CARD STAR /memo3 FW-Version 4.0.6, HW-Versionen B00/B01
CSV information ?
Status | archived |
---|---|
Valid from | 25.06.2018 |
Valid until | 25.06.2023 |
Scheme | 🇩🇪 DE |
Manufacturer | CCV Deutschland GmbH |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.5, ADV_IMP.2, ADV_FSP.5, ALC_TAT.1, EAL3+, ADV_TDS.3 |
Heuristics summary ?
Certificate ?
Extracted keywords
Security level
EAL 3, EAL 4, EAL 2Security Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.5Protection profiles
BSI-CC-PP-0052-2015Certificates
BSI-DSZ-CC-0689-V2-2018Standards
ISO/IEC 15408, ISO/IEC 18045File metadata
Title | Zertifizierungsreport BSI-DSZ-CC-0689-V2-2018 |
---|---|
Subject | CARD STAR /memo3, FW-Version 4.0.6, HW-Version B00/B01 |
Keywords | "Common Criteria, Certification, Zertifizierung, CCV Deutschland GmbH, Mobile Card Terminal for the German Healthcare System, MobCT" |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Creation date | D:20180709113607+02'00' |
Modification date | D:20180709125752+02'00' |
Pages | 1 |
Creator | Writer |
Producer | LibreOffice 5.2 |
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, HPCHash functions
SHA-256Block cipher modes
GCMSecurity level
EAL 3, EAL 4, EAL 2, EAL1, EAL4, EAL 5+, EAL 6Security Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, ALC_FLR, AVA_VAN.5, AVA_VAN.3Protection profiles
BSI-CC-PP-0052-2015, BSI-CC-PP-0052Certificates
BSI-DSZ-CC-0689-V2-2018Standards
FIPS 180-4, FIPS PUB 180-4, FIPS 197, NIST SP 800-38D, PKCS#1, PKCS #1, AIS 32, AIS 34, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065Technical reports
BSI TR-02102, BSI 7148File metadata
Title | Zertifizierungsreport BSI-DSZ-CC-0689-V2-2018 |
---|---|
Subject | Common Criteria, Certification, CARD STAR /memo3, FW-Version 4.0.6, HW-Version B00/B01 |
Keywords | "Common Criteria, Certification, Zertifizierung, CCV Deutschland GmbH, Mobile Card Terminal for the German Healthcare System, MobCT" |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Creation date | D:20180706124801+02'00' |
Modification date | D:20180709112907+02'00' |
Pages | 28 |
Creator | Writer |
Producer | LibreOffice 5.2 |
Frontpage
Certificate ID | BSI-DSZ-CC-0689-V2-2018 |
---|---|
Certified item | CARD STAR /memo3, FW-Version 4.0.6, HW-Versionen B00/B01 |
Certification lab | BSI |
Developer | CCV Deutschland GmbH |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, HPCHash functions
SHA-256Security level
EAL3+, EAL 3, EAL3, EAL 3 augmentedClaims
O.PIN, O.RESIDUAL, O.SELFTESTS, O.PROTECTION, O.AUTH_STATE, O.MANAGEMENT, O.LOG_CARDS, O.LOG_DATA, O.TRANSFER, O.DMS_CONNECTION, O.TIME, O.SEALING, T.MAN_HW, T.DATA, T.ACCESS, T.AUTH_STATE, T.ADMIN_PIN, T.FIRMWARE, A.MEDIC, A.ADMIN, A.CARDS, A.DMS, A.PHYSICAL, A.ENVIRONMENT, OE.MEDIC, OE.ADMIN, OE.CARDS, OE.DMS, OE.PHYSICAL, OE.ENVIRONMENT, OE.DEVELOPER, OSP.LOG_CARDS, OSP.LOG_DATA, OSP.TRANSFER, OSP.DMS_CONNECTION, OSP.TIME, OSP.SEALING, OSP.SELFTESTS, OSP.EMERGENCY_DATASecurity Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_ARC.1, AGD_OPE.1, AGD_PRE.1, ALC_TAT.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Security Functional Requirements (SFR)
FAU_GEN, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM, FCS_CKM.4.1, FCS_COP, FCS_COP.1, FCS_CKM.4, FCS_CKM.2, FDP_SVR, FDP_SVR.1, FDP_SVR.1.1, FDP_SVR.1.2, FDP_SVR.1.3, FDP_ITC.1, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_RIP, FDP_RIP.1, FDP_SDI, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ICF, FDP_SDI.2, FDP_ITC.2, FIA_AFL, FIA_AFL.1.1, FIA_AFL.1.2, FIA_SOS.1, FIA_SOS.1.1, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.7, FIA_UAU.7.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_AFL.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_MTD.3, FMT_MTD.3.1, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FPT_STM.1.1, FPT_PHP.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTA_SSL.3.1, FTA_SSL.3, FTA_SSL.4, FTA_SSL.4.1, FTP_ITC.1Protection profiles
BSI-CC-PP-0052, BSI-CC-PP-0032Side-channel analysis
physical tamperingCertification process
out of scope, of the TOE Signature generation for emergency data on the eHC (done by an authorised card that is out of scope) 1.4.7 Physikalische Schutzmechanismen The TOE cannot counter physical attacks concerningStandards
X.509File metadata
Title | Security Target für Common Criteria, EAL 3+ |
---|---|
Subject | CARD STAR /memo3 |
Keywords | CC,Common Criteria,Security Target,Sicherheitsvorgaben,CARD STAR,Celectronic,Persicon |
Author | Tomas Müller |
Creation date | D:20180126124324+01'00' |
Modification date | D:20180126124324+01'00' |
Pages | 54 |
Creator | Microsoft® Word 2016 |
Producer | Microsoft® Word 2016 |
Heuristics ?
Extracted SARs
ATE_COV.2, AGD_OPE.1, ADV_ARC.1, ALC_DEL.1, ALC_DVS.1, ADV_FSP.5, AGD_PRE.1, ALC_CMC.3, ALC_LCD.1, ATE_DPT.1, ALC_CMS.3, ALC_TAT.1, AVA_VAN.5, ATE_FUN.1, ATE_IND.2, ADV_IMP.2, ADV_TDS.3References ?
No references are available for this certificate.
Updates ?
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '25e8537d10b5e72e8322b235ce39e8a5616807f524f603a61a4bd645704f235e', 'txt_hash': 'f795b28ac0b53d47779c1a4526bb7a2b42b641c4a5d70fb04aa876c67e678174'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '6144af7c72ce7c111bb236f75412db1796ff4f2273fd38c972c3571dc658e09c', 'txt_hash': '12e9bfcd8aad1aa875a272e4299ba9520482c4d60d62016f6332d01e86d5b486'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ae1cea31f0f2fd3c989861fb31649e942c369a2bc845e260c0f6ffdfa052428b', 'txt_hash': '7fb5c36dbb02268cac199017f7d1cbc87214053f34c9fd643153e57bd8bbb4f4'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 1256328, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 28, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20180706124801+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, CCV Deutschland GmbH, Mobile Card Terminal for the German Healthcare System, MobCT"', '/ModDate': "D:20180709112907+02'00'", '/Producer': 'LibreOffice 5.2', '/Subject': 'Common Criteria, Certification, CARD STAR /memo3, FW-Version 4.0.6, HW-Version B00/B01', '/Title': 'Zertifizierungsreport BSI-DSZ-CC-0689-V2-2018', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/AIS', 'https://www.bsi.bund.de/zertifizierungsreporte']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1198182, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 54, '/Title': 'Security Target für Common Criteria, EAL 3+', '/Author': 'Tomas Müller', '/Subject': 'CARD STAR /memo3', '/Keywords': 'CC,Common Criteria,Security Target,Sicherheitsvorgaben,CARD STAR,Celectronic,Persicon', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20180126124324+01'00'", '/ModDate': "D:20180126124324+01'00'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 922451, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20180709113607+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, CCV Deutschland GmbH, Mobile Card Terminal for the German Healthcare System, MobCT"', '/ModDate': "D:20180709125752+02'00'", '/Producer': 'LibreOffice 5.2', '/Subject': 'CARD STAR /memo3, FW-Version 4.0.6, HW-Version B00/B01', '/Title': 'Zertifizierungsreport BSI-DSZ-CC-0689-V2-2018', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) zu (.+?) der (.*)'], 'cert_id': 'BSI-DSZ-CC-0689-V2-2018', 'cert_item': 'CARD STAR /memo3, FW-Version 4.0.6, HW-Versionen B00/B01', 'developer': 'CCV Deutschland GmbH', 'cert_lab': 'BSI'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0689-V2-2018': 14}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0052-2015': 2, 'BSI-CC-PP-0052': 1}}, 'cc_security_level': {'EAL': {'EAL 3': 4, 'EAL 4': 3, 'EAL 2': 3, 'EAL1': 1, 'EAL4': 1, 'EAL 5+': 1, 'EAL 6': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 4, 'ADV_IMP.1': 4, 'ADV_TDS.3': 4}, 'ALC': {'ALC_TAT.1': 4, 'ALC_FLR': 1}, 'AVA': {'AVA_VAN.5': 6, 'AVA_VAN.3': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 4}, 'HPC': {'HPC': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 6}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {'GCM': {'GCM': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 180-4': 2, 'FIPS PUB 180-4': 1, 'FIPS 197': 1}, 'NIST': {'NIST SP 800-38D': 2}, 'PKCS': {'PKCS#1': 2, 'PKCS #1': 1}, 'BSI': {'AIS 32': 1, 'AIS 34': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0052': 4, 'BSI-CC-PP-0032': 1}}, 'cc_security_level': {'EAL': {'EAL3+': 1, 'EAL 3': 4, 'EAL3': 1, 'EAL 3 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 4, 'ADV_IMP.1': 5, 'ADV_TDS.3': 5, 'ADV_ARC.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_TAT.1': 5, 'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 8}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1}, 'FCS': {'FCS_CKM.1': 16, 'FCS_CKM.1.1': 1, 'FCS_CKM': 1, 'FCS_CKM.4.1': 1, 'FCS_COP': 25, 'FCS_COP.1': 4, 'FCS_CKM.4': 15, 'FCS_CKM.2': 1}, 'FDP': {'FDP_SVR': 3, 'FDP_SVR.1': 11, 'FDP_SVR.1.1': 5, 'FDP_SVR.1.2': 3, 'FDP_SVR.1.3': 3, 'FDP_ITC.1': 16, 'FDP_ACC.1': 21, 'FDP_ACC.1.1': 1, 'FDP_ACF.1': 16, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 5, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 3, 'FDP_IFC': 28, 'FDP_IFC.1': 6, 'FDP_IFF': 33, 'FDP_IFF.1': 14, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_RIP': 13, 'FDP_RIP.1': 2, 'FDP_SDI': 1, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ICF': 2, 'FDP_SDI.2': 6, 'FDP_ITC.2': 5}, 'FIA': {'FIA_AFL': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_SOS.1': 6, 'FIA_SOS.1.1': 1, 'FIA_UAU.1': 10, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.5': 10, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.7': 9, 'FIA_UAU.7.1': 1, 'FIA_UID.1': 11, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_AFL.1': 6}, 'FMT': {'FMT_MSA.1': 9, 'FMT_MSA.1.1': 1, 'FMT_MSA.3': 18, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1': 8, 'FMT_MTD.1.1': 1, 'FMT_MTD.3': 6, 'FMT_MTD.3.1': 1, 'FMT_SMF.1': 10, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 15, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 11, 'FPT_STM.1.1': 1, 'FPT_PHP.1': 6, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_TST.1': 6, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTA': {'FTA_SSL.3.1': 2, 'FTA_SSL.3': 8, 'FTA_SSL.4': 8, 'FTA_SSL.4.1': 1}, 'FTP': {'FTP_ITC.1': 1}}, 'cc_claims': {'O': {'O.PIN': 7, 'O.RESIDUAL': 6, 'O.SELFTESTS': 6, 'O.PROTECTION': 8, 'O.AUTH_STATE': 9, 'O.MANAGEMENT': 9, 'O.LOG_CARDS': 3, 'O.LOG_DATA': 6, 'O.TRANSFER': 3, 'O.DMS_CONNECTION': 6, 'O.TIME': 6, 'O.SEALING': 3}, 'T': {'T.MAN_HW': 3, 'T.DATA': 3, 'T.ACCESS': 3, 'T.AUTH_STATE': 3, 'T.ADMIN_PIN': 3, 'T.FIRMWARE': 3}, 'A': {'A.MEDIC': 3, 'A.ADMIN': 3, 'A.CARDS': 4, 'A.DMS': 3, 'A.PHYSICAL': 3, 'A.ENVIRONMENT': 3}, 'OE': {'OE.MEDIC': 9, 'OE.ADMIN': 10, 'OE.CARDS': 7, 'OE.DMS': 4, 'OE.PHYSICAL': 5, 'OE.ENVIRONMENT': 6, 'OE.DEVELOPER': 1}, 'OSP': {'OSP.LOG_CARDS': 3, 'OSP.LOG_DATA': 3, 'OSP.TRANSFER': 3, 'OSP.DMS_CONNECTION': 3, 'OSP.TIME': 3, 'OSP.SEALING': 3, 'OSP.SELFTESTS': 3, 'OSP.EMERGENCY_DATA': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 4}, 'HPC': {'HPC': 10}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 4}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'X509': {'X.509': 5}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'of the TOE Signature generation for emergency data on the eHC (done by an authorised card that is out of scope) 1.4.7 Physikalische Schutzmechanismen The TOE cannot counter physical attacks concerning': 1}}}
. - The cert_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0689-V2-2018': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0052-2015': 1}}, 'cc_security_level': {'EAL': {'EAL 3': 1, 'EAL 4': 1, 'EAL 2': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'ALC': {'ALC_TAT.1': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
0689V2a_pdf.pdf
. - The st_filename property was set to
0689V2b_pdf.pdf
. - The cert_filename property was set to
0689V2c_pdf.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['BSI']
. - The cert_id property was set to
BSI-DSZ-CC-0689-V2-2018
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0689V2a_pdf.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0689V2b_pdf.pdf
.
The state of the certificate object was updated.
- The cert property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The cert_metadata property was set to
None
. - The cert_keywords property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
values discarded.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name CARD STAR /memo3 FW-Version 4.0.6, HW-Versionen B00/B01 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0689V2c_pdf.pdf",
"dgst": "d671fdd55474d6e2",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0689-V2-2018",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"4.0.6"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "CCV Deutschland GmbH",
"manufacturer_web": "https://www.ccv-deutschland.de",
"name": "CARD STAR /memo3 FW-Version 4.0.6, HW-Versionen B00/B01",
"not_valid_after": "2023-06-25",
"not_valid_before": "2018-06-25",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "0689V2c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0689-V2-2018": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0052-2015": 1
}
},
"cc_sar": {
"ADV": {
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"ALC": {
"ALC_TAT.1": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 3": 1,
"EAL 4": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20180709113607+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, CCV Deutschland GmbH, Mobile Card Terminal for the German Healthcare System, MobCT\"",
"/ModDate": "D:20180709125752+02\u002700\u0027",
"/Producer": "LibreOffice 5.2",
"/Subject": "CARD STAR /memo3, FW-Version 4.0.6, HW-Version B00/B01",
"/Title": "Zertifizierungsreport BSI-DSZ-CC-0689-V2-2018",
"pdf_file_size_bytes": 922451,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "0689V2a_pdf.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-0689-V2-2018",
"cert_item": "CARD STAR /memo3, FW-Version 4.0.6, HW-Versionen B00/B01",
"cert_lab": "BSI",
"developer": "CCV Deutschland GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) zu (.+?) der (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0689-V2-2018": 14
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0052": 1,
"BSI-CC-PP-0052-2015": 2
}
},
"cc_sar": {
"ADV": {
"ADV_FSP.4": 4,
"ADV_IMP.1": 4,
"ADV_TDS.3": 4
},
"ALC": {
"ALC_FLR": 1,
"ALC_TAT.1": 4
},
"AVA": {
"AVA_VAN.3": 1,
"AVA_VAN.5": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 3,
"EAL 3": 4,
"EAL 4": 3,
"EAL 5+": 1,
"EAL 6": 1,
"EAL1": 1,
"EAL4": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {
"GCM": {
"GCM": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 6
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 32": 1,
"AIS 34": 1
},
"FIPS": {
"FIPS 180-4": 2,
"FIPS 197": 1,
"FIPS PUB 180-4": 1
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
},
"NIST": {
"NIST SP 800-38D": 2
},
"PKCS": {
"PKCS #1": 1,
"PKCS#1": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 4
},
"HPC": {
"HPC": 1
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7148": 1,
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20180706124801+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, CCV Deutschland GmbH, Mobile Card Terminal for the German Healthcare System, MobCT\"",
"/ModDate": "D:20180709112907+02\u002700\u0027",
"/Producer": "LibreOffice 5.2",
"/Subject": "Common Criteria, Certification, CARD STAR /memo3, FW-Version 4.0.6, HW-Version B00/B01",
"/Title": "Zertifizierungsreport BSI-DSZ-CC-0689-V2-2018",
"pdf_file_size_bytes": 1256328,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.bsi.bund.de/AIS",
"https://www.bsi.bund.de/zertifizierung",
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/",
"https://www.bsi.bund.de/zertifizierungsreporte",
"http://www.commoncriteriaportal.org/cc/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 28
},
"st_filename": "0689V2b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMIN": 3,
"A.CARDS": 4,
"A.DMS": 3,
"A.ENVIRONMENT": 3,
"A.MEDIC": 3,
"A.PHYSICAL": 3
},
"O": {
"O.AUTH_STATE": 9,
"O.DMS_CONNECTION": 6,
"O.LOG_CARDS": 3,
"O.LOG_DATA": 6,
"O.MANAGEMENT": 9,
"O.PIN": 7,
"O.PROTECTION": 8,
"O.RESIDUAL": 6,
"O.SEALING": 3,
"O.SELFTESTS": 6,
"O.TIME": 6,
"O.TRANSFER": 3
},
"OE": {
"OE.ADMIN": 10,
"OE.CARDS": 7,
"OE.DEVELOPER": 1,
"OE.DMS": 4,
"OE.ENVIRONMENT": 6,
"OE.MEDIC": 9,
"OE.PHYSICAL": 5
},
"OSP": {
"OSP.DMS_CONNECTION": 3,
"OSP.EMERGENCY_DATA": 2,
"OSP.LOG_CARDS": 3,
"OSP.LOG_DATA": 3,
"OSP.SEALING": 3,
"OSP.SELFTESTS": 3,
"OSP.TIME": 3,
"OSP.TRANSFER": 3
},
"T": {
"T.ACCESS": 3,
"T.ADMIN_PIN": 3,
"T.AUTH_STATE": 3,
"T.DATA": 3,
"T.FIRMWARE": 3,
"T.MAN_HW": 3
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0032": 1,
"BSI-CC-PP-0052": 4
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 4,
"ADV_IMP.1": 5,
"ADV_TDS.3": 5
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.3": 1,
"ALC_CMS.3": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_LCD.1": 1,
"ALC_TAT.1": 5
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 8
}
},
"cc_security_level": {
"EAL": {
"EAL 3": 4,
"EAL 3 augmented": 2,
"EAL3": 1,
"EAL3+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1
},
"FCS": {
"FCS_CKM": 1,
"FCS_CKM.1": 16,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 1,
"FCS_CKM.4": 15,
"FCS_CKM.4.1": 1,
"FCS_COP": 25,
"FCS_COP.1": 4
},
"FDP": {
"FDP_ACC.1": 21,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 16,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 5,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 3,
"FDP_ICF": 2,
"FDP_IFC": 28,
"FDP_IFC.1": 6,
"FDP_IFF": 33,
"FDP_IFF.1": 14,
"FDP_ITC.1": 16,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_ITC.2": 5,
"FDP_RIP": 13,
"FDP_RIP.1": 2,
"FDP_SDI": 1,
"FDP_SDI.2": 6,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_SVR": 3,
"FDP_SVR.1": 11,
"FDP_SVR.1.1": 5,
"FDP_SVR.1.2": 3,
"FDP_SVR.1.3": 3
},
"FIA": {
"FIA_AFL": 1,
"FIA_AFL.1": 6,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_SOS.1": 6,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 10,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.5": 10,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.7": 9,
"FIA_UAU.7.1": 1,
"FIA_UID.1": 11,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MSA.1": 9,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 18,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 8,
"FMT_MTD.1.1": 1,
"FMT_MTD.3": 6,
"FMT_MTD.3.1": 1,
"FMT_SMF.1": 10,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 15,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_PHP.1": 6,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_STM.1": 11,
"FPT_STM.1.1": 1,
"FPT_TST.1": 6,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTA": {
"FTA_SSL.3": 8,
"FTA_SSL.3.1": 2,
"FTA_SSL.4": 8,
"FTA_SSL.4.1": 1
},
"FTP": {
"FTP_ITC.1": 1
}
},
"certification_process": {
"OutOfScope": {
"of the TOE Signature generation for emergency data on the eHC (done by an authorised card that is out of scope) 1.4.7 Physikalische Schutzmechanismen The TOE cannot counter physical attacks concerning": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"physical tampering": 4
}
},
"standard_id": {
"X509": {
"X.509": 5
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 4
},
"HPC": {
"HPC": 10
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Tomas M\u00fcller",
"/CreationDate": "D:20180126124324+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/Keywords": "CC,Common Criteria,Security Target,Sicherheitsvorgaben,CARD STAR,Celectronic,Persicon",
"/ModDate": "D:20180126124324+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"/Subject": "CARD STAR /memo3",
"/Title": "Security Target f\u00fcr Common Criteria, EAL 3+",
"pdf_file_size_bytes": 1198182,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 54
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0052b_pdf.pdf",
"pp_name": "Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System (MobCT\u0026..."
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0689V2a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL3+",
"AVA_VAN.5",
"ADV_FSP.5",
"ADV_TDS.3",
"ALC_TAT.1",
"ADV_IMP.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0689V2b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ae1cea31f0f2fd3c989861fb31649e942c369a2bc845e260c0f6ffdfa052428b",
"txt_hash": "7fb5c36dbb02268cac199017f7d1cbc87214053f34c9fd643153e57bd8bbb4f4"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "25e8537d10b5e72e8322b235ce39e8a5616807f524f603a61a4bd645704f235e",
"txt_hash": "f795b28ac0b53d47779c1a4526bb7a2b42b641c4a5d70fb04aa876c67e678174"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "6144af7c72ce7c111bb236f75412db1796ff4f2273fd38c972c3571dc658e09c",
"txt_hash": "12e9bfcd8aad1aa875a272e4299ba9520482c4d60d62016f6332d01e86d5b486"
}
},
"status": "archived"
}