ORGA 6141 online Version 3.7.2:1.2.0

CSV information ?

Status archived
Valid from 02.03.2018
Valid until 02.03.2023
Scheme 🇩🇪 DE
Manufacturer Ingenico Healthcare/e-ID
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ADV_TDS.3, EAL3+, ADV_IMP.1, ALC_TAT.1, AVA_VAN.4, ADV_FSP.4
Maintenance updates ORGA 6141 online, V3.8.1:1.2.0 (14.12.2021) Certification report
ORGA 6141online V3.7.4:1.2.0 (19.12.2018) Certification report
ORGA 6141 online Version 3.7.4:1.2.0 (10.01.2020) Certification report
ORGA 6141 online Version 3.7.2:1.2.0 (21.11.2018) Certification report
ORGA 6141 online Version 3.7.2:1.2.0 (17.09.2018) Certification report

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0519-V2-2017

Certificate ?

Extracted keywords

Security level
EAL 3, EAL 4, EAL 2, EAL 3 augmented
Security Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.4
Protection profiles
BSI-CC-PP-0032-V3

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Title Certification Report BSI-DSZ-CC-0519V2-2017
Subject Zertifikat, Certificate, Urkunde
Keywords "Common Criteria, Certification, Zertifizierung, eHealth, Terminal, Ingenico"
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20180305111553+01'00'
Modification date D:20180305113041+01'00'
Pages 1
Creator Writer
Producer LibreOffice 5.2

Certification report ?

Extracted keywords

Symmetric Algorithms
AES-128, AES-256, HPC
Asymmetric Algorithms
RSA-2048, Diffie-Hellman, DH
Hash functions
SHA-256
Schemes
Key Exchange
Protocols
TLS, TLS v1.1, IKE
Block cipher modes
CBC

Security level
EAL 3, EAL 4, EAL 2, EAL 1, EAL 5, EAL 5+, EAL 6, EAL3+, EAL 3 augmented
Security Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, ALC_FLR, ALC_DEL, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_FUN, ATE_IND, AVA_VAN.4, AVA_VAN
Security Functional Requirements (SFR)
FCS_CKM.1, FCS_COP.1.1, FDP_IFF.1
Protection profiles
BSI-CC-PP-0032-V3
Evaluation facilities
TÃœV Informationstechnik

Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Ingenico Healthcare GmbH [7] Evaluation Technical Report, Version 2, 2017-11-10, TÃœVIT, (confidential document) [8] Common Criteria Protection Profile Electronic Health Card Terminal (eHCT), Version 3.7 vom 21

Standards
FIPS180-4, FIPS PUB 180-4, PKCS#1, AIS 1, AIS 32, AIS 34, RFC4346, RFC5246, RFC3526, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, X.509
Technical reports
BSI 7148

File metadata

Title Certification Report BSI-DSZ-CC-0519V2-2017
Subject Zertifizierungsreport
Keywords "Common Criteria, Certification, Zertifizierung, eHealth, Terminal, Ingenico"
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20180305084821+01'00'
Modification date D:20180305104300+01'00'
Pages 30
Creator Writer
Producer LibreOffice 5.2

Frontpage

Certificate ID BSI-DSZ-CC-0519-V2
Certified item ORGA 6141 online Version 3.7.2:1.2.0
Certification lab BSI
Developer Ingenico Healthcare GmbH

Security target ?

Extracted keywords

Symmetric Algorithms
AES, AES-, AES128, AES256, HPC, HMAC
Asymmetric Algorithms
RSA-2048, RSA2048, Diffie-Hellman
Hash functions
SHA1, SHA-256, SHA256, MD5
Schemes
Key Exchange
Protocols
TLS, IKE
Block cipher modes
CBC

Security level
EAL3+, EAL3, EAL 3, EAL3 augmented, EAL 3 augmented
Claims
O.ACCESS_CONTROL, O.PIN_ENTRY, O.MANAGEMENT, O.SECURE_CHANNEL, O.STATE, O.PROTECTION, T.COM, T.PIN, T.DATA, T.F-CONNECTOR, T.F-, A.PUSH_SERVER, A.ENV, A.ADMIN, A.CONNECTOR, A.SM, A.PUSH_SERVE, OE.ENV, OE.ADMIN, OE.CONNECTOR, OE.SM, OE.PUSH_SERVER, OSP.PIN_ENTRY
Security Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_ARC.1, AGD_OPE.1, AGD_PRE.1, ALC_TAT.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.4, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FCS_CKM, FCS_CKM.4, FCS_COP, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4.1, FDP_ACC, FDP_ACF, FDP_IFC, FDP_IFF, FDP_RIP.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACF.1, FDP_IFC.1, FDP_IFF.1, FDP_RIP.1.1, FIA_AFL, FIA_ATD.1, FIA_SOS.1, FIA_UAU.1, FIA_UAU.5, FIA_UAU.7, FIA_UID.1, FIA_AFL.1, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UID, FIA_UAU, FMT_MSA, FMT_MSA.2, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3, FMT_MSA.1, FMT_MSA.2.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_FLS.1, FPT_ITT.1, FPT_PHP.1, FPT_PHP.3, FPT_TST.1, FPT_FLS.1.1, FPT_ITT.1.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTA_TAB, FTA_TAB.1, FTP_ITC, FTP_TRP, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP-0032, BSI-CC-PP-0082, BSI-CC-PP-0046
Certificates
BSI-DSZ-CC-0519

Side-channel analysis
physical tampering

Standards
PKCS#1, PKCS #1, RFC3268, RFC4346, RFC5246, RFC3526, X.509
Technical reports
BSI TR-03120, BSI 7500

File metadata

Title ORGA 6141 online- Security Target
Subject CC-Evaluierung ORGA 6141 online EAL3 augmented
Author kerichsen
Creation date D:20180131095905+01'00'
Pages 62
Creator Writer
Producer OpenOffice 4.1.3

Heuristics ?

Certificate ID: BSI-DSZ-CC-0519-V2-2017

Extracted SARs

AGD_OPE.1, ASE_REQ.2, ALC_DVS.1, ALC_LCD.1, ALC_DEL.1, ADV_FSP.4, ASE_ECD.1, ASE_SPD.1, ASE_TSS.1, AVA_VAN.4, ASE_OBJ.2, AGD_PRE.1, ATE_COV.2, ASE_INT.1, ATE_DPT.1, ADV_TDS.3, ATE_IND.2, ATE_FUN.1, ALC_CMC.3, ALC_TAT.1, ADV_ARC.1, ASE_CCL.1, ADV_IMP.1, ALC_CMS.3

Similar certificates

Name Certificate ID
ORGA 6141 online Version 3.7.2:1.2.0 BSI-DSZ-CC-0519-V3-2021 Compare
Stationäres eHealth Kartenterminal ORGA 6141 online 3.9.0:2.0.0/ 3.9.0:1.2.0 BSI-DSZ-CC-0519-V5-2024 Compare
NPCT6xx TPM 2.0 Hardware version FB5C85D and FB5C85E, Firmware version 1.3.0.1, 1.3.1.0 and 1.3.2.8 ANSSI-CC-2017/55 Compare
ORGA 6141 online Version 3.8.2:1.2.0 BSI-DSZ-CC-0519-V4-2022 Compare
NXP JCOP 7.x with eUICC extension on SN300 B1.1 Secure Element, version JCOP 7.0 R1.64.0.2, JCOP 7.0 R2.04.0.2, JCOP 7.1 R1.04.0.2, JCOP 7.2 R1.09.0.2 NSCIB-CC-2200029-03-CR Compare
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6 BSI-DSZ-CC-0772-2014 Compare
Suite MISTRAL IP : version 7.0.2 pour TRC 7535, version 7.0.1 pour TRC 7539-11-A et leur centre de gestion CGM version 7.0.1 ANSSI-CC-2011/78 Compare
ZEMO VML-GK2, V.3.1.0 FW-Version 3.1.0, HW-Version 2.0.0 BSI-DSZ-CC-0623-V2-2018 Compare
HaltDos Mitigation Platform version 1.1 comprising of hdInspector version 1.0, hdDeviceUI version 2.0, hdDetectionService version 1.0 and hdCLI version 2.0. IC3S/BG01/HALTDOS/EAL2/0317/0008 Compare
NCR E10 New Generation FCR 2.0 (FCR Application Version 2.0, OpenSSL Version 1.0.2d Secure-IC firmware and hardware crypto library Version 0.0.6) 21.0.03/TSE-CCCS-48 Compare
Showing 5 out of 10.

References ?

No references are available for this certificate.

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ce56fd17a0db343db5c900276eb8118eab5252c94007537bf211d2711ebd977f', 'txt_hash': '550e4ecc25c3f3d92305dccd37e92c688fc995590df63e0413098f35f26c119e'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '754034ad2e369d4440aa00771e1bc32863c1d2cd61edcf2cbac400eb10066107', 'txt_hash': 'f42b8fc98f5c79df28397d94dc1e18bc9c0181dd7ba7057f9d8305a68c69128c'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e9d5da5d75f41dbe3a2d9b59407b82b6138fcd7e3ae4c3e70b8208401f3485b8', 'txt_hash': 'c9fe44f6f71fcef65d1abcbd5cd832b30164a8f7903876849f00052ca835965f'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 1357946, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 30, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20180305084821+01'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, eHealth, Terminal, Ingenico"', '/ModDate': "D:20180305104300+01'00'", '/Producer': 'LibreOffice 5.2', '/Subject': 'Zertifizierungsreport', '/Title': 'Certification Report BSI-DSZ-CC-0519V2-2017', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.sogisportal.eu/', 'https://www.bsi.bund.de/', 'https://www.bsi.bund.de/zertifizierung', 'https://www.bsi.bund.de/zertifizierungsreporte', 'https://www.bsi.bund.de/AIS', 'http://www.commoncriteriaportal.org/cc/', 'http://www.commoncriteriaportal.org/']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1608842, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 62, '/Title': 'ORGA 6141 online- Security Target', '/Author': 'kerichsen', '/Subject': 'CC-Evaluierung ORGA 6141 online EAL3 augmented', '/Creator': 'Writer', '/Producer': 'OpenOffice 4.1.3', '/CreationDate': "D:20180131095905+01'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 895704, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20180305111553+01'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, eHealth, Terminal, Ingenico"', '/ModDate': "D:20180305113041+01'00'", '/Producer': 'LibreOffice 5.2', '/Subject': 'Zertifikat, Certificate, Urkunde', '/Title': 'Certification Report BSI-DSZ-CC-0519V2-2017', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0519-V2', 'cert_item': 'ORGA 6141 online Version 3.7.2:1.2.0', 'developer': 'Ingenico Healthcare GmbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Common Criteria Protection Profile Electronic Health Card Terminal (eHCT), Version 3.7 vom 21. September 2016, BSI-CC-PP-0032-V3', 'cc_version': 'Common Criteria Part 2 conformant', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.4'}}.
    • The report_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0032-V3': 4}}, 'cc_security_level': {'EAL': {'EAL 3': 4, 'EAL 4': 2, 'EAL 2': 3, 'EAL 1': 1, 'EAL 5': 2, 'EAL 5+': 1, 'EAL 6': 1, 'EAL3+': 1, 'EAL 3 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 4, 'ADV_IMP.1': 4, 'ADV_TDS.3': 4}, 'ALC': {'ALC_TAT.1': 5, 'ALC_FLR': 1, 'ALC_DEL': 1, 'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_FUN': 1, 'ATE_IND': 2}, 'AVA': {'AVA_VAN.4': 4, 'AVA_VAN': 2}}, 'cc_sfr': {'FCS': {'FCS_CKM.1': 5, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_IFF.1': 2}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'TUV': {'TÃœV Informationstechnik': 2}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES-128': 1, 'AES-256': 1}, 'HPC': {'HPC': 3}}}, 'asymmetric_crypto': {'RSA': {'RSA-2048': 1}, 'FF': {'DH': {'Diffie-Hellman': 2, 'DH': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 2}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 1}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 11, 'TLS v1.1': 3}}, 'IKE': {'IKE': 1}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS180-4': 3, 'FIPS PUB 180-4': 1}, 'PKCS': {'PKCS#1': 2}, 'BSI': {'AIS 1': 1, 'AIS 32': 1, 'AIS 34': 1}, 'RFC': {'RFC4346': 5, 'RFC5246': 5, 'RFC3526': 2}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}, 'X509': {'X.509': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Ingenico Healthcare GmbH [7] Evaluation Technical Report, Version 2, 2017-11-10, TÃœVIT, (confidential document) [8] Common Criteria Protection Profile Electronic Health Card Terminal (eHCT), Version 3.7 vom 21': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0519': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0032': 3, 'BSI-CC-PP-0082': 1, 'BSI-CC-PP-0046': 1}}, 'cc_security_level': {'EAL': {'EAL3+': 2, 'EAL3': 1, 'EAL 3': 2, 'EAL3 augmented': 1, 'EAL 3 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 5, 'ADV_IMP.1': 6, 'ADV_TDS.3': 5, 'ADV_ARC.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_TAT.1': 5, 'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.4': 5}, 'ASE': {'ASE_TSS': 2, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FCS': {'FCS_CKM': 24, 'FCS_CKM.4': 32, 'FCS_COP': 52, 'FCS_CKM.1': 14, 'FCS_CKM.2': 4, 'FCS_COP.1': 10, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ACC': 29, 'FDP_ACF': 25, 'FDP_IFC': 23, 'FDP_IFF': 23, 'FDP_RIP.1': 8, 'FDP_ITC.1': 15, 'FDP_ITC.2': 12, 'FDP_ACC.1': 12, 'FDP_ACF.1': 16, 'FDP_IFC.1': 12, 'FDP_IFF.1': 17, 'FDP_RIP.1.1': 1}, 'FIA': {'FIA_AFL': 16, 'FIA_ATD.1': 7, 'FIA_SOS.1': 9, 'FIA_UAU.1': 13, 'FIA_UAU.5': 8, 'FIA_UAU.7': 8, 'FIA_UID.1': 11, 'FIA_AFL.1': 5, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UID': 2, 'FIA_UAU': 1}, 'FMT': {'FMT_MSA': 41, 'FMT_MSA.2': 10, 'FMT_SMF.1': 14, 'FMT_SMR.1': 23, 'FMT_MSA.3': 15, 'FMT_MSA.1': 8, 'FMT_MSA.2.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_FLS.1': 9, 'FPT_ITT.1': 8, 'FPT_PHP.1': 9, 'FPT_PHP.3': 11, 'FPT_TST.1': 11, 'FPT_FLS.1.1': 1, 'FPT_ITT.1.1': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTA': {'FTA_TAB': 7, 'FTA_TAB.1': 1}, 'FTP': {'FTP_ITC': 7, 'FTP_TRP': 8, 'FTP_ITC.1': 4, 'FTP_TRP.1': 3}}, 'cc_claims': {'O': {'O.ACCESS_CONTROL': 9, 'O.PIN_ENTRY': 6, 'O.MANAGEMENT': 7, 'O.SECURE_CHANNEL': 4, 'O.STATE': 7, 'O.PROTECTION': 9}, 'T': {'T.COM': 3, 'T.PIN': 6, 'T.DATA': 3, 'T.F-CONNECTOR': 2, 'T.F-': 1}, 'A': {'A.PUSH_SERVER': 3, 'A.ENV': 6, 'A.ADMIN': 3, 'A.CONNECTOR': 3, 'A.SM': 5, 'A.PUSH_SERVE': 1}, 'OE': {'OE.ENV': 11, 'OE.ADMIN': 4, 'OE.CONNECTOR': 6, 'OE.SM': 2, 'OE.PUSH_SERVER': 3}, 'OSP': {'OSP.PIN_ENTRY': 5}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 4, 'AES-': 1, 'AES128': 1, 'AES256': 1}, 'HPC': {'HPC': 10}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA-2048': 1, 'RSA2048': 1}, 'FF': {'DH': {'Diffie-Hellman': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 1}, 'SHA2': {'SHA-256': 4, 'SHA256': 2}}, 'MD': {'MD5': {'MD5': 1}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 1}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 13}}, 'IKE': {'IKE': 1}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 7}}, 'technical_report_id': {'BSI': {'BSI TR-03120': 2, 'BSI 7500': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS#1': 2, 'PKCS #1': 1}, 'RFC': {'RFC3268': 2, 'RFC4346': 1, 'RFC5246': 1, 'RFC3526': 1}, 'X509': {'X.509': 5}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0032-V3': 1}}, 'cc_security_level': {'EAL': {'EAL 3': 1, 'EAL 4': 1, 'EAL 2': 1, 'EAL 3 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'ALC': {'ALC_TAT.1': 1}, 'AVA': {'AVA_VAN.4': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 0519V2a_pdf.pdf.
    • The st_filename property was set to 0519V2b_pdf.pdf.
    • The cert_filename property was set to 0519V2c_pdf.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-0519-V2-2017.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0519V2a_pdf.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0519V2b_pdf.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The report_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name ORGA 6141 online Version 3.7.2:1.2.0 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0519V2c_pdf.pdf",
  "dgst": "ebdf6886f24a73a2",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0519-V2-2017",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "3.7.2",
        "1.2.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2018-09-17",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0519V2ma1a_pdf.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "ORGA 6141 online Version 3.7.2:1.2.0"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2018-12-19",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0519V2ma3a_pdf.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "ORGA 6141online V3.7.4:1.2.0"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2020-01-10",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0519V2ma4a_pdf.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "ORGA 6141 online Version 3.7.4:1.2.0"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2018-11-21",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0519V2ma2a_pdf.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "ORGA 6141 online Version 3.7.2:1.2.0"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2021-12-14",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0519V3ma01a_pdf.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "ORGA 6141 online, V3.8.1:1.2.0"
      }
    ]
  },
  "manufacturer": "Ingenico Healthcare/e-ID",
  "manufacturer_web": "https://www.ingenico.com",
  "name": "ORGA 6141 online Version 3.7.2:1.2.0",
  "not_valid_after": "2023-03-02",
  "not_valid_before": "2018-03-02",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "0519V2c_pdf.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0032-V3": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "ALC": {
          "ALC_TAT.1": 1
        },
        "AVA": {
          "AVA_VAN.4": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 3": 1,
          "EAL 3 augmented": 1,
          "EAL 4": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20180305111553+01\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, eHealth, Terminal, Ingenico\"",
      "/ModDate": "D:20180305113041+01\u002700\u0027",
      "/Producer": "LibreOffice 5.2",
      "/Subject": "Zertifikat, Certificate, Urkunde",
      "/Title": "Certification Report BSI-DSZ-CC-0519V2-2017",
      "pdf_file_size_bytes": 895704,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "0519V2a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.4",
        "cc_version": "Common Criteria Part 2 conformant",
        "cert_id": "BSI-DSZ-CC-0519-V2",
        "cert_item": "ORGA 6141 online Version 3.7.2:1.2.0",
        "cert_lab": "BSI",
        "developer": "Ingenico Healthcare GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Common Criteria Protection Profile Electronic Health Card Terminal (eHCT), Version 3.7 vom 21. September 2016, BSI-CC-PP-0032-V3"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "DH": 2,
            "Diffie-Hellman": 2
          }
        },
        "RSA": {
          "RSA-2048": 1
        }
      },
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0032-V3": 4
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_FSP.4": 4,
          "ADV_IMP.1": 4,
          "ADV_TDS.3": 4
        },
        "ALC": {
          "ALC_CMC.3": 1,
          "ALC_CMS.3": 1,
          "ALC_DEL": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 5
        },
        "ATE": {
          "ATE_FUN": 1,
          "ATE_IND": 2
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.4": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 3,
          "EAL 3": 4,
          "EAL 3 augmented": 3,
          "EAL 4": 2,
          "EAL 5": 2,
          "EAL 5+": 1,
          "EAL 6": 1,
          "EAL3+": 1
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM.1": 5,
          "FCS_COP.1.1": 1
        },
        "FDP": {
          "FDP_IFF.1": 2
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          "Ingenico Healthcare GmbH [7] Evaluation Technical Report, Version 2, 2017-11-10, T\u00dcVIT, (confidential document) [8] Common Criteria Protection Profile Electronic Health Card Terminal (eHCT), Version 3.7 vom 21": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 1
        },
        "TLS": {
          "TLS": {
            "TLS": 11,
            "TLS v1.1": 3
          }
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 2
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 1": 1,
          "AIS 32": 1,
          "AIS 34": 1
        },
        "FIPS": {
          "FIPS PUB 180-4": 1,
          "FIPS180-4": 3
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        },
        "PKCS": {
          "PKCS#1": 2
        },
        "RFC": {
          "RFC3526": 2,
          "RFC4346": 5,
          "RFC5246": 5
        },
        "X509": {
          "X.509": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES-128": 1,
            "AES-256": 1
          },
          "HPC": {
            "HPC": 3
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20180305084821+01\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, eHealth, Terminal, Ingenico\"",
      "/ModDate": "D:20180305104300+01\u002700\u0027",
      "/Producer": "LibreOffice 5.2",
      "/Subject": "Zertifizierungsreport",
      "/Title": "Certification Report BSI-DSZ-CC-0519V2-2017",
      "pdf_file_size_bytes": 1357946,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/AIS",
          "https://www.bsi.bund.de/zertifizierung",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/",
          "http://www.sogisportal.eu/",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "http://www.commoncriteriaportal.org/cc/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 30
    },
    "st_filename": "0519V2b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "Diffie-Hellman": 1
          }
        },
        "RSA": {
          "RSA-2048": 1,
          "RSA2048": 1
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0519": 2
        }
      },
      "cc_claims": {
        "A": {
          "A.ADMIN": 3,
          "A.CONNECTOR": 3,
          "A.ENV": 6,
          "A.PUSH_SERVE": 1,
          "A.PUSH_SERVER": 3,
          "A.SM": 5
        },
        "O": {
          "O.ACCESS_CONTROL": 9,
          "O.MANAGEMENT": 7,
          "O.PIN_ENTRY": 6,
          "O.PROTECTION": 9,
          "O.SECURE_CHANNEL": 4,
          "O.STATE": 7
        },
        "OE": {
          "OE.ADMIN": 4,
          "OE.CONNECTOR": 6,
          "OE.ENV": 11,
          "OE.PUSH_SERVER": 3,
          "OE.SM": 2
        },
        "OSP": {
          "OSP.PIN_ENTRY": 5
        },
        "T": {
          "T.COM": 3,
          "T.DATA": 3,
          "T.F-": 1,
          "T.F-CONNECTOR": 2,
          "T.PIN": 6
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0032": 3,
          "BSI-CC-PP-0046": 1,
          "BSI-CC-PP-0082": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 5,
          "ADV_IMP.1": 6,
          "ADV_TDS.3": 5
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.3": 1,
          "ALC_CMS.3": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 5
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS": 2,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.4": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 3": 2,
          "EAL 3 augmented": 2,
          "EAL3": 1,
          "EAL3 augmented": 1,
          "EAL3+": 2
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM": 24,
          "FCS_CKM.1": 14,
          "FCS_CKM.2": 4,
          "FCS_CKM.4": 32,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 52,
          "FCS_COP.1": 10
        },
        "FDP": {
          "FDP_ACC": 29,
          "FDP_ACC.1": 12,
          "FDP_ACF": 25,
          "FDP_ACF.1": 16,
          "FDP_IFC": 23,
          "FDP_IFC.1": 12,
          "FDP_IFF": 23,
          "FDP_IFF.1": 17,
          "FDP_ITC.1": 15,
          "FDP_ITC.2": 12,
          "FDP_RIP.1": 8,
          "FDP_RIP.1.1": 1
        },
        "FIA": {
          "FIA_AFL": 16,
          "FIA_AFL.1": 5,
          "FIA_ATD.1": 7,
          "FIA_ATD.1.1": 1,
          "FIA_SOS.1": 9,
          "FIA_SOS.1.1": 1,
          "FIA_UAU": 1,
          "FIA_UAU.1": 13,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.5": 8,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.7": 8,
          "FIA_UAU.7.1": 1,
          "FIA_UID": 2,
          "FIA_UID.1": 11,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_MSA": 41,
          "FMT_MSA.1": 8,
          "FMT_MSA.2": 10,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 15,
          "FMT_SMF.1": 14,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 23,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FLS.1": 9,
          "FPT_FLS.1.1": 1,
          "FPT_ITT.1": 8,
          "FPT_ITT.1.1": 1,
          "FPT_PHP.1": 9,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 11,
          "FPT_PHP.3.1": 1,
          "FPT_TST.1": 11,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTA": {
          "FTA_TAB": 7,
          "FTA_TAB.1": 1
        },
        "FTP": {
          "FTP_ITC": 7,
          "FTP_ITC.1": 4,
          "FTP_TRP": 8,
          "FTP_TRP.1": 3
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 1
        },
        "TLS": {
          "TLS": {
            "TLS": 13
          }
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 1
          }
        },
        "SHA": {
          "SHA1": {
            "SHA1": 1
          },
          "SHA2": {
            "SHA-256": 4,
            "SHA256": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 7
        }
      },
      "standard_id": {
        "PKCS": {
          "PKCS #1": 1,
          "PKCS#1": 2
        },
        "RFC": {
          "RFC3268": 2,
          "RFC3526": 1,
          "RFC4346": 1,
          "RFC5246": 1
        },
        "X509": {
          "X.509": 5
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 4,
            "AES-": 1,
            "AES128": 1,
            "AES256": 1
          },
          "HPC": {
            "HPC": 10
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 1
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7500": 1,
          "BSI TR-03120": 2
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "kerichsen",
      "/CreationDate": "D:20180131095905+01\u002700\u0027",
      "/Creator": "Writer",
      "/Producer": "OpenOffice 4.1.3",
      "/Subject": "CC-Evaluierung ORGA 6141 online EAL3 augmented",
      "/Title": "ORGA 6141 online- Security Target",
      "pdf_file_size_bytes": 1608842,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 62
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0519V2a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL3+",
      "ADV_IMP.1",
      "ADV_FSP.4",
      "AVA_VAN.4",
      "ADV_TDS.3",
      "ALC_TAT.1"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0519V2b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e9d5da5d75f41dbe3a2d9b59407b82b6138fcd7e3ae4c3e70b8208401f3485b8",
      "txt_hash": "c9fe44f6f71fcef65d1abcbd5cd832b30164a8f7903876849f00052ca835965f"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "ce56fd17a0db343db5c900276eb8118eab5252c94007537bf211d2711ebd977f",
      "txt_hash": "550e4ecc25c3f3d92305dccd37e92c688fc995590df63e0413098f35f26c119e"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "754034ad2e369d4440aa00771e1bc32863c1d2cd61edcf2cbac400eb10066107",
      "txt_hash": "f42b8fc98f5c79df28397d94dc1e18bc9c0181dd7ba7057f9d8305a68c69128c"
    }
  },
  "status": "archived"
}