name |
bizhub PRO C6500 Gazou Seigyo Program Overseas: bizhub PRO C6500 Image Control Program A03U0Y0-00I1-G00-15 |
ZEMO VML-GK2 HW V2.0.0 / FW V3.2.0 |
category |
Other Devices and Systems |
Other Devices and Systems |
scheme |
JP |
DE |
status |
archived |
active |
not_valid_after |
07.10.2013 |
07.05.2029 |
not_valid_before |
22.03.2007 |
08.05.2024 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V3c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0087_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V3a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0087_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V3b_pdf.pdf |
manufacturer |
Konica Minolta Business Technologies, Inc |
ZEMO GmbH |
manufacturer_web |
https://www.konicaminolta.com/ |
https://zemo.de |
security_level |
EAL3 |
ADV_FSP.4, ALC_TAT.1, AVA_VAN.5, ADV_IMP.1, EAL3+, ADV_TDS.3 |
dgst |
237f0a3d5ded3e29 |
d648123b397e3e21 |
heuristics/cert_id |
JISEC-CC-CRP-C0087 |
BSI-DSZ-CC-0623-V3-2024 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
AGD_PRE.1, ALC_DVS.1, ATE_COV.2, ALC_TAT.1, ATE_FUN.1, AVA_VAN.5, ALC_DEL.1, ATE_IND.2, ADV_FSP.4, ALC_LCD.1, ADV_ARC.1, AGD_OPE.1, ADV_TDS.3, ALC_CMC.3, ATE_DPT.1, ALC_CMS.3, ADV_IMP.1 |
heuristics/extracted_versions |
15 |
2.0.0, 3.2.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0087
- certification_date: 01.03.2007
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.3
- cert_link: https://www.ipa.go.jp/en/security/c0087_eimg.pdf
- description: PRODUCT DESCRIPTION This product (bizhub PRO C6500 Image Control Program *1, that is installed with digital MFP (bizhub PRO C6500 Series) manufactured by Konica Minolta Business Technologies, Inc., is a software product for the purpose of reducing the risk for disclosure of document data in bizhub PRO C6500 Series. bizhub PRO C6500 Image Control Program prevents document data in bizhub PRO C6500 Series from disclosing during the use of functions such as copier and printer. It offers the protection function *2 with password lock system against the risk of reading data out illegally from HDD (Hard Disk Drive) which is a medium for storing temporarily document data. *1: with shows "bizhub PRO C6500 Gazou Seigyo Program" for Japan and "bizhub PRO C6500 Image Control Program" for overseas. *2: HDD has the password so that it cannot be removed and read in another equipment. HDD lock password is set in the HDD lock function.
- evaluation_facility: Mizuho Information & Research Institute, Inc.Center for Evaluation of Information Security
- product: Japan : bizhub PRO C6500 Gazou Seigyo Program Overseas: bizhub PRO C6500 Image Control Program
- product_type: IT Product (data protection function in digital MFD)
- report_link: https://www.ipa.go.jp/en/security/c0087_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0087_est.pdf
- toe_version: A03U0Y0-00I1-G00-15
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.10.2013
- revalidations: [frozendict({'date': '2009-08', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0087_it6100_03.html'})]
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub PRO C6500 Gazou Seigyo Program A03U0Y0-00I1-G00-15
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0087_it6100.html
- toe_overseas_name: bizhub PRO C6500/bizhub PRO C6500P/ineo+6500/ bizhub PRO C6501/bizhub PRO C6501P/bizhub PRO C65hc/ineo+6501 Image Control Program A03U0Y0-00I1-G00-60
|
- category: eHealth
- cert_id: BSI-DSZ-CC-0623-V3-2024
- certification_date: 08.05.2024
- enhanced:
- applicant: ZEMO GmbH Franz-Mader-Straße 9 94036 Passau
- assurance_level: EAL3,AVA_VAN.5,ALC_TAT.1,ADV_TDS.3,ADV_IMP.1,ADV_FSP.4
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte06/0623V3c_pdf.pdf?__blob=publicationFile&v=2
- certification_date: 08.05.2024
- description: The Target of Evaluation (TOE) is the ZEMO VML-GK2, FW-Version 3.1.0, HW-Version 2.0.0 by ZEMO GmbH. The TOE is a smart card terminal used for the German healthcare system as a Mobile Card Terminal (MobCT). It is used by medical suppliers during visits to read out insurance data from a German electronic Health Card (eHC) of a health insured person. The TOE fulfils the IT security requirements to be used with the German electronic Health Card (eHC) and the German Health Professional Card (HPC) based on the regulations of the German healthcare system.
- entries: [frozendict({'id': 'BSI-DSZ-CC-0623-V3-2024 (08.05.2024)', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-0623-V2-2018 (28.06.2018)', 'description': 'Certificate'})]
- evaluation_facility: TÜV Informationstechnik GmbH
- expiration_date: 07.05.2029
- product: ZEMO VML-GK2
- protection_profile: Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System (MobCT), Version 1.4, BSI-CC-PP-0052-2015, 19 January 2015
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte06/0623V3a_pdf.pdf?__blob=publicationFile&v=2
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte06/0623V3b_pdf.pdf?__blob=publicationFile&v=2
- product: ZEMO VML-GK2
- subcategory: Card reader
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Gesundheitswesen_Kartenlesegeraete/0623.html
- vendor: ZEMO GmbH
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
854be21fba7a106c |
maintenance_updates |
- maintenance_date: 05.08.2009
- maintenance_report_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0087kz_eacr3.pdf
- maintenance_st_link: None
- maintenance_title: bizhub PRO C6500/bizhub PRO C6500P/ineo+6500/bizhub PRO C6501/bizhub PRO C6501P/bizhub PRO C65hc/ineo+6501 Gazou Seigyo Program Overseas: bbizhub PRO C6500/bizhub PRO C6500P/ineo+6500/bizhub PRO C6501/bizhub PRO C6501P/bizhub PRO C65hc/ineo+6501 Image Control Program A03U0Y0-00I1-G00-60
- maintenance_date: 19.11.2008
- maintenance_report_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0087kz_eacr2.pdf
- maintenance_st_link: None
- maintenance_title: bizhub PRO C6500/bizhub PRO C6500P/ineo+6500/ bizhub PRO C6501/bizhub PRO C6501P/ineo+6501 Gazou Seigyo Program Overseas: bizhub PRO C6500/bizhub PRO C6500P/ineo+6500/ bizhub PRO C6501/bizhub PRO C6501P/ineo+6501 Image Control Program A03U0Y0-00I1-G00-41
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0052b_pdf.pdf |
pdf_data/cert_filename |
|
0623V3c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0623-V3-2024: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 3: 1
- EAL 3 augmented: 1
- EAL 4: 1
|
pdf_data/cert_keywords/cc_sar |
|
- ADV:
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- ALC:
- AVA:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, Mobile Card Terminal for the German Healthcare System (MobCT), BSI-CC-PP-0052-2015"
- /Subject: Common Criteria, Certification, Zertifizierung, Mobile Card Terminal for the German Healthcare System (MobCT), BSI-CC-PP-0052-2015
- /Title: Certification Report BSI-DSZ-CC-0623-V3-2024
- pdf_file_size_bytes: 232618
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0087_ecvr.pdf |
0623V3a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.5 valid until: 7 May 2029
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0623-V3-2024
- cert_item: ZEMO VML-GK2 HW V2.0.0 / FW V3.2.0
- cert_lab: BSI
- developer: ZEMO GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System (MobCT), Version 1.4, BSI-CC-PP-0052-2015, 24 September 2014
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0087: 1
|
- DE:
- BSI-DSZ-CC-0623-V3-2024: 12
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 3: 4
- EAL 3 augmented: 3
- EAL 4: 4
- EAL3+: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_FSP.4: 4
- ADV_IMP.1: 4
- ADV_TDS.3: 4
- ALC:
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- OE:
- OE.ENVIRONMENT: 1
- OE.MEDIC: 1
- OE.PHYSICAL: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- FIPS:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- RFC:
- X509:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 1170, 2024-03-21; SVN Liste aller entwicklungsrelevanten Dokumente, Version 809, 2024-03-22, (confidential documents) [11] Guidance documentation for the TOE, Version 2.2.0, 2023-11-24, Bedienungsanleitung: 1
- Report, Version 3, 2024-03-25, EVALUATION TECHNICAL REPORT SUMMARY, TÜV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20070323205319+09'00'
- /ModDate: D:20070328204205+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 13865
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, Mobile Card Terminal for the German Healthcare System (MobCT), BSI-CC-PP-0052-2015"
- /Subject: Common Criteria, Certification, Zertifizierung, Mobile Card Terminal for the German Healthcare System (MobCT), BSI-CC-PP-0052-2015
- /Title: Certification Report BSI-DSZ-CC-0623-V3-2024
- pdf_file_size_bytes: 336199
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
pdf_data/st_filename |
c0087_est.pdf |
0623V3b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0032: 1
- BSI-CC-PP-0052: 2
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 3: 4
- EAL 3 augmented: 3
- EAL3+: 2
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 2
- ACM_SCP.1: 2
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.2: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU.1: 2
- AVA_SOF.1: 2
- AVA_VLA.1: 2
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 5
- ADV_IMP.1: 5
- ADV_TDS.3: 5
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 5
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_ACC.1: 10
- FDP_ACC.1.1: 1
- FDP_ACF.1: 11
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FIA:
- FIA_AFL.1: 11
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_SOS.1: 23
- FIA_SOS.1.1: 2
- FIA_UAU.1: 7
- FIA_UAU.2: 19
- FIA_UAU.7: 13
- FIA_UAU.7.1: 1
- FIA_UID.1: 7
- FIA_UID.2: 14
- FMT:
- FMT_MOF.1: 26
- FMT_MOF.1.1: 1
- FMT_MSA.3: 3
- FMT_MTD.1: 27
- FMT_MTD.1.1: 3
- FMT_SMF: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 27
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_RVM.1: 21
- FPT_RVM.1.1: 1
- FPT_SEP.1: 10
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
|
- FCS:
- FCS_CKM.1: 23
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 22
- FCS_CKM.4.1: 1
- FCS_COP: 31
- FCS_COP.1: 5
- FDP:
- FDP_ACC.1: 30
- FDP_ACC.1.1: 1
- FDP_ACF.1: 25
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 5
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 5
- FDP_IFC: 41
- FDP_IFC.1: 11
- FDP_IFF: 45
- FDP_IFF.1: 25
- FDP_ITC.1: 21
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 9
- FDP_RIP: 15
- FDP_RIP.1: 2
- FDP_SDI.1: 1
- FDP_SDI.2: 9
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_SVR: 2
- FDP_SVR.1: 12
- FDP_SVR.1.1: 5
- FDP_SVR.1.2: 3
- FDP_SVR.1.3: 3
- FIA:
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 13
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 11
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 10
- FIA_UAU.7.1: 2
- FIA_UID.1: 17
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MSA.1: 12
- FMT_MSA.1.1: 1
- FMT_MSA.3: 26
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 11
- FMT_MTD.1.1: 1
- FMT_MTD.3: 8
- FMT_MTD.3.1: 1
- FMT_SMF.1: 14
- FMT_SMF.1.1: 1
- FMT_SMR.1: 20
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_PHP.1: 7
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_STM.1: 12
- FPT_STM.1.1: 1
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 10
- FTA_SSL.3.1: 2
- FTA_SSL.4: 10
- FTA_SSL.4.1: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
- O:
- OE:
- OE.ADMIN: 4
- OE.CE: 4
- OE.HDD: 6
- OE.NET: 4
- OE.SECMOD: 4
- OE.SECRET: 3
- T:
|
- A:
- A.ADMIN: 3
- A.CARDS: 4
- A.DEVELOPER: 1
- A.DMS: 3
- A.ENVIRONMEN: 1
- A.ENVIRONMENT: 2
- A.MEDIC: 3
- A.PHYSICAL: 3
- O:
- O.AUTH_STATE: 9
- O.DMS_CONNECT: 1
- O.DMS_CONNECTION: 5
- O.LOG_CARDS: 3
- O.LOG_DATA: 6
- O.MANAGEMENT: 9
- O.PIN: 7
- O.PROTECTION: 8
- O.RESIDUAL: 6
- O.SEALING: 3
- O.SELFTESTS: 6
- O.TIME: 6
- O.TRANSFER: 3
- OE:
- OE.ADMIN: 9
- OE.CARDS: 8
- OE.DEVELOPER: 1
- OE.DMS: 4
- OE.ENVIRONMENT: 6
- OE.MEDIC: 10
- OE.PHYSICAL: 6
- OSP:
- OSP.DMS_CONN: 1
- OSP.DMS_CONNE: 1
- OSP.DMS_CONNECTION: 1
- OSP.EMERGENC: 1
- OSP.EMERGENCY_: 1
- OSP.EMERGENCY_DATA: 1
- OSP.LOG_CARD: 1
- OSP.LOG_CARDS: 1
- OSP.LOG_DATA: 3
- OSP.SEALING: 3
- OSP.SELFTESTS: 3
- OSP.TIME: 3
- OSP.TRANSFER: 3
- T:
- T.ACCESS: 3
- T.ADMIN_PIN: 3
- T.AUTH_STATE: 3
- T.DATA: 3
- T.FIRMWARE: 3
- T.MAN_HW: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2005-003-003: 1
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 1
- ISO:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- done by an authorised card that is out of scope of this ST: 1
- out of scope: 1
- the TOE • Signature generation for emergency data1 on the eHC (done by an authorised card that is out of scope of this ST) 1.4.6 Physical Protection of the TOE The TOE cannot counter physical attacks concerning: 1
|
pdf_data/st_metadata |
- /CreationDate: D:20070531113225+09'00'
- /ModDate: D:20070531113225+09'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- pdf_file_size_bytes: 616321
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 60
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: Protection Profile, Mobile Card Terminal, Electronic Health Card
- /Subject: Mobile Card Terminal, electronic Health Card
- /Title: Common Criteria Protection Profile BSI-PP-0052
- pdf_file_size_bytes: 461165
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 75
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |