CHERRY eHealth Terminal G87-1505 FW-Version 3.0.1 HW-Version 1.1.1

CSV information

Status archived
Valid from 28.03.2018
Valid until 28.03.2023
Scheme 🇩🇪 DE
Manufacturer Cherry GmbH
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ADV_IMP.1, ADV_TDS.3, AVA_VAN.4, ALC_TAT.1, EAL3+, ADV_FSP.4
Protection profiles
Maintenance updates CHERRY eHealth Terminal G87-1505 FW-Version 3.0.1 HW-Version 1.1.1 (07.09.2018) Certification report
CHERRY eHealth Terminal G87-1505 FW 3.0.1 HW 1.1.1 (18.12.2018) Certification report

Heuristics summary

Certificate ID: BSI-DSZ-CC-0513-V2-2018

Certificate

Extracted keywords

Device models
G87-1505

Security level
EAL 3, EAL 2, EAL 3 augmented
Security Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.4
Certificates
BSI-DSZ-CC-0513-V2-2018

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Title Certification Report BSI-DSZ-CC-0513-V2-2018
Subject Zertifikat, Urkunde, Certification
Keywords "Common Criteria, Certification, Zertifizierung, eHealth, Terminal, Cherry GmbH, BSI-CC-PP-0032-V3, G87-1505"
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20180423125837+02'00'
Modification date D:20180423134212+02'00'
Pages 1
Creator Writer
Producer LibreOffice 5.2

Certification report

Extracted keywords

Symmetric Algorithms
AES, AES-, HPC, HMAC, CMAC
Asymmetric Algorithms
Diffie-Hellman, DH
Hash functions
SHA-1, SHA-256, MD5
Schemes
Key Agreement
Protocols
TLS, TLSv1.1, TLSv1.2, TLS v1.1, TLS v1.2, IPsec
Block cipher modes
CBC

Device models
G87-1505, G87-1505LBZDE-2, G87-1505LBZDE-10

Security level
EAL 3, EAL 2, EAL 1, EAL 4, EAL 2+, EAL 5, EAL3+, EAL 5+, EAL 6, EAL 3 augmented
Security Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, ALC_FLR, ALC_DEL.1, ATE_FUN, ATE_IND, AVA_VAN.4, AVA_VAN
Security Functional Requirements (SFR)
FCS_COP, FCS_CKM, FTP_ITC, FTP_TRP
Protection profiles
BSI-CC-PP-0032-V2-2015-MA-01
Certificates
BSI-DSZ-CC-0513-V2-2018
Evaluation facilities
TÜV Informationstechnik

Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Cherry GmbH [7] Evaluation Technical Report, Version 2, 28.02.2018, TÜV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, 22. Mai 2017 [9] Configuration list for the TOE, Version 1.47, 28.02.2018 (confidential document) [10] Handbuch für Administratoren eGK Tastatur G87-1505, Version 6440650-04, Feb 2018, Cherry GmbH, Report [12] Common-Criteria-3.1 Dokument ALC_DEL.1, Version 1.45, 25.01.2018, Cherry GmbH, (confidential document) [13] Sichere Lieferkette, Version 1.7, 27.02.2018, Cherry GmbH, (confidential document) Quoted

Standards
FIPS180-4, FIPS197, FIPS PUB 180-4, PKCS#1, AIS 1, AIS 32, AIS 34, RFC2526, RFC1321, RFC2104, RFC4346, RFC5246, RFC3602, RFC2404, RFC 3447, RFC3268, RFC 5246, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, X.509
Technical reports
BSI TR-03116-1, BSI 7148

File metadata

Title Certification Report BSI-DSZ-CC-0513-V2-2018
Subject Zertifizierungsreport, Certification Report,
Keywords "Common Criteria, Certification, Zertifizierung, eHealth, Terminal, Cherry GmbH, BSI-CC-PP-0032-V3, G87-1505"
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20180423125852+02'00'
Modification date D:20180423141107+02'00'
Pages 28
Creator Writer
Producer LibreOffice 5.2

Frontpage

Certificate ID BSI-DSZ-CC-0513-V2-2018
Certified item CHERRY eHealth Terminal G87-1505 FW-Version 3.0.1 HW-Version 1.1.1
Certification lab BSI
Developer Cherry GmbH

References

Incoming

Security target

Extracted keywords

Symmetric Algorithms
AES, HPC
Asymmetric Algorithms
DHE, Diffie-Hellman, DH
Hash functions
SHA-256, SHA256
Schemes
MAC
Protocols
TLS 1.1, TLS, TLS 1.2
TLS cipher suites
TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA

Device models
G87-1505, G87-1505LBZDE-2
Vendor
Microsoft

Security level
EAL3+, EAL 3, EAL 3 augmented
Claims
O.ACCESS_CONTROL, O.PIN_ENTRY, O.MANAGEMENT, O.SECURE_CHANNEL, O.STATE, O.PROTECTION, T.COM, T.PIN, T.DATA, T.F-CONNECTOR, A.PUSH_SERVER, A.ENV, A.ADMIN, A.CONNECTOR, A.SM, OE.ENV, OE.ADMIN, OE.CONNECTOR, OE.SM, OE.PUSH_SERVER, OSP.PIN, OSP.PIN_ENTRY
Security Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_TAT.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.4, ASE_INT.1, ASE_CCL, ASE_SPD, ASE_OBJ, ASE_ECD, ASE_REQ, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FCS_CKM, FCS_CKM.4, FCS_COP, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4.1, FDP_ACC, FDP_ACF, FDP_IFC, FDP_IFF, FDP_RIP.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FDP_IFF.1, FDP_RIP.1.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU, FIA_UAU.5, FIA_UAU.7, FIA_UID.1, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FMT_MSA, FMT_MSA.2, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF.1, FPT_TST.1.2, FPT_FLS.1, FPT_ITT.1, FPT_PHP.1, FPT_PHP, FPT_TST.1, FPT_FLS.1.1, FPT_ITT.1.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.2, FPT_PHP.2.1, FPT_PHP.2.2, FPT_PHP.2.3, FPT_TST.1.1, FPT_TST.1.3, FTA_TAB, FTA_TAB.1, FTP_ITC, FTP_TRP, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC_PP_0032-V3-2016, BSI-CC-PP-0046, BSI-CC-PP-0032-
Evaluation facilities
TÜViT

Side-channel analysis
physical tampering, Physical tampering
Certification process
Security function SF.2

Standards
PKCS#1, RFC 4346, RFC 3447, RFC 5246, RFC 2104, ISO/IEC 7816-8, X.509, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004
Technical reports
BSI TR-03120, BSI TR-03116, BSI 7586, BSI 7500

File metadata

Title Common-Criteria 3.1-Document
Subject Security Target EAL3+ for G87-1505
Keywords G87-1505;BSI-DSZ-CC-0513-V2;eHealth-Keyboard;Security Target;Sicherheitsvorgaben
Author Jürgen Meier
Creation date D:20180228153520+01'00'
Modification date D:20180228153520+01'00'
Pages 77
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

BSI-DSZ-CC-0513-V2-2018

Extracted SARs

ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.4

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0513V2c_pdf.pdf",
  "dgst": "511545647dc5b1bf",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0513-V2-2018",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL3+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "3.0.1",
        "1.1.1"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "e1444c335eeed890"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0513-V3-2023"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0513-V3-2023"
        ]
      },
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2018-09-07",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0513V2ma1a_pdf.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "CHERRY eHealth Terminal G87-1505 FW-Version 3.0.1 HW-Version 1.1.1"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2018-12-18",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0513V2ma2a_pdf.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "CHERRY eHealth Terminal G87-1505 FW 3.0.1 HW 1.1.1"
      }
    ]
  },
  "manufacturer": "Cherry GmbH",
  "manufacturer_web": "https://www.cherrycorp.com/",
  "name": "CHERRY eHealth Terminal G87-1505 FW-Version 3.0.1 HW-Version 1.1.1",
  "not_valid_after": "2023-03-28",
  "not_valid_before": "2018-03-28",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "0513V2c_pdf.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0513-V2-2018": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "ALC": {
          "ALC_TAT.1": 1
        },
        "AVA": {
          "AVA_VAN.4": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 3": 1,
          "EAL 3 augmented": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {
        "G87": {
          "G87-1505": 1
        }
      },
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20180423125837+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, eHealth, Terminal, Cherry GmbH, BSI-CC-PP-0032-V3, G87-1505\"",
      "/ModDate": "D:20180423134212+02\u002700\u0027",
      "/Producer": "LibreOffice 5.2",
      "/Subject": "Zertifikat, Urkunde, Certification",
      "/Title": "Certification Report BSI-DSZ-CC-0513-V2-2018",
      "pdf_file_size_bytes": 903222,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "0513V2a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.4",
        "cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 conformant",
        "cert_id": "BSI-DSZ-CC-0513-V2-2018",
        "cert_item": "CHERRY eHealth Terminal G87-1505 FW-Version 3.0.1 HW-Version 1.1.1",
        "cert_lab": "BSI",
        "developer": "Cherry GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC- PP-0032-V2-2015-MA-01, 22. Mai 2017"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "DH": 2,
            "Diffie-Hellman": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0513-V2-2018": 15
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0032-V2-2015-MA-01": 3
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_FSP.4": 4,
          "ADV_IMP.1": 4,
          "ADV_TDS.3": 4
        },
        "ALC": {
          "ALC_DEL.1": 1,
          "ALC_FLR": 2,
          "ALC_TAT.1": 4
        },
        "ATE": {
          "ATE_FUN": 2,
          "ATE_IND": 2
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.4": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 2,
          "EAL 2+": 1,
          "EAL 3": 4,
          "EAL 3 augmented": 3,
          "EAL 4": 1,
          "EAL 5": 2,
          "EAL 5+": 1,
          "EAL 6": 1,
          "EAL3+": 1
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM": 1,
          "FCS_COP": 5
        },
        "FTP": {
          "FTP_ITC": 1,
          "FTP_TRP": 1
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          "22. Mai 2017 [9] Configuration list for the TOE, Version 1.47, 28.02.2018 (confidential document) [10] Handbuch f\u00fcr Administratoren eGK Tastatur G87-1505, Version 6440650-04, Feb 2018, Cherry GmbH": 1,
          "Cherry GmbH [7] Evaluation Technical Report, Version 2, 28.02.2018, T\u00dcV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7": 1,
          "Report [12] Common-Criteria-3.1 Dokument ALC_DEL.1, Version 1.45, 25.01.2018, Cherry GmbH, (confidential document) [13] Sichere Lieferkette, Version 1.7, 27.02.2018, Cherry GmbH, (confidential document) Quoted": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IPsec": {
          "IPsec": 1
        },
        "TLS": {
          "TLS": {
            "TLS": 6,
            "TLS v1.1": 2,
            "TLS v1.2": 2,
            "TLSv1.1": 3,
            "TLSv1.2": 3
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        }
      },
      "device_model": {
        "G87": {
          "G87-1505": 13,
          "G87-1505LBZDE-10": 2,
          "G87-1505LBZDE-2": 2
        }
      },
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 3
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 1
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 2
          },
          "SHA2": {
            "SHA-256": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 1": 1,
          "AIS 32": 1,
          "AIS 34": 1
        },
        "FIPS": {
          "FIPS PUB 180-4": 1,
          "FIPS180-4": 6,
          "FIPS197": 2
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        },
        "PKCS": {
          "PKCS#1": 4
        },
        "RFC": {
          "RFC 3447": 1,
          "RFC 5246": 1,
          "RFC1321": 1,
          "RFC2104": 3,
          "RFC2404": 2,
          "RFC2526": 1,
          "RFC3268": 1,
          "RFC3602": 2,
          "RFC4346": 4,
          "RFC5246": 4
        },
        "X509": {
          "X.509": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 4,
            "AES-": 1
          },
          "HPC": {
            "HPC": 2
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 1,
            "HMAC": 3
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1,
          "BSI TR-03116-1": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20180423125852+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, eHealth, Terminal, Cherry GmbH, BSI-CC-PP-0032-V3, G87-1505\"",
      "/ModDate": "D:20180423141107+02\u002700\u0027",
      "/Producer": "LibreOffice 5.2",
      "/Subject": "Zertifizierungsreport, Certification Report, ",
      "/Title": "Certification Report BSI-DSZ-CC-0513-V2-2018",
      "pdf_file_size_bytes": 1189634,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.sogisportal.eu/",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "https://www.bsi.bund.de/AIS",
          "https://www.bsi.bund.de/zertifizierung",
          "http://www.commoncriteriaportal.org/cc/",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 28
    },
    "st_filename": "0513V2b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "DH": 1,
            "DHE": 2,
            "Diffie-Hellman": 2
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ADMIN": 3,
          "A.CONNECTOR": 3,
          "A.ENV": 7,
          "A.PUSH_SERVER": 4,
          "A.SM": 6
        },
        "O": {
          "O.ACCESS_CONTROL": 9,
          "O.MANAGEMENT": 7,
          "O.PIN_ENTRY": 6,
          "O.PROTECTION": 9,
          "O.SECURE_CHANNEL": 4,
          "O.STATE": 7
        },
        "OE": {
          "OE.ADMIN": 4,
          "OE.CONNECTOR": 6,
          "OE.ENV": 11,
          "OE.PUSH_SERVER": 4,
          "OE.SM": 2
        },
        "OSP": {
          "OSP.PIN": 1,
          "OSP.PIN_ENTRY": 4
        },
        "T": {
          "T.COM": 3,
          "T.DATA": 3,
          "T.F-CONNECTOR": 3,
          "T.PIN": 6
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0032-": 1,
          "BSI-CC-PP-0046": 1,
          "BSI-CC_PP_0032-V3-2016": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_FSP.4": 4,
          "ADV_IMP.1": 5,
          "ADV_TDS.3": 4
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.3": 1,
          "ALC_CMS.3": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 4
        },
        "ASE": {
          "ASE_CCL": 2,
          "ASE_CCL.1": 1,
          "ASE_ECD": 2,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 3,
          "ASE_OBJ": 2,
          "ASE_OBJ.2": 1,
          "ASE_REQ": 2,
          "ASE_REQ.2": 1,
          "ASE_SPD": 2,
          "ASE_SPD.1": 1,
          "ASE_TSS": 2,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.4": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 3": 3,
          "EAL 3 augmented": 3,
          "EAL3+": 2
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM": 16,
          "FCS_CKM.1": 23,
          "FCS_CKM.2": 4,
          "FCS_CKM.4": 32,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 52,
          "FCS_COP.1": 10
        },
        "FDP": {
          "FDP_ACC": 15,
          "FDP_ACC.1": 23,
          "FDP_ACF": 17,
          "FDP_ACF.1": 16,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 3,
          "FDP_ACF.1.3": 2,
          "FDP_ACF.1.4": 2,
          "FDP_IFC": 22,
          "FDP_IFC.1": 12,
          "FDP_IFF": 23,
          "FDP_IFF.1": 14,
          "FDP_ITC.1": 15,
          "FDP_ITC.2": 12,
          "FDP_RIP.1": 8,
          "FDP_RIP.1.1": 1
        },
        "FIA": {
          "FIA_AFL.1": 7,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 2,
          "FIA_ATD.1": 7,
          "FIA_ATD.1.1": 2,
          "FIA_SOS.1": 8,
          "FIA_SOS.1.1": 1,
          "FIA_UAU": 2,
          "FIA_UAU.1": 10,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.5": 7,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.7": 8,
          "FIA_UAU.7.1": 1,
          "FIA_UID.1": 14,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_MOF.1": 4,
          "FMT_MSA": 22,
          "FMT_MSA.1": 15,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.2": 10,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 19,
          "FMT_MSA.3.1": 2,
          "FMT_MSA.3.2": 2,
          "FMT_SMF.1": 13,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 23,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FLS.1": 8,
          "FPT_FLS.1.1": 2,
          "FPT_ITT.1": 8,
          "FPT_ITT.1.1": 1,
          "FPT_PHP": 1,
          "FPT_PHP.1": 12,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.2": 11,
          "FPT_PHP.2.1": 1,
          "FPT_PHP.2.2": 1,
          "FPT_PHP.2.3": 1,
          "FPT_TST.1": 11,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 3,
          "FPT_TST.1.3": 2
        },
        "FTA": {
          "FTA_TAB": 8,
          "FTA_TAB.1": 1
        },
        "FTP": {
          "FTP_ITC": 3,
          "FTP_ITC.1": 5,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP": 4,
          "FTP_TRP.1": 4,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {
        "SecurityFunction": {
          "Security function SF.2": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 24,
            "TLS 1.1": 5,
            "TLS 1.2": 4
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {
        "G87": {
          "G87-1505": 7,
          "G87-1505LBZDE-2": 1
        }
      },
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcViT": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 6,
            "SHA256": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "Physical tampering": 1,
          "physical tampering": 12
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2012-09-001": 1,
          "CCMB-2012-09-002": 1,
          "CCMB-2012-09-003": 1,
          "CCMB-2012-09-004": 1
        },
        "ISO": {
          "ISO/IEC 7816-8": 1
        },
        "PKCS": {
          "PKCS#1": 3
        },
        "RFC": {
          "RFC 2104": 1,
          "RFC 3447": 1,
          "RFC 4346": 1,
          "RFC 5246": 1
        },
        "X509": {
          "X.509": 8
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 5
          },
          "HPC": {
            "HPC": 6
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7500": 1,
          "BSI 7586": 1,
          "BSI TR-03116": 1,
          "BSI TR-03120": 3
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {
        "TLS": {
          "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 4,
          "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": 3
        }
      },
      "vendor": {
        "Microsoft": {
          "Microsoft": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "J\u00fcrgen Meier",
      "/CreationDate": "D:20180228153520+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/Keywords": "G87-1505;BSI-DSZ-CC-0513-V2;eHealth-Keyboard;Security Target;Sicherheitsvorgaben",
      "/ModDate": "D:20180228153520+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Subject": "Security Target EAL3+ for G87-1505",
      "/Title": "Common-Criteria 3.1-Document",
      "pdf_file_size_bytes": 1893419,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.cherry.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 77
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0032V2b_pdf.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0513V2a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL3+",
      "AVA_VAN.4",
      "ADV_TDS.3",
      "ALC_TAT.1",
      "ADV_IMP.1",
      "ADV_FSP.4"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0513V2b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "bad61b8f97b2afee4f1a8464cd3d1a197893774dfb154ffeb2d06fa3d029998e",
      "txt_hash": "12f356d5b137febd1b32fab9e5ab0aa77cb6bfe66b178ce63bf481b11288e951"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "6119241090addbceb12c6a2b56bcc9a2760aaf85481c70c6973c61a3136d0044",
      "txt_hash": "35165c57e9aa6008471deef77d7fba2a3659d9532e8db6291ef34c6d84d7a2e6"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e141395ea4c89c0ff777d9410d019302d415b2822ed32d95b3086586ef278015",
      "txt_hash": "93ab963d2ddf6c5f5f4bce0a6e507ec1bb1ff1c1267648558b5e2422dddef64b"
    }
  },
  "status": "archived"
}