ZEMO VML-GK2 HW V2.0.0 / FW V3.2.0

CSV information ?

Status active
Valid from 08.05.2024
Valid until 07.05.2029
Scheme 🇩🇪 DE
Manufacturer ZEMO GmbH
Category Other Devices and Systems
Security level ALC_TAT.1, ADV_TDS.3, EAL3+, ADV_IMP.1, AVA_VAN.5, ADV_FSP.4

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0623-V3-2024

Certificate ?

Extracted keywords

Security level
EAL 3, EAL 4, EAL 2, EAL 3 augmented
Security Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, ALC_FLR, AVA_VAN.5
Protection profiles
BSI-CC-PP-0052-2015
Certificates
BSI-DSZ-CC-0623-V3-2024

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Title Certification Report BSI-DSZ-CC-0623-V3-2024
Subject Common Criteria, Certification, Zertifizierung, Mobile Card Terminal for the German Healthcare System (MobCT), BSI-CC-PP-0052-2015
Keywords "Common Criteria, Certification, Zertifizierung, Mobile Card Terminal for the German Healthcare System (MobCT), BSI-CC-PP-0052-2015"
Author Federal Office for Information Security
Pages 1

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, AES-256, HPC
Asymmetric Algorithms
RSA-3072
Hash functions
SHA-512
Block cipher modes
GCM

Security level
EAL 3, EAL 4, EAL 2, EAL 1, EAL3+, EAL 3 augmented
Claims
OE.MEDIC, OE.PHYSICAL, OE.ENVIRONMENT
Security Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, ALC_FLR, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN
Security Functional Requirements (SFR)
FCS_COP
Protection profiles
BSI-CC-PP-0052-2015
Certificates
BSI-DSZ-CC-0623-V3-2024
Evaluation facilities
TÃœV Informationstechnik
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Report, Version 3, 2024-03-25, EVALUATION TECHNICAL REPORT SUMMARY, TÃœV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System, 1170, 2024-03-21; SVN Liste aller entwicklungsrelevanten Dokumente, Version 809, 2024-03-22, (confidential documents) [11] Guidance documentation for the TOE, Version 2.2.0, 2023-11-24, Bedienungsanleitung

Side-channel analysis
physical tampering
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Report, Version 3, 2024-03-25, EVALUATION TECHNICAL REPORT SUMMARY, TÃœV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System, 1170, 2024-03-21; SVN Liste aller entwicklungsrelevanten Dokumente, Version 809, 2024-03-22, (confidential documents) [11] Guidance documentation for the TOE, Version 2.2.0, 2023-11-24, Bedienungsanleitung

Standards
FIPS197, FIPS180-4, AIS 32, AIS 38, RFC6234, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, X.509
Technical reports
BSI 7148

File metadata

Title Certification Report BSI-DSZ-CC-0623-V3-2024
Subject Common Criteria, Certification, Zertifizierung, Mobile Card Terminal for the German Healthcare System (MobCT), BSI-CC-PP-0052-2015
Keywords "Common Criteria, Certification, Zertifizierung, Mobile Card Terminal for the German Healthcare System (MobCT), BSI-CC-PP-0052-2015"
Author Federal Office for Information Security
Pages 23

Frontpage

Certificate ID BSI-DSZ-CC-0623-V3-2024
Certified item ZEMO VML-GK2 HW V2.0.0 / FW V3.2.0
Certification lab BSI
Developer ZEMO GmbH

Security target ?

Extracted keywords

Symmetric Algorithms
AES, AES-256, HPC
Block cipher modes
GCM

Security level
EAL3+, EAL 3, EAL 3 augmented
Claims
O.PIN, O.RESIDUAL, O.SELFTESTS, O.PROTECTION, O.AUTH_STATE, O.MANAGEMENT, O.LOG_CARDS, O.LOG_DATA, O.TRANSFER, O.DMS_CONNECT, O.TIME, O.SEALING, O.DMS_CONNECTION, T.MAN_HW, T.DATA, T.ACCESS, T.AUTH_STATE, T.ADMIN_PIN, T.FIRMWARE, A.MEDIC, A.ADMIN, A.CARDS, A.DMS, A.PHYSICAL, A.ENVIRONMENT, A.ENVIRONMEN, A.DEVELOPER, OE.MEDIC, OE.ADMIN, OE.CARDS, OE.DMS, OE.PHYSICAL, OE.ENVIRONMENT, OE.DEVELOPER, OSP.LOG_DATA, OSP.TRANSFER, OSP.DMS_CONNE, OSP.TIME, OSP.SEALING, OSP.SELFTESTS, OSP.EMERGENCY_, OSP.LOG_CARD, OSP.DMS_CONN, OSP.EMERGENC, OSP.LOG_CARDS, OSP.DMS_CONNECTION, OSP.EMERGENCY_DATA
Security Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_ARC.1, AGD_OPE.1, AGD_PRE.1, ALC_TAT.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5
Security Functional Requirements (SFR)
FCS_CKM.1, FCS_CKM.4, FCS_COP, FCS_CKM.1.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4.1, FDP_SVR, FDP_IFC, FDP_IFF, FDP_SVR.1.1, FDP_SVR.1, FDP_SVR.1.2, FDP_SVR.1.3, FDP_ACC.1, FDP_ACF.1, FDP_ITC.1, FDP_RIP, FDP_SDI.2, FDP_ITC.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FDP_IFF.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_RIP.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_SDI.1, FIA_AFL.1, FIA_SOS.1, FIA_UAU.1, FIA_UAU.5, FIA_UAU.7, FIA_UID.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_SOS.1.1, FIA_UAU.7.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_MTD.3, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_MTD.3.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_PHP.1, FPT_STM.1, FPT_TST.1, FPT_STM.1.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTA_SSL.3, FTA_SSL.4, FTA_SSL.3.1, FTA_SSL.4.1, FTP_ITC.1
Protection profiles
BSI-CC-PP-0052, BSI-CC-PP-0032
Certification process
out of scope, done by an authorised card that is out of scope of this ST, the TOE • Signature generation for emergency data1 on the eHC (done by an authorised card that is out of scope of this ST) 1.4.6 Physical Protection of the TOE The TOE cannot counter physical attacks concerning

Side-channel analysis
physical tampering
Certification process
out of scope, done by an authorised card that is out of scope of this ST, the TOE • Signature generation for emergency data1 on the eHC (done by an authorised card that is out of scope of this ST) 1.4.6 Physical Protection of the TOE The TOE cannot counter physical attacks concerning

Standards
FIPS 197, X.509

File metadata

Title Common Criteria Protection Profile BSI-PP-0052
Subject Mobile Card Terminal, electronic Health Card
Keywords Protection Profile, Mobile Card Terminal, Electronic Health Card
Author Bundesamt für Sicherheit in der Informationstechnik
Pages 75

Heuristics ?

Certificate ID: BSI-DSZ-CC-0623-V3-2024

Extracted SARs

ALC_LCD.1, ADV_TDS.3, ALC_DVS.1, ALC_TAT.1, ADV_FSP.4, AGD_PRE.1, AVA_VAN.5, ATE_IND.2, ALC_DEL.1, ATE_DPT.1, ADV_ARC.1, ADV_IMP.1, ALC_CMC.3, ATE_FUN.1, ALC_CMS.3, ATE_COV.2, AGD_OPE.1

Scheme data ?

Cert Id BSI-DSZ-CC-0623-V3-2024
Product ZEMO VML-GK2
Vendor ZEMO GmbH
Certification Date 08.05.2024
Category eHealth
Url https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Gesundheitswesen_Kartenlesegeraete/0623.html
Enhanced
Product ZEMO VML-GK2
Applicant ZEMO GmbH Franz-Mader-Straße 9 94036 Passau
Evaluation Facility TÃœV Informationstechnik GmbH
Assurance Level EAL3,AVA_VAN.5,ALC_TAT.1,ADV_TDS.3,ADV_IMP.1,ADV_FSP.4
Protection Profile Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System (MobCT), Version 1.4, BSI-CC-PP-0052-2015, 19 January 2015
Certification Date 08.05.2024
Expiration Date 07.05.2029
Entries [frozendict({'id': 'BSI-DSZ-CC-0623-V3-2024 (08.05.2024)', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-0623-V2-2018 (28.06.2018)', 'description': 'Certificate'})]
Report Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte06/0623V3a_pdf.pdf?__blob=publicationFile&v=2
Target Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte06/0623V3b_pdf.pdf?__blob=publicationFile&v=2
Cert Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte06/0623V3c_pdf.pdf?__blob=publicationFile&v=2
Description The Target of Evaluation (TOE) is the ZEMO VML-GK2, FW-Version 3.1.0, HW-Version 2.0.0 by ZEMO GmbH. The TOE is a smart card terminal used for the German healthcare system as a Mobile Card Terminal (MobCT). It is used by medical suppliers during visits to read out insurance data from a German electronic Health Card (eHC) of a health insured person. The TOE fulfils the IT security requirements to be used with the German electronic Health Card (eHC) and the German Health Professional Card (HPC) based on the regulations of the German healthcare system.
Subcategory Card reader

References ?

No references are available for this certificate.

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f09ec7b0a88dd0bc245d86c1cba75b64eb1602c53e8a72d630e7968721c5e8d7', 'txt_hash': 'f792d97250a4631fcab4b577d9be356ccd0b720d7c0a2ae21cd5cb72a23e54cf'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '97fadaefc246c35cb4f41af79e2348125109cc55bc82f3716fd014278ebc8b4e', 'txt_hash': '925799541bdfd087849feac15166c492162025f3cf7a1fcde8b62a969795b74e'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '9100292bed010a94f1127a8d2e0c13a60b7659a202f6d2440177fbf76b865fb9', 'txt_hash': '1bbccc8927860fc25817575176543204395bfbd2853747ccf8533c74a073edc6'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 336199, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 23, '/Author': 'Federal Office for Information Security', '/Keywords': '"Common Criteria, Certification, Zertifizierung, Mobile Card Terminal for the German Healthcare System (MobCT), BSI-CC-PP-0052-2015"', '/Subject': 'Common Criteria, Certification, Zertifizierung, Mobile Card Terminal for the German Healthcare System (MobCT), BSI-CC-PP-0052-2015', '/Title': 'Certification Report BSI-DSZ-CC-0623-V3-2024', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/zertifizierung', 'https://www.bsi.bund.de/', 'https://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/zertifizierungsreporte', 'https://www.bsi.bund.de/AIS', 'http://www.commoncriteriaportal.org/cc/', 'http://www.commoncriteriaportal.org/', 'https://www.sogis.eu/']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 461165, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 75, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/Keywords': 'Protection Profile, Mobile Card Terminal, Electronic Health Card', '/Subject': 'Mobile Card Terminal, electronic Health Card', '/Title': 'Common Criteria Protection Profile BSI-PP-0052', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 232618, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Federal Office for Information Security', '/Keywords': '"Common Criteria, Certification, Zertifizierung, Mobile Card Terminal for the German Healthcare System (MobCT), BSI-CC-PP-0052-2015"', '/Subject': 'Common Criteria, Certification, Zertifizierung, Mobile Card Terminal for the German Healthcare System (MobCT), BSI-CC-PP-0052-2015', '/Title': 'Certification Report BSI-DSZ-CC-0623-V3-2024', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0623-V3-2024', 'cert_item': 'ZEMO VML-GK2 HW V2.0.0 / FW V3.2.0', 'developer': 'ZEMO GmbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System (MobCT), Version 1.4, BSI-CC-PP-0052-2015, 24 September 2014', 'cc_version': 'PP conformant Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.5 valid until: 7 May 2029'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0623-V3-2024': 12}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0052-2015': 4}}, 'cc_security_level': {'EAL': {'EAL 3': 4, 'EAL 4': 4, 'EAL 2': 3, 'EAL 1': 1, 'EAL3+': 1, 'EAL 3 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 4, 'ADV_IMP.1': 4, 'ADV_TDS.3': 4}, 'ALC': {'ALC_TAT.1': 4, 'ALC_FLR': 3}, 'ATE': {'ATE_FUN': 1, 'ATE_IND': 3}, 'AVA': {'AVA_VAN.5': 5, 'AVA_VAN': 3}}, 'cc_sfr': {'FCS': {'FCS_COP': 2}}, 'cc_claims': {'OE': {'OE.MEDIC': 1, 'OE.PHYSICAL': 1, 'OE.ENVIRONMENT': 1}}, 'vendor': {}, 'eval_facility': {'TUV': {'TÃœV Informationstechnik': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1, 'AES-256': 1}, 'HPC': {'HPC': 4}}}, 'asymmetric_crypto': {'RSA': {'RSA-3072': 1}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-512': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {'GCM': {'GCM': 2}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 1}}, 'technical_report_id': {'BSI': {'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS197': 1, 'FIPS180-4': 1}, 'BSI': {'AIS 32': 1, 'AIS 38': 1}, 'RFC': {'RFC6234': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}, 'X509': {'X.509': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Report, Version 3, 2024-03-25, EVALUATION TECHNICAL REPORT SUMMARY, TÃœV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System': 1, '1170, 2024-03-21; SVN Liste aller entwicklungsrelevanten Dokumente, Version 809, 2024-03-22, (confidential documents) [11] Guidance documentation for the TOE, Version 2.2.0, 2023-11-24, Bedienungsanleitung': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0052': 2, 'BSI-CC-PP-0032': 1}}, 'cc_security_level': {'EAL': {'EAL3+': 2, 'EAL 3': 4, 'EAL 3 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 5, 'ADV_IMP.1': 5, 'ADV_TDS.3': 5, 'ADV_ARC.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_TAT.1': 5, 'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 8}}, 'cc_sfr': {'FCS': {'FCS_CKM.1': 23, 'FCS_CKM.4': 22, 'FCS_COP': 31, 'FCS_CKM.1.1': 1, 'FCS_CKM.2': 2, 'FCS_COP.1': 5, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_SVR': 2, 'FDP_IFC': 41, 'FDP_IFF': 45, 'FDP_SVR.1.1': 5, 'FDP_SVR.1': 12, 'FDP_SVR.1.2': 3, 'FDP_SVR.1.3': 3, 'FDP_ACC.1': 30, 'FDP_ACF.1': 25, 'FDP_ITC.1': 21, 'FDP_RIP': 15, 'FDP_SDI.2': 9, 'FDP_ITC.2': 9, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 5, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 5, 'FDP_IFC.1': 11, 'FDP_IFF.1': 25, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_RIP.1': 2, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_SDI.1': 1}, 'FIA': {'FIA_AFL.1': 10, 'FIA_SOS.1': 8, 'FIA_UAU.1': 13, 'FIA_UAU.5': 11, 'FIA_UAU.7': 10, 'FIA_UID.1': 17, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.7.1': 2, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MSA.1': 12, 'FMT_MSA.3': 26, 'FMT_MTD.1': 11, 'FMT_MTD.3': 8, 'FMT_SMF.1': 14, 'FMT_SMR.1': 20, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_MTD.3.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_PHP.1': 7, 'FPT_STM.1': 12, 'FPT_TST.1': 7, 'FPT_STM.1.1': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTA': {'FTA_SSL.3': 10, 'FTA_SSL.4': 10, 'FTA_SSL.3.1': 2, 'FTA_SSL.4.1': 1}, 'FTP': {'FTP_ITC.1': 1}}, 'cc_claims': {'O': {'O.PIN': 7, 'O.RESIDUAL': 6, 'O.SELFTESTS': 6, 'O.PROTECTION': 8, 'O.AUTH_STATE': 9, 'O.MANAGEMENT': 9, 'O.LOG_CARDS': 3, 'O.LOG_DATA': 6, 'O.TRANSFER': 3, 'O.DMS_CONNECT': 1, 'O.TIME': 6, 'O.SEALING': 3, 'O.DMS_CONNECTION': 5}, 'T': {'T.MAN_HW': 3, 'T.DATA': 3, 'T.ACCESS': 3, 'T.AUTH_STATE': 3, 'T.ADMIN_PIN': 3, 'T.FIRMWARE': 3}, 'A': {'A.MEDIC': 3, 'A.ADMIN': 3, 'A.CARDS': 4, 'A.DMS': 3, 'A.PHYSICAL': 3, 'A.ENVIRONMENT': 2, 'A.ENVIRONMEN': 1, 'A.DEVELOPER': 1}, 'OE': {'OE.MEDIC': 10, 'OE.ADMIN': 9, 'OE.CARDS': 8, 'OE.DMS': 4, 'OE.PHYSICAL': 6, 'OE.ENVIRONMENT': 6, 'OE.DEVELOPER': 1}, 'OSP': {'OSP.LOG_DATA': 3, 'OSP.TRANSFER': 3, 'OSP.DMS_CONNE': 1, 'OSP.TIME': 3, 'OSP.SEALING': 3, 'OSP.SELFTESTS': 3, 'OSP.EMERGENCY_': 1, 'OSP.LOG_CARD': 1, 'OSP.DMS_CONN': 1, 'OSP.EMERGENC': 1, 'OSP.LOG_CARDS': 1, 'OSP.DMS_CONNECTION': 1, 'OSP.EMERGENCY_DATA': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 5, 'AES-256': 1}, 'HPC': {'HPC': 14}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {'GCM': {'GCM': 4}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 6}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 197': 1}, 'X509': {'X.509': 9}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'done by an authorised card that is out of scope of this ST': 1, 'the TOE • Signature generation for emergency data1 on the eHC (done by an authorised card that is out of scope of this ST) 1.4.6 Physical Protection of the TOE The TOE cannot counter physical attacks concerning': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0623-V3-2024': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0052-2015': 1}}, 'cc_security_level': {'EAL': {'EAL 3': 1, 'EAL 4': 1, 'EAL 2': 1, 'EAL 3 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'ALC': {'ALC_TAT.1': 1, 'ALC_FLR': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 0623V3a_pdf.pdf.
    • The st_filename property was set to 0623V3b_pdf.pdf.
    • The cert_filename property was set to 0623V3c_pdf.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-0623-V3-2024.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V3a_pdf.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V3b_pdf.pdf.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The cert_metadata property was set to None.
    • The cert_keywords property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name ZEMO VML-GK2 HW V2.0.0 / FW V3.2.0 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V3c_pdf.pdf",
  "dgst": "d648123b397e3e21",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0623-V3-2024",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.0.0",
        "3.2.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "eHealth",
      "cert_id": "BSI-DSZ-CC-0623-V3-2024",
      "certification_date": "08.05.2024",
      "enhanced": {
        "applicant": "ZEMO GmbH\nFranz-Mader-Stra\u00dfe 9\n94036 Passau",
        "assurance_level": "EAL3,AVA_VAN.5,ALC_TAT.1,ADV_TDS.3,ADV_IMP.1,ADV_FSP.4",
        "cert_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte06/0623V3c_pdf.pdf?__blob=publicationFile\u0026v=2",
        "certification_date": "08.05.2024",
        "description": "The Target of Evaluation (TOE) is the ZEMO VML-GK2, FW-Version 3.1.0, HW-Version 2.0.0 by ZEMO GmbH. The TOE is a smart card terminal used for the German healthcare system as a Mobile Card Terminal (MobCT). It is used by medical suppliers during visits to read out insurance data from a German electronic Health Card (eHC) of a health insured person. The TOE fulfils the IT security requirements to be used with the German electronic Health Card (eHC) and the German Health Professional Card (HPC) based on the regulations of the German healthcare system.",
        "entries": [
          {
            "description": "Certificate",
            "id": "BSI-DSZ-CC-0623-V3-2024 (08.05.2024)"
          },
          {
            "description": "Certificate",
            "id": "BSI-DSZ-CC-0623-V2-2018 (28.06.2018)"
          }
        ],
        "evaluation_facility": "T\u00dcV Informationstechnik GmbH",
        "expiration_date": "07.05.2029",
        "product": "ZEMO VML-GK2",
        "protection_profile": "Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System (MobCT), Version 1.4, BSI-CC-PP-0052-2015, 19 January 2015",
        "report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte06/0623V3a_pdf.pdf?__blob=publicationFile\u0026v=2",
        "target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte06/0623V3b_pdf.pdf?__blob=publicationFile\u0026v=2"
      },
      "product": "ZEMO VML-GK2",
      "subcategory": "Card reader",
      "url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Gesundheitswesen_Kartenlesegeraete/0623.html",
      "vendor": "ZEMO GmbH"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "ZEMO GmbH",
  "manufacturer_web": "https://zemo.de",
  "name": "ZEMO VML-GK2 HW V2.0.0 / FW V3.2.0",
  "not_valid_after": "2029-05-07",
  "not_valid_before": "2024-05-08",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "0623V3c_pdf.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0623-V3-2024": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0052-2015": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "ALC": {
          "ALC_FLR": 1,
          "ALC_TAT.1": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 3": 1,
          "EAL 3 augmented": 1,
          "EAL 4": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Federal Office for Information Security",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, Mobile Card Terminal for the German Healthcare System (MobCT), BSI-CC-PP-0052-2015\"",
      "/Subject": "Common Criteria, Certification, Zertifizierung, Mobile Card Terminal for the German Healthcare System (MobCT), BSI-CC-PP-0052-2015",
      "/Title": "Certification Report BSI-DSZ-CC-0623-V3-2024",
      "pdf_file_size_bytes": 232618,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "0623V3a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.5 valid until: 7 May 2029",
        "cc_version": "PP conformant Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-0623-V3-2024",
        "cert_item": "ZEMO VML-GK2 HW V2.0.0 / FW V3.2.0",
        "cert_lab": "BSI",
        "developer": "ZEMO GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System (MobCT), Version 1.4, BSI-CC-PP-0052-2015, 24 September 2014"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "RSA": {
          "RSA-3072": 1
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0623-V3-2024": 12
        }
      },
      "cc_claims": {
        "OE": {
          "OE.ENVIRONMENT": 1,
          "OE.MEDIC": 1,
          "OE.PHYSICAL": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0052-2015": 4
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_FSP.4": 4,
          "ADV_IMP.1": 4,
          "ADV_TDS.3": 4
        },
        "ALC": {
          "ALC_FLR": 3,
          "ALC_TAT.1": 4
        },
        "ATE": {
          "ATE_FUN": 1,
          "ATE_IND": 3
        },
        "AVA": {
          "AVA_VAN": 3,
          "AVA_VAN.5": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 3,
          "EAL 3": 4,
          "EAL 3 augmented": 3,
          "EAL 4": 4,
          "EAL3+": 1
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_COP": 2
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          "1170, 2024-03-21; SVN Liste aller entwicklungsrelevanten Dokumente, Version 809, 2024-03-22, (confidential documents) [11] Guidance documentation for the TOE, Version 2.2.0, 2023-11-24, Bedienungsanleitung": 1,
          "Report, Version 3, 2024-03-25, EVALUATION TECHNICAL REPORT SUMMARY, T\u00dcV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
        }
      },
      "cipher_mode": {
        "GCM": {
          "GCM": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 3
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 32": 1,
          "AIS 38": 1
        },
        "FIPS": {
          "FIPS180-4": 1,
          "FIPS197": 1
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        },
        "RFC": {
          "RFC6234": 1
        },
        "X509": {
          "X.509": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1,
            "AES-256": 1
          },
          "HPC": {
            "HPC": 4
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Federal Office for Information Security",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, Mobile Card Terminal for the German Healthcare System (MobCT), BSI-CC-PP-0052-2015\"",
      "/Subject": "Common Criteria, Certification, Zertifizierung, Mobile Card Terminal for the German Healthcare System (MobCT), BSI-CC-PP-0052-2015",
      "/Title": "Certification Report BSI-DSZ-CC-0623-V3-2024",
      "pdf_file_size_bytes": 336199,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/AIS",
          "https://www.bsi.bund.de/zertifizierung",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "https://www.sogis.eu/",
          "https://www.commoncriteriaportal.org/",
          "http://www.commoncriteriaportal.org/cc/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 23
    },
    "st_filename": "0623V3b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ADMIN": 3,
          "A.CARDS": 4,
          "A.DEVELOPER": 1,
          "A.DMS": 3,
          "A.ENVIRONMEN": 1,
          "A.ENVIRONMENT": 2,
          "A.MEDIC": 3,
          "A.PHYSICAL": 3
        },
        "O": {
          "O.AUTH_STATE": 9,
          "O.DMS_CONNECT": 1,
          "O.DMS_CONNECTION": 5,
          "O.LOG_CARDS": 3,
          "O.LOG_DATA": 6,
          "O.MANAGEMENT": 9,
          "O.PIN": 7,
          "O.PROTECTION": 8,
          "O.RESIDUAL": 6,
          "O.SEALING": 3,
          "O.SELFTESTS": 6,
          "O.TIME": 6,
          "O.TRANSFER": 3
        },
        "OE": {
          "OE.ADMIN": 9,
          "OE.CARDS": 8,
          "OE.DEVELOPER": 1,
          "OE.DMS": 4,
          "OE.ENVIRONMENT": 6,
          "OE.MEDIC": 10,
          "OE.PHYSICAL": 6
        },
        "OSP": {
          "OSP.DMS_CONN": 1,
          "OSP.DMS_CONNE": 1,
          "OSP.DMS_CONNECTION": 1,
          "OSP.EMERGENC": 1,
          "OSP.EMERGENCY_": 1,
          "OSP.EMERGENCY_DATA": 1,
          "OSP.LOG_CARD": 1,
          "OSP.LOG_CARDS": 1,
          "OSP.LOG_DATA": 3,
          "OSP.SEALING": 3,
          "OSP.SELFTESTS": 3,
          "OSP.TIME": 3,
          "OSP.TRANSFER": 3
        },
        "T": {
          "T.ACCESS": 3,
          "T.ADMIN_PIN": 3,
          "T.AUTH_STATE": 3,
          "T.DATA": 3,
          "T.FIRMWARE": 3,
          "T.MAN_HW": 3
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0032": 1,
          "BSI-CC-PP-0052": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 5,
          "ADV_IMP.1": 5,
          "ADV_TDS.3": 5
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.3": 1,
          "ALC_CMS.3": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 5
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 8
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 3": 4,
          "EAL 3 augmented": 3,
          "EAL3+": 2
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM.1": 23,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 2,
          "FCS_CKM.4": 22,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 31,
          "FCS_COP.1": 5
        },
        "FDP": {
          "FDP_ACC.1": 30,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 25,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 5,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 5,
          "FDP_IFC": 41,
          "FDP_IFC.1": 11,
          "FDP_IFF": 45,
          "FDP_IFF.1": 25,
          "FDP_ITC.1": 21,
          "FDP_ITC.1.1": 1,
          "FDP_ITC.1.2": 1,
          "FDP_ITC.1.3": 1,
          "FDP_ITC.2": 9,
          "FDP_RIP": 15,
          "FDP_RIP.1": 2,
          "FDP_SDI.1": 1,
          "FDP_SDI.2": 9,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1,
          "FDP_SVR": 2,
          "FDP_SVR.1": 12,
          "FDP_SVR.1.1": 5,
          "FDP_SVR.1.2": 3,
          "FDP_SVR.1.3": 3
        },
        "FIA": {
          "FIA_AFL.1": 10,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_SOS.1": 8,
          "FIA_SOS.1.1": 1,
          "FIA_UAU.1": 13,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.5": 11,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.7": 10,
          "FIA_UAU.7.1": 2,
          "FIA_UID.1": 17,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_MSA.1": 12,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 26,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 11,
          "FMT_MTD.1.1": 1,
          "FMT_MTD.3": 8,
          "FMT_MTD.3.1": 1,
          "FMT_SMF.1": 14,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 20,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_PHP.1": 7,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_STM.1": 12,
          "FPT_STM.1.1": 1,
          "FPT_TST.1": 7,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTA": {
          "FTA_SSL.3": 10,
          "FTA_SSL.3.1": 2,
          "FTA_SSL.4": 10,
          "FTA_SSL.4.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "done by an authorised card that is out of scope of this ST": 1,
          "out of scope": 1,
          "the TOE \u2022 Signature generation for emergency data1 on the eHC (done by an authorised card that is out of scope of this ST) 1.4.6 Physical Protection of the TOE The TOE cannot counter physical attacks concerning": 1
        }
      },
      "cipher_mode": {
        "GCM": {
          "GCM": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 6
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 197": 1
        },
        "X509": {
          "X.509": 9
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 5,
            "AES-256": 1
          },
          "HPC": {
            "HPC": 14
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/Keywords": "Protection Profile, Mobile Card Terminal, Electronic Health Card",
      "/Subject": "Mobile Card Terminal, electronic Health Card",
      "/Title": "Common Criteria Protection Profile BSI-PP-0052",
      "pdf_file_size_bytes": 461165,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 75
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0052b_pdf.pdf",
        "pp_name": "Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System (MobCT\u0026..."
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V3a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL3+",
      "ADV_IMP.1",
      "AVA_VAN.5",
      "ADV_FSP.4",
      "ADV_TDS.3",
      "ALC_TAT.1"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V3b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "9100292bed010a94f1127a8d2e0c13a60b7659a202f6d2440177fbf76b865fb9",
      "txt_hash": "1bbccc8927860fc25817575176543204395bfbd2853747ccf8533c74a073edc6"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "f09ec7b0a88dd0bc245d86c1cba75b64eb1602c53e8a72d630e7968721c5e8d7",
      "txt_hash": "f792d97250a4631fcab4b577d9be356ccd0b720d7c0a2ae21cd5cb72a23e54cf"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "97fadaefc246c35cb4f41af79e2348125109cc55bc82f3716fd014278ebc8b4e",
      "txt_hash": "925799541bdfd087849feac15166c492162025f3cf7a1fcde8b62a969795b74e"
    }
  },
  "status": "active"
}