name |
RICOH Remote Communication Gate A2 V1.0.2 |
Veridos Suite v4.0 – cryptovision ePasslet Suite – Java Card applet configuration providing Secure Signature Creation Device with Key generation (SSCD) |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
NL |
status |
archived |
active |
not_valid_after |
27.12.2021 |
12.01.2029 |
not_valid_before |
27.12.2016 |
12.01.2024 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0535_eimg.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300088-01-Cert.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0535_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300088-01-CR2.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0535_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300088-01-ST_lite_v17.pdf |
manufacturer |
Ricoh Company, Ltd. |
Veridos GmbH - Identity Solutions by Giesecke & Devrient and Bundesdruckerei |
manufacturer_web |
https://www.ricoh.com/ |
https://www.veridos.com |
security_level |
EAL2+, ALC_FLR.2 |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
dgst |
0ce03afffa8e1437 |
b915733225e0ec7e |
heuristics/cert_id |
JISEC-CC-CRP-C0535 |
NSCIB-CC-2300088-01-CR |
heuristics/cert_lab |
[] |
|
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
1.0.2 |
4.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1107-V3-2022 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1107-V3-2022 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0535
- certification_date: 01.12.2016
- claim: EAL2+ALC_FLR.2
- enhanced:
- assurance_level: EAL2 Augmented with ALC_FLR.2
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0535_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This TOE is a communication device that enables digital MFPs and printers (hereafter "devices") to be connected to the communication server (hereafter "CS") in the maintenance center. Information that the TOE obtains from the device and sends to the CS is also sent to the designated email address. Functions this TOE can provide include notification of device troubles (service call function), automatic counter checking of prints of each devices (machine counter notice function), automatic counter checking of prints by each user (counter per user retrieval function), automatic ordering of supplies such as toner (supply call function), and device firmware updating. It also provides Web-based user interface functions for TOE operations. TOE security functionality The major security functions this TOE can provide are as follows: - Communication data protection function between the TOE and the device for the service This function is used for communication between the TOE and devices for the service if the service call function, the machine counter notice function, the counter per user retrieval function, and the supply call function are enabled. The communication data between the TOE and the Ricoh device will be secured, and the data tampering will be detected by using a TLS protocol. - Communication data protection function between the TOE and the CS The TOE specifies only the genuine CS as the communication destination via Internet. The communication data between the TOE and the CS will be secured, and the data tampering will be detected by using a TLS protocol. - Communication data protection function between the TOE and computers This function is applied to data communication between the TOE and computers if Web-based functions are enabled. The communication data will be secured and the data tampering will be detected by using a TLS protocol. - Email protection function This function is applied to make mail sent from the TOE. The contents of the mail will be secured and the data tampering will be detected by using S/MIME. - User identification and authentication function The TOE identifies and authenticates users who access Web-based user interface functions. - RC Gate firmware verification function This function enables the TOE to check that the firmware (applications, shared parts of firmware, platforms, and the operating system) is genuine. - Security management function This function provides TOE management methods for the Administrator only. - Audit logging function This function enables the TOE to record the information related to security relevant events and allows only the administrator to review the audit logging.
- evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
- product: RICOH Remote Communication Gate A2
- product_type: Appliance for remote service
- protection_profile: none
- report_link: https://www.ipa.go.jp/en/security/c0535_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0535_est.pdf
- toe_version: V1.0.2
- vendor: RICOH COMPANY, LTD.
- expiration_date: 01.01.2022
- supplier: RICOH COMPANY, LTD.
- toe_japan_name: RICOH Remote Communication Gate A2V1.0.2
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0535_it4523.html
- toe_overseas_name: RICOH Remote Communication Gate A2V1.0.2
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1107-V3-2022, NSCIB-CC-2300005-01-CR |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1107-V3-2022, NSCIB-CC-2300005-01-CR |
heuristics/protection_profiles |
{} |
1f7ea2e05de5b88b |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf |
pdf_data/cert_filename |
c0535_eimg.pdf |
NSCIB-CC-2300088-01-Cert.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- NL:
- NSCIB-2300088-01: 1
- NSCIB-CC-2300088-01: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 7: 1
- EAL2: 1
- EAL5: 1
- EAL5 augmented: 1
|
pdf_data/cert_keywords/cc_sar |
|
- ALC:
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.3: 1
- AVA:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
- BrightSight:
- SGS:
- SGS: 1
- SGS Brightsight: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408-1: 2
- ISO/IEC 18045: 4
- ISO/IEC 18045:2008: 1
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20170306102238+09'00'
- /Creator: Word 用 Acrobat PDFMaker 11
- /Keywords:
- /ModDate: D:20170306102454+09'00'
- /Producer: Adobe PDF Library 11.0
- /Subject:
- /Title:
- pdf_file_size_bytes: 452634
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 1
|
- /Author: Denise Cater
- /CreationDate: D:20240131115646+00'00'
- /Creator: Microsoft® Word 2021
- /ModDate: D:20240131115646+00'00'
- /Producer: Microsoft® Word 2021
- /Title: NSCIB Certificate
- pdf_file_size_bytes: 180484
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0535_erpt.pdf |
NSCIB-CC-2300088-01-CR2.pdf |
pdf_data/report_frontpage |
|
- NL:
- cert_id: NSCIB-CC-2300088-01
- cert_item: Veridos Suite v4.0 – cryptovision ePasslet Suite – Java Card applet configuration providing Secure Signature Creation Device with Key generation (SSCD
- cert_lab: SGS Brightsight B.V.
- developer: cv cryptovision GmbH
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0535-01: 1
- Certification No. C0535: 1
|
- DE:
- BSI-DSZ-CC-1107-V3-2022: 2
- NL:
- NSCIB-2300088-01: 1
- NSCIB-CC-2300005-01-MA: 1
- NSCIB-CC-2300088-01: 13
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 4
- EAL2 augmented: 2
|
- EAL:
- EAL 5: 1
- EAL 5 augmented: 1
- EAL4: 1
- EAL5: 1
- EAL5 augmented: 1
- EAL5+: 1
- EAL6+: 1
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.CE: 1
- A.DEVICE: 1
- A.NO_THRU_TRAFFIC: 1
- A.PHYSICAL_: 1
- A.TRUSTED_: 1
- T:
- T.FAKE_NOTICE_: 1
- T.FAKE_NOTICE_POINT: 1
- T.HTTPS_DEV: 2
- T.PC_WEB: 2
- T.UNAUTHORIZED_: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNTRUSTED_: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UPDATE_: 1
- T.UPDATE_COMPROMISE: 1
|
|
pdf_data/report_keywords/vendor |
|
- GD:
- Infineon:
- Infineon Technologies AG: 2
|
pdf_data/report_keywords/eval_facility |
|
- BrightSight:
- SGS:
- SGS: 4
- SGS Brightsight: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 1
- AES128: 1
- AES192: 1
- AES256: 1
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- following proprietary or non-standard algorithms, protocols and implementations: none, which are out of scope as there are no security claims relating to these. Page: 10/13 of report number: 1
- out of scope: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20170406114307+09'00'
- /Creator: Word 用 Acrobat PDFMaker 11
- /ModDate: D:20170406114353+09'00'
- /Producer: Adobe PDF Library 11.0
- /Title:
- pdf_file_size_bytes: 447326
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 34
|
|
pdf_data/st_filename |
c0535_est.pdf |
NSCIB-CC-2300088-01-ST_lite_v17.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1107-V3-2022: 3
- NL:
- NSCIB-2300088-01: 1
- NSCIB-CC-2300005-01-CR: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-: 1
- BSI-CC-PP-0059-2009-MA-02: 3
- BSI-CC-PP-0084-: 1
- BSI-PP-0006-2002T: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 2
- EAL 5 augmented: 1
- EAL 5+: 1
- EAL 6+: 2
- EAL4: 1
- EAL4 augmented: 1
- EAL5: 4
- EAL5 augmented: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 2
- ADV_INT.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 2
- AGD_PRE: 5
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 7
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 15
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 7
- FAU_SAR.2.1: 1
- FAU_STG.1: 9
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 7
- FAU_STG.4.1: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU.1: 4
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UAU.6: 7
- FIA_UAU.6.1: 1
- FIA_UID.1: 6
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FUD: 3
- FPT_FUD.1: 14
- FPT_FUD.1.1: 2
- FPT_FUD.1.2: 2
- FPT_FUD.1.3: 2
- FPT_FUD.2: 12
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FTA:
- FTA_SSL.1: 7
- FTA_SSL.1.1: 1
- FTA_SSL.1.2: 1
- FTP:
- FTP_ITC.1: 22
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 3
- FTP_ITC.1.3: 3
- FTP_SSL.1: 1
- FTP_SSL.3: 1
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
|
- FAU:
- FCO:
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 24
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 14
- FCS_CKM.4.1: 3
- FCS_COP: 22
- FCS_COP.1: 23
- FCS_RND: 8
- FCS_RND.1: 10
- FCS_RND.1.1: 2
- FCS_RNG.1: 2
- FDP:
- FDP_ACC: 28
- FDP_ACC.1: 23
- FDP_ACF: 19
- FDP_ACF.1: 42
- FDP_IFC: 2
- FDP_IFC.1: 8
- FDP_IFF: 2
- FDP_ITC: 2
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FDP_RIP: 9
- FDP_RIP.1: 5
- FDP_RIP.1.1: 2
- FDP_ROL: 1
- FDP_SDI: 13
- FDP_SDI.1: 2
- FDP_SDI.2: 11
- FDP_UIT: 1
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 3
- FIA_AFL.1.2: 3
- FIA_ATD: 1
- FIA_UAU.1: 8
- FIA_UAU.1.1: 4
- FIA_UAU.1.2: 3
- FIA_UID: 2
- FIA_UID.1: 13
- FIA_UID.1.1: 3
- FIA_UID.1.2: 3
- FIA_USB: 1
- FMT:
- FMT_MOF.1: 6
- FMT_MOF.1.1: 2
- FMT_MSA: 23
- FMT_MSA.1: 7
- FMT_MSA.2: 6
- FMT_MSA.2.1: 2
- FMT_MSA.3: 16
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MSA.4: 7
- FMT_MSA.4.1: 2
- FMT_MTD: 15
- FMT_MTD.1: 6
- FMT_SMF: 2
- FMT_SMF.1: 22
- FMT_SMF.1.1: 2
- FMT_SMR: 3
- FMT_SMR.1: 24
- FMT_SMR.1.1: 4
- FMT_SMR.1.2: 3
- FPR:
- FPT:
- FPT_EMS: 8
- FPT_EMS.1: 11
- FPT_EMS.1.1: 5
- FPT_EMS.1.2: 4
- FPT_FLS: 3
- FPT_FLS.1: 12
- FPT_FLS.1.1: 2
- FPT_PHP.1: 6
- FPT_PHP.1.1: 3
- FPT_PHP.1.2: 3
- FPT_PHP.3: 11
- FPT_PHP.3.1: 3
- FPT_RCV: 1
- FPT_TDC.1: 1
- FPT_TST: 2
- FPT_TST.1: 15
- FPT_TST.1.1: 2
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CE: 3
- A.DEVICE: 2
- A.NO_THRU_TRAFFIC_PROTECTION: 2
- A.PHYSICAL_PROTECTION: 3
- A.TRUSTED_ADMINISTRATOR: 3
- O:
- O.ACCESS: 8
- O.AUDIT_LOGGED: 13
- O.GENUINE: 8
- O.TRUSTED: 2
- O.TRUSTED_: 6
- O.TRUSTED_NOTICE_POINT: 8
- OE:
- OE.CE: 3
- OE.DEVICE: 4
- OE.NO_THRU_TRAFFIC_PROTECT: 2
- OE.NO_THRU_TRAFFIC_PROTECTION: 2
- OE.PHYSICAL: 4
- OE.TRUSTED_ADMIN: 3
- T:
- T.FAKE_NOTICE_POINT: 3
- T.HTTPS_DEV: 3
- T.PC_WEB: 2
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 3
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 2
- T.UPDATE_COMPROMISE: 2
|
- A:
- A.CAP_FILE: 1
- A.CGA: 2
- A.SCA: 2
- A.VERIFICATION: 1
- O:
- O.ALARM: 1
- O.ARRAY_VIEWS_CONFID: 1
- O.CARD-MANAGEMENT: 1
- O.CIPHER: 1
- O.DELETION: 1
- O.FIREWALL: 1
- O.GLOBAL_ARRAYS_CONFID: 1
- O.GLOBAL_ARRAYS_INTEG: 1
- O.INSTALL: 1
- O.KEY-MNGT: 1
- O.LOAD: 1
- O.NATIVE: 1
- O.OBJ-DELETION: 1
- O.OPERATE: 1
- O.PIN-MNGT: 1
- O.REALLOCATION: 1
- O.RESOURCES: 1
- O.RNG: 1
- O.SCP: 3
- O.SID: 1
- O.TRANSACTION: 1
- OE:
- OE.CAP_FILE: 1
- OE.CODE-EVIDENCE: 1
- OE.HID_VAD: 3
- OE.VERIFICATION: 1
- T:
- T.CONFID-APPLI-DATA: 1
- T.CONFID-JCS-CODE: 1
- T.CONFID-JCS-DATA: 1
- T.DELETION: 1
- T.EXE-CODE: 2
- T.INSTALL: 1
- T.INTEG-APPLI-CODE: 2
- T.INTEG-APPLI-DATA: 2
- T.INTEG-JCS-CODE: 1
- T.INTEG-JCS-DATA: 1
- T.NATIVE: 1
- T.OBJ-DELETION: 1
- T.PHYSICAL: 1
- T.RESOURCES: 1
- T.SECURE_DELETION: 1
- T.SID: 2
|
pdf_data/st_keywords/vendor |
|
- GD:
- Infineon:
- Infineon: 3
- Infineon Technologies AG: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA2:
- SHA-224: 2
- SHA-256: 2
- SHA-384: 2
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- fault injection: 1
- malfunction: 1
- physical tampering: 11
- SCA:
- DPA: 2
- SPA: 2
- physical probing: 1
- timing attacks: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
|
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS PUB 186-3: 1
- FIPS180-4: 3
- FIPS186-3: 2
- FIPS197: 2
- ICAO:
- ISO:
- PKCS:
- RFC:
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- No contradiction to this ST. FDP_RIP.1/GlobalArray No correspondence. Out of scope (internal Java Card func- tionality: 1
- No contradiction to this ST. FDP_ROL.1/FIREWALL No correspondence. Out of scope (internal Java Card Fire- wall: 1
- No contradiction to this ST. FMT_MSA.2/FIREWALL-JCVM No correspondence Out of scope (internal Java Card Fire- wall: 1
- No contradiction to this ST. FMT_SMR.1/Installer No correspondence Out of scope (internal Java Card func- tionality: 1
- No contradiction to this ST. FPT_RCV.3/Installer No correspondence Out of scope (internal Java Card func- tionality: 1
- While D.Sig provides the TOE’s functionality claimed by this security target, the PKCS#15 part is out of scope of the certification: 1
- While D.Sig provides the TOE’s functionality claimed by this security target, the PKCS#15 part is out of scope of the certification. 1.4.4 TOE identification Identification of the platform is performed by the: 1
- 21 of 73 Platform SFR Correspondence in this ST References/Remarks FIA_UID.1/CM No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/CM No correspondence: 1
- ADEL) policy on security aspects outside the runtime. FDP_ACC.2/ADEL No correspondence Out of scope (internal Java Card func- tionality: 1
- DRG.3) that can be used directly. FDP_RIP.1/ABORT No correspondence. Out of scope (internal Java Card func- tionality: 1
- DTBS_Forgery, T.Sig_Forgery No contradiction to this ST. T.INTEG-APPLI-DATA.LOAD No correspondence Out of scope. No contradiction to this ST. T.INTEG-JCS-CODE No correspondence Out of scope. No contradiction to: 1
- O. ARRAY_VIEWS_INTEG OT.DTBS_Integrity_TOE No contradiction to this ST. O.NATIVE No correspondence Out of scope. No contradiction to this ST. Veridos Suite v4.0 - cryptovision ePasslet Suite / SSCD Security: 1
- O.LOAD No correspondence Out of scope. No contradiction to this ST. O.INSTALL No correspondence Out of scope. No contradiction to this ST. O.CARD-MANAGEMENT No correspondence Out of scope. No contradiction to: 1
- Out of scope: 81
- Out of scope (internal Java Card Fire- wall). The resulting requirements for applets are reflected in the User: 2
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/GlobalArray No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/KEYS No correspondence: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/TRANSIENT No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/bArray No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_ROL.1/FIREWALL No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1/Installer No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_RCV.3/Installer No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. Veridos Suite v4.0 -: 1
- SID.2 No correspondence Out of scope. No contradiction to this ST. T.EXE-CODE.1 No correspondence Out of scope. No contradiction to this ST. T.EXE-CODE.2 No correspondence Out of scope. No contradiction to this: 1
- ST. O.OBJ-DELETION No correspondence Out of scope. No contradiction to this ST. O.DELETION No correspondence Out of scope. No contradiction to this: 1
- ST. O.RESOURCES No correspondence Out of scope. No contradiction to this ST. O.ALARM OT.Tamper_ID OT.Tamper_Resistance Relevant for the protection: 1
- ST. T.INSTALL No correspondence Out of scope. No contradiction to this ST. T.OBJ-DELETION No correspondence Out of scope. No contradiction to: 1
- ST. T.INTEG-APPLI-CODE No correspondence Out of scope. No contradiction to this ST. T.INTEG-APPLI-CODE.LOAD No correspondence Out of scope. No: 1
- ST. T.INTEG-JCS-DATA No correspondence Out of scope. No contradiction to this ST. T.SID.1 No correspondence Out of scope. No contradiction to this ST: 1
- T.DELETION No correspondence Out of scope. No contradiction to this ST. T.SECURE_DELETION No correspondence Out of scope. No contradiction to: 1
- T.NATIVE No correspondence Out of scope. No contradiction to this ST. T.RESOURCES No correspondence Out of scope. No contradiction to this: 1
- T.SCD_Divulg, T.SCD_Derive No contradiction to this ST. T.CONFID-JCS-CODE No correspondence Out of scope. No contradiction to this ST. T.CONFID-JCS-DATA No correspondence Out of scope. No contradiction to: 1
- The objectives are related. No con- tradiction to this ST. O.SCP.RECOVERY No correspondence Out of scope. No contradiction to this ST. O.SCP.SUPPORT No correspondence Out of scope. No contradiction to: 1
- a defined quality met- ric (DRG.3) that can be used directly. FDP_RIP.1/ABORT No correspondence. Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/APDU No correspondence: 1
- chapter 8.1.1.1 in platform ST) FDP_ACC.2/FIREWALL No correspondence Out of scope (internal Java Card Fire- wall: 1
- chapter 8.1.1.4 in platform ST) FIA_ATD.1/AID No correspondence. Out of scope (internal Java Card func- tionality: 1
- complement Java Card OS mechanisms. No contradiction to this ST. FPT_TDC.1 No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_TST.1 FPT_TST.1 Self-testing: 1
- initial start-up. Aid Management (chapter 8.1.1.4 in platform ST) FIA_ATD.1/AID No correspondence. Out of scope (internal Java Card func- tionality). No contradiction to this ST. FIA_UID.2/AID No correspondence: 1
- internal Java Card Fire- wall). No contradiction to this ST. FMT_MSA.1/JCRE No correspondence Out of scope (internal Java Card Fire- wall: 1
- internal Java Card Fire- wall). No contradiction to this ST. FMT_MSA.1/JCVM No correspondence Out of scope (internal Java Card Fire- wall). No contradiction to this ST. FMT_MSA.2/FIREWALL-JCVM No: 1
- internal Java Card Fire- wall). No contradiction to this ST. FMT_SMF.1 No correspondence Out of scope (internal Java Card Fire- wall: 1
- internal Java Card Fire- wall). No contradiction to this ST. FMT_SMR.1 No correspondence Out of scope (internal Java Card Fire- wall). No contradiction to this ST. Application Programming Interface: 1
- internal Java Card func- tionality). No contradiction to this ST. FDP_IFC.2/CM No correspondence Out of scope (internal Java Card func- tionality: 1
- internal Java Card func- tionality). No contradiction to this ST. FDP_IFF.1/CM No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_UIT.1/CM No correspondence: 1
- internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/ADEL No correspondence Out of scope (internal Java Card func- tionality: 1
- internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/ADEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/ADEL No correspondence: 1
- internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/KEYS No correspondence. Out of scope (internal Java Card func- tionality: 1
- internal Java Card func- tionality). No contradiction to this ST. FDP_UIT.1/CM No correspondence Out of scope (internal Java Card func- tionality: 1
- internal Java Card func- tionality). No contradiction to this ST. FIA_USB.1/AID No correspondence Out of scope (internal Java Card func- tionality: 1
- internal Java Card func- tionality). No contradiction to this ST. FIA_USB.1/AID No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MTD.1/JCRE No correspondence: 1
- internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/CM No correspondence Out of scope (internal Java Card func- tionality: 1
- internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/ADEL No correspondence Out of scope (internal Java Card func- tionality: 1
- internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/ADEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/ADEL No correspondence: 1
- internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/CM No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/CM No correspondence: 1
- internal Java Card func- tionality). No contradiction to this ST. FMT_MTD.3/JCRE No correspondence Out of scope (internal Java Card func- tionality: 1
- internal Java Card func- tionality). No contradiction to this ST. FMT_MTD.3/JCRE No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. INSTG Security Functional: 1
- internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/CM No correspondence Out of scope (internal Java Card func- tionality: 1
- internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/ADEL No correspondence Out of scope (internal Java Card func- tionality: 1
- internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/ADEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1/ADEL No correspondence: 1
- internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/CM No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FTP_ITC.1/CM No correspondence: 1
- internal Java Card func- tionality). No contradiction to this ST. FTP_ITC.1/CM No correspondence Out of scope (internal Java Card func- tionality: 1
- internal Java Virtual Machine). No contradiction to this ST. FDP_IFF.1/JCVM No correspondence Out of scope (internal Java Virtual Machine: 1
- internal Java Virtual Machine). No contradiction to this ST. FDP_RIP.1/OBJECTS No correspondence. Out of scope (internal Java Card Fire- wall). No contradiction to this ST. FMT_MSA.1/JCRE No correspondence Out: 1
- manager (ADEL) policy on security aspects outside the runtime. FDP_ACC.2/ADEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_ACF.1/ADEL No correspondence: 1
- objectives for the TOE and are covered by SFRs in the platform ST. FTP_ITC.1/CMGR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. SCPG Security Functional: 1
- objectives. Platform Objective Correspondence in this ST References/Remarks O.SID No correspondence Out of scope. No contradiction to this ST. O.FIREWALL No correspondence Out of scope. No contradiction to this: 1
- of 73 Platform Objective Correspondence in this ST References/Remarks O.OPERATE No correspondence Out of scope. No contradiction to this ST. O.REALLOCATION No correspondence Out of scope. No contradiction to: 1
- of the TOE. No contradic- tion to this ST. FDP_IFC.1/JCVM No correspondence Out of scope (internal Java Virtual Machine). No contradiction to this ST. FDP_IFF.1/JCVM No correspondence Out: 1
- of the TOE. No contradic- tion to this ST. FMT_MSA.3/FIREWALL No correspondence Out of scope (internal Java Card Fire- wall). The resulting requirements for applets are reflected in the User: 1
- of the TOE. No contradic- tion to this ST. FMT_MSA.3/JCVM No correspondence Out of scope (internal Java Card Fire- wall). No contradiction to this ST. FMT_SMF.1 No correspondence Out of: 1
- out of scope: 1
- platform ST) Firewall Policy (chapter 8.1.1.1 in platform ST) FDP_ACC.2/FIREWALL No correspondence Out of scope (internal Java Card Fire- wall). The resulting requirements for Veridos Suite v4.0 - cryptovision: 1
- that owns the deleted objects by invoking a specific API method. FDP_RIP.1/ODEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1/ODEL FPT_FLS.1 The: 1
- the User Guidance of the TOE. No contradic- tion to this ST. FDP_ACF.1/FIREWALL No correspondence Out of scope (internal Java Card Fire- wall). The resulting requirements for applets are reflected in the User: 1
- the plat- form leads to secrecy of SCD. No contradiction to this ST. O.PIN-MNGT No correspondence Out of scope. No contradiction to this ST. O.TRANSACTION No correspondence Out of scope. No contradiction to: 1
- verified, or that has been modified after bytecode verification. FCO_NRO.2/CM No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_IFC.2/CM No correspondence: 1
- which addresses security aspects outside the runtime. FDP_ITC.2/Installer No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/Installer No: 1
|
pdf_data/st_metadata |
- /CreationDate: D:20170324135725+09'00'
- /Creator: Microsoft® Word 2013
- /ModDate: D:20170324135725+09'00'
- /Producer: Microsoft® Word 2013
- /Title: RICOH Remote Communication Gate A2 Security Target
- pdf_file_size_bytes: 575869
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 50
|
- /Author: bdrisch
- /CreationDate: D:20231107145429+01'00'
- /Creator: Microsoft® Word für Microsoft 365
- /Keywords: SSCD, ePasslet Suite, electronic Signature
- /MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_ActionId: bf9dff47-6206-446f-8b1e-83c3dd9c7ad5
- /MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_ContentBits: 0
- /MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_Enabled: true
- /MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_Method: Standard
- /MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_Name: All Employees_2
- /MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_SetDate: 2023-09-28T13:18:22Z
- /MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_SiteId: 33440fc6-b7c7-412c-bb73-0e70b0198d5a
- /ModDate: D:20231107145429+01'00'
- /Producer: Microsoft® Word für Microsoft 365
- /Title: Security Target ePasslet/ePKI-SSCD
- pdf_file_size_bytes: 1444868
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 73
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |