Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Huawei SUN2000HA Software V300R001C00SPC608
2019-52-INF-3892
Electronic Health Card Terminal eHealth GT900Hardwareversion: 2.1.0 & 2.1.1, Firmwareversion:2.1.1
BSI-DSZ-CC-1171-V2-2024
name Huawei SUN2000HA Software V300R001C00SPC608 Electronic Health Card Terminal eHealth GT900Hardwareversion: 2.1.0 & 2.1.1, Firmwareversion:2.1.1
scheme ES DE
not_valid_after 20.09.2027 19.11.2029
not_valid_before 20.09.2022 20.11.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-52%20Certificado.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1171V2c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-52%20INF-3892.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1171V2a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-52%20ST.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1171V2b_pdf.pdf
manufacturer Huawei Technologies Co., Ltd. GT German Telematics Gesellschaft für Telematikdienste mbH
manufacturer_web https://www.huawei.com https://germantelematics.de/kontakt/
security_level EAL3+, ALC_FLR.2 ADV_FSP.4, AVA_VAN.4, ALC_TAT.1, ADV_IMP.1, EAL3+, ADV_TDS.3
dgst a74f7bdf3acd72d7 3d0411a8a2da5181
heuristics/cert_id 2019-52-INF-3892 BSI-DSZ-CC-1171-V2-2024
heuristics/cert_lab [] BSI
heuristics/extracted_sars ATE_COV.2, ASE_TSS.1, ASE_INT.1, ATE_FUN.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.2, ADV_ARC.1, ALC_CMC.3, ASE_CCL.1, ALC_FLR.2, ASE_REQ.2 ASE_INT.1, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, AVA_VAN.4, ASE_CCL.1
heuristics/extracted_versions - 2.1.1, 2.1.0
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-1171-2023
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-1171-2023
heuristics/scheme_data
  • category: Others
  • certification_date: 20.09.2022
  • enhanced:
    • category: Others
    • cc_version: Common Criteria 3.1 release 5
    • cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1595
    • certification_date: 20.09.2022
    • description: The TOE is the software running in the Operating System that is deployed into communication board inside Huawei SUN2000HA inverter, which is the access node of inverter. The TOE is a 'software only'. TOE consists of the software running on the Operating System of the SUN2000HA inverter chassis, but not the hardware. The TOE provides near-end maintenance through: Huawei mobile phone APP connected to the SUN2000HA inverter through the USB-WIFI Adapter stick inserted into the USB terminal. Smartlogger connected to the SUN2000HA inverter through the MBUS or RS485 with Modbus-RTU protocol (in the TOE evaluated configuration is used the RS485 port). The TOE provides the following major security features: Authentication and Authorization: Only authenticated users are allowed to log in to the TOE, query TOE data, and set TOE parameters. Only authorized users are able to execute the previous actions based on their privileges. If a user fails to be authenticated for multiple consecutive times, the user is locked for a period of time to prevent unauthorized access. Auditing: An operation log records the operation that an administrator has performed on the system and the result of the operation and is used for tracing and auditing. Security Management: The TOE provides four different user roles (Common user, Advanced user, Special user and Datalogger user). Also, the TOE provides: user password management, software upgrade, log exports and time settings.
    • evaluation_facility: DEKRA Testing and Certification S.A.U.
    • level: EAL3 + (ALC_FLR.2)
    • manufacturer: Huawei Technologies Co., Ltd.
    • report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1596
    • status: Certified
    • target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1594
    • type: Product
  • manufacturer: Huawei Technologies Co., Ltd.
  • product: Huawei SUN2000HA Software V300R001C00SPC608
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/872-huawei-sun2000ha-software-v300r001c00spc608
  • category: eHealth
  • cert_id: BSI-DSZ-CC-1171-V2-2024
  • certification_date: 20.11.2024
  • enhanced:
    • applicant: GT German Telematics Gesellschaft für Telematikdienste GmbH Libellenstraße 9 14129 Berlin
    • assurance_level: EAL3+,ADV_FSP.4,ADV_IMP.1,ADV_TDS.3,ALC_TAT.1,AVA_VAN.4
    • cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1171V2c_pdf.pdf?__blob=publicationFile&v=2
    • certification_date: 20.11.2024
    • description: The Target of Evaluation (TOE) is the eHealth Card Terminal GT900 Hardware version: 2.1.0, Firmware version: 2.0.1. It is an eHealth Card Terminal with 2 ID-1 Slots (HPC and eGK) and 2 ID-000 SMC Slots (supporting SMC-KT and SMC-B Cards), a disinfectable liquids resistant 20 key keypad also usable for secure pin entry and LAN + USB interfaces with interoperability to all eHealth Connectors TI 1.0 and to all High Speed Connectors (HSK) for TI 2.0 of the German Healthcare System.
    • entries: [frozendict({'id': 'BSI-DSZ-CC-1171-V2-2024 (Ausstellungsdatum / Certification Date 20.12.2024, gültig bis / valid until 19.12.2029) Zertifizierungsreport / Certification Report', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-1171-2023 (Ausstellungsdatum / Certification Date 30.03.2023, gültig bis / valid until 29.03.2028) Zertifizierungsreport / Certification Report', 'description': 'Certificate'})]
    • evaluation_facility: Deutsche Telekom Security GmbH (Bonn)
    • expiration_date: 19.11.2029
    • product: Electronic Health Card Terminal eHealth GT900 Hardwareversion: 2.1.0 & 2.1.1, Firmwareversion: 2.1.1
    • protection_profile: Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01, 22 May 2017
    • report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1171V2a_pdf.pdf?__blob=publicationFile&v=2
  • product: Electronic Health Card Terminal eHealth GT900 Hardwareversion: 2.1.0 & 2.1.1, Firmwareversion: 2.1.1
  • subcategory: Card reader
  • url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Gesundheitswesen_Kartenlesegeraete/1171.html
  • vendor: GT German Telematics Gesellschaft für Telematikdienste GmbH
heuristics/protection_profiles {} dea2c582af9c96e2
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP0032b.pdf
pdf_data/cert_filename 2019-52 Certificado.pdf 1171V2c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1171-V2-2024: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
    • EAL3: 1
  • EAL:
    • EAL 2: 1
    • EAL 3: 1
    • EAL 3 augmented: 1
    • EAL 4: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 2
    • ALC_FLR.2: 1
  • ADV:
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • ALC:
    • ALC_FLR: 1
    • ALC_TAT.1: 1
  • AVA:
    • AVA_VAN.4: 1
pdf_data/cert_keywords/cc_claims
  • A:
    • A.U: 1
  • O:
    • O.E: 1
  • T:
    • T.I: 1
pdf_data/cert_keywords/vendor
  • Huawei:
    • Huawei: 3
    • Huawei Technologies Co: 2
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 876880
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Author: Federal Office for Information Security
  • /Keywords: "Common Criteria, Certification, Zertifizierung"
  • /Subject: Common Criteria, Certification, Zertifizierung
  • /Title: Certificate BSI-DSZ-CC-1171-V2-2024
  • pdf_file_size_bytes: 231063
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 2019-52 INF-3892.pdf 1171V2a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.4 valid until: 19 November 2029
    • cc_version: PP conformant Common Criteria Part 2 conformant
    • cert_id: BSI-DSZ-CC-1171-V2-2024
    • cert_item: Electronic Health Card Terminal eHealth GT900 Hardwareversion: 2.1.0 & 2.1.1, Firmwareversion: 2.1.1
    • cert_lab: BSI
    • developer: GT German Telematics Gesell. für Telematik GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC- PP-0032-V2-2015-MA-01, 22 May 2017
pdf_data/report_keywords/cc_cert_id
  • ES:
    • 2019-52-INF-3892- v1: 1
  • DE:
    • BSI-DSZ-CC-1171-2023: 3
    • BSI-DSZ-CC-1171-V2-2024: 14
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0032-V2-2015-MA-01: 3
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL2: 1
    • EAL3: 8
    • EAL4: 1
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 3: 4
    • EAL 3 augmented: 3
    • EAL 4: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 3
    • ALC_FLR.2: 8
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_FSP.4: 4
    • ADV_IMP.1: 4
    • ADV_TDS.3: 4
  • ALC:
    • ALC_FLR: 3
    • ALC_TAT.1: 4
  • ATE:
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN.4: 4
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 3
    • FCS_CKM.1: 8
    • FCS_COP: 4
    • FCS_COP.1: 12
  • FDP:
    • FDP_ACF: 2
    • FDP_IFC: 2
    • FDP_IFF: 2
  • FIA:
    • FIA_UAU.5: 1
    • FIA_UAU.7: 1
  • FMT:
    • FMT_SMF.1: 1
  • FPT:
    • FPT_FLS.1: 2
    • FPT_PHP.1: 1
    • FPT_PHP.2: 1
    • FPT_TST.1: 1
  • FTP:
    • FTP_ITC: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.U: 4
  • A:
    • A.ENV: 1
pdf_data/report_keywords/vendor
  • Huawei:
    • Huawei: 20
    • Huawei Technologies Co: 3
pdf_data/report_keywords/eval_facility
  • DEKRA:
    • DEKRA Testing and Certification: 4
  • DeutscheTelekom:
    • Deutsche Telekom Security: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 5
      • TLS 1.2: 8
pdf_data/report_keywords/ecc_curve
  • NIST:
    • secp256r1: 4
    • secp384r1: 4
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 32: 1
    • AIS 38: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • NIST:
    • NIST SP 800-38A: 1
  • PKCS:
    • PKCS#1: 3
  • RFC:
    • RFC 3447: 5
    • RFC2104: 8
    • RFC3268: 8
    • RFC3447: 9
    • RFC3526: 8
    • RFC4492: 6
    • RFC5246: 9
    • RFC5480: 6
  • X509:
    • X.509: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • des Produktlebenszyklus –,GT German Telematics Gesellschaft für Telematikdienste mbH GmbH (confidential document) [10] Kurzanleitung Kartenterminal eHealth GT900, GT German Telematics Gesellschaft für: 1
    • mbH [7] Evaluation Technical Report, Version 2.2, 2024-10-14, Deutsche Telekom Security GmbH, (confidential document) [8] Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7: 1
pdf_data/report_metadata
pdf_data/st_filename 2019-52 ST.pdf 1171V2b_pdf.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0032: 4
    • BSI-CC-PP-0032-: 1
    • BSI-CC-PP-0032-V3-2023: 13
    • BSI-CC-PP-0082: 5
    • BSI-CC-PP-0082-V2: 1
    • BSI-CC-PP-0082-V3: 1
    • BSI-CC-PP-0098: 5
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 4
  • EAL:
    • EAL 3: 3
    • EAL 3 augmented: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 3
    • AGD_PRE: 3
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_FLR: 1
    • ALC_FLR.2: 3
    • ALC_LCD: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 4
    • ADV_IMP.1: 5
    • ADV_TDS.3: 4
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.4: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_STG.1: 6
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 4
    • FAU_STG.3.1: 1
  • FDP:
    • FDP_ACC.1: 8
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 6
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
  • FIA:
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 4
    • FIA_ATD.1.1: 1
    • FIA_UAU.2: 6
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 1
    • FIA_UID.2: 5
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA.3: 2
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 7
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 1
  • FCS:
    • FCS_CKM: 22
    • FCS_CKM.1: 18
    • FCS_CKM.2: 4
    • FCS_CKM.4: 32
    • FCS_CKM.4.1: 1
    • FCS_COP: 48
    • FCS_COP.1: 13
  • FDP:
    • FDP_ACC: 24
    • FDP_ACC.1: 15
    • FDP_ACF: 25
    • FDP_ACF.1: 17
    • FDP_IFC: 22
    • FDP_IFC.1: 12
    • FDP_IFF: 23
    • FDP_IFF.1: 14
    • FDP_ITC.1: 15
    • FDP_ITC.2: 12
    • FDP_RIP.1: 9
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 3
    • FIA_ATD.1: 6
    • FIA_ATD.1.1: 2
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 10
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5: 6
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.7: 7
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 16
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 3
    • FMT_MSA: 36
    • FMT_MSA.1: 9
    • FMT_MSA.2: 8
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 15
    • FMT_SMF.1: 14
    • FMT_SMF.1.1: 2
    • FMT_SMR.1: 22
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 12
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 7
    • FPT_ITT.1.1: 1
    • FPT_PHP: 1
    • FPT_PHP.1: 10
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.2: 9
    • FPT_PHP.2.1: 1
    • FPT_PHP.2.2: 1
    • FPT_PHP.2.3: 1
    • FPT_PHP.3: 1
    • FPT_TST.1: 10
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_TAB: 6
    • FTA_TAB.1: 2
  • FTP:
    • FTP_ITC: 6
    • FTP_ITC.1: 4
    • FTP_TRP: 6
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.TIME: 1
  • A:
    • A.ADMIN: 3
    • A.CONNECTOR: 3
    • A.ENV: 7
    • A.PUSH_SERVER: 4
    • A.SM: 6
  • O:
    • O.ACCESS_: 1
    • O.ACCESS_CONTROL: 7
    • O.MANAGEMENT: 6
    • O.PIN_ENTRY: 6
    • O.PROTECTION: 9
    • O.SECURE_: 1
    • O.SECURE_CHANNEL: 3
    • O.STATE: 6
  • OE:
    • OE.ADMIN: 4
    • OE.CONNECTOR: 6
    • OE.ENV: 11
    • OE.PUSH_SERVER: 4
    • OE.SM: 2
  • OSP:
    • OSP.PIN_ENTRY: 5
  • T:
    • T.COM: 3
    • T.DATA: 3
    • T.F-CONNECTOR: 3
    • T.PIN: 6
pdf_data/st_keywords/vendor
  • Huawei:
    • Huawei: 62
    • Huawei Technologies Co: 44
pdf_data/st_keywords/symmetric_crypto
  • constructions:
    • MAC:
      • CBC-MAC: 1
  • AES_competition:
    • AES:
      • AES: 2
    • HPC:
      • HPC: 8
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 5
    • ECDH:
      • ECDH: 3
      • ECDHE: 2
    • ECDSA:
      • ECDSA: 5
  • FF:
    • DH:
      • DH: 2
      • DHE: 1
      • Diffie-Hellman: 3
  • RSA:
    • RSA4096: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 1
  • SHA:
    • SHA2:
      • SHA-256: 2
      • SHA256: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • TLS:
      • TLS: 1
      • TLS v1.2: 2
  • TLS:
    • TLS:
      • TLS: 25
      • TLS 1.2: 2
  • VPN:
    • VPN: 10
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/st_keywords/ecc_curve
  • Brainpool:
    • brainpoolP256r1: 2
    • brainpoolP384r1: 2
  • NIST:
    • P-256: 2
    • curve P-256: 2
    • prime256v1: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 4
    • TLS_ECDHE_ECDSA_WITH_AES_128_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 4
    • TLS_ECDHE_ECDSA_WITH_AES_256_SHA384: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 14
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03116: 1
    • BSI TR-03120: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 7816-4: 3
    • ISO/IEC 7816-8: 3
  • X509:
    • X.509: 5
pdf_data/st_metadata
  • /Author: GT German Telematics Gesellschaft für Telematikdienste mbH
  • /Title: Electronic Health Card Terminal eHealth GT900 Security Target
  • pdf_file_size_bytes: 1205797
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 73
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/extract_ok False True
state/st/pdf_hash Different Different
state/st/txt_hash Different Different