name |
Tarantella Enterprise 3 Version 3.40.911 with Tarantella Security Pack, Version 3.41.211 |
CHERRY eGK Tastatur G87-1505 FW-Version 3.3.3 HW-Version 1.1.1 |
category |
Access Control Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
UK |
DE |
status |
archived |
active |
not_valid_after |
05.03.2013 |
08.10.2028 |
not_valid_before |
13.05.2005 |
09.10.2023 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0513V3c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP214.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0513V3a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Tarantella_V2.4.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0513V3b_pdf.pdf |
manufacturer |
Tarantella LTD |
Cherry GmbH |
manufacturer_web |
https://www.tarantella.com |
https://www.cherrycorp.com/ |
security_level |
EAL2 |
ADV_FSP.4, AVA_VAN.4, ALC_TAT.1, ADV_IMP.1, EAL3+, ADV_TDS.3 |
dgst |
3db22e4de890393a |
21fe19a80fe913d5 |
heuristics/cert_id |
CRP214 |
BSI-DSZ-CC-0513-V3-2023 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1 |
ASE_INT.1, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, AVA_VAN.4, ASE_CCL.1 |
heuristics/extracted_versions |
3.40.911, 3.41.211 |
1.1.1, 3.3.3 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0513-V2-2018 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0513-V2-2018 |
heuristics/scheme_data |
|
- category: eHealth
- cert_id: BSI-DSZ-CC-0513-V3-2023
- certification_date: 09.10.2023
- enhanced:
- applicant: Cherry Digital Health GmbH Cherrystraße 2 91275 Auerbach/Opf Deutschland
- assurance_level: EAL3+,ADV_FSP.4,ADV_IMP.1,ADV_TDS.3,ALC_TAT.1,AVA_VAN.4
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte05/0513V3c_pdf.html?nn=456648
- certification_date: 09.10.2023
- description: The TOE is the smart card keyboard "G87-1505" version 3.0.1:1.1.1 with integrated smart card readers. It fulfils the IT security requirements to be used with the German electronic Health Card (eHC) and the German Health Professional Card (HPC) based on the regulations of the German healthcare system.
- entries: [frozendict({'id': 'BSI-DSZ-CC-0513-V3-2023 (09.10.2023)', 'description': 'Certificate'}), frozendict({'id': 'BSI', 'description': 'The certified product itself did not change. Only the secure delivery-chain has been updated.'}), frozendict({'id': 'BSI', 'description': 'The certified product itself did not change. Only the secure delivery-chain has been updated.'}), frozendict({'id': 'BSI', 'description': 'Certificate'})]
- evaluation_facility: TÜV Informationstechnik GmbH
- expiration_date: 08.10.2028
- product: CHERRY eHealth Terminal G87-1505 FW-Version 3.3.3 HW-Version 1.1.1
- protection_profile: Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01, 22. Mai 2017
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte05/0513V3a_pdf.pdf?__blob=publicationFile&v=2
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte05/0513V3b_pdf.pdf?__blob=publicationFile&v=2
- product: CHERRY eHealth Terminal G87-1505 FW-Version 3.3.3 HW-Version 1.1.1
- subcategory: Card reader
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Gesundheitswesen_Kartenlesegeraete/0513.html
- vendor: Cherry Digital Health GmbH
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
e1444c335eeed890 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0032V2b_pdf.pdf |
pdf_data/cert_filename |
|
0513V3c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0513-V3-2023: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 3: 1
- EAL 3 augmented: 1
- EAL 4: 1
|
pdf_data/cert_keywords/cc_sar |
|
- ADV:
- ADV_FSP.4: 1
- ADV_TDS.3: 1
- ALC:
- AVA:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, Cherry Digital Health GmbH, eHealth, Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01, 22 May 2017"
- /Subject: Common Criteria, Certification, Zertifizierung, Cherry Digital Health GmbH, eHealth, Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01, 22 May 2017
- /Title: Certificate BSI-DSZ-CC-0513-V3-2023
- pdf_file_size_bytes: 235695
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
CRP214.pdf |
0513V3a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADR_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.4 valid until: 08 October 2028
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 conformant
- cert_id: BSI-DSZ-CC-0513-V3-2023
- cert_item: CHERRY eGK Tastatur G87-1505 FW-Version 3.3.3 HW-Version 1.1.1
- cert_lab: BSI
- developer: Cherry Digital Health GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC- PP-0032-V2-2015-MA-01, 22 May 2017
|
pdf_data/report_keywords/cc_cert_id |
- UK:
- CERTIFICATION REPORT No. P214: 1
|
- DE:
- BSI-DSZ-CC-0513-V2-: 1
- BSI-DSZ-CC-0513-V2-2018: 1
- BSI-DSZ-CC-0513-V3-2023: 13
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0032-V2-2015-MA-01: 3
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 3: 4
- EAL 3 augmented: 3
- EAL 4: 4
- EAL 5: 2
- EAL3+: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_FSP.4: 4
- ADV_TDS.3: 4
- ALC:
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FDP:
- FDP_ACC.2: 1
- FDP_ACF.1: 1
- FMT:
- FTP:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Cisco:
- Microsoft:
- Microsoft: 1
- Microsoft Corporation: 1
|
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 4
- SHA256: 1
- SHA384: 1
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
- TLS:
- TLS:
- TLS: 3
- TLS v1.2: 1
- TLSv1.2: 2
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
- G87:
- G87-1505: 10
- G87-1505LBZDE-: 1
- G87-1505LBZDE-10: 1
- G87-1505LBZDE-10_2017-12-19: 1
- G87-1505LBZDE-2: 1
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-2004-01-001: 1
- CCIMB-2004-01-002: 1
- CCIMB-2004-01-003: 1
- FIPS:
|
- BSI:
- FIPS:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- PKCS:
- RFC:
- RFC 4492: 1
- RFC 5639: 1
- RFC1321: 1
- RFC2104: 2
- RFC2404: 1
- RFC2526: 1
- RFC3602: 1
- RFC5246: 2
- X509:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- Solaris 8. Users should note that these Application Servers and the communications with them are out of scope of the evaluation. 6. Users login to the Tarantella Server via a web browser and are then presented: 1
- The evaluated configuration is as illustrated in the diagram above although the firewall shown is out of scope. The product can be used in more complex network environments. These network configurations, which: 1
- out of scope: 2
|
- ConfidentialDocument:
- 7] Evaluation Technical Report (ETR Summary), Version 2, 2023-08-21, TÜV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- xlsx and G87-1505LBZDE-10_2017-12-19.xlsx, 2017-12-19, Bibliography G-87-1505 V4.0, 2023-07-23 (confidential document) [10] Handbuch für Administratoren eGK Tastatur G87-1505, Version 6440650-04, Feb 2018, Cherry GmbH: 1
|
pdf_data/report_metadata |
- /Author: racook
- /CreationDate: D:20050526142837Z
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20131204151607Z
- /Producer: Acrobat Distiller 5.0 (Windows)
- /Title: Microsoft Word - LFL_T206_Tarantella_CertRep_10.doc
- pdf_file_size_bytes: 667201
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 28
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, Cherry Digital Health GmbH, eHealth, Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01, 22 May 2017"
- /Subject: Common Criteria, Certification, Zertifizierung, Cherry Digital Health GmbH, eHealth, Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01, 22 May 2017
- /Title: Certification Report BSI-DSZ-CC-0513-V3-2023
- pdf_file_size_bytes: 435399
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
pdf_data/st_filename |
Tarantella_V2.4.pdf |
0513V3b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0032-: 1
- BSI-CC-PP-0046: 1
- BSI-CC_PP_0032-V3-2016: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 3: 3
- EAL 3 augmented: 3
- EAL3+: 2
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ADO:
- ADO_DEL.1: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP.1: 1
- ADV_HLD.1: 1
- ADV_RCR.1: 1
- AGD:
- AGD_ADM.1: 1
- AGD_USR.1: 1
- ALC:
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_SOF.1: 1
- AVA_VLA.1: 2
|
- ADV:
- ADV_FSP.4: 4
- ADV_IMP.1: 5
- ADV_TDS.3: 4
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 4
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT.1: 3
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 6
- FAU_GEN.1.1: 3
- FAU_GEN.1.2: 2
- FAU_GEN.2: 4
- FAU_GEN.2.1: 2
- FAU_SAR.1: 2
- FAU_SAR.1.1: 2
- FAU_SAR.1.2: 2
- FAU_SAR.2: 4
- FAU_SAR.2.1: 2
- FAU_SAR.3: 3
- FAU_SAR.3.1: 2
- FAU_STG.1: 4
- FAU_STG.1.1: 2
- FAU_STG.1.2: 2
- FCS:
- FCS_COP.1: 3
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 2
- FDP_ACC.2: 6
- FDP_ACC.2.1: 2
- FDP_ACC.2.2: 2
- FDP_ACF.1: 2
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_ITC.1: 3
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_RIP.2: 2
- FDP_RIP.2.1: 4
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_UAU.2: 5
- FIA_UAU.2.1: 2
- FIA_UAU.5: 7
- FIA_UAU.5.1: 2
- FIA_UAU.5.2: 2
- FIA_UAU.7: 3
- FIA_UAU.7.1: 2
- FIA_UID.1: 2
- FIA_UID.2: 7
- FIA_UID.2.1: 2
- FMT:
- FMT_MSA.1: 3
- FMT_MSA.1.1: 2
- FMT_MSA.3: 1
- FMT_MTD.1: 3
- FMT_MTD.1.1: 2
- FMT_SMF.1: 1
- FMT_SMF.1.1: 2
- FMT_SMR.1: 6
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_ITC: 3
- FPT_ITC.2: 1
- FPT_ITT.1: 3
- FPT_ITT.1.1: 2
- FPT_ITT.3: 2
- FPT_ITT.3.1: 2
- FPT_ITT.3.2: 2
- FPT_STM.1: 4
- FPT_STM.1.1: 1
- FTP:
|
- FCS:
- FCS_CKM: 16
- FCS_CKM.1: 23
- FCS_CKM.2: 4
- FCS_CKM.4: 32
- FCS_CKM.4.1: 1
- FCS_COP: 52
- FCS_COP.1: 10
- FDP:
- FDP_ACC: 15
- FDP_ACC.1: 23
- FDP_ACF: 17
- FDP_ACF.1: 16
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC: 22
- FDP_IFC.1: 12
- FDP_IFF: 23
- FDP_IFF.1: 14
- FDP_ITC.1: 15
- FDP_ITC.2: 12
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 2
- FIA_ATD.1: 7
- FIA_ATD.1.1: 2
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU: 2
- FIA_UAU.1: 10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 7
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 8
- FIA_UAU.7.1: 1
- FIA_UID.1: 14
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 4
- FMT_MSA: 22
- FMT_MSA.1: 15
- FMT_MSA.1.1: 1
- FMT_MSA.2: 10
- FMT_MSA.2.1: 1
- FMT_MSA.3: 19
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR.1: 23
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 8
- FPT_FLS.1.1: 2
- FPT_ITT.1: 8
- FPT_ITT.1.1: 1
- FPT_PHP: 1
- FPT_PHP.1: 12
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.2: 11
- FPT_PHP.2.1: 1
- FPT_PHP.2.2: 1
- FPT_PHP.2.3: 1
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FTA:
- FTP:
- FTP_ITC: 3
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 4
- FTP_TRP.1: 4
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 2
- A.AUTH: 2
- A.CERTIFICATE: 3
- A.CONFIG: 2
- A.CONNECT: 2
- A.PHYSICAL: 2
- A.USER: 2
- O:
- O.ADMIN: 4
- O.AUDIT: 5
- O.AUTH_SERVER: 4
- O.DAC: 8
- O.SECURE_ENCRYPTION: 4
- O.TPATH: 8
- OE:
- OE.ACCOUNT: 5
- OE.AUDMAN: 3
- OE.AUDREC: 4
- OE.AUTHDATA: 4
- OE.INSTALL: 9
- OE.KEYMGMT: 9
- OE.OSAUTH: 4
- OE.OSCONFIG: 3
- OE.OSKEYS: 10
- OSP:
- T:
- T.CHANNEL: 3
- T.EXCEED: 3
- T.MISDIRECT: 3
- T.UNAUTH: 3
|
- A:
- A.ADMIN: 3
- A.CONNECTOR: 3
- A.ENV: 7
- A.PUSH_SERVER: 4
- A.SM: 6
- O:
- O.ACCESS_CONTROL: 9
- O.MANAGEMENT: 7
- O.PIN_ENTRY: 6
- O.PROTECTION: 9
- O.SECURE_CHANNEL: 4
- O.STATE: 7
- OE:
- OE.ADMIN: 4
- OE.CONNECTOR: 6
- OE.ENV: 11
- OE.PUSH_SERVER: 4
- OE.SM: 2
- OSP:
- OSP.PIN: 1
- OSP.PIN_ENTRY: 4
- T:
- T.COM: 3
- T.DATA: 3
- T.F-CONNECTOR: 3
- T.PIN: 6
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 4
- brainpoolP384r1: 3
- NIST:
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 5
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 5
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 5
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 5
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 5
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 5
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 5
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 5
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Physical tampering: 1
- physical tampering: 12
|
pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI 7500: 1
- BSI 7586: 1
- BSI TR-03116: 1
- BSI TR-03120: 3
|
pdf_data/st_keywords/device_model |
|
- G87:
- G87-1505: 7
- G87-1505LBZDE-2: 1
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCIMB-2004-01-001: 1
- CCIMB-2004-01-002: 1
- CCIMB-2004-01-003: 1
- FIPS:
- FIPS 140-2: 2
- FIPS140-2: 2
- RFC:
- X509:
|
- ISO:
- PKCS:
- RFC:
- RFC 2104: 1
- RFC 3447: 1
- RFC 4346: 1
- RFC 5246: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- Note that these application servers and the communications with them (RDP/SSH/X11) are out of scope: 1
- out of scope: 1
- server. (Note that these application servers and the communications with them (RDP/SSH/X11) are out of scope). Evaluation of Tarantella Enterprise 3 Tarantella Enterprise 3 Security Target/Issue 2.4 11 April: 1
|
- SecurityFunction:
- Security function SF.2: 1
|
pdf_data/st_metadata |
- /Author: griffinh@griffinh
- /CreationDate: D:20050411140335+00'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20050411141010
- /Producer: Jaws PDF Creator v2.11.1164
- /Title: Microsoft Word - T206-ST.doc
- pdf_file_size_bytes: 384411
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 42
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
False |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |