name |
Logiciel Mistral Gateway IPSec version 9.0.7.2 |
CHERRY eHealth Terminal ST-1506, FW 4.0.0, HW 4.0.0 |
category |
Network and Network-Related Devices and Systems |
Other Devices and Systems |
scheme |
FR |
DE |
status |
active |
active |
not_valid_after |
28.06.2026 |
05.06.2028 |
not_valid_before |
28.06.2021 |
06.06.2023 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2021_32.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1124V3c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_32fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1124V3a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_32en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1124V3b_pdf.pdf |
manufacturer |
Thalès Communications |
Cherry GmbH |
manufacturer_web |
https://www.thalescomminc.com/ |
https://www.cherrycorp.com/ |
security_level |
AVA_VAN.3, ALC_FLR.3, EAL3+ |
EAL3, AVA_VAN.4, ADV_TDS.3, ADV_IMP.1, ALC_TAT.1, ADV_FSP.4 |
dgst |
7bd6afa58e49bd4d |
37bd19fc1419613b |
heuristics/cert_id |
ANSSI-CC-2021/32 |
BSI-DSZ-CC-1124-V3-2023 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_IMP.1, ALC_CMC.3, ADV_ARC.1, ADV_FSP.4, ATE_IND.2, AGD_PRE.1, AVA_VAN.3, AGD_OPE.1, ALC_CMS.3, ASE_REQ.2, ASE_ECD.1, ATE_COV.2, ALC_FLR.3, ASE_SPD.1, ASE_OBJ.2, ADV_TDS.3, ASE_INT.1, ASE_TSS.1, ALC_DEL.1, ATE_DPT.1, ALC_DVS.1, ASE_CCL.1, ALC_LCD.1, ATE_FUN.1 |
ADV_IMP.1, ADV_ARC.1, ALC_CMC.3, AVA_VAN.4, ADV_FSP.4, ATE_IND.2, AGD_PRE.1, AGD_OPE.1, ALC_CMS.3, ASE_REQ.2, ASE_ECD.1, ASE_OBJ.2, ASE_SPD.1, ATE_COV.2, ADV_TDS.3, ASE_INT.1, ASE_TSS.1, ALC_DEL.1, ATE_DPT.1, ALC_DVS.1, ALC_TAT.1, ASE_CCL.1, ALC_LCD.1, ATE_FUN.1 |
heuristics/extracted_versions |
9.0.7.2 |
4.0.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1124-V2-2022 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1124-2021, BSI-DSZ-CC-1124-V2-2022 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
NSCIB-CC-180212-CR5 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
NSCIB-CC-180212-CR5 |
heuristics/protection_profiles |
{} |
e1444c335eeed890 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0032V2b_pdf.pdf |
pdf_data/cert_filename |
certificat-2021_32.pdf |
1124V3c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1124-V3-2023: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 3: 1
- EAL 3 augmented: 1
- EAL 4: 1
|
pdf_data/cert_keywords/cc_sar |
|
- ADV:
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- ALC:
- AVA:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate: D:20210720171317+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20210720171317+02'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 299643
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, eHealth, Cherry, Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01"
- /Subject: Common Criteria, Certification, Zertifizierung, eHealth, Cherry, Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01
- /Title: Certificate BSI-DSZ-CC-1124-V3-2023
- pdf_file_size_bytes: 348337
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
anssi-cc-2021_32fr.pdf |
1124V3a_pdf.pdf |
pdf_data/report_frontpage |
|
- FR:
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.4 valid until: 5 June 2028
- cc_version: PP conformant Common Criteria Part 2 conformant
- cert_id: BSI-DSZ-CC-1124-V3-2023
- cert_item: CHERRY eHealth Terminal ST-1506 FW 4.0.0, HW 4.0.0
- cert_lab: BSI
- developer: Cherry Digital Health GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC- PP-0032-V2-2015-MA-01, 22 May 2017
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1124-V2-: 1
- BSI-DSZ-CC-1124-V2-2022: 2
- BSI-DSZ-CC-1124-V3-2023: 15
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0032-V2-2015-MA-: 1
- BSI-CC-PP-0032-V2-2015-MA-01: 2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 3
- EAL 5: 1
- EAL 7: 1
- EAL2: 3
- EAL3: 2
- EAL4: 1
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 3: 4
- EAL 3 augmented: 3
- EAL 4: 4
- EAL3+: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 2
- ALC_FLR.3: 3
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_FSP.4: 4
- ADV_IMP.1: 4
- ADV_TDS.3: 4
- ALC:
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_FLR: 3
- ALC_TAT.1: 4
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 1
- FCS_COP.1: 5
- FIA:
- FMT:
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- DH:
- DH: 1
- DHE: 2
- Diffie-Hellman: 2
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA2:
- SHA-2: 2
- SHA-256: 4
- SHA256: 5
- SHA384: 2
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
- SSH:
- TLS:
- TLS:
- TLS: 2
- TLS 1.2: 2
- TLS v1.2: 1
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 2
- brainpoolP384r1: 5
- NIST:
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
|
- BSI:
- FIPS:
- FIPS 180-4: 5
- FIPS 197: 2
- FIPS PUB 180-2: 2
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- PKCS:
- RFC:
- RFC 4226: 1
- RFC 4492: 1
- RFC 5246: 2
- RFC 5639: 1
- RFC 8017: 2
- X509:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 14] Common-Criteria-3.1 Dokument ALC_DEL.1, Version 1.1, 2023-01-27, Cherry Digital Health GmbH, (confidential document) C Excerpts from the Criteria For the meaning of the assurance components and levels the following: 1
- 2023-01-31, ALC_CMS_SW, V2.0, 2023-03-27, BOM, V4.0.0, 2023-02-01, Bibliography V5.4, 2023-04-19 (confidential documents) [10] eHealth Terminal ST-1506 – Kurzanleitung für Benutzer (Teilenummer:64410078), Version 05: 1
- Health GmbH [7] Evaluation Technical Report, Version 1, 2023-04-20, TÜV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /Author:
- /CreationDate: D:20210720171215+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20210720171215+02'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 188301
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, eHealth, Cherry, Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01"
- /Subject: Common Criteria, Certification, Zertifizierung, eHealth, Cherry, Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01
- /Title: Certification Report BSI-DSZ-CC-1124-V3-2023
- pdf_file_size_bytes: 748722
- pdf_hyperlinks: https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierung, https://www.cherry.de/eHealth, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/AIS, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 28
|
pdf_data/st_filename |
anssi-cible-cc-2021_32en.pdf |
1124V3b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- NL:
- CC-01: 1
- CC-02: 2
- CC-03: 2
|
- NL:
- NSCIB-CC-180212-CR2: 2
- NSCIB-CC-180212-CR5: 2
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0032-V2-2015-MA01: 4
- BSI-CC-PP-0098: 1
- BSI-CC-PP-0098-2018: 1
- BSI-CC-PP-0098-2020: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL3: 4
- EAL3 augmented: 1
- EAL3+: 4
|
- EAL:
- EAL 3: 3
- EAL 3 augmented: 2
- EAL3: 1
- EAL3 augmented: 1
- EAL3+: 1
- EAL6+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 6
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.3: 9
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.1: 2
- ADV_TDS.2: 3
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 10
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.3: 2
- ALC_CMS.1: 1
- ALC_CMS.3: 2
- ALC_DEL.1: 2
- ALC_DVS.1: 3
- ALC_FLR.3: 6
- ALC_LCD.1: 4
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 5
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 4
- ASE_TSS.1: 2
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 4
- ATE_DPT.1: 3
- ATE_FUN.1: 6
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 5
- ADV_IMP.1: 6
- ADV_TDS.3: 5
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 5
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 16
- FAU_GEN.1: 16
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_STG: 6
- FAU_STG.1: 1
- FAU_STG.3: 1
- FAU_STG_EXT: 13
- FAU_STG_EXT.1: 13
- FAU_STG_EXT.1.1: 2
- FAU_STG_EXT.1.2: 2
- FAU_STG_EXT.1.3: 4
- FAU_STG_EXT.2: 2
- FAU_STG_EXT.4: 3
- FCO:
- FCO_CPC_EXT: 2
- FCO_CPC_EXT.1: 12
- FCO_CPC_EXT.1.1: 3
- FCO_CPC_EXT.1.2: 3
- FCO_CPC_EXT.1.3: 3
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 48
- FCS_CKM.1.1: 1
- FCS_CKM.2: 13
- FCS_CKM.2.1: 1
- FCS_CKM.4: 23
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 13
- FCS_CKM_EXT.5: 17
- FCS_CKM_EXT.5.1: 1
- FCS_CKM_EXT.5.2: 1
- FCS_CKM_EXT.5.3: 1
- FCS_COP: 101
- FCS_COP.1: 18
- FCS_RBG_EXT: 2
- FCS_RBG_EXT.1: 21
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_TLSC_EXT: 4
- FCS_TLSC_EXT.1: 1
- FCS_TLSC_EXT.2: 10
- FCS_TLSC_EXT.2.1: 2
- FCS_TLSC_EXT.2.2: 2
- FCS_TLSC_EXT.2.3: 2
- FCS_TLSC_EXT.2.4: 2
- FCS_TLSC_EXT.2.5: 2
- FCS_TLSS_EXT: 4
- FCS_TLSS_EXT.2: 6
- FCS_TLSS_EXT.2.1: 2
- FCS_TLSS_EXT.2.2: 2
- FCS_TLSS_EXT.2.3: 2
- FCS_TLSS_EXT.2.4: 2
- FCS_TLSS_EXT.2.5: 2
- FCS_TLSS_EXT.2.6: 2
- FDP:
- FDP_ACC.1: 5
- FDP_ETC: 2
- FDP_ETC.2: 8
- FDP_IFC: 19
- FDP_IFC.1: 9
- FDP_IFF: 16
- FDP_IFF.1: 14
- FDP_ITC: 13
- FDP_ITC.1: 16
- FDP_ITC.2: 26
- FDP_RIP.2: 5
- FDP_RIP.2.1: 1
- FDP_UCT.1: 8
- FDP_UCT.1.1: 1
- FDP_UIT.1: 10
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT: 2
- FIA_PMG_EXT.1: 9
- FIA_PMG_EXT.1.1: 2
- FIA_UAU.1: 2
- FIA_UAU.6: 6
- FIA_UAU.6.1: 1
- FIA_UAU.7: 7
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 2
- FIA_UAU_EXT.2: 10
- FIA_UAU_EXT.2.1: 2
- FIA_UIA: 1
- FIA_UIA_EXT: 4
- FIA_UIA_EXT.1: 14
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FIA_UID.1: 5
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF: 10
- FMT_MOF.1: 2
- FMT_MSA.1: 1
- FMT_MSA.3: 14
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 8
- FMT_MTD.1.1: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 4
- FMT_SMR.2: 7
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT: 2
- FPT_APW_EXT.1: 10
- FPT_APW_EXT.1.1: 2
- FPT_APW_EXT.1.2: 2
- FPT_FLS.1: 6
- FPT_FLS.1.1: 1
- FPT_PTD: 1
- FPT_RCV.1: 5
- FPT_RCV.1.1: 1
- FPT_RCV.2: 5
- FPT_RCV.2.1: 1
- FPT_RCV.2.2: 1
- FPT_SDP_EXT: 3
- FPT_SDP_EXT.2: 10
- FPT_SDP_EXT.2.1: 2
- FPT_SDP_EXT.2.2: 2
- FPT_SKP_EXT: 2
- FPT_SKP_EXT.1: 9
- FPT_SKP_EXT.1.1: 3
- FPT_STM: 2
- FPT_STM.1: 1
- FPT_STM_EXT: 2
- FPT_STM_EXT.1: 15
- FPT_STM_EXT.1.1: 2
- FPT_STM_EXT.1.2: 2
- FPT_TDC: 11
- FPT_TDC.1: 7
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 9
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 10
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FTA:
- FTA_SSL: 1
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTA_SSL.4: 6
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 3
- FTA_SSL_EXT.1: 11
- FTA_SSL_EXT.1.1: 2
- FTA_TAB.1: 9
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 19
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 10
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FCS:
- FCS_CKM: 24
- FCS_CKM.1: 14
- FCS_CKM.2: 4
- FCS_CKM.4: 32
- FCS_CKM.4.1: 1
- FCS_COP: 52
- FCS_COP.1: 10
- FDP:
- FDP_ACC: 27
- FDP_ACC.1: 12
- FDP_ACF: 27
- FDP_ACF.1: 14
- FDP_IFC: 21
- FDP_IFC.1: 13
- FDP_IFF: 22
- FDP_IFF.1: 16
- FDP_ITC.1: 15
- FDP_ITC.2: 12
- FDP_RIP.1: 9
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 2
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 7
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 8
- FIA_UAU.7.1: 1
- FIA_UID.1: 14
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MSA: 40
- FMT_MSA.1: 8
- FMT_MSA.2: 10
- FMT_MSA.2.1: 1
- FMT_MSA.3: 14
- FMT_SMF.1: 14
- FMT_SMF.1.1: 1
- FMT_SMR.1: 24
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_ITT.1: 8
- FPT_ITT.1.1: 1
- FPT_PHP.1: 10
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 11
- FPT_PHP.3.1: 1
- FPT_TST.1: 10
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTP:
- FTP_ITC: 7
- FTP_ITC.1: 4
- FTP_TRP: 8
- FTP_TRP.1: 3
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS_CONTROL_MANAGEMENT_DE: 1
- A.ACCESS_CONTROL_MANAGEMENT_DEVICES: 1
- A.ADMINISTRATION_NETWORK: 1
- A.ADMIN_CREDENTIALS_SECURE: 2
- A.ALARM: 2
- A.AUDIT: 2
- A.DATA_TRANSPORTATION: 2
- A.LIMITED_FUNCTIONALITY: 2
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.NO_TRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_ENV_MANAGEMENT_DEVIC: 1
- A.PHYSICAL_ENV_MANAGEMENT_DEVICES: 1
- A.PHYSICAL_PROTECTION: 1
- A.POLICIES_CONTINUITY: 1
- A.REGULAR_UPDATES: 2
- A.SECURED_MANAGEMENT_DEVICES: 1
- A.SS_MMC_TO_TOE: 1
- A.TOE_ERASURE: 1
- A.TRUSTED_ADMINISTRATOR: 1
- O:
- O.AUDIT: 14
- O.AUDIT_PROTECTION: 5
- O.AUTHENTICATION_FAILURE: 9
- O.BOOT_CONTROL: 5
- O.CERTIFICATE_INJECTION: 4
- O.CRYPTO_PERIOD: 8
- O.CRYPTO_REGULATION: 7
- O.DATA_ERASURE: 8
- O.DISPLAY_BANNER: 6
- O.LOCAL_DATA_PROTECTION: 14
- O.MANAGEMENT: 7
- O.POL_DEFAULT: 12
- O.POL_FILTERING: 8
- O.PROTECTED_COMMUNICATI: 1
- O.PROTECTED_COMMUNICATION: 2
- O.PROTECTED_COMMUNICATIONS: 12
- O.RESIDUAL_INFORMATION_C: 1
- O.RESIDUAL_INFORMATION_CLEAR: 4
- O.ROLES: 10
- O.SELF_TEST: 11
- O.SESSION_LOCK: 4
- O.SOFTWARE_UPDATES: 8
- O.SUPERVISION: 6
- O.SUPERVISION_IMPACT: 8
- O.TIME_BASE: 4
- O.VIEW_RULES: 11
- OE:
- OE.ACCESS_CONTROL_MANA: 1
- OE.ACCESS_CONTROL_MANAGEMENT_D: 1
- OE.ACCESS_CONTROL_MANAGEMENT_DEVICE: 2
- OE.ACCESS_CONTROL_MANAGEMENT_DEVICES: 2
- OE.ADMIN_CREDENTIALS_SEC: 1
- OE.ADMIN_CREDENTIALS_SECURE: 3
- OE.ALARM: 3
- OE.AUDIT: 2
- OE.AUDIT_RECORD: 3
- OE.DATA_TRANSPORTATION: 4
- OE.LMGT_CONNECTION: 5
- OE.NO_GENERAL_PURPOSE: 2
- OE.NO_THRU_TRAFFIC_PROTECTION: 2
- OE.PHYSICAL: 2
- OE.PHYSICAL_ENV_MANAGEM: 1
- OE.PHYSICAL_ENV_MANAGEMENT_DEVIC: 1
- OE.PHYSICAL_ENV_MANAGEMENT_DEVICES: 3
- OE.POLICIES_CONTINUITY: 2
- OE.SECURED_MANAGEMENT_: 1
- OE.SECURED_MANAGEMENT_DEVICES: 4
- OE.SS_MMC_TO_TOE: 5
- OE.TIME_TOE: 3
- OE.TOE_ERASURE: 5
- OE.TOE_INTEGRITY: 7
- OE.TOE_PRODUCTION: 3
- OE.TRUSTED_ADMIN: 3
- OE.UPDATES: 4
- T:
- T.MISUSE: 5
- T.PASSWORD_CRACKING: 5
- T.RESIDUAL_DATA: 5
- T.SECURITY_FUNCTIONALITY: 2
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 3
- T.SECURITY_FUNCTIONALITY_FAILURE: 3
- T.TIME_BASE: 3
- T.TOE_CAPTURE: 5
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 3
- T.UNDETECTED_ACTIVITY: 5
- T.UNTRUSTED_COMMUNICATI: 2
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 3
- T.UPDATE_COMPROMISE: 5
- T.USER_DATA_REUSE: 3
- T.WEAK_AUTHENTICATION_EN: 2
- T.WEAK_AUTHENTICATION_ENDPOINTS: 3
- T.WEAK_CRYPTOGRAPHY: 3
|
- A:
- A.ADMIN: 3
- A.CONNECTOR: 3
- A.ENV: 7
- A.PUSH_SERVER: 4
- A.SM: 4
- O:
- O.ACCESS_CONTROL: 9
- O.MANAGEMENT: 8
- O.PIN_ENTRY: 6
- O.PROTECTION: 9
- O.SECURE_CHANNEL: 4
- O.STATE: 7
- OE:
- OE.ADMIN: 4
- OE.CONNECTOR: 6
- OE.ENV: 11
- OE.PUSH_SERVER: 4
- OE.SM: 2
- OSP:
- T:
- T.COM: 3
- T.DATA: 3
- T.F-CONNECTOR: 4
- T.PIN: 6
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 3
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA256: 1
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 23
- IKEv1: 5
- IKEv2: 21
- IPsec:
- SSH:
- TLS:
- DTLS:
- SSL:
- SSL: 4
- SSL 2.0: 1
- SSL 3.0: 2
- SSL2.0: 1
- TLS:
- TLS: 53
- TLS 1.0: 2
- TLS 1.1: 4
- TLS 1.2: 5
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 1
- curve P-256: 1
- secp256r1: 8
- secp384r1: 2
- secp521r1: 2
|
- Brainpool:
- brainpoolP256r1: 3
- brainpoolP384r1: 2
- NIST:
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
|
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 4
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 4
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- ISO:
- ISO/IEC 18031:2011: 4
- ISO/IEC 9796-2: 1
- ISO/IEC 9797-: 2
- PKCS:
- RFC:
- RFC 2986: 2
- RFC 4106: 2
- RFC 4109: 1
- RFC 4301: 2
- RFC 4303: 2
- RFC 4304: 1
- RFC 4346: 2
- RFC 4868: 3
- RFC 4945: 2
- RFC 5246: 4
- RFC 5280: 5
- RFC 5282: 2
- RFC 5759: 2
- RFC 6125: 2
- RFC 6960: 1
- RFC 7296: 3
- RFC5289: 2
- X509:
|
- BSI:
- FIPS:
- PKCS:
- RFC:
- RFC 5246: 3
- RFC 5289: 1
- RFC 8017: 1
- RFC 8422: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- Out of scope: 1
- System Remote Admin Interface VS9 Management Center Monitoring tools TPM Target of evaluation Out of scope of evaluation SECURITY TARGET FOR MISTRAL VS9.0 GATEWAY SOFTWARE (CDS) MISTRAL VS9.0 GATEWAY: 1
- of the Mistral system are considered as part of the operational environment. Hardware equipment is out of scope of the Target of Evaluation described in this Security Target. Following enabling elements, the: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
- /Author: T0159776
- /CreationDate: D:20210607172705+02'00'
- /Creator: PDFCreator Free 4.2.0
- /Keywords:
- /ModDate: D:20210607172705+02'00'
- /Producer: GPL Ghostscript 9.52
- /Subject:
- /Title: CDS_Mistral IPVS9.0_63535113-306_-Llite
- pdf_file_size_bytes: 981294
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 119
|
- /Author: Cherry Digital Health GmbH
- /Keywords: Cherry, Digital, Health, GmbH;, eHealth, Terminal
- /Subject: Cherry Digital Health GmbH, eHealth Terminal
- /Title: Security Target EAL3+ for eHealth Terminal ST-1506
- pdf_file_size_bytes: 1137551
- pdf_hyperlinks: http://www.cherry.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 77
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |