Electronic Health Card Terminal eHealth GT900 Hardwareversion: 2.1.0, Firmwareversion: 2.0.1
CSV information ?
Status | active |
---|---|
Valid from | 30.03.2023 |
Valid until | 29.03.2028 |
Scheme | 🇩🇪 DE |
Manufacturer | GT German Telematics Gesellschaft für Telematikdienste mbH |
Category | Other Devices and Systems |
Security level | ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, EAL3+, ALC_TAT.1, AVA_VAN.4 |
Protection profiles |
Heuristics summary ?
Certificate ?
Extracted keywords
Security level
EAL 3, EAL 4, EAL 2, EAL 3 augmentedSecurity Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, ALC_FLR, AVA_VAN.4Certificates
BSI-DSZ-CC-1171-2023Standards
ISO/IEC 15408, ISO/IEC 18045File metadata
Title | Certificate BSI-DSZ-CC-1171 |
---|---|
Subject | Common Criteria, Certification, Zertifizierung |
Keywords | "Common Criteria, Certification, Zertifizierung" |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Pages | 1 |
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, HPCHash functions
SHA256Protocols
TLS, TLS 1.2Libraries
OpenSSLElliptic Curves
secp256r1, secp384r1Security level
EAL 3, EAL 4, EAL 2, EAL 1, EAL 3 augmentedClaims
A.ENVSecurity Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, ALC_FLR, ATE_FUN, ATE_IND, AVA_VAN.4Security Functional Requirements (SFR)
FCS_COP, FCS_CKM, FCS_CKM.1, FCS_COP.1, FDP_ACF, FDP_IFC, FDP_IFF, FIA_UAU.5, FIA_UAU.7, FMT_SMF.1, FPT_FLS.1, FPT_PHP.1, FPT_PHP.2, FPT_TST.1, FTP_ITCProtection profiles
BSI-CC-PP-0032-V2-2015-MA-01Certificates
BSI-DSZ-CC-1171-2023Evaluation facilities
Deutsche Telekom SecurityCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, GmbH [7] Evaluation Technical Report, Version 1.0, 2023-02-16, Deutsche Telekom Security GmbH, (confidential document) [8] Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, GT900 - Dokumentation des Produktlebenszyklus - Konfigurationsliste, gt german telematics GmbH (confidential document) [10] Kurzanleitung Kartenterminal eHealth GT900, gt german telematics GmbH, Version 1.0.1 [11Standards
PKCS#1, AIS 32, RFC3447, RFC3526, RFC5246, RFC3268, RFC2104, RFC4492, RFC5480, RFC 3447, RFC 5246, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, X.509Technical reports
BSI 7148File metadata
Title | Certification Report BSI-DSZ-CC-1171 |
---|---|
Subject | Common Criteria, Certification, Zertifizierung |
Keywords | "Common Criteria, Certification, Zertifizierung" |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Pages | 29 |
Frontpage
Certificate ID | BSI-DSZ-CC-1171-2023 |
---|---|
Certified item | Electronic Health Card Terminal eHealth GT900 Hardwareversion: 2.1.0, Firmwareversion: 2.0.1 |
Certification lab | BSI |
Developer | GT German Telematics Gesell. für Telematik mbH |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, HPCAsymmetric Algorithms
RSA4096, ECDH, ECDHE, DH, Diffie-Hellman, DHEHash functions
SHA256, SHA-256Schemes
Key ExchangeProtocols
TLS, TLS 1.2, IKEElliptic Curves
P-256, P-384Block cipher modes
CBC, GCMTLS cipher suites
TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384Security level
EAL 3, EAL 3 augmentedClaims
O.ACCESS_, O.PIN_ENTRY, O.MANAGEMENT, O.SECURE_, O.STATE, O.PROTECTION, O.ACCESS_CONTROL, O.SECURE_CHANNEL, T.COM, T.PIN, T.DATA, T.F-CONNECTOR, A.PUSH_SERVER, A.ENV, A.ADMIN, A.CONNECTOR, A.SM, OE.ENV, OE.ADMIN, OE.CONNECTOR, OE.SM, OE.PUSH_SERVER, OSP.PIN_ENTRYSecurity Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_ARC.1, AGD_OPE.1, AGD_PRE.1, ALC_TAT.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.4, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FCS_CKM.1, FCS_COP.1, FCS_CKM, FCS_CKM.4, FCS_COP, FCS_CKM.2, FCS_CKM.4.1, FDP_ACF.1, FDP_RIP.1, FDP_ACC, FDP_ACF, FDP_IFC, FDP_IFF, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_IFC.1, FDP_IFF.1, FDP_RIP.1.1, FIA_AFL.1.2, FIA_AFL.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.1, FIA_UAU.5, FIA_UAU.7, FIA_UID.1, FIA_AFL.1.1, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FMT_SMF.1.1, FMT_MSA, FMT_MSA.2, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3, FMT_MSA.1, FMT_MSA.2.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF.1, FPT_FLS.1, FPT_ITT.1, FPT_PHP.1, FPT_PHP, FPT_TST.1, FPT_FLS.1.1, FPT_ITT.1.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.2, FPT_PHP.2.1, FPT_PHP.2.2, FPT_PHP.2.3, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3, FTA_TAB, FTA_TAB.1, FTP_ITC, FTP_TRP, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-CC-PP-0032, BSI-CC-PP-0032-V2-2015-MA-01, BSI-CC-PP-0032-, BSI-CC-PP-0032-V2-2015-, BSI-CC-PP-0032-V2-2015-MA-, BSI-CC-PP-0082, BSI-CC-PP-0082-V3, BSI-CC-PP-0082-V2, BSI-CC-PP-0046Certificates
BSI-DSZ-CC-1171Evaluation facilities
DFKISide-channel analysis
physical tamperingStandards
PKCS#1, RFC 3526, RFC 4492, RFC-3268, RFC 3268, RFC 5246, RFC-4346, RFC 4346, RFC-5246, RFC-3447, RFC 3447, RFC-3546, RFC 3546, RFC-3526, ISO/IEC 7816-4, ISO/IEC 7816-8, X.509, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004Technical reports
BSI TR-03116, BSI TR-03120File metadata
Title | Electronic Health Card Terminal eHealth GT900 Security Target |
---|---|
Author | GT German Telematics Gesellschaft für Telematikdienste mbH |
Pages | 71 |
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.4Scheme data ?
Cert Id | BSI-DSZ-CC-1171-2023 | |
---|---|---|
Product | Electronic Health Card Terminal eHealth GT900 Hardwareversion: 2.1.0, Firmwareversion: 2.0.1 | |
Vendor | GT German Telematics Gesellschaft für Telematikdienste mbH | |
Certification Date | 30.03.2023 | |
Category | eHealth | |
Url | https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Gesundheitswesen_Kartenlesegeraete/1171.html | |
Enhanced | ||
Product | Electronic Health Card Terminal eHealth GT900 Hardwareversion: 2.1.0, Firmwareversion: 2.0.1 | |
Applicant | GT German Telematics Gesellschaft für Telematikdienste mbH Libellenstraße 9 14129 Berlin | |
Evaluation Facility | Deutsche Telekom Security GmbH (Bonn) | |
Assurance Level | EAL3+,ADV_FSP.4,ADV_IMP.1,ADV_TDS.3,ALC_TAT.1,AVA_VAN.4 | |
Protection Profile | Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01, 22 May 2017 | |
Certification Date | 30.03.2023 | |
Expiration Date | 29.03.2028 | |
Entries | [frozendict({'id': 'BSI-DSZ-CC-1171-2023 (Ausstellungsdatum / Certification Date 30.03.2023, gültig bis / valid until 29.03.2028) Zertifizierungsreport / Certification Report', 'description': 'Certificate'})] | |
Report Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1171a_pdf.pdf?__blob=publicationFile&v=2 | |
Target Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1171b_pdf.pdf?__blob=publicationFile&v=3 | |
Cert Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1171c_pdf.pdf?__blob=publicationFile&v=2 | |
Description | The Target of Evaluation (TOE) is the eHealth Card Terminal GT900 Hardware version: 2.1.0, Firmware version: 2.0.1. It is an eHealth Card Terminal with 2 ID-1 Slots (HPC and eGK) and 2 ID-000 SMC Slots (supporting SMC-KT and SMC-B Cards), a disinfectable liquids resistant 20 key keypad also usable for secure pin entry and LAN + USB interfaces with interoperability to all eHealth Connectors TI 1.0 and to all High Speed Connectors (HSK) for TI 2.0 of the German Healthcare System. | |
Subcategory | Card reader |
References ?
No references are available for this certificate.
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'certification_date': '2023-03-30', 'enhanced': {'__update__': {'applicant': 'GT German Telematics Gesellschaft für Telematikdienste mbH Libellenstraße 9 14129 Berlin', 'evaluation_facility': 'Deutsche Telekom Security GmbH (Bonn)', 'certification_date': '2023-03-30', 'expiration_date': '2028-03-29', 'entries': {'0': {'__update__': {'id': 'BSI-DSZ-CC-1171-2023 (Ausstellungsdatum / Certification Date 30.03.2023, gültig bis / valid until 29.03.2028) Zertifizierungsreport / Certification Report'}}}, 'description': 'The Target of Evaluation (TOE) is the eHealth Card Terminal GT900 Hardware version: 2.1.0, Firmware version: 2.0.1. It is an eHealth Card Terminal with 2 ID-1 Slots (HPC and eGK) and 2 ID-000 SMC Slots (supporting SMC-KT and SMC-B Cards), a disinfectable liquids resistant 20 key keypad also usable for secure pin entry and LAN + USB interfaces with interoperability to all eHealth Connectors TI 1.0 and to all High Speed Connectors (HSK) for TI 2.0 of the German Healthcare System.'}}}
data.
- The scheme_data property was updated, with the
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Common Criteria Protection Profile Electronic Health Card Terminal', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0032V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['EHCT_V3_6']}}]}
.
- The new value is
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '867bc882dcbeab7fe3fe061485457a3d6feefd8082398c8ae39d810f4780af90', 'txt_hash': 'b93297f88f45c122f41aff6a84b8f4de5b40900bc7f3d5616581d2a79bfb61f8'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7e076e468234b4e6e930c02888eca578b8b94aaba74aa5c7dd4fa51f69fbc567', 'txt_hash': '50730df1e19a0f81caf83c73ffe5cb2f736d448f1cdfd7758929ba457c0260f8'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7303abd369f03aae58325cfdc2ec3e9682ce759912cb4419d1dbb9a783ecd809', 'txt_hash': '7c84420505ef469ef049119e8c7cd62e5722966cad0e879ca2f861284a5fe4e6'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 671642, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 29, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/Keywords': '"Common Criteria, Certification, Zertifizierung"', '/Subject': 'Common Criteria, Certification, Zertifizierung', '/Title': 'Certification Report BSI-DSZ-CC-1171', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/', 'https://www.commoncriteriaportal.org/', 'https://www.sogis.eu/', 'https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/zertifizierungsreporte', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/AIS']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 942895, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 71, '/Author': 'GT German Telematics Gesellschaft für Telematikdienste mbH', '/Title': 'Electronic Health Card Terminal eHealth GT900 Security Target', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ietf.org/rfc/rfc3268.txt', 'http://www.ietf.org/rfc/rfc3546.txt', 'http://www.ietf.org/rfc/rfc4346.txt', 'http://www.ietf.org/rfc/rfc3447.txt', 'http://www.ietf.org/rfc/rfc3526.txt', 'http://www.ietf.org/rfc/rfc5246.txt']}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 235615, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/Keywords': '"Common Criteria, Certification, Zertifizierung"', '/Subject': 'Common Criteria, Certification, Zertifizierung', '/Title': 'Certificate BSI-DSZ-CC-1171', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-1171-2023', 'cert_item': 'Electronic Health Card Terminal eHealth GT900 Hardwareversion: 2.1.0, Firmwareversion: 2.0.1', 'developer': 'GT German Telematics Gesell. für Telematik mbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC- PP-0032-V2-2015-MA-01, 22 May 2017', 'cc_version': 'PP conformant Common Criteria Part 2 conformant', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.4'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1171-2023': 15}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0032-V2-2015-MA-01': 3}}, 'cc_security_level': {'EAL': {'EAL 3': 4, 'EAL 4': 3, 'EAL 2': 3, 'EAL 1': 1, 'EAL 3 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 4, 'ADV_IMP.1': 4, 'ADV_TDS.3': 4}, 'ALC': {'ALC_TAT.1': 4, 'ALC_FLR': 3}, 'ATE': {'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.4': 5}}, 'cc_sfr': {'FCS': {'FCS_COP': 4, 'FCS_CKM': 3, 'FCS_CKM.1': 19, 'FCS_COP.1': 21}, 'FDP': {'FDP_ACF': 2, 'FDP_IFC': 2, 'FDP_IFF': 2}, 'FIA': {'FIA_UAU.5': 1, 'FIA_UAU.7': 1}, 'FMT': {'FMT_SMF.1': 1}, 'FPT': {'FPT_FLS.1': 2, 'FPT_PHP.1': 1, 'FPT_PHP.2': 1, 'FPT_TST.1': 1}, 'FTP': {'FTP_ITC': 1}}, 'cc_claims': {'A': {'A.ENV': 1}}, 'vendor': {}, 'eval_facility': {'DeutscheTelekom': {'Deutsche Telekom Security': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}, 'HPC': {'HPC': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA256': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 2, 'TLS 1.2': 10}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {'NIST': {'secp256r1': 5, 'secp384r1': 5}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 1}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS#1': 3}, 'BSI': {'AIS 32': 1}, 'RFC': {'RFC3447': 10, 'RFC3526': 10, 'RFC5246': 10, 'RFC3268': 10, 'RFC2104': 10, 'RFC4492': 5, 'RFC5480': 5, 'RFC 3447': 5, 'RFC 5246': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}, 'X509': {'X.509': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'GmbH [7] Evaluation Technical Report, Version 1.0, 2023-02-16, Deutsche Telekom Security GmbH, (confidential document) [8] Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7': 1, 'GT900 - Dokumentation des Produktlebenszyklus - Konfigurationsliste, gt german telematics GmbH (confidential document) [10] Kurzanleitung Kartenterminal eHealth GT900, gt german telematics GmbH, Version 1.0.1 [11': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1171': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0032': 4, 'BSI-CC-PP-0032-V2-2015-MA-01': 10, 'BSI-CC-PP-0032-': 1, 'BSI-CC-PP-0032-V2-2015-': 1, 'BSI-CC-PP-0032-V2-2015-MA-': 3, 'BSI-CC-PP-0082': 2, 'BSI-CC-PP-0082-V3': 1, 'BSI-CC-PP-0082-V2': 1, 'BSI-CC-PP-0046': 2}}, 'cc_security_level': {'EAL': {'EAL 3': 3, 'EAL 3 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 4, 'ADV_IMP.1': 5, 'ADV_TDS.3': 4, 'ADV_ARC.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_TAT.1': 4, 'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.4': 4}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FCS': {'FCS_CKM.1': 16, 'FCS_COP.1': 13, 'FCS_CKM': 22, 'FCS_CKM.4': 31, 'FCS_COP': 49, 'FCS_CKM.2': 4, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ACF.1': 17, 'FDP_RIP.1': 9, 'FDP_ACC': 24, 'FDP_ACF': 25, 'FDP_IFC': 22, 'FDP_IFF': 23, 'FDP_ITC.1': 15, 'FDP_ITC.2': 12, 'FDP_ACC.1': 15, 'FDP_IFC.1': 12, 'FDP_IFF.1': 14, 'FDP_RIP.1.1': 1}, 'FIA': {'FIA_AFL.1.2': 3, 'FIA_AFL.1': 7, 'FIA_ATD.1': 6, 'FIA_SOS.1': 7, 'FIA_UAU.1': 10, 'FIA_UAU.5': 6, 'FIA_UAU.7': 7, 'FIA_UID.1': 16, 'FIA_AFL.1.1': 1, 'FIA_ATD.1.1': 2, 'FIA_SOS.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_SMF.1.1': 2, 'FMT_MSA': 36, 'FMT_MSA.2': 9, 'FMT_SMF.1': 14, 'FMT_SMR.1': 22, 'FMT_MSA.3': 15, 'FMT_MSA.1': 9, 'FMT_MSA.2.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MOF.1': 3}, 'FPT': {'FPT_FLS.1': 12, 'FPT_ITT.1': 7, 'FPT_PHP.1': 10, 'FPT_PHP': 1, 'FPT_TST.1': 10, 'FPT_FLS.1.1': 1, 'FPT_ITT.1.1': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.2': 9, 'FPT_PHP.2.1': 1, 'FPT_PHP.2.2': 1, 'FPT_PHP.2.3': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_PHP.3': 1}, 'FTA': {'FTA_TAB': 6, 'FTA_TAB.1': 2}, 'FTP': {'FTP_ITC': 6, 'FTP_TRP': 6, 'FTP_ITC.1': 4, 'FTP_TRP.1': 4}}, 'cc_claims': {'O': {'O.ACCESS_': 1, 'O.PIN_ENTRY': 6, 'O.MANAGEMENT': 6, 'O.SECURE_': 1, 'O.STATE': 6, 'O.PROTECTION': 9, 'O.ACCESS_CONTROL': 7, 'O.SECURE_CHANNEL': 3}, 'T': {'T.COM': 3, 'T.PIN': 6, 'T.DATA': 3, 'T.F-CONNECTOR': 3}, 'A': {'A.PUSH_SERVER': 4, 'A.ENV': 7, 'A.ADMIN': 3, 'A.CONNECTOR': 3, 'A.SM': 6}, 'OE': {'OE.ENV': 11, 'OE.ADMIN': 4, 'OE.CONNECTOR': 6, 'OE.SM': 2, 'OE.PUSH_SERVER': 4}, 'OSP': {'OSP.PIN_ENTRY': 5}}, 'vendor': {}, 'eval_facility': {'DFKI': {'DFKI': 13}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 5}, 'HPC': {'HPC': 8}}}, 'asymmetric_crypto': {'RSA': {'RSA4096': 1}, 'ECC': {'ECDH': {'ECDH': 2, 'ECDHE': 2}}, 'FF': {'DH': {'DH': 4, 'Diffie-Hellman': 4, 'DHE': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA256': 1, 'SHA-256': 2}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 1}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 39, 'TLS 1.2': 2}}, 'IKE': {'IKE': 1}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 2}, 'GCM': {'GCM': 2}}, 'ecc_curve': {'NIST': {'P-256': 4, 'P-384': 4}}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_DHE_RSA_WITH_AES_128_CBC_SHA': 3, 'TLS_DHE_RSA_WITH_AES_256_CBC_SHA': 3, 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA': 3, 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA': 3, 'TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384': 2, 'TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256': 2, 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384': 3, 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256': 3, 'TLS_DHE_RSA_WITH_AES_128_CBC_SHA256': 3, 'TLS_DHE_RSA_WITH_AES_256_CBC_SHA256': 3, 'TLS_DHE_RSA_WITH_AES_128_GCM_SHA256': 2, 'TLS_DHE_RSA_WITH_AES_256_GCM_SHA384': 2}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 14}}, 'technical_report_id': {'BSI': {'BSI TR-03116': 1, 'BSI TR-03120': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS#1': 3}, 'RFC': {'RFC 3526': 3, 'RFC 4492': 1, 'RFC-3268': 1, 'RFC 3268': 1, 'RFC 5246': 4, 'RFC-4346': 1, 'RFC 4346': 1, 'RFC-5246': 1, 'RFC-3447': 1, 'RFC 3447': 1, 'RFC-3546': 1, 'RFC 3546': 1, 'RFC-3526': 1}, 'ISO': {'ISO/IEC 7816-4': 3, 'ISO/IEC 7816-8': 3}, 'X509': {'X.509': 5}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The cert_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1171-2023': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 3': 1, 'EAL 4': 1, 'EAL 2': 1, 'EAL 3 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'ALC': {'ALC_TAT.1': 1, 'ALC_FLR': 1}, 'AVA': {'AVA_VAN.4': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
1171a_pdf.pdf
. - The st_filename property was set to
1171b_pdf.pdf
. - The cert_filename property was set to
1171c_pdf.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['BSI']
. - The cert_id property was set to
BSI-DSZ-CC-1171-2023
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1171a_pdf.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1171b_pdf.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}
values discarded.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Electronic Health Card Terminal eHealth GT900 Hardwareversion: 2.1.0, Firmwareversion: 2.0.1 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1171c_pdf.pdf",
"dgst": "9b9f00beba1fbbfc",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-1171-2023",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 4
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2.0.1",
"2.1.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "eHealth",
"cert_id": "BSI-DSZ-CC-1171-2023",
"certification_date": "2023-03-30",
"enhanced": {
"applicant": "GT German Telematics Gesellschaft f\u00fcr Telematikdienste mbH Libellenstra\u00dfe 9 14129 Berlin",
"assurance_level": "EAL3+,ADV_FSP.4,ADV_IMP.1,ADV_TDS.3,ALC_TAT.1,AVA_VAN.4",
"cert_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1171c_pdf.pdf?__blob=publicationFile\u0026v=2",
