Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
RICOH Remote Communication Gate A2 V1.0.2
JISEC-CC-CRP-C0535
Veridos Suite v4.0 – cryptovision ePasslet Suite – Java Card applet configuration providing Secure Signature Creation Device with Key generation (SSCD)
NSCIB-CC-2300088-01-CR
name RICOH Remote Communication Gate A2 V1.0.2 Veridos Suite v4.0 – cryptovision ePasslet Suite – Java Card applet configuration providing Secure Signature Creation Device with Key generation (SSCD)
category Network and Network-Related Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP NL
status archived active
not_valid_after 27.12.2021 12.01.2029
not_valid_before 27.12.2016 12.01.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0535_eimg.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300088-01-Cert.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0535_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300088-01-CR2.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0535_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300088-01-ST_lite_v17.pdf
manufacturer Ricoh Company, Ltd. Veridos GmbH - Identity Solutions by Giesecke & Devrient and Bundesdruckerei
manufacturer_web https://www.ricoh.com/ https://www.veridos.com
security_level EAL2+, ALC_FLR.2 ALC_DVS.2, EAL5+, AVA_VAN.5
dgst 0ce03afffa8e1437 b915733225e0ec7e
heuristics/cert_id JISEC-CC-CRP-C0535 NSCIB-CC-2300088-01-CR
heuristics/cert_lab []
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 1.0.2 4.0
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-1107-V3-2022
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-1107-V3-2022
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0535
  • certification_date: 01.12.2016
  • claim: EAL2+ALC_FLR.2
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.2
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0535_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a communication device that enables digital MFPs and printers (hereafter "devices") to be connected to the communication server (hereafter "CS") in the maintenance center. Information that the TOE obtains from the device and sends to the CS is also sent to the designated email address. Functions this TOE can provide include notification of device troubles (service call function), automatic counter checking of prints of each devices (machine counter notice function), automatic counter checking of prints by each user (counter per user retrieval function), automatic ordering of supplies such as toner (supply call function), and device firmware updating. It also provides Web-based user interface functions for TOE operations. TOE security functionality The major security functions this TOE can provide are as follows: - Communication data protection function between the TOE and the device for the service This function is used for communication between the TOE and devices for the service if the service call function, the machine counter notice function, the counter per user retrieval function, and the supply call function are enabled. The communication data between the TOE and the Ricoh device will be secured, and the data tampering will be detected by using a TLS protocol. - Communication data protection function between the TOE and the CS The TOE specifies only the genuine CS as the communication destination via Internet. The communication data between the TOE and the CS will be secured, and the data tampering will be detected by using a TLS protocol. - Communication data protection function between the TOE and computers This function is applied to data communication between the TOE and computers if Web-based functions are enabled. The communication data will be secured and the data tampering will be detected by using a TLS protocol. - Email protection function This function is applied to make mail sent from the TOE. The contents of the mail will be secured and the data tampering will be detected by using S/MIME. - User identification and authentication function The TOE identifies and authenticates users who access Web-based user interface functions. - RC Gate firmware verification function This function enables the TOE to check that the firmware (applications, shared parts of firmware, platforms, and the operating system) is genuine. - Security management function This function provides TOE management methods for the Administrator only. - Audit logging function This function enables the TOE to record the information related to security relevant events and allows only the administrator to review the audit logging.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: RICOH Remote Communication Gate A2
    • product_type: Appliance for remote service
    • protection_profile: none
    • report_link: https://www.ipa.go.jp/en/security/c0535_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0535_est.pdf
    • toe_version: V1.0.2
    • vendor: RICOH COMPANY, LTD.
  • expiration_date: 01.01.2022
  • supplier: RICOH COMPANY, LTD.
  • toe_japan_name: RICOH Remote Communication Gate A2V1.0.2
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0535_it4523.html
  • toe_overseas_name: RICOH Remote Communication Gate A2V1.0.2
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-1107-V3-2022, NSCIB-CC-2300005-01-CR
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-1107-V3-2022, NSCIB-CC-2300005-01-CR
heuristics/protection_profiles {} 1f7ea2e05de5b88b
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf
pdf_data/cert_filename c0535_eimg.pdf NSCIB-CC-2300088-01-Cert.pdf
pdf_data/cert_keywords/cc_cert_id
  • NL:
    • NSCIB-2300088-01: 1
    • NSCIB-CC-2300088-01: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
  • EAL:
    • EAL 7: 1
    • EAL2: 1
    • EAL5: 1
    • EAL5 augmented: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.3: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/vendor
  • GD:
    • Giesecke+Devrient: 1
pdf_data/cert_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 1
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-1: 2
    • ISO/IEC 18045: 4
    • ISO/IEC 18045:2008: 1
pdf_data/cert_metadata
  • /CreationDate: D:20170306102238+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 11
  • /Keywords:
  • /ModDate: D:20170306102454+09'00'
  • /Producer: Adobe PDF Library 11.0
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 452634
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 1
  • /Author: Denise Cater
  • /CreationDate: D:20240131115646+00'00'
  • /Creator: Microsoft® Word 2021
  • /ModDate: D:20240131115646+00'00'
  • /Producer: Microsoft® Word 2021
  • /Title: NSCIB Certificate
  • pdf_file_size_bytes: 180484
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename c0535_erpt.pdf NSCIB-CC-2300088-01-CR2.pdf
pdf_data/report_frontpage
  • NL:
  • NL:
    • cert_id: NSCIB-CC-2300088-01
    • cert_item: Veridos Suite v4.0 – cryptovision ePasslet Suite – Java Card applet configuration providing Secure Signature Creation Device with Key generation (SSCD
    • cert_lab: SGS Brightsight B.V.
    • developer: cv cryptovision GmbH
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0535-01: 1
    • Certification No. C0535: 1
  • DE:
    • BSI-DSZ-CC-1107-V3-2022: 2
  • NL:
    • NSCIB-2300088-01: 1
    • NSCIB-CC-2300005-01-MA: 1
    • NSCIB-CC-2300088-01: 13
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
  • EAL:
    • EAL 5: 1
    • EAL 5 augmented: 1
    • EAL4: 1
    • EAL5: 1
    • EAL5 augmented: 1
    • EAL5+: 1
    • EAL6+: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 2
  • ALC:
    • ALC_DVS.2: 2
  • AVA:
    • AVA_VAN.5: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.CE: 1
    • A.DEVICE: 1
    • A.NO_THRU_TRAFFIC: 1
    • A.PHYSICAL_: 1
    • A.TRUSTED_: 1
  • T:
    • T.FAKE_NOTICE_: 1
    • T.FAKE_NOTICE_POINT: 1
    • T.HTTPS_DEV: 2
    • T.PC_WEB: 2
    • T.UNAUTHORIZED_: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNTRUSTED_: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.UPDATE_: 1
    • T.UPDATE_COMPROMISE: 1
pdf_data/report_keywords/vendor
  • GD:
    • Giesecke+Devrient: 2
  • Infineon:
    • Infineon Technologies AG: 2
pdf_data/report_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 4
  • BrightSight:
    • Brightsight: 4
  • SGS:
    • SGS: 4
    • SGS Brightsight: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
      • AES128: 1
      • AES192: 1
      • AES256: 1
  • DES:
    • 3DES:
      • 3DES: 1
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CBC-MAC: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 19
  • PACE:
    • PACE: 4
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
  • TRNG:
    • TRNG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • side-channel: 1
  • other:
    • JIL: 2
    • JIL-AAPS: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • following proprietary or non-standard algorithms, protocols and implementations: none, which are out of scope as there are no security claims relating to these. Page: 10/13 of report number: 1
    • out of scope: 1
pdf_data/report_metadata
  • /CreationDate: D:20170406114307+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 11
  • /ModDate: D:20170406114353+09'00'
  • /Producer: Adobe PDF Library 11.0
  • /Title:
  • pdf_file_size_bytes: 447326
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 34
pdf_data/st_filename c0535_est.pdf NSCIB-CC-2300088-01-ST_lite_v17.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1107-V3-2022: 3
  • NL:
    • NSCIB-2300088-01: 1
    • NSCIB-CC-2300005-01-CR: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-: 1
    • BSI-CC-PP-0059-2009-MA-02: 3
    • BSI-CC-PP-0084-: 1
    • BSI-PP-0006-2002T: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 2
  • EAL:
    • EAL 5: 2
    • EAL 5 augmented: 1
    • EAL 5+: 1
    • EAL 6+: 2
    • EAL4: 1
    • EAL4 augmented: 1
    • EAL5: 4
    • EAL5 augmented: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_IMP.1: 2
    • ADV_INT.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE: 5
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 7
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 15
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 7
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 9
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 7
    • FAU_STG.4.1: 1
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 4
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.6: 7
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 6
    • FIA_UID.2: 9
    • FIA_UID.2.1: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MTD.1: 7
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 8
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FUD: 3
    • FPT_FUD.1: 14
    • FPT_FUD.1.1: 2
    • FPT_FUD.1.2: 2
    • FPT_FUD.1.3: 2
    • FPT_FUD.2: 12
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
  • FTA:
    • FTA_SSL.1: 7
    • FTA_SSL.1.1: 1
    • FTA_SSL.1.2: 1
  • FTP:
    • FTP_ITC.1: 22
    • FTP_ITC.1.1: 3
    • FTP_ITC.1.2: 3
    • FTP_ITC.1.3: 3
    • FTP_SSL.1: 1
    • FTP_SSL.3: 1
    • FTP_TRP.1: 6
    • FTP_TRP.1.1: 1
  • FAU:
    • FAU_ARP.1: 1
    • FAU_GEN: 1
  • FCO:
    • FCO_NRO: 1
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 24
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 14
    • FCS_CKM.4.1: 3
    • FCS_COP: 22
    • FCS_COP.1: 23
    • FCS_RND: 8
    • FCS_RND.1: 10
    • FCS_RND.1.1: 2
    • FCS_RNG.1: 2
  • FDP:
    • FDP_ACC: 28
    • FDP_ACC.1: 23
    • FDP_ACF: 19
    • FDP_ACF.1: 42
    • FDP_IFC: 2
    • FDP_IFC.1: 8
    • FDP_IFF: 2
    • FDP_ITC: 2
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
    • FDP_RIP: 9
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 2
    • FDP_ROL: 1
    • FDP_SDI: 13
    • FDP_SDI.1: 2
    • FDP_SDI.2: 11
    • FDP_UIT: 1
  • FIA:
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 3
    • FIA_AFL.1.2: 3
    • FIA_ATD: 1
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 4
    • FIA_UAU.1.2: 3
    • FIA_UID: 2
    • FIA_UID.1: 13
    • FIA_UID.1.1: 3
    • FIA_UID.1.2: 3
    • FIA_USB: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 2
    • FMT_MSA: 23
    • FMT_MSA.1: 7
    • FMT_MSA.2: 6
    • FMT_MSA.2.1: 2
    • FMT_MSA.3: 16
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MSA.4: 7
    • FMT_MSA.4.1: 2
    • FMT_MTD: 15
    • FMT_MTD.1: 6
    • FMT_SMF: 2
    • FMT_SMF.1: 22
    • FMT_SMF.1.1: 2
    • FMT_SMR: 3
    • FMT_SMR.1: 24
    • FMT_SMR.1.1: 4
    • FMT_SMR.1.2: 3
  • FPR:
    • FPR_UNO.1: 1
  • FPT:
    • FPT_EMS: 8
    • FPT_EMS.1: 11
    • FPT_EMS.1.1: 5
    • FPT_EMS.1.2: 4
    • FPT_FLS: 3
    • FPT_FLS.1: 12
    • FPT_FLS.1.1: 2
    • FPT_PHP.1: 6
    • FPT_PHP.1.1: 3
    • FPT_PHP.1.2: 3
    • FPT_PHP.3: 11
    • FPT_PHP.3.1: 3
    • FPT_RCV: 1
    • FPT_TDC.1: 1
    • FPT_TST: 2
    • FPT_TST.1: 15
    • FPT_TST.1.1: 2
    • FPT_TST.1.2: 2
    • FPT_TST.1.3: 2
  • FTP:
    • FTP_ITC: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.CE: 3
    • A.DEVICE: 2
    • A.NO_THRU_TRAFFIC_PROTECTION: 2
    • A.PHYSICAL_PROTECTION: 3
    • A.TRUSTED_ADMINISTRATOR: 3
  • O:
    • O.ACCESS: 8
    • O.AUDIT_LOGGED: 13
    • O.GENUINE: 8
    • O.TRUSTED: 2
    • O.TRUSTED_: 6
    • O.TRUSTED_NOTICE_POINT: 8
  • OE:
    • OE.CE: 3
    • OE.DEVICE: 4
    • OE.NO_THRU_TRAFFIC_PROTECT: 2
    • OE.NO_THRU_TRAFFIC_PROTECTION: 2
    • OE.PHYSICAL: 4
    • OE.TRUSTED_ADMIN: 3
  • T:
    • T.FAKE_NOTICE_POINT: 3
    • T.HTTPS_DEV: 3
    • T.PC_WEB: 2
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 3
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 2
    • T.UPDATE_COMPROMISE: 2
  • A:
    • A.CAP_FILE: 1
    • A.CGA: 2
    • A.SCA: 2
    • A.VERIFICATION: 1
  • O:
    • O.ALARM: 1
    • O.ARRAY_VIEWS_CONFID: 1
    • O.CARD-MANAGEMENT: 1
    • O.CIPHER: 1
    • O.DELETION: 1
    • O.FIREWALL: 1
    • O.GLOBAL_ARRAYS_CONFID: 1
    • O.GLOBAL_ARRAYS_INTEG: 1
    • O.INSTALL: 1
    • O.KEY-MNGT: 1
    • O.LOAD: 1
    • O.NATIVE: 1
    • O.OBJ-DELETION: 1
    • O.OPERATE: 1
    • O.PIN-MNGT: 1
    • O.REALLOCATION: 1
    • O.RESOURCES: 1
    • O.RNG: 1
    • O.SCP: 3
    • O.SID: 1
    • O.TRANSACTION: 1
  • OE:
    • OE.CAP_FILE: 1
    • OE.CODE-EVIDENCE: 1
    • OE.HID_VAD: 3
    • OE.VERIFICATION: 1
  • T:
    • T.CONFID-APPLI-DATA: 1
    • T.CONFID-JCS-CODE: 1
    • T.CONFID-JCS-DATA: 1
    • T.DELETION: 1
    • T.EXE-CODE: 2
    • T.INSTALL: 1
    • T.INTEG-APPLI-CODE: 2
    • T.INTEG-APPLI-DATA: 2
    • T.INTEG-JCS-CODE: 1
    • T.INTEG-JCS-DATA: 1
    • T.NATIVE: 1
    • T.OBJ-DELETION: 1
    • T.PHYSICAL: 1
    • T.RESOURCES: 1
    • T.SECURE_DELETION: 1
    • T.SID: 2
pdf_data/st_keywords/vendor
  • GD:
    • Giesecke & Devrient: 1
  • Infineon:
    • Infineon: 3
    • Infineon Technologies AG: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 9
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 6
    • ECDSA:
      • ECDSA: 5
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 2
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 19
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 8
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • fault injection: 1
    • malfunction: 1
    • physical tampering: 11
  • SCA:
    • DPA: 2
    • SPA: 2
    • physical probing: 1
    • timing attacks: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • BSI:
    • AIS 20: 1
    • AIS20: 3
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS PUB 186-3: 1
    • FIPS180-4: 3
    • FIPS186-3: 2
    • FIPS197: 2
  • ICAO:
    • ICAO: 9
  • ISO:
    • ISO/IEC 7816-4: 1
  • PKCS:
    • PKCS#15: 4
    • PKCS1: 3
  • RFC:
    • RFC 5639: 1
    • RFC5639: 3
  • X509:
    • X.509: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • No contradiction to this ST. FDP_RIP.1/GlobalArray No correspondence. Out of scope (internal Java Card func- tionality: 1
    • No contradiction to this ST. FDP_ROL.1/FIREWALL No correspondence. Out of scope (internal Java Card Fire- wall: 1
    • No contradiction to this ST. FMT_MSA.2/FIREWALL-JCVM No correspondence Out of scope (internal Java Card Fire- wall: 1
    • No contradiction to this ST. FMT_SMR.1/Installer No correspondence Out of scope (internal Java Card func- tionality: 1
    • No contradiction to this ST. FPT_RCV.3/Installer No correspondence Out of scope (internal Java Card func- tionality: 1
    • While D.Sig provides the TOE’s functionality claimed by this security target, the PKCS#15 part is out of scope of the certification: 1
    • While D.Sig provides the TOE’s functionality claimed by this security target, the PKCS#15 part is out of scope of the certification. 1.4.4 TOE identification Identification of the platform is performed by the: 1
    • 21 of 73 Platform SFR Correspondence in this ST References/Remarks FIA_UID.1/CM No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/CM No correspondence: 1
    • ADEL) policy on security aspects outside the runtime. FDP_ACC.2/ADEL No correspondence Out of scope (internal Java Card func- tionality: 1
    • DRG.3) that can be used directly. FDP_RIP.1/ABORT No correspondence. Out of scope (internal Java Card func- tionality: 1
    • DTBS_Forgery, T.Sig_Forgery No contradiction to this ST. T.INTEG-APPLI-DATA.LOAD No correspondence Out of scope. No contradiction to this ST. T.INTEG-JCS-CODE No correspondence Out of scope. No contradiction to: 1
    • O. ARRAY_VIEWS_INTEG OT.DTBS_Integrity_TOE No contradiction to this ST. O.NATIVE No correspondence Out of scope. No contradiction to this ST. Veridos Suite v4.0 - cryptovision ePasslet Suite / SSCD Security: 1
    • O.LOAD No correspondence Out of scope. No contradiction to this ST. O.INSTALL No correspondence Out of scope. No contradiction to this ST. O.CARD-MANAGEMENT No correspondence Out of scope. No contradiction to: 1
    • Out of scope: 81
    • Out of scope (internal Java Card Fire- wall). The resulting requirements for applets are reflected in the User: 2
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/GlobalArray No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/KEYS No correspondence: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/TRANSIENT No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/bArray No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_ROL.1/FIREWALL No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1/Installer No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_RCV.3/Installer No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. Veridos Suite v4.0 -: 1
    • SID.2 No correspondence Out of scope. No contradiction to this ST. T.EXE-CODE.1 No correspondence Out of scope. No contradiction to this ST. T.EXE-CODE.2 No correspondence Out of scope. No contradiction to this: 1
    • ST. O.OBJ-DELETION No correspondence Out of scope. No contradiction to this ST. O.DELETION No correspondence Out of scope. No contradiction to this: 1
    • ST. O.RESOURCES No correspondence Out of scope. No contradiction to this ST. O.ALARM OT.Tamper_ID OT.Tamper_Resistance Relevant for the protection: 1
    • ST. T.INSTALL No correspondence Out of scope. No contradiction to this ST. T.OBJ-DELETION No correspondence Out of scope. No contradiction to: 1
    • ST. T.INTEG-APPLI-CODE No correspondence Out of scope. No contradiction to this ST. T.INTEG-APPLI-CODE.LOAD No correspondence Out of scope. No: 1
    • ST. T.INTEG-JCS-DATA No correspondence Out of scope. No contradiction to this ST. T.SID.1 No correspondence Out of scope. No contradiction to this ST: 1
    • T.DELETION No correspondence Out of scope. No contradiction to this ST. T.SECURE_DELETION No correspondence Out of scope. No contradiction to: 1
    • T.NATIVE No correspondence Out of scope. No contradiction to this ST. T.RESOURCES No correspondence Out of scope. No contradiction to this: 1
    • T.SCD_Divulg, T.SCD_Derive No contradiction to this ST. T.CONFID-JCS-CODE No correspondence Out of scope. No contradiction to this ST. T.CONFID-JCS-DATA No correspondence Out of scope. No contradiction to: 1
    • The objectives are related. No con- tradiction to this ST. O.SCP.RECOVERY No correspondence Out of scope. No contradiction to this ST. O.SCP.SUPPORT No correspondence Out of scope. No contradiction to: 1
    • a defined quality met- ric (DRG.3) that can be used directly. FDP_RIP.1/ABORT No correspondence. Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/APDU No correspondence: 1
    • chapter 8.1.1.1 in platform ST) FDP_ACC.2/FIREWALL No correspondence Out of scope (internal Java Card Fire- wall: 1
    • chapter 8.1.1.4 in platform ST) FIA_ATD.1/AID No correspondence. Out of scope (internal Java Card func- tionality: 1
    • complement Java Card OS mechanisms. No contradiction to this ST. FPT_TDC.1 No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_TST.1 FPT_TST.1 Self-testing: 1
    • initial start-up. Aid Management (chapter 8.1.1.4 in platform ST) FIA_ATD.1/AID No correspondence. Out of scope (internal Java Card func- tionality). No contradiction to this ST. FIA_UID.2/AID No correspondence: 1
    • internal Java Card Fire- wall). No contradiction to this ST. FMT_MSA.1/JCRE No correspondence Out of scope (internal Java Card Fire- wall: 1
    • internal Java Card Fire- wall). No contradiction to this ST. FMT_MSA.1/JCVM No correspondence Out of scope (internal Java Card Fire- wall). No contradiction to this ST. FMT_MSA.2/FIREWALL-JCVM No: 1
    • internal Java Card Fire- wall). No contradiction to this ST. FMT_SMF.1 No correspondence Out of scope (internal Java Card Fire- wall: 1
    • internal Java Card Fire- wall). No contradiction to this ST. FMT_SMR.1 No correspondence Out of scope (internal Java Card Fire- wall). No contradiction to this ST. Application Programming Interface: 1
    • internal Java Card func- tionality). No contradiction to this ST. FDP_IFC.2/CM No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FDP_IFF.1/CM No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_UIT.1/CM No correspondence: 1
    • internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/ADEL No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/ADEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/ADEL No correspondence: 1
    • internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/KEYS No correspondence. Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FDP_UIT.1/CM No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FIA_USB.1/AID No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FIA_USB.1/AID No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MTD.1/JCRE No correspondence: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/CM No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/ADEL No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/ADEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/ADEL No correspondence: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/CM No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/CM No correspondence: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_MTD.3/JCRE No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_MTD.3/JCRE No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. INSTG Security Functional: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/CM No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/ADEL No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/ADEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1/ADEL No correspondence: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/CM No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FTP_ITC.1/CM No correspondence: 1
    • internal Java Card func- tionality). No contradiction to this ST. FTP_ITC.1/CM No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Virtual Machine). No contradiction to this ST. FDP_IFF.1/JCVM No correspondence Out of scope (internal Java Virtual Machine: 1
    • internal Java Virtual Machine). No contradiction to this ST. FDP_RIP.1/OBJECTS No correspondence. Out of scope (internal Java Card Fire- wall). No contradiction to this ST. FMT_MSA.1/JCRE No correspondence Out: 1
    • manager (ADEL) policy on security aspects outside the runtime. FDP_ACC.2/ADEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_ACF.1/ADEL No correspondence: 1
    • objectives for the TOE and are covered by SFRs in the platform ST. FTP_ITC.1/CMGR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. SCPG Security Functional: 1
    • objectives. Platform Objective Correspondence in this ST References/Remarks O.SID No correspondence Out of scope. No contradiction to this ST. O.FIREWALL No correspondence Out of scope. No contradiction to this: 1
    • of 73 Platform Objective Correspondence in this ST References/Remarks O.OPERATE No correspondence Out of scope. No contradiction to this ST. O.REALLOCATION No correspondence Out of scope. No contradiction to: 1
    • of the TOE. No contradic- tion to this ST. FDP_IFC.1/JCVM No correspondence Out of scope (internal Java Virtual Machine). No contradiction to this ST. FDP_IFF.1/JCVM No correspondence Out: 1
    • of the TOE. No contradic- tion to this ST. FMT_MSA.3/FIREWALL No correspondence Out of scope (internal Java Card Fire- wall). The resulting requirements for applets are reflected in the User: 1
    • of the TOE. No contradic- tion to this ST. FMT_MSA.3/JCVM No correspondence Out of scope (internal Java Card Fire- wall). No contradiction to this ST. FMT_SMF.1 No correspondence Out of: 1
    • out of scope: 1
    • platform ST) Firewall Policy (chapter 8.1.1.1 in platform ST) FDP_ACC.2/FIREWALL No correspondence Out of scope (internal Java Card Fire- wall). The resulting requirements for Veridos Suite v4.0 - cryptovision: 1
    • that owns the deleted objects by invoking a specific API method. FDP_RIP.1/ODEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1/ODEL FPT_FLS.1 The: 1
    • the User Guidance of the TOE. No contradic- tion to this ST. FDP_ACF.1/FIREWALL No correspondence Out of scope (internal Java Card Fire- wall). The resulting requirements for applets are reflected in the User: 1
    • the plat- form leads to secrecy of SCD. No contradiction to this ST. O.PIN-MNGT No correspondence Out of scope. No contradiction to this ST. O.TRANSACTION No correspondence Out of scope. No contradiction to: 1
    • verified, or that has been modified after bytecode verification. FCO_NRO.2/CM No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_IFC.2/CM No correspondence: 1
    • which addresses security aspects outside the runtime. FDP_ITC.2/Installer No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/Installer No: 1
pdf_data/st_metadata
  • /CreationDate: D:20170324135725+09'00'
  • /Creator: Microsoft® Word 2013
  • /ModDate: D:20170324135725+09'00'
  • /Producer: Microsoft® Word 2013
  • /Title: RICOH Remote Communication Gate A2 Security Target
  • pdf_file_size_bytes: 575869
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 50
  • /Author: bdrisch
  • /CreationDate: D:20231107145429+01'00'
  • /Creator: Microsoft® Word für Microsoft 365
  • /Keywords: SSCD, ePasslet Suite, electronic Signature
  • /MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_ActionId: bf9dff47-6206-446f-8b1e-83c3dd9c7ad5
  • /MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_ContentBits: 0
  • /MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_Enabled: true
  • /MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_Method: Standard
  • /MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_Name: All Employees_2
  • /MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_SetDate: 2023-09-28T13:18:22Z
  • /MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_SiteId: 33440fc6-b7c7-412c-bb73-0e70b0198d5a
  • /ModDate: D:20231107145429+01'00'
  • /Producer: Microsoft® Word für Microsoft 365
  • /Title: Security Target ePasslet/ePKI-SSCD
  • pdf_file_size_bytes: 1444868
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 73
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different