Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Big Switch Networks Big Cloud Fabric 4.7.0
2017-23-INF-2630
ZEMO VML-GK2 HW V2.0.0 / FW V3.2.0
BSI-DSZ-CC-0623-V3-2024
name Big Switch Networks Big Cloud Fabric 4.7.0 ZEMO VML-GK2 HW V2.0.0 / FW V3.2.0
category Network and Network-Related Devices and Systems Other Devices and Systems
scheme ES DE
status archived active
not_valid_after 06.02.2024 07.05.2029
not_valid_before 06.02.2019 08.05.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-23-CCRA.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V3c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-23-INF-2630.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V3a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-23-ST.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V3b_pdf.pdf
manufacturer Big Switch Networks, Inc. ZEMO GmbH
manufacturer_web https://www.bigswitch.com https://zemo.de
security_level EAL2+, ALC_FLR.2 EAL3+, AVA_VAN.5, ADV_TDS.3, ADV_IMP.1, ALC_TAT.1, ADV_FSP.4
dgst d660170160b1e3d1 d648123b397e3e21
heuristics/cert_id 2017-23-INF-2630 BSI-DSZ-CC-0623-V3-2024
heuristics/cert_lab [] BSI
heuristics/cpe_matches cpe:2.3:a:bigswitch:big_cloud_fabric:4.7:*:*:*:*:*:*:* {}
heuristics/related_cves CVE-2019-19631, CVE-2019-19632 {}
heuristics/extracted_sars ADV_ARC.1, ATE_IND.2, AGD_PRE.1, ATE_FUN.1, AGD_OPE.1, ADV_TDS.1, ASE_REQ.2, ASE_ECD.1, AVA_VAN.2, ASE_OBJ.2, ASE_SPD.1, ATE_COV.1, ASE_INT.1, ADV_FSP.2, ASE_TSS.1, ALC_DEL.1, ALC_CMC.2, ALC_CMS.2, ASE_CCL.1, ALC_FLR.2 ADV_IMP.1, AGD_OPE.1, ALC_CMS.3, ATE_COV.2, ALC_DEL.1, AVA_VAN.5, ADV_ARC.1, ALC_CMC.3, ATE_DPT.1, ADV_FSP.4, ALC_DVS.1, ALC_TAT.1, ATE_IND.2, AGD_PRE.1, ADV_TDS.3, ALC_LCD.1, ATE_FUN.1
heuristics/extracted_versions 4.7.0 2.0.0, 3.2.0
heuristics/protection_profiles {} 854be21fba7a106c
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0052b_pdf.pdf
pdf_data/cert_filename 2017-23-CCRA.pdf 0623V3c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0623-V3-2024: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0052-2015: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL2: 1
    • EAL4: 1
  • EAL:
    • EAL 2: 1
    • EAL 3: 1
    • EAL 3 augmented: 1
    • EAL 4: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 2
    • ALC_FLR.2: 1
  • ADV:
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • ALC:
    • ALC_FLR: 1
    • ALC_TAT.1: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_claims
  • T:
    • T.I: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20190111122721+01'00'
  • pdf_file_size_bytes: 733309
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Author: Federal Office for Information Security
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Mobile Card Terminal for the German Healthcare System (MobCT), BSI-CC-PP-0052-2015"
  • /Subject: Common Criteria, Certification, Zertifizierung, Mobile Card Terminal for the German Healthcare System (MobCT), BSI-CC-PP-0052-2015
  • /Title: Certification Report BSI-DSZ-CC-0623-V3-2024
  • pdf_file_size_bytes: 232618
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 2017-23-INF-2630.pdf 0623V3a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.5 valid until: 7 May 2029
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0623-V3-2024
    • cert_item: ZEMO VML-GK2 HW V2.0.0 / FW V3.2.0
    • cert_lab: BSI
    • developer: ZEMO GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System (MobCT), Version 1.4, BSI-CC-PP-0052-2015, 24 September 2014
pdf_data/report_keywords/cc_cert_id
  • ES:
    • 2017-23-INF-2630-v1: 1
  • DE:
    • BSI-DSZ-CC-0623-V3-2024: 12
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0052-2015: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL2: 7
    • EAL2+: 1
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 3: 4
    • EAL 3 augmented: 3
    • EAL 4: 4
    • EAL3+: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 2
    • ALC_FLR.2: 5
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_FSP.4: 4
    • ADV_IMP.1: 4
    • ADV_TDS.3: 4
  • ALC:
    • ALC_FLR: 3
    • ALC_TAT.1: 4
  • ATE:
    • ATE_FUN: 1
    • ATE_IND: 3
  • AVA:
    • AVA_VAN: 3
    • AVA_VAN.5: 5
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_GEN.2: 1
    • FAU_SAR.1: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.4: 1
    • FCS_COP.1: 1
  • FDP:
    • FDP_IFC.1: 2
    • FDP_IFF.1: 2
  • FIA:
    • FIA_UAU.2: 1
    • FIA_UAU.5: 1
    • FIA_UAU.7: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_MSA.1: 2
    • FMT_MSA.3: 2
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_FLS.1: 1
    • FPT_ITT.1: 1
  • FTA:
    • FTA_SSL.4: 1
  • FTP:
    • FTP_ITC.1: 1
    • FTP_TRP.1: 1
  • FCS:
    • FCS_COP: 2
pdf_data/report_keywords/cc_claims
  • OE:
    • OE.ENVIRONMENT: 1
    • OE.MEDIC: 1
    • OE.PHYSICAL: 1
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
      • AES-256: 1
    • HPC:
      • HPC: 4
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA-3072: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-512: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 3
  • TLS:
    • TLS:
      • TLS v1.2: 2
      • TLSv1.2: 1
pdf_data/report_keywords/cipher_mode
  • GCM:
    • GCM: 2
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS7: 1
  • BSI:
    • AIS 32: 1
    • AIS 38: 1
  • FIPS:
    • FIPS180-4: 1
    • FIPS197: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • RFC:
    • RFC6234: 1
  • X509:
    • X.509: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 1170, 2024-03-21; SVN Liste aller entwicklungsrelevanten Dokumente, Version 809, 2024-03-22, (confidential documents) [11] Guidance documentation for the TOE, Version 2.2.0, 2023-11-24, Bedienungsanleitung: 1
    • Report, Version 3, 2024-03-25, EVALUATION TECHNICAL REPORT SUMMARY, TÜV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
pdf_data/report_metadata
  • /CreationDate: D:20190207182537+01'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20190207182537+01'00'
  • /Producer: Microsoft® Word 2016
  • pdf_file_size_bytes: 994708
  • pdf_hyperlinks: https://www.sogis.org/, http://www.commoncriteriaportal.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
pdf_data/st_filename 2017-23-ST.pdf 0623V3b_pdf.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0032: 1
    • BSI-CC-PP-0052: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL2+: 4
  • EAL:
    • EAL 3: 4
    • EAL 3 augmented: 3
    • EAL3+: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 5
    • ADV_IMP.1: 5
    • ADV_TDS.3: 5
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 5
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 13
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_SAR.1: 7
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 10
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_IFC.1: 23
    • FDP_IFC.1.1: 2
    • FDP_IFF.1: 18
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 2
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 2
    • FDP_ITC.1: 6
    • FDP_ITC.2: 2
    • FDP_MSA.3: 1
  • FIA:
    • FIA_UAU.1: 4
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 6
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.7: 6
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 11
    • FIA_UID.2: 10
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_IFC.1: 1
    • FMT_MSA.1: 18
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 17
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 6
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 6
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 3
  • FTA:
    • FTA_SSL.4: 6
    • FTA_SSL.4.1: 1
  • FTP:
    • FTP_ITC.1: 6
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 6
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FCS:
    • FCS_CKM.1: 23
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 22
    • FCS_CKM.4.1: 1
    • FCS_COP: 31
    • FCS_COP.1: 5
  • FDP:
    • FDP_ACC.1: 30
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 25
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 5
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 5
    • FDP_IFC: 41
    • FDP_IFC.1: 11
    • FDP_IFF: 45
    • FDP_IFF.1: 25
    • FDP_ITC.1: 21
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 9
    • FDP_RIP: 15
    • FDP_RIP.1: 2
    • FDP_SDI.1: 1
    • FDP_SDI.2: 9
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_SVR: 2
    • FDP_SVR.1: 12
    • FDP_SVR.1.1: 5
    • FDP_SVR.1.2: 3
    • FDP_SVR.1.3: 3
  • FIA:
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 13
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5: 11
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.7: 10
    • FIA_UAU.7.1: 2
    • FIA_UID.1: 17
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 26
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 11
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 8
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 14
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 20
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_PHP.1: 7
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_STM.1: 12
    • FPT_STM.1.1: 1
    • FPT_TST.1: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 2
    • FTA_SSL.4: 10
    • FTA_SSL.4.1: 1
  • FTP:
    • FTP_ITC.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.NETCON: 2
    • A.PHYSICAL: 2
    • A.PROTECT: 2
    • A.TIMESTAMP: 2
    • A.TRUSTED_ADMIN: 2
  • O:
    • O.ACCESS: 1
    • O.ADMIN: 12
    • O.AUDIT: 7
    • O.AUTHENTICATE: 7
    • O.FAIL_SECURE: 5
    • O.PROTECT: 16
    • O.TRAFFIC: 8
  • OE:
    • OE.ADMIN: 4
    • OE.NETWORK: 5
    • OE.PHYSICAL: 5
    • OE.PROTECT: 5
    • OE.TIME: 3
  • T:
    • T.DATA_COMPROMISE: 2
    • T.INTERCEPT: 2
    • T.UNAUTHORIZED: 2
  • A:
    • A.ADMIN: 3
    • A.CARDS: 4
    • A.DEVELOPER: 1
    • A.DMS: 3
    • A.ENVIRONMEN: 1
    • A.ENVIRONMENT: 2
    • A.MEDIC: 3
    • A.PHYSICAL: 3
  • O:
    • O.AUTH_STATE: 9
    • O.DMS_CONNECT: 1
    • O.DMS_CONNECTION: 5
    • O.LOG_CARDS: 3
    • O.LOG_DATA: 6
    • O.MANAGEMENT: 9
    • O.PIN: 7
    • O.PROTECTION: 8
    • O.RESIDUAL: 6
    • O.SEALING: 3
    • O.SELFTESTS: 6
    • O.TIME: 6
    • O.TRANSFER: 3
  • OE:
    • OE.ADMIN: 9
    • OE.CARDS: 8
    • OE.DEVELOPER: 1
    • OE.DMS: 4
    • OE.ENVIRONMENT: 6
    • OE.MEDIC: 10
    • OE.PHYSICAL: 6
  • OSP:
    • OSP.DMS_CONN: 1
    • OSP.DMS_CONNE: 1
    • OSP.DMS_CONNECTION: 1
    • OSP.EMERGENC: 1
    • OSP.EMERGENCY_: 1
    • OSP.EMERGENCY_DATA: 1
    • OSP.LOG_CARD: 1
    • OSP.LOG_CARDS: 1
    • OSP.LOG_DATA: 3
    • OSP.SEALING: 3
    • OSP.SELFTESTS: 3
    • OSP.TIME: 3
    • OSP.TRANSFER: 3
  • T:
    • T.ACCESS: 3
    • T.ADMIN_PIN: 3
    • T.AUTH_STATE: 3
    • T.DATA: 3
    • T.FIRMWARE: 3
    • T.MAN_HW: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
  • constructions:
    • MAC:
      • HMAC: 1
  • AES_competition:
    • AES:
      • AES: 5
      • AES-256: 1
    • HPC:
      • HPC: 14
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDHE: 3
  • FF:
    • DH:
      • Diffie-Hellman: 2
  • RSA:
    • RSA 2048: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-2: 2
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 14
  • TLS:
    • TLS:
      • TLS: 4
      • TLS v1.2: 3
      • TLSv1.2: 11
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 1
pdf_data/st_keywords/cipher_mode
  • CTR:
    • CTR: 2
  • GCM:
    • GCM: 2
  • GCM:
    • GCM: 4
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 14
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 6
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 3
    • FIPS3: 1
  • RFC:
    • RFC 4055: 1
    • RFC 4253: 1
    • RFC 5246: 1
  • X509:
    • X.509: 6
  • FIPS:
    • FIPS 197: 1
  • X509:
    • X.509: 9
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • done by an authorised card that is out of scope of this ST: 1
    • out of scope: 1
    • the TOE • Signature generation for emergency data1 on the eHC (done by an authorised card that is out of scope of this ST) 1.4.6 Physical Protection of the TOE The TOE cannot counter physical attacks concerning: 1
pdf_data/st_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Keywords: Protection Profile, Mobile Card Terminal, Electronic Health Card
  • /Subject: Mobile Card Terminal, electronic Health Card
  • /Title: Common Criteria Protection Profile BSI-PP-0052
  • pdf_file_size_bytes: 461165
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 75
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different