| name |
bizhub 350 / bizhub 250 / bizhub 200 / bizhub 362 / bizhub 282 / bizhub 222 / ineo 362 / ineo 282 / ineo 222 / VarioLink 3621 / VarioLink 2821 / VarioLink 2221 Control Software Version:A11U-0100-G10-06 |
TCOS Passport Version 2.0 Release 2/P5CD080V0B Extended Access Control Version 2.0.2.m3 |
| category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
JP |
DE |
| status |
archived |
archived |
| not_valid_after |
28.08.2014 |
01.09.2019 |
| not_valid_before |
21.08.2009 |
14.10.2009 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0233_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0634a_pdf.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0233_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0634b_pdf.pdf |
| manufacturer |
Konica Minolta Business Technologies, Inc |
T-Systems Enterprise Services GmbH |
| manufacturer_web |
https://www.konicaminolta.com/ |
https://www.t-systems.de/ |
| security_level |
EAL3 |
EAL4+ |
| dgst |
0284926c3c58f5e1 |
69effd70e2121fbd |
| heuristics/cert_id |
JISEC-CC-CRP-C0233 |
BSI-DSZ-CC-0634-2009 |
| heuristics/cert_lab |
[] |
BSI |
| heuristics/cpe_matches |
cpe:2.3:h:konicaminolta:bizhub_200:-:*:*:*:*:*:*:* |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, ADV_FSP.3, ALC_LCD.1, AVA_VLA.1, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ASE_TSS.1, ADV_ARC.1 |
ADV_LLD.1, ALC_LCD.1, ALC_TAT.1, ADV_FSP.2, ALC_DVS.2, ADV_IMP.2, AGD_ADM.1, ATE_IND.2, AVA_VLA.4, ADV_RCR.1, ATE_DPT.1, AVA_SOF.1, ADV_HLD.2, AGD_USR.1, ATE_COV.2, ATE_FUN.1, AVA_MSU.3, ADV_SPM.1 |
| heuristics/extracted_versions |
200, 350, 2821, 0100, 282, 222, 250, 362, 3621, 2221, 06 |
2.0, 2.0.2 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0527-2008, BSI-DSZ-CC-0410-2007 |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0518-2008, BSI-DSZ-CC-0446-2007, BSI-DSZ-CC-0410-2007, BSI-DSZ-CC-0527-2008, BSI-DSZ-CC-0404-2007 |
| heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0233
- certification_date: 01.08.2009
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0233_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of MFP, including the operation control processing and the image data management triggered by the panel of the main body of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFD” or through the network and supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, TOE can prevent the unauthorized access to the image data written in HDD for the danger of taking HDD that is the medium that stores the image data in MFP out illegally by using the protection function to overwrite at once the data that became unnecessary, the HDD lock function loaded on the HDD or the encryption function by the encryption board which is the optional part of MFP. Besides, TOE has a deletion method compliant with various overwrite deletion standards and it deletes all the data of HDD completely. TOE security functionality TOE provides the following security functions. - Administrator function - Service mode function - Secure Print Function - Remaining information overwrite deletion function - All area overwrite deletion function - Encryption key generation function - HDD Verification Function - Authentication Failure Frequency Reset function - Encryption Board Operation Support Function - HDD lock Operation Support Function
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: Japanese : bizhub 350 / bizhub 250 / bizhub 200 / bizhub 362 / bizhub 282 / bizhub 222 / ineo 362 / ineo 282 / ineo 222 / VarioLink 3621 / VarioLink 2821 / VarioLink 2221 Zentai Seigyo Software English : bizhub 350 / bizhub 250 / bizhub 200 / bizhub 362 / bizhub 282 / bizhub 222 / ineo 362 / ineo 282 / ineo 222 / VarioLink 3621 / VarioLink 2821 / VarioLink 2221 Control Software
- product_type: Control Software for digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0233_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0233_est.pdf
- toe_version: A11U-0100-G10-06
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.08.2014
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub 350 / bizhub 250 / bizhub 200 / bizhub 362 / bizhub 282 / bizhub 222 / ineo 362 / ineo 282 / ineo 222 / VarioLink 3621 / VarioLink 2821 / VarioLink 2221 Zentai Seigyo Software A11U-0100-G10-06
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0233_it9245.html
- toe_overseas_name: bizhub 350 / bizhub 250 / bizhub 200 / bizhub 362 / bizhub 282 / bizhub 222 / ineo 362 / ineo 282 / ineo 222 / VarioLink 3621 / VarioLink 2821 / VarioLink 2221 Control Software A11U-0100-G10-06
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0410-2007 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0410-2007 |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
c0233_erpt.pdf |
0634a_pdf.pdf |
| pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0634-2009
- cert_item: TCOS Passport Version 2.0 Release 2 / P5CD080V0B Extended Access Control Version 2.0.2.m3
- cert_lab: BSI
- developer: T-Systems Enterprise Services GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
| pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0233-01: 1
- Certification No. C0233: 1
|
- DE:
- BSI-DSZ-CC-0410-2007: 1
- BSI-DSZ-CC-0527-2008: 3
- BSI-DSZ-CC-0634-2009: 20
- BSI-DSZ-CC-S-0002-2009: 2
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002-2001: 1
- BSI-PP-0026: 4
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 4: 11
- EAL 4 augmented: 3
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 5
- EAL5: 6
- EAL6: 3
- EAL7: 4
|
| pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_IMP.2: 5
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 6
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 4
- ATE_IND: 4
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_VLA: 5
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVICE: 1
- A.SETTING: 1
- T:
- T.ACCESS-BOX: 2
- T.ACCESS-SECURE-PRINT: 2
- T.ACCESS-SETTING: 2
- T.BRING-OUT-STORAGE: 3
- T.DISCARD-MFP: 2
- T.UNEXPECTED-TRANSMISSION: 2
|
|
| pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG: 1
- NXP:
- Philips:
|
| pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 3
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
- EF:
- EF.DG14: 2
- EF.DG2: 2
- EF.DG3: 6
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
|
- BSI:
- AIS 25: 1
- AIS 26: 1
- AIS 32: 1
- AIS 34: 2
- AIS 36: 2
- AIS 38: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 46-3: 1
- ICAO:
- ISO:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- of MFP or through the network. TOE supports the protection function from exposure of the highly confidential documents stored in the MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data: 1
|
- ConfidentialDocument:
- 36 for the Product NXP P5CD080V0B Secure Smart Card Controller, Version 1.2, 23.06.2009, T-Systems (confidential document) [14] Certification Report for NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B and: 1
- Access Control Version 2.0.2.m3, Evaluation Body for IT-Security of TÜV Informationstechnik GmbH (confidential document) [8] Machine Readable Travel Document with „ICAO Application", Extended Access Control, BSI-PP-0026: 1
- und TCOS Passport Version 2.0 Release 2 / SLE66CLX800PE, Version 0.68, 06.10.2009, T-Systems (confidential document) [16] Administrator’s Guide for TCOS Passport Version 2.0 Release 2-EAC, Version 1.0, 30.06.2008: 1
|
| pdf_data/report_metadata |
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20091109163223+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /Manager: IPA
- /ModDate: D:20091109163252+09'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /SourceModified: D:20091109073126
- /Title: CRP-e
- pdf_file_size_bytes: 475366
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 31
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20091119105018+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, CC 2.3, Zertifizierung, MRTD, T-Systems, TCOS, EAC, ePass"
- /ModDate: D:20091119154048+01'00'
- /Producer: StarOffice 9
- /Subject: Common Criteria Certification
- /Title: Certification Report TCOS Passport Version 2.0 Release 2 / P5CD080V0B Extended Access Control Version 2.0.2.m3
- pdf_file_size_bytes: 982474
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
| pdf_data/st_filename |
c0233_est.pdf |
0634b_pdf.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0410-2007: 1
- BSI-DSZ-CC-0634: 1
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002: 1
- BSI-PP-0026: 1
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 24
- EAL 4 augmented: 1
- EAL 5: 2
- EAL4: 12
- EAL4 augmented: 2
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_AUT.1: 2
- ACM_CAP.4: 2
- ACM_SCP: 1
- ACM_SCP.2: 1
- ADO:
- ADO_DEL.2: 2
- ADO_GEL: 1
- ADO_IGS: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP: 4
- ADV_FSP.1: 2
- ADV_FSP.2: 1
- ADV_HLD: 4
- ADV_HLD.2: 2
- ADV_IMP: 2
- ADV_IMP.1: 1
- ADV_IMP.2: 10
- ADV_LLD: 2
- ADV_LLD.1: 3
- ADV_RCR: 2
- ADV_RCR.1: 2
- ADV_SPM: 1
- ADV_SPM.1: 4
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 3
- AGD_USR: 1
- AGD_USR.1: 3
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 9
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 1
- ALC_TAT.1: 3
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU: 1
- AVA_MSU.3: 7
- AVA_SOF: 1
- AVA_SOF.1: 1
- AVA_VLA: 1
- AVA_VLA.4: 7
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM.1: 5
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 2
- FCS_COP.1: 3
- FDP:
- FDP_ACC.1: 30
- FDP_ACC.1.1: 3
- FDP_ACF.1: 23
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 3
- FDP_IFC.1: 2
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 29
- FIA_AFL.1.1: 4
- FIA_AFL.1.2: 4
- FIA_ATD.1: 12
- FIA_ATD.1.1: 1
- FIA_CAP.1: 1
- FIA_EID: 1
- FIA_EID.1: 11
- FIA_EID.1.1: 2
- FIA_EID.1.2: 2
- FIA_SOS.1: 26
- FIA_SOS.1.1: 4
- FIA_UAU.1: 13
- FIA_UAU.2: 28
- FIA_UAU.2.1: 4
- FIA_UAU.6: 10
- FIA_UAU.6.1: 1
- FIA_UAU.7: 15
- FIA_UAU.7.1: 1
- FIA_UID.1: 20
- FIA_UID.2: 22
- FIA_UID.2.1: 4
- FIA_USB.1: 10
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 4
- FMT_MOF.1.1: 1
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.3: 15
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 31
- FMT_MTD.1.1: 5
- FMT_SMF.1: 40
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 50
- FMT_SMR.1.1: 4
- FMT_SMR.1.2: 4
- FPT:
- FPT_RVM.1: 1
- FPT_SEP.1: 1
|
- FAU:
- FAU_SAS: 4
- FAU_SAS.1: 13
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 62
- FCS_CKM.1: 47
- FCS_CKM.2: 10
- FCS_CKM.4: 53
- FCS_COP: 119
- FCS_COP.1: 28
- FCS_RND: 23
- FCS_RND.1: 10
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 26
- FDP_ACC.1.1: 1
- FDP_ACF: 2
- FDP_ACF.1: 17
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_DAU: 7
- FDP_DAU.1: 4
- FDP_IFC.1: 9
- FDP_ITC.1: 27
- FDP_ITC.2: 28
- FDP_ITT.1: 1
- FDP_UCT: 16
- FDP_UCT.1: 5
- FDP_UIT: 16
- FDP_UIT.1: 5
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 24
- FIA_API.1: 8
- FIA_API.1.1: 1
- FIA_UAU: 72
- FIA_UAU.1: 12
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 9
- FIA_UAU.5: 7
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 2
- FIA_UAU.6: 8
- FIA_UID: 1
- FIA_UID.1: 15
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 4
- FMT_LIM.1: 20
- FMT_LIM.1.1: 2
- FMT_LIM.2: 18
- FMT_LIM.2.1: 2
- FMT_MDT.3: 1
- FMT_MSA.1: 3
- FMT_MSA.2: 37
- FMT_MSA.3: 4
- FMT_MTD: 73
- FMT_MTD.1: 10
- FMT_MTD.3: 10
- FMT_MTD.3.1: 1
- FMT_SMF.1: 27
- FMT_SMF.1.1: 1
- FMT_SMR.1: 28
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 1
- FPT_FLS: 1
- FPT_FLS.1: 12
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP: 1
- FPT_PHP.3: 11
- FPT_PHP.3.1: 1
- FPT_RVM: 1
- FPT_RVM.1: 10
- FPT_RVM.1.1: 1
- FPT_SEP: 1
- FPT_SEP.1: 14
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TST: 2
- FPT_TST.1: 9
- FPT_TST.1.1: 2
- FPT_TST.1.2: 1
- FPT_TST.1.3: 2
- FRU:
- FTP:
- FTP_ITC.1: 9
- FTP_TRP.1: 8
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.NETWORK: 3
- A.SECRET: 2
- A.SERVICE: 2
- A.SETTING: 3
- O:
- O.BOX: 7
- O.CHECK-HDD: 6
- O.CONFIG: 9
- O.CRYPT-KEY: 3
- O.CRYPTO-CAPABILITY: 4
- O.CRYPTO-KEY: 1
- O.LOCK-HDD-CAPABILITY: 6
- O.OVERWRITE-ALL: 4
- O.OVERWRITE-FILE: 6
- O.SECURE-PRINT: 5
- OE:
- OE.ADMIN: 3
- OE.CRYPTO: 3
- OE.FEED-BACK: 7
- OE.LOCK-HDD: 3
- OE.NETWORK: 3
- OE.SECRET: 3
- OE.SERVICE: 3
- OE.SESSION: 5
- OE.SETTING-SECURITY: 3
- T:
- T.ACCESS-BOX: 4
- T.ACCESS-SECURE-PRINT: 2
- T.ACCESS-SETTING: 2
- T.BRING-OUT-: 1
- T.BRING-OUT-STORAGE: 2
- T.DISCARD-MFP: 3
- T.UNEXPECTED-TRANSMISSION: 3
|
- O:
- O.CONFIG: 1
- O.HW_AES: 1
- O.MEM_ACCESS: 1
- O.MF_FW: 1
- O.RND: 2
- O.SFR_ACCESS: 1
- OT:
- T:
|
| pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 3
- NXP Semiconductors: 1
|
| pdf_data/st_keywords/eval_facility |
|
- TSystems:
- T-Systems International: 2
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 7
- Physical Tampering: 5
- Physical tampering: 1
- fault injection: 1
- malfunction: 5
- physical tampering: 2
- SCA:
- DPA: 1
- Leak-Inherent: 4
- Physical Probing: 2
- physical probing: 3
- other:
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 15
- EF.DG1: 33
- EF.DG13: 4
- EF.DG14: 9
- EF.DG15: 1
- EF.DG16: 33
- EF.DG2: 13
- EF.DG3: 20
- EF.DG4: 16
- EF.DG5: 11
- EF.SOD: 9
|
| pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- FIPS:
|
- BSI:
- AIS 31: 1
- AIS 36: 1
- AIS31: 7
- AIS36: 4
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- CCMB-2005-08-004: 1
- FIPS:
- FIPS 180-2106: 1
- FIPS 180-2124: 1
- FIPS 180-214: 1
- FIPS 180-2142: 1
- FIPS 46-3: 3
- FIPS PUB 180-2: 1
- FIPS PUB 46-3: 1
- FIPS180: 2
- FIPS46: 2
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- RFC:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
- ConfidentialDocument:
- main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential document stored in the MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data: 1
|
|
| pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20091111180533+09'00'
- /Creator: Word 用 Acrobat PDFMaker 7.0
- /ModDate: D:20091111180925+09'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Title: 1
- pdf_file_size_bytes: 528113
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 67
|
- /Author: T-Systems Enterprise Services GmbH
- /CreationDate: D:20090824020002
- /Creator: T-Systems AFPL Ghostscript
- /Keywords: Extended Access Control
- /ModDate: D:20091008153812+02'00'
- /Producer: GPL Ghostscript 8.64
- /Subject: TCOS Passport Version 2.0 Release 2 EAC
- /Title: TCOS Passport Version 2.0 Release 2_EAC P5CD080V0B.doc
- pdf_file_size_bytes: 736363
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 131
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |