Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Data Security Kit(B) Software V1.10E
JISEC-CC-CRP-C0035
STARCOS 3.2 QES Version 2.1B
BSI-DSZ-CC-0648-2010
name Data Security Kit(B) Software V1.10E STARCOS 3.2 QES Version 2.1B
category Other Devices and Systems Products for Digital Signatures
scheme JP DE
not_valid_after 07.10.2013 01.09.2019
not_valid_before 09.09.2005 03.09.2010
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0035_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0648a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0035_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0648b_pdf.pdf
manufacturer KYOCERA MITA Corporation G+D Mobile Security GmbH
manufacturer_web https://www.kyoceramita.com/ https://www.gi-de.com/de/de/mobile-security/
security_level EAL3 EAL4+, AVA_MSU.3, AVA_VLA.4
dgst 04b252f7910c7505 b71d0524d2e9f5af
heuristics/cert_id JISEC-CC-CRP-C0035 BSI-DSZ-CC-0648-2010
heuristics/cert_lab [] BSI
heuristics/extracted_sars AGD_USR.1, ADV_HLD.2, AVA_SOF.1, AVA_VLA.1, ADV_RCR.1, ALC_DVS.1, ATE_DPT.1, ADV_FSP.1, ATE_IND.2, AVA_MSU.1, AGD_ADM.1, ATE_COV.2, ATE_FUN.1 AGD_USR.1, ADV_HLD.2, AVA_SOF.1, ADV_FSP.2, ADV_RCR.1, ALC_DVS.1, ALC_TAT.1, ALC_LCD.1, ATE_DPT.1, ADV_IMP.1, ADV_SPM.1, AVA_VLA.4, ADV_LLD.1, ATE_IND.2, AVA_MSU.3, AGD_ADM.1, ATE_COV.2, ATE_FUN.1
heuristics/extracted_versions 1.10 3.2, 2.1
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0495-2009
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0495-2009, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0223-2003, BSI-DSZ-CC-0456-2009, BSI-DSZ-CC-0322-2005
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0035
  • certification_date: 01.11.2005
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cert_link: https://www.ipa.go.jp/en/security/c0035_eimg.pdf
    • description: PRODUCT DESCRIPTION This TOE is a software module that is installed on the MFPs "KM-8030/KM-6030, CS-8030/CS-6030" of KYOCERA MITA Corporation, and which provides the ordinary functions, and also security functions for protecting residue data. This TOE is installed on the above-mentioned MFPs and protects image data remaining on the HDDs from unjust exposure, after various copying, printing, and network scanning processings, by providing an HDD overwriting function. And it has the administrator authentication function that identifies and authenticates a TOE machine administrator who sets the HDD overwrite deletion method and operates it.
    • evaluation_facility: Japan Electronics & Information Technology Industries Association, Information Technology Security Center
    • product: Data Security Kit(B) Software
    • product_type: IT Product ( data protection function in Multi Function Device )
    • report_link: https://www.ipa.go.jp/en/security/c0035_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0035_est.pdf
    • toe_version: V1.10E
    • vendor: KYOCERA MITA Corporation
  • expiration_date: 01.10.2013
  • revalidations: [frozendict({'date': '2009-06', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0035_it4035_01.html'})]
  • supplier: KYOCERA MITA Corporation
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0035_it4035.html
  • toe_overseas_name: Data Security Kit(B) Software V2.00E
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0322-2005
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0322-2005
heuristics/protection_profiles {} 40002c3611fc465f
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0006b.pdf
pdf_data/report_filename c0035_erpt.pdf 0648a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0648-2010
    • cert_item: STARCOS 3.2 QES V2.1B
    • cert_lab: BSI
    • developer: Giesecke & Devrient GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0035-01: 1
    • Certification No. C0035: 1
  • DE:
    • BSI-DSZ-CC-0322: 1
    • BSI-DSZ-CC-0322-2005: 1
    • BSI-DSZ-CC-0437: 1
    • BSI-DSZ-CC-0495-2009: 6
    • BSI-DSZ-CC-0648-2010: 22
  • NL:
    • CC-437-2010: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0006-: 1
    • BSI-PP-0006-2002: 3
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL 4: 9
    • EAL 4 augmented: 3
    • EAL1: 6
    • EAL2: 3
    • EAL3: 4
    • EAL4: 9
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 4
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 1
    • ACM_CAP: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 2
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_HLD: 2
    • ADV_IMP: 2
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_USR: 2
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.1: 1
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_LCD.1: 1
    • ALC_TAT: 2
    • ALC_TAT.1: 1
  • APE:
    • APE_DES: 1
    • APE_ENV: 1
    • APE_INT: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SRE: 1
  • ASE:
    • ASE_DES: 1
    • ASE_ENV: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_PPC: 1
    • ASE_REQ: 1
    • ASE_SRE: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 2
    • ATE_DPT: 2
    • ATE_FUN: 2
    • ATE_IND: 5
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.3: 5
    • AVA_SOF: 3
    • AVA_VLA: 6
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 7
pdf_data/report_keywords/cc_sfr
  • FIA:
    • FIA_AFL.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.CE: 1
    • A.PHYSICAL: 1
  • T:
    • T.AGAIN: 1
  • OE:
    • OE.HI_VAD: 1
pdf_data/report_keywords/vendor
  • GD:
    • Giesecke & Devrient: 11
  • Infineon:
    • Infineon: 2
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 3
  • TUV:
    • TÜV Informationstechnik: 6
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • HPC:
      • HPC: 4
  • DES:
    • 3DES:
      • TDES: 1
    • DES:
      • DES: 2
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA2048: 3
pdf_data/report_keywords/hash_function
  • RIPEMD:
    • RIPEMD: 1
    • RIPEMD-160: 2
  • SHA:
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 2
      • SHA-512: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
    • physical tampering: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
    • BSI TR-03116: 2
pdf_data/report_keywords/os_name
  • STARCOS:
    • STARCOS: 1
    • STARCOS 3: 31
pdf_data/report_keywords/standard_id
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 2
    • CCIMB-99-033: 2
  • ISO:
    • ISO/IEC 15408:1999: 1
  • BSI:
    • AIS 20: 2
    • AIS 25: 3
    • AIS 26: 3
    • AIS 31: 2
    • AIS 32: 1
    • AIS 34: 3
    • AIS 35: 2
    • AIS 36: 5
    • AIS 38: 1
  • ISO:
    • ISO/IEC 15408:2005: 3
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Body for IT Security of TÜV Informationstechnik GmbH (confidential document) [8] Configuration list for the TOE, Version 1.4, 2010-04-09, Configuration List STARCOS 3.2 QES V2: 1
    • Certification Report Evaluation Body for IT Security of TÜV Informationstechnik GmbH (confidential document) [12] Administrator guidance STARCOS 3.2 HBA; STARCOS 3.2 QES V2, Version 1.3, 2009-12-04, G & D: 1
    • ETR-LITE) BSI-DSZ-CC-0437, Evaluation Body for IT Security of TÜV Informationstechnik GmbH (confidential document) [21] STARCOS 3.2 SmartCard Operating System Reference Manual, Edition 09.2009, G & D 25 / 38: 1
    • Version 1.4, 2010-04-08, Security Target STARCOS 3.2 QES V2.1B, Giesecke & Devrient GmbH (confidential document) [7] Evaluation Technical Report, Version 4, 2010-07-22, Evaluation Technical Report (ETR: 1
    • confidential document) [9] Security Target BSI-DSZ-CC-0648-2010, Version 1.4, 2010-04-08, Security Target Lite STARCOS 3: 1
pdf_data/report_metadata
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20051221115430+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 6.0
  • /Manager: IPA
  • /ModDate: D:20051221115715+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /SourceModified: D:20051221023637
  • /Title: CRP-e
  • pdf_file_size_bytes: 390269
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 23
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20101028094035+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, STARCOS 3.2 QES V2.1B, Giesecke & Devrient GmbH, Secure Signature Creation Device (SSCD)"
  • /ModDate: D:20101028094321+02'00'
  • /Producer: OpenOffice.org 3.1
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0648-2010
  • pdf_file_size_bytes: 816070
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
pdf_data/st_filename c0035_est.pdf 0648b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0322-: 1
    • BSI-DSZ-CC-0322-2005: 2
    • BSI-DSZ-CC-0322-2005-MA-04: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0006-2002: 1
    • BSI-PP-0002-2001: 2
    • BSI-PP-0006-2002: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 3: 1
    • EAL3: 6
  • EAL:
    • EAL 4: 21
    • EAL4: 7
    • EAL4 augmented: 2
    • EAL4+: 5
    • EAL5+: 2
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.3: 3
    • ACM_SCP.1: 3
  • ADO:
    • ADO_DEL.1: 3
    • ADO_IGS.1: 3
  • ADV:
    • ADV_FSP.1: 3
    • ADV_HLD.2: 3
    • ADV_RCR.1: 3
  • AGD:
    • AGD_ADM.1: 3
    • AGD_USR.1: 3
  • ALC:
    • ALC_DVS.1: 3
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.1: 3
    • ATE_FUN.1: 3
    • ATE_IND.2: 3
  • AVA:
    • AVA_MSU.1: 3
    • AVA_SOF.1: 3
    • AVA_VLA.1: 3
  • ACM:
    • ACM_AUT.1: 3
    • ACM_CAP.3: 1
    • ACM_CAP.4: 2
    • ACM_SCP.2: 3
  • ADO:
    • ADO_DEL.2: 4
    • ADO_IGS.1: 5
  • ADV:
    • ADV_FSP.1: 10
    • ADV_FSP.2: 3
    • ADV_HLD.1: 2
    • ADV_HLD.2: 4
    • ADV_IMP.1: 6
    • ADV_LLD.1: 5
    • ADV_RCR.1: 5
    • ADV_SPM.1: 3
  • AGD:
    • AGD_ADM.1: 10
    • AGD_USR.1: 8
  • ALC:
    • ALC_DVS.1: 4
    • ALC_LCD.1: 2
    • ALC_TAT.1: 5
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.1: 1
    • ATE_FUN.1: 5
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.3: 9
    • AVA_SOF: 1
    • AVA_SOF.1: 3
    • AVA_VLA.4: 10
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_RIP: 1
    • FDP_RIP.1: 12
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_SOS.1: 15
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 4
    • FIA_UAU.2: 16
    • FIA_UAU.7: 15
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 7
    • FIA_UID.2: 15
  • FMT:
    • FMT_MOF.1: 14
    • FMT_MOF.1.1: 1
    • FMT_MTD.1: 13
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 15
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RVM.1: 19
    • FPT_RVM.1.1: 1
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM: 8
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 2
    • FCS_CKM.3: 2
    • FCS_CKM.4: 14
    • FCS_COP: 12
    • FCS_COP.1: 9
  • FDP:
    • FDP_ACC: 25
    • FDP_ACC.1: 15
    • FDP_ACC.1.1: 1
    • FDP_ACF: 26
    • FDP_ACF.1: 17
    • FDP_ETC: 5
    • FDP_ETC.1: 3
    • FDP_ITC: 7
    • FDP_ITC.1: 7
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 2
    • FDP_SDI: 10
    • FDP_SDI.2: 6
    • FDP_UIT: 18
    • FDP_UIT.1: 11
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 2
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 1
    • FIA_UID: 1
    • FIA_UID.1: 8
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 3
    • FMT_MSA: 9
    • FMT_MSA.1: 8
    • FMT_MSA.2: 10
    • FMT_MSA.2.1: 3
    • FMT_MSA.3: 12
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 3
    • FMT_MTD.1.1: 3
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 3
    • FMT_SMR: 1
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_AMT.1: 6
    • FPT_AMT.1.1: 2
    • FPT_FLS: 1
    • FPT_FLS.1: 5
    • FPT_FLS.1.1: 2
    • FPT_PHP: 1
    • FPT_PHP.1: 5
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 4
    • FPT_PHP.3.1: 2
    • FPT_RVM: 1
    • FPT_RVM.1: 8
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 9
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_TRP: 1
    • FPT_TST: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 19
    • FTP_ITC.1: 16
    • FTP_TRP: 9
    • FTP_TRP.1: 8
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.CE: 2
    • A.PHYSICA: 1
    • A.PHYSICAL: 2
  • O:
    • O.METHOD: 5
    • O.REMAIN: 6
  • OE:
    • OE.ADMIN: 2
    • OE.CE: 2
    • OE.PHYSICAL: 2
    • OE.POWER: 4
  • T:
    • T.AGAIN: 3
  • A:
    • A.CGA: 3
    • A.SCA: 3
  • OE:
    • OE.HI_VAD: 6
pdf_data/st_keywords/vendor
  • GD:
    • G&D: 8
    • Giesecke & Devrient: 7
  • Infineon:
    • Infineon: 5
    • Infineon Technologies AG: 4
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 3
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA 2048: 3
    • RSA2048: 2
pdf_data/st_keywords/hash_function
  • RIPEMD:
    • RIPEMD-160: 2
    • RIPEMD160: 1
  • SHA:
    • SHA2:
      • SHA-2: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • physical tampering: 9
  • SCA:
    • DPA: 1
    • SPA: 1
    • timing attacks: 1
pdf_data/st_keywords/os_name
  • STARCOS:
    • STARCOS: 68
    • STARCOS 3: 103
pdf_data/st_keywords/standard_id
  • CC:
    • CCIMB-99-031: 2
    • CCIMB-99-032: 2
    • CCIMB-99-033: 2
  • ISO:
    • ISO/IEC 15408: 6
    • ISO/IEC 15408:1999: 1
  • BSI:
    • AIS 20: 1
    • AIS 31: 1
    • AIS 32: 1
    • AIS20: 1
    • AIS31: 1
  • FIPS:
    • FIPS PUB 46-3: 1
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 9796-1: 1
    • ISO/IEC 9796-2: 1
  • PKCS:
    • PKCS#1: 3
pdf_data/st_metadata
  • /Author:  
  • /Company:  
  • /CreationDate: D:20051221114017+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 6.0
  • /ModDate: D:20051221114547+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /SourceModified: D:20051220094657
  • /Subject:  
  • /Title: untitled
  • pdf_file_size_bytes: 886113
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 65
  • /Author: Giesecke & Devrient GmbH
  • /Comments: SSCD STARCOS Signature smart card
  • /Company: Giesecke & Devrient
  • /CreationDate: D:20100604140802+02'00'
  • /Creator: Acrobat PDFMaker 8.1 für Word
  • /Keywords: SSCD Signature smart card
  • /ModDate: D:20100604142016+02'00'
  • /Producer: Acrobat Distiller 8.1.0 (Windows)
  • /SourceModified: D:20100604120739
  • /Subject: STARCOS 3.2 QES V2.1B
  • /Title: Security Target Lite
  • pdf_file_size_bytes: 537374
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 72
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different