Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
BooleBox On Premises V 4.2
OCSI/CERT/IMQ/06/2018/RC
Electronic Health Card and SSCD Version 2.10
BSI-DSZ-CC-0425-2009
name BooleBox On Premises V 4.2 Electronic Health Card and SSCD Version 2.10
category Data Protection ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme IT DE
status active archived
not_valid_after 23.04.2025 01.09.2019
not_valid_before 23.04.2020 07.10.2009
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/rc_boolebox_42_v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0425a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_boolebox_42_v1.5.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0425b_pdf.pdf
manufacturer Boole Server S.r.l. Gemalto
manufacturer_web https://www.booleserver.com/ https://www.gemalto.com/
security_level EAL2+, ALC_FLR.2 EAL4+, AVA_MSU.3, ALC_DVS.2, AVA_VLA.4
dgst efccd1dfa8e8195d c2669b60564931e6
heuristics/cert_id OCSI/CERT/IMQ/06/2018/RC BSI-DSZ-CC-0425-2009
heuristics/cert_lab [] BSI
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ATE_COV.2, ADV_RCR.1, ALC_TAT.1, AVA_VLA.4, ATE_DPT.2, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_SOF.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_DVS.2, ALC_LCD.1, ADV_IMP.2, ADV_FSP.2, ADV_SPM.1, AVA_MSU.3
heuristics/extracted_versions 4.2 2.10
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0663-2009
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0437-2008
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0663-2009
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0437-2008, BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0399-2007, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0223-2003
heuristics/scheme_data
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0437-2008
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0437-2008
pdf_data/report_filename rc_boolebox_42_v1.0.pdf 0425a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0425-2009
    • cert_item: Electronic Health Card and SSCD Version 2.10
    • cert_lab: BSI
    • developer: Gemalto
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • IT:
    • OCSI/CERT/IMQ/06/2018/RC: 27
  • DE:
    • BSI-DSZ-CC-0425: 1
    • BSI-DSZ-CC-0425-2009: 20
    • BSI-DSZ-CC-0437-2008: 1
    • BSI-DSZ-CC-0437-2008-MA-02: 3
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0002-2001: 1
    • BSI-PP- 0006-2002: 1
    • BSI-PP-0006-2002: 1
    • BSI-PP-0020-V2-2007-MA02: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 7
    • EAL2+: 1
    • EAL4: 4
  • EAL:
    • EAL 1: 1
    • EAL 4: 9
    • EAL 4 augmented: 3
    • EAL 4+: 2
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 7
    • EAL5: 6
    • EAL5+: 2
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 1
    • ALC_FLR.2: 7
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 1
    • ACM_CAP: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 2
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_HLD: 2
    • ADV_IMP: 2
    • ADV_IMP.2: 5
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_USR: 2
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.1: 1
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_LCD.1: 1
    • ALC_TAT: 2
    • ALC_TAT.1: 1
  • APE:
    • APE_DES: 1
    • APE_ENV: 1
    • APE_INT: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SRE: 1
  • ASE:
    • ASE_DES: 1
    • ASE_ENV: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_PPC: 1
    • ASE_REQ: 1
    • ASE_SRE: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 2
    • ATE_DPT: 2
    • ATE_FUN: 2
    • ATE_IND: 2
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.3: 5
    • AVA_SOF: 3
    • AVA_VLA: 3
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 6
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 7
  • Gemalto:
    • Gemalto: 9
  • Infineon:
    • Infineon: 3
    • Infineon Technologies AG: 2
pdf_data/report_keywords/eval_facility
  • IMQLPS:
    • IMQ/LPS: 3
  • TUV:
    • TÜV Informationstechnik: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
      • AES-256: 1
  • DES:
    • 3DES:
      • Triple-DES: 1
    • DES:
      • DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA 2048: 1
    • RSA2048: 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 2
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • physical probing: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
    • BSI 8: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC 15408: 6
  • BSI:
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 20: 4
    • AIS 25: 3
    • AIS 26: 3
    • AIS 31: 2
    • AIS 32: 1
    • AIS 34: 4
    • AIS 35: 2
    • AIS 36: 3
    • AIS 37: 1
    • AIS 38: 1
  • FIPS:
    • FIPS 180-2: 1
  • ISO:
    • ISO/IEC 15408:2005: 3
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Electronic Health Card and SSCD, TOE version 2.10, document version 2.15, 2009-05-26, Gemalto (confidential document) [7] Evaluation Technical Report, Version 4, Date: 2009-10-02, BSI-DSZ-CC-0425, Electronic Health: 1
    • SLE66CX182PE / m1564-a14, All Products with RSA2048 V1.5 library, Version 1, 2008-04-02, TÜVIT (confidential document) [14] Infineon Technologies AG, Security and Chipcard ICs, Security Target, SLE66CX680PE/m1534-a14: 1
    • STD Configuration Check List For GeGKOS on INFINEON SLE66CX680 PE, version 3.0 2008-04-08, Gemalto (confidential documents) [9] Security Target BSI-DSZ-CC-0425-2009, Document Reference: ASE02R10559 V0.9, Date 08: 1
    • and SSCD 2.10 (confidential document) [8] Configuration list for the TOE: Configuration Check Electronic Health Card and SSCD, version 3: 1
pdf_data/report_metadata
  • /Author: OCSI
  • /CreationDate: D:20200422093535+00'00'
  • /Creator: Microsoft Word
  • /ModDate: D:20200423165945+00'00'
  • /Producer: Modified using InfoCert Dike
  • /Subject: ---
  • /Title: Rapporto di Certificazione del prodotto “BooleBox On Premises V Ѐ⸂”
  • pdf_file_size_bytes: 623576
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 27
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20091022134539+02'00'
  • /Creator: Writer
  • /Keywords: "Electronic Health Card and SSCD Version 2.10, Gemalto, CC, Common Criteria, Zertifzierung, elektronische Gesundheitskarte (eGK)"
  • /ModDate: D:20091028064538+01'00'
  • /Producer: StarOffice 9
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0425-2009
  • pdf_file_size_bytes: 724657
  • pdf_hyperlinks: https://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 34
pdf_data/st_filename st_boolebox_42_v1.5.pdf 0425b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0437-: 1
    • BSI-DSZ-CC-0437-2008: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0006-2002: 1
    • BSI-PP-0020: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 1
    • EAL2+: 3
  • EAL:
    • EAL 4: 17
    • EAL4: 12
    • EAL4 augmented: 3
    • EAL4+: 1
    • EAL5: 1
    • EAL5 augmented: 1
    • EAL5+: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 7
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ACM:
    • ACM_AUT.1: 4
    • ACM_CAP.3: 3
    • ACM_CAP.4: 4
    • ACM_SCP.1: 1
    • ACM_SCP.2: 5
    • ACM_XXX: 1
  • ADO:
    • ADO_DEL.2: 6
    • ADO_IGS.1: 10
  • ADV:
    • ADV_FSP.1: 18
    • ADV_FSP.2: 6
    • ADV_HLD.1: 3
    • ADV_HLD.2: 6
    • ADV_IMP.1: 5
    • ADV_IMP.2: 13
    • ADV_LLD.1: 9
    • ADV_RCR.1: 11
    • ADV_SPM: 1
    • ADV_SPM.1: 8
  • AGD:
    • AGD_ADM.1: 16
    • AGD_USR: 2
    • AGD_USR.1: 8
  • ALC:
    • ALC_DVS: 1
    • ALC_DVS.1: 10
    • ALC_DVS.2: 1
    • ALC_LCD.1: 7
    • ALC_TAT: 1
    • ALC_TAT.1: 11
  • ATE:
    • ATE_COV.2: 6
    • ATE_DPT.1: 4
    • ATE_DPT.2: 1
    • ATE_FUN.1: 11
    • ATE_IND.2: 6
  • AVA:
    • AVA_MSU.3: 13
    • AVA_SOF.1: 8
    • AVA_VLA.4: 14
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 2
    • FAU_SAR.1.2: 2
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 7
    • FAU_SAR.3.1: 1
  • FDP:
    • FDP_ACC.1: 26
    • FDP_ACC.1.1: 3
    • FDP_ACF: 1
    • FDP_ACF.1: 15
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_ETC.1: 7
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_ETC.2: 6
    • FDP_ETC.2.1: 1
    • FDP_ETC.2.2: 1
    • FDP_ETC.2.3: 1
    • FDP_ETC.2.4: 1
    • FDP_IFC: 1
    • FDP_IFC.1: 22
    • FDP_IFC.1.1: 1
    • FDP_IFF: 1
    • FDP_IFF.1: 10
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 7
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 7
    • FDP_ITC.2.1: 1
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 1
    • FDP_UCT.1: 7
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 5
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 6
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 9
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 8
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 5
    • FIA_UID.2: 11
    • FIA_UID.2.1: 1
    • FIA_XXX.1: 1
    • FIA_XXX.1.1: 2
  • FMT:
    • FMT_MOF.1: 8
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 15
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 18
    • FMT_MSA.3.1: 3
    • FMT_MSA.3.2: 3
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 14
    • FMT_SMF.1.1: 2
    • FMT_SMR.1: 15
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_PSE.1: 7
    • FPR_PSE.1.1: 1
    • FPR_PSE.1.2: 1
    • FPR_PSE.1.3: 1
    • FPR_UNO.1: 7
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_STM.1: 2
    • FPT_TDC: 1
    • FPT_TDC.1: 8
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TEE: 2
    • FPT_TEE.1: 7
    • FPT_TEE.1.1: 1
    • FPT_TEE.1.2: 1
  • FTP:
    • FTP_ITC.1: 3
    • FTP_TRP.1: 3
  • FCS:
    • FCS_CKM: 32
    • FCS_CKM.1: 16
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 5
    • FCS_CKM.3: 3
    • FCS_CKM.4: 28
    • FCS_CKM.4.1: 1
    • FCS_COP: 72
    • FCS_COP.1: 24
    • FCS_COP.1.1: 1
    • FCS_RND: 5
    • FCS_RND.1: 17
    • FCS_RND.1.1: 2
  • FDP:
    • FDP_ACC: 43
    • FDP_ACC.1: 24
    • FDP_ACC.1.1: 2
    • FDP_ACC.2: 21
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 2
    • FDP_ACF: 48
    • FDP_ACF.1: 48
    • FDP_ACF.1.1: 5
    • FDP_ACF.1.2: 5
    • FDP_ETC: 5
    • FDP_ETC.1: 5
    • FDP_IFC.1: 12
    • FDP_ITC: 9
    • FDP_ITC.1: 20
    • FDP_ITC.2: 14
    • FDP_RIP: 12
    • FDP_RIP.1: 8
    • FDP_SDI: 21
    • FDP_SDI.1: 1
    • FDP_SDI.2: 16
    • FDP_UCT.1: 11
    • FDP_UIT: 30
    • FDP_UIT.1: 25
    • FDP_UIT.1.2: 2
  • FIA:
    • FIA_AFL: 24
    • FIA_AFL.1: 19
    • FIA_ATD: 8
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_UAU: 7
    • FIA_UAU.1: 20
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 11
    • FIA_UAU.4.1: 1
    • FIA_UID: 10
    • FIA_UID.1: 18
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 4
  • FMT:
    • FMT_LIM: 6
    • FMT_LIM.1: 19
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 18
    • FMT_LIM.2.1: 1
    • FMT_MOF.1: 11
    • FMT_MOF.1.1: 1
    • FMT_MSA: 22
    • FMT_MSA.1: 9
    • FMT_MSA.1.1: 4
    • FMT_MSA.2: 34
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 2
    • FMT_MTD: 44
    • FMT_MTD.1: 21
    • FMT_MTD.3: 4
    • FMT_SMF: 31
    • FMT_SMF.1: 14
    • FMT_SMR: 29
    • FMT_SMR.1: 17
  • FPT:
    • FPT_AMT: 1
    • FPT_AMT.1: 10
    • FPT_AMT.1.1: 1
    • FPT_FLS: 2
    • FPT_FLS.1: 11
    • FPT_FLS.1.1: 2
    • FPT_PHP: 8
    • FPT_PHP.1: 8
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 12
    • FPT_PHP.3.1: 1
    • FPT_RVM.1: 13
    • FPT_SEP.1: 12
    • FPT_SEP.1.1: 2
    • FPT_SEP.1.2: 1
    • FPT_TRP: 1
    • FPT_TST: 1
    • FPT_TST.1: 13
    • FPT_TST.1.1: 2
    • FPT_TST.1.2: 2
    • FPT_TST.1.3: 2
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 36
    • FTP_ITC.1: 21
    • FTP_ITC.1.1: 3
    • FTP_ITC.1.2: 7
    • FTP_ITC.1.3: 5
    • FTP_TRP: 16
    • FTP_TRP.1: 17
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 4
    • FTP_TRP.1.3: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.ALIGNEDBACKUPS: 2
    • A.ASSUMPTION: 1
    • A.CERTIFICATE: 3
    • A.DBMS_ACCESS: 3
    • A.DOC_ACCESS: 2
    • A.OS_ACCESS: 2
    • A.OS_RESTRICT: 3
    • A.SECCOMM: 3
    • A.STORAGE_ACCESS: 3
    • A.TIME: 3
    • A.TOE_EVALUATED: 2
    • A.TRAINING: 2
    • A.TRUST: 3
    • A.UPDATE: 2
  • O:
    • O.ACCESS: 13
    • O.ANTI_BRUTE: 9
    • O.AUDIT: 7
    • O.AUDIT_PROT: 4
    • O.CONFIDENTIAL: 3
    • O.CONFIG: 7
    • O.CRYPTO: 10
    • O.IDENTIFY: 15
    • O.INTEGRITY: 5
    • O.MANAGE: 7
    • O.OTP: 5
    • O.PRIVACY: 4
    • O.STRONG_PERSONALKEY: 6
    • O.USER: 6
  • OE:
    • OE.ALIGNEDBACKUP: 6
    • OE.AUDIT: 5
    • OE.AUDIT_PROTECT: 1
    • OE.BACKUP: 1
    • OE.CERTIFICATE: 4
    • OE.CONTINUITY: 3
    • OE.CRYPTO: 8
    • OE.DB: 3
    • OE.DOC: 4
    • OE.IDENTIFY: 6
    • OE.INTEGRITY: 4
    • OE.LOG_STORE: 4
    • OE.PERSONALKEY: 4
    • OE.PHYSICAL_ACCESS: 6
    • OE.SO: 8
    • OE.STAFF: 18
    • OE.STORAGE: 3
    • OE.TIME: 8
  • T:
    • T.CONFIDENTIALITY: 2
    • T.CONFIG: 3
    • T.CRASH: 1
    • T.EXHAUST: 3
    • T.INSTALL: 2
    • T.INTEGRITY: 3
    • T.INTERCEPT: 2
    • T.INTERR: 2
    • T.KEY_ACCESS: 2
    • T.KEY_GUESS: 3
    • T.LOSSOF: 3
    • T.MASQUERADE: 3
    • T.NOTRACE: 2
    • T.PRIVACY: 2
    • T.PRIVIL: 1
    • T.REPLAY: 3
    • T.SCREEN: 3
    • T.THREAT: 1
  • A:
    • A.CGA: 3
    • A.SCA: 3
  • D:
    • D.DTBS: 11
    • D.DTBS-: 1
    • D.IMAGE: 12
    • D.RAD: 25
    • D.SCD: 32
    • D.SIGNATURE: 16
    • D.SIGN_APPLI: 4
    • D.SVD: 26
    • D.VAD: 8
  • O:
    • O.RND: 2
  • OE:
    • OE.HI_VAD: 7
  • OT:
    • OT.EEPROM: 10
    • OT.INIT: 3
    • OT.SCD_UNIQUE: 3
  • T:
    • T.EEPROM: 8
    • T.RND: 2
    • T.SCD_DERIVE: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 10
  • Gemalto:
    • Gemalto: 2
    • Gemalto N.V: 2
  • Infineon:
    • Infineon Technologies AG: 3
pdf_data/st_keywords/eval_facility
  • TUV:
    • TUV Informationstechnik: 1
    • TÜViT: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
      • AES-256: 10
      • AES256: 2
  • AES_competition:
    • HPC:
      • HPC: 16
  • DES:
    • 3DES:
      • 3DES: 2
    • DES:
      • DES: 3
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA 2048: 2
  • RSA:
    • RSA2048: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 6
      • SHA256: 1
  • RIPEMD:
    • RIPEMD: 3
    • RIPEMD-160: 2
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-224: 1
      • SHA-256: 8
      • SHA-384: 1
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 14
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS 1.2: 2
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 2
  • RNG:
    • RND: 4
    • RNG: 3
  • TRNG:
    • TRNG: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • Malfunction: 12
    • Physical Tampering: 2
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 4
    • physical tampering: 11
  • SCA:
    • physical probing: 4
    • side channels: 2
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 140-2: 1
  • ISO:
    • ISO/IEC 15408: 2
  • BSI:
    • AIS 20: 3
    • AIS 34: 2
    • AIS 36: 1
    • AIS20: 1
    • AIS31: 3
    • AIS36: 1
  • CC:
    • CCMB-2005-08-001: 3
    • CCMB-2005-08-004: 1
  • FIPS:
    • FIPS 180-2: 1
    • FIPS PUB 46-3: 1
  • ISO:
    • ISO/IEC 7816-4: 1
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 2
    • PKCS1: 2
  • X509:
    • X.509: 8
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • activities (through Print Screen system functionalities and video grabbing software) while viewing confidential documents. See Table 18: file sharing permissions configurable in a sharing template [142] Guest (G) Guest: 1
    • activities (through Print Screen system functionalities and video grabbing software) while viewing confidential documents. The Windows OS is indispensable on the END USER side in order to use this security function. [22: 1
    • and editable only in their BooleBox storage. [25] Watermark With BooleBox users can protect their confidential documents and the intellectual property of their shared files through an indelible watermark displaying key: 1
    • confidential information through e-mail in total security. With BooleBox it is possible to attach confidential documents to e-mails with the assurance that no one can intercept since the email message itself is: 1
pdf_data/st_metadata
  • /Author: Boole Server S.r.l.
  • /CreationDate: D:20200507102310Z00'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20200507102310Z00'00'
  • /Producer: Mac OS X 10.13.6 Quartz PDFContext
  • /Title: BooleBox on Premises v4.2 Security Target v1.5
  • pdf_file_size_bytes: 2607031
  • pdf_hyperlinks: http://www.commoncriteriaportal.org/cc
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 85
  • /Author: FDefranc
  • /CreationDate: D:20090918121942+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20091028064707+01'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Title: Security Target lite Electronic Health Card and SSCD 2.10
  • pdf_file_size_bytes: 1095009
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 120
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different