name |
F5 BIG-IP 17.1.0.1 including SSLO |
ZEMO VML-GK2 HW V2.0.0 / FW V3.2.0 |
category |
Network and Network-Related Devices and Systems |
Other Devices and Systems |
scheme |
SE |
DE |
status |
active |
active |
not_valid_after |
11.10.2029 |
07.05.2029 |
not_valid_before |
11.10.2024 |
08.05.2024 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/BIG-IP17.1.0.1%20SSLOCertificate.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V3c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20F5%20BIG-IP%20v17.1.0.1%20SSLO_1-0_23FMV5101-32.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V3a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/F5%20BIG-IP%20SSLO%2017.1.0.1%20ST%20v7.7.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V3b_pdf.pdf |
manufacturer |
F5, Inc. |
ZEMO GmbH |
manufacturer_web |
https://www.f5.com/ |
https://zemo.de |
security_level |
{} |
ADV_FSP.4, ALC_TAT.1, AVA_VAN.5, ADV_IMP.1, EAL3+, ADV_TDS.3 |
dgst |
1da9718a194d4fdd |
d648123b397e3e21 |
heuristics/cert_id |
CSEC2023013 |
BSI-DSZ-CC-0623-V3-2024 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
AGD_PRE.1, ALC_DVS.1, ATE_COV.2, ALC_TAT.1, ATE_FUN.1, AVA_VAN.5, ALC_DEL.1, ATE_IND.2, ADV_FSP.4, ALC_LCD.1, ADV_ARC.1, AGD_OPE.1, ADV_TDS.3, ALC_CMC.3, ATE_DPT.1, ALC_CMS.3, ADV_IMP.1 |
heuristics/extracted_versions |
17.1.0.1 |
2.0.0, 3.2.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- category: eHealth
- cert_id: BSI-DSZ-CC-0623-V3-2024
- certification_date: 08.05.2024
- enhanced:
- applicant: ZEMO GmbH Franz-Mader-Straße 9 94036 Passau
- assurance_level: EAL3,AVA_VAN.5,ALC_TAT.1,ADV_TDS.3,ADV_IMP.1,ADV_FSP.4
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte06/0623V3c_pdf.pdf?__blob=publicationFile&v=2
- certification_date: 08.05.2024
- description: The Target of Evaluation (TOE) is the ZEMO VML-GK2, FW-Version 3.1.0, HW-Version 2.0.0 by ZEMO GmbH. The TOE is a smart card terminal used for the German healthcare system as a Mobile Card Terminal (MobCT). It is used by medical suppliers during visits to read out insurance data from a German electronic Health Card (eHC) of a health insured person. The TOE fulfils the IT security requirements to be used with the German electronic Health Card (eHC) and the German Health Professional Card (HPC) based on the regulations of the German healthcare system.
- entries: [frozendict({'id': 'BSI-DSZ-CC-0623-V3-2024 (08.05.2024)', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-0623-V2-2018 (28.06.2018)', 'description': 'Certificate'})]
- evaluation_facility: TÜV Informationstechnik GmbH
- expiration_date: 07.05.2029
- product: ZEMO VML-GK2
- protection_profile: Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System (MobCT), Version 1.4, BSI-CC-PP-0052-2015, 19 January 2015
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte06/0623V3a_pdf.pdf?__blob=publicationFile&v=2
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte06/0623V3b_pdf.pdf?__blob=publicationFile&v=2
- product: ZEMO VML-GK2
- subcategory: Card reader
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Gesundheitswesen_Kartenlesegeraete/0623.html
- vendor: ZEMO GmbH
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
0cf57948b0daee38, 89f2a255423f4a20 |
854be21fba7a106c |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_STIP_V1.1.pdf.crdownload, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0052b_pdf.pdf |
pdf_data/cert_filename |
BIG-IP17.1.0.1 SSLOCertificate.pdf |
0623V3c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0623-V3-2024: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 3: 1
- EAL 3 augmented: 1
- EAL 4: 1
|
pdf_data/cert_keywords/cc_sar |
|
- ADV:
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- ALC:
- AVA:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Ansvarigt Område/enhet: CSEC
- /Approved By:
- /Author: Jerry Johansson
- /Beslut: Ska den vara med i release?: 1
- /C-datum: 2008
- /CSEC ID:
- /CSECID: CSEC2023002
- /Company: ORGNAME
- /ContentTypeId: 0x010100D03725EE85EA344ABD0841C4414B0DCB0100B214F79D79557D4F85A98A63AE640127
- /Copy: 0
- /CreationDate: D:20241220085703+01'00'
- /Creator: Acrobat PDFMaker 24 för Word
- /Current Version:
- /DDocBinder: Scheme (CB)
- /DDocCabinet: QMS
- /DDocID: 2005-03-05-64D6-T9YR
- /DDocLastModDate: 2006-03-16 10:56:39
- /DDocLibrary: https://haddock.fmv.se/domdoc/CSECLib.nsf
- /DDocRevision: 3,7
- /DDocTitle: 035 CB General Document - Template
- /DLCPolicyLabelClientValue: Version: {_UIVersionString}
- /DLCPolicyLabelLock:
- /DLCPolicyLabelValue: Version: 10.3
- /Datum, skapat: -
- /Deluppdragsbenämning:
- /Diarienummer:
- /Dnr:
- /Document responsible: Certification Manager
- /Dokument Status: Aktiv
- /Dokumentansvarig: Jerry Johansson
- /Dokumentansvarigs enhet: KC Ledsyst
- /Dokumentbeteckning:
- /Dokumentdatum: 2023-04-13
- /Dokumenttitel: F5 BIG-IP® 17.1.0.1 including APM
- /Dokumenttyp: CB
- /FMV_beteckning: 23FMV1582-24
- /Fast_Roll:
- /Fast_av:
- /Fast_den: 2012-01-25T07:25:32Z
- /Fastställarens roll: Kvalitetschef
- /Fastställd den: 2012-01-25T00:00:00Z
- /Fastställt av: Mats Engquist
- /Fastställt av1: Mats Engquist
- /Format:
- /Ges ut?:
- /Giltigt från: -
- /Infoklass: HEMLIG/
- /Information Management:
- /Informationsklass:
- /Keywords:
- /Klassificeringsnr: 25 550
- /MallVersion: 7.0
- /ModDate: D:20241220085705+01'00'
- /Paragraf:
- /Platina: 1
- /Producer: Adobe PDF Library 24.3.212
- /Referens ID: CSEC2023002
- /Sekr. gäller tom.: -
- /SourceModified: D:20241220062644
- /Stämpel: 0
- /Subject: 23FMV1582-24
- /Title: F5 BIG-IP® 17.1.0.1 including APM
- /Uncontrolled: 0.000000
- /Uppdragsbenämning:
- /Utgåva: 0.1
- /_dlc_DocId: 7DFAYPHQVZ4V-1490461284-153
- /_dlc_DocIdItemGuid: 50d14f00-376b-47c5-8b03-cb4739e9a621
- /_dlc_DocIdPersistId:
- /_dlc_DocIdUrl: https://csec.fmv.se/_layouts/15/DocIdRedir.aspx?ID=7DFAYPHQVZ4V-1490461284-153, 7DFAYPHQVZ4V-1490461284-153
- /display_urn:schemas-microsoft-com:office:office#Author: SysINTA19_Admin
- /display_urn:schemas-microsoft-com:office:office#Editor: Systemkonto
- /Ärendetyp: 6
- pdf_file_size_bytes: 277224
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, Mobile Card Terminal for the German Healthcare System (MobCT), BSI-CC-PP-0052-2015"
- /Subject: Common Criteria, Certification, Zertifizierung, Mobile Card Terminal for the German Healthcare System (MobCT), BSI-CC-PP-0052-2015
- /Title: Certification Report BSI-DSZ-CC-0623-V3-2024
- pdf_file_size_bytes: 232618
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
Certification Report F5 BIG-IP v17.1.0.1 SSLO_1-0_23FMV5101-32.pdf |
0623V3a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.5 valid until: 7 May 2029
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0623-V3-2024
- cert_item: ZEMO VML-GK2 HW V2.0.0 / FW V3.2.0
- cert_lab: BSI
- developer: ZEMO GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System (MobCT), Version 1.4, BSI-CC-PP-0052-2015, 24 September 2014
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0623-V3-2024: 12
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 3: 4
- EAL 3 augmented: 3
- EAL 4: 4
- EAL3+: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 4
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_FSP.4: 4
- ADV_IMP.1: 4
- ADV_TDS.3: 4
- ALC:
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.TRUSTED_ADMINISTRATOR: 1
- T:
- T.AUDIT: 1
- T.CREDENTIALS: 1
- T.DEVICE_FAILURE: 1
- T.INAPPROPRIATE_ACCESS: 1
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.SERVICES: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNAUTHORIZED_DISCLOSURE: 1
- T.UNAUTHORIZED_USERS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
- OE:
- OE.ENVIRONMENT: 1
- OE.MEDIC: 1
- OE.PHYSICAL: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 16
- TLSv1.1: 1
- TLSv1.2: 1
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ISO:
|
- BSI:
- FIPS:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- RFC:
- X509:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 1170, 2024-03-21; SVN Liste aller entwicklungsrelevanten Dokumente, Version 809, 2024-03-22, (confidential documents) [11] Guidance documentation for the TOE, Version 2.2.0, 2023-11-24, Bedienungsanleitung: 1
- Report, Version 3, 2024-03-25, EVALUATION TECHNICAL REPORT SUMMARY, TÜV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /Ansvarigt Område/enhet: CSEC
- /Arkiveringsdatum:
- /Author: Jerry Johansson
- /C-datum: 2008
- /CSECID: CSEC2023013
- /Category:
- /Company: ORGNAME
- /CreationDate: D:20241220085742+01'00'
- /Creator: Acrobat PDFMaker 24 för Word
- /Current Version:
- /DDocBinder: Scheme (CB)
- /DDocCabinet: QMS
- /DDocID: 2005-03-05-64D6-T9YR
- /DDocLastModDate: 2006-03-16 10:56:39
- /DDocLibrary: https://haddock.fmv.se/domdoc/CSECLib.nsf
- /DDocRevision: 3,7
- /DDocTitle: 035 CB General Document - Template
- /Datum, skapat: -
- /Deluppdragsbenämning:
- /Dokument Status: Aktiv
- /Dokumentansvarig: Jerry Johansson
- /Dokumentansvarigs enhet: KC Ledsyst
- /Dokumentbeteckning:
- /Dokumentdatum: 2024-12-11
- /Dokumenttitel: Certification Report F5 BIG-IP v17.1.0.1 SSLO
- /Dokumenttyp: ANVISNING
- /FMV_beteckning: 23FMV5101-32
- /Fastställarens roll: Lead certifier
- /Fastställt av: Jerry Johansson
- /Fastställt av1: Jerry Johansson
- /Giltigt från: -
- /Infoklass:
- /Informationsklass:
- /Keywords:
- /Klassificeringsnr: 25 550
- /MallVersion: 7.0
- /ModDate: D:20241220085750+01'00'
- /Paragraf:
- /Platina: 1
- /Producer: Adobe PDF Library 24.3.212
- /Referens ID: CSEC2023013
- /SSLStämpel: 0
- /Sekr. gäller tom.: -
- /SourceModified: D:20241220063515
- /Stämpel: 0
- /Subject: 23FMV5101-32
- /Title: Certification Report F5 BIG-IP v17.1.0.1 SSLO
- /Uncontrolled: 0.000000
- /Uppdragsbenämning:
- /Utgåva: 2.0
- /_dlc_DocId: 7DFAYPHQVZ4V-1834444990-4845
- /_dlc_DocIdItemGuid: 04035f54-6c48-46fb-b771-4de9bf294eac
- /_dlc_DocIdUrl: https://csec.fmv.se/_layouts/15/DocIdRedir.aspx?ID=7DFAYPHQVZ4V-1834444990-4845, 7DFAYPHQVZ4V-1834444990-4845
- pdf_file_size_bytes: 387898
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, Mobile Card Terminal for the German Healthcare System (MobCT), BSI-CC-PP-0052-2015"
- /Subject: Common Criteria, Certification, Zertifizierung, Mobile Card Terminal for the German Healthcare System (MobCT), BSI-CC-PP-0052-2015
- /Title: Certification Report BSI-DSZ-CC-0623-V3-2024
- pdf_file_size_bytes: 336199
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
pdf_data/st_filename |
F5 BIG-IP SSLO 17.1.0.1 ST v7.7.pdf |
0623V3b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0032: 1
- BSI-CC-PP-0052: 2
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 3: 4
- EAL 3 augmented: 3
- EAL3+: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 5
- ADV_IMP.1: 5
- ADV_TDS.3: 5
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 5
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GCR_EXT.1: 6
- FAU_GCR_EXT.1.1: 1
- FAU_GEN: 4
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 2
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_STG.1: 5
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 5
- FAU_STG.4.1: 1
- FAU_STG_EXT: 5
- FAU_STG_EXT.1: 6
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FAU_STG_EXT.3: 1
- FCS:
- FCS_CKM.1: 5
- FCS_CKM.1.1: 2
- FCS_CKM.2: 5
- FCS_CKM.2.1: 1
- FCS_CKM.4: 5
- FCS_CKM.4.1: 1
- FCS_COP: 30
- FCS_COP.1: 5
- FCS_NTP_EXT.1: 2
- FCS_NTP_EXT.1.4: 1
- FCS_RBG_EXT.1: 7
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSHC_EXT.1: 1
- FCS_SSHS_EXT.1: 6
- FCS_SSHS_EXT.1.1: 1
- FCS_SSHS_EXT.1.2: 1
- FCS_SSHS_EXT.1.3: 1
- FCS_SSHS_EXT.1.4: 1
- FCS_SSHS_EXT.1.5: 1
- FCS_SSHS_EXT.1.6: 1
- FCS_SSHS_EXT.1.7: 1
- FCS_SSHS_EXT.1.8: 1
- FCS_STG_EXT.1: 6
- FCS_STG_EXT.1.1: 1
- FCS_TLSC_EXT.1: 8
- FCS_TLSC_EXT.1.1: 2
- FCS_TLSC_EXT.1.2: 2
- FCS_TLSC_EXT.1.3: 2
- FCS_TLSC_EXT.1.4: 2
- FCS_TLSC_EXT.2: 5
- FCS_TLSC_EXT.2.1: 1
- FCS_TLSC_EXT.2.3: 1
- FCS_TLSS_EXT.1: 13
- FCS_TLSS_EXT.1.1: 4
- FCS_TLSS_EXT.1.2: 4
- FCS_TLSS_EXT.1.3: 4
- FCS_TLSS_EXT.1.4: 4
- FCS_TTTC_EXT.1: 8
- FCS_TTTC_EXT.1.1: 4
- FCS_TTTC_EXT.1.2: 1
- FCS_TTTC_EXT.1.3: 1
- FCS_TTTC_EXT.1.4: 1
- FCS_TTTC_EXT.4: 6
- FCS_TTTC_EXT.4.1: 1
- FCS_TTTC_EXT.4.2: 1
- FCS_TTTC_EXT.4.3: 1
- FCS_TTTC_EXT.5: 5
- FCS_TTTC_EXT.5.1: 2
- FCS_TTTS_EXT.1: 8
- FCS_TTTS_EXT.1.1: 3
- FCS_TTTS_EXT.1.2: 1
- FCS_TTTS_EXT.1.3: 1
- FCS_TTTS_EXT.4: 5
- FCS_TTTS_EXT.4.1: 1
- FCS_TTTS_EXT.4.2: 1
- FDP:
- FDP_CER_EXT.1: 8
- FDP_CER_EXT.1.1: 1
- FDP_CER_EXT.1.2: 1
- FDP_CER_EXT.1.3: 1
- FDP_CER_EXT.1.4: 1
- FDP_CER_EXT.2: 5
- FDP_CER_EXT.2.1: 1
- FDP_CER_EXT.3: 6
- FDP_CER_EXT.3.1: 1
- FDP_CER_EXT.3.2: 1
- FDP_CSIR_EXT.1: 5
- FDP_CSIR_EXT.1.1: 1
- FDP_PPP_EXT.1: 9
- FDP_PPP_EXT.1.1: 1
- FDP_PPP_EXT.1.2: 1
- FDP_PPP_EXT.1.3: 1
- FDP_PPP_EXT.1.4: 1
- FDP_PPP_EXT.1.5: 1
- FDP_PRC_EXT.1: 6
- FDP_PRC_EXT.1.1: 1
- FDP_PRC_EXT.1.2: 1
- FDP_PRC_EXT.1.3: 1
- FDP_RIP.1: 5
- FDP_RIP.1.1: 1
- FDP_STG_EXT.1: 6
- FDP_STG_EXT.1.1: 1
- FDP_STIP_EXT.1: 4
- FDP_STIP_EXT.1.1: 2
- FDP_STIP_EXT.1.2: 2
- FDP_STIP_EXT.1.3: 2
- FDP_STIP_EXT.1.4: 2
- FDP_STIP_EXT.1.5: 2
- FDP_TEP_EXT.1: 7
- FDP_TEP_EXT.1.1: 1
- FDP_TEP_EXT.1.2: 1
- FDP_TEP_EXT.1.3: 1
- FDP_TEP_EXT.1.4: 1
- FDP_TEP_EXT.1.5: 3
- FDP_TEP_EXT.1.6: 1
- FDP_TEP_EXT.1.7: 1
- FDP_TEP_EXT.1.8: 1
- FDP_TEP_EXT.1.9: 1
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ENR_EXT.1: 6
- FIA_ENR_EXT.1.1: 1
- FIA_PMG_EXT.1: 7
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 6
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT.1: 7
- FMT:
- FMT_MOF: 16
- FMT_MOF.1: 3
- FMT_MTD: 11
- FMT_MTD.1: 2
- FMT_SMF: 6
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR: 7
- FMT_SMR.2: 9
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 5
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_FLS.1: 5
- FPT_FLS.1.1: 1
- FPT_KST_EXT.1: 6
- FPT_KST_EXT.1.1: 1
- FPT_KST_EXT.2: 5
- FPT_KST_EXT.2.1: 1
- FPT_RCV.1: 5
- FPT_RCV.1.1: 1
- FPT_SKP_EXT.1: 6
- FPT_SKP_EXT.1.1: 1
- FPT_STM_EXT.1: 7
- FPT_STM_EXT.1.1: 1
- FPT_STM_EXT.1.2: 1
- FPT_TST_EXT: 11
- FPT_TST_EXT.1: 2
- FPT_TUD_EXT.1: 6
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTA_SSL.4: 5
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 6
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 6
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 5
- FTP_TRP.1: 3
|
- FCS:
- FCS_CKM.1: 23
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 22
- FCS_CKM.4.1: 1
- FCS_COP: 31
- FCS_COP.1: 5
- FDP:
- FDP_ACC.1: 30
- FDP_ACC.1.1: 1
- FDP_ACF.1: 25
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 5
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 5
- FDP_IFC: 41
- FDP_IFC.1: 11
- FDP_IFF: 45
- FDP_IFF.1: 25
- FDP_ITC.1: 21
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 9
- FDP_RIP: 15
- FDP_RIP.1: 2
- FDP_SDI.1: 1
- FDP_SDI.2: 9
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_SVR: 2
- FDP_SVR.1: 12
- FDP_SVR.1.1: 5
- FDP_SVR.1.2: 3
- FDP_SVR.1.3: 3
- FIA:
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 13
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 11
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 10
- FIA_UAU.7.1: 2
- FIA_UID.1: 17
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MSA.1: 12
- FMT_MSA.1.1: 1
- FMT_MSA.3: 26
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 11
- FMT_MTD.1.1: 1
- FMT_MTD.3: 8
- FMT_MTD.3.1: 1
- FMT_SMF.1: 14
- FMT_SMF.1.1: 1
- FMT_SMR.1: 20
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_PHP.1: 7
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_STM.1: 12
- FPT_STM.1.1: 1
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 10
- FTA_SSL.3.1: 2
- FTA_SSL.4: 10
- FTA_SSL.4.1: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.TRUSTED_ADMINISTRATOR: 1
- O:
- O.AUDIT_LOSS_RESPONSE: 1
- O.CERTIFICATES: 1
- O.DISPLAY_BANNER: 1
- O.INTEGRITY_PROTECTION: 1
- O.PERSISTENT_KEY_PROTECTION: 1
- O.PROTECTED_COMMUNICATIONS: 1
- O.RECOVERY: 1
- O.RESIDUAL_INFORMATION_CLEARING: 1
- O.SYSTEM_MONITORING: 1
- O.TOE_ADMINISTRATION: 1
- O.TRAFFIC_MONITORING: 1
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.AUDIT: 1
- OE.CERT_REPOSITORY: 1
- OE.CERT_REPOSITORY_SEARCH: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.AUDIT: 1
- T.CREDENTIALS: 1
- T.DEVICE_FAILURE: 1
- T.INAPPROPRIATE_ACCESS: 1
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.SERVICES: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNAUTHORIZED_DISCLOSURE: 1
- T.UNAUTHORIZED_USERS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
- A:
- A.ADMIN: 3
- A.CARDS: 4
- A.DEVELOPER: 1
- A.DMS: 3
- A.ENVIRONMEN: 1
- A.ENVIRONMENT: 2
- A.MEDIC: 3
- A.PHYSICAL: 3
- O:
- O.AUTH_STATE: 9
- O.DMS_CONNECT: 1
- O.DMS_CONNECTION: 5
- O.LOG_CARDS: 3
- O.LOG_DATA: 6
- O.MANAGEMENT: 9
- O.PIN: 7
- O.PROTECTION: 8
- O.RESIDUAL: 6
- O.SEALING: 3
- O.SELFTESTS: 6
- O.TIME: 6
- O.TRANSFER: 3
- OE:
- OE.ADMIN: 9
- OE.CARDS: 8
- OE.DEVELOPER: 1
- OE.DMS: 4
- OE.ENVIRONMENT: 6
- OE.MEDIC: 10
- OE.PHYSICAL: 6
- OSP:
- OSP.DMS_CONN: 1
- OSP.DMS_CONNE: 1
- OSP.DMS_CONNECTION: 1
- OSP.EMERGENC: 1
- OSP.EMERGENCY_: 1
- OSP.EMERGENCY_DATA: 1
- OSP.LOG_CARD: 1
- OSP.LOG_CARDS: 1
- OSP.LOG_DATA: 3
- OSP.SEALING: 3
- OSP.SELFTESTS: 3
- OSP.TIME: 3
- OSP.TRANSFER: 3
- T:
- T.ACCESS: 3
- T.ADMIN_PIN: 3
- T.AUTH_STATE: 3
- T.DATA: 3
- T.FIRMWARE: 3
- T.MAN_HW: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 4
- SHA-384: 5
- SHA256: 2
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IPsec:
- SSH:
- TLS:
- DTLS:
- SSL:
- SSL: 131
- SSL 1.0: 1
- SSL 2.0: 7
- SSL 3.0: 7
- TLS:
- TLS: 337
- TLS 1.0: 12
- TLS 1.1: 15
- TLS 1.2: 17
- TLS v1.1: 14
- TLS v1.2: 14
- TLS1.1: 2
- TLSv1.1: 2
- TLSv1.2: 1
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 6
- P-384: 8
- secp256r1: 13
- secp384r1: 13
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_DHE_RSA_WITH_AES_128_CCM: 2
- TLS_DHE_RSA_WITH_AES_128_CCM_8: 2
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 2
- TLS_DHE_RSA_WITH_AES_256_CCM: 2
- TLS_DHE_RSA_WITH_AES_256_CCM_8: 2
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 7
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 5
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 5
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 7
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 5
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 5
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 9
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 6
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 6
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 9
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 6
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 6
- TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA: 2
- TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA: 2
- TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 7
- TLS_RSA_WITH_AES_128_CBC_SHA256: 5
- TLS_RSA_WITH_AES_128_CCM: 2
- TLS_RSA_WITH_AES_128_CCM_8: 2
- TLS_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 7
- TLS_RSA_WITH_AES_256_CBC_SHA256: 5
- TLS_RSA_WITH_AES_256_CCM: 2
- TLS_RSA_WITH_AES_256_CCM_8: 2
- TLS_RSA_WITH_AES_256_GCM_SHA384: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- FIPS:
- FIPS 140-2: 1
- FIPS PUB 186-4: 7
- ISO:
- ISO/IEC 10118-: 1
- ISO/IEC 14888-: 1
- ISO/IEC 14888-3: 1
- ISO/IEC 18031:2011: 3
- ISO/IEC 9796-2: 2
- ISO/IEC 9797-: 4
- NIST:
- NIST SP 800-38C: 1
- NIST SP 800-56A: 1
- NIST SP 800-56B: 1
- PKCS:
- RFC:
- RFC 2246: 3
- RFC 2818: 3
- RFC 2986: 1
- RFC 3268: 8
- RFC 3447: 1
- RFC 4253: 2
- RFC 4346: 7
- RFC 4492: 21
- RFC 5077: 7
- RFC 5246: 27
- RFC 5280: 6
- RFC 5288: 8
- RFC 5289: 45
- RFC 5746: 2
- RFC 5759: 1
- RFC 6125: 1
- RFC 6655: 16
- RFC 6960: 1
- RFC 8422: 12
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- done by an authorised card that is out of scope of this ST: 1
- out of scope: 1
- the TOE • Signature generation for emergency data1 on the eHC (done by an authorised card that is out of scope of this ST) 1.4.6 Physical Protection of the TOE The TOE cannot counter physical attacks concerning: 1
|
pdf_data/st_metadata |
- /CreationDate: D:20241202200857Z
- /ModDate: D:20250116154944+01'00'
- /Producer: macOS Version 13.7.1 (Build 22H221) Quartz PDFContext
- pdf_file_size_bytes: 1730292
- pdf_hyperlinks: https://www.niap-ccevs.org/technical-decisions/TD0537, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0631, https://www.niap-ccevs.org/technical-decisions/TD0831, https://www.niap-ccevs.org/technical-decisions/TD0738, https://www.ietf.org/rfc/rfc8332.txt, https://www.niap-ccevs.org/technical-decisions/TD0591, https://www.ietf.org/rfc/rfc4346.txt, https://www.niap-ccevs.org/technical-decisions/TD0580, http://www.ietf.org/rfc/rfc5656.txt, http://www.ietf.org/rfc/rfc5280.txt, https://www.ietf.org/rfc/rfc5077.txt, https://www.niap-ccevs.org/technical-decisions/TD0556, https://www.niap-ccevs.org/technical-decisions/TD0792, https://www.niap-ccevs.org/technical-decisions/TD0581, https://www.niap-ccevs.org/technical-decisions/TD0631, https://www.niap-ccevs.org/technical-decisions/TD0774, http://www.ietf.org/rfc/rfc6668.txt, https://www.niap-ccevs.org/technical-decisions/TD0528, http://www.ietf.org/rfc/rfc4492.txt, https://www.niap-ccevs.org/technical-decisions/TD0569, https://www.niap-ccevs.org/technical-decisions/TD0636, https://www.niap-ccevs.org/technical-decisions/TD0670, https://www.niap-ccevs.org/technical-decisions/TD0633, https://www.niap-ccevs.org/technical-decisions/TD0536, https://www.niap-ccevs.org/technical-decisions/TD0800, https://www.niap-ccevs.org/technical-decisions/TD0570, https://www.niap-ccevs.org/technical-decisions/TD0571, https://www.niap-ccevs.org/technical-decisions/TD0790, https://www.ietf.org/rfc/rfc2818.txt, https://www.niap-ccevs.org/technical-decisions/TD0639, https://www.niap-ccevs.org/technical-decisions/TD0638, https://www.niap-ccevs.org/technical-decisions/TD0527, http://www.ietf.org/rfc/rfc4251.txt, https://www.niap-ccevs.org/technical-decisions/TD0635, https://www.niap-ccevs.org/technical-decisions/TD0563, https://www.niap-ccevs.org/technical-decisions/TD0592, http://www.ietf.org/rfc/rfc5246.txt, http://www.ietf.org/rfc/rfc4252.txt, https://www.niap-ccevs.org/technical-decisions/TD0632, https://www.niap-ccevs.org/technical-decisions/TD0572, https://www.niap-ccevs.org/technical-decisions/TD0555, https://support.f5.com/csp/article/K67197865, http://www.ietf.org/rfc/rfc4253.txt, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0632, https://www.niap-ccevs.org/technical-decisions/TD0564, https://www.niap-ccevs.org/technical-decisions/TD0547, https://www.niap-ccevs.org/technical-decisions/TD0741, https://www.niap-ccevs.org/technical-decisions/TD0546, http://www.ietf.org/rfc/rfc4254.txt, https://www.niap-ccevs.org/technical-decisions/TD0808
- pdf_is_encrypted: False
- pdf_number_of_pages: 103
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: Protection Profile, Mobile Card Terminal, Electronic Health Card
- /Subject: Mobile Card Terminal, electronic Health Card
- /Title: Common Criteria Protection Profile BSI-PP-0052
- pdf_file_size_bytes: 461165
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 75
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |