Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
eTravel Essential 1.3-2.0 – BAC, EAC and AA activated (Version 1.0)
ANSSI-CC-2021/64
Stationäres eHealth-Kartenterminal ORGA 6141 online Version 3.9.2:1.2.0 / 3.9.2:2.0.0
BSI-DSZ-CC-0519-V6-2025
name eTravel Essential 1.3-2.0 – BAC, EAC and AA activated (Version 1.0) Stationäres eHealth-Kartenterminal ORGA 6141 online Version 3.9.2:1.2.0 / 3.9.2:2.0.0
scheme FR DE
status archived active
not_valid_after 27.12.2025 16.10.2030
not_valid_before 27.12.2021 16.10.2025
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2021-64.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0519V6c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021-64.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0519V6a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_64en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0519V6b_pdf.pdf
manufacturer THALES DIS FRANCE SA Worldlline Healthcare GmbH
manufacturer_web https://www.thalesgroup.com/en/europe/france https://de.worldline.com
security_level EAL5+, ALC_DVS.2, AVA_VAN.5 ALC_TAT.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, AVA_VAN.4, EAL3+
dgst 69906de02df692c3 c9f1e8cb1664943f
heuristics/cert_id ANSSI-CC-2021/64 BSI-DSZ-CC-0519-V6-2025
heuristics/cert_lab [] BSI
heuristics/extracted_sars AGD_OPE.1, AGD_PRE.1, AVA_VAN.5, ADV_ARC.1, ATE_DPT.1, ALC_DVS.2, ADV_FSP.4, ADV_IMP.1, ASE_TSS.2, ADV_TDS.3 ALC_DEL.1, ATE_FUN.1, ASE_INT.1, ADV_FSP.4, AVA_VAN.4, ADV_TDS.3, AGD_OPE.1, ASE_CCL.1, ADV_ARC.1, ATE_COV.2, ASE_SPD.1, ATE_IND.2, ALC_TAT.1, ATE_DPT.1, ASE_ECD.1, ALC_CMS.3, AGD_PRE.1, ALC_DVS.1, ASE_TSS.1, ADV_IMP.1, ASE_REQ.2, ALC_CMC.3, ALC_LCD.1, ASE_OBJ.2
heuristics/extracted_versions 2.0, 1.0, 1.3 1.2.0, 2.0.0, 3.9.2
heuristics/report_references/directly_referencing BSI-DSZ-CC-1156-V2-2021 BSI-DSZ-CC-0519-V5-2024
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-1156-V2-2021, BSI-DSZ-CC-1156-2021 BSI-DSZ-CC-0519-V3-2021, BSI-DSZ-CC-0519-V5-2024, BSI-DSZ-CC-0519-V4-2022
heuristics/scheme_data
  • category: eHealth
  • cert_id: BSI-DSZ-CC-0519-V6-2025
  • certification_date: 16.10.2025
  • enhanced:
    • applicant: Worldlline Healthcare GmbH Konrad-Zuse-Ring 1 24220 Flintbek
    • assurance_level: EAL3+,AVA_VAN.4,ALC_TAT.1,ADV_TDS.3,ADV_IMP.1,ADV_FSP.4
    • cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte05/0519V6c_pdf.pdf?__blob=publicationFile&v=3
    • certification_date: 16.10.2025
    • description: The Target of Evaluation (TOE) is a smart card terminal ORGA 6141 online Version 3.7.2:1.2.0. It fulfils the IT security requirements to be used with the German electronic Health Card (eHC) and the German Health Professional Card (HPC) based on the regulations of the German healthcare system.
    • entries: [frozendict({'id': 'BSI', 'description': 'Management'}), frozendict({'id': 'BSI-DSZ-CC-0519-V6-2025 (16.10.2025)', 'description': 'Zertifizierungsreport / Certification Report Sicherheitsvorgaben / Security Target Zertifikat / Certificate'}), frozendict({'id': 'BSI', 'description': 'online'}), frozendict({'id': 'BSI-DSZ-CC-0519-V5-2024 (24.09.2024)', 'description': 'Management'}), frozendict({'id': 'BSI-DSZ-CC-0519-V4-2022-MA-01 (04.04.2023) Maintenancereport / Maintenance Report Sicherheitsvorgaben / Security Target Folgende Änderungen waren im Fokus dieser Re-Evalauierung: Updates von Open-Sopurce-Komponenten, Fehlerbehebung im TOE und die Erweiterung des Produkts um die Remote Management Schnittstelle als zweite Adiminstrationsschnittstelle, die eingabe der SMC-B PIN über diese Remote Management Schnittstelle sowie die VPN Authentifizierung via PSK und EAP-TLS. Following changes on the evaluated product have been in the focus of this re-evaluation: Update of open-source components, Bug fixing for the TOE, Product expansion, Remote Management Interface as second administration interface, SMC-B PIN entry via the Remote Management Interface and VPN authentication method PSK and EAP-TLS.', 'description': 'Firmware'}), frozendict({'id': 'BSI', 'description': 'Management'}), frozendict({'id': 'BSI', 'description': 'online'}), frozendict({'id': 'BSI', 'description': 'Maintenance Report'}), frozendict({'id': 'BSI', 'description': 'The certified product itself did not change compared to 0519-V2-2018.'}), frozendict({'id': 'BSI', 'description': 'online'}), frozendict({'id': 'BSI', 'description': 'The certified product itself did not change compared to 0519-V2-2018.'}), frozendict({'id': 'BSI', 'description': 'Certificate'})]
    • evaluation_facility: TÜV Informationstechnik GmbH
    • expiration_date: 15.10.2030
    • product: ORGA 6141 online V3.9.2:1.2.0/3.9.2:2.0.0
    • protection_profile: Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01, 22 May 2017
    • report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte05/0519V6a_pdf.pdf?__blob=publicationFile&v=3
    • target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte05/0519V6b_pdf.pdf?__blob=publicationFile&v=3
  • product: ORGA 6141 online V3.9.2:1.2.0/3.9.2:2.0.0
  • subcategory: Card reader
  • url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Gesundheitswesen_Kartenlesegeraete/0519.html
  • vendor: Worldlline Healthcare GmbH
heuristics/st_references/directly_referencing BSI-DSZ-CC-1156-2021 BSI-DSZ-CC-0519
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-1156-2021 BSI-DSZ-CC-0519
heuristics/protection_profiles f826c2b289ac76dc {}
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0026b.pdf {}
pdf_data/cert_filename certificat-anssi-cc-2021-64.pdf 0519V6c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2021/64: 2
  • DE:
    • BSI-DSZ-CC-0519-V6-2025: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0032-V3-: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
  • EAL:
    • EAL 2: 1
    • EAL 3: 1
    • EAL 3 augmented: 1
    • EAL 4: 1
pdf_data/cert_keywords/cc_sar
  • AVA:
    • AVA_VAN.5: 1
  • ADV:
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • ALC:
    • ALC_FLR: 1
    • ALC_TAT.1: 1
  • AVA:
    • AVA_VAN.4: 1
pdf_data/cert_keywords/eval_facility
  • CEA-LETI:
    • CEA - LETI: 2
pdf_data/cert_keywords/standard_id
  • ICAO:
    • ICAO: 1
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/report_filename anssi-cc-2021-64.pdf 0519V6a_pdf.pdf
pdf_data/report_frontpage
  • FR:
  • DE:
  • FR:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1 and AVA_VAN.4 valid until: 15 October 2030
    • cc_version: PP conformant
    • cert_id: BSI-DSZ-CC-0519-V6-2025
    • cert_item: Stationäres eHealth Kartenterminal ORGA 6141 online Version 3.9.2:1.2.0 / 3.9.2:2.0.0
    • cert_lab: BSI
    • developer: Worldline Healthcare GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Common Criteria Protection Profile Electronic Health Card Terminal (eHCT), BSI-CC-PP-0032-V3- 2023, 15.12.2022
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1156-V2-2021: 1
  • FR:
    • ANSSI-CC-2021/64: 15
  • DE:
    • BSI-DSZ-CC-0519-V5-2024: 2
    • BSI-DSZ-CC-0519-V6-2025: 12
  • NL:
    • CC-0950-2017: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0056-2009: 1
    • BSI-PP-0056-2009: 1
    • BSI-PP-0084-2014: 1
  • BSI:
    • BSI-CC-PP-0032-V3-: 1
    • BSI-CC-PP-0032-V3-2023: 3
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 5: 1
    • EAL2: 2
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 3: 4
    • EAL 3 augmented: 3
    • EAL 4: 4
    • EAL3+: 1
pdf_data/report_keywords/cc_sar
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 1
  • ADV:
    • ADV_FSP.4: 4
    • ADV_IMP.1: 4
    • ADV_TDS.3: 4
  • ALC:
    • ALC_FLR: 3
    • ALC_TAT.1: 4
  • AVA:
    • AVA_VAN.4: 5
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1.1: 10
    • FCS_COP: 2
    • FCS_COP.1: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon Technologies AG: 1
pdf_data/report_keywords/eval_facility
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 2
  • TUV:
    • TÜV Informationstechnik: 3
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
  • AES_competition:
    • AES:
      • AES: 1
      • AES-128: 2
      • AES-256: 2
    • HPC:
      • HPC: 4
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 3
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 1
    • DSA:
      • DSA: 1
  • RSA:
    • RSA-2048: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 5
      • SHA256: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 15
      • TLS v1.2: 3
  • VPN:
    • VPN: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • GCM:
    • GCM: 1
pdf_data/report_keywords/ecc_curve
  • NIST:
    • secp256r1: 1
    • secp384r1: 1
    • secp512r1: 1
pdf_data/report_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_12: 1
    • TLS_DHE_RSA_WITH_AES_128: 3
    • TLS_DHE_RSA_WITH_AES_25: 1
    • TLS_DHE_RSA_WITH_AES_256: 2
pdf_data/report_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • ICAO:
    • ICAO: 1
  • BSI:
    • AIS 1: 1
    • AIS 32: 1
    • AIS 38: 1
  • FIPS:
    • FIPS180-4: 4
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • PKCS:
    • PKCS#1: 4
  • RFC:
    • RFC3526: 1
    • RFC4492: 3
    • RFC5246: 8
    • RFC5289: 4
    • RFC5639: 1
    • RFC7027: 1
    • RFC7251: 1
    • RFC8422: 1
  • X509:
    • X.509: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 15.12.2022 [8] SVN List (Configlist SW), 2025-07-24, Worldline Healthcare GmbH (confidential document) [9] Datensatz PDXpert (Configlist HW), Version 3.9.0, 2024-07-09, Worldline Healthcare GmbH: 1
    • 6] Evaluation Technical Report (ETR Summary), Version 1, 2025-10-08, TÜV Informationstechnik GmbH (confidential document) [7] Common Criteria Protection Profile Electronic Health Card Terminal (eHCT), BSI-: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
pdf_data/report_metadata
pdf_data/st_filename anssi-cible-cc-2021_64en.pdf 0519V6b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1156-2021: 1
  • NL:
    • CC-1: 4
    • CC-2: 6
    • CC-3: 5
  • DE:
    • BSI-DSZ-CC-0519: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0055: 1
    • BSI-CC-PP-0056: 1
    • BSI-CC-PP-0056-V2-2012: 1
    • BSI-CC-PP-0068-V2-2011-MA-01: 1
    • BSI-CC-PP-0084-2014: 1
  • BSI:
    • BSI-CC-PP-0032: 1
    • BSI-CC-PP-0032-: 1
    • BSI-CC-PP-0032-V3-2023: 1
    • BSI-CC-PP-0046: 1
    • BSI-CC-PP-0082: 1
    • BSI-CC-PP-0098: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 6+: 1
    • EAL5: 7
    • EAL5 augmented: 3
    • EAL5+: 1
    • EAL6: 1
    • EAL6 augmented: 1
  • EAL:
    • EAL 3: 2
    • EAL 3 augmented: 2
    • EAL3: 1
    • EAL3 augmented: 1
    • EAL3+: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 2
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_DVS.2: 6
  • ASE:
    • ASE_ECD: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_DPT.1: 1
  • AVA:
    • AVA_VAN.3: 2
    • AVA_VAN.5: 6
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 5
    • ADV_IMP.1: 6
    • ADV_TDS.3: 4
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 5
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.4: 5
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 7
    • FAU_SAS.1: 16
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 38
    • FCS_CKM.1: 26
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 6
    • FCS_CKM.4: 47
    • FCS_CKM.4.1: 1
    • FCS_COP: 82
    • FCS_COP.1: 11
    • FCS_COP.1.1: 5
    • FCS_RND: 11
    • FCS_RND.1: 16
    • FCS_RND.1.1: 2
    • FCS_RNG: 5
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC: 11
    • FDP_ACC.1: 22
    • FDP_ACF: 10
    • FDP_ACF.1: 23
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 5
    • FDP_ITC: 1
    • FDP_ITC.1: 19
    • FDP_ITC.2: 19
    • FDP_ITT.1: 1
    • FDP_SDC.1: 5
    • FDP_SDI.2: 2
    • FDP_UCT.1: 9
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 11
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 10
    • FIA_AFL.1: 1
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_API: 14
    • FIA_API.1: 11
    • FIA_API.1.1: 1
    • FIA_ATD: 7
    • FIA_ATD.1: 1
    • FIA_SOS.2: 1
    • FIA_UAU: 47
    • FIA_UAU.1: 3
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4: 1
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 1
    • FIA_UAU.6.1: 1
    • FIA_UID: 25
    • FIA_UID.1: 17
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM: 9
    • FMT_LIM.1: 27
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 25
    • FMT_LIM.2.1: 3
    • FMT_MSA: 8
    • FMT_MSA.1: 6
    • FMT_MSA.3: 5
    • FMT_MTD: 52
    • FMT_MTD.1: 5
    • FMT_MTD.3: 6
    • FMT_MTD.3.1: 1
    • FMT_SMF: 8
    • FMT_SMF.1: 49
    • FMT_SMF.1.1: 1
    • FMT_SMR: 13
    • FMT_SMR.1: 36
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 16
    • FPT_EMS.1: 18
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS: 7
    • FPT_FLS.1: 21
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 3
    • FPT_PHP.3: 15
    • FPT_PHP.3.1: 1
    • FPT_TST: 13
    • FPT_TST.1: 10
    • FPT_TST.1.1: 2
    • FPT_TST.1.2: 2
    • FPT_TST.1.3: 2
    • FPT_TST.2: 1
  • FRU:
    • FRU_FLT.2: 2
  • FTP:
    • FTP_ITC.1: 6
    • FTP_TRP.1: 5
  • FCS:
    • FCS_CKM: 23
    • FCS_CKM.1: 14
    • FCS_CKM.2: 4
    • FCS_CKM.4: 36
    • FCS_CKM.4.1: 1
    • FCS_COP: 54
    • FCS_COP.1: 10
  • FDP:
    • FDP_ACC: 31
    • FDP_ACC.1: 12
    • FDP_ACF: 26
    • FDP_ACF.1: 15
    • FDP_IFC: 24
    • FDP_IFC.1: 12
    • FDP_IFF: 24
    • FDP_IFF.1: 17
    • FDP_ITC.1: 15
    • FDP_ITC.2: 12
    • FDP_RIP.1: 9
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL: 18
    • FIA_AFL.1: 5
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 10
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 15
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5: 8
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.7: 9
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 15
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MSA: 45
    • FMT_MSA.1: 8
    • FMT_MSA.2: 10
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 15
    • FMT_SMF.1: 14
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 24
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 10
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 9
    • FPT_ITT.1.1: 1
    • FPT_PHP.1: 10
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 14
    • FPT_PHP.3.1: 1
    • FPT_TST.1: 12
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_TAB: 8
    • FTA_TAB.1: 1
  • FTP:
    • FTP_ITC: 8
    • FTP_ITC.1: 4
    • FTP_TRP: 9
    • FTP_TRP.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACODE-EVIDENCE: 3
    • A.ACODE-KEY-MANAGEMENT: 3
    • A.MRTD_: 1
  • D:
    • D.ACODE: 8
    • D.ACODE-ID: 3
    • D.ACODE_: 1
    • D.ACODE_CIPHEREDSIGNED: 7
    • D.ACODE_DEC-KEY: 4
    • D.ACODE_ENC-KEY: 2
    • D.ACODE_SGNGEN-KEY: 2
    • D.ACODE_SGNVER-: 1
    • D.ACODE_SGNVER-KEY: 4
  • O:
    • O.CONFID-ES-UPDATE: 1
    • O.CONFID-LOAD_ACODE: 4
    • O.RND: 1
    • O.SECURE_ACTIVATION_ACODE: 4
    • O.SECURE_AC_ACTIVATION: 1
    • O.SECURE_LOAD_ACODE: 9
    • O.TOE_IDENTIFICATION: 7
  • OE:
    • OE.ACODE-: 1
    • OE.ACODE-ENCRYPTION: 6
    • OE.ACODE-EVIDENCE: 5
    • OE.ACODE-KEY-MANAGEMENT: 6
    • OE.ACODE-SECURE_LOAD: 1
    • OE.ACODE-TRUSTED-: 1
    • OE.ACODE-TRUSTED-DEVELOPER: 5
    • OE.ACODE-VERIFICATION: 4
    • OE.ACODE_SECURE_LOAD: 4
    • OE.BAC-PP: 3
    • OE.BAC_PP: 2
    • OE.CODE-VERIFICATION: 1
    • OE.ENCRYPTION_ACODE: 1
    • OE.MRTD_: 2
  • OSP:
    • OSP: 1
  • T:
    • T.CONFID-: 1
    • T.CONFID-ACODE_LOAD: 2
    • T.FAKE-SGNVER-KEY: 3
    • T.INTEG-: 1
    • T.INTEG-ACODE_LOAD: 2
    • T.UNAUTHORIZED_ES_UPDATE: 3
    • T.WRONG-UPDATE-STATE: 3
  • A:
    • A.ADMIN: 3
    • A.CONNECTOR: 3
    • A.ENV: 6
    • A.PUSH_SERV: 1
    • A.PUSH_SERVER: 3
    • A.SAC: 6
    • A.SM: 5
  • O:
    • O.-: 1
    • O.AC-: 1
    • O.ACCESS_-: 2
    • O.ACCESS_CONTROL: 7
    • O.MANAGEMENT: 8
    • O.PIN_ENTRY: 6
    • O.PROTEC-: 1
    • O.PROTECTION: 7
    • O.SECURE_CHANNEL: 4
    • O.STATE: 8
  • OE:
    • OE.AD-: 1
    • OE.ADMIN: 5
    • OE.CONNECTOR: 7
    • OE.ENV: 14
    • OE.PUSH_SERVER: 2
    • OE.SAC: 10
    • OE.SM: 4
  • OSP:
    • OSP.PIN_ENTRY: 4
  • T:
    • T.COM: 3
    • T.DATA: 3
    • T.F-CON-: 1
    • T.F-CONNECTOR: 2
    • T.F-SAC: 7
    • T.PIN: 6
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 10
  • Thales:
    • Thales: 43
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 9
      • AES-256: 2
  • DES:
    • 3DES:
      • TDES: 5
      • Triple-DES: 6
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CMAC: 3
  • AES_competition:
    • AES:
      • AES: 7
      • AES128: 1
      • AES256: 1
    • HPC:
      • HPC: 10
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • DH: 5
      • Diffie-Hellman: 8
  • RSA:
    • RSA 1024: 1
  • ECC:
    • ECC:
      • ECC: 10
    • ECDH:
      • ECDHE: 3
    • ECDSA:
      • ECDSA: 5
  • FF:
    • DH:
      • Diffie-Hellman: 2
    • DSA:
      • DSA: 1
  • RSA:
    • RSA2048: 1
    • RSA4096: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-224: 2
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA1: 1
    • SHA2:
      • SHA256: 6
      • SHA384: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 5
  • MAC:
    • MAC: 6
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 21
  • IPsec:
    • IPsec: 1
  • TLS:
    • TLS:
      • TLS: 20
  • VPN:
    • VPN: 7
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 1
    • RNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • GCM:
    • GCM: 1
pdf_data/st_keywords/ecc_curve
  • Brainpool:
    • brainpoolP256r1: 1
    • brainpoolP384r1: 2
  • NIST:
    • secp256r1: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 7
    • Physical Tampering: 5
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 3
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 3
    • SPA: 1
    • physical probing: 3
  • other:
    • reverse engineering: 1
  • FI:
    • physical tampering: 7
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 2
  • BSI:
    • BSI 7500: 1
    • BSI TR-03120: 2
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 7
    • EF.DG1: 17
    • EF.DG14: 7
    • EF.DG15: 3
    • EF.DG16: 15
    • EF.DG2: 8
    • EF.DG3: 18
    • EF.DG4: 18
    • EF.DG5: 6
    • EF.SOD: 8
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 197: 2
    • FIPS PUB 197: 1
    • FIPS PUB 46-3: 1
    • FIPS180-2: 1
    • FIPS186-4: 2
    • FIPS46-3: 1
  • ICAO:
    • ICAO: 14
  • ISO:
    • ISO/IEC 14443: 4
    • ISO/IEC 7816: 2
    • ISO/IEC 7816-4: 1
  • NIST:
    • SP 800-67: 1
    • SP 800-90: 2
  • PKCS:
    • PKCS#1: 2
    • PKCS#3: 2
  • RFC:
    • RFC 2631: 1
    • RFC 3369: 1
  • SCP:
    • SCP03: 1
  • ISO:
    • ISO/IEC 14443: 2
  • PKCS:
    • PKCS #1: 1
  • RFC:
    • RFC3268: 3
    • RFC5246: 1
    • RFC5289: 3
    • RFC7251: 2
  • X509:
    • X.509: 6
pdf_data/st_metadata
  • /Author: Thales
  • /CreationDate: D:20210906101704+02'00'
  • /Creator: Microsoft® Word 2016
  • /Keywords: Security Target, CC, eTravel
  • /ModDate: D:20210906101704+02'00'
  • /Producer: Microsoft® Word 2016
  • /Title: Security Target eTravel Essential 1.2 - BAC, EAC and AA activated
  • pdf_file_size_bytes: 2100622
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 99
  • /Keywords: ORGA 6141, online;Security, Target;Sicherheitsvorgaben
  • /Subject: Security Target ORGA 6141 online
  • /Title: Common-Criteria 3.1-Document
  • pdf_file_size_bytes: 1835805
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 66
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different