name |
Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 12 – Fall |
bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 PKI Card System Control Software, Version A1UD0Y0-0100-G00-20 |
category |
Mobility |
Other Devices and Systems |
scheme |
US |
JP |
status |
archived |
archived |
not_valid_after |
28.10.2024 |
01.09.2015 |
not_valid_before |
28.10.2022 |
31.08.2010 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11307-ci.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11307-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0264_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11307-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0264_est.pdf |
manufacturer |
Samsung Electronics Co., Ltd. |
Konica Minolta Business Technologies, Inc |
manufacturer_web |
https://www.samsung.com |
https://www.konicaminolta.com/ |
security_level |
{} |
EAL3 |
dgst |
06818eae65667bc3 |
91b5f87a0b08867c |
heuristics/cert_id |
CCEVS-VR-VID-11307-2022 |
JISEC-CC-CRP-C0264 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
CVE-2023-30700, CVE-2023-42537, CVE-2023-30712, CVE-2023-42536, CVE-2023-30689, CVE-2023-30694, CVE-2024-20891, CVE-2024-34612, CVE-2024-34594, CVE-2023-30685, CVE-2023-42563, CVE-2024-34589, CVE-2023-21485, CVE-2023-21451, CVE-2024-34647, CVE-2023-30715, CVE-2024-49415, CVE-2023-30680, CVE-2025-20889, CVE-2024-34595, CVE-2024-20846, CVE-2023-21461, CVE-2023-42562, CVE-2025-20887, CVE-2023-21430, CVE-2023-30679, CVE-2024-20836, CVE-2024-34604, CVE-2025-20891, CVE-2023-21438, CVE-2024-20866, CVE-2023-42564, CVE-2024-34646, CVE-2023-21441, CVE-2024-20865, CVE-2023-21490, CVE-2024-20892, CVE-2024-34666, CVE-2023-30688, CVE-2024-34638, CVE-2023-30717, CVE-2025-20884, CVE-2024-34678, CVE-2023-42569, CVE-2023-30708, CVE-2023-30696, CVE-2024-20857, CVE-2024-20831, CVE-2023-30654, CVE-2023-42556, CVE-2023-42538, CVE-2024-34655, CVE-2024-20900, CVE-2025-20904, CVE-2023-21457, CVE-2023-21487, CVE-2023-30690, CVE-2024-20895, CVE-2024-20804, CVE-2024-34652, CVE-2024-34669, CVE-2024-20843, CVE-2024-34583, CVE-2023-30693, CVE-2024-20893, CVE-2024-20817, CVE-2024-20849, CVE-2023-30711, CVE-2024-34588, CVE-2023-42561, CVE-2024-20814, CVE-2024-20859, CVE-2023-30681, CVE-2025-20881, CVE-2025-20885, CVE-2024-34607, CVE-2023-21428, CVE-2024-20844, CVE-2024-34614, CVE-2024-20848, CVE-2023-30706, CVE-2024-20832, CVE-2024-20875, CVE-2023-21454, CVE-2023-21492, CVE-2024-20888, CVE-2024-34676, CVE-2023-42533, CVE-2024-34665, CVE-2023-21437, CVE-2023-30716, CVE-2023-30697, CVE-2024-20897, CVE-2023-21421, CVE-2024-34609, CVE-2024-34619, CVE-2025-20905, CVE-2023-21439, CVE-2024-34587, CVE-2023-21486, CVE-2023-42530, CVE-2024-20847, CVE-2024-34668, CVE-2023-42535, CVE-2023-30721, CVE-2023-42532, CVE-2024-34642, CVE-2023-21488, CVE-2023-42527, CVE-2023-30718, CVE-2024-20812, CVE-2023-21456, CVE-2024-49410, CVE-2024-20818, CVE-2024-34618, CVE-2023-30691, CVE-2023-21423, CVE-2023-30699, CVE-2024-20876, CVE-2023-21445, CVE-2024-34616, CVE-2023-42560, CVE-2024-34593, CVE-2024-34651, CVE-2023-21460, CVE-2023-21504, CVE-2024-20845, CVE-2024-20819, CVE-2024-34611, CVE-2024-49411, CVE-2024-34590, CVE-2024-20833, CVE-2023-21496, CVE-2024-34602, CVE-2024-20881, CVE-2023-42529, CVE-2024-20842, CVE-2024-20811, CVE-2023-21458, CVE-2024-20898, CVE-2024-20899, CVE-2024-34605, CVE-2023-21493, CVE-2023-30692, CVE-2025-20907, CVE-2024-34680, CVE-2023-21495, CVE-2023-30720, CVE-2024-20815, CVE-2024-34585, CVE-2023-42559, CVE-2024-34641, CVE-2024-20890, CVE-2023-21442, CVE-2023-42557, CVE-2024-34615, CVE-2025-20883, CVE-2024-20879, CVE-2024-34637, CVE-2024-20806, CVE-2024-20894, CVE-2023-21435, CVE-2023-21489, CVE-2023-30710, CVE-2024-20896, CVE-2023-21429, CVE-2023-21424, CVE-2023-21452, CVE-2024-34610, CVE-2024-34586, CVE-2024-34677, CVE-2024-34608, CVE-2023-30727, CVE-2024-20803, CVE-2024-20830, CVE-2023-30686, CVE-2023-30739, CVE-2024-20813, CVE-2025-20886, CVE-2023-21427, CVE-2023-30707, CVE-2024-34674, CVE-2024-20882, CVE-2023-42528, CVE-2024-20863, CVE-2023-42531, CVE-2023-42570, CVE-2024-20810, CVE-2024-20889, CVE-2025-20890, CVE-2024-34591, CVE-2023-30733, CVE-2023-21502, CVE-2024-49414, CVE-2024-34645, CVE-2023-21425, CVE-2024-34606, CVE-2024-20877, CVE-2024-20834, CVE-2025-20888, CVE-2023-21491, CVE-2024-34592, CVE-2023-42568, CVE-2024-20880, CVE-2024-20816, CVE-2023-30709, CVE-2023-21422, CVE-2024-20901, CVE-2024-20862, CVE-2023-42534, CVE-2024-20861, CVE-2024-34648, CVE-2023-30714, CVE-2023-21436, CVE-2023-30731, CVE-2024-34673, CVE-2023-21446, CVE-2023-30713, CVE-2025-20882, CVE-2024-20858, CVE-2024-20835, CVE-2023-30687, CVE-2024-34639, CVE-2023-30701, CVE-2023-42566, CVE-2024-20820, CVE-2024-34640, CVE-2024-20878, CVE-2023-21484, CVE-2023-30719, CVE-2024-20805, CVE-2024-34667, CVE-2024-34653 |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1 |
AVA_VLA.2, ASE_INT.1, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
heuristics/extracted_versions |
12 |
283, 423, 0100, 363, 20, 223 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Mobility
- certification_date: 28.10.2022
- evaluation_facility: Gossamer Security Solutions
- expiration_date: 28.10.2024
- id: CCEVS-VR-VID11307
- product: Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 12 – Fall
- scheme: US
- url: https://www.niap-ccevs.org/product/11307
- vendor: Samsung Electronics Co., Ltd.
|
- cert_id: JISEC-CC-CRP-C0264
- certification_date: 01.08.2010
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0264_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of MFP, including the operation control processing and the image data management triggered by the panel of the main body of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”) or through the network and supports the protection from exposure of the highly confidential documents exchanged between MFP and client PC. Moreover, TOE can prevent the unauthorized access to the image data written in HDD for the danger of taking HDD that is the medium that stores the image data in MFP out illegally by using the encryption function by the ASIC. Besides, TOE provides the function that deletes all the data of HDD completely by deletion method compliant with various overwrite deletion standards, and the function that controls the access from the public telephone line against the danger using Fax function as a steppingstone to access internal network. TOE security functionality TOE provides the following security functions. - Administrator function - Service mode function - Encryption Print Function - S/MIME Encryption Function - Digital Signature Function - All area overwrite deletion function - Encryption key generation function - Authentication Failure Frequency Reset function - ASIC Support Function - PKI Support Function - Fax unit control function
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 PKI Card System Control Software
- product_type: Control Software for digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0264_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0264_est.pdf
- toe_version: A1UD0Y0-0100-G00-20
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.09.2015
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 PKI Card System Control Software A1UD0Y0-0100-G00-20
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0264_it9282.html
- toe_overseas_name: bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 PKI Card System Control Software A1UD0Y0-0100-G00-20
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
c40ae795865a0dba, 731bdcc989507942, 83014eb399a802f3, c88af12926be2779 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_MDF_V3.2.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_BT_V1.0.pdf |
{} |
pdf_data/cert_filename |
st_vid11307-ci.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11307-2022: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20221031104646-04'00'
- /ModDate: D:20221031104646-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 181441
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
st_vid11307-vr.pdf |
c0264_erpt.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID11307-2022
- cert_item: Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 12 - Fall
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11307-2022: 1
|
- JP:
- CRP-C0264-01: 1
- Certification No. C0264: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.ADMIN: 1
- A.IC-CARD: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVICE: 1
- A.SETTING: 1
- T:
- T.BRING-OUT-STORAGE: 2
- T.DISCARD-MFP: 2
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- that encryption print for a printer data transmitted to MFP from client PC among the highly confidential document exchanged between MFP and client PC. Also, it provides the protection function for scan image data: 1
|
pdf_data/report_metadata |
|
- /CreationDate: D:20101213141131+09'00'
- /ModDate: D:20101213141131+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 239807
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 33
|
pdf_data/st_filename |
st_vid11307-st.pdf |
c0264_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 1 augmented: 1
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 9
- AGD_PRE: 1
- AGD_PRE.1: 5
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 3
- ALC_CMS: 1
- ALC_CMS.1: 4
- ALC_TSU_EXT: 3
- ALC_TSU_EXT.1: 7
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 8
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 2
- FAU_SAR.1: 1
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG: 4
- FAU_STG.1: 1
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 1
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 19
- FCS_CKM.1: 8
- FCS_CKM.1.1: 1
- FCS_CKM.2: 4
- FCS_CKM_EXT: 21
- FCS_CKM_EXT.1: 1
- FCS_CKM_EXT.1.1: 1
- FCS_CKM_EXT.1.2: 1
- FCS_CKM_EXT.1.3: 1
- FCS_CKM_EXT.2: 1
- FCS_CKM_EXT.2.1: 1
- FCS_CKM_EXT.3: 5
- FCS_CKM_EXT.3.1: 1
- FCS_CKM_EXT.3.2: 1
- FCS_CKM_EXT.4: 2
- FCS_CKM_EXT.4.1: 2
- FCS_CKM_EXT.4.2: 1
- FCS_CKM_EXT.5: 1
- FCS_CKM_EXT.5.1: 1
- FCS_CKM_EXT.5.2: 1
- FCS_CKM_EXT.6: 1
- FCS_CKM_EXT.6.1: 1
- FCS_CKM_EXT.8: 2
- FCS_CKM_EXT.8.1: 1
- FCS_COP: 37
- FCS_COP.1: 16
- FCS_RBG_EXT: 6
- FCS_RBG_EXT.1: 14
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_RBG_EXT.1.3: 1
- FCS_RBG_EXT.2: 1
- FCS_RBG_EXT.2.1: 1
- FCS_SRV_EXT: 6
- FCS_SRV_EXT.1: 1
- FCS_SRV_EXT.1.1: 1
- FCS_SRV_EXT.2.1: 1
- FCS_STG_EXT: 9
- FCS_STG_EXT.1: 2
- FCS_STG_EXT.1.1: 1
- FCS_STG_EXT.1.2: 1
- FCS_STG_EXT.1.3: 1
- FCS_STG_EXT.1.4: 1
- FCS_STG_EXT.1.5: 1
- FCS_STG_EXT.2: 4
- FCS_STG_EXT.2.1: 2
- FCS_STG_EXT.2.2: 1
- FCS_STG_EXT.3: 2
- FCS_STG_EXT.3.1: 1
- FCS_STG_EXT.3.2: 1
- FCS_TLSC_EXT: 20
- FCS_TLSC_EXT.1: 6
- FCS_TLSC_EXT.1.1: 1
- FCS_TLSC_EXT.1.2: 1
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.2: 2
- FCS_TLSC_EXT.2.1: 1
- FCS_TLSC_EXT.4: 1
- FCS_TLSC_EXT.4.1: 1
- FCS_TLSC_EXT.5: 1
- FCS_TLSC_EXT.5.1: 1
- FCS_TLSS_EXT.1.1: 1
- FCS_TLS_EXT: 3
- FCS_TLS_EXT.1.1: 1
- FDP:
- FDP_ACC.1: 3
- FDP_ACF_EXT: 9
- FDP_ACF_EXT.1: 1
- FDP_ACF_EXT.1.1: 1
- FDP_ACF_EXT.1.2: 2
- FDP_ACF_EXT.2.1: 1
- FDP_ACF_EXT.3: 1
- FDP_ACF_EXT.3.1: 1
- FDP_DAR_EXT: 6
- FDP_DAR_EXT.1: 1
- FDP_DAR_EXT.1.1: 1
- FDP_DAR_EXT.1.2: 1
- FDP_DAR_EXT.2: 2
- FDP_DAR_EXT.2.1: 1
- FDP_DAR_EXT.2.2: 1
- FDP_DAR_EXT.2.3: 1
- FDP_DAR_EXT.2.4: 1
- FDP_IFC_EXT: 6
- FDP_IFC_EXT.1: 2
- FDP_IFC_EXT.1.1: 2
- FDP_PBA_EXT: 3
- FDP_PBA_EXT.1: 1
- FDP_PBA_EXT.1.1: 1
- FDP_RIP: 2
- FDP_RIP.2: 1
- FDP_RIP.2.1: 1
- FDP_STG_EXT: 3
- FDP_STG_EXT.1: 2
- FDP_STG_EXT.1.1: 1
- FDP_UPC_EXT: 7
- FDP_UPC_EXT.1: 4
- FIA:
- FIA_AFL_EXT: 3
- FIA_AFL_EXT.1: 3
- FIA_AFL_EXT.1.1: 1
- FIA_AFL_EXT.1.2: 1
- FIA_AFL_EXT.1.3: 1
- FIA_AFL_EXT.1.4: 1
- FIA_AFL_EXT.1.5: 1
- FIA_AFL_EXT.1.6: 1
- FIA_BLT_EXT: 18
- FIA_BLT_EXT.1: 2
- FIA_BLT_EXT.1.1: 1
- FIA_BLT_EXT.2: 2
- FIA_BLT_EXT.2.1: 1
- FIA_BLT_EXT.3: 2
- FIA_BLT_EXT.3.1: 1
- FIA_BLT_EXT.4: 1
- FIA_BLT_EXT.4.1: 1
- FIA_BLT_EXT.4.2: 1
- FIA_BLT_EXT.6: 1
- FIA_BLT_EXT.6.1: 1
- FIA_BLT_EXT.7: 1
- FIA_BLT_EXT.7.1: 1
- FIA_BMG_EXT: 1
- FIA_BMG_EXT.1: 11
- FIA_PAE_EXT: 3
- FIA_PAE_EXT.1: 1
- FIA_PAE_EXT.1.1: 1
- FIA_PMG_EXT: 3
- FIA_PMG_EXT.1: 1
- FIA_PMG_EXT.1.1: 1
- FIA_PSK_EXT: 3
- FIA_PSK_EXT.1: 1
- FIA_PSK_EXT.1.1: 1
- FIA_PSK_EXT.1.2: 1
- FIA_PSK_EXT.1.3: 1
- FIA_TRT_EXT: 3
- FIA_TRT_EXT.1: 1
- FIA_TRT_EXT.1.1: 1
- FIA_UAU: 6
- FIA_UAU.5: 2
- FIA_UAU.5.1: 3
- FIA_UAU.5.2: 1
- FIA_UAU.6: 3
- FIA_UAU.6.1: 1
- FIA_UAU.6.2: 1
- FIA_UAU.7: 2
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 9
- FIA_UAU_EXT.1: 1
- FIA_UAU_EXT.1.1: 1
- FIA_UAU_EXT.2: 1
- FIA_UAU_EXT.2.1: 1
- FIA_UAU_EXT.2.2: 1
- FIA_UAU_EXT.4: 1
- FIA_UAU_EXT.4.1: 1
- FIA_UAU_EXT.4.2: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MOF_EXT: 3
- FMT_MOF_EXT.1: 1
- FMT_MOF_EXT.1.1: 1
- FMT_MOF_EXT.1.2: 1
- FMT_SMF: 3
- FMT_SMF.1: 1
- FMT_SMF_EXT: 14
- FMT_SMF_EXT.1: 7
- FMT_SMF_EXT.1.1: 1
- FMT_SMF_EXT.2: 1
- FMT_SMF_EXT.2.1: 1
- FMT_SMF_EXT.3: 2
- FMT_SMF_EXT.3.1: 1
- FPT:
- FPT_AEX_EXT: 18
- FPT_AEX_EXT.1: 1
- FPT_AEX_EXT.1.1: 1
- FPT_AEX_EXT.1.2: 1
- FPT_AEX_EXT.2: 1
- FPT_AEX_EXT.2.1: 1
- FPT_AEX_EXT.3: 1
- FPT_AEX_EXT.3.1: 1
- FPT_AEX_EXT.4: 1
- FPT_AEX_EXT.4.1: 1
- FPT_AEX_EXT.4.2: 1
- FPT_AEX_EXT.5: 1
- FPT_AEX_EXT.5.1: 1
- FPT_AEX_EXT.5.2: 1
- FPT_AEX_EXT.6.1: 1
- FPT_BBD_EXT: 3
- FPT_BBD_EXT.1: 1
- FPT_BBD_EXT.1.1: 1
- FPT_JTA_EXT: 3
- FPT_JTA_EXT.1: 1
- FPT_JTA_EXT.1.1: 1
- FPT_KST_EXT: 9
- FPT_KST_EXT.1: 1
- FPT_KST_EXT.1.1: 1
- FPT_KST_EXT.2: 1
- FPT_KST_EXT.2.1: 1
- FPT_KST_EXT.3: 1
- FPT_KST_EXT.3.1: 1
- FPT_NOT_EXT: 3
- FPT_NOT_EXT.1: 1
- FPT_NOT_EXT.1.1: 1
- FPT_STM: 2
- FPT_STM.1: 1
- FPT_STM.1.1: 1
- FPT_TST_EXT: 17
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.2: 3
- FPT_TUD_EXT: 10
- FPT_TUD_EXT.1: 1
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FPT_TUD_EXT.2: 3
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FPT_TUD_EXT.2.3: 1
- FPT_TUD_EXT.3: 1
- FPT_TUD_EXT.3.1: 1
- FPT_TUD_EXT.6: 1
- FPT_TUD_EXT.6.1: 1
- FTA:
- FTA_SSL_EXT: 3
- FTA_SSL_EXT.1: 2
- FTA_SSL_EXT.1.1: 1
- FTA_SSL_EXT.1.2: 1
- FTA_SSL_EXT.1.3: 1
- FTA_TAB: 2
- FTA_TAB.1: 2
- FTA_TAB.1.1: 1
- FTA_WSE_EXT: 3
- FTA_WSE_EXT.1: 2
- FTA_WSE_EXT.1.1: 1
- FTP:
- FTP_BLT_EXT: 10
- FTP_BLT_EXT.1: 1
- FTP_BLT_EXT.1.1: 1
- FTP_BLT_EXT.1.2: 1
- FTP_BLT_EXT.2: 1
- FTP_BLT_EXT.2.1: 1
- FTP_BLT_EXT.3: 2
- FTP_ITC: 1
- FTP_ITC_EXT: 5
- FTP_ITC_EXT.1: 4
- FTP_ITC_EXT.1.1: 1
- FTP_ITC_EXT.1.2: 1
- FTP_ITC_EXT.1.3: 1
|
- FAU:
- FCS:
- FCS_CAP.1: 1
- FCS_CKM: 2
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 4
- FCS_COP: 1
- FCS_COP.1: 12
- FCS_COP.1.1: 1
- FDP:
- FDP_IFC.1: 8
- FDP_IFC.1.1: 1
- FDP_IFF.1: 6
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC: 1
- FDP_ITC.1: 3
- FDP_ITC.2: 2
- FDP_RIP.1: 1
- FIA:
- FIA_AFL.1: 23
- FIA_AFL.1.1: 3
- FIA_AFL.1.2: 3
- FIA_EID.1: 1
- FIA_SOS.1: 17
- FIA_SOS.1.1: 3
- FIA_SSL.3: 1
- FIA_UAU.1: 9
- FIA_UAU.2: 19
- FIA_UAU.2.1: 2
- FIA_UAU.6: 7
- FIA_UAU.6.1: 1
- FIA_UAU.7: 9
- FIA_UAU.7.1: 1
- FIA_UID.1: 11
- FIA_UID.2: 18
- FIA_UID.2.1: 3
- FMT:
- FMT_MOF.1: 22
- FMT_MOF.1.1: 4
- FMT_MSA: 1
- FMT_MSA.3: 2
- FMT_MTD.1: 33
- FMT_MTD.1.1: 4
- FMT_SMF.1: 46
- FMT_SMF.1.1: 1
- FMT_SMR.1: 60
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FTA:
- FTA_SSL.3: 4
- FTA_SSL.3.1: 1
|
pdf_data/st_keywords/cc_claims |
- OE:
- OE.CONFIG: 1
- OE.DATA_PROPER_USER: 1
- OE.NOTIFY: 1
- OE.NO_TOE_BYPASS: 2
- OE.PHYSICAL: 1
- OE.PRECAUTION: 1
- OE.TRUSTED_ADMIN: 1
- OE.TRUSTED_CONFIG: 1
|
- A:
- A.ADMIN: 3
- A.IC-CARD: 3
- A.NETWORK: 3
- A.SECRET: 2
- A.SERVICE: 2
- A.SETTING: 2
- O:
- O.CRYPTO-CAPABILITY: 5
- O.CRYPTO-KEY: 5
- O.DECRYPT-PRINT: 5
- O.FAX-CONTROL: 5
- O.MAIL-CRYPTO: 5
- O.MAIL-SIGN: 4
- O.OVERWRITE-ALL: 4
- O.PKI-CAPABILITY: 9
- OE:
- OE.ADMIN: 3
- OE.CARD-USER: 3
- OE.DRIVER: 3
- OE.FAX-UNIT: 3
- OE.IC-CARD: 6
- OE.NETWORK: 3
- OE.SECRET: 3
- OE.SERVICE: 3
- OE.SETTING-SECURITY: 3
- OE.SIGN: 3
- T:
- T.BRING-OUT-STORAGE: 2
- T.DISCARD-MFP: 3
|
pdf_data/st_keywords/vendor |
- Broadcom:
- Qualcomm:
- Samsung:
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 21
- AES-: 5
- AES-128: 1
- AES-256: 11
- constructions:
- MAC:
- HMAC: 11
- HMAC-SHA-256: 3
- HMAC-SHA-384: 2
- HMAC-SHA-512: 3
|
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 6
- DHE: 1
- Diffie-Hellman: 6
- RSA:
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 23
- SHA-384: 3
- SHA-512: 2
- scrypt:
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 12
- IKEv1: 13
- IKEv2: 11
- IPsec:
- TLS:
- TLS:
- TLS: 60
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 2
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 16
- P-384: 10
- P-521: 8
- secp256r1: 2
- secp384r1: 2
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_GCM_SHA384: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-4: 6
- FIPS 186-4: 6
- FIPS 197: 9
- FIPS 198-1: 5
- FIPS PUB 186-4: 5
- FIPS PUB 197: 2
- NIST:
- NIST SP 800-132: 4
- NIST SP 800-38A: 1
- NIST SP 800-38C: 1
- NIST SP 800-38D: 1
- NIST SP 800-38E: 1
- NIST SP 800-38F: 1
- NIST SP 800-57: 1
- SP 800-108: 4
- SP 800-38A: 2
- SP 800-38C: 2
- SP 800-38E: 2
- SP 800-38F: 1
- SP 800-56A: 1
- SP 800-90A: 4
- PKCS:
- RFC:
- RFC 2246: 1
- RFC 2560: 1
- RFC 2818: 2
- RFC 3394: 2
- RFC 3526: 2
- RFC 3602: 2
- RFC 4106: 2
- RFC 4109: 1
- RFC 4301: 2
- RFC 4303: 1
- RFC 4346: 1
- RFC 4945: 2
- RFC 5216: 1
- RFC 5246: 4
- RFC 5280: 4
- RFC 5282: 2
- RFC 5288: 3
- RFC 5289: 8
- RFC 5746: 1
- RFC 5759: 1
- RFC 6125: 1
- RFC 6379: 2
- RFC 6960: 1
- RFC 8247: 1
- RFC 8784: 1
- X509:
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS 180-2: 4
- FIPS 186-2: 6
- FIPS PUB 197: 3
- FIPS186-2: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
- com:
- com.samsung.android.knox.net.vpn: 1
- java:
|
|
pdf_data/st_keywords/certification_process |
|
- ConfidentialDocument:
- that encryption print for a printer data transmitted to MFP from client PC among the highly confidential document exchanged between MFP and client PC. Also, it provides the protection function for scan image data: 1
|
pdf_data/st_metadata |
- /Author: Brian Wood;Ranjit Mallela
- /CreationDate: D:20230411103255-04'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20230411103255-04'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Title: Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 12 - Winter (MDFPP31/WLANC10/VPNC21) Security Target
- pdf_file_size_bytes: 1328397
- pdf_hyperlinks: https://developer.android.com/reference/android/net/VpnService.html, https://source.android.com/security/apksigning/v3, http://www.gossamersec.com/, http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.ddi0487a.f/index.html, https://security.samsungmobile.com/, http://developer.android.com/reference/javax/net/ssl/HttpsURLConnection.html, http://www.wi-fi.org/certification, https://source.android.com/security/, http://developer.android.com/reference/javax/net/ssl/SSLContext.html, https://developer.android.com/reference/android/app/admin/SecurityLog, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=34960, https://source.android.com/source/report-bugs.html, https://security.samsungmobile.com/securityReporting.smsb, https://seap.samsung.com/api-references/android/reference/com/samsung/android/knox/net/vpn/package-summary.html, http://developer.android.com/reference/android/bluetooth/package-summary.html
- pdf_is_encrypted: False
- pdf_number_of_pages: 90
|
- /Author:
- /CreationDate: D:20101202160119+09'00'
- /Creator: Word 用 Acrobat PDFMaker 7.0
- /ModDate: D:20101202160245+09'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Title: Microsoft Word - C0264_ASE.doc
- /_AdHocReviewCycleID: -693642671
- /_PreviousAdHocReviewCycleID: -688275005
- pdf_file_size_bytes: 426722
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 57
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |