LifeCare PCA™ Infusion Pump

Certificate #3771

Webpage information

Status historical
Historical reason SP 800-56Arev3 transition
Validation dates 15.12.2020
Standard FIPS 140-2
Security level 1
Type Hardware
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode
Exceptions
  • Cryptographic Module Specification: Level 3
  • Roles, Services, and Authentication: Level 3
  • Mitigation of Other Attacks: N/A
Description LifeCare PCA™ is a Patient-Controlled Analgesia Infusion System with Full IV-EHR Interoperability.With the ICU Medical LifeCare PCA patient-controlled analgesia infusion system, you can be confident you are safely delivering the right drug at the right dose to the right patient in the right concentration. As the first and only PCA system with an integrated barcode reader and full IV-EHR interoperability, LifeCare PCA offers streamlined programming.
Version (Hardware) P/Ns 20837-04-03 and 20837-04-04 with components 810-04505-039 and 810-11438-018
Version (Firmware) CE v1.90.0.8 and MCU v7.4.0.5
Vendor ICU Medical, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, AES-128, AES-256, AES-192, Triple-DES, TDEA, HMAC, HMAC-SHA-256, HMAC-SHA-384
Asymmetric Algorithms
RSA 2048, ECDH, ECDHE, ECDSA, ECC, DH, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA-512, SHA-256, SHA-384, SHA-224, MD5
Schemes
Key Exchange, Key Agreement, AEAD
Protocols
SSL, TLS, TLS 1.2, TLS v1.0, TLS v1.2
Randomness
PRNG, DRBG, RNG
Libraries
OpenSSL
Elliptic Curves
P-224, P-256, P-384, P-521, curve P-224, P-512
Block cipher modes
ECB, CBC, GCM, XTS
TLS cipher suites
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA

Standards
FIPS 140-2, FIPS140-2, FIPS PUB 140-2, SP 800-135, SP 800-90A, SP 800-56A, PKCS#1

File metadata

Subject FIPS 140-2 Security Policy Template
Author Gerrit Kruitbosch
Creation date D:20200929095518-07'00'
Modification date D:20200929095620-07'00'
Pages 28
Creator Acrobat PDFMaker 17 for Word
Producer Adobe PDF Library 15.0

References

Incoming
  • 2484 - historical - SUSE Linux Enterprise Server 12 - StrongSwan Cryptographic Module
  • 2471 - historical - SUSE Linux Enterprise Server 12 - OpenSSH Server Module
  • 2472 - historical - SUSE Linux Enterprise Server 12 - OpenSSH Client Module

Heuristics

No heuristics are available for this certificate.

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 3771,
  "dgst": "89c6d52042f5a614",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "KAS#2088",
        "RSA#3069",
        "CVL#2089",
        "DRBG#2361",
        "KAS#2089",
        "CVL#2088",
        "SHS#4588",
        "CVL#2090",
        "HMAC#3814",
        "ECDSA#1550",
        "KTS#5766",
        "AES#5766"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.90.0.8",
        "7.4.0.5"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "2484",
          "2472",
          "2471"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "2472",
          "2471",
          "3099",
          "2484",
          "2549"
        ]
      },
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDH": {
            "ECDH": 14,
            "ECDHE": 13
          },
          "ECDSA": {
            "ECDSA": 23
          }
        },
        "FF": {
          "DH": {
            "DH": 2,
            "Diffie-Hellman": 5
          },
          "DSA": {
            "DSA": 1
          }
        },
        "RSA": {
          "RSA 2048": 3
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 24
        },
        "ECB": {
          "ECB": 2
        },
        "GCM": {
          "GCM": 22
        },
        "XTS": {
          "XTS": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 4
        }
      },
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 46,
            "TLS 1.2": 1,
            "TLS v1.0": 20,
            "TLS v1.2": 10
          }
        }
      },
      "crypto_scheme": {
        "AEAD": {
          "AEAD": 11
        },
        "KA": {
          "Key Agreement": 3
        },
        "KEX": {
          "Key Exchange": 3
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-224": 27,
          "P-256": 24,
          "P-384": 24,
          "P-512": 1,
          "P-521": 22,
          "curve P-224": 1
        }
      },
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#2088": 1,
          "#2089": 1,
          "#2090": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES 128": 2,
          "AES 256": 1,
          "AES [197": 1,
          "AES-128": 18,
          "AES-192": 1,
          "AES-256": 17,
          "Cert. #2090 RSA": 1,
          "HMAC - SHA-224": 1,
          "HMAC SHA-(1": 1,
          "HMAC [198": 1,
          "HMAC-SHA-1": 20,
          "HMAC-SHA-1, 256": 2,
          "HMAC-SHA-256": 10,
          "HMAC-SHA-384": 10,
          "HMAC-SHA1": 2,
          "PKCS#1": 2,
          "RSA 2048": 3,
          "SHA-(1": 5,
          "SHA-(256": 11,
          "SHA-1": 8,
          "SHA-224": 1,
          "SHA-256": 9,
          "SHA-384": 4,
          "SHA-512": 3,
          "SHA-512 2090": 1,
          "SHS [180": 1
        }
      },
      "fips_security_level": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 1
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 8
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 10,
            "SHA-384": 3,
            "SHA-512": 5
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 9,
          "PRNG": 1
        },
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 39,
          "FIPS PUB 140-2": 1,
          "FIPS140-2": 1
        },
        "NIST": {
          "SP 800-135": 1,
          "SP 800-56A": 1,
          "SP 800-90A": 2
        },
        "PKCS": {
          "PKCS#1": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 18,
            "AES-128": 18,
            "AES-192": 1,
            "AES-256": 17
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "Triple-DES": 5
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 7,
            "HMAC-SHA-256": 5,
            "HMAC-SHA-384": 5
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {
        "TLS": {
          "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA": 1,
          "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256": 1,
          "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 1,
          "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA": 1,
          "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384": 1,
          "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 1,
          "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": 1,
          "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256": 1,
          "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 1,
          "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": 1,
          "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384": 1,
          "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 1,
          "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA": 1,
          "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256": 1,
          "TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256": 1,
          "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA": 1,
          "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384": 1,
          "TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384": 1,
          "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA": 1,
          "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256": 1,
          "TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256": 1,
          "TLS_ECDH_RSA_WITH_AES_256_CBC_SHA": 1,
          "TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384": 1,
          "TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384": 1,
          "TLS_RSA_WITH_AES_128_CBC_SHA": 1,
          "TLS_RSA_WITH_AES_128_CBC_SHA256": 1,
          "TLS_RSA_WITH_AES_128_GCM_SHA256": 1,
          "TLS_RSA_WITH_AES_256_CBC_SHA": 1,
          "TLS_RSA_WITH_AES_256_CBC_SHA384": 1,
          "TLS_RSA_WITH_AES_256_GCM_SHA384": 1
        }
      },
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Gerrit Kruitbosch",
      "/Comments": "",
      "/Company": "Microsoft",
      "/CreationDate": "D:20200929095518-07\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 17 for Word",
      "/Keywords": "",
      "/ModDate": "D:20200929095620-07\u002700\u0027",
      "/Producer": "Adobe PDF Library 15.0",
      "/SourceModified": "D:20200929165500",
      "/Subject": "FIPS 140-2 Security Policy Template",
      "/Title": "",
      "pdf_file_size_bytes": 652285,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 28
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "c453525140a25bbca33adaea573e5c8898af0278ca94d930bd95ccac5704d36c",
    "policy_txt_hash": "1cfd9caae953ab53591a8ba211241d727673d0d630ab25ae538488d5d50eaefa"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/December 2020_040121_1006_signed.pdf",
    "date_sunset": null,
    "description": "LifeCare PCA\u2122 is a Patient-Controlled Analgesia Infusion System with Full IV-EHR Interoperability.With the ICU Medical LifeCare PCA patient-controlled analgesia infusion system, you can be confident you are safely delivering the right drug at the right dose to the right patient in the right concentration. As the first and only PCA system with an integrated barcode reader and full IV-EHR interoperability, LifeCare PCA offers streamlined programming.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Cryptographic Module Specification: Level 3",
      "Roles, Services, and Authentication: Level 3",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": "CE v1.90.0.8 and MCU v7.4.0.5",
    "historical_reason": "SP 800-56Arev3 transition",
    "hw_versions": "P/Ns 20837-04-03 and 20837-04-04 with components 810-04505-039 and 810-11438-018",
    "level": 1,
    "mentioned_certs": {},
    "module_name": "LifeCare PCA\u2122 Infusion Pump",
    "module_type": "Hardware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2020-12-15",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Initial"
      }
    ],
    "vendor": "ICU Medical, Inc.",
    "vendor_url": "http://www.icumed.com/"
  }
}