"certification_date": "2023-03-30",
"description": "The Target of Evaluation (TOE) is the eHealth Card Terminal GT900 Hardware version: 2.1.0, Firmware version: 2.0.1. It is an eHealth Card Terminal with 2 ID-1 Slots (HPC and eGK) and 2 ID-000 SMC Slots (supporting SMC-KT and SMC-B Cards), a disinfectable liquids resistant 20 key keypad also usable for secure pin entry and LAN + USB interfaces with interoperability to all eHealth Connectors TI 1.0 and to all High Speed Connectors (HSK) for TI 2.0 of the German Healthcare System.",
"entries": [
{
"description": "Certificate",
"id": "BSI-DSZ-CC-1171-2023 (Ausstellungsdatum / Certification Date 30.03.2023, g\u00fcltig bis / valid until 29.03.2028) Zertifizierungsreport / Certification Report"
}
],
"evaluation_facility": "Deutsche Telekom Security GmbH (Bonn)",
"expiration_date": "2028-03-29",
"product": "Electronic Health Card Terminal eHealth GT900 Hardwareversion: 2.1.0, Firmwareversion: 2.0.1",
"protection_profile": "Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01, 22 May 2017",
"report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1171a_pdf.pdf?__blob=publicationFile\u0026v=2",
"target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1171b_pdf.pdf?__blob=publicationFile\u0026v=3"
},
"product": "Electronic Health Card Terminal eHealth GT900 Hardwareversion: 2.1.0, Firmwareversion: 2.0.1",
"subcategory": "Card reader",
"url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Gesundheitswesen_Kartenlesegeraete/1171.html",
"vendor": "GT German Telematics Gesellschaft f\u00fcr Telematikdienste mbH"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "GT German Telematics Gesellschaft f\u00fcr Telematikdienste mbH",
"manufacturer_web": "https://germantelematics.de/kontakt/",
"name": "Electronic Health Card Terminal eHealth GT900 Hardwareversion: 2.1.0, Firmwareversion: 2.0.1",
"not_valid_after": "2028-03-29",
"not_valid_before": "2023-03-30",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "1171c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1171-2023": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"ALC": {
"ALC_FLR": 1,
"ALC_TAT.1": 1
},
"AVA": {
"AVA_VAN.4": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 3": 1,
"EAL 3 augmented": 1,
"EAL 4": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung\"",
"/Subject": "Common Criteria, Certification, Zertifizierung",
"/Title": "Certificate BSI-DSZ-CC-1171",
"pdf_file_size_bytes": 235615,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "1171a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.4",
"cc_version": "PP conformant Common Criteria Part 2 conformant",
"cert_id": "BSI-DSZ-CC-1171-2023",
"cert_item": "Electronic Health Card Terminal eHealth GT900 Hardwareversion: 2.1.0, Firmwareversion: 2.0.1",
"cert_lab": "BSI",
"developer": "GT German Telematics Gesell. f\u00fcr Telematik mbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC- PP-0032-V2-2015-MA-01, 22 May 2017"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1171-2023": 15
}
},
"cc_claims": {
"A": {
"A.ENV": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0032-V2-2015-MA-01": 3
}
},
"cc_sar": {
"ADV": {
"ADV_FSP.4": 4,
"ADV_IMP.1": 4,
"ADV_TDS.3": 4
},
"ALC": {
"ALC_FLR": 3,
"ALC_TAT.1": 4
},
"ATE": {
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN.4": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 3,
"EAL 3": 4,
"EAL 3 augmented": 3,
"EAL 4": 3
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM": 3,
"FCS_CKM.1": 19,
"FCS_COP": 4,
"FCS_COP.1": 21
},
"FDP": {
"FDP_ACF": 2,
"FDP_IFC": 2,
"FDP_IFF": 2
},
"FIA": {
"FIA_UAU.5": 1,
"FIA_UAU.7": 1
},
"FMT": {
"FMT_SMF.1": 1
},
"FPT": {
"FPT_FLS.1": 2,
"FPT_PHP.1": 1,
"FPT_PHP.2": 1,
"FPT_TST.1": 1
},
"FTP": {
"FTP_ITC": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"GT900 - Dokumentation des Produktlebenszyklus - Konfigurationsliste, gt german telematics GmbH (confidential document) [10] Kurzanleitung Kartenterminal eHealth GT900, gt german telematics GmbH, Version 1.0.1 [11": 1,
"GmbH [7] Evaluation Technical Report, Version 1.0, 2023-02-16, Deutsche Telekom Security GmbH, (confidential document) [8] Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 1
}
},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 2,
"TLS 1.2": 10
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {
"NIST": {
"secp256r1": 5,
"secp384r1": 5
}
},
"eval_facility": {
"DeutscheTelekom": {
"Deutsche Telekom Security": 3
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 32": 1
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
},
"PKCS": {
"PKCS#1": 3
},
"RFC": {
"RFC 3447": 5,
"RFC 5246": 1,
"RFC2104": 10,
"RFC3268": 10,
"RFC3447": 10,
"RFC3526": 10,
"RFC4492": 5,
"RFC5246": 10,
"RFC5480": 5
},
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
},
"HPC": {
"HPC": 1
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7148": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung\"",
"/Subject": "Common Criteria, Certification, Zertifizierung",
"/Title": "Certification Report BSI-DSZ-CC-1171",
"pdf_file_size_bytes": 671642,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.sogis.eu/",
"https://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/",
"https://www.bsi.bund.de/zertifizierung",
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/zertifizierungsreporte",
"https://www.bsi.bund.de/AIS",
"http://www.commoncriteriaportal.org/cc/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 29
},
"st_filename": "1171b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 2,
"ECDHE": 2
}
},
"FF": {
"DH": {
"DH": 4,
"DHE": 2,
"Diffie-Hellman": 4
}
},
"RSA": {
"RSA4096": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1171": 1
}
},
"cc_claims": {
"A": {
"A.ADMIN": 3,
"A.CONNECTOR": 3,
"A.ENV": 7,
"A.PUSH_SERVER": 4,
"A.SM": 6
},
"O": {
"O.ACCESS_": 1,
"O.ACCESS_CONTROL": 7,
"O.MANAGEMENT": 6,
"O.PIN_ENTRY": 6,
"O.PROTECTION": 9,
"O.SECURE_": 1,
"O.SECURE_CHANNEL": 3,
"O.STATE": 6
},
"OE": {
"OE.ADMIN": 4,
"OE.CONNECTOR": 6,
"OE.ENV": 11,
"OE.PUSH_SERVER": 4,
"OE.SM": 2
},
"OSP": {
"OSP.PIN_ENTRY": 5
},
"T": {
"T.COM": 3,
"T.DATA": 3,
"T.F-CONNECTOR": 3,
"T.PIN": 6
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0032": 4,
"BSI-CC-PP-0032-": 1,
"BSI-CC-PP-0032-V2-2015-": 1,
"BSI-CC-PP-0032-V2-2015-MA-": 3,
"BSI-CC-PP-0032-V2-2015-MA-01": 10,
"BSI-CC-PP-0046": 2,
"BSI-CC-PP-0082": 2,
"BSI-CC-PP-0082-V2": 1,
"BSI-CC-PP-0082-V3": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 4,
"ADV_IMP.1": 5,
"ADV_TDS.3": 4
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.3": 1,
"ALC_CMS.3": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_LCD.1": 1,
"ALC_TAT.1": 4
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.4": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 3": 3,
"EAL 3 augmented": 3
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM": 22,
"FCS_CKM.1": 16,
"FCS_CKM.2": 4,
"FCS_CKM.4": 31,
"FCS_CKM.4.1": 1,
"FCS_COP": 49,
"FCS_COP.1": 13
},
"FDP": {
"FDP_ACC": 24,
"FDP_ACC.1": 15,
"FDP_ACF": 25,
"FDP_ACF.1": 17,
"FDP_IFC": 22,
"FDP_IFC.1": 12,
"FDP_IFF": 23,
"FDP_IFF.1": 14,
"FDP_ITC.1": 15,
"FDP_ITC.2": 12,
"FDP_RIP.1": 9,
"FDP_RIP.1.1": 1
},
"FIA": {
"FIA_AFL.1": 7,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 3,
"FIA_ATD.1": 6,
"FIA_ATD.1.1": 2,
"FIA_SOS.1": 7,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 10,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.5": 6,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.7": 7,
"FIA_UAU.7.1": 1,
"FIA_UID.1": 16,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MOF.1": 3,
"FMT_MSA": 36,
"FMT_MSA.1": 9,
"FMT_MSA.2": 9,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 15,
"FMT_SMF.1": 14,
"FMT_SMF.1.1": 2,
"FMT_SMR.1": 22,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS.1": 12,
"FPT_FLS.1.1": 1,
"FPT_ITT.1": 7,
"FPT_ITT.1.1": 1,
"FPT_PHP": 1,
"FPT_PHP.1": 10,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_PHP.2": 9,
"FPT_PHP.2.1": 1,
"FPT_PHP.2.2": 1,
"FPT_PHP.2.3": 1,
"FPT_PHP.3": 1,
"FPT_TST.1": 10,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTA": {
"FTA_TAB": 6,
"FTA_TAB.1": 2
},
"FTP": {
"FTP_ITC": 6,
"FTP_ITC.1": 4,
"FTP_TRP": 6,
"FTP_TRP.1": 4
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"GCM": {
"GCM": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 1
},
"TLS": {
"TLS": {
"TLS": 39,
"TLS 1.2": 2
}
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 1
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 4,
"P-384": 4
}
},
"eval_facility": {
"DFKI": {
"DFKI": 13
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 2,
"SHA256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"physical tampering": 14
}
},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
},
"ISO": {
"ISO/IEC 7816-4": 3,
"ISO/IEC 7816-8": 3
},
"PKCS": {
"PKCS#1": 3
},
"RFC": {
"RFC 3268": 1,
"RFC 3447": 1,
"RFC 3526": 3,
"RFC 3546": 1,
"RFC 4346": 1,
"RFC 4492": 1,
"RFC 5246": 4,
"RFC-3268": 1,
"RFC-3447": 1,
"RFC-3526": 1,
"RFC-3546": 1,
"RFC-4346": 1,
"RFC-5246": 1
},
"X509": {
"X.509": 5
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 5
},
"HPC": {
"HPC": 8
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-03116": 1,
"BSI TR-03120": 1
}
},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 3,
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA256": 3,
"TLS_DHE_RSA_WITH_AES_128_GCM_SHA256": 2,
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA": 3,
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA256": 3,
"TLS_DHE_RSA_WITH_AES_256_GCM_SHA384": 2,
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": 3,
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256": 3,
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 2,
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": 3,
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384": 3,
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 2
}
},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "GT German Telematics Gesellschaft f\u00fcr Telematikdienste mbH",
"/Title": "Electronic Health Card Terminal eHealth GT900 Security Target",
"pdf_file_size_bytes": 942895,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ietf.org/rfc/rfc3546.txt",
"http://www.ietf.org/rfc/rfc4346.txt",
"http://www.ietf.org/rfc/rfc3526.txt",
"http://www.ietf.org/rfc/rfc3268.txt",
"http://www.ietf.org/rfc/rfc5246.txt",
"http://www.ietf.org/rfc/rfc3447.txt"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 71
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL3+",
"pp_ids": {
"_type": "Set",
"elements": [
"EHCT_V3_6"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0032V2b_pdf.pdf",
"pp_name": "Common Criteria Protection Profile Electronic Health Card Terminal"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1171a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL3+",
"AVA_VAN.4",
"ADV_IMP.1",
"ADV_TDS.3",
"ADV_FSP.4",
"ALC_TAT.1"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1171b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "7303abd369f03aae58325cfdc2ec3e9682ce759912cb4419d1dbb9a783ecd809",
"txt_hash": "7c84420505ef469ef049119e8c7cd62e5722966cad0e879ca2f861284a5fe4e6"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "867bc882dcbeab7fe3fe061485457a3d6feefd8082398c8ae39d810f4780af90",
"txt_hash": "b93297f88f45c122f41aff6a84b8f4de5b40900bc7f3d5616581d2a79bfb61f8"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "7e076e468234b4e6e930c02888eca578b8b94aaba74aa5c7dd4fa51f69fbc567",
"txt_hash": "50730df1e19a0f81caf83c73ffe5cb2f736d448f1cdfd7758929ba457c0260f8"
}
},
"status": "active"
}