name |
bizhub C250P / ineo+ 250P / magicolor 7460CK Control Software 4038-0100-GM0-11-000 |
Digital Tachograph DTCO 1381, Release 4.0e |
category |
Other Devices and Systems |
Other Devices and Systems |
scheme |
JP |
DE |
status |
archived |
active |
not_valid_after |
07.10.2013 |
14.12.2025 |
not_valid_before |
27.06.2007 |
14.12.2020 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1158c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0105_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1158a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0105_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1158b_pdf.pdf |
manufacturer |
Konica Minolta Business Technologies, Inc |
Continental Automotive GmbH |
manufacturer_web |
https://www.konicaminolta.com/ |
https://www.continental-corporation.com |
security_level |
EAL3 |
EAL4+, ATE_DPT.2, AVA_VAN.5 |
dgst |
035ea4808ab3d6fd |
0490e7a083af0bd6 |
heuristics/cert_id |
JISEC-CC-CRP-C0105-01 |
BSI-DSZ-CC-1158-2020 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
AGD_PRE.1, ALC_DVS.1, ALC_TAT.1, ATE_DPT.2, ALC_CMS.4, ATE_FUN.1, AVA_VAN.5, ALC_DEL.1, ADV_FSP.4, ALC_LCD.1, ADV_ARC.1, ADV_TDS.3, AGD_OPE.1, ALC_CMC.4, ADV_IMP.1 |
heuristics/extracted_versions |
11, 000, 4038, 0100 |
4.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1158-V2-2023 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0827-V8-2020, BSI-DSZ-CC-1069-2018 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1158-V2-2023, BSI-DSZ-CC-1158-V3-2025 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0632-2011, BSI-DSZ-CC-0269-2006, BSI-DSZ-CC-0827-V8-2020, BSI-DSZ-CC-0559-2012, BSI-DSZ-CC-0791-2012, BSI-DSZ-CC-0827-2013, BSI-DSZ-CC-0376-2006, BSI-DSZ-CC-0827-V4-2016, BSI-DSZ-CC-1015-2017, BSI-DSZ-CC-0936-2015, BSI-DSZ-CC-0878-2013, BSI-DSZ-CC-1069-2018, BSI-DSZ-CC-0827-V2-2014, BSI-DSZ-CC-0827-V5-2017, BSI-DSZ-CC-0827-V7-2018, BSI-DSZ-CC-0827-V3-2015, BSI-DSZ-CC-0395-2007, BSI-DSZ-CC-0827-V6-2017 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0105
- certification_date: 01.06.2007
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.3
- cert_link: https://www.ipa.go.jp/en/security/c0105_eimg.pdf
- description: PRODUCT DESCRIPTION This product is the embedded software that is installed on the Konica Minolta Business Technologies, Inc. network printer ( bizhub C250P / ineo+ 250P / magicolor 7460CK )( Hereinafter referred to as “ printer ” ) . This software is on the flash memory on the printer controller carried in printer, and this controls the whole operation of printer such as the operation control processing and the image data management received from the panel of printer body or the network. This product offers the protection from exposure of the highly confidential document stored in the printer, and aims at protecting the data which may be exposed against a user's intention. In order to realize it, this offers the functions such as the function that limits the operation to the specific document only to the authorized user, the function that performs the overwrite deletion of the data domain which became unnecessary and the function that deletes the confidential information including a setting value. Moreover , this has the mechanism using the unauthorized access protection function (HDD Lock Function) with which HDD is equipped against the risk of taking out HDD (option part) unjustly which is a medium for storing image data in printer. If the encryption board, an option product, is installed in the printer controller, this provides the function of generating the encryption key that encrypts all data including image data written to the HDD.
- evaluation_facility: Mizuho Information & Research Institute, Inc.Center for Evaluation of Information Security
- product: bizhub C250P / ineo+ 250P / magicolor 7460CK Control Software
- product_type: IT Product (data protection function in printer systems)
- report_link: https://www.ipa.go.jp/en/security/c0105_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0105_est.pdf
- toe_version: 4038-0100-GM0-11-000
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.10.2013
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub C250P / ineo+ 250P / magicolor 7460CK Control Software 4038-0100-GM0-11-000
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0105_it6081.html
- toe_overseas_name: bizhub C250P / ineo+ 250P / magicolor 7460CK Control Software 4038-0100-GM0-11-000
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
40651f75a5887085 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0094b_pdf.pdf |
pdf_data/cert_filename |
|
1158c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20201222074117+01'00'
- /Creator: Writer
- /Keywords: Common Criteria, Certification, Zertifizierung, Digital Tachograph DTCO 1381, Release 4.0e, Continental Automotive GmbH
- /ModDate: D:20201222111856+01'00'
- /Producer: LibreOffice 6.3
- /Subject: Common Criteria Certification
- /Title: Certificate BSI-DSZ-CC-1158-2020
- pdf_file_size_bytes: 260402
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0105_erpt.pdf |
1158a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ATE_DPT.2 and AVA_VAN.5
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1158-2020
- cert_item: Digital Tachograph DTCO 1381, Release 4.0e
- cert_lab: BSI
- developer: Continental Automotive GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Digital Tachograph - Vehicle Unit (VU PP) Version 1.0, 9 May 2017, BSI-CC-PP-0094-2017
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0105-01: 1
- Certification No. C105: 1
|
- DE:
- BSI-DSZ-CC-0827-V8-2020: 1
- BSI-DSZ-CC-1069-2018: 3
- BSI-DSZ-CC-1158-2020: 14
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 5
- EAL 4 augmented: 3
- EAL 5: 4
- EAL 5+: 1
- EAL 6: 1
- EAL4: 1
- EAL4+: 1
|
pdf_data/report_keywords/cc_sar |
|
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR: 3
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVICE: 1
- A.SETTING: 1
- T:
- T.ACCESS: 1
- T.ACCESS-BOX: 1
- T.ACCESS-NET: 1
- T.ACCESS-SECURE-PRINT: 1
- T.BACKUP: 1
- T.BRING-OUT: 1
- T.DISCARD-PRINTER: 1
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon Technologies: 1
- Infineon Technologies AG: 1
|
pdf_data/report_keywords/eval_facility |
|
- DeutscheTelekom:
- Deutsche Telekom Security: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- FIPS:
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 2
|
- BSI:
- AIS 20: 1
- AIS 25: 2
- AIS 26: 2
- AIS 32: 1
- AIS 34: 2
- AIS 36: 3
- AIS 37: 2
- AIS 38: 1
- AIS 40: 2
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- panel of Printer body or the network. This TOE offers the protection from exposure of the highly confidential document stored in the Printer, and aims at protecting the data which may be exposed against a user’s: 1
|
- ConfidentialDocument:
- 1.0, 2020-12-01, Digital Tachograph, DTCO 1381, Release 4.0e, Deutsche Telekom Security GmbH, (confidential document) [8] Protection Profile for Digital Tachograph - Vehicle Unit (VU PP) Version 1.0, 9 May 2017: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- zu DTCO 1381 Release 4.0e (Excelsheet), Version 1.20, 23.11.2020, Continental Automotive GmbH (confidential document) [12] Digitaler Tachograph – DTCO® 4.0 / 4.0e Leitfaden für die Kontrollorgane, BA00.1381.40 202: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20070906134841+09'00'
- /ModDate: D:20070906134841+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 332971
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 33
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20210112100622+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, "
- /ModDate: D:20210112130147+01'00'
- /Producer: LibreOffice 6.3
- /Subject: Common Criteria, BSI-DSZ-CC-1158-2020
- /Title: Single Evaluation Report CC
- pdf_file_size_bytes: 623290
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
pdf_data/st_filename |
c0105_est.pdf |
1158b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 3
- EAL 4 augmented: 1
- EAL4: 11
- EAL4 augmented: 3
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 2
- ACM_SCP.1: 2
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.2: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU.1: 2
- AVA_SOF.1: 2
- AVA_VLA.1: 2
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ATE:
- ATE_DPT.1: 1
- ATE_DPT.2: 7
- ATE_FUN.1: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM: 4
- FCS_CKM.1: 8
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_COP: 2
- FCS_COP.1: 6
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC: 6
- FDP_ACC.1: 34
- FDP_ACC.1.1: 3
- FDP_ACF: 3
- FDP_ACF.1: 42
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 3
- FDP_ITC.1: 2
- FDP_RIP.1: 1
- FIA:
- FIA_AFL.1: 62
- FIA_AFL.1.1: 7
- FIA_AFL.1.2: 7
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_NEW.1: 12
- FIA_NEW.1.1: 1
- FIA_NEW.1.2: 1
- FIA_SOS: 1
- FIA_SOS.1: 47
- FIA_SOS.1.1: 5
- FIA_SOS.2: 10
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_UAU: 9
- FIA_UAU.1: 13
- FIA_UAU.2: 64
- FIA_UAU.2.1: 5
- FIA_UAU.6: 10
- FIA_UAU.6.1: 1
- FIA_UAU.7: 15
- FIA_UAU.7.1: 2
- FIA_UID: 11
- FIA_UID.1: 13
- FIA_UID.2: 34
- FIA_UID.2.1: 4
- FIA_USB.1: 8
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_CKM.1: 1
- FMT_MOF.1: 69
- FMT_MOF.1.1: 3
- FMT_MSA: 9
- FMT_MSA.2: 2
- FMT_MSA.3: 12
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 2
- FMT_MTD.1: 81
- FMT_MTD.1.1: 6
- FMT_SMF: 18
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR.1: 51
- FMT_SMR.1.1: 3
- FMT_SMR.1.2: 3
- FPT:
- FPT_RVM.1: 17
- FPT_RVM.1.1: 1
- FPT_SEP.1: 13
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
|
- FAU:
- FAU_GEN: 6
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 2
- FAU_SAR.1: 5
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG: 3
- FAU_STG.1: 9
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 5
- FAU_STG.4.1: 1
- FCO:
- FCO_NRO.1: 7
- FCO_NRO.1.1: 1
- FCO_NRO.1.2: 1
- FCO_NRO.1.3: 1
- FCS:
- FCS_CKM: 7
- FCS_CKM.1: 46
- FCS_CKM.1.1: 2
- FCS_CKM.2: 18
- FCS_CKM.2.1: 2
- FCS_CKM.3: 2
- FCS_CKM.4: 27
- FCS_CKM.4.1: 2
- FCS_COP: 5
- FCS_COP.1: 35
- FCS_COP.1.1: 7
- FCS_RNG: 8
- FCS_RNG.1: 28
- FCS_RNG.1.1: 8
- FCS_RNG.1.2: 8
- FDP:
- FDP_ACC: 11
- FDP_ACC.1: 76
- FDP_ACC.1.1: 6
- FDP_ACF: 11
- FDP_ACF.1: 58
- FDP_ACF.1.1: 12
- FDP_ACF.1.2: 7
- FDP_ACF.1.3: 7
- FDP_ACF.1.4: 6
- FDP_ETC: 2
- FDP_ETC.2: 10
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC: 1
- FDP_IFC.1: 8
- FDP_ITC: 7
- FDP_ITC.1: 25
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 35
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 2
- FDP_ITT: 1
- FDP_ITT.1: 2
- FDP_ITT.1.1: 1
- FDP_MSA.3: 2
- FDP_RIP: 2
- FDP_RIP.1: 9
- FDP_RIP.1.1: 1
- FDP_SDI: 3
- FDP_SDI.2: 12
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 27
- FIA_AFL.1.1: 6
- FIA_AFL.1.2: 7
- FIA_ATD: 2
- FIA_ATD.1: 17
- FIA_ATD.1.1: 3
- FIA_SOS.2: 1
- FIA_UAU: 7
- FIA_UAU.1: 26
- FIA_UAU.1.1: 3
- FIA_UAU.1.2: 3
- FIA_UAU.2: 12
- FIA_UAU.2.1: 2
- FIA_UAU.3: 8
- FIA_UAU.3.1: 1
- FIA_UAU.3.2: 1
- FIA_UAU.5: 8
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 8
- FIA_UAU.6.1: 1
- FIA_UID: 4
- FIA_UID.1: 14
- FIA_UID.2: 15
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF: 2
- FMT_MOF.1: 25
- FMT_MOF.1.1: 5
- FMT_MSA: 9
- FMT_MSA.1: 17
- FMT_MSA.1.1: 1
- FMT_MSA.2: 1
- FMT_MSA.3: 51
- FMT_MSA.3.1: 6
- FMT_MSA.3.2: 6
- FMT_MTD: 1
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_SMF: 9
- FMT_SMF.1: 19
- FMT_SMF.1.1: 1
- FMT_SMR: 14
- FMT_SMR.1: 33
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS: 2
- FPT_FLS.1: 4
- FPT_FLS.1.1: 1
- FPT_ITC.1: 3
- FPT_PHP: 3
- FPT_PHP.1: 1
- FPT_PHP.2: 5
- FPT_PHP.2.1: 1
- FPT_PHP.2.2: 1
- FPT_PHP.2.3: 2
- FPT_PHP.3: 5
- FPT_PHP.3.1: 1
- FPT_STM: 3
- FPT_STM.1: 10
- FPT_STM.1.1: 1
- FPT_TDC: 2
- FPT_TDC.1: 21
- FPT_TDC.1.1: 2
- FPT_TDC.1.2: 2
- FPT_TST: 2
- FPT_TST.1: 6
- FPT_TST.1.1: 2
- FPT_TST.1.2: 1
- FPT_TST.1.3: 2
- FTP:
- FTP_ITC: 3
- FTP_ITC.1: 17
- FTP_ITC.1.1: 4
- FTP_ITC.1.2: 4
- FTP_ITC.1.3: 4
- FTP_TRP.1: 3
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.NETWORK: 1
- A.SETTING: 1
- O:
- O.BOX: 5
- O.CHECK-HDD: 2
- O.CONFIG: 9
- O.CRYPT-KEY: 3
- O.OVERWRITE-ALL: 2
- O.SECURE-PRINT: 3
- OE:
- OE.CRYPT: 4
- OE.FEED-BACK: 8
- OE.LOCK-HDD: 1
- T:
- T.ACCESS-BOX: 1
- T.ACCESS-NET-SETTING: 1
- T.BACKUP-RESTORE: 1
- T.DISCARD-PRINTER: 1
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-256: 9
- SHA-384: 10
- SHA-512: 10
- SHA256: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 3
- brainpoolP384r1: 1
- brainpoolP512r1: 1
- NIST:
- NIST P-256: 5
- NIST P-384: 5
- NIST P-521: 5
- P-256: 5
- P-384: 5
- P-521: 5
- secp256r1: 1
- secp384r1: 1
- secp521r1: 1
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Physical tampering: 1
- malfunction: 1
- physical tampering: 7
- SCA:
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- FIPS:
- FIPS 180-1: 2
- FIPS PUB 197: 2
|
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 1
- FIPS:
- FIPS PUB 197: 1
- FIPS PUB 46-3: 2
- ISO:
- NIST:
- RFC:
- RFC 5480: 1
- RFC 5639: 1
- RFC 5869: 1
- RFC3447: 5
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- ConfidentialDocument:
- functions that are realized by the TOE. TOE offers the protection from exposure of the highly confidential document stored in the printer. Moreover, TOE can encrypt the image data written in HDD for the danger of: 1
|
- OutOfScope:
- 10-3 RSA Generated by ERCA; inserted in VU by manufacturer at the end of the manufacturing phase Out of scope for this ST Not applicable VU non-volatile memory Card.PK (conditional, possibly multiple) Card: 1
- 10-6) ECC Generated by MSCA ; obtained by VU in MSCA-_Card certificate during mutual authentication Out of scope for this ST Not applicable VU non-volatile memory (conditional, possibly multiple) VUEGF.PK Public: 1
- 10-6. ECC Generated by ERCA; inserted in VU by manufacturer at the end of the manufacturing phase Out of scope for this ST Not applicable VU non-volatile memory EUR.PK (previous) The previous public key of ERCA: 1
- 10-6. ECC Generated by MSCA ; obtained by VU in MSCA_VU-EGF certificate during coupling to an EGF Out of scope for this ST Not applicable VU non-volatile memory (conditional, possibly multiple) Table 10-4: 1
- C as part of the EUR.Link.C; obtained by VU du-ring mutual authentication towards such card or EGF Out of scope for this ST Not applicable VU general nonvo- latile memory (con- ditional; only if the VU has: 1
- MACs for the data integrity control of user data records AES Generated by the VU manufacturer Out of scope of this ST Made unavailable when the VU has reached end of life VU non-volatile memory Table 10-5: 1
- Out of scope: 18
- by card or card manufac-turer; obtained by VU in card certi-ficate during mu- tual authentication Out of scope for this ST Not applicable VU non-volatile memory (conditional, possibly multiple) DTCO 1381: 1
- by card or card manufacturer; obtained by VU in card certificate during mutual authentication Out of scope for this ST Not applicable VU non-volatile memory MS.PK (conditional, possibly multiple) Public key: 1
- for upgrade file To ensure confidentiality of the upgrade file AES Generated by the VU manufacturer Out of scope of this ST Made unavailable when the VU has reached end of life Not permanently stored CBC-MAC: 1
- foreign) MSCA; obtained by VU in MS certificate presented by a card during mutual authentication Out of scope for this ST Not applicable VU non-volatile memory Table 10-1 First-generation asymmetric keys: 1
- issued under the previous ECC Generated by ERCA; inserted in VU by manufacturer at the end Out of scope for this ST Not applicable VU non-volatile memory (conditional; only present if existing at DTCO: 1
- key generations). However, a VU will retrieve only one of these keys during the pairing process. Out of scope for this ST Made unavailable at the latest by end of calibration phase Not permanently stored; only: 1
- obtained by VU in EGF certificate during mutual authentication as part of the coupling process Out of scope for this ST Not applicable VU non-volatile memory (conditional, possibly multiple) MSCA _Card.PK: 1
- of the underlying elliptic curve and the CBC- MAC key itself AES Generated by the VU manufacturer Out of scope of this ST Made unavailable when the VU has reached end of life VU non-volatile memory Kvu: 1
- received from VU manufacturer; inserted by VU manufacturer at the end of the manufacturing phase Out of scope for this ST Made unavailable when the VU has reached end of life VU non-volatile memory 37 Note: 1
- received from VU manufacturer; inserted by VU manufacturer at the end of the manufacturing phase Out of scope for this ST Made unavailable when the VU has reached end of life VU non-volatile memory TK: 1
- the VU AES Generated by ERCA; inserted by VU manufacturer at the end of the manufacturing phase. Out of scope for this ST Made unavailable when the VU has reached end of life VU non-volatile Memory DTCO 1381: 1
- under Km) at the end of the manufac- turing phase; obtained and decrypted by VU during pairing Out of scope for this ST Made unavailable at the latest by end of calibration phase Not permanently stored; only: 1
|
pdf_data/st_metadata |
- /CreationDate: D:20070904141916+09'00'
- /Creator: クセロPDF v1.14 Rev0495
- /ModDate: D:20070904141916+09'00'
- /Producer: Xelo PDF Library
- pdf_file_size_bytes: 1754729
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 90
|
- /Author: Norbert Köhn
- /CreationDate: D:20201215121041+01'00'
- /Creator: Acrobat PDFMaker 20 for Word
- /Keywords: VU; Security Target; ST; DTCO; DTCO1381; Smart Tachograph; VDO
- /ModDate: D:20201215122510+01'00'
- /Producer: Adobe PDF Library 20.1.58
- /Subject: Security Target for smart tachograph vehicle unit (VU) in the sense of Annex IC of regulation 799/2019 (EU)
- /Title: Digital Tachograph DTCO 1381 Security Target
- pdf_file_size_bytes: 1558840
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 111
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |