CHERRY eHealth Terminal G87-1505 FW-Version 3.0.1 HW-Version 1.1.1

CSV information ?

Status archived
Valid from 28.03.2018
Valid until 28.03.2023
Scheme 🇩🇪 DE
Manufacturer Cherry GmbH
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ADV_IMP.1, ADV_FSP.4, ALC_TAT.1, AVA_VAN.4, EAL3+, ADV_TDS.3
Protection profiles
Maintenance updates CHERRY eHealth Terminal G87-1505 FW-Version 3.0.1 HW-Version 1.1.1 (07.09.2018) Certification report
CHERRY eHealth Terminal G87-1505 FW 3.0.1 HW 1.1.1 (18.12.2018) Certification report

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0513-V2-2018

Certificate ?

Extracted keywords

Device models
G87-1505

Security level
EAL 3, EAL 2, EAL 3 augmented
Security Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.4
Certificates
BSI-DSZ-CC-0513-V2-2018

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Title: Certification Report BSI-DSZ-CC-0513-V2-2018
Subject: Zertifikat, Urkunde, Certification
Keywords: "Common Criteria, Certification, Zertifizierung, eHealth, Terminal, Cherry GmbH, BSI-CC-PP-0032-V3, G87-1505"
Author: Bundesamt für Sicherheit in der Informationstechnik
Creation date: D:20180423125837+02'00'
Modification date: D:20180423134212+02'00'
Pages: 1
Creator: Writer
Producer: LibreOffice 5.2

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, AES-, HPC, HMAC, CMAC
Asymmetric Algorithms
Diffie-Hellman, DH
Hash functions
SHA-1, SHA-256, MD5
Schemes
Key Agreement
Protocols
TLS, TLSv1.1, TLSv1.2, TLS v1.1, TLS v1.2, IPsec
Block cipher modes
CBC

Device models
G87-1505, G87-1505LBZDE-2, G87-1505LBZDE-10

Security level
EAL 3, EAL 2, EAL 1, EAL 4, EAL 2+, EAL 5, EAL3+, EAL 5+, EAL 6, EAL 3 augmented
Security Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, ALC_FLR, ALC_DEL.1, ATE_FUN, ATE_IND, AVA_VAN.4, AVA_VAN
Security Functional Requirements (SFR)
FCS_COP, FCS_CKM, FTP_ITC, FTP_TRP
Protection profiles
BSI-CC-PP-0032-V2-2015-MA-01
Certificates
BSI-DSZ-CC-0513-V2-2018
Evaluation facilities
TÜV Informationstechnik
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Cherry GmbH [7] Evaluation Technical Report, Version 2, 28.02.2018, TÜV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, 22. Mai 2017 [9] Configuration list for the TOE, Version 1.47, 28.02.2018 (confidential document) [10] Handbuch für Administratoren eGK Tastatur G87-1505, Version 6440650-04, Feb 2018, Cherry GmbH, Report [12] Common-Criteria-3.1 Dokument ALC_DEL.1, Version 1.45, 25.01.2018, Cherry GmbH, (confidential document) [13] Sichere Lieferkette, Version 1.7, 27.02.2018, Cherry GmbH, (confidential document) Quoted

Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Cherry GmbH [7] Evaluation Technical Report, Version 2, 28.02.2018, TÜV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, 22. Mai 2017 [9] Configuration list for the TOE, Version 1.47, 28.02.2018 (confidential document) [10] Handbuch für Administratoren eGK Tastatur G87-1505, Version 6440650-04, Feb 2018, Cherry GmbH, Report [12] Common-Criteria-3.1 Dokument ALC_DEL.1, Version 1.45, 25.01.2018, Cherry GmbH, (confidential document) [13] Sichere Lieferkette, Version 1.7, 27.02.2018, Cherry GmbH, (confidential document) Quoted

Standards
FIPS180-4, FIPS197, FIPS PUB 180-4, PKCS#1, AIS 1, AIS 32, AIS 34, RFC2526, RFC1321, RFC2104, RFC4346, RFC5246, RFC3602, RFC2404, RFC 3447, RFC3268, RFC 5246, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, X.509
Technical reports
BSI TR-03116-1, BSI 7148

File metadata

Title: Certification Report BSI-DSZ-CC-0513-V2-2018
Subject: Zertifizierungsreport, Certification Report,
Keywords: "Common Criteria, Certification, Zertifizierung, eHealth, Terminal, Cherry GmbH, BSI-CC-PP-0032-V3, G87-1505"
Author: Bundesamt für Sicherheit in der Informationstechnik
Creation date: D:20180423125852+02'00'
Modification date: D:20180423141107+02'00'
Pages: 28
Creator: Writer
Producer: LibreOffice 5.2

Frontpage

Certificate ID: BSI-DSZ-CC-0513-V2-2018
Certified item: CHERRY eHealth Terminal G87-1505 FW-Version 3.0.1 HW-Version 1.1.1
Certification lab: BSI
Developer: Cherry GmbH

References

Incoming

Security target ?

Extracted keywords

Symmetric Algorithms
AES, HPC
Asymmetric Algorithms
DHE, Diffie-Hellman, DH
Hash functions
SHA-256, SHA256
Schemes
MAC
Protocols
TLS 1.1, TLS, TLS 1.2
TLS cipher suites
TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA

Device models
G87-1505, G87-1505LBZDE-2
Vendor
Microsoft

Security level
EAL3+, EAL 3, EAL 3 augmented
Claims
O.ACCESS_CONTROL, O.PIN_ENTRY, O.MANAGEMENT, O.SECURE_CHANNEL, O.STATE, O.PROTECTION, T.COM, T.PIN, T.DATA, T.F-CONNECTOR, A.PUSH_SERVER, A.ENV, A.ADMIN, A.CONNECTOR, A.SM, OE.ENV, OE.ADMIN, OE.CONNECTOR, OE.SM, OE.PUSH_SERVER, OSP.PIN, OSP.PIN_ENTRY
Security Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_TAT.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.4, ASE_INT.1, ASE_CCL, ASE_SPD, ASE_OBJ, ASE_ECD, ASE_REQ, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FCS_CKM, FCS_CKM.4, FCS_COP, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4.1, FDP_ACC, FDP_ACF, FDP_IFC, FDP_IFF, FDP_RIP.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FDP_IFF.1, FDP_RIP.1.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU, FIA_UAU.5, FIA_UAU.7, FIA_UID.1, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FMT_MSA, FMT_MSA.2, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF.1, FPT_TST.1.2, FPT_FLS.1, FPT_ITT.1, FPT_PHP.1, FPT_PHP, FPT_TST.1, FPT_FLS.1.1, FPT_ITT.1.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.2, FPT_PHP.2.1, FPT_PHP.2.2, FPT_PHP.2.3, FPT_TST.1.1, FPT_TST.1.3, FTA_TAB, FTA_TAB.1, FTP_ITC, FTP_TRP, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC_PP_0032-V3-2016, BSI-CC-PP-0046, BSI-CC-PP-0032-
Evaluation facilities
TÜViT
Certification process
Security function SF.2

Side-channel analysis
physical tampering, Physical tampering
Certification process
Security function SF.2

Standards
PKCS#1, RFC 4346, RFC 3447, RFC 5246, RFC 2104, ISO/IEC 7816-8, X.509, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004
Technical reports
BSI TR-03120, BSI TR-03116, BSI 7586, BSI 7500

File metadata

Title: Common-Criteria 3.1-Document
Subject: Security Target EAL3+ for G87-1505
Keywords: G87-1505;BSI-DSZ-CC-0513-V2;eHealth-Keyboard;Security Target;Sicherheitsvorgaben
Author: Jürgen Meier
Creation date: D:20180228153520+01'00'
Modification date: D:20180228153520+01'00'
Pages: 77
Creator: Microsoft® Word 2016
Producer: Microsoft® Word 2016

References

Incoming

Heuristics ?

Certificate ID: BSI-DSZ-CC-0513-V2-2018

Extracted SARs

ADV_FSP.4, ALC_TAT.1, ALC_CMC.3, ATE_COV.2, ASE_CCL.1, ASE_TSS.1, ADV_IMP.1, ALC_CMS.3, AGD_OPE.1, ATE_DPT.1, ADV_TDS.3, ASE_ECD.1, ASE_REQ.2, AGD_PRE.1, ALC_LCD.1, ALC_DVS.1, ATE_FUN.1, ASE_INT.1, ASE_OBJ.2, ASE_SPD.1, ATE_IND.2, ALC_DEL.1, AVA_VAN.4

References ?

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '6119241090addbceb12c6a2b56bcc9a2760aaf85481c70c6973c61a3136d0044', 'txt_hash': '35165c57e9aa6008471deef77d7fba2a3659d9532e8db6291ef34c6d84d7a2e6'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e141395ea4c89c0ff777d9410d019302d415b2822ed32d95b3086586ef278015', 'txt_hash': '93ab963d2ddf6c5f5f4bce0a6e507ec1bb1ff1c1267648558b5e2422dddef64b'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'bad61b8f97b2afee4f1a8464cd3d1a197893774dfb154ffeb2d06fa3d029998e', 'txt_hash': '12f356d5b137febd1b32fab9e5ab0aa77cb6bfe66b178ce63bf481b11288e951'}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': {'pdf_file_size_bytes': 903222, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20180423125837+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, eHealth, Terminal, Cherry GmbH, BSI-CC-PP-0032-V3, G87-1505"', '/ModDate': "D:20180423134212+02'00'", '/Producer': 'LibreOffice 5.2', '/Subject': 'Zertifikat, Urkunde, Certification', '/Title': 'Certification Report BSI-DSZ-CC-0513-V2-2018', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0513-V2-2018': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 3': 1, 'EAL 2': 1, 'EAL 3 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'ALC': {'ALC_TAT.1': 1}, 'AVA': {'AVA_VAN.4': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {'G87': {'G87-1505': 1}}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': '0513V2c_pdf.pdf'}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0513-V2-2018', 'cert_item': 'CHERRY eHealth Terminal G87-1505 FW-Version 3.0.1 HW-Version 1.1.1', 'developer': 'Cherry GmbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC- PP-0032-V2-2015-MA-01, 22. Mai 2017', 'cc_version': 'PP conformant plus product specific extensions Common Criteria Part 2 conformant', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.4'}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0513-V2-2018': 15}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {}} data.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0513-V2-2018': 30}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0513-V2': 6}}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The st_keywords property was updated, with the {'cc_cert_id': {}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0513-V2-2018': 15}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'CA': {'7816-8 5': 1, '3-6 1': 1}}} data.
  • 05.02.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0513-V3-2023']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0513-V3-2023']}} data.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': None}.
  • 09.04.2023 The certificate data changed.
    Certificate changed

    The Status was updated.

    • The new value is archived.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2018-12-18', 'maintenance_title': 'CHERRY eHealth Terminal G87-1505 FW 3.0.1 HW 1.1.1', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/0513V2ma2a_pdf.pdf', 'maintenance_st_link': None}, {'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2018-09-07', 'maintenance_title': 'CHERRY eHealth Terminal G87-1505 FW-Version 3.0.1 HW-Version 1.1.1', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/0513V2ma1a_pdf.pdf', 'maintenance_st_link': None}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to e141395ea4c89c0ff777d9410d019302d415b2822ed32d95b3086586ef278015.
    • The st_txt_hash property was set to 93ab963d2ddf6c5f5f4bce0a6e507ec1bb1ff1c1267648558b5e2422dddef64b.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1893419, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 77, '/Title': 'Common-Criteria 3.1-Document', '/Author': 'Jürgen Meier', '/Subject': 'Security Target EAL3+ for G87-1505', '/Keywords': 'G87-1505;BSI-DSZ-CC-0513-V2;eHealth-Keyboard;Security Target;Sicherheitsvorgaben', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20180228153520+01'00'", '/ModDate': "D:20180228153520+01'00'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.cherry.de/']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0513-V2': 6}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC_PP_0032-V3-2016': 1, 'BSI-CC-PP-0046': 1, 'BSI-CC-PP-0032-': 1}}, 'cc_security_level': {'EAL': {'EAL3+': 2, 'EAL 3': 3, 'EAL 3 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 4, 'ADV_IMP.1': 5, 'ADV_TDS.3': 4}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_TAT.1': 4, 'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.4': 3}, 'ASE': {'ASE_INT.1': 3, 'ASE_CCL': 2, 'ASE_SPD': 2, 'ASE_OBJ': 2, 'ASE_ECD': 2, 'ASE_REQ': 2, 'ASE_TSS': 2, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FCS': {'FCS_CKM': 16, 'FCS_CKM.4': 32, 'FCS_COP': 52, 'FCS_CKM.1': 23, 'FCS_CKM.2': 4, 'FCS_COP.1': 10, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ACC': 15, 'FDP_ACF': 17, 'FDP_IFC': 22, 'FDP_IFF': 23, 'FDP_RIP.1': 8, 'FDP_ITC.1': 15, 'FDP_ITC.2': 12, 'FDP_ACC.1': 23, 'FDP_ACF.1': 16, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 3, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_IFC.1': 12, 'FDP_IFF.1': 14, 'FDP_RIP.1.1': 1}, 'FIA': {'FIA_ATD.1': 7, 'FIA_SOS.1': 8, 'FIA_UAU': 2, 'FIA_UAU.5': 7, 'FIA_UAU.7': 8, 'FIA_UID.1': 14, 'FIA_AFL.1': 7, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 2, 'FIA_UAU.1': 10, 'FIA_ATD.1.1': 2, 'FIA_SOS.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MSA': 22, 'FMT_MSA.2': 10, 'FMT_SMF.1': 13, 'FMT_SMR.1': 23, 'FMT_MSA.3': 19, 'FMT_MSA.1': 15, 'FMT_MSA.1.1': 1, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MOF.1': 4}, 'FPT': {'FPT_TST.1.2': 3, 'FPT_FLS.1': 8, 'FPT_ITT.1': 8, 'FPT_PHP.1': 12, 'FPT_PHP': 1, 'FPT_TST.1': 11, 'FPT_FLS.1.1': 2, 'FPT_ITT.1.1': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.2': 11, 'FPT_PHP.2.1': 1, 'FPT_PHP.2.2': 1, 'FPT_PHP.2.3': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.3': 2}, 'FTA': {'FTA_TAB': 8, 'FTA_TAB.1': 1}, 'FTP': {'FTP_ITC': 3, 'FTP_TRP': 4, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1, 'FTP_ITC.1': 5, 'FTP_TRP.1': 4}}, 'cc_claims': {'O': {'O.ACCESS_CONTROL': 9, 'O.PIN_ENTRY': 6, 'O.MANAGEMENT': 7, 'O.SECURE_CHANNEL': 4, 'O.STATE': 7, 'O.PROTECTION': 9}, 'T': {'T.COM': 3, 'T.PIN': 6, 'T.DATA': 3, 'T.F-CONNECTOR': 3}, 'A': {'A.PUSH_SERVER': 4, 'A.ENV': 7, 'A.ADMIN': 3, 'A.CONNECTOR': 3, 'A.SM': 6}, 'OE': {'OE.ENV': 11, 'OE.ADMIN': 4, 'OE.CONNECTOR': 6, 'OE.SM': 2, 'OE.PUSH_SERVER': 4}, 'OSP': {'OSP.PIN': 1, 'OSP.PIN_ENTRY': 4}}, 'vendor': {'Microsoft': {'Microsoft': 1}}, 'eval_facility': {'TUV': {'TÜViT': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 5}, 'HPC': {'HPC': 6}}}, 'asymmetric_crypto': {'FF': {'DH': {'DHE': 2, 'Diffie-Hellman': 2, 'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 6, 'SHA256': 3}}}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS 1.1': 5, 'TLS': 24, 'TLS 1.2': 4}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_DHE_RSA_WITH_AES_128_CBC_SHA': 4, 'TLS_DHE_RSA_WITH_AES_256_CBC_SHA': 3}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 12, 'Physical tampering': 1}}, 'technical_report_id': {'BSI': {'BSI TR-03120': 3, 'BSI TR-03116': 1, 'BSI 7586': 1, 'BSI 7500': 1}}, 'device_model': {'G87': {'G87-1505': 7, 'G87-1505LBZDE-2': 1}}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS#1': 3}, 'RFC': {'RFC 4346': 1, 'RFC 3447': 1, 'RFC 5246': 1, 'RFC 2104': 1}, 'ISO': {'ISO/IEC 7816-8': 1}, 'X509': {'X.509': 8}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'SecurityFunction': {'Security function SF.2': 1}}}.
    • The st_filename property was set to 0513V2b_pdf.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]} values added.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0513V2a_pdf.pdf, code: nok', 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/0513V2b_pdf.pdf, code: 408'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]} values discarded.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to e141395ea4c89c0ff777d9410d019302d415b2822ed32d95b3086586ef278015.
    • The st_txt_hash property was set to 93ab963d2ddf6c5f5f4bce0a6e507ec1bb1ff1c1267648558b5e2422dddef64b.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1893419, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 77, '/Title': 'Common-Criteria 3.1-Document', '/Author': 'Jürgen Meier', '/Subject': 'Security Target EAL3+ for G87-1505', '/Keywords': 'G87-1505;BSI-DSZ-CC-0513-V2;eHealth-Keyboard;Security Target;Sicherheitsvorgaben', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20180228153520+01'00'", '/ModDate': "D:20180228153520+01'00'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.cherry.de/']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0513-V2': 6}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC_PP_0032-V3-2016': 1, 'BSI-CC-PP-0046': 1, 'BSI-CC-PP-0032-': 1}}, 'cc_security_level': {'EAL': {'EAL3+': 2, 'EAL 3': 3, 'EAL 3 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 4, 'ADV_IMP.1': 5, 'ADV_TDS.3': 4}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_TAT.1': 4, 'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.4': 3}, 'ASE': {'ASE_INT.1': 3, 'ASE_CCL': 2, 'ASE_SPD': 2, 'ASE_OBJ': 2, 'ASE_ECD': 2, 'ASE_REQ': 2, 'ASE_TSS': 2, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FCS': {'FCS_CKM': 16, 'FCS_CKM.4': 32, 'FCS_COP': 52, 'FCS_CKM.1': 23, 'FCS_CKM.2': 4, 'FCS_COP.1': 10, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ACC': 15, 'FDP_ACF': 17, 'FDP_IFC': 22, 'FDP_IFF': 23, 'FDP_RIP.1': 8, 'FDP_ITC.1': 15, 'FDP_ITC.2': 12, 'FDP_ACC.1': 23, 'FDP_ACF.1': 16, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 3, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_IFC.1': 12, 'FDP_IFF.1': 14, 'FDP_RIP.1.1': 1}, 'FIA': {'FIA_ATD.1': 7, 'FIA_SOS.1': 8, 'FIA_UAU': 2, 'FIA_UAU.5': 7, 'FIA_UAU.7': 8, 'FIA_UID.1': 14, 'FIA_AFL.1': 7, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 2, 'FIA_UAU.1': 10, 'FIA_ATD.1.1': 2, 'FIA_SOS.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MSA': 22, 'FMT_MSA.2': 10, 'FMT_SMF.1': 13, 'FMT_SMR.1': 23, 'FMT_MSA.3': 19, 'FMT_MSA.1': 15, 'FMT_MSA.1.1': 1, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MOF.1': 4}, 'FPT': {'FPT_TST.1.2': 3, 'FPT_FLS.1': 8, 'FPT_ITT.1': 8, 'FPT_PHP.1': 12, 'FPT_PHP': 1, 'FPT_TST.1': 11, 'FPT_FLS.1.1': 2, 'FPT_ITT.1.1': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.2': 11, 'FPT_PHP.2.1': 1, 'FPT_PHP.2.2': 1, 'FPT_PHP.2.3': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.3': 2}, 'FTA': {'FTA_TAB': 8, 'FTA_TAB.1': 1}, 'FTP': {'FTP_ITC': 3, 'FTP_TRP': 4, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1, 'FTP_ITC.1': 5, 'FTP_TRP.1': 4}}, 'cc_claims': {'O': {'O.ACCESS_CONTROL': 9, 'O.PIN_ENTRY': 6, 'O.MANAGEMENT': 7, 'O.SECURE_CHANNEL': 4, 'O.STATE': 7, 'O.PROTECTION': 9}, 'T': {'T.COM': 3, 'T.PIN': 6, 'T.DATA': 3, 'T.F-CONNECTOR': 3}, 'A': {'A.PUSH_SERVER': 4, 'A.ENV': 7, 'A.ADMIN': 3, 'A.CONNECTOR': 3, 'A.SM': 6}, 'OE': {'OE.ENV': 11, 'OE.ADMIN': 4, 'OE.CONNECTOR': 6, 'OE.SM': 2, 'OE.PUSH_SERVER': 4}, 'OSP': {'OSP.PIN': 1, 'OSP.PIN_ENTRY': 4}}, 'vendor': {'Microsoft': {'Microsoft': 1}}, 'eval_facility': {'TUV': {'TÜViT': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 5}, 'HPC': {'HPC': 6}}}, 'asymmetric_crypto': {'FF': {'DH': {'DHE': 2, 'Diffie-Hellman': 2, 'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 6, 'SHA256': 3}}}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS 1.1': 5, 'TLS': 24, 'TLS 1.2': 4}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_DHE_RSA_WITH_AES_128_CBC_SHA': 4, 'TLS_DHE_RSA_WITH_AES_256_CBC_SHA': 3}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 12, 'Physical tampering': 1}}, 'technical_report_id': {'BSI': {'BSI TR-03120': 3, 'BSI TR-03116': 1, 'BSI 7586': 1, 'BSI 7500': 1}}, 'device_model': {'G87': {'G87-1505': 7, 'G87-1505LBZDE-2': 1}}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS#1': 3}, 'RFC': {'RFC 4346': 1, 'RFC 3447': 1, 'RFC 5246': 1, 'RFC 2104': 1}, 'ISO': {'ISO/IEC 7816-8': 1}, 'X509': {'X.509': 8}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'SecurityFunction': {'Security function SF.2': 1}}}.
    • The st_filename property was set to 0513V2b_pdf.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]} values added.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is https://www.commoncriteriaportal.org/files/epfiles/0513V2c_pdf.pdf.

    The manufacturer_web was updated.

    • The new value is https://www.cherrycorp.com/.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Common Criteria Protection Profile Electronic Health Card Terminal', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0032V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['EHCT_V3_6']}}]}.

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/0513V2b_pdf.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]} values discarded.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is None.

    The manufacturer_web was updated.

    • The new value is None.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'EHCT_V3_6', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}]}.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Common Criteria Protection Profile Electronic Health Card Terminal', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0032V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['EHCT_V3_6']}}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Common Criteria Protection Profile Electronic Health Card Terminal', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0032V2b_pdf.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 28.09.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '0513V2a_pdf.pdf', 'st_filename': '0513V2b_pdf.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0513-V2-2018': 30}}}}, 'cc_security_level': {'__update__': {'EAL': {'__insert__': {'EAL 4': 1}, '__update__': {'EAL 5': 2}}}}, 'cc_sar': {'__update__': {'ATE': {'__update__': {'ATE_FUN': 2}}, 'AVA': {'__update__': {'AVA_VAN.4': 4, 'AVA_VAN': 2}}}}, 'cc_sfr': {'FCS': {'FCS_COP': 5, 'FCS_CKM': 1}, 'FTP': {'FTP_ITC': 1, 'FTP_TRP': 1}}, 'crypto_scheme': {'__delete__': ['MAC']}, 'crypto_protocol': {'__insert__': {'IPsec': {'IPsec': 1}}}, 'cipher_mode': {'__update__': {'CBC': {'__update__': {'CBC': 1}}}}, 'device_model': {'__update__': {'G87': {'__update__': {'G87-1505': 13}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'ISO': {'__insert__': {'ISO/IEC 18045': 4}, '__update__': {'ISO/IEC 15408': 4}}}}, 'certification_process': {'__update__': {'ConfidentialDocument': {'__insert__': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, '22. Mai 2017 [9] Configuration list for the TOE, Version 1.47, 28.02.2018 (confidential document) [10] Handbuch für Administratoren eGK Tastatur G87-1505, Version 6440650-04, Feb 2018, Cherry GmbH': 1, 'Report [12] Common-Criteria-3.1 Dokument ALC_DEL.1, Version 1.45, 25.01.2018, Cherry GmbH, (confidential document) [13] Sichere Lieferkette, Version 1.7, 27.02.2018, Cherry GmbH, (confidential document) Quoted': 1}, '__delete__': ['identiality being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification', 'C-PP-0032-V2-2015-MA-01, 22. Mai 2017 [9] Configuration list for the TOE, Version 1.47, 28.02.2018 (confidential document) [10] Handbuch für Administratoren eGK Tastatur G87-1505, Version 6440650-04, Feb 2018, Cherry GmbH', 'ication Report [12] Common-Criteria-3.1 Dokument ALC_DEL.1, Version 1.45, 25.01.2018, Cherry GmbH, (confidential document) [13] Sichere Lieferkette, Version 1.7, 27.02.2018, Cherry GmbH, (confidential document) Quoted']}}}} data.
    • The st_keywords property was updated, with the {'cc_sfr': {'__insert__': {'FTA': {'FTA_TAB': 8, 'FTA_TAB.1': 1}}, '__update__': {'FCS': {'__insert__': {'FCS_CKM': 16, 'FCS_COP': 52}, '__update__': {'FCS_CKM.4': 32, 'FCS_CKM.1': 23, 'FCS_COP.1': 10}}, 'FDP': {'__insert__': {'FDP_ACC': 15, 'FDP_ACF': 17, 'FDP_IFC': 22, 'FDP_IFF': 23}, '__update__': {'FDP_ACC.1': 23, 'FDP_ACF.1': 16, 'FDP_IFF.1': 14, 'FDP_IFC.1': 12}}, 'FIA': {'__insert__': {'FIA_UAU': 2}, '__update__': {'FIA_ATD.1': 7, 'FIA_UAU.7': 8, 'FIA_UID.1': 14}}, 'FMT': {'__insert__': {'FMT_MSA': 22}, '__update__': {'FMT_MSA.2': 10, 'FMT_SMF.1': 13, 'FMT_SMR.1': 23, 'FMT_MSA.3': 19, 'FMT_MSA.1': 15}}, 'FPT': {'__insert__': {'FPT_PHP': 1}, '__update__': {'FPT_ITT.1': 8, 'FPT_TST.1': 11}}, 'FTP': {'__insert__': {'FTP_ITC': 3, 'FTP_TRP': 4}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.PIN_ENTRY': 6, 'O.SECURE_CHANNEL': 4, 'O.PROTECTION': 9}}, 'OE': {'__update__': {'OE.ADMIN': 4, 'OE.SM': 2}, '__delete__': ['OE']}}}, 'hash_function': {'__update__': {'SHA': {'__delete__': ['SHA1']}}}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'TLS': {'__update__': {'TLS': 24}}}}}}, 'cipher_mode': {}, 'tls_cipher_suite': {'__update__': {'TLS': {'__update__': {'TLS_DHE_RSA_WITH_AES_256_CBC_SHA': 3}}}}, 'side_channel_analysis': {'__update__': {'FI': {'__update__': {'physical tampering': 12}}}}, 'device_model': {'__update__': {'G87': {'__update__': {'G87-1505': 7}, '__delete__': ['G87-1505LBZDE-10']}}}, 'tee_name': {}} data.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Common Criteria Protection Profile Electronic Health Card Terminal', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0032V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['EHCT_V3_6']}}]}.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2018-12-18', 'maintenance_title': 'CHERRY eHealth Terminal G87-1505 FW 3.0.1 HW 1.1.1', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/0513V2ma2a_pdf.pdf', 'maintenance_st_link': None}, {'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2018-09-07', 'maintenance_title': 'CHERRY eHealth Terminal G87-1505 FW-Version 3.0.1 HW-Version 1.1.1', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/0513V2ma1a_pdf.pdf', 'maintenance_st_link': None}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 4}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/zertifizierungsreporte', 'https://www.bsi.bund.de/zertifizierung', 'https://www.bsi.bund.de/', 'http://www.commoncriteriaportal.org/', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/AIS', 'http://www.sogisportal.eu/']}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.cherry.de/']}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0513-V2-2018': 56}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0032-V2-2015-MA-01': 3}}, 'cc_security_level': {'EAL': {'EAL 3': 4, 'EAL 2': 2, 'EAL 1': 1, 'EAL 2+': 1, 'EAL 5': 1, 'EAL3+': 1, 'EAL 5+': 1, 'EAL 6': 1, 'EAL 3 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 4, 'ADV_IMP.1': 4, 'ADV_TDS.3': 4}, 'ALC': {'ALC_TAT.1': 4, 'ALC_FLR': 2, 'ALC_DEL.1': 1}, 'ATE': {'ATE_FUN': 1, 'ATE_IND': 2}, 'AVA': {'AVA_VAN.4': 3, 'AVA_VAN': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 4, 'AES-': 1}, 'HPC': {'HPC': 2}}, 'constructions': {'MAC': {'HMAC': 3, 'CMAC': 1}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 1, 'DH': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 2}, 'SHA2': {'SHA-256': 3}}, 'MD': {'MD5': {'MD5': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 4}, 'KA': {'Key Agreement': 1}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 6, 'TLSv1.1': 3, 'TLSv1.2': 3, 'TLS v1.1': 2, 'TLS v1.2': 2}}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 2}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI TR-03116-1': 1, 'BSI 7148': 1}}, 'device_model': {'G87': {'G87-1505': 14, 'G87-1505LBZDE-2': 2, 'G87-1505LBZDE-10': 2}}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS180-4': 6, 'FIPS197': 2, 'FIPS PUB 180-4': 1}, 'PKCS': {'PKCS#1': 4}, 'BSI': {'AIS 1': 1, 'AIS 32': 1, 'AIS 34': 1}, 'RFC': {'RFC2526': 1, 'RFC1321': 1, 'RFC2104': 3, 'RFC4346': 4, 'RFC5246': 4, 'RFC3602': 2, 'RFC2404': 2, 'RFC 3447': 1, 'RFC3268': 1, 'RFC 5246': 1}, 'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 17065': 2}, 'X509': {'X.509': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'identiality being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Cherry GmbH [7] Evaluation Technical Report, Version 2, 28.02.2018, TÜV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7': 1, 'C-PP-0032-V2-2015-MA-01, 22. Mai 2017 [9] Configuration list for the TOE, Version 1.47, 28.02.2018 (confidential document) [10] Handbuch für Administratoren eGK Tastatur G87-1505, Version 6440650-04, Feb 2018, Cherry GmbH': 1, 'ication Report [12] Common-Criteria-3.1 Dokument ALC_DEL.1, Version 1.45, 25.01.2018, Cherry GmbH, (confidential document) [13] Sichere Lieferkette, Version 1.7, 27.02.2018, Cherry GmbH, (confidential document) Quoted': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0513-V2': 6}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC_PP_0032-V3-2016': 1, 'BSI-CC-PP-0046': 1, 'BSI-CC-PP-0032-': 1}}, 'cc_security_level': {'EAL': {'EAL3+': 2, 'EAL 3': 3, 'EAL 3 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 4, 'ADV_IMP.1': 5, 'ADV_TDS.3': 4}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_TAT.1': 4, 'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.4': 3}, 'ASE': {'ASE_INT.1': 3, 'ASE_CCL': 2, 'ASE_SPD': 2, 'ASE_OBJ': 2, 'ASE_ECD': 2, 'ASE_REQ': 2, 'ASE_TSS': 2, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FCS': {'FCS_CKM.4': 33, 'FCS_CKM.1': 22, 'FCS_CKM.2': 4, 'FCS_COP.1': 5, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_RIP.1': 8, 'FDP_ITC.1': 15, 'FDP_ITC.2': 12, 'FDP_ACC.1': 21, 'FDP_ACF.1': 14, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 3, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_IFF.1': 4, 'FDP_IFC.1': 10, 'FDP_RIP.1.1': 1}, 'FIA': {'FIA_ATD.1': 8, 'FIA_SOS.1': 8, 'FIA_UAU.5': 7, 'FIA_UAU.7': 7, 'FIA_UID.1': 15, 'FIA_AFL.1': 7, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 2, 'FIA_UAU.1': 10, 'FIA_ATD.1.1': 2, 'FIA_SOS.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MSA.2': 11, 'FMT_SMF.1': 14, 'FMT_SMR.1': 22, 'FMT_MSA.3': 20, 'FMT_MSA.1': 14, 'FMT_MSA.1.1': 1, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MOF.1': 4}, 'FPT': {'FPT_TST.1.2': 3, 'FPT_FLS.1': 8, 'FPT_ITT.1': 9, 'FPT_PHP.1': 12, 'FPT_TST.1': 10, 'FPT_FLS.1.1': 2, 'FPT_ITT.1.1': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.2': 11, 'FPT_PHP.2.1': 1, 'FPT_PHP.2.2': 1, 'FPT_PHP.2.3': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.3': 2}, 'FTP': {'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1, 'FTP_ITC.1': 5, 'FTP_TRP.1': 4}}, 'cc_claims': {'O': {'O.ACCESS_CONTROL': 9, 'O.PIN_ENTRY': 9, 'O.MANAGEMENT': 7, 'O.SECURE_CHANNEL': 7, 'O.STATE': 7, 'O.PROTECTION': 12}, 'T': {'T.COM': 3, 'T.PIN': 6, 'T.DATA': 3, 'T.F-CONNECTOR': 3}, 'A': {'A.PUSH_SERVER': 4, 'A.ENV': 7, 'A.ADMIN': 3, 'A.CONNECTOR': 3, 'A.SM': 6}, 'OE': {'OE': 3, 'OE.ENV': 11, 'OE.ADMIN': 5, 'OE.CONNECTOR': 6, 'OE.SM': 3, 'OE.PUSH_SERVER': 4}, 'OSP': {'OSP.PIN': 1, 'OSP.PIN_ENTRY': 4}}, 'vendor': {'Microsoft': {'Microsoft': 1}}, 'eval_facility': {'TUV': {'TÜViT': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 5}, 'HPC': {'HPC': 6}}}, 'asymmetric_crypto': {'FF': {'DH': {'DHE': 2, 'Diffie-Hellman': 2, 'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 4}, 'SHA2': {'SHA-256': 6, 'SHA256': 3}}}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS 1.1': 5, 'TLS': 23, 'TLS 1.2': 4}}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 2}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_DHE_RSA_WITH_AES_128_CBC_SHA': 4, 'TLS_DHE_RSA_WITH_AES_256_CBC_SHA': 1}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 11, 'Physical tampering': 1}}, 'technical_report_id': {'BSI': {'BSI TR-03120': 3, 'BSI TR-03116': 1, 'BSI 7586': 1, 'BSI 7500': 1}}, 'device_model': {'G87': {'G87-1505': 84, 'G87-1505LBZDE-2': 1, 'G87-1505LBZDE-10': 1}}, 'tee_name': {'IBM': {'SE': 6}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS#1': 3}, 'RFC': {'RFC 4346': 1, 'RFC 3447': 1, 'RFC 5246': 1, 'RFC 2104': 1}, 'ISO': {'ISO/IEC 7816-8': 1}, 'X509': {'X.509': 8}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'SecurityFunction': {'Security function SF.2': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '6119241090addbceb12c6a2b56bcc9a2760aaf85481c70c6973c61a3136d0044', 'st_pdf_hash': 'e141395ea4c89c0ff777d9410d019302d415b2822ed32d95b3086586ef278015', 'report_txt_hash': '35165c57e9aa6008471deef77d7fba2a3659d9532e8db6291ef34c6d84d7a2e6', 'st_txt_hash': '93ab963d2ddf6c5f5f4bce0a6e507ec1bb1ff1c1267648558b5e2422dddef64b'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 4, 'AES-': 1, 'HPC': 2, 'HMAC': 3}, 'rules_asymmetric_crypto': {'Diffie-Hellman': 1, 'DH': 2}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 2, 'SHA-256': 3, 'MD5': 1}, 'rules_crypto_schemes': {'MAC': 4, 'TLS': 10}, 'rules_randomness': {}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 5, 'HPC': 6}, 'rules_asymmetric_crypto': {'DHE': 2, 'Diffie-Hellman': 2, 'DH': 1}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA1': 4, 'SHA-256': 6, 'SHA256': 3}, 'rules_crypto_schemes': {'MAC': 1, 'TLS': 32}, 'rules_randomness': {}, 'rules_tee': {'SE': 6}, 'rules_side_channels': {'physical tampering': 11, 'Physical tampering': 1}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 4}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0513-V2']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0513-V2']}}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['3.0.1', '1.1.1']}.
  • 01.02.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Common Criteria Protection Profile Electronic Health Card Terminal', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0032V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['EHCT_V3_6']}}]}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name CHERRY eHealth Terminal G87-1505 FW-Version 3.0.1 HW-Version 1.1.1 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/0513V2c_pdf.pdf",
  "dgst": "eeb2b66043ae3922",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0513-V2-2018",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "3.0.1",
        "1.1.1"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0513-V3-2023"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0513-V3-2023"
        ]
      },
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2018-09-07",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/0513V2ma1a_pdf.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "CHERRY eHealth Terminal G87-1505 FW-Version 3.0.1 HW-Version 1.1.1"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2018-12-18",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/0513V2ma2a_pdf.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "CHERRY eHealth Terminal G87-1505 FW 3.0.1 HW 1.1.1"
      }
    ]
  },
  "manufacturer": "Cherry GmbH",
  "manufacturer_web": "https://www.cherrycorp.com/",
  "name": "CHERRY eHealth Terminal G87-1505 FW-Version 3.0.1 HW-Version 1.1.1",
  "not_valid_after": "2023-03-28",
  "not_valid_before": "2018-03-28",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "0513V2c_pdf.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0513-V2-2018": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "ALC": {
          "ALC_TAT.1": 1
        },
        "AVA": {
          "AVA_VAN.4": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 3": 1,
          "EAL 3 augmented": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {
        "G87": {
          "G87-1505": 1
        }
      },
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20180423125837+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, eHealth, Terminal, Cherry GmbH, BSI-CC-PP-0032-V3, G87-1505\"",
      "/ModDate": "D:20180423134212+02\u002700\u0027",
      "/Producer": "LibreOffice 5.2",
      "/Subject": "Zertifikat, Urkunde, Certification",
      "/Title": "Certification Report BSI-DSZ-CC-0513-V2-2018",
      "pdf_file_size_bytes": 903222,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "0513V2a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.4",
        "cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 conformant",
        "cert_id": "BSI-DSZ-CC-0513-V2-2018",
        "cert_item": "CHERRY eHealth Terminal G87-1505 FW-Version 3.0.1 HW-Version 1.1.1",
        "cert_lab": "BSI",
        "developer": "Cherry GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC- PP-0032-V2-2015-MA-01, 22. Mai 2017"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "DH": 2,
            "Diffie-Hellman": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0513-V2-2018": 15
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0032-V2-2015-MA-01": 3
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_FSP.4": 4,
          "ADV_IMP.1": 4,
          "ADV_TDS.3": 4
        },
        "ALC": {
          "ALC_DEL.1": 1,
          "ALC_FLR": 2,
          "ALC_TAT.1": 4
        },
        "ATE": {
          "ATE_FUN": 2,
          "ATE_IND": 2
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.4": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 2,
          "EAL 2+": 1,
          "EAL 3": 4,
          "EAL 3 augmented": 3,
          "EAL 4": 1,
          "EAL 5": 2,
          "EAL 5+": 1,
          "EAL 6": 1,
          "EAL3+": 1
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM": 1,
          "FCS_COP": 5
        },
        "FTP": {
          "FTP_ITC": 1,
          "FTP_TRP": 1
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          "22. Mai 2017 [9] Configuration list for the TOE, Version 1.47, 28.02.2018 (confidential document) [10] Handbuch f\u00fcr Administratoren eGK Tastatur G87-1505, Version 6440650-04, Feb 2018, Cherry GmbH": 1,
          "Cherry GmbH [7] Evaluation Technical Report, Version 2, 28.02.2018, T\u00dcV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7": 1,
          "Report [12] Common-Criteria-3.1 Dokument ALC_DEL.1, Version 1.45, 25.01.2018, Cherry GmbH, (confidential document) [13] Sichere Lieferkette, Version 1.7, 27.02.2018, Cherry GmbH, (confidential document) Quoted": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IPsec": {
          "IPsec": 1
        },
        "TLS": {
          "TLS": {
            "TLS": 6,
            "TLS v1.1": 2,
            "TLS v1.2": 2,
            "TLSv1.1": 3,
            "TLSv1.2": 3
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        }
      },
      "device_model": {
        "G87": {
          "G87-1505": 13,
          "G87-1505LBZDE-10": 2,
          "G87-1505LBZDE-2": 2
        }
      },
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 3
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 1
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 2
          },
          "SHA2": {
            "SHA-256": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 1": 1,
          "AIS 32": 1,
          "AIS 34": 1
        },
        "FIPS": {
          "FIPS PUB 180-4": 1,
          "FIPS180-4": 6,
          "FIPS197": 2
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        },
        "PKCS": {
          "PKCS#1": 4
        },
        "RFC": {
          "RFC 3447": 1,
          "RFC 5246": 1,
          "RFC1321": 1,
          "RFC2104": 3,
          "RFC2404": 2,
          "RFC2526": 1,
          "RFC3268": 1,
          "RFC3602": 2,
          "RFC4346": 4,
          "RFC5246": 4
        },
        "X509": {
          "X.509": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 4,
            "AES-": 1
          },
          "HPC": {
            "HPC": 2
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 1,
            "HMAC": 3
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1,
          "BSI TR-03116-1": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20180423125852+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, eHealth, Terminal, Cherry GmbH, BSI-CC-PP-0032-V3, G87-1505\"",
      "/ModDate": "D:20180423141107+02\u002700\u0027",
      "/Producer": "LibreOffice 5.2",
      "/Subject": "Zertifizierungsreport, Certification Report, ",
      "/Title": "Certification Report BSI-DSZ-CC-0513-V2-2018",
      "pdf_file_size_bytes": 1189634,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/zertifizierung",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "http://www.commoncriteriaportal.org/cc/",
          "http://www.sogisportal.eu/",
          "https://www.bsi.bund.de/AIS",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 28
    },
    "st_filename": "0513V2b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "DH": 1,
            "DHE": 2,
            "Diffie-Hellman": 2
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ADMIN": 3,
          "A.CONNECTOR": 3,
          "A.ENV": 7,
          "A.PUSH_SERVER": 4,
          "A.SM": 6
        },
        "O": {
          "O.ACCESS_CONTROL": 9,
          "O.MANAGEMENT": 7,
          "O.PIN_ENTRY": 6,
          "O.PROTECTION": 9,
          "O.SECURE_CHANNEL": 4,
          "O.STATE": 7
        },
        "OE": {
          "OE.ADMIN": 4,
          "OE.CONNECTOR": 6,
          "OE.ENV": 11,
          "OE.PUSH_SERVER": 4,
          "OE.SM": 2
        },
        "OSP": {
          "OSP.PIN": 1,
          "OSP.PIN_ENTRY": 4
        },
        "T": {
          "T.COM": 3,
          "T.DATA": 3,
          "T.F-CONNECTOR": 3,
          "T.PIN": 6
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0032-": 1,
          "BSI-CC-PP-0046": 1,
          "BSI-CC_PP_0032-V3-2016": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_FSP.4": 4,
          "ADV_IMP.1": 5,
          "ADV_TDS.3": 4
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.3": 1,
          "ALC_CMS.3": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 4
        },
        "ASE": {
          "ASE_CCL": 2,
          "ASE_CCL.1": 1,
          "ASE_ECD": 2,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 3,
          "ASE_OBJ": 2,
          "ASE_OBJ.2": 1,
          "ASE_REQ": 2,
          "ASE_REQ.2": 1,
          "ASE_SPD": 2,
          "ASE_SPD.1": 1,
          "ASE_TSS": 2,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.4": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 3": 3,
          "EAL 3 augmented": 3,
          "EAL3+": 2
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM": 16,
          "FCS_CKM.1": 23,
          "FCS_CKM.2": 4,
          "FCS_CKM.4": 32,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 52,
          "FCS_COP.1": 10
        },
        "FDP": {
          "FDP_ACC": 15,
          "FDP_ACC.1": 23,
          "FDP_ACF": 17,
          "FDP_ACF.1": 16,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 3,
          "FDP_ACF.1.3": 2,
          "FDP_ACF.1.4": 2,
          "FDP_IFC": 22,
          "FDP_IFC.1": 12,
          "FDP_IFF": 23,
          "FDP_IFF.1": 14,
          "FDP_ITC.1": 15,
          "FDP_ITC.2": 12,
          "FDP_RIP.1": 8,
          "FDP_RIP.1.1": 1
        },
        "FIA": {
          "FIA_AFL.1": 7,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 2,
          "FIA_ATD.1": 7,
          "FIA_ATD.1.1": 2,
          "FIA_SOS.1": 8,
          "FIA_SOS.1.1": 1,
          "FIA_UAU": 2,
          "FIA_UAU.1": 10,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.5": 7,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.7": 8,
          "FIA_UAU.7.1": 1,
          "FIA_UID.1": 14,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_MOF.1": 4,
          "FMT_MSA": 22,
          "FMT_MSA.1": 15,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.2": 10,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 19,
          "FMT_MSA.3.1": 2,
          "FMT_MSA.3.2": 2,
          "FMT_SMF.1": 13,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 23,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FLS.1": 8,
          "FPT_FLS.1.1": 2,
          "FPT_ITT.1": 8,
          "FPT_ITT.1.1": 1,
          "FPT_PHP": 1,
          "FPT_PHP.1": 12,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.2": 11,
          "FPT_PHP.2.1": 1,
          "FPT_PHP.2.2": 1,
          "FPT_PHP.2.3": 1,
          "FPT_TST.1": 11,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 3,
          "FPT_TST.1.3": 2
        },
        "FTA": {
          "FTA_TAB": 8,
          "FTA_TAB.1": 1
        },
        "FTP": {
          "FTP_ITC": 3,
          "FTP_ITC.1": 5,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP": 4,
          "FTP_TRP.1": 4,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {
        "SecurityFunction": {
          "Security function SF.2": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 24,
            "TLS 1.1": 5,
            "TLS 1.2": 4
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {
        "G87": {
          "G87-1505": 7,
          "G87-1505LBZDE-2": 1
        }
      },
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcViT": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 6,
            "SHA256": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "Physical tampering": 1,
          "physical tampering": 12
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2012-09-001": 1,
          "CCMB-2012-09-002": 1,
          "CCMB-2012-09-003": 1,
          "CCMB-2012-09-004": 1
        },
        "ISO": {
          "ISO/IEC 7816-8": 1
        },
        "PKCS": {
          "PKCS#1": 3
        },
        "RFC": {
          "RFC 2104": 1,
          "RFC 3447": 1,
          "RFC 4346": 1,
          "RFC 5246": 1
        },
        "X509": {
          "X.509": 8
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 5
          },
          "HPC": {
            "HPC": 6
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7500": 1,
          "BSI 7586": 1,
          "BSI TR-03116": 1,
          "BSI TR-03120": 3
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {
        "TLS": {
          "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 4,
          "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": 3
        }
      },
      "vendor": {
        "Microsoft": {
          "Microsoft": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "J\u00fcrgen Meier",
      "/CreationDate": "D:20180228153520+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/Keywords": "G87-1505;BSI-DSZ-CC-0513-V2;eHealth-Keyboard;Security Target;Sicherheitsvorgaben",
      "/ModDate": "D:20180228153520+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Subject": "Security Target EAL3+ for G87-1505",
      "/Title": "Common-Criteria 3.1-Document",
      "pdf_file_size_bytes": 1893419,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.cherry.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 77
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL3+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "EHCT_V3_6"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0032V2b_pdf.pdf",
        "pp_name": "Common Criteria Protection Profile Electronic Health Card Terminal"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/0513V2a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_VAN.4",
      "EAL3+",
      "ADV_TDS.3",
      "ALC_TAT.1",
      "ADV_IMP.1",
      "ADV_FSP.4"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/0513V2b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "bad61b8f97b2afee4f1a8464cd3d1a197893774dfb154ffeb2d06fa3d029998e",
      "txt_hash": "12f356d5b137febd1b32fab9e5ab0aa77cb6bfe66b178ce63bf481b11288e951"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "6119241090addbceb12c6a2b56bcc9a2760aaf85481c70c6973c61a3136d0044",
      "txt_hash": "35165c57e9aa6008471deef77d7fba2a3659d9532e8db6291ef34c6d84d7a2e6"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e141395ea4c89c0ff777d9410d019302d415b2822ed32d95b3086586ef278015",
      "txt_hash": "93ab963d2ddf6c5f5f4bce0a6e507ec1bb1ff1c1267648558b5e2422dddef64b"
    }
  },
  "status": "archived"
}