "cert_id": "BSI-DSZ-CC-1171-2023",
      "certification_date": "2023-03-30",
      "enhanced": {
        "applicant": "GT German Telematics Gesellschaft f\u00fcr Telematikdienste mbH Libellenstra\u00dfe 9 14129 Berlin",
        "assurance_level": "EAL3+,ADV_FSP.4,ADV_IMP.1,ADV_TDS.3,ALC_TAT.1,AVA_VAN.4",
        "cert_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1171c_pdf.pdf?__blob=publicationFile\u0026v=2",
        "certification_date": "2023-03-30",
        "description": "The Target of Evaluation (TOE) is the eHealth Card Terminal GT900 Hardware version: 2.1.0, Firmware version: 2.0.1. It is an eHealth Card Terminal with 2 ID-1 Slots (HPC and eGK) and 2 ID-000 SMC Slots (supporting SMC-KT and SMC-B Cards), a disinfectable liquids resistant 20 key keypad also usable for secure pin entry and LAN + USB interfaces with interoperability to all eHealth Connectors TI 1.0 and to all High Speed Connectors (HSK) for TI 2.0 of the German Healthcare System.",
        "entries": [
          {
            "description": "Certificate",
            "id": "BSI-DSZ-CC-1171-2023 (Ausstellungsdatum / Certification Date 30.03.2023, g\u00fcltig bis / valid until 29.03.2028) Zertifizierungsreport / Certification Report"
          }
        ],
        "evaluation_facility": "Deutsche Telekom Security GmbH (Bonn)",
        "expiration_date": "2028-03-29",
        "product": "Electronic Health Card Terminal eHealth GT900 Hardwareversion: 2.1.0, Firmwareversion: 2.0.1",
        "protection_profile": "Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01, 22 May 2017",
        "report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1171a_pdf.pdf?__blob=publicationFile\u0026v=2",
        "target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1171b_pdf.pdf?__blob=publicationFile\u0026v=3"
      },
      "product": "Electronic Health Card Terminal eHealth GT900 Hardwareversion: 2.1.0, Firmwareversion: 2.0.1",
      "subcategory": "Card reader",
      "url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Gesundheitswesen_Kartenlesegeraete/1171.html",
      "vendor": "GT German Telematics Gesellschaft f\u00fcr Telematikdienste mbH"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "GT German Telematics Gesellschaft f\u00fcr Telematikdienste mbH",
  "manufacturer_web": "https://germantelematics.de/kontakt/",
  "name": "Electronic Health Card Terminal eHealth GT900 Hardwareversion: 2.1.0, Firmwareversion: 2.0.1",
  "not_valid_after": "2028-03-29",
  "not_valid_before": "2023-03-30",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "1171c_pdf.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1171-2023": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "ALC": {
          "ALC_FLR": 1,
          "ALC_TAT.1": 1
        },
        "AVA": {
          "AVA_VAN.4": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 3": 1,
          "EAL 3 augmented": 1,
          "EAL 4": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung\"",
      "/Subject": "Common Criteria, Certification, Zertifizierung",
      "/Title": "Certificate BSI-DSZ-CC-1171",
      "pdf_file_size_bytes": 235615,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "1171a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.4",
        "cc_version": "PP conformant Common Criteria Part 2 conformant",
        "cert_id": "BSI-DSZ-CC-1171-2023",
        "cert_item": "Electronic Health Card Terminal eHealth GT900 Hardwareversion: 2.1.0, Firmwareversion: 2.0.1",
        "cert_lab": "BSI",
        "developer": "GT German Telematics Gesell. f\u00fcr Telematik mbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC- PP-0032-V2-2015-MA-01, 22 May 2017"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1171-2023": 15
        }
      },
      "cc_claims": {
        "A": {
          "A.ENV": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0032-V2-2015-MA-01": 3
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_FSP.4": 4,
          "ADV_IMP.1": 4,
          "ADV_TDS.3": 4
        },
        "ALC": {
          "ALC_FLR": 3,
          "ALC_TAT.1": 4
        },
        "ATE": {
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN.4": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 3,
          "EAL 3": 4,
          "EAL 3 augmented": 3,
          "EAL 4": 3
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM": 3,
          "FCS_CKM.1": 19,
          "FCS_COP": 4,
          "FCS_COP.1": 21
        },
        "FDP": {
          "FDP_ACF": 2,
          "FDP_IFC": 2,
          "FDP_IFF": 2
        },
        "FIA": {
          "FIA_UAU.5": 1,
          "FIA_UAU.7": 1
        },
        "FMT": {
          "FMT_SMF.1": 1
        },
        "FPT": {
          "FPT_FLS.1": 2,
          "FPT_PHP.1": 1,
          "FPT_PHP.2": 1,
          "FPT_TST.1": 1
        },
        "FTP": {
          "FTP_ITC": 1
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          "GT900 - Dokumentation des Produktlebenszyklus - Konfigurationsliste, gt german telematics GmbH (confidential document) [10] Kurzanleitung Kartenterminal eHealth GT900, gt german telematics GmbH, Version 1.0.1 [11": 1,
          "GmbH [7] Evaluation Technical Report, Version 1.0, 2023-02-16, Deutsche Telekom Security GmbH, (confidential document) [8] Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 1
        }
      },
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 2,
            "TLS 1.2": 10
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "secp256r1": 5,
          "secp384r1": 5
        }
      },
      "eval_facility": {
        "DeutscheTelekom": {
          "Deutsche Telekom Security": 3
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA256": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 32": 1
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        },
        "PKCS": {
          "PKCS#1": 3
        },
        "RFC": {
          "RFC 3447": 5,
          "RFC 5246": 1,
          "RFC2104": 10,
          "RFC3268": 10,
          "RFC3447": 10,
          "RFC3526": 10,
          "RFC4492": 5,
          "RFC5246": 10,
          "RFC5480": 5
        },
        "X509": {
          "X.509": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          },
          "HPC": {
            "HPC": 1
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung\"",
      "/Subject": "Common Criteria, Certification, Zertifizierung",
      "/Title": "Certification Report BSI-DSZ-CC-1171",
      "pdf_file_size_bytes": 671642,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.sogis.eu/",
          "https://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/",
          "https://www.bsi.bund.de/zertifizierung",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "https://www.bsi.bund.de/AIS",
          "http://www.commoncriteriaportal.org/cc/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 29
    },
    "st_filename": "1171b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 2,
            "ECDHE": 2
          }
        },
        "FF": {
          "DH": {
            "DH": 4,
            "DHE": 2,
            "Diffie-Hellman": 4
          }
        },
        "RSA": {
          "RSA4096": 1
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1171": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.ADMIN": 3,
          "A.CONNECTOR": 3,
          "A.ENV": 7,
          "A.PUSH_SERVER": 4,
          "A.SM": 6
        },
        "O": {
          "O.ACCESS_": 1,
          "O.ACCESS_CONTROL": 7,
          "O.MANAGEMENT": 6,
          "O.PIN_ENTRY": 6,
          "O.PROTECTION": 9,
          "O.SECURE_": 1,
          "O.SECURE_CHANNEL": 3,
          "O.STATE": 6
        },
        "OE": {
          "OE.ADMIN": 4,
          "OE.CONNECTOR": 6,
          "OE.ENV": 11,
          "OE.PUSH_SERVER": 4,
          "OE.SM": 2
        },
        "OSP": {
          "OSP.PIN_ENTRY": 5
        },
        "T": {
          "T.COM": 3,
          "T.DATA": 3,
          "T.F-CONNECTOR": 3,
          "T.PIN": 6
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0032": 4,
          "BSI-CC-PP-0032-": 1,
          "BSI-CC-PP-0032-V2-2015-": 1,
          "BSI-CC-PP-0032-V2-2015-MA-": 3,
          "BSI-CC-PP-0032-V2-2015-MA-01": 10,
          "BSI-CC-PP-0046": 2,
          "BSI-CC-PP-0082": 2,
          "BSI-CC-PP-0082-V2": 1,
          "BSI-CC-PP-0082-V3": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 4,
          "ADV_IMP.1": 5,
          "ADV_TDS.3": 4
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.3": 1,
          "ALC_CMS.3": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 4
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.4": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 3": 3,
          "EAL 3 augmented": 3
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM": 22,
          "FCS_CKM.1": 16,
          "FCS_CKM.2": 4,
          "FCS_CKM.4": 31,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 49,
          "FCS_COP.1": 13
        },
        "FDP": {
          "FDP_ACC": 24,
          "FDP_ACC.1": 15,
          "FDP_ACF": 25,
          "FDP_ACF.1": 17,
          "FDP_IFC": 22,
          "FDP_IFC.1": 12,
          "FDP_IFF": 23,
          "FDP_IFF.1": 14,
          "FDP_ITC.1": 15,
          "FDP_ITC.2": 12,
          "FDP_RIP.1": 9,
          "FDP_RIP.1.1": 1
        },
        "FIA": {
          "FIA_AFL.1": 7,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 3,
          "FIA_ATD.1": 6,
          "FIA_ATD.1.1": 2,
          "FIA_SOS.1": 7,
          "FIA_SOS.1.1": 1,
          "FIA_UAU.1": 10,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.5": 6,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.7": 7,
          "FIA_UAU.7.1": 1,
          "FIA_UID.1": 16,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_MOF.1": 3,
          "FMT_MSA": 36,
          "FMT_MSA.1": 9,
          "FMT_MSA.2": 9,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 15,
          "FMT_SMF.1": 14,
          "FMT_SMF.1.1": 2,
          "FMT_SMR.1": 22,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FLS.1": 12,
          "FPT_FLS.1.1": 1,
          "FPT_ITT.1": 7,
          "FPT_ITT.1.1": 1,
          "FPT_PHP": 1,
          "FPT_PHP.1": 10,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.2": 9,
          "FPT_PHP.2.1": 1,
          "FPT_PHP.2.2": 1,
          "FPT_PHP.2.3": 1,
          "FPT_PHP.3": 1,
          "FPT_TST.1": 10,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTA": {
          "FTA_TAB": 6,
          "FTA_TAB.1": 2
        },
        "FTP": {
          "FTP_ITC": 6,
          "FTP_ITC.1": 4,
          "FTP_TRP": 6,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "GCM": {
          "GCM": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 1
        },
        "TLS": {
          "TLS": {
            "TLS": 39,
            "TLS 1.2": 2
          }
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 1
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 4,
          "P-384": 4
        }
      },
      "eval_facility": {
        "DFKI": {
          "DFKI": 13
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 2,
            "SHA256": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 14
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "ISO": {
          "ISO/IEC 7816-4": 3,
          "ISO/IEC 7816-8": 3
        },
        "PKCS": {
          "PKCS#1": 3
        },
        "RFC": {
          "RFC 3268": 1,
          "RFC 3447": 1,
          "RFC 3526": 3,
          "RFC 3546": 1,
          "RFC 4346": 1,
          "RFC 4492": 1,
          "RFC 5246": 4,
          "RFC-3268": 1,
          "RFC-3447": 1,
          "RFC-3526": 1,
          "RFC-3546": 1,
          "RFC-4346": 1,
          "RFC-5246": 1
        },
        "X509": {
          "X.509": 5
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 5
          },
          "HPC": {
            "HPC": 8
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03116": 1,
          "BSI TR-03120": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {
        "TLS": {
          "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 3,
          "TLS_DHE_RSA_WITH_AES_128_CBC_SHA256": 3,
          "TLS_DHE_RSA_WITH_AES_128_GCM_SHA256": 2,
          "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": 3,
          "TLS_DHE_RSA_WITH_AES_256_CBC_SHA256": 3,
          "TLS_DHE_RSA_WITH_AES_256_GCM_SHA384": 2,
          "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": 3,
          "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256": 3,
          "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 2,
          "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": 3,
          "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384": 3,
          "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 2
        }
      },
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "GT German Telematics Gesellschaft f\u00fcr Telematikdienste mbH",
      "/Title": "Electronic Health Card Terminal eHealth GT900 Security Target",
      "pdf_file_size_bytes": 942895,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.ietf.org/rfc/rfc3546.txt",
          "http://www.ietf.org/rfc/rfc4346.txt",
          "http://www.ietf.org/rfc/rfc3526.txt",
          "http://www.ietf.org/rfc/rfc3268.txt",
          "http://www.ietf.org/rfc/rfc5246.txt",
          "http://www.ietf.org/rfc/rfc3447.txt"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 71
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL3+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "EHCT_V3_6"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0032V2b_pdf.pdf",
        "pp_name": "Common Criteria Protection Profile Electronic Health Card Terminal"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1171a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL3+",
      "AVA_VAN.4",
      "ADV_IMP.1",
      "ADV_TDS.3",
      "ADV_FSP.4",
      "ALC_TAT.1"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1171b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "7303abd369f03aae58325cfdc2ec3e9682ce759912cb4419d1dbb9a783ecd809",
      "txt_hash": "7c84420505ef469ef049119e8c7cd62e5722966cad0e879ca2f861284a5fe4e6"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "867bc882dcbeab7fe3fe061485457a3d6feefd8082398c8ae39d810f4780af90",
      "txt_hash": "b93297f88f45c122f41aff6a84b8f4de5b40900bc7f3d5616581d2a79bfb61f8"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "7e076e468234b4e6e930c02888eca578b8b94aaba74aa5c7dd4fa51f69fbc567",
      "txt_hash": "50730df1e19a0f81caf83c73ffe5cb2f736d448f1cdfd7758929ba457c0260f8"
    }
  },
  "status": "active"
}