Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
bizhub 350 / bizhub 250 / bizhub 200 / bizhub 362 / bizhub 282 / bizhub 222 / ineo 362 / ineo 282 / ineo 222 / VarioLink 3621 / VarioLink 2821 / VarioLink 2221 Control Software Version:A11U-0100-G10-06
JISEC-CC-CRP-C0233
SafeNet eToken (Smartcard or USB token) version 9.1.2 Athena IDProtect/OS755 Java Card on INSIDE Secure AT90SC25672RCTUSB Microcontroller embedding IDSign applet
ANSSI-CC-2011/45
name bizhub 350 / bizhub 250 / bizhub 200 / bizhub 362 / bizhub 282 / bizhub 222 / ineo 362 / ineo 282 / ineo 222 / VarioLink 3621 / VarioLink 2821 / VarioLink 2221 Control Software Version:A11U-0100-G10-06 SafeNet eToken (Smartcard or USB token) version 9.1.2 Athena IDProtect/OS755 Java Card on INSIDE Secure AT90SC25672RCTUSB Microcontroller embedding IDSign applet
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP FR
not_valid_after 28.08.2014 01.09.2019
not_valid_before 21.08.2009 22.09.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0233_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2011-45en.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0233_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2011-45en.pdf
manufacturer Konica Minolta Business Technologies, Inc Athena Smartcard Solutions Inc. / Inside Secure S.A.
manufacturer_web https://www.konicaminolta.com/ https://www.athena-scs.com/
security_level EAL3 EAL4+, AVA_VAN.5
dgst 0284926c3c58f5e1 6a79b4cde1876387
heuristics/cert_id JISEC-CC-CRP-C0233 ANSSI-CC-2011/45
heuristics/cert_lab [] THALES
heuristics/cpe_matches cpe:2.3:h:konicaminolta:bizhub_200:-:*:*:*:*:*:*:* {}
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, ADV_FSP.3, ALC_LCD.1, AVA_VLA.1, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ASE_TSS.1, ADV_ARC.1 ADV_TDS.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ADV_RCR.1, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, ADV_LLD.1, AGD_PRE.1, ATE_IND.2, AGD_USR.1, ASE_ECD.1, ADV_IMP.1, ALC_LCD.1, ATE_DPT.2, AVA_VLA.4, ADV_HLD.2, ASE_SPD.1, ATE_COV.2, AVA_MSU.3, ALC_DVS.1, ALC_TAT.1, AGD_ADM.1, AVA_SOF.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ASE_TSS.1, ADV_FSP.4, ADV_SPM.1, ADV_ARC.1
heuristics/extracted_versions 200, 350, 2821, 0100, 282, 222, 250, 362, 3621, 2221, 06 9.1.2
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2012/43
heuristics/report_references/directly_referencing {} ANSSI-CC-2006/30, ANSSI-CC-2009/11, ANSSI-CC-2011/03
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2012/43
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2006/30, ANSSI-CC-2009/11, ANSSI-CC-2011/03
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0233
  • certification_date: 01.08.2009
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0233_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of MFP, including the operation control processing and the image data management triggered by the panel of the main body of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFD” or through the network and supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, TOE can prevent the unauthorized access to the image data written in HDD for the danger of taking HDD that is the medium that stores the image data in MFP out illegally by using the protection function to overwrite at once the data that became unnecessary, the HDD lock function loaded on the HDD or the encryption function by the encryption board which is the optional part of MFP. Besides, TOE has a deletion method compliant with various overwrite deletion standards and it deletes all the data of HDD completely. TOE security functionality TOE provides the following security functions. - Administrator function - Service mode function - Secure Print Function - Remaining information overwrite deletion function - All area overwrite deletion function - Encryption key generation function - HDD Verification Function - Authentication Failure Frequency Reset function - Encryption Board Operation Support Function - HDD lock Operation Support Function
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: Japanese : bizhub 350 / bizhub 250 / bizhub 200 / bizhub 362 / bizhub 282 / bizhub 222 / ineo 362 / ineo 282 / ineo 222 / VarioLink 3621 / VarioLink 2821 / VarioLink 2221 Zentai Seigyo Software English : bizhub 350 / bizhub 250 / bizhub 200 / bizhub 362 / bizhub 282 / bizhub 222 / ineo 362 / ineo 282 / ineo 222 / VarioLink 3621 / VarioLink 2821 / VarioLink 2221 Control Software
    • product_type: Control Software for digital MFP
    • report_link: https://www.ipa.go.jp/en/security/c0233_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0233_est.pdf
    • toe_version: A11U-0100-G10-06
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.08.2014
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub 350 / bizhub 250 / bizhub 200 / bizhub 362 / bizhub 282 / bizhub 222 / ineo 362 / ineo 282 / ineo 222 / VarioLink 3621 / VarioLink 2821 / VarioLink 2221 Zentai Seigyo Software A11U-0100-G10-06
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0233_it9245.html
  • toe_overseas_name: bizhub 350 / bizhub 250 / bizhub 200 / bizhub 362 / bizhub 282 / bizhub 222 / ineo 362 / ineo 282 / ineo 222 / VarioLink 3621 / VarioLink 2821 / VarioLink 2221 Control Software A11U-0100-G10-06
heuristics/st_references/directly_referencing {} ANSSI-CC-2006/30
heuristics/st_references/indirectly_referencing {} ANSSI-CC-2006/30
heuristics/protection_profiles {} 40002c3611fc465f, 9863a376f3bb4175
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0005b.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0006b.pdf
pdf_data/report_filename c0233_erpt.pdf ANSSI-CC_2011-45en.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 4 augmented AVA_VAN.5
    • cc_version: Common Criteria version 3.1 revision 3
    • cert_id: ANSSI-CC-2011/45
    • cert_item: SafeNet eToken (Smartcard or USB token) version 9.1.2 Athena IDProtect/OS755 Java Card on INSIDE Secure AT90SC25672RCT- USB Microcontroller embedding IDSign applet
    • cert_item_version: - Athena IDProtect/OS755 Java Card : release date 0113, release level 2109 - Atmel AT90SC25672RCT-USB Microcontroller : AT58829, révision D - Atmel Toolbox version: 00.03.11.05 - Athena IDSign applet : version 3.0, build 001
    • cert_lab: THALES - CEACI (T3S – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France Tél : +33 (0)5 62 88 28 01 ou 18, mél : [email protected]
    • developer: Athena Smartcard Solutions Inc. 1-14-16, Motoyokoyama-cho Hachioji-shi, Tokyo, 192-0063, Japan Inside Secure S.A. Maxwell Building - Scottish Enterprise technology Park, East Kilbride, G75 0QR, Scotland, United Kingdom Sponsor SafeNet Inc. 4690 Millenium Drive, Belcamp, MD 21017, USA
    • match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements']
    • ref_protection_profiles: BSI-PP-0005-2002] : SSCD Type 2, version 1.04 [BSI-PP-0006-2002] : SSCD Type 3, version 1.05
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0233-01: 1
    • Certification No. C0233: 1
  • FR:
    • ANSSI-CC-2006_30: 1
    • ANSSI-CC-2009_11: 1
    • ANSSI-CC-2011/45: 19
    • ANSSI-CC-2011_03: 1
    • ANSSI-CC-PP-1998_06: 1
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-1998_06: 1
  • BSI:
    • BSI-PP- 0005-2002: 1
    • BSI-PP- 0006-2002: 2
    • BSI-PP-0005-: 1
    • BSI-PP-0005-2002: 3
    • BSI-PP-0006-: 1
    • BSI-PP-0006-2002: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 4: 2
    • EAL 4 augmented: 2
    • EAL 5: 1
    • EAL 7: 1
    • EAL4: 3
    • EAL5: 1
    • EAL5 augmented: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 High: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_IMP.2: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_MSU.3: 2
    • AVA_VAN: 1
    • AVA_VAN.5: 3
    • AVA_VLA.4: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVICE: 1
    • A.SETTING: 1
  • T:
    • T.ACCESS-BOX: 2
    • T.ACCESS-SECURE-PRINT: 2
    • T.ACCESS-SETTING: 2
    • T.BRING-OUT-STORAGE: 3
    • T.DISCARD-MFP: 2
    • T.UNEXPECTED-TRANSMISSION: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft Corporation: 1
pdf_data/report_keywords/eval_facility
  • Thales:
    • THALES - CEACI: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 6
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/report_keywords/crypto_engine
  • TORNADO:
    • TORNADO: 2
pdf_data/report_keywords/crypto_library
  • AtmelToolbox:
    • ATMEL Toolbox 00.03.11.05: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/device_model
  • ATMEL:
    • ATMEL AT90SC25672RCT-USB: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
    • CCMB-2007-09-004: 2
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • of MFP or through the network. TOE supports the protection function from exposure of the highly confidential documents stored in the MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data: 1
pdf_data/report_metadata
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20091109163223+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Manager: IPA
  • /ModDate: D:20091109163252+09'00'
  • /Producer: Acrobat Distiller 8.1.0 (Windows)
  • /SourceModified: D:20091109073126
  • /Title: CRP-e
  • pdf_file_size_bytes: 475366
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 31
  • /CreationDate: D:20111219112640+01'00'
  • /Keywords:
  • /ModDate: D:20111219112640+01'00'
  • /Producer: Acrobat Distiller 8.1.0 (Windows)
  • pdf_file_size_bytes: 141290
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
pdf_data/st_filename c0233_est.pdf ANSSI-CC-cible_2011-45en.pdf
pdf_data/st_keywords/cc_cert_id
  • AU:
    • Certification Report 2006/30: 1
  • FR:
    • Certification Report 2006/30: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0005-2002: 1
    • BSI-PP-0006-2002: 1
    • BSI-PP-002-2001: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL 4+: 7
    • EAL4: 7
    • EAL4 augmented: 2
    • EAL4+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VLA.1: 1
  • ACM:
    • ACM_AUT.1: 1
    • ACM_CAP.4: 1
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL.2: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.2: 2
    • ADV_FSP.4: 1
    • ADV_HLD.2: 1
    • ADV_IMP.1: 3
    • ADV_LLD.1: 1
    • ADV_RCR.1: 1
    • ADV_SPM.1: 1
    • ADV_TDS.3: 2
  • AGD:
    • AGD_ADM.1: 1
    • AGD_OPE.1: 2
    • AGD_PRE.1: 3
    • AGD_USR.1: 1
  • ALC:
    • ALC_CMC.4: 3
    • ALC_CMS.4: 1
    • ALC_DEL.1: 2
    • ALC_DVS.1: 3
    • ALC_LCD.1: 3
    • ALC_TAT.1: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.3: 1
    • AVA_SOF.1: 2
    • AVA_VAN: 1
    • AVA_VAN.5: 10
    • AVA_VLA.4: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
  • FCS:
    • FCS_CKM.1: 5
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 2
    • FCS_COP.1: 3
  • FDP:
    • FDP_ACC.1: 30
    • FDP_ACC.1.1: 3
    • FDP_ACF.1: 23
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_IFC.1: 2
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 29
    • FIA_AFL.1.1: 4
    • FIA_AFL.1.2: 4
    • FIA_ATD.1: 12
    • FIA_ATD.1.1: 1
    • FIA_CAP.1: 1
    • FIA_EID: 1
    • FIA_EID.1: 11
    • FIA_EID.1.1: 2
    • FIA_EID.1.2: 2
    • FIA_SOS.1: 26
    • FIA_SOS.1.1: 4
    • FIA_UAU.1: 13
    • FIA_UAU.2: 28
    • FIA_UAU.2.1: 4
    • FIA_UAU.6: 10
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 15
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 20
    • FIA_UID.2: 22
    • FIA_UID.2.1: 4
    • FIA_USB.1: 10
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 4
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 31
    • FMT_MTD.1.1: 5
    • FMT_SMF.1: 40
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 50
    • FMT_SMR.1.1: 4
    • FMT_SMR.1.2: 4
  • FPT:
    • FPT_RVM.1: 1
    • FPT_SEP.1: 1
  • FCS:
    • FCS_ACC.1: 1
    • FCS_CKM.1: 2
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 2
    • FCS_CKM.3: 2
    • FCS_CKM.4: 3
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 7
  • FDP:
    • FDP_ACC.1: 7
    • FDP_ACF.1: 21
    • FDP_ETC.1: 3
    • FDP_ITC.1: 8
    • FDP_RIP.1: 1
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 5
    • FDP_UCT.1: 4
    • FDP_UIT.1: 11
  • FIA:
    • FIA_AFL.1: 1
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 1
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 2
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 3
    • FMT_MSA.1: 3
    • FMT_MSA.2: 1
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 1
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 1
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 1
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 1
    • FPT_PHP.3.1: 1
    • FPT_TEE.1: 1
    • FPT_TEE.1.1: 1
    • FPT_TEE.1.2: 1
    • FPT_TST.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 4
    • FTP_ITC.1: 24
    • FTP_TRP: 4
    • FTP_TRP.1: 8
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.NETWORK: 3
    • A.SECRET: 2
    • A.SERVICE: 2
    • A.SETTING: 3
  • O:
    • O.BOX: 7
    • O.CHECK-HDD: 6
    • O.CONFIG: 9
    • O.CRYPT-KEY: 3
    • O.CRYPTO-CAPABILITY: 4
    • O.CRYPTO-KEY: 1
    • O.LOCK-HDD-CAPABILITY: 6
    • O.OVERWRITE-ALL: 4
    • O.OVERWRITE-FILE: 6
    • O.SECURE-PRINT: 5
  • OE:
    • OE.ADMIN: 3
    • OE.CRYPTO: 3
    • OE.FEED-BACK: 7
    • OE.LOCK-HDD: 3
    • OE.NETWORK: 3
    • OE.SECRET: 3
    • OE.SERVICE: 3
    • OE.SESSION: 5
    • OE.SETTING-SECURITY: 3
  • T:
    • T.ACCESS-BOX: 4
    • T.ACCESS-SECURE-PRINT: 2
    • T.ACCESS-SETTING: 2
    • T.BRING-OUT-: 1
    • T.BRING-OUT-STORAGE: 2
    • T.DISCARD-MFP: 3
    • T.UNEXPECTED-TRANSMISSION: 3
  • A:
    • A.CGA: 1
    • A.SCA: 1
  • OE:
    • OE.HI_VAD: 1
  • OT:
    • OT.CCLI_END: 1
    • OT.PATCH_END: 1
    • OT.PATCH_SEC: 1
  • T:
    • T.MOD_SOFT: 1
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
  • MD:
    • MD5:
      • MD5: 1
  • RIPEMD:
    • RIPEMD-160: 1
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-256: 2
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 3
pdf_data/st_keywords/crypto_library
  • AtmelToolbox:
    • Atmel Toolbox 00.03.11.05: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 4
  • SCA:
    • DPA: 1
    • SPA: 1
    • timing attacks: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 1
  • FIPS:
    • FIPS 180-1: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
  • FIPS:
    • FIPS 140-2: 4
    • FIPS PUB 140-2: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816-: 2
  • SCP:
    • SCP01: 1
    • SCP02: 1
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 1
  • JavaCard:
    • Java Card 2.2.2: 1
pdf_data/st_keywords/javacard_api_const
  • ALG:
    • RSA:
      • ALG_RSA_NOPAD: 1
      • ALG_RSA_PCKS1: 1
      • ALG_RSA_SHA_ISO9796: 1
      • ALG_RSA_SHA_PKCS1: 1
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential document stored in the MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data: 1
  • OutOfScope:
    • a manner that any subsequent change of the data is detectable The SafeNet eToken Java applet is out of scope of the TOE. This Java Card applet is used to provide cryptographic and secure storage services to: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate: D:20091111180533+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 7.0
  • /ModDate: D:20091111180925+09'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Title: 1
  • pdf_file_size_bytes: 528113
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 67
  • /CreationDate: D:20110721111406
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20110721111406
  • /Producer: Microsoft® Office Word 2007
  • pdf_file_size_bytes: 860365
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different