This page was not yet optimized for use on mobile
devices.
CHERRY eHealth Terminal G87-1505 FW-Version 3.0.1 HW-Version 1.1.1
CSV information
| Status | archived |
|---|---|
| Valid from | 28.03.2018 |
| Valid until | 28.03.2023 |
| Scheme | 🇩🇪 DE |
| Manufacturer | Cherry GmbH |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, AVA_VAN.4, EAL3+, ALC_TAT.1 |
| Protection profiles | |
| Maintenance updates | CHERRY eHealth Terminal G87-1505 FW 3.0.1 HW 1.1.1 (18.12.2018) Certification report |
| CHERRY eHealth Terminal G87-1505 FW-Version 3.0.1 HW-Version 1.1.1 (07.09.2018) Certification report |
Heuristics summary
Certificate ID: BSI-DSZ-CC-0513-V2-2018
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Device models
G87-1505Security level
EAL 3, EAL 2, EAL 3 augmentedSecurity Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.4Certificates
BSI-DSZ-CC-0513-V2-2018Standards
ISO/IEC 15408, ISO/IEC 18045Certification report
Extracted keywords
Symmetric Algorithms
AES, AES-, HPC, HMAC, CMACAsymmetric Algorithms
Diffie-Hellman, DHHash functions
SHA-1, SHA-256, MD5Schemes
Key AgreementProtocols
TLS, TLSv1.1, TLSv1.2, TLS v1.1, TLS v1.2, IPsecBlock cipher modes
CBCDevice models
G87-1505, G87-1505LBZDE-2, G87-1505LBZDE-10Security level
EAL 3, EAL 2, EAL 1, EAL 4, EAL 2+, EAL 5, EAL3+, EAL 5+, EAL 6, EAL 3 augmentedSecurity Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, ALC_FLR, ALC_DEL.1, ATE_FUN, ATE_IND, AVA_VAN.4, AVA_VANSecurity Functional Requirements (SFR)
FCS_COP, FCS_CKM, FTP_ITC, FTP_TRPProtection profiles
BSI-CC-PP-0032-V2-2015-MA-01Certificates
BSI-DSZ-CC-0513-V2-2018Evaluation facilities
TÜV InformationstechnikCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Cherry GmbH [7] Evaluation Technical Report, Version 2, 28.02.2018, TÜV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, 22. Mai 2017 [9] Configuration list for the TOE, Version 1.47, 28.02.2018 (confidential document) [10] Handbuch für Administratoren eGK Tastatur G87-1505, Version 6440650-04, Feb 2018, Cherry GmbH, Report [12] Common-Criteria-3.1 Dokument ALC_DEL.1, Version 1.45, 25.01.2018, Cherry GmbH, (confidential document) [13] Sichere Lieferkette, Version 1.7, 27.02.2018, Cherry GmbH, (confidential document) QuotedStandards
FIPS180-4, FIPS197, FIPS PUB 180-4, PKCS#1, AIS 1, AIS 32, AIS 34, RFC2526, RFC1321, RFC2104, RFC4346, RFC5246, RFC3602, RFC2404, RFC 3447, RFC3268, RFC 5246, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, X.509Technical reports
BSI TR-03116-1, BSI 7148File metadata
| Title | Certification Report BSI-DSZ-CC-0513-V2-2018 |
|---|---|
| Subject | Zertifizierungsreport, Certification Report, |
| Keywords | "Common Criteria, Certification, Zertifizierung, eHealth, Terminal, Cherry GmbH, BSI-CC-PP-0032-V3, G87-1505" |
| Author | Bundesamt für Sicherheit in der Informationstechnik |
| Creation date | D:20180423125852+02'00' |
| Modification date | D:20180423141107+02'00' |
| Pages | 28 |
| Creator | Writer |
| Producer | LibreOffice 5.2 |
Frontpage
| Certificate ID | BSI-DSZ-CC-0513-V2-2018 |
|---|---|
| Certified item | CHERRY eHealth Terminal G87-1505 FW-Version 3.0.1 HW-Version 1.1.1 |
| Certification lab | BSI |
| Developer | Cherry GmbH |
References
Incoming- BSI-DSZ-CC-0513-V3-2023 - active - CHERRY eGK Tastatur G87-1505 FW-Version 3.3.3 HW-Version 1.1.1
Security target
Extracted keywords
Symmetric Algorithms
AES, HPCAsymmetric Algorithms
DHE, Diffie-Hellman, DHHash functions
SHA-256, SHA256Schemes
MACProtocols
TLS 1.1, TLS, TLS 1.2TLS cipher suites
TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHADevice models
G87-1505, G87-1505LBZDE-2Vendor
MicrosoftSecurity level
EAL3+, EAL 3, EAL 3 augmentedClaims
O.ACCESS_CONTROL, O.PIN_ENTRY, O.MANAGEMENT, O.SECURE_CHANNEL, O.STATE, O.PROTECTION, T.COM, T.PIN, T.DATA, T.F-CONNECTOR, A.PUSH_SERVER, A.ENV, A.ADMIN, A.CONNECTOR, A.SM, OE.ENV, OE.ADMIN, OE.CONNECTOR, OE.SM, OE.PUSH_SERVER, OSP.PIN, OSP.PIN_ENTRYSecurity Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_TAT.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.4, ASE_INT.1, ASE_CCL, ASE_SPD, ASE_OBJ, ASE_ECD, ASE_REQ, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FCS_CKM, FCS_CKM.4, FCS_COP, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4.1, FDP_ACC, FDP_ACF, FDP_IFC, FDP_IFF, FDP_RIP.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FDP_IFF.1, FDP_RIP.1.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU, FIA_UAU.5, FIA_UAU.7, FIA_UID.1, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FMT_MSA, FMT_MSA.2, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF.1, FPT_TST.1.2, FPT_FLS.1, FPT_ITT.1, FPT_PHP.1, FPT_PHP, FPT_TST.1, FPT_FLS.1.1, FPT_ITT.1.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.2, FPT_PHP.2.1, FPT_PHP.2.2, FPT_PHP.2.3, FPT_TST.1.1, FPT_TST.1.3, FTA_TAB, FTA_TAB.1, FTP_ITC, FTP_TRP, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-CC_PP_0032-V3-2016, BSI-CC-PP-0046, BSI-CC-PP-0032-Evaluation facilities
TÜViTSide-channel analysis
physical tampering, Physical tamperingCertification process
Security function SF.2Standards
PKCS#1, RFC 4346, RFC 3447, RFC 5246, RFC 2104, ISO/IEC 7816-8, X.509, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004Technical reports
BSI TR-03120, BSI TR-03116, BSI 7586, BSI 7500File metadata
| Title | Common-Criteria 3.1-Document |
|---|---|
| Subject | Security Target EAL3+ for G87-1505 |
| Keywords | G87-1505;BSI-DSZ-CC-0513-V2;eHealth-Keyboard;Security Target;Sicherheitsvorgaben |
| Author | Jürgen Meier |
| Creation date | D:20180228153520+01'00' |
| Modification date | D:20180228153520+01'00' |
| Pages | 77 |
| Creator | Microsoft® Word 2016 |
| Producer | Microsoft® Word 2016 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-0513-V2-2018Extracted SARs
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.4Similar certificates
| Name | Certificate ID | |
|---|---|---|
| CHERRY eGK Tastatur G87-1505 FW-Version 3.3.3 HW-Version 1.1.1 | BSI-DSZ-CC-0513-V3-2023 | Compare |
| ZEMO VML-GK2, V.3.1.0 FW-Version 3.1.0, HW-Version 2.0.0 | BSI-DSZ-CC-0623-V2-2018 | Compare |
| CHERRY eHealth Terminal ST-1506, AFxZ FW 3.0.0, HW 4.0.0 | BSI-DSZ-CC-1124-V2-2022 | Compare |
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0513V2c_pdf.pdf",
"dgst": "511545647dc5b1bf",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0513-V2-2018",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL3+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 4
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"3.0.1",
"1.1.1"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"e1444c335eeed890"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0513-V3-2023"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0513-V3-2023"
]
},
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2018-09-07",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0513V2ma1a_pdf.pdf",
"maintenance_st_link": null,
"maintenance_title": "CHERRY eHealth Terminal G87-1505 FW-Version 3.0.1 HW-Version 1.1.1"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2018-12-18",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0513V2ma2a_pdf.pdf",
"maintenance_st_link": null,
"maintenance_title": "CHERRY eHealth Terminal G87-1505 FW 3.0.1 HW 1.1.1"
}
]
},
"manufacturer": "Cherry GmbH",
"manufacturer_web": "https://www.cherrycorp.com/",
"name": "CHERRY eHealth Terminal G87-1505 FW-Version 3.0.1 HW-Version 1.1.1",
"not_valid_after": "2023-03-28",
"not_valid_before": "2018-03-28",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "0513V2c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0513-V2-2018": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"ALC": {
"ALC_TAT.1": 1
},
"AVA": {
"AVA_VAN.4": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 3": 1,
"EAL 3 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {
"G87": {
"G87-1505": 1
}
},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "0513V2a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.4",
"cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 conformant",
"cert_id": "BSI-DSZ-CC-0513-V2-2018",
"cert_item": "CHERRY eHealth Terminal G87-1505 FW-Version 3.0.1 HW-Version 1.1.1",
"cert_lab": "BSI",
"developer": "Cherry GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC- PP-0032-V2-2015-MA-01, 22. Mai 2017"
}
},
"report_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"DH": 2,
"Diffie-Hellman": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0513-V2-2018": 15
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0032-V2-2015-MA-01": 3
}
},
"cc_sar": {
"ADV": {
"ADV_FSP.4": 4,
"ADV_IMP.1": 4,
"ADV_TDS.3": 4
},
"ALC": {
"ALC_DEL.1": 1,
"ALC_FLR": 2,
"ALC_TAT.1": 4
},
"ATE": {
"ATE_FUN": 2,
"ATE_IND": 2
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.4": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 2,
"EAL 2+": 1,
"EAL 3": 4,
"EAL 3 augmented": 3,
"EAL 4": 1,
"EAL 5": 2,
"EAL 5+": 1,
"EAL 6": 1,
"EAL3+": 1
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM": 1,
"FCS_COP": 5
},
"FTP": {
"FTP_ITC": 1,
"FTP_TRP": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"22. Mai 2017 [9] Configuration list for the TOE, Version 1.47, 28.02.2018 (confidential document) [10] Handbuch f\u00fcr Administratoren eGK Tastatur G87-1505, Version 6440650-04, Feb 2018, Cherry GmbH": 1,
"Cherry GmbH [7] Evaluation Technical Report, Version 2, 28.02.2018, T\u00dcV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7": 1,
"Report [12] Common-Criteria-3.1 Dokument ALC_DEL.1, Version 1.45, 25.01.2018, Cherry GmbH, (confidential document) [13] Sichere Lieferkette, Version 1.7, 27.02.2018, Cherry GmbH, (confidential document) Quoted": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IPsec": {
"IPsec": 1
},
"TLS": {
"TLS": {
"TLS": 6,
"TLS v1.1": 2,
"TLS v1.2": 2,
"TLSv1.1": 3,
"TLSv1.2": 3
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
}
},
"device_model": {
"G87": {
"G87-1505": 13,
"G87-1505LBZDE-10": 2,
"G87-1505LBZDE-2": 2
}
},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 3
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 1
}
},
"SHA": {
"SHA1": {
"SHA-1": 2
},
"SHA2": {
"SHA-256": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 1": 1,
"AIS 32": 1,
"AIS 34": 1
},
"FIPS": {
"FIPS PUB 180-4": 1,
"FIPS180-4": 6,
"FIPS197": 2
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
},
"PKCS": {
"PKCS#1": 4
},
"RFC": {
"RFC 3447": 1,
"RFC 5246": 1,
"RFC1321": 1,
"RFC2104": 3,
"RFC2404": 2,
"RFC2526": 1,
"RFC3268": 1,
"RFC3602": 2,
"RFC4346": 4,
"RFC5246": 4
},
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 4,
"AES-": 1
},
"HPC": {
"HPC": 2
}
},
"constructions": {
"MAC": {
"CMAC": 1,
"HMAC": 3
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7148": 1,
"BSI TR-03116-1": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20180423125852+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, eHealth, Terminal, Cherry GmbH, BSI-CC-PP-0032-V3, G87-1505\"",
"/ModDate": "D:20180423141107+02\u002700\u0027",
"/Producer": "LibreOffice 5.2",
"/Subject": "Zertifizierungsreport, Certification Report, ",
"/Title": "Certification Report BSI-DSZ-CC-0513-V2-2018",
"pdf_file_size_bytes": 1189634,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"http://www.sogisportal.eu/",
"https://www.bsi.bund.de/AIS",
"https://www.bsi.bund.de/",
"https://www.bsi.bund.de/zertifizierungsreporte",
"https://www.bsi.bund.de/zertifizierung",
"http://www.commoncriteriaportal.org/cc/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 28
},
"st_filename": "0513V2b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"DH": 1,
"DHE": 2,
"Diffie-Hellman": 2
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMIN": 3,
"A.CONNECTOR": 3,
"A.ENV": 7,
"A.PUSH_SERVER": 4,
"A.SM": 6
},
"O": {
"O.ACCESS_CONTROL": 9,
"O.MANAGEMENT": 7,
"O.PIN_ENTRY": 6,
"O.PROTECTION": 9,
"O.SECURE_CHANNEL": 4,
"O.STATE": 7
},
"OE": {
"OE.ADMIN": 4,
"OE.CONNECTOR": 6,
"OE.ENV": 11,
"OE.PUSH_SERVER": 4,
"OE.SM": 2
},
"OSP": {
"OSP.PIN": 1,
"OSP.PIN_ENTRY": 4
},
"T": {
"T.COM": 3,
"T.DATA": 3,
"T.F-CONNECTOR": 3,
"T.PIN": 6
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0032-": 1,
"BSI-CC-PP-0046": 1,
"BSI-CC_PP_0032-V3-2016": 1
}
},
"cc_sar": {
"ADV": {
"ADV_FSP.4": 4,
"ADV_IMP.1": 5,
"ADV_TDS.3": 4
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.3": 1,
"ALC_CMS.3": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_LCD.1": 1,
"ALC_TAT.1": 4
},
"ASE": {
"ASE_CCL": 2,
"ASE_CCL.1": 1,
"ASE_ECD": 2,
"ASE_ECD.1": 1,
"ASE_INT.1": 3,
"ASE_OBJ": 2,
"ASE_OBJ.2": 1,
"ASE_REQ": 2,
"ASE_REQ.2": 1,
"ASE_SPD": 2,
"ASE_SPD.1": 1,
"ASE_TSS": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.4": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 3": 3,
"EAL 3 augmented": 3,
"EAL3+": 2
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM": 16,
"FCS_CKM.1": 23,
"FCS_CKM.2": 4,
"FCS_CKM.4": 32,
"FCS_CKM.4.1": 1,
"FCS_COP": 52,
"FCS_COP.1": 10
},
"FDP": {
"FDP_ACC": 15,
"FDP_ACC.1": 23,
"FDP_ACF": 17,
"FDP_ACF.1": 16,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 3,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 2,
"FDP_IFC": 22,
"FDP_IFC.1": 12,
"FDP_IFF": 23,
"FDP_IFF.1": 14,
"FDP_ITC.1": 15,
"FDP_ITC.2": 12,
"FDP_RIP.1": 8,
"FDP_RIP.1.1": 1
},
"FIA": {
"FIA_AFL.1": 7,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 2,
"FIA_ATD.1": 7,
"FIA_ATD.1.1": 2,
"FIA_SOS.1": 8,
"FIA_SOS.1.1": 1,
"FIA_UAU": 2,
"FIA_UAU.1": 10,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.5": 7,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.7": 8,
"FIA_UAU.7.1": 1,
"FIA_UID.1": 14,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MOF.1": 4,
"FMT_MSA": 22,
"FMT_MSA.1": 15,
"FMT_MSA.1.1": 1,
"FMT_MSA.2": 10,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 19,
"FMT_MSA.3.1": 2,
"FMT_MSA.3.2": 2,
"FMT_SMF.1": 13,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 23,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS.1": 8,
"FPT_FLS.1.1": 2,
"FPT_ITT.1": 8,
"FPT_ITT.1.1": 1,
"FPT_PHP": 1,
"FPT_PHP.1": 12,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_PHP.2": 11,
"FPT_PHP.2.1": 1,
"FPT_PHP.2.2": 1,
"FPT_PHP.2.3": 1,
"FPT_TST.1": 11,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 3,
"FPT_TST.1.3": 2
},
"FTA": {
"FTA_TAB": 8,
"FTA_TAB.1": 1
},
"FTP": {
"FTP_ITC": 3,
"FTP_ITC.1": 5,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP": 4,
"FTP_TRP.1": 4,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {
"SecurityFunction": {
"Security function SF.2": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 24,
"TLS 1.1": 5,
"TLS 1.2": 4
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {
"G87": {
"G87-1505": 7,
"G87-1505LBZDE-2": 1
}
},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcViT": 1
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 6,
"SHA256": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"Physical tampering": 1,
"physical tampering": 12
}
},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1
},
"ISO": {
"ISO/IEC 7816-8": 1
},
"PKCS": {
"PKCS#1": 3
},
"RFC": {
"RFC 2104": 1,
"RFC 3447": 1,
"RFC 4346": 1,
"RFC 5246": 1
},
"X509": {
"X.509": 8
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 5
},
"HPC": {
"HPC": 6
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7500": 1,
"BSI 7586": 1,
"BSI TR-03116": 1,
"BSI TR-03120": 3
}
},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 4,
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA": 3
}
},
"vendor": {
"Microsoft": {
"Microsoft": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "J\u00fcrgen Meier",
"/CreationDate": "D:20180228153520+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/Keywords": "G87-1505;BSI-DSZ-CC-0513-V2;eHealth-Keyboard;Security Target;Sicherheitsvorgaben",
"/ModDate": "D:20180228153520+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"/Subject": "Security Target EAL3+ for G87-1505",
"/Title": "Common-Criteria 3.1-Document",
"pdf_file_size_bytes": 1893419,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.cherry.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 77
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0032V2b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0513V2a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL3+",
"ADV_IMP.1",
"ADV_FSP.4",
"AVA_VAN.4",
"ADV_TDS.3",
"ALC_TAT.1"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0513V2b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "bad61b8f97b2afee4f1a8464cd3d1a197893774dfb154ffeb2d06fa3d029998e",
"txt_hash": "12f356d5b137febd1b32fab9e5ab0aa77cb6bfe66b178ce63bf481b11288e951"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "6119241090addbceb12c6a2b56bcc9a2760aaf85481c70c6973c61a3136d0044",
"txt_hash": "35165c57e9aa6008471deef77d7fba2a3659d9532e8db6291ef34c6d84d7a2e6"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "e141395ea4c89c0ff777d9410d019302d415b2822ed32d95b3086586ef278015",
"txt_hash": "93ab963d2ddf6c5f5f4bce0a6e507ec1bb1ff1c1267648558b5e2422dddef64b"
}
},
"status": "archived"
}