Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Nokia 7x50 SR OS 20.10.R4 for 7750 SR-1, 7750 SR-1s, 7750 SR- 2s, 7750 SR-7s, 7750 SR-14s, 7950 XRS-20, 7950 XRS-16c, 7450 ESS, and 7750 SR-1e
CCEVS-VR-11183-2021
ZEMO VML-GK2 HW V2.0.0 / FW V3.2.0
BSI-DSZ-CC-0623-V3-2024
name Nokia 7x50 SR OS 20.10.R4 for 7750 SR-1, 7750 SR-1s, 7750 SR- 2s, 7750 SR-7s, 7750 SR-14s, 7950 XRS-20, 7950 XRS-16c, 7450 ESS, and 7750 SR-1e ZEMO VML-GK2 HW V2.0.0 / FW V3.2.0
category Network and Network-Related Devices and Systems Other Devices and Systems
scheme US DE
status archived active
not_valid_after 19.10.2024 07.05.2029
not_valid_before 21.10.2021 08.05.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11183-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V3c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11183-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V3a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11183-st%20(1).pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V3b_pdf.pdf
manufacturer Nokia Corporation ZEMO GmbH
manufacturer_web https://www.nokia.com/ https://zemo.de
security_level {} ADV_FSP.4, ALC_TAT.1, AVA_VAN.5, ADV_IMP.1, EAL3+, ADV_TDS.3
dgst 602f16c93f3835e8 d648123b397e3e21
heuristics/cert_id CCEVS-VR-11183-2021 BSI-DSZ-CC-0623-V3-2024
heuristics/cert_lab US BSI
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, ASE_CLL.1, ASE_REQ.1, AGD_OPE.1, ASE_ECD.1, AGD_PRE.1 AGD_PRE.1, ALC_DVS.1, ATE_COV.2, ALC_TAT.1, ATE_FUN.1, AVA_VAN.5, ALC_DEL.1, ATE_IND.2, ADV_FSP.4, ALC_LCD.1, ADV_ARC.1, AGD_OPE.1, ADV_TDS.3, ALC_CMC.3, ATE_DPT.1, ALC_CMS.3, ADV_IMP.1
heuristics/extracted_versions 20.10 2.0.0, 3.2.0
heuristics/scheme_data
  • category: Network Device
  • certification_date: 21.10.2021
  • evaluation_facility: Acumen Security
  • expiration_date: 19.10.2024
  • id: CCEVS-VR-VID11183
  • product: Nokia 7x50 SR OS 20.10.R4 for 7750 SR-1, 7750 SR-1s, 7750 SR- 2s, 7750 SR-7s, 7750 SR-14s, 7950 XRS-20, 7950 XRS-16c, 7450 ESS, and 7750 SR-1e
  • scheme: US
  • url: https://www.niap-ccevs.org/product/11183
  • vendor: Nokia Corporation
heuristics/protection_profiles 89f2a255423f4a20 854be21fba7a106c
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0052b_pdf.pdf
pdf_data/cert_filename st_vid11183-ci.pdf 0623V3c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11183-2021: 1
  • DE:
    • BSI-DSZ-CC-0623-V3-2024: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0052-2015: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 3: 1
    • EAL 3 augmented: 1
    • EAL 4: 1
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • ALC:
    • ALC_FLR: 1
    • ALC_TAT.1: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/eval_facility
  • Acumen:
    • Acumen Security: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20211025132205-04'00'
  • /ModDate: D:20211025132205-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 181209
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Federal Office for Information Security
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Mobile Card Terminal for the German Healthcare System (MobCT), BSI-CC-PP-0052-2015"
  • /Subject: Common Criteria, Certification, Zertifizierung, Mobile Card Terminal for the German Healthcare System (MobCT), BSI-CC-PP-0052-2015
  • /Title: Certification Report BSI-DSZ-CC-0623-V3-2024
  • pdf_file_size_bytes: 232618
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid11183-vr.pdf 0623V3a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • US:
    • cert_id: CCEVS-VR-11183-2021
    • cert_item: for the Nokia 7x50 SR OS 20.10.R4 for 7750 SR-1, 7750 SR-1s, 7750 SR- 2s, 7750 SR-7s, 7750 SR-14s, 7950 XRS-20, 7950 XRS-16c, 7450 ESS, and 7750 SR-1e, Version 1.0
    • cert_lab: US NIAP
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.5 valid until: 7 May 2029
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0623-V3-2024
    • cert_item: ZEMO VML-GK2 HW V2.0.0 / FW V3.2.0
    • cert_lab: BSI
    • developer: ZEMO GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System (MobCT), Version 1.4, BSI-CC-PP-0052-2015, 24 September 2014
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-11183-2021: 1
  • DE:
    • BSI-DSZ-CC-0623-V3-2024: 12
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0052-2015: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 5
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 3: 4
    • EAL 3 augmented: 3
    • EAL 4: 4
    • EAL3+: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.4: 4
    • ADV_IMP.1: 4
    • ADV_TDS.3: 4
  • ALC:
    • ALC_FLR: 3
    • ALC_TAT.1: 4
  • ATE:
    • ATE_FUN: 1
    • ATE_IND: 3
  • AVA:
    • AVA_VAN: 3
    • AVA_VAN.5: 5
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 1
    • FCS_COP: 4
    • FCS_RBG_EXT.1: 1
    • FCS_SSHS_EXT.1: 1
    • FCS_TLSC_EXT.1: 1
  • FCS:
    • FCS_COP: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.REGULAR_UPDATES: 1
    • A.RESIDUAL_INFORMATION: 1
    • A.TRUSTED_ADMINISTRATOR: 1
  • T:
    • T.PASSWORD_CRACKING: 1
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.SECURITY_FUNCTIONALITY_FAILURE: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 1
  • OE:
    • OE.ENVIRONMENT: 1
    • OE.MEDIC: 1
    • OE.PHYSICAL: 1
pdf_data/report_keywords/eval_facility
  • Acumen:
    • Acumen Security: 4
  • TUV:
    • TÜV Informationstechnik: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 1
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 1
      • AES-256: 1
    • HPC:
      • HPC: 4
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 4
  • RSA:
    • RSA-3072: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 1
      • SHA-384: 2
      • SHA-512: 1
      • SHA256: 1
  • SHA:
    • SHA2:
      • SHA-512: 1
pdf_data/report_keywords/crypto_scheme
  • KEX:
    • Key exchange: 1
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 15
    • SSHv2: 1
  • TLS:
    • TLS:
      • TLS: 3
      • TLS v1.2: 6
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
  • RNG:
    • RNG: 4
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CTR:
    • CTR: 2
  • GCM:
    • GCM: 2
  • GCM:
    • GCM: 2
pdf_data/report_keywords/tls_cipher_suite
  • TLS:
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS PUB 186-4: 2
  • ISO:
    • ISO/IEC 18031:2011: 1
    • ISO/IEC 9796-2: 1
  • PKCS:
    • PKCS #1: 1
  • RFC:
    • RFC 2818: 1
    • RFC 3268: 2
    • RFC 3447: 1
    • RFC 3526: 2
    • RFC 5246: 2
  • BSI:
    • AIS 32: 1
    • AIS 38: 1
  • FIPS:
    • FIPS180-4: 1
    • FIPS197: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • RFC:
    • RFC6234: 1
  • X509:
    • X.509: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 1170, 2024-03-21; SVN Liste aller entwicklungsrelevanten Dokumente, Version 809, 2024-03-22, (confidential documents) [11] Guidance documentation for the TOE, Version 2.2.0, 2023-11-24, Bedienungsanleitung: 1
    • Report, Version 3, 2024-03-25, EVALUATION TECHNICAL REPORT SUMMARY, TÜV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
pdf_data/report_metadata
pdf_data/st_filename st_vid11183-st (1).pdf 0623V3b_pdf.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0032: 1
    • BSI-CC-PP-0052: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 3: 4
    • EAL 3 augmented: 3
    • EAL3+: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
  • ASE:
    • ASE_CLL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 2
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 5
    • ADV_IMP.1: 5
    • ADV_TDS.3: 5
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 5
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 5
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 4
    • FAU_GEN.2.1: 1
    • FAU_STG_EXT.1: 4
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.1.2: 1
    • FAU_STG_EXT.1.3: 1
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 5
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 5
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 5
    • FCS_CKM.4.1: 1
    • FCS_COP: 19
    • FCS_COP.1: 4
    • FCS_NTP_EXT.1.4: 1
    • FCS_RBG_EXT.1: 5
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSHS_EXT.1: 7
    • FCS_SSHS_EXT.1.1: 1
    • FCS_SSHS_EXT.1.2: 1
    • FCS_SSHS_EXT.1.3: 1
    • FCS_SSHS_EXT.1.4: 3
    • FCS_SSHS_EXT.1.5: 4
    • FCS_SSHS_EXT.1.6: 2
    • FCS_SSHS_EXT.1.7: 2
    • FCS_SSHS_EXT.1.8: 1
    • FCS_TLSC_EXT.1: 7
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.1.4: 1
    • FCS_TLSC_EXT.2: 3
    • FCS_TLSC_EXT.2.1: 1
    • FCS_TLSC_EXT.2.3: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_PMG_EXT.1: 4
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU.7: 3
    • FIA_UAU.7.1: 2
    • FIA_UAU_EXT.1: 1
    • FIA_UAU_EXT.2: 2
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT.1: 4
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
  • FMT:
    • FMT_MOF: 8
    • FMT_MOF.1: 2
    • FMT_MTD: 8
    • FMT_MTD.1: 2
    • FMT_SMF.1: 4
    • FMT_SMF.1.1: 1
    • FMT_SMR.2: 4
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT.1: 4
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_SKP_EXT.1: 4
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM: 1
    • FPT_STM_EXT.1: 4
    • FPT_STM_EXT.1.1: 1
    • FPT_STM_EXT.1.2: 1
    • FPT_TST_EXT.1: 4
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT.1: 4
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTA:
    • FTA_SSL.3: 4
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 3
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT.1: 4
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB.1: 5
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC.1: 6
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 4
    • FTP_TRP.1: 3
  • FCS:
    • FCS_CKM.1: 23
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 22
    • FCS_CKM.4.1: 1
    • FCS_COP: 31
    • FCS_COP.1: 5
  • FDP:
    • FDP_ACC.1: 30
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 25
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 5
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 5
    • FDP_IFC: 41
    • FDP_IFC.1: 11
    • FDP_IFF: 45
    • FDP_IFF.1: 25
    • FDP_ITC.1: 21
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 9
    • FDP_RIP: 15
    • FDP_RIP.1: 2
    • FDP_SDI.1: 1
    • FDP_SDI.2: 9
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_SVR: 2
    • FDP_SVR.1: 12
    • FDP_SVR.1.1: 5
    • FDP_SVR.1.2: 3
    • FDP_SVR.1.3: 3
  • FIA:
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 13
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5: 11
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.7: 10
    • FIA_UAU.7.1: 2
    • FIA_UID.1: 17
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 26
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 11
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 8
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 14
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 20
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_PHP.1: 7
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_STM.1: 12
    • FPT_STM.1.1: 1
    • FPT_TST.1: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 2
    • FTA_SSL.4: 10
    • FTA_SSL.4.1: 1
  • FTP:
    • FTP_ITC.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.REGULAR_UPDATES: 1
    • A.RESIDUAL_INFORMATION: 1
    • A.TRUSTED_ADMINISTRATOR: 1
  • OE:
    • OE.ADMIN_CREDENTIALS_SECURE: 1
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.NO_THRU_TRAFFIC_PROTECTION: 1
    • OE.PHYSICAL: 1
    • OE.RESIDUAL_INFORMATION: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.UPDATES: 1
  • T:
    • T.PASSWORD_CRACKING: 1
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.SECURITY_FUNCTIONALITY_FAILURE: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 1
  • A:
    • A.ADMIN: 3
    • A.CARDS: 4
    • A.DEVELOPER: 1
    • A.DMS: 3
    • A.ENVIRONMEN: 1
    • A.ENVIRONMENT: 2
    • A.MEDIC: 3
    • A.PHYSICAL: 3
  • O:
    • O.AUTH_STATE: 9
    • O.DMS_CONNECT: 1
    • O.DMS_CONNECTION: 5
    • O.LOG_CARDS: 3
    • O.LOG_DATA: 6
    • O.MANAGEMENT: 9
    • O.PIN: 7
    • O.PROTECTION: 8
    • O.RESIDUAL: 6
    • O.SEALING: 3
    • O.SELFTESTS: 6
    • O.TIME: 6
    • O.TRANSFER: 3
  • OE:
    • OE.ADMIN: 9
    • OE.CARDS: 8
    • OE.DEVELOPER: 1
    • OE.DMS: 4
    • OE.ENVIRONMENT: 6
    • OE.MEDIC: 10
    • OE.PHYSICAL: 6
  • OSP:
    • OSP.DMS_CONN: 1
    • OSP.DMS_CONNE: 1
    • OSP.DMS_CONNECTION: 1
    • OSP.EMERGENC: 1
    • OSP.EMERGENCY_: 1
    • OSP.EMERGENCY_DATA: 1
    • OSP.LOG_CARD: 1
    • OSP.LOG_CARDS: 1
    • OSP.LOG_DATA: 3
    • OSP.SEALING: 3
    • OSP.SELFTESTS: 3
    • OSP.TIME: 3
    • OSP.TRANSFER: 3
  • T:
    • T.ACCESS: 3
    • T.ADMIN_PIN: 3
    • T.AUTH_STATE: 3
    • T.DATA: 3
    • T.FIRMWARE: 3
    • T.MAN_HW: 3
pdf_data/st_keywords/eval_facility
  • Acumen:
    • Acumen Security: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 21
  • constructions:
    • MAC:
      • CMAC: 3
      • HMAC: 6
      • HMAC-SHA-256: 2
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 2
  • AES_competition:
    • AES:
      • AES: 5
      • AES-256: 1
    • HPC:
      • HPC: 14
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
  • FF:
    • DH:
      • DH: 4
      • DHE: 1
      • Diffie-Hellman: 4
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-256: 4
      • SHA-384: 5
      • SHA-512: 3
      • SHA256: 3
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key exchange: 1
  • MAC:
    • MAC: 5
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 50
    • SSHv2: 4
  • TLS:
    • DTLS:
      • DTLS: 2
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 30
      • TLS 1.2: 1
      • TLS v1.2: 11
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 5
  • RNG:
    • RBG: 2
    • RNG: 5
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 6
  • CCM:
    • CCM: 2
  • CTR:
    • CTR: 5
  • GCM:
    • GCM: 8
  • GCM:
    • GCM: 4
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_RSA_WITH_AES_128_CBC_SHA: 3
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_RSA_WITH_AES_256_CBC_SHA: 3
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 6
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 186-4: 6
  • ISO:
    • ISO/IEC 10118-: 1
    • ISO/IEC 18031:2011: 4
    • ISO/IEC 9796-2: 2
    • ISO/IEC 9797-: 1
  • PKCS:
    • PKCS #1: 3
  • RFC:
    • RFC 2818: 3
    • RFC 2986: 2
    • RFC 3268: 4
    • RFC 3447: 3
    • RFC 3526: 6
    • RFC 4253: 2
    • RFC 5077: 1
    • RFC 5246: 6
    • RFC 5280: 8
    • RFC 5759: 1
    • RFC 6125: 2
  • X509:
    • X.509: 10
  • FIPS:
    • FIPS 197: 1
  • X509:
    • X.509: 9
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • done by an authorised card that is out of scope of this ST: 1
    • out of scope: 1
    • the TOE • Signature generation for emergency data1 on the eHC (done by an authorised card that is out of scope of this ST) 1.4.6 Physical Protection of the TOE The TOE cannot counter physical attacks concerning: 1
pdf_data/st_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Keywords: Protection Profile, Mobile Card Terminal, Electronic Health Card
  • /Subject: Mobile Card Terminal, electronic Health Card
  • /Title: Common Criteria Protection Profile BSI-PP-0052
  • pdf_file_size_bytes: 461165
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 75
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different