name |
TASKalfa MZ4000i, TASKalfa MZ3200i, TASKalfa M30040i, TASKalfa M30032i (KYOCERA), CS MZ4000i, CS MZ3200i (Copystar), 4063i, 3263i (TA Triumph Adler/UTAX) with Hard Disk and FAX System |
CHERRY eGK Tastatur G87-1505 FW-Version 3.3.3 HW-Version 1.1.1 |
category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
SE |
DE |
status |
active |
active |
not_valid_after |
16.03.2028 |
08.10.2028 |
not_valid_before |
16.03.2023 |
09.10.2023 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CCRA%20cert%20TASKalfa4%202600PP.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0513V3c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20TASKalfa4_2600.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0513V3a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_TASKalfaMZ4000i_HDD_100.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0513V3b_pdf.pdf |
manufacturer |
KYOCERA Document Solutions Inc. |
Cherry GmbH |
manufacturer_web |
https://www.kyoceradocumentsolutions.com/ |
https://www.cherrycorp.com/ |
security_level |
EAL2+, ALC_FLR.2 |
ADV_FSP.4, AVA_VAN.4, ALC_TAT.1, ADV_IMP.1, EAL3+, ADV_TDS.3 |
dgst |
4a5e3aea8e2e5945 |
21fe19a80fe913d5 |
heuristics/cert_id |
CSEC2022005 |
BSI-DSZ-CC-0513-V3-2023 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, AVA_VAN.4, ASE_CCL.1 |
heuristics/extracted_versions |
- |
1.1.1, 3.3.3 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0513-V2-2018 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0513-V2-2018 |
heuristics/scheme_data |
|
- category: eHealth
- cert_id: BSI-DSZ-CC-0513-V3-2023
- certification_date: 09.10.2023
- enhanced:
- applicant: Cherry Digital Health GmbH Cherrystraße 2 91275 Auerbach/Opf Deutschland
- assurance_level: EAL3+,ADV_FSP.4,ADV_IMP.1,ADV_TDS.3,ALC_TAT.1,AVA_VAN.4
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte05/0513V3c_pdf.html?nn=456648
- certification_date: 09.10.2023
- description: The TOE is the smart card keyboard "G87-1505" version 3.0.1:1.1.1 with integrated smart card readers. It fulfils the IT security requirements to be used with the German electronic Health Card (eHC) and the German Health Professional Card (HPC) based on the regulations of the German healthcare system.
- entries: [frozendict({'id': 'BSI-DSZ-CC-0513-V3-2023 (09.10.2023)', 'description': 'Certificate'}), frozendict({'id': 'BSI', 'description': 'The certified product itself did not change. Only the secure delivery-chain has been updated.'}), frozendict({'id': 'BSI', 'description': 'The certified product itself did not change. Only the secure delivery-chain has been updated.'}), frozendict({'id': 'BSI', 'description': 'Certificate'})]
- evaluation_facility: TÜV Informationstechnik GmbH
- expiration_date: 08.10.2028
- product: CHERRY eHealth Terminal G87-1505 FW-Version 3.3.3 HW-Version 1.1.1
- protection_profile: Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01, 22. Mai 2017
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte05/0513V3a_pdf.pdf?__blob=publicationFile&v=2
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte05/0513V3b_pdf.pdf?__blob=publicationFile&v=2
- product: CHERRY eHealth Terminal G87-1505 FW-Version 3.3.3 HW-Version 1.1.1
- subcategory: Card reader
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Gesundheitswesen_Kartenlesegeraete/0513.html
- vendor: Cherry Digital Health GmbH
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
154ef77c252799ee |
e1444c335eeed890 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0058b.pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0032V2b_pdf.pdf |
pdf_data/cert_filename |
CCRA cert TASKalfa4 2600PP.pdf |
0513V3c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0513-V3-2023: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 3: 1
- EAL 3 augmented: 1
- EAL 4: 1
|
pdf_data/cert_keywords/cc_sar |
|
- ADV:
- ADV_FSP.4: 1
- ADV_TDS.3: 1
- ALC:
- AVA:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20230320142725+01'00'
- /Creator: RICOH MP C4504ex
- /ModDate: D:20230323121907+01'00'
- /Producer: RICOH MP C4504ex
- pdf_file_size_bytes: 1004687
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, Cherry Digital Health GmbH, eHealth, Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01, 22 May 2017"
- /Subject: Common Criteria, Certification, Zertifizierung, Cherry Digital Health GmbH, eHealth, Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01, 22 May 2017
- /Title: Certificate BSI-DSZ-CC-0513-V3-2023
- pdf_file_size_bytes: 235695
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
Certification Report TASKalfa4_2600.pdf |
0513V3a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADR_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.4 valid until: 08 October 2028
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 conformant
- cert_id: BSI-DSZ-CC-0513-V3-2023
- cert_item: CHERRY eGK Tastatur G87-1505 FW-Version 3.3.3 HW-Version 1.1.1
- cert_lab: BSI
- developer: Cherry Digital Health GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC- PP-0032-V2-2015-MA-01, 22 May 2017
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0513-V2-: 1
- BSI-DSZ-CC-0513-V2-2018: 1
- BSI-DSZ-CC-0513-V3-2023: 13
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0032-V2-2015-MA-01: 3
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 2
- EAL 2 augmented: 1
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 3: 4
- EAL 3 augmented: 3
- EAL 4: 4
- EAL 5: 2
- EAL3+: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_TDS.1: 1
- AGD:
- ALC:
- ALC_CMC.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 2
- ASE:
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_FSP.4: 4
- ADV_TDS.3: 4
- ALC:
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.ADMIN: 2
- A.USER: 1
- T:
- T.CONF: 2
- T.DOC: 2
- T.FUNC: 1
- T.PROT: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 4
- SHA256: 1
- SHA384: 1
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
- TLS:
- TLS:
- TLS: 3
- TLS v1.2: 1
- TLSv1.2: 2
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
- G87:
- G87-1505: 10
- G87-1505LBZDE-: 1
- G87-1505LBZDE-10: 1
- G87-1505LBZDE-10_2017-12-19: 1
- G87-1505LBZDE-2: 1
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ISO:
|
- BSI:
- FIPS:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- PKCS:
- RFC:
- RFC 4492: 1
- RFC 5639: 1
- RFC1321: 1
- RFC2104: 2
- RFC2404: 1
- RFC2526: 1
- RFC3602: 1
- RFC5246: 2
- X509:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 7] Evaluation Technical Report (ETR Summary), Version 2, 2023-08-21, TÜV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- xlsx and G87-1505LBZDE-10_2017-12-19.xlsx, 2017-12-19, Bibliography G-87-1505 V4.0, 2023-07-23 (confidential document) [10] Handbuch für Administratoren eGK Tastatur G87-1505, Version 6440650-04, Feb 2018, Cherry GmbH: 1
|
pdf_data/report_metadata |
- /Author: Jerry Johansson
- /CreationDate: D:20230316160943+01'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20230323121814+01'00'
- /Producer: Microsoft® Word 2016
- /Subject: 22FMV4136-23
- /Title: Certification Report - Kyocera TASKalfa MZ4000i, MZ3200i 2600PP
- pdf_file_size_bytes: 460207
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, Cherry Digital Health GmbH, eHealth, Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01, 22 May 2017"
- /Subject: Common Criteria, Certification, Zertifizierung, Cherry Digital Health GmbH, eHealth, Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01, 22 May 2017
- /Title: Certification Report BSI-DSZ-CC-0513-V3-2023
- pdf_file_size_bytes: 435399
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
pdf_data/st_filename |
ST_TASKalfaMZ4000i_HDD_100.pdf |
0513V3b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0032-: 1
- BSI-CC-PP-0046: 1
- BSI-CC_PP_0032-V3-2016: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 3: 3
- EAL 3 augmented: 3
- EAL3+: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 5
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_FSP.4: 4
- ADV_IMP.1: 5
- ADV_TDS.3: 4
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 4
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT.1: 3
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 9
- FAU_GEN.2.1: 1
- FAU_SAR.1: 12
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 10
- FAU_SAR.2.1: 1
- FAU_STG.1: 12
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 10
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 45
- FCS_CKM.1.1: 3
- FCS_CKM.2: 3
- FCS_CKM.4: 13
- FCS_COP.1: 44
- FCS_COP.1.1: 3
- FDP:
- FDP_ACC.1: 28
- FDP_ACC.1.1: 2
- FDP_ACF: 1
- FDP_ACF.1: 23
- FDP_ACF.1.3: 1
- FDP_IFC: 1
- FDP_IFC.1: 2
- FDP_IFF: 1
- FDP_ITC.1: 3
- FDP_ITC.2: 3
- FDP_RIP.1: 9
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 11
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_SOS.1: 11
- FIA_SOS.1.1: 1
- FIA_UAU.1: 11
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 11
- FIA_UAU.7.1: 1
- FIA_UID.1: 21
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 9
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 26
- FMT_MSA.1.1: 2
- FMT_MSA.3: 24
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 19
- FMT_MTD.1.1: 2
- FMT_SMF.1: 24
- FMT_SMF.1.1: 1
- FMT_SMR.1: 24
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FDI_EXP: 3
- FPT_FDI_EXP.1: 14
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1: 11
- FPT_STM.1.1: 1
- FPT_TST.1: 9
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 10
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 14
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FCS:
- FCS_CKM: 16
- FCS_CKM.1: 23
- FCS_CKM.2: 4
- FCS_CKM.4: 32
- FCS_CKM.4.1: 1
- FCS_COP: 52
- FCS_COP.1: 10
- FDP:
- FDP_ACC: 15
- FDP_ACC.1: 23
- FDP_ACF: 17
- FDP_ACF.1: 16
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC: 22
- FDP_IFC.1: 12
- FDP_IFF: 23
- FDP_IFF.1: 14
- FDP_ITC.1: 15
- FDP_ITC.2: 12
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 2
- FIA_ATD.1: 7
- FIA_ATD.1.1: 2
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU: 2
- FIA_UAU.1: 10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 7
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 8
- FIA_UAU.7.1: 1
- FIA_UID.1: 14
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 4
- FMT_MSA: 22
- FMT_MSA.1: 15
- FMT_MSA.1.1: 1
- FMT_MSA.2: 10
- FMT_MSA.2.1: 1
- FMT_MSA.3: 19
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR.1: 23
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 8
- FPT_FLS.1.1: 2
- FPT_ITT.1: 8
- FPT_ITT.1.1: 1
- FPT_PHP: 1
- FPT_PHP.1: 12
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.2: 11
- FPT_PHP.2.1: 1
- FPT_PHP.2.2: 1
- FPT_PHP.2.3: 1
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FTA:
- FTP:
- FTP_ITC: 3
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 4
- FTP_TRP.1: 4
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.ADMIN: 6
- A.USER: 3
- D:
- D.CONF: 16
- D.DOC: 41
- D.FUNC: 20
- D.PROT: 14
- O:
- O.AUDIT: 9
- O.AUDIT_ACCESS: 11
- O.AUDIT_STORAGE: 11
- O.CONF: 18
- O.DOC: 18
- O.FUNC: 9
- O.HDD: 11
- O.INTERFACE: 9
- O.PROT: 9
- O.SOFTWARE: 9
- O.USER: 15
- OE:
- OE.ADMIN: 8
- OE.AUDIT: 4
- OE.AUDIT_ACCESS: 3
- OE.AUDIT_STORAGE: 3
- OE.INTERFACE: 4
- OE.PHYISCAL: 2
- OE.PHYSICAL: 3
- OE.USER: 14
- T:
- T.CONF: 6
- T.DOC: 6
- T.FUNC: 3
- T.PROT: 3
|
- A:
- A.ADMIN: 3
- A.CONNECTOR: 3
- A.ENV: 7
- A.PUSH_SERVER: 4
- A.SM: 6
- O:
- O.ACCESS_CONTROL: 9
- O.MANAGEMENT: 7
- O.PIN_ENTRY: 6
- O.PROTECTION: 9
- O.SECURE_CHANNEL: 4
- O.STATE: 7
- OE:
- OE.ADMIN: 4
- OE.CONNECTOR: 6
- OE.ENV: 11
- OE.PUSH_SERVER: 4
- OE.SM: 2
- OSP:
- OSP.PIN: 1
- OSP.PIN_ENTRY: 4
- T:
- T.COM: 3
- T.DATA: 3
- T.F-CONNECTOR: 3
- T.PIN: 6
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 1
- DHE: 2
- Diffie-Hellman: 4
- RSA:
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 3
- SHA-384: 3
- SHA-512: 2
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IPsec:
- TLS:
- SSL:
- SSL: 1
- SSLv1.0: 1
- SSLv2.0: 1
- SSLv3.0: 1
- TLS:
- TLS: 16
- TLS 1.2: 1
- TLSv1.0: 1
- TLSv1.1: 1
- TLSv1.2: 2
- TLSv1.3: 3
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 4
- brainpoolP384r1: 3
- NIST:
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_GCM_SHA384: 1
|
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 5
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 5
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 5
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 5
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 5
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 5
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 5
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 5
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Physical tampering: 1
- physical tampering: 12
|
pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI 7500: 1
- BSI 7586: 1
- BSI TR-03116: 1
- BSI TR-03120: 3
|
pdf_data/st_keywords/device_model |
|
- G87:
- G87-1505: 7
- G87-1505LBZDE-2: 1
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-4: 3
- FIPS 186-4: 2
- FIPS 197: 3
- FIPS 46-3: 1
- FIPS PUB 180-4: 1
- FIPS PUB 197: 3
- NIST:
- SP 800-135: 3
- SP 800-67: 1
- PKCS:
- RFC:
- RFC 2409: 2
- RFC 5114: 1
- RFC2104: 2
- RFC2409: 2
- RFC5246: 11
- RFC5288: 4
- RFC5289: 4
- RFC7905: 2
- RFC8439: 3
- RFC8446: 2
|
- ISO:
- PKCS:
- RFC:
- RFC 2104: 1
- RFC 3447: 1
- RFC 4346: 1
- RFC 5246: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- SecurityFunction:
- Security function SF.2: 1
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
False |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |