| name |
bizhub 350 / bizhub 250 / bizhub 200 / bizhub 362 / bizhub 282 / bizhub 222 / ineo 362 / ineo 282 / ineo 222 / VarioLink 3621 / VarioLink 2821 / VarioLink 2221 Control Software Version:A11U-0100-G10-06 |
IDentity Applet v3.4-p2/eIDAS on NXP JCOP 4 P71 |
| category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
JP |
IT |
| status |
archived |
active |
| not_valid_after |
28.08.2014 |
17.02.2028 |
| not_valid_before |
21.08.2009 |
17.02.2023 |
| cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_FP_idapplet34p2_eidas_v1.0_en.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0233_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_idapplet34p2_eidas_v1.0_en.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0233_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_idapplet34p2_eidas_v1.06.pdf |
| manufacturer |
Konica Minolta Business Technologies, Inc |
ID&Trust Ltd. |
| manufacturer_web |
https://www.konicaminolta.com/ |
https://www.idandtrust.com/ |
| security_level |
EAL3 |
EAL4+, ATE_DPT.2, AVA_VAN.5, ALC_DVS.2 |
| dgst |
0284926c3c58f5e1 |
f4860d3dac1ba5ba |
| heuristics/cert_id |
JISEC-CC-CRP-C0233 |
OCSI/CERT/CCL/11/2022/RC |
| heuristics/cert_lab |
[] |
[] |
| heuristics/cpe_matches |
cpe:2.3:h:konicaminolta:bizhub_200:-:*:*:*:*:*:*:* |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, ADV_FSP.3, ALC_LCD.1, AVA_VLA.1, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ASE_TSS.1, ADV_ARC.1 |
ADV_TDS.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ADV_COMP.1, ASE_REQ.2, ASE_COMP.1, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ALC_FLR.1, ADV_IMP.1, ALC_LCD.1, ALC_DVS.2, ATE_DPT.2, ASE_SPD.1, ALC_COMP.1, ATE_COV.2, ASE_TSS.2, ATE_COMP.1, ALC_TAT.1, AVA_COMP.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ADV_FSP.4, ADV_SPM.1, ADV_ARC.1 |
| heuristics/extracted_versions |
200, 350, 2821, 0100, 282, 222, 250, 362, 3621, 2221, 06 |
3.4 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
OCSI/CERT/SYS/08/2016/RC, NSCIB-CC-180212-CR5 |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1136-2021, NSCIB-CC-180212-CR5, BSI-DSZ-CC-1136-V3-2022, BSI-DSZ-CC-1136-V2-2022, OCSI/CERT/SYS/08/2016/RC |
| heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0233
- certification_date: 01.08.2009
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0233_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of MFP, including the operation control processing and the image data management triggered by the panel of the main body of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFD” or through the network and supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, TOE can prevent the unauthorized access to the image data written in HDD for the danger of taking HDD that is the medium that stores the image data in MFP out illegally by using the protection function to overwrite at once the data that became unnecessary, the HDD lock function loaded on the HDD or the encryption function by the encryption board which is the optional part of MFP. Besides, TOE has a deletion method compliant with various overwrite deletion standards and it deletes all the data of HDD completely. TOE security functionality TOE provides the following security functions. - Administrator function - Service mode function - Secure Print Function - Remaining information overwrite deletion function - All area overwrite deletion function - Encryption key generation function - HDD Verification Function - Authentication Failure Frequency Reset function - Encryption Board Operation Support Function - HDD lock Operation Support Function
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: Japanese : bizhub 350 / bizhub 250 / bizhub 200 / bizhub 362 / bizhub 282 / bizhub 222 / ineo 362 / ineo 282 / ineo 222 / VarioLink 3621 / VarioLink 2821 / VarioLink 2221 Zentai Seigyo Software English : bizhub 350 / bizhub 250 / bizhub 200 / bizhub 362 / bizhub 282 / bizhub 222 / ineo 362 / ineo 282 / ineo 222 / VarioLink 3621 / VarioLink 2821 / VarioLink 2221 Control Software
- product_type: Control Software for digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0233_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0233_est.pdf
- toe_version: A11U-0100-G10-06
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.08.2014
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub 350 / bizhub 250 / bizhub 200 / bizhub 362 / bizhub 282 / bizhub 222 / ineo 362 / ineo 282 / ineo 222 / VarioLink 3621 / VarioLink 2821 / VarioLink 2221 Zentai Seigyo Software A11U-0100-G10-06
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0233_it9245.html
- toe_overseas_name: bizhub 350 / bizhub 250 / bizhub 200 / bizhub 362 / bizhub 282 / bizhub 222 / ineo 362 / ineo 282 / ineo 222 / VarioLink 3621 / VarioLink 2821 / VarioLink 2221 Control Software A11U-0100-G10-06
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1136-V3-2022 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1136-V3-2022 |
| heuristics/protection_profiles |
{} |
64065d44659bf9ef, 002505d0c2b4718a, b380aabf93b29692, d918b28fd7bb5d79, a33327d40f253f46 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0086b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0087b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf |
| pdf_data/cert_filename |
|
cr_FP_idapplet34p2_eidas_v1.0_en.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
- /Author: t.inzerilli
- /CreationDate: D:20230221182151+01'00'
- /ModDate: D:20230221182151+01'00'
- /Producer: Microsoft: Print To PDF
- /Title: Certification Report "IDentity Applet v3.4/eIDAS on NXP JCOP 4 P71".pdf
- pdf_file_size_bytes: 132541
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
| pdf_data/report_filename |
c0233_erpt.pdf |
cr_idapplet34p2_eidas_v1.0_en.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0233-01: 1
- Certification No. C0233: 1
|
- DE:
- IT:
- OCSI/CERT/CCL/11/2022/RC: 34
- OCSI/CERT/SYS/08/2016/RC: 1
- NL:
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-2012: 3
- BSI-CC-PP-0059-2009-MA-01: 3
- BSI-CC-PP-0068-V2-2011-MA-01: 3
- BSI-CC-PP-0086: 3
- BSI-CC-PP-0087: 5
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL2: 4
- EAL4: 11
- EAL4 augmented: 1
- EAL4+: 1
- EAL6: 2
- EAL6 augmented: 2
- EAL6+: 1
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_COMP.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_COMP.1: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 1
- ALC_FLR.1: 2
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_COMP.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 2
- ATE:
- ATE_COMP: 1
- ATE_COMP.1: 1
- ATE_COV.2: 1
- ATE_DPT.2: 7
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_COMP: 1
- AVA_COMP.1: 1
- AVA_VAN.5: 7
|
| pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FCS:
- FIA:
- FMT:
- FMT_LIM: 1
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FPT:
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVICE: 1
- A.SETTING: 1
- T:
- T.ACCESS-BOX: 2
- T.ACCESS-SECURE-PRINT: 2
- T.ACCESS-SETTING: 2
- T.BRING-OUT-STORAGE: 3
- T.DISCARD-MFP: 2
- T.UNEXPECTED-TRANSMISSION: 2
|
|
| pdf_data/report_keywords/vendor |
|
- Gemalto:
- NXP:
- NXP: 21
- NXP Semiconductors: 4
|
| pdf_data/report_keywords/eval_facility |
|
- CCLab:
- CCLab Software Laboratory: 5
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI TR-03105: 1
- BSI TR-03110: 4
- BSI TR-03110-2: 1
- BSI TR-03110-3: 1
- BSI TR-03117: 1
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ICAO:
- ISO:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- of MFP or through the network. TOE supports the protection function from exposure of the highly confidential documents stored in the MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data: 1
|
|
| pdf_data/report_metadata |
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20091109163223+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /Manager: IPA
- /ModDate: D:20091109163252+09'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /SourceModified: D:20091109073126
- /Title: CRP-e
- pdf_file_size_bytes: 475366
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 31
|
- /Author: OCSI
- /CreationDate: D:20230217155106+01'00'
- /Creator: Microsoft® Word per Microsoft 365
- /ModDate: D:20230217155106+01'00'
- /Producer: Microsoft® Word per Microsoft 365
- /Title: Certification Report "IDentity Applet v3.4/eIDAS on NXP JCOP 4 P71"
- pdf_file_size_bytes: 669524
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
| pdf_data/st_filename |
c0233_est.pdf |
st_idapplet34p2_eidas_v1.06.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1136-V3-2022: 2
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0056-: 2
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0068-: 1
- BSI-CC-PP-0068-V2-2011-MA-: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-CC-PP-0084-2014: 1
- BSI-CC-PP-0086: 1
- BSI-CC-PP-0086-2015: 1
- BSI-CC-PP-0087: 3
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 2
- EAL 6: 2
- EAL 6+: 1
- EAL4: 18
- EAL4 augmented: 8
- EAL4+: 1
- EAL6+: 1
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 5
- ADV_FSP.4: 2
- ADV_IMP.1: 2
- ADV_SPM.1: 1
- ADV_TDS.3: 4
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 4
- ALC:
- ALC_DEL.1: 2
- ALC_DVS.2: 11
- ALC_FLR.1: 3
- ASE:
- ATE:
- ATE_DPT.1: 1
- ATE_DPT.2: 12
- ATE_FUN.1: 2
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM.1: 5
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 2
- FCS_COP.1: 3
- FDP:
- FDP_ACC.1: 30
- FDP_ACC.1.1: 3
- FDP_ACF.1: 23
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 3
- FDP_IFC.1: 2
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 29
- FIA_AFL.1.1: 4
- FIA_AFL.1.2: 4
- FIA_ATD.1: 12
- FIA_ATD.1.1: 1
- FIA_CAP.1: 1
- FIA_EID: 1
- FIA_EID.1: 11
- FIA_EID.1.1: 2
- FIA_EID.1.2: 2
- FIA_SOS.1: 26
- FIA_SOS.1.1: 4
- FIA_UAU.1: 13
- FIA_UAU.2: 28
- FIA_UAU.2.1: 4
- FIA_UAU.6: 10
- FIA_UAU.6.1: 1
- FIA_UAU.7: 15
- FIA_UAU.7.1: 1
- FIA_UID.1: 20
- FIA_UID.2: 22
- FIA_UID.2.1: 4
- FIA_USB.1: 10
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 4
- FMT_MOF.1.1: 1
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.3: 15
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 31
- FMT_MTD.1.1: 5
- FMT_SMF.1: 40
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 50
- FMT_SMR.1.1: 4
- FMT_SMR.1.2: 4
- FPT:
- FPT_RVM.1: 1
- FPT_SEP.1: 1
|
- FAU:
- FAU_ARP.1: 2
- FAU_SAS: 18
- FAU_SAS.1: 4
- FCO:
- FCS:
- FCS_CKM: 148
- FCS_CKM.1: 25
- FCS_CKM.1.1: 5
- FCS_CKM.2: 10
- FCS_CKM.4: 24
- FCS_COP: 124
- FCS_COP.1: 42
- FCS_COP.1.1: 25
- FCS_RND: 21
- FCS_RND.1: 3
- FCS_RNG.1: 5
- FDP:
- FDP_ACC: 56
- FDP_ACC.1: 16
- FDP_ACC.2: 4
- FDP_ACF: 66
- FDP_ACF.1: 50
- FDP_IFC.1: 4
- FDP_IFC.2: 3
- FDP_IFF.1: 5
- FDP_ITC.1: 13
- FDP_ITC.2: 15
- FDP_RIP: 32
- FDP_RIP.1: 13
- FDP_ROL.1: 2
- FDP_SDI: 16
- FDP_SDI.1: 2
- FDP_SDI.2: 9
- FDP_UCT: 20
- FDP_UCT.1: 1
- FDP_UIT: 20
- FDP_UIT.1: 3
- FIA:
- FIA_AFL: 54
- FIA_AFL.1: 12
- FIA_API: 63
- FIA_API.1: 8
- FIA_ATD.1: 2
- FIA_UAU: 158
- FIA_UAU.1: 15
- FIA_UAU.4: 4
- FIA_UAU.5: 11
- FIA_UAU.6: 3
- FIA_UID: 54
- FIA_UID.1: 19
- FIA_UID.2: 1
- FIA_USB.1: 2
- FMT:
- FMT_LIM: 63
- FMT_LIM.1: 7
- FMT_LIM.2: 7
- FMT_MOF: 9
- FMT_MOF.1: 1
- FMT_MSA: 50
- FMT_MSA.1: 15
- FMT_MSA.2: 2
- FMT_MSA.3: 17
- FMT_MTD: 256
- FMT_MTD.1: 24
- FMT_MTD.3: 3
- FMT_SMF: 51
- FMT_SMF.1: 36
- FMT_SMR: 39
- FMT_SMR.1: 50
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPT:
- FPT_EMS: 39
- FPT_EMS.1: 13
- FPT_FLS: 25
- FPT_FLS.1: 8
- FPT_ITC: 2
- FPT_PHP: 36
- FPT_PHP.1: 2
- FPT_PHP.3: 3
- FPT_RCV.3: 1
- FPT_TDC.1: 1
- FPT_TST: 33
- FPT_TST.1: 5
- FTP:
- FTP_ITC: 34
- FTP_ITC.1: 13
- FTP_TRP.1: 2
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.NETWORK: 3
- A.SECRET: 2
- A.SERVICE: 2
- A.SETTING: 3
- O:
- O.BOX: 7
- O.CHECK-HDD: 6
- O.CONFIG: 9
- O.CRYPT-KEY: 3
- O.CRYPTO-CAPABILITY: 4
- O.CRYPTO-KEY: 1
- O.LOCK-HDD-CAPABILITY: 6
- O.OVERWRITE-ALL: 4
- O.OVERWRITE-FILE: 6
- O.SECURE-PRINT: 5
- OE:
- OE.ADMIN: 3
- OE.CRYPTO: 3
- OE.FEED-BACK: 7
- OE.LOCK-HDD: 3
- OE.NETWORK: 3
- OE.SECRET: 3
- OE.SERVICE: 3
- OE.SESSION: 5
- OE.SETTING-SECURITY: 3
- T:
- T.ACCESS-BOX: 4
- T.ACCESS-SECURE-PRINT: 2
- T.ACCESS-SETTING: 2
- T.BRING-OUT-: 1
- T.BRING-OUT-STORAGE: 2
- T.DISCARD-MFP: 3
- T.UNEXPECTED-TRANSMISSION: 3
|
- A:
- OE:
- OE.APPLET: 1
- OE.CODE-EVIDENCE: 1
- OE.HID_VAD: 2
- OE.KEY-CHANGE: 1
- OE.PROCESS_SEC_IC: 1
- OE.SECURITY-: 1
- OE.USE_DIAG: 1
- OE.USE_KEYS: 1
- OE.VERIFICATION: 1
- OE.VERIFICATION-: 1
- OSP:
- OSP.KEY-CHANGE: 1
- OSP.PROCESS-TOE: 1
- OSP.SECURE-BOX: 1
- OSP.SECURITY-DOMAINS: 1
- OSP.VERIFICATION: 1
- OT:
- OT.ALARM: 1
- OT.APPLI-AUTH: 1
- OT.ATTACK-COUNTER: 1
- OT.CARD-CONFIGURATION: 1
- OT.CARD-MANAGEMENT: 1
- OT.CIPHER: 1
- OT.COMM_AUTH: 2
- OT.COMM_CONFIDENTIALITY: 1
- OT.COMM_INTEGRITY: 1
- OT.DOMAIN-RIGHTS: 1
- OT.EXT-MEM: 1
- OT.FIREWALL: 1
- OT.GLOBAL_ARRAYS_CONFID: 1
- OT.IDENTIFICATION: 1
- OT.KEY-MNGT: 1
- OT.NATIVE: 1
- OT.OBJ-DELETION: 1
- OT.OPERATE: 1
- OT.PIN-MNGT: 1
- OT.REALLOCATION: 1
- OT.RESOURCES: 1
- OT.RESTRICTED-MODE: 1
- OT.RND: 1
- OT.RNG: 1
- OT.SCP: 3
- OT.SEC_BOX_FW: 1
- OT.SENSITIVE_RESULT_INTEG: 1
- OT.SID: 1
- OT.SID_MODULE: 1
- OT.TRANSACTION: 1
|
| pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG: 1
- NXP:
- NXP: 7
- NXP Semiconductors: 3
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 8
- TDES: 3
- Triple-DES: 8
- TripleDES: 5
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- RSA:
- RSA 2048: 1
- RSA-CRT: 3
- RSA-PSS: 1
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 3
- SHA-256: 7
- SHA-384: 2
- SHA-512: 2
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 1
- malfunction: 1
- physical tampering: 3
- SCA:
- DPA: 1
- SPA: 1
- timing attacks: 1
|
| pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI 586: 1
- BSI TR-03110: 5
- BSI TR-03117: 1
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.ChipSecurity: 1
- EF.DG14: 1
- EF.DG15: 1
- EF.SOD: 1
|
| pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- FIPS:
|
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 18013: 2
- PKCS:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
- ConfidentialDocument:
- main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential document stored in the MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data: 1
|
- OutOfScope:
- 741 • OT.SEC_BOX_FW 742 • OT.SENSITIVE_RESULT_INTEG 743 cannot be mapped because these are out of scope. 744 The objectives for the operational environment can be mapped as follows: 745 Objective from: 1
- none common user data EAC2 protected data EAC2 protected data Other terminals than the above are out of scope of this ST. In particular, terminals using Basic 250 Access Control (BAC) may be functionally: 1
- out of scope: 2
|
| pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20091111180533+09'00'
- /Creator: Word 用 Acrobat PDFMaker 7.0
- /ModDate: D:20091111180925+09'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Title: 1
- pdf_file_size_bytes: 528113
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 67
|
- /Author: David Lovasz
- /CreationDate: D:20230202101616+01'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20230202101616+01'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Title: IDENTITY APPLET V3.4/EIDAS - SECURITY TARGET
- pdf_file_size_bytes: 4679764
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 191
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
True |
| state/cert/download_ok |
False |
True |
| state/cert/extract_ok |
False |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |