name |
Symfoware Server Enterprise extended Edtion 4.0 |
Electronic Health Card Version 2.20 |
category |
Databases |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
DE |
status |
archived |
archived |
not_valid_after |
10.12.2010 |
01.09.2019 |
not_valid_before |
26.11.2003 |
28.12.2009 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/files/epfiles/c0003.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0663a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/files/epfiles/ |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0663b_pdf.pdf |
manufacturer |
Fujitsu Limited |
Gemalto |
manufacturer_web |
|
https://www.gemalto.com/ |
security_level |
EAL4 |
EAL4+ |
dgst |
838302a6efb2acdd |
5308c187050df0d6 |
heuristics/cert_id |
JISEC-CC-CRP-C0003 |
BSI-DSZ-CC-0663-2009 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ATE_COV.2, ADV_RCR.1, ALC_TAT.1, AVA_VLA.4, ATE_DPT.2, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_SOF.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_DVS.2, ALC_LCD.1, ADV_IMP.2, ADV_FSP.2, ADV_SPM.1, AVA_MSU.3 |
heuristics/extracted_versions |
4.0 |
2.20 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0628-2009, BSI-DSZ-CC-0425-2009 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0437-2008, BSI-DSZ-CC-0425-2009, BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0399-2007, BSI-DSZ-CC-0628-2009, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0223-2003 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0003
- certification_date: 01.11.2003
- claim: EAL4
- enhanced:
- assurance_level: EAL4
- description: PRODUCT DESCRIPTION Symfoware Server is Fujitsu's relational database management system designed for enterprise business. Symfoware Server processes huge data speedily during user's working and also user can use it effectively for their own business style. Using SQL language, user is able to define the data structure, and access to the structured data. Symforeware Server runs on Solaris 7.
- evaluation_facility: JEITA IT Security Center
- product: Symfoware Server Enterprise extended Edition 4.0
- product_type: IT product (Database Management Product)
- vendor: Fujitsu Limited
- expiration_date: 01.01.2011
- supplier: Fujitsu Limited
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0003_it2004.html
- toe_japan_name: Symfoware Server Enterprise extended Edtion 4.0
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0003.pdf |
0663a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0663-2009
- cert_item: Electronic Health Card Version 2.20
- cert_lab: BSI
- developer: Gemalto
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0425-2009: 4
- BSI-DSZ-CC-0628: 1
- BSI-DSZ-CC-0628-2009: 2
- BSI-DSZ-CC-0663: 3
- BSI-DSZ-CC-0663-2009: 18
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP- 0002-2001: 1
- BSI-PP-0020-V2-2007-MA-02: 3
- BSI-PP-0020-V2-2007-MA02: 1
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 4: 9
- EAL 4 augmented: 3
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 6
- EAL5+: 2
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_IMP.2: 5
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_DVS.1: 1
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_VLA: 3
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon: 3
- Infineon Technologies AG: 1
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 20: 4
- AIS 25: 3
- AIS 26: 3
- AIS 32: 1
- AIS 34: 3
- AIS 35: 2
- AIS 36: 2
- AIS 37: 1
- AIS 38: 1
- FIPS:
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Electronic Health Card, TOE version 2.20, document version 1.6, 2009-11-26, Gemalto (confidential document) [7] Evaluation Technical Report, Version 3, Date: 2009-11-26, BSI-DSZ-CC-0663, Electronic Health: 1
- STD Configuration Check List For GeGKOS on INFINEON SLE66CX680 PE, version 3.0 2008-04-08, Gemalto (confidential documents) [9] Security Target BSI-DSZ-CC-0663, Document Reference: ASE12R10559 V0.9, Date 2009-11-27: 1
- Version 2.20 (confidential document) [8] Configuration list for the TOE: Configuration Check Electronic Health Card, version 1.0: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20040526154221+09'00'
- /ModDate: D:20040526154221+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12495
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20100201085808+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Electronic Health Card Version 2.20, Gemalto"
- /ModDate: D:20100202090815+01'00'
- /Producer: StarOffice 9
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0663-2009
- pdf_file_size_bytes: 716015
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
pdf_data/st_filename |
|
0663b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0425: 1
- BSI-DSZ-CC-0628: 3
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 16
- EAL4: 12
- EAL4 augmented: 3
- EAL5: 1
- EAL5 augmented: 1
- EAL5+: 4
|
pdf_data/st_keywords/cc_sar |
|
- ACM:
- ACM_AUT.1: 4
- ACM_CAP.3: 3
- ACM_CAP.4: 4
- ACM_SCP.1: 1
- ACM_SCP.2: 5
- ACM_XXX: 1
- ADO:
- ADO_DEL.2: 5
- ADO_IGS.1: 9
- ADV:
- ADV_FSP.1: 18
- ADV_FSP.2: 6
- ADV_HLD.1: 3
- ADV_HLD.2: 6
- ADV_IMP.1: 5
- ADV_IMP.2: 12
- ADV_LLD.1: 9
- ADV_RCR.1: 11
- ADV_SPM: 1
- ADV_SPM.1: 7
- AGD:
- AGD_ADM.1: 16
- AGD_USR: 2
- AGD_USR.1: 8
- ALC:
- ALC_DVS: 1
- ALC_DVS.1: 9
- ALC_DVS.2: 1
- ALC_LCD.1: 6
- ALC_TAT: 1
- ALC_TAT.1: 10
- ATE:
- ATE_COV.2: 6
- ATE_DPT.1: 4
- ATE_DPT.2: 1
- ATE_FUN.1: 11
- ATE_IND.2: 6
- AVA:
- AVA_MSU.3: 12
- AVA_SOF.1: 6
- AVA_VLA.4: 12
|
pdf_data/st_keywords/cc_sfr |
|
- FCS:
- FCS_CKM: 16
- FCS_CKM.1: 5
- FCS_CKM.2: 1
- FCS_CKM.4: 17
- FCS_CKM.4.1: 1
- FCS_COP: 51
- FCS_COP.1: 17
- FCS_COP.1.1: 1
- FCS_RND: 5
- FCS_RND.1: 18
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 6
- FDP_ACC.2: 21
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 2
- FDP_ACF: 15
- FDP_ACF.1: 15
- FDP_IFC.1: 3
- FDP_ITC.1: 8
- FDP_ITC.2: 8
- FDP_RIP: 6
- FDP_RIP.1: 5
- FDP_SDI: 11
- FDP_SDI.1: 1
- FDP_SDI.2: 12
- FDP_UCT.1: 11
- FDP_UIT: 10
- FDP_UIT.1: 12
- FIA:
- FIA_AFL: 13
- FIA_AFL.1: 10
- FIA_ATD: 1
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_UAU: 6
- FIA_UAU.1: 7
- FIA_UAU.4: 12
- FIA_UAU.4.1: 1
- FIA_UID: 10
- FIA_UID.1: 10
- FIA_UID.1.2: 2
- FMT:
- FMT_LIM: 6
- FMT_LIM.1: 19
- FMT_LIM.1.1: 2
- FMT_LIM.2: 18
- FMT_LIM.2.1: 1
- FMT_MSA: 1
- FMT_MSA.2: 9
- FMT_MSA.3: 3
- FMT_MTD: 39
- FMT_MTD.1: 17
- FMT_MTD.3: 4
- FMT_SMF: 18
- FMT_SMF.1: 9
- FMT_SMR: 17
- FMT_SMR.1: 13
- FPT:
- FPT_AMT.1: 1
- FPT_FLS: 1
- FPT_FLS.1: 11
- FPT_FLS.1.1: 2
- FPT_PHP: 4
- FPT_PHP.3: 11
- FPT_PHP.3.1: 1
- FPT_RVM.1: 13
- FPT_SEP.1: 12
- FPT_SEP.1.1: 2
- FPT_SEP.1.2: 1
- FPT_TST: 1
- FPT_TST.1: 12
- FPT_TST.1.1: 2
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FRU:
- FTP:
- FTP_ITC: 14
- FTP_ITC.1: 9
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 3
- FTP_ITC.1.3: 1
- FTP_TRP: 5
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 2
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
- Gemalto:
- Gemalto: 2
- Gemalto N.V: 2
- Infineon:
- Infineon Technologies AG: 3
|
pdf_data/st_keywords/eval_facility |
|
- TUV:
- TUV Informationstechnik: 1
- TÜViT: 1
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- RIPEMD:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-224: 1
- SHA-256: 6
- SHA-384: 1
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 12
- Physical Tampering: 2
- Physical tampering: 1
- fault injection: 1
- malfunction: 4
- physical tampering: 7
- SCA:
- physical probing: 4
- side channels: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- AIS 20: 3
- AIS 34: 2
- AIS 36: 1
- AIS20: 1
- AIS31: 3
- AIS36: 1
- CC:
- CCMB-2005-08-001: 3
- CCMB-2005-08-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS PUB 46-3: 1
- ISO:
- PKCS:
- PKCS #1: 1
- PKCS#1: 2
- PKCS1: 2
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: Gemalto
- /CreationDate: D:20091201152833+01'00'
- /Creator: PScript5.dll Version 5.2.2
- /Keywords: eHC : electronic HealthCard
eGK : electronische GesundheitKarte
GeGKos : Gemalto electronische GesundheitKarte operatin system
- /ModDate: D:20100201110137+01'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Subject: Electronic Health Card
- /Title: Security Target Lite - Electronic Health Card GEGKOS 2.20
- pdf_file_size_bytes: 846763
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 95
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
True |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |