name |
Voyager TDC 10G Switch - V2.0 |
Mobiles eHealth Kartenterminal ORGA 930 M online, 4.9.0: 1.0.0 |
category |
Network and Network-Related Devices and Systems |
Other Devices and Systems |
scheme |
US |
DE |
status |
archived |
active |
not_valid_after |
19.11.2020 |
17.01.2028 |
not_valid_before |
19.11.2018 |
18.01.2023 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10911-ci.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0596V3c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10911-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0596V3a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10911-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0596V3b_pdf.pdf |
manufacturer |
Klas Telecom, Inc. |
Worldlline Healthcare GmbH |
manufacturer_web |
https://www.klastelecom.com |
https://de.worldline.com |
security_level |
{} |
ADV_IMP.1, AVA_VAN.5, ADV_FSP.4, EAL3+, ADV_TDS.3, ALC_TAT.1 |
dgst |
6a5bcffadf014b67 |
a91d0202506bb11c |
heuristics/cert_id |
CCEVS-VR-VID-10911-2018 |
BSI-DSZ-CC-0596-V3-2023 |
heuristics/cert_lab |
US |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AGD_OPE.1, AGD_PRE.1, ASE_ECD.1, ATE_IND.1, AVA_VAN.1, ASE_OBJ.1, ASE_CCL.1, ALC_CMC.1, ADV_FSP.1, ALC_CMS.1, ASE_SPD.1, ASE_INT.1, ASE_TSS.1, ASE_REQ.1 |
AGD_OPE.1, ALC_DEL.1, AGD_PRE.1, ADV_FSP.4, ALC_DVS.1, ALC_TAT.1, ALC_LCD.1, ATE_DPT.1, ADV_IMP.1, ADV_ARC.1, ATE_IND.2, ALC_CMS.3, ALC_CMC.3, ADV_TDS.3, AVA_VAN.5, ATE_COV.2, ATE_FUN.1 |
heuristics/extracted_versions |
2.0 |
4.9.0, 1.0.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0596-V2-2018, BSI-DSZ-CC-0950-V2-2018 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0950-2017, BSI-DSZ-CC-0928-2018, BSI-DSZ-CC-0596-V2-2018, BSI-DSZ-CC-0950-V2-2018 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
48ac4778e4272298 |
854be21fba7a106c |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.0E.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0052b_pdf.pdf |
pdf_data/cert_filename |
st_vid10911-ci.pdf |
0596V3c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10911-2018: 1
|
- DE:
- BSI-DSZ-CC-0596-V3-2023: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 3: 1
- EAL 3 augmented: 1
- EAL 4: 1
|
pdf_data/cert_keywords/cc_sar |
|
- ADV:
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- ALC:
- AVA:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
- UL:
- UL Verification Services: 1
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20190523144612-04'00'
- /ModDate: D:20190523144612-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 181137
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, SMGW, Site Certification, Theben"
- /Subject: Common Criteria, Certification, Zertifizierung, SMGW, Site Certification, Theben
- /Title: Certificate BSI-DSZ-CC-0596-V3-2023
- pdf_file_size_bytes: 327524
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
st_vid10911-vr.pdf |
0596V3a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- US:
- cert_id: CCEVS-VID10911-VR-2018
- cert_item: Klas Telecom, Inc. VoyagerTDC 10G Switch v2.0
- cert_lab: US NIAP
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 3 augmented by AVA_VAN.5, ALC_TAT.1, ADV_TDS.3, ADV_IMP.1, ADV_FSP.4
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0596-V3-2023
- cert_item: Mobiles eHealth Kartenterminal ORGA 930 M online 4.9.0: 1.0.0
- cert_lab: BSI
- developer: Worldline Healthcare GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System (MobCT), Version 1.4, BSI-CC-PP-0052-2015, 24 September 2014
- US:
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0596-V2-: 1
- BSI-DSZ-CC-0596-V2-2018: 1
- BSI-DSZ-CC-0596-V3-2023: 14
- BSI-DSZ-CC-0928: 1
- BSI-DSZ-CC-0950-V2-2018: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0052-2015: 1
- BSI-CC-PP-0052-2015: 3
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 3: 4
- EAL 3 augmented: 3
- EAL 4: 4
- EAL 5+: 1
- EAL 6: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_FSP.4: 4
- ADV_IMP.1: 4
- ADV_TDS.3: 4
- ALC:
- ALC_DEL: 1
- ALC_FLR: 3
- ALC_TAT.1: 4
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.TRUSTED_ADMINISTRATOR: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- Lightship:
- UL:
- UL Verification Services: 2
|
- TUV:
- TÜV Informationstechnik: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
- NIST:
- NIST P-256: 3
- NIST P-384: 1
- P-256: 5
- P-384: 7
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- RFC:
- RFC 5424: 1
- RFC 791: 1
- RFC 792: 1
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 23: 1
- AIS 34: 1
- AIS 41: 1
- AIS 45: 1
- AIS 46: 1
- FIPS:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- PKCS:
- RFC:
- X509:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- GmbH [7] Evaluation Technical Report Summary, Version 2, 2023-01-06, TÜV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- from Evaluation of the Product ORGA v 6141 online and ORGA 930 online, Worldline Healthcare GmbH (confidential document) [10] Bedienungsanleitung Mobiles eHealth Kartenterminal ORGA 930 M online mit Firmware-Version 4.9: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20181120153417-05'00'
- /ModDate: D:20181120153417-05'00'
- pdf_file_size_bytes: 836833
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, SMGW, Site Certification, Theben"
- /Subject: Common Criteria, Certification, Zertifizierung, SMGW, Site Certification, Theben
- /Title: Certification Report BSI-DSZ-CC-0596-V3-2023
- pdf_file_size_bytes: 801696
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, https://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierungsreporte
- pdf_is_encrypted: False
- pdf_number_of_pages: 26
|
pdf_data/st_filename |
st_vid10911-st.pdf |
0596V3b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0596-V3-2022: 2
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0052: 1
- BSI-CC-PP-0032: 1
- BSI-CC-PP-0052: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 3: 4
- EAL 3 augmented: 3
- EAL3+: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 3
- ALC_CMS.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 5
- ADV_IMP.1: 5
- ADV_TDS.3: 5
- AGD:
- AGD_IAN: 2
- AGD_KAL: 2
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 5
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 5
- FAU_GEN.1.1: 9
- FAU_GEN.1.2: 1
- FAU_GEN.2: 3
- FAU_GEN.2.1: 1
- FAU_STG_EXT: 7
- FAU_STG_EXT.1: 3
- FAU_STG_EXT.1.1: 2
- FAU_STG_EXT.1.2: 5
- FAU_STG_EXT.1.3: 12
- FCO:
- FCO_CPC_EXT.1: 1
- FCO_CPC_EXT.1.2: 1
- FCS:
- FCS_CKM.1: 8
- FCS_CKM.1.1: 7
- FCS_CKM.2: 5
- FCS_CKM.2.1: 4
- FCS_CKM.4: 5
- FCS_CKM.4.1: 1
- FCS_COP: 18
- FCS_COP.1: 13
- FCS_RBG_EXT: 2
- FCS_RBG_EXT.1: 4
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 3
- FCS_SSHC_EXT.1: 4
- FCS_SSHC_EXT.1.1: 1
- FCS_SSHC_EXT.1.2: 3
- FCS_SSHC_EXT.1.4: 1
- FCS_SSHC_EXT.1.5: 5
- FCS_SSHC_EXT.1.6: 2
- FCS_SSHC_EXT.1.7: 1
- FCS_SSHC_EXT.1.8: 2
- FCS_SSHC_EXT.1.9: 4
- FCS_SSHC_EXTS.1.1: 1
- FCS_SSHS_EXT.1: 3
- FCS_SSHS_EXT.1.1: 2
- FCS_SSHS_EXT.1.2: 3
- FCS_SSHS_EXT.1.4: 4
- FCS_SSHS_EXT.1.5: 4
- FCS_SSHS_EXT.1.6: 2
- FCS_SSHS_EXT.1.7: 1
- FCS_SSHS_EXT.1.8: 2
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 4
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.1.1: 1
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 12
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT.1: 16
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FMT:
- FMT_MOF: 27
- FMT_MOF.1: 7
- FMT_MTD: 7
- FMT_MTD.1: 11
- FMT_SMF.1: 8
- FMT_SMF.1.1: 4
- FMT_SMR.2: 6
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 2
- FMT_SMR.2.3: 3
- FPT:
- FPT_APW_EXT: 1
- FPT_APW_EXT.1: 4
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_ITT.1: 5
- FPT_SKP_EXT: 1
- FPT_SKP_EXT.1: 4
- FPT_SKP_EXT.1.1: 1
- FPT_STM_EXT: 1
- FPT_STM_EXT.1: 4
- FPT_STM_EXT.1.1: 1
- FPT_STM_EXT.1.2: 2
- FPT_TRP: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 4
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.2: 1
- FPT_TUD_EXT: 1
- FPT_TUD_EXT.1: 5
- FPT_TUD_EXT.1.1: 3
- FPT_TUD_EXT.1.2: 5
- FPT_TUD_EXT.1.3: 6
- FPT_TUD_EXT.2: 1
- FPT_TUD_EXT.2.2: 2
- FTA:
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTA_SSL.4: 4
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 6
- FTA_SSL_EXT.1.1: 1
- FTA_TAB: 1
- FTA_TAB.1: 8
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 14
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_ITC_EXT.1: 1
- FTP_TRP: 6
- FTP_TRP.1: 5
|
- FCS:
- FCS_CKM.1: 22
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 24
- FCS_CKM.4.1: 1
- FCS_COP: 37
- FCS_COP.1: 8
- FDP:
- FDP_ACC.1: 24
- FDP_ACC.1.1: 1
- FDP_ACF.1: 17
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_IFC: 48
- FDP_IFC.1: 13
- FDP_IFF: 45
- FDP_IFF.1: 26
- FDP_ITC.1: 24
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 11
- FDP_RIP: 12
- FDP_RIP.1: 2
- FDP_SDI.1: 1
- FDP_SDI.2: 7
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_SVR: 2
- FDP_SVR.1: 11
- FDP_SVR.1.1: 5
- FDP_SVR.1.2: 3
- FDP_SVR.1.3: 3
- FIA:
- FIA_AFL: 15
- FIA_AFL.1: 4
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU.1: 15
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 9
- FIA_UAU.5.1: 2
- FIA_UAU.5.2: 2
- FIA_UAU.7: 9
- FIA_UAU.7.1: 2
- FIA_UID.1: 15
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MSA.1: 9
- FMT_MSA.1.1: 1
- FMT_MSA.3: 26
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 6
- FMT_MTD.1: 12
- FMT_MTD.1.1: 1
- FMT_MTD.3: 6
- FMT_MTD.3.1: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 21
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_PHP.1: 6
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_STM.1: 11
- FPT_STM.1.1: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 8
- FTA_SSL.3.1: 2
- FTA_SSL.4: 8
- FTA_SSL.4.1: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.TRUSTED_ADMINISTRATOR: 1
- D:
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
- A:
- A.ADMIN: 3
- A.CARDS: 4
- A.DEVELOPER: 2
- A.DMS: 4
- A.ENVIRONME: 1
- A.ENVIRONMENT: 2
- A.MEDIC: 3
- A.PHYSICAL: 2
- O:
- O.AUTH_STATE: 9
- O.DMS_CONNECT: 1
- O.DMS_CONNECTION: 5
- O.LOG_CARDS: 3
- O.LOG_DATA: 7
- O.MANAGEMENT: 10
- O.PIN: 7
- O.PROTECTION: 8
- O.RESIDUAL: 6
- O.SEALING: 3
- O.SELFTESTS: 6
- O.TIME: 6
- O.TRANSFER: 3
- OE:
- OE.ADMIN: 9
- OE.CARDS: 7
- OE.DEVELOPER: 2
- OE.DMS: 5
- OE.ENVIRONMENT: 6
- OE.MEDIC: 9
- OE.PHYSICAL: 6
- OSP:
- OSP.DMS_CONN: 1
- OSP.DMS_CONNE: 1
- OSP.DMS_CONNECTION: 1
- OSP.EMERGENCY: 1
- OSP.EMERGENCY_: 1
- OSP.EMERGENCY_DATA: 1
- OSP.LOG_CARDS: 3
- OSP.LOG_DATA: 4
- OSP.SEALING: 3
- OSP.SELFTESTS: 3
- OSP.TIME: 3
- OSP.TRANSFER: 3
- T:
- T.ACCESS: 3
- T.ADMIN_PIN: 3
- T.AUTH_STATE: 3
- T.DATA: 3
- T.FIRMWARE: 3
- T.MAN_HW: 4
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
- UL:
- UL Verification Services: 1
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 15
- HMAC-SHA-256: 1
- HMAC-SHA-512: 1
|
- AES_competition:
- AES:
- AES: 10
- AES-: 1
- AES-256: 1
- HPC:
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 6
- DHE: 1
- Diffie-Hellman: 11
- DSA:
- RSA:
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-256: 6
- SHA-384: 2
- SHA-512: 2
- SHA2: 2
|
|
pdf_data/st_keywords/crypto_scheme |
- KEX:
- Key Exchange: 1
- Key exchange: 1
- MAC:
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- NIST P-256: 4
- NIST P-384: 2
- P-256: 18
- P-384: 16
- P-521: 8
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI 7500: 1
- BSI 7586: 1
- BSI TR-03116-1: 1
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- FIPS:
- FIPS 140-2: 2
- FIPS 186-4: 7
- FIPS PUB 186-4: 4
- ISO:
- ISO/IEC 10118: 2
- ISO/IEC 14888-3: 2
- ISO/IEC 18031:2011: 3
- ISO/IEC 9796-2: 1
- NIST:
- NIST SP 800-56A: 1
- NIST SP 800-56B: 1
- SP 800-131A: 1
- SP 800-56A: 1
- SP 800-56B: 1
- PKCS:
- RFC:
- RFC 3526: 6
- RFC 4251: 1
- RFC 4253: 8
- RFC 5424: 2
- RFC 5647: 10
- RFC 6668: 2
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the evaluation activity for this requirement. RFC 5647 only applies to the RFC compliant: 2
- out of scope: 2
|
- OutOfScope:
- done by an authorised card that is out of scope of this ST: 1
- out of scope: 1
- the TOE • Signature generation for emergency data1 on the eHC (done by an authorised card that is out of scope of this ST) 1.4.6 Physical Protection of the TOE The TOE cannot counter physical attacks concerning: 1
|
pdf_data/st_metadata |
- /Author: Bethany Henderson
- /Company:
- /CreationDate: D:20181119065151-08'00'
- /Creator: Acrobat PDFMaker 19 for Word
- /ModDate: D:20181119065211-08'00'
- /Producer: Adobe PDF Library 19.8.103
- /SourceModified: D:20181119145123
- pdf_file_size_bytes: 804298
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 100
|
- /Author: gematik GmbH
- /Title: ORGA 900 Security Target
- pdf_file_size_bytes: 955165
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 77
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |