Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Blancco Drive Eraser v6.9.1
Certificate Number: 2020/129
ZEMO VML-GK2 HW V2.0.0 / FW V3.2.0
BSI-DSZ-CC-0623-V3-2024
name Blancco Drive Eraser v6.9.1 ZEMO VML-GK2 HW V2.0.0 / FW V3.2.0
category Data Protection Other Devices and Systems
scheme AU DE
not_valid_after 05.06.2025 07.05.2029
not_valid_before 05.06.2020 08.05.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cert_2020_129_Blancco_os.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V3c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ACSC%20Certifcation%20Report%20EFT-T008%20Blancco%20Drive%20Eraser%20EAL2.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V3a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Blancco%20Drive%20Eraser%20v6.9.1%20ST%20v6.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V3b_pdf.pdf
manufacturer Blancco Technology Group ZEMO GmbH
manufacturer_web https://www.blancco.com/ https://zemo.de
security_level EAL2 ADV_FSP.4, ALC_TAT.1, AVA_VAN.5, ADV_IMP.1, EAL3+, ADV_TDS.3
dgst 271e85740279717d d648123b397e3e21
heuristics/cert_id Certificate Number: 2020/129 BSI-DSZ-CC-0623-V3-2024
heuristics/cert_lab [] BSI
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 AGD_PRE.1, ALC_DVS.1, ATE_COV.2, ALC_TAT.1, ATE_FUN.1, AVA_VAN.5, ALC_DEL.1, ATE_IND.2, ADV_FSP.4, ALC_LCD.1, ADV_ARC.1, AGD_OPE.1, ADV_TDS.3, ALC_CMC.3, ATE_DPT.1, ALC_CMS.3, ADV_IMP.1
heuristics/extracted_versions 6.9.1 2.0.0, 3.2.0
heuristics/scheme_data
heuristics/protection_profiles {} 854be21fba7a106c
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0052b_pdf.pdf
pdf_data/cert_filename Cert_2020_129_Blancco_os.pdf 0623V3c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0623-V3-2024: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0052-2015: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
  • EAL:
    • EAL 2: 1
    • EAL 3: 1
    • EAL 3 augmented: 1
    • EAL 4: 1
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • ALC:
    • ALC_FLR: 1
    • ALC_TAT.1: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20200611165407+10'00'
  • /Creator: ACA75945.dpe.protected.mil.au
  • /ModDate: D:20200611165407+10'00'
  • /Producer: KONICA MINOLTA bizhub C308
  • /Title: SACA75945.d20061116540
  • pdf_file_size_bytes: 799609
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Federal Office for Information Security
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Mobile Card Terminal for the German Healthcare System (MobCT), BSI-CC-PP-0052-2015"
  • /Subject: Common Criteria, Certification, Zertifizierung, Mobile Card Terminal for the German Healthcare System (MobCT), BSI-CC-PP-0052-2015
  • /Title: Certification Report BSI-DSZ-CC-0623-V3-2024
  • pdf_file_size_bytes: 232618
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename ACSC Certifcation Report EFT-T008 Blancco Drive Eraser EAL2.pdf 0623V3a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.5 valid until: 7 May 2029
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0623-V3-2024
    • cert_item: ZEMO VML-GK2 HW V2.0.0 / FW V3.2.0
    • cert_lab: BSI
    • developer: ZEMO GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System (MobCT), Version 1.4, BSI-CC-PP-0052-2015, 24 September 2014
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0623-V3-2024: 12
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0052-2015: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL1: 1
    • EAL2: 5
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 3: 4
    • EAL 3 augmented: 3
    • EAL 4: 4
    • EAL3+: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.4: 4
    • ADV_IMP.1: 4
    • ADV_TDS.3: 4
  • ALC:
    • ALC_FLR: 3
    • ALC_TAT.1: 4
  • ATE:
    • ATE_FUN: 1
    • ATE_IND: 3
  • AVA:
    • AVA_VAN: 3
    • AVA_VAN.5: 5
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_COP: 2
pdf_data/report_keywords/cc_claims
  • OE:
    • OE.ENVIRONMENT: 1
    • OE.MEDIC: 1
    • OE.PHYSICAL: 1
pdf_data/report_keywords/eval_facility
  • Teron:
    • Teron Labs: 4
  • TUV:
    • TÜV Informationstechnik: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
      • AES-256: 1
    • HPC:
      • HPC: 4
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA-3072: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 3
  • SHA:
    • SHA2:
      • SHA-512: 1
pdf_data/report_keywords/cipher_mode
  • GCM:
    • GCM: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 32: 1
    • AIS 38: 1
  • FIPS:
    • FIPS180-4: 1
    • FIPS197: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • RFC:
    • RFC6234: 1
  • X509:
    • X.509: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 1170, 2024-03-21; SVN Liste aller entwicklungsrelevanten Dokumente, Version 809, 2024-03-22, (confidential documents) [11] Guidance documentation for the TOE, Version 2.2.0, 2023-11-24, Bedienungsanleitung: 1
    • Report, Version 3, 2024-03-25, EVALUATION TECHNICAL REPORT SUMMARY, TÜV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
pdf_data/report_metadata
pdf_data/st_filename Blancco Drive Eraser v6.9.1 ST v6.0.pdf 0623V3b_pdf.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0032: 1
    • BSI-CC-PP-0052: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 6
  • EAL:
    • EAL 3: 4
    • EAL 3 augmented: 3
    • EAL3+: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 5
    • ADV_IMP.1: 5
    • ADV_TDS.3: 5
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 5
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 1
    • FCS_COP: 2
    • FCS_COP.1: 7
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 7
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 5
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_UID.2: 5
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 5
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 5
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_RCV.1: 5
    • FPT_RCV.1.1: 1
    • FPT_TEE: 9
    • FPT_TEE.1: 5
    • FPT_TEE.1.1: 1
    • FPT_TEE.1.2: 1
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 6
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 1
  • FCS:
    • FCS_CKM.1: 23
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 22
    • FCS_CKM.4.1: 1
    • FCS_COP: 31
    • FCS_COP.1: 5
  • FDP:
    • FDP_ACC.1: 30
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 25
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 5
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 5
    • FDP_IFC: 41
    • FDP_IFC.1: 11
    • FDP_IFF: 45
    • FDP_IFF.1: 25
    • FDP_ITC.1: 21
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 9
    • FDP_RIP: 15
    • FDP_RIP.1: 2
    • FDP_SDI.1: 1
    • FDP_SDI.2: 9
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_SVR: 2
    • FDP_SVR.1: 12
    • FDP_SVR.1.1: 5
    • FDP_SVR.1.2: 3
    • FDP_SVR.1.3: 3
  • FIA:
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 13
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5: 11
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.7: 10
    • FIA_UAU.7.1: 2
    • FIA_UID.1: 17
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 26
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 11
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 8
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 14
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 20
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_PHP.1: 7
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_STM.1: 12
    • FPT_STM.1.1: 1
    • FPT_TST.1: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 2
    • FTA_SSL.4: 10
    • FTA_SSL.4.1: 1
  • FTP:
    • FTP_ITC.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.AUTHENTIC_BMC: 2
    • A.AUTHENTIC_DECT: 3
    • A.PLATFORM: 3
    • A.PROPER_USE: 2
  • O:
    • O.COMPLETE_ERASURE: 5
    • O.LEGIT_USE: 6
    • O.PROTECTED_COMMS: 6
  • OE:
    • OE.PLATFORM: 4
    • OE.PROPER_ADMIN: 1
    • OE.PROPER_SETUP: 3
    • OE.PROPER_USE: 3
  • OSP:
    • OSP.LOCAL_CLEAN: 3
    • OSP.PDF: 2
    • OSP.RAID: 3
    • OSP.REMOTE_LOCAL: 5
    • OSP.SANITISATION: 3
  • T:
    • T.INCOMPLETE_ERASURE: 3
    • T.NETWORK_ATTACK: 3
  • A:
    • A.ADMIN: 3
    • A.CARDS: 4
    • A.DEVELOPER: 1
    • A.DMS: 3
    • A.ENVIRONMEN: 1
    • A.ENVIRONMENT: 2
    • A.MEDIC: 3
    • A.PHYSICAL: 3
  • O:
    • O.AUTH_STATE: 9
    • O.DMS_CONNECT: 1
    • O.DMS_CONNECTION: 5
    • O.LOG_CARDS: 3
    • O.LOG_DATA: 6
    • O.MANAGEMENT: 9
    • O.PIN: 7
    • O.PROTECTION: 8
    • O.RESIDUAL: 6
    • O.SEALING: 3
    • O.SELFTESTS: 6
    • O.TIME: 6
    • O.TRANSFER: 3
  • OE:
    • OE.ADMIN: 9
    • OE.CARDS: 8
    • OE.DEVELOPER: 1
    • OE.DMS: 4
    • OE.ENVIRONMENT: 6
    • OE.MEDIC: 10
    • OE.PHYSICAL: 6
  • OSP:
    • OSP.DMS_CONN: 1
    • OSP.DMS_CONNE: 1
    • OSP.DMS_CONNECTION: 1
    • OSP.EMERGENC: 1
    • OSP.EMERGENCY_: 1
    • OSP.EMERGENCY_DATA: 1
    • OSP.LOG_CARD: 1
    • OSP.LOG_CARDS: 1
    • OSP.LOG_DATA: 3
    • OSP.SEALING: 3
    • OSP.SELFTESTS: 3
    • OSP.TIME: 3
    • OSP.TRANSFER: 3
  • T:
    • T.ACCESS: 3
    • T.ADMIN_PIN: 3
    • T.AUTH_STATE: 3
    • T.DATA: 3
    • T.FIRMWARE: 3
    • T.MAN_HW: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 16
  • AES_competition:
    • AES:
      • AES: 5
      • AES-256: 1
    • HPC:
      • HPC: 14
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA 2048: 1
    • RSA 4096: 1
    • RSA-PSS: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 6
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 1
pdf_data/st_keywords/cipher_mode
  • GCM:
    • GCM: 4
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 6
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS PUB 180-4: 2
    • FIPS PUB 197: 5
  • PKCS:
    • PKCS #1: 1
  • FIPS:
    • FIPS 197: 1
  • X509:
    • X.509: 9
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • done by an authorised card that is out of scope of this ST: 1
    • out of scope: 1
    • the TOE • Signature generation for emergency data1 on the eHC (done by an authorised card that is out of scope of this ST) 1.4.6 Physical Protection of the TOE The TOE cannot counter physical attacks concerning: 1
pdf_data/st_metadata
  • /AAPL:Keywords: []
  • /Author: jussipekka leiwo
  • /CreationDate: D:20200524035334Z00'00'
  • /Creator: Word
  • /Keywords:
  • /ModDate: D:20200524035334Z00'00'
  • /Producer: macOS Version 10.14.6 (Build 18G3020) Quartz PDFContext
  • /Subject:
  • /Title: Blancco Drive Eraser v6.9.1 ST v6.0 fixed
  • pdf_file_size_bytes: 428538
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 35
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Keywords: Protection Profile, Mobile Card Terminal, Electronic Health Card
  • /Subject: Mobile Card Terminal, electronic Health Card
  • /Title: Common Criteria Protection Profile BSI-PP-0052
  • pdf_file_size_bytes: 461165
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 75
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different