name |
Data Security Kit AR-FR4, Data Security Kit AR-FR5 AR-FR4: version M.20 AR-FR5: version E.20 |
TCOS CSP Module Version 1.0 Release 1/P6022y |
category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
DE |
status |
archived |
archived |
not_valid_after |
07.01.2013 |
07.04.2025 |
not_valid_before |
17.09.2004 |
07.04.2020 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1118c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0018_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1118a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0018_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1118b_pdf.pdf |
manufacturer |
Sharp Corporation |
T-Systems International GMBH |
manufacturer_web |
https://sharp-world.com/ |
https://www.t-systems.de/ |
security_level |
EAL4 |
ALC_DVS.2, EAL4+, AVA_VAN.5 |
dgst |
03749c220b32bdce |
55b8d7537c8fdcc1 |
heuristics/cert_id |
JISEC-CC-CRP-C0018 |
BSI-DSZ-CC-1118-2020 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_RCR.1, AVA_VLA.2, ADV_HLD.2, AGD_USR.1, AVA_SOF.1, ADV_FSP.2, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, AGD_FSP.1, ATE_FUN.1, ATE_DPT.1, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 |
ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ALC_CMS.4, ATE_DPT.2, ATE_FUN.1, AVA_VAN.5, ADV_FSP.4, ALC_DEL.1, ALC_LCD.1, ADV_ARC.1, ALC_DVS.2, ADV_TDS.3, ADV_IMP.1, AGD_OPE.1, ALC_CMC.4, ASE_TSS.2, AGD_PRE.1 |
heuristics/extracted_versions |
20 |
1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1121-V2-2021 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1059-V2-2019 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1121-V2-2021 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1059-V2-2019, BSI-DSZ-CC-1059-2018, BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-0973-V2-2016 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0018
- certification_date: 01.09.2004
- claim: EAL4
- enhanced:
- assurance_level: EAL4
- cert_link: https://www.ipa.go.jp/en/security/c0018_eimg.pdf
- description: PRODUCT DESCRIPTION The TOE is a firmware intended to reduce the danger against the disclosure of document data and image data that are temporarily spooled in the Multi-Function Device (hereafter referred to as “MFD”). TOE is offered as an upgraded kit for firmware of the MFD. The TOE provides security function to counter the threat against document data and image data that are temporarily spooled in the Mass Storage Device ( hereafter referred to as MSD) which is defined for each configuration of the functional unit in M FD. When MFD executes basic function as copy, print, Fax or image scanning, MFD executes data encryption before spooling document image data in MSD. Moreover MFD erases image data in MSD automatically after finishing copy, print, Fax or image scanning jobs or at the time of power-on. As a result, MFD keeps high confidentiality of the document/ image data in MSD, and it opposes fraudulent disclosure.
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: Data Security Kit AR-FR4, Data Security Kit AR-FR5
- product_type: IT product (Data protection function inside digital MFD)
- protection_profile: N/A
- report_link: https://www.ipa.go.jp/en/security/c0018_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0018_est.pdf
- toe_version: AR-FR4: version M.20 AR-FR5: version E.20
- vendor: Sharp Corporation
- expiration_date: 01.03.2013
- revalidations: [frozendict({'date': '2005-03', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0018_it4026_01.html'})]
- supplier: Sharp Corporation
- toe_japan_name: Data Security Kit AR-FR4, Data Security Kit AR-FR5 AR-FR4: version M.20 AR-FR5: version E.20
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0018_it4026.html
- toe_overseas_name: Data Security Kit AR-FR4, Data Security Kit AR-FR5 AR-FR4: version M.21 AR-FR5: version E.21
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1059-2018 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1059-2018 |
heuristics/protection_profiles |
{} |
1153ad24c84b397a, ae9dcab62c3296a2 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0104b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0107b_pdf.pdf |
pdf_data/cert_filename |
|
1118c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
- TSystems:
- T-Systems International: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20200409141124+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, CSP, Crypto Service Provider, EAL4, T-Systems International, SMAERS, Coordinated PP"
- /ModDate: D:20200409141414+02'00'
- /Producer: LibreOffice 6.2
- /Subject: TCOS CSP Module Version 1.0 Release 1/P6022y
- /Title: Certificate BSI-DSZ-CC-1118-2020
- pdf_file_size_bytes: 889220
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0018_erpt.pdf |
1118a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant / extended EAL 4 augmented by ALC_DVS.2 and AVA_VAN.5 SOGIS Recognition Agreement
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1118-2020
- cert_item: TCOS CSP Module Version 1.0 Release 1/P6022y
- cert_lab: BSI
- developer: T-Systems International GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Cryptographic Service Provider (CSP) Version 0.9.8, 19 February 2019, BSI-CC-PP-0104-2019, Protection Profile Configuration Cryptographic Service Provider – Time Stamp Service and Audit (PPC-CSP-TS-Au) Version 0.9.5, 8 April 2019, BSI- CC-PP-0107-2019
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0018-01: 1
- Certification No. C0018: 1
|
- DE:
- BSI-DSZ-CC-1059-: 1
- BSI-DSZ-CC-1059-V2-2019: 1
- BSI-DSZ-CC-1078: 2
- BSI-DSZ-CC-1118-2020: 17
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0104-2019: 3
- BSI-CC-PP-0107-: 1
- BSI-CC-PP-0107-2019: 2
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 5
- EAL 4 augmented: 3
- EAL 5: 1
- EAL5+: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_FLR: 3
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.OFFICE: 1
- A.PROCEDURE: 1
- T:
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 4
- NXP Semiconductors: 1
|
pdf_data/report_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 3
- TSystems:
- T-Systems International: 13
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 12
- AES-: 4
- AES-128: 6
- AES-256: 4
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 1
- Key agreement: 1
- MAC:
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- fault injection: 1
- malfunction: 1
- SCA:
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 2
- CCIMB-99-033: 2
- ISO:
|
- BSI:
- AIS 1: 1
- AIS 28: 1
- AIS 34: 1
- AIS 36: 1
- AIS14: 1
- AIS19: 1
- AIS20: 1
- AIS25: 1
- AIS26: 1
- AIS31: 1
- AIS32: 1
- AIS34: 1
- AIS35: 1
- AIS36: 1
- AIS37: 1
- AIS38: 1
- AIS46: 1
- AIS47: 1
- FIPS:
- FIPS 180-4: 3
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- FIPS PUB 46-3: 1
- FIPS180: 2
- FIPS180-4: 1
- FIPS186: 9
- FIPS186-4: 2
- FIPS197: 9
- FIPS46: 1
- ICAO:
- ISO:
- ISO/IEC 10116:2017: 1
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- NIST:
- RFC:
- RFC 2104: 1
- RFC 5639: 9
- RFC 8017: 1
- RFC2104: 2
- RFC5639: 4
- RFC8017: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 0 Release 1/P6022y User guidance manual”, Version 1.0.4, 24.03.2020, T-Systems International GmbH (confidential document) [12] “TCOS CSP Module Personalization Guidance”, Version 1.4, 04.03.2020, T- Systems International: 1
- 2019 (confidential document) 7 See secton 9.1 for list of used AIS 28 / 31 BSI-DSZ-CC-1118-2020 Certification Report C: 1
- CSP Module Version 1.0 Release 1/NXP P60D145 VB”, 24.03.2020, v1.0.1, T-Systems International GmbH (confidential document) [11] “TCOS Cryptographic Service Provider Version 2.0 Release 1/P6022yTCOS Cryptographic Service: 1
- Report (ETR) - TCOS CSP Module Version 1.0 Release 1/P6022y”, SRC Security Research & Consulting, (confidential document) [8] Protection Profile (PP-0104) and Protection Profile-Module (PP-0107): Cryptographic Service: 1
- Update im Feld unter TCOS CSP Module 1.0 R1, T-Systems International GmbH, Version 0.2, 11.10.2019 (confidential document) [RNG] Zufallszahlengenerierung in TCOS,Version 1.01, 21.02.2019 (confidential document) [HWST] NXP: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- confidential document) [13] “Update im Feld unter TCOS CSP Module 1.0 R1”, T-Systems International GmbH, Version 0.2, 11: 1
|
pdf_data/report_metadata |
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20050214150436+09'00'
- /Creator: Word 用 Acrobat PDFMaker 6.0
- /Manager: IPA
- /ModDate: D:20050214150557+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /SourceModified: D:20050214053206
- /Title: CRP-e
- pdf_file_size_bytes: 260158
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20200409135722+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, CSP, Crypto Service Provider, EAL4, T-Systems International, SMAERS, Coordinated PP"
- /ModDate: D:20200409141001+02'00'
- /Producer: LibreOffice 6.2
- /Subject: TCOS CSP Module Version 1.0 Release 1/P6022y
- /Title: Certification Report BSI-DSZ-CC-1118-2020
- pdf_file_size_bytes: 1420347
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 31
|
pdf_data/st_filename |
c0018_est.pdf |
1118b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1059-2018: 1
- BSI-DSZ-CC-1118: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0104-: 1
- BSI-CC-PP-0104-2019: 1
- BSI-CC-PP-0107-2019: 2
- BSI-CC-PP0035: 1
- BSI-CC-PP0104: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 6: 1
- EAL 6 augmented: 1
- EAL 6+: 1
- EAL4: 8
- EAL4 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 4
- ACM_CAP.3: 6
- ACM_CAP.4: 3
- ACM_SCP.1: 2
- ACM_SCP.2: 4
- ADO:
- ADO_DEL.2: 4
- ADO_IGS.1: 6
- ADV:
- ADV_FSP.1: 19
- ADV_FSP.2: 4
- ADV_HLD.1: 1
- ADV_HLD.2: 7
- ADV_IMP.1: 7
- ADV_LLD.1: 6
- ADV_RCR.1: 12
- ADV_SPM.1: 4
- AGD:
- AGD_ADM.1: 11
- AGD_FSP.1: 1
- AGD_USR.1: 10
- ALC:
- ALC_DVS.1: 6
- ALC_LCD.1: 4
- ALC_TAT.1: 6
- ATE:
- ATE_COV.2: 4
- ATE_DPT.1: 3
- ATE_FUN.1: 9
- ATE_IND.2: 4
- AVA:
- AVA_MSU.2: 4
- AVA_SOF.1: 4
- AVA_VLA.2: 4
|
- ADV:
- ADV_ARC.1: 4
- ADV_FSP.4: 2
- ADV_IMP.1: 2
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 8
- ALC_FLR.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_FUN.1: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 27
- FCS_CKM.4: 20
- FCS_CKM.4.1: 1
- FCS_COP.1: 20
- FCS_COP.1.1: 1
- FDP:
- FDP_RIP.1: 9
- FDP_RIP.1.1: 1
- FIA:
- FIA_SOS.1: 9
- FIA_SOS.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 13
- FIA_UAU.2.1: 1
- FIA_UAU.7: 9
- FIA_UAU.7.1: 1
- FIA_UID.1: 4
- FMT:
- FMT_MOF.1: 23
- FMT_MOF.1.1: 1
- FMT_MSA.2: 13
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_SMF.1: 18
- FMT_SMF.1.1: 1
- FMT_SMR.1: 20
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
|
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 7
- FAU_GEN.1.1: 4
- FAU_GEN.1.2: 1
- FAU_SAS.1: 1
- FAU_STG.1: 5
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 5
- FAU_STG.3.1: 4
- FCS:
- FCS_CKM: 85
- FCS_CKM.1: 30
- FCS_CKM.2: 14
- FCS_CKM.4: 28
- FCS_CKM.4.1: 1
- FCS_CKM.5: 16
- FCS_CKM.5.1: 1
- FCS_COP: 135
- FCS_COP.1: 38
- FCS_RNG: 6
- FCS_RNG.1: 13
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 13
- FDP_ACC.1: 29
- FDP_ACF: 11
- FDP_ACF.1: 19
- FDP_DAU: 18
- FDP_DAU.1: 3
- FDP_DAU.2: 6
- FDP_ETC: 4
- FDP_ETC.1: 4
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ETC.2: 8
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 19
- FDP_ITC: 19
- FDP_ITC.1: 21
- FDP_ITC.2: 31
- FDP_ITT.1: 1
- FDP_RIP: 4
- FDP_RIP.1: 1
- FDP_SDC: 3
- FDP_SDC.1: 11
- FDP_SDC.1.1: 3
- FDP_SDI: 1
- FDP_SDI.2: 2
- FDP_UCT: 1
- FDP_UIT: 1
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 14
- FIA_API.1: 7
- FIA_API.1.1: 1
- FIA_ATD.1: 4
- FIA_ATD.1.1: 1
- FIA_UAU.1: 6
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UAU.5: 5
- FIA_UAU.5.1: 11
- FIA_UAU.5.2: 1
- FIA_UAU.6: 4
- FIA_UAU.6.1: 1
- FIA_UID.1: 11
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 3
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MOF: 5
- FMT_MOF.1: 7
- FMT_MOF.1.1: 7
- FMT_MSA: 10
- FMT_MSA.1: 9
- FMT_MSA.2: 5
- FMT_MSA.2.1: 1
- FMT_MSA.3: 6
- FMT_MSA.4: 5
- FMT_MTD: 21
- FMT_MTD.1: 17
- FMT_MTD.3: 13
- FMT_MTD.3.1: 1
- FMT_SAE.1: 6
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF: 4
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR: 4
- FMT_SMR.1: 17
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS.1: 1
- FPT_ESA: 8
- FPT_ESA.1: 9
- FPT_ESA.1.1: 1
- FPT_ESA.1.2: 1
- FPT_ESA.1.3: 1
- FPT_ESA.1.4: 1
- FPT_FLS: 1
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_ISA: 12
- FPT_ISA.1: 14
- FPT_ISA.1.1: 1
- FPT_ISA.1.2: 1
- FPT_ISA.1.3: 1
- FPT_ISA.1.4: 1
- FPT_ISA.1.5: 1
- FPT_ITT.1: 1
- FPT_PHP: 1
- FPT_PHP.3: 5
- FPT_PHP.3.1: 1
- FPT_SDC: 1
- FPT_STM.1: 11
- FPT_STM.1.1: 4
- FPT_TCT: 10
- FPT_TCT.1: 5
- FPT_TCT.1.1: 1
- FPT_TDC: 9
- FPT_TDC.1: 16
- FPT_TIT: 15
- FPT_TIT.1: 10
- FPT_TIT.1.1: 2
- FPT_TIT.1.2: 1
- FPT_TST: 2
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FRU:
- FRU_FLT.1: 1
- FRU_FLT.2: 6
- FRU_FLT.2.1: 1
- FTP:
- FTP_ITC.1: 16
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 3
|
pdf_data/st_keywords/cc_claims |
- A:
- A.OFFICE: 2
- A.PROCEDURE: 1
- O:
- O.AUTHEN: 5
- O.AUTHENTICATION: 1
- O.REMOVE: 4
- O.RESIDUAL: 6
- OE:
- OE.OPERATE: 1
- OE.SECURE: 2
- T:
|
- O:
- O.AES: 1
- O.CUST_RECONF_PLAIN: 1
- O.EEPROM_INTEGRITY: 1
- O.FM_FW: 1
- O.MEM_ACCESS: 1
- O.PUF: 1
- O.RBGS: 6
- O.RND: 1
- O.SFR_ACCESS: 1
- O.TDES: 1
- O.TST: 6
- OE:
- OSP:
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 3
- NXP Semiconductors: 1
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
- TSystems:
- T-Systems International: 107
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 24
- AES-: 2
- AES-128: 9
- AES-256: 11
- DES:
- 3DES:
- TDEA: 1
- TDES: 4
- Triple-DES: 1
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 4
- SHA-384: 2
- SHA-512: 1
- SHA384: 1
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 1
- Key agreement: 5
- KEX:
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP192r1: 1
- brainpoolP192t1: 1
- brainpoolP224r1: 1
- brainpoolP224t1: 1
- brainpoolP256r1: 4
- brainpoolP256t1: 1
- brainpoolP320r1: 1
- brainpoolP320t1: 1
- brainpoolP384r1: 2
- brainpoolP384t1: 1
- brainpoolP512r1: 2
- brainpoolP512t1: 1
- NIST:
- Curve P-192: 1
- Curve P-256: 1
- Curve P-384: 1
- Curve P-521: 1
- P-192: 1
- P-256: 1
- P-384: 1
- P-521: 1
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 1
- malfunction: 2
- physical tampering: 1
- SCA:
- Leak-Inherent: 1
- physical probing: 5
- side channels: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- AIS 31: 1
- AIS 36: 1
- AIS31: 4
- AIS36: 2
- CC:
- CCMB-2012-09-004: 1
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 180-4: 1
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 4
- FIPS180: 2
- FIPS186: 4
- FIPS197: 11
- ICAO:
- ISO:
- ISO/IEC 10116:2017: 1
- ISO/IEC 19790: 6
- NIST:
- PKCS:
- RFC:
- RFC 2104: 1
- RFC 5639: 1
- RFC 5903: 1
- RFC 6954: 1
- RFC 8017: 1
- RFC2104: 2
- RFC5639: 13
- RFC5903: 3
- RFC6954: 4
- RFC8017: 5
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: A.Iwasaki
- /Company: Pigs, Inc.
- /CreationDate: D:20050214174331+09'00'
- /Creator: Word 用 Acrobat PDFMaker 6.0
- /ModDate: D:20050214175221+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /SourceModified: D:20050214052924
- /Subject: デジタル複合機データセキュリティキット
- /Title: セキュリティターゲット
- /_AdHocReviewCycleID: -4335251
- /_AuthorEmail: [email protected]
- /_AuthorEmailDisplayName: Yamanaka Toshihiro/副参事
- /_EmailSubject: NIAPへの認証製品掲載の件
- pdf_file_size_bytes: 552988
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 39
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |