name |
TOSHIBA e-STUDIO6526AC/6527AC/7527AC with FAX Unit Ver.SYS V5.1 |
ZEMO VML-GK2 HW V2.0.0 / FW V3.2.0 |
category |
Multi-Function Devices |
Other Devices and Systems |
scheme |
JP |
DE |
status |
active |
active |
not_valid_after |
24.06.2029 |
07.05.2029 |
not_valid_before |
24.06.2024 |
08.05.2024 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0812_eimg.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V3c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0812_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V3a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0812_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V3b_pdf.pdf |
manufacturer |
Toshiba TEC Corporation |
ZEMO GmbH |
manufacturer_web |
https://www.toshibatec.co.jp/en/ |
https://zemo.de |
security_level |
{} |
ADV_FSP.4, ALC_TAT.1, AVA_VAN.5, ADV_IMP.1, EAL3+, ADV_TDS.3 |
dgst |
233cafd485b869c5 |
d648123b397e3e21 |
heuristics/cert_id |
JISEC-CC-CRP-C0812-01-2024 |
BSI-DSZ-CC-0623-V3-2024 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
AGD_PRE.1, ALC_DVS.1, ATE_COV.2, ALC_TAT.1, ATE_FUN.1, AVA_VAN.5, ALC_DEL.1, ATE_IND.2, ADV_FSP.4, ALC_LCD.1, ADV_ARC.1, AGD_OPE.1, ADV_TDS.3, ALC_CMC.3, ATE_DPT.1, ALC_CMS.3, ADV_IMP.1 |
heuristics/extracted_versions |
5.1 |
2.0.0, 3.2.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0746
- certification_date: 01.06.2022
- claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
- enhanced:
- assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0746
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000faf-att/c0746_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Peripheral (MFP) that has the functions, such as copy, print, scan and fax. The TOE is capable of implementing the functionality required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFD. TOE security functionality The TOE provides the following security features: Identification and Authentication Function Access Control Function Data Encryption Trusted Communication Function TSF Data Protection TSF Self Protection Software Update Verification Audit Function Function which separate PSTN Fax and Network
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: TOSHIBA e-STUDIO2515AC/3015AC/3515AC/4515AC/ 5015AC all of the above with FAX Unit and FIPS Hard Disk Kit
- product_type: Multifunction Product
- protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
- toe_version: SYS V2.0
- vendor: TOSHIBA TEC CORPORATION
- expiration_date:
- supplier: TOSHIBA TEC CORPORATION
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0746_it1798.html
- toe_overseas_name: TOSHIBA e-STUDIO2515AC / 3015AC / 3515AC / 4515AC / 5015AC all of the above with FAX Unit and FIPS Hard Disk KitSYS V2.0
|
- category: eHealth
- cert_id: BSI-DSZ-CC-0623-V3-2024
- certification_date: 08.05.2024
- enhanced:
- applicant: ZEMO GmbH Franz-Mader-Straße 9 94036 Passau
- assurance_level: EAL3,AVA_VAN.5,ALC_TAT.1,ADV_TDS.3,ADV_IMP.1,ADV_FSP.4
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte06/0623V3c_pdf.pdf?__blob=publicationFile&v=2
- certification_date: 08.05.2024
- description: The Target of Evaluation (TOE) is the ZEMO VML-GK2, FW-Version 3.1.0, HW-Version 2.0.0 by ZEMO GmbH. The TOE is a smart card terminal used for the German healthcare system as a Mobile Card Terminal (MobCT). It is used by medical suppliers during visits to read out insurance data from a German electronic Health Card (eHC) of a health insured person. The TOE fulfils the IT security requirements to be used with the German electronic Health Card (eHC) and the German Health Professional Card (HPC) based on the regulations of the German healthcare system.
- entries: [frozendict({'id': 'BSI-DSZ-CC-0623-V3-2024 (08.05.2024)', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-0623-V2-2018 (28.06.2018)', 'description': 'Certificate'})]
- evaluation_facility: TÜV Informationstechnik GmbH
- expiration_date: 07.05.2029
- product: ZEMO VML-GK2
- protection_profile: Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System (MobCT), Version 1.4, BSI-CC-PP-0052-2015, 19 January 2015
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte06/0623V3a_pdf.pdf?__blob=publicationFile&v=2
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte06/0623V3b_pdf.pdf?__blob=publicationFile&v=2
- product: ZEMO VML-GK2
- subcategory: Card reader
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Gesundheitswesen_Kartenlesegeraete/0623.html
- vendor: ZEMO GmbH
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
b2cfec7a92fa2940 |
854be21fba7a106c |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0052b_pdf.pdf |
pdf_data/cert_filename |
c0812_eimg.pdf |
0623V3c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0812-01-2024: 1
|
- DE:
- BSI-DSZ-CC-0623-V3-2024: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 3: 1
- EAL 3 augmented: 1
- EAL 4: 1
|
pdf_data/cert_keywords/cc_sar |
|
- ADV:
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- ALC:
- AVA:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Information-technology Promotion Agency, Japan
- /CreationDate: D:20241119110038+09'00'
- /Creator: Word 用 Acrobat PDFMaker 20
- /Keywords:
- /ModDate: D:20241119110439+09'00'
- /Producer: Adobe PDF Library 20.5.172
- /Subject:
- /Title: C0812_Certificate_01
- pdf_file_size_bytes: 355848
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, Mobile Card Terminal for the German Healthcare System (MobCT), BSI-CC-PP-0052-2015"
- /Subject: Common Criteria, Certification, Zertifizierung, Mobile Card Terminal for the German Healthcare System (MobCT), BSI-CC-PP-0052-2015
- /Title: Certification Report BSI-DSZ-CC-0623-V3-2024
- pdf_file_size_bytes: 232618
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0812_erpt.pdf |
0623V3a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.5 valid until: 7 May 2029
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0623-V3-2024
- cert_item: ZEMO VML-GK2 HW V2.0.0 / FW V3.2.0
- cert_lab: BSI
- developer: ZEMO GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System (MobCT), Version 1.4, BSI-CC-PP-0052-2015, 24 September 2014
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0812-01-2024: 1
|
- DE:
- BSI-DSZ-CC-0623-V3-2024: 12
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 3: 4
- EAL 3 augmented: 3
- EAL 4: 4
- EAL3+: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_FSP.4: 4
- ADV_IMP.1: 4
- ADV_TDS.3: 4
- ALC:
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
- OE:
- OE.ENVIRONMENT: 1
- OE.MEDIC: 1
- OE.PHYSICAL: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 4
|
- TUV:
- TÜV Informationstechnik: 3
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
- BSI:
- FIPS:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- RFC:
- X509:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 1170, 2024-03-21; SVN Liste aller entwicklungsrelevanten Dokumente, Version 809, 2024-03-22, (confidential documents) [11] Guidance documentation for the TOE, Version 2.2.0, 2023-11-24, Bedienungsanleitung: 1
- Report, Version 3, 2024-03-25, EVALUATION TECHNICAL REPORT SUMMARY, TÜV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20250120153037+09'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20250120153139+09'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 455310
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 32
|
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, Mobile Card Terminal for the German Healthcare System (MobCT), BSI-CC-PP-0052-2015"
- /Subject: Common Criteria, Certification, Zertifizierung, Mobile Card Terminal for the German Healthcare System (MobCT), BSI-CC-PP-0052-2015
- /Title: Certification Report BSI-DSZ-CC-0623-V3-2024
- pdf_file_size_bytes: 336199
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
pdf_data/st_filename |
c0812_est.pdf |
0623V3b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0032: 1
- BSI-CC-PP-0052: 2
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 3: 4
- EAL 3 augmented: 3
- EAL3+: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 5
- ADV_IMP.1: 5
- ADV_TDS.3: 5
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 5
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 14
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_STG_EXT: 3
- FAU_STG_EXT.1: 7
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM.1: 46
- FCS_CKM.1.1: 2
- FCS_CKM.4: 8
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 4
- FCS_CKM_EXT.4: 30
- FCS_CKM_EXT.4.1: 1
- FCS_COP.1: 153
- FCS_COP.1.1: 7
- FCS_ITC.1: 1
- FCS_KDF_EXT: 4
- FCS_KDF_EXT.1: 17
- FCS_KDF_EXT.1.1: 3
- FCS_KYC_EXT: 4
- FCS_KYC_EXT.1: 19
- FCS_KYC_EXT.1.1: 4
- FCS_PCC_EXT.1: 1
- FCS_RBG_EXT: 2
- FCS_RBG_EXT.1: 47
- FCS_RBG_EXT.1.1: 3
- FCS_RBG_EXT.1.2: 3
- FCS_RGB_EXT.1: 1
- FCS_SMC_EXT: 2
- FCS_SMC_EXT.1: 16
- FCS_SMC_EXT.1.1: 2
- FCS_SNI_EXT.1.1: 1
- FCS_SSH_EXT.1: 6
- FCS_TLS_EXT: 2
- FCS_TLS_EXT.1: 22
- FCS_TLS_EXT.1.1: 2
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 9
- FDP_ACC.1.1: 1
- FDP_ACF.1: 7
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DSK_EXT: 3
- FDP_DSK_EXT.1: 10
- FDP_DSK_EXT.1.1: 2
- FDP_DSK_EXT.1.2: 2
- FDP_FXS_EXT: 2
- FDP_FXS_EXT.1: 8
- FDP_FXS_EXT.1.1: 2
- FDP_IFC.1: 1
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_PMG: 4
- FIA_PMG_EXT: 4
- FIA_PMG_EXT.1: 3
- FIA_PMG_EXT.1.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 5
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 17
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_KYP_EXT: 2
- FPT_KYP_EXT.1: 6
- FPT_KYP_EXT.1.1: 1
- FPT_SKP_EXT: 2
- FPT_SKP_EXT.1: 9
- FPT_SKP_EXT.1.1: 2
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 8
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 11
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 3
- FTA:
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 18
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_ITC_EXT.1: 1
- FTP_TRP.1: 24
- FTP_TRP.1.1: 3
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
- FCS:
- FCS_CKM.1: 23
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 22
- FCS_CKM.4.1: 1
- FCS_COP: 31
- FCS_COP.1: 5
- FDP:
- FDP_ACC.1: 30
- FDP_ACC.1.1: 1
- FDP_ACF.1: 25
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 5
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 5
- FDP_IFC: 41
- FDP_IFC.1: 11
- FDP_IFF: 45
- FDP_IFF.1: 25
- FDP_ITC.1: 21
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 9
- FDP_RIP: 15
- FDP_RIP.1: 2
- FDP_SDI.1: 1
- FDP_SDI.2: 9
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_SVR: 2
- FDP_SVR.1: 12
- FDP_SVR.1.1: 5
- FDP_SVR.1.2: 3
- FDP_SVR.1.3: 3
- FIA:
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 13
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 11
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 10
- FIA_UAU.7.1: 2
- FIA_UID.1: 17
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MSA.1: 12
- FMT_MSA.1.1: 1
- FMT_MSA.3: 26
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 11
- FMT_MTD.1.1: 1
- FMT_MTD.3: 8
- FMT_MTD.3.1: 1
- FMT_SMF.1: 14
- FMT_SMF.1.1: 1
- FMT_SMR.1: 20
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_PHP.1: 7
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_STM.1: 12
- FPT_STM.1.1: 1
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 10
- FTA_SSL.3.1: 2
- FTA_SSL.4: 10
- FTA_SSL.4.1: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- O:
- O.ACCESS: 1
- O.ACCESS_CONTROL: 6
- O.ADMIN_ROLES: 4
- O.AUDIT: 5
- O.COMMS_PROTECTION: 11
- O.FAX_NET_SEPARATION: 1
- O.KEY_MATERIAL: 1
- O.PURGE_DATA: 2
- O.STORAGE_ENCRYPTION: 8
- O.TSF_SELF_TEST: 1
- O.UPDATE_VERIFICATION: 2
- O.USER_AUTHORIZATION: 7
- OE:
- OE.ADMIN_TRAINING: 1
- OE.ADMIN_TRUST: 1
- OE.NETWORK_PROTECTION: 1
- OE.PHYSICAL_PROTECTION: 1
- OE.USER_TRAINING: 1
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
- A:
- A.ADMIN: 3
- A.CARDS: 4
- A.DEVELOPER: 1
- A.DMS: 3
- A.ENVIRONMEN: 1
- A.ENVIRONMENT: 2
- A.MEDIC: 3
- A.PHYSICAL: 3
- O:
- O.AUTH_STATE: 9
- O.DMS_CONNECT: 1
- O.DMS_CONNECTION: 5
- O.LOG_CARDS: 3
- O.LOG_DATA: 6
- O.MANAGEMENT: 9
- O.PIN: 7
- O.PROTECTION: 8
- O.RESIDUAL: 6
- O.SEALING: 3
- O.SELFTESTS: 6
- O.TIME: 6
- O.TRANSFER: 3
- OE:
- OE.ADMIN: 9
- OE.CARDS: 8
- OE.DEVELOPER: 1
- OE.DMS: 4
- OE.ENVIRONMENT: 6
- OE.MEDIC: 10
- OE.PHYSICAL: 6
- OSP:
- OSP.DMS_CONN: 1
- OSP.DMS_CONNE: 1
- OSP.DMS_CONNECTION: 1
- OSP.EMERGENC: 1
- OSP.EMERGENCY_: 1
- OSP.EMERGENCY_DATA: 1
- OSP.LOG_CARD: 1
- OSP.LOG_CARDS: 1
- OSP.LOG_DATA: 3
- OSP.SEALING: 3
- OSP.SELFTESTS: 3
- OSP.TIME: 3
- OSP.TRANSFER: 3
- T:
- T.ACCESS: 3
- T.ADMIN_PIN: 3
- T.AUTH_STATE: 3
- T.DATA: 3
- T.FIRMWARE: 3
- T.MAN_HW: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- CBC-MAC: 1
- HMAC: 22
- HMAC-SHA-256: 5
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 9
- SHA-384: 2
- SHA-512: 10
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IPsec:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 45
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 2
- TLS1.2: 3
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_RSA_WITH_AES_256_CBC_SHA: 3
- TLS_RSA_WITH_AES_256_CBC_SHA256: 3
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 180-3: 2
- FIPS PUB 186-4: 2
- FIPS PUB 197: 1
- FIPS PUB 198-1: 2
- ISO:
- ISO/IEC 10116: 16
- ISO/IEC 10118: 4
- ISO/IEC 18031:2011: 4
- ISO/IEC 18033-3: 7
- NIST:
- NIST SP 800-108: 1
- NIST SP 800-132: 1
- NIST SP 800-38A: 2
- NIST SP 800-56B: 1
- NIST SP 800-90A: 9
- NIST SP 800-90B: 1
- RFC:
- RFC 2246: 1
- RFC 2818: 3
- RFC 4346: 1
- RFC 5246: 3
- RFC2818: 1
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- done by an authorised card that is out of scope of this ST: 1
- out of scope: 1
- the TOE • Signature generation for emergency data1 on the eHC (done by an authorised card that is out of scope of this ST) 1.4.6 Physical Protection of the TOE The TOE cannot counter physical attacks concerning: 1
|
pdf_data/st_metadata |
- /Author: TOSHIBA TEC
- /CreationDate: D:20250115104716+09'00'
- /Creator: Microsoft® Word for Microsoft 365
- /Keywords: HCD-PP
- /ModDate: D:20250115104716+09'00'
- /Producer: iText® Core 8.0.3 (AGPL version) ©2000-2024 Apryse Group NV
- /Subject: セキュリティーターゲット
- /Title: Security Target for e-STUDIO7527AC Series
- pdf_file_size_bytes: 1386301
- pdf_hyperlinks: https://www.rambus.com/intel-ivy-bridge-random-number-generator/
- pdf_is_encrypted: True
- pdf_number_of_pages: 87
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: Protection Profile, Mobile Card Terminal, Electronic Health Card
- /Subject: Mobile Card Terminal, electronic Health Card
- /Title: Common Criteria Protection Profile BSI-PP-0052
- pdf_file_size_bytes: 461165
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 75
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |