| name |
Remote Communication Gate A Version: Machine Code (First 4 characters): D459, Firmware Version: A2.06-C2.04-P2.01-K2.02 |
CardOS V6.0 ID R1.1 |
| category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
JP |
DE |
| status |
archived |
active |
| not_valid_after |
03.03.2016 |
17.10.2028 |
| not_valid_before |
25.02.2011 |
17.10.2023 |
| cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1162V2c_pdf.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0283_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1162V2a_pdf.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0283_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1162V2b_pdf.pdf |
| manufacturer |
Ricoh Company, Ltd. |
Eviden Germany GmbH |
| manufacturer_web |
https://www.ricoh.com/ |
https://eviden.com |
| security_level |
EAL3 |
EAL4+, ATE_DPT.2, AVA_VAN.5, ALC_DVS.2 |
| dgst |
172c0a4dc5fcb821 |
f720e5aa107bdbbe |
| heuristics/cert_id |
JISEC-CC-CRP-C0283 |
BSI-DSZ-CC-1162-V2-2023 |
| heuristics/cert_lab |
[] |
BSI |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, AVA_VAN.2, ADV_FSP.3, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
ADV_TDS.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ALC_FLR.1, ADV_IMP.1, ALC_LCD.1, ALC_DVS.2, ATE_DPT.2, ASE_SPD.1, ATE_COV.2, ALC_TAT.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ASE_TSS.1, ADV_FSP.4, ADV_ARC.1 |
| heuristics/extracted_versions |
2.01, 2.04, 2.06, 2.02 |
6.0, 1.1 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1255-2025, BSI-DSZ-CC-1162-V3-2024 |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1110-V5-2022, BSI-DSZ-CC-1162-2021 |
| heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1162-V3-2024, BSI-DSZ-CC-1255-2025 |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1110-V4-2021, BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-0945-V3-2018, BSI-DSZ-CC-1110-2019, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-1110-V3-2020, BSI-DSZ-CC-0945-2017, BSI-DSZ-CC-1162-2021, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0945-V2-2018, BSI-DSZ-CC-1110-V2-2019, BSI-DSZ-CC-1110-V5-2022 |
| heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0283
- certification_date: 01.02.2011
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0283_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This TOE is a communication device that enables digital MFPs and printers (hereafter "devices") to be connected to the communication server (hereafter "CS") in the maintenance center. Functions this TOE can provide include notification of device troubles (service call function), automatic counter checking of prints (device counter collection function), automatic ordering of supplies such as toner (supply call function), and device firmware updating. It also provides Web-based user interface functions for TOE operations. TOE security functionality The major security functions this TOE can provide are as follows: - Communication data protection function between the TOE and the device for the service This function is used for communication between the TOE and devices for the service if the service call function, the device counter collection function, and the supply call function are enabled. The communication data between the TOE and the Ricoh device will be secured, and the data tampering will be detected by using a SSL protocol. - Communication data protection function between the TOE and the CS The TOE specifies only the genuine CS as the communication destination via Internet. The communication data between the TOE and the CS will be secured, and the data tampering will be detected by using a SSL protocol. - Communication data protection function between the TOE and computers This function is applied to data communication between the TOE and computers if Web-based functions are enabled. The communication data will be secured by using a SSL protocol. - User identification and authentication function The TOE identifies and authenticates users who access Web-based user interface functions. - Access control function This function restricts user access according to specified user roles. - RC Gate firmware verification function This function enables the TOE to check that the firmware (applications, shared parts of firmware, platforms, and the operating system) is genuine. - Security management function This function provides TOE management methods for the Administrator only. - Audit logging function This function enables the TOE to record the information related to security relevant events and allows only the administrator to review the audit logging.
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: Remote Communication Gate A
- product_type: Appliance for remote service
- report_link: https://www.ipa.go.jp/en/security/c0283_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0283_est.pdf
- toe_version: Machine Code (First 4 characters) : D459 Firmware Version : A2.06-C2.04-P2.01-K2.02
- vendor: RICOH COMPANY, LTD.
- expiration_date: 01.03.2016
- supplier: RICOH COMPANY, LTD.
- toe_japan_name: Remote Communication Gate A Machine Code (First 4 characters) : D459 Firmware Version : A2.06-C2.04-P2.01-K2.02
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0283_it0306.html
- toe_overseas_name: Remote Communication Gate A Machine Code (First 4 characters) : D459 Firmware Version : A2.06-C2.04-P2.01-K2.02
|
- category: Electronic ID documents
- cert_id: BSI-DSZ-CC-1162-V3-2024
- certification_date: 04.12.2024
- enhanced:
- applicant: Eviden Germany GmbH Otto-Hahn-Ring 6 81739 München
- assurance_level: EAL4+,ALC_DVS.2,ATE_DPT.2,AVA_VAN.5
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1162V3c_pdf.pdf?__blob=publicationFile&v=3
- certification_date: 04.12.2024
- description: The composite TOE is named CardOS V6.0 ID R1.0 (developed by Atos Information Technology GmbH). The TOE is a smart card operating system on an IC with at least one application. Applications covered by this TOE comprise an electronic passport (ePass) application and/or a signature (eSign) application. The IC platform comprises the integrated circuit SLC52GDA448* (IFX_CCI_000005 Design Step H13) and the cryptographic libraries RSA v2.08.007, EC v2.08.007, Toolbox v2.08.007, Base v2.08.007, HCL2 v1.12.001 (hash library) and Symmetric Crypto Library (SCL) v2.04.002 certified according CC v3.1 with ID BSI-DSZ-CC-1110-V4-2021.
- entries: [frozendict({'id': 'EN'}), frozendict({'id': 'Protection', 'description': 'Information Society Standardization System'}), frozendict({'id': 'Protection', 'description': 'Information Society Standardization System'}), frozendict({'id': 'Machine', 'description': 'Extended Access Control'}), frozendict({'id': 'Common', 'description': 'Protection Profile'})]
- evaluation_facility: TÜV Informationstechnik GmbH
- expiration_date: 03.12.2029
- product: CardOS V6.0 ID R1.2
- protection_profile: EN 419211-2:2013 - Protection profiles for secure signature creation device - Part 2: Device with key generation, 18 May 2013, BSI-CC-PP-0059-2009-MA-02,Protection profiles for secure signature creation device - Part 4: Extension for device with key generation and trusted channel to certificate generation application, CEN / ISSS - Information Society Standardization System, 12 October 2013, BSI-CC-PP-0071-2012-MA-01 Protection profiles for secure signature creation device - Part 5: Extension for device with key generation and trusted channel to signature creation application, CEN / ISSS - Information Society Standardization System, 12 October 2013, BSI-CC-PP-0072-2012-MA-01,Machine Readable Travel Document with "ICAO Application" Extended Access Control with PACE, Version 1.3.2, 5 December 2012, BSI-CC-PP-0056-V2-2012-MA-02,Common Criteria Protection Profile Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP), Version 1.01, 22 July 2014, BSI-CC-PP-0068-V2-2011-MA-01
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1162V3a_pdf.pdf?__blob=publicationFile&v=3
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1162V3b_pdf.pdf?__blob=publicationFile&v=3
- product: CardOS V6.0 ID R1.2
- subcategory: IC with applications
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Hoheitliche_Dokumente-IC_mit_Anwendung/1162.html
- vendor: Eviden Germany GmbH
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
1f7ea2e05de5b88b, b380aabf93b29692, d918b28fd7bb5d79, a33327d40f253f46, d9553e7194783182 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf |
| pdf_data/cert_filename |
|
1162V2c_pdf.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1162-V2-2023: 1
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-CC-PP-0059-2009-MA-02: 1
- BSI-CC-PP-0071-2012-MA-01: 1
- BSI-CC-PP-0072-2012-MA-01: 1
|
| pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smartcard, MRTD, SSCD, CardOS V6.0 ID R1.1, Eviden Germany GmbH"
- /Subject: Common Criteria, Certification, Zertifizierung, Smartcard, MRTD, SSCD, CardOS V6.0 ID R1.1, Eviden Germany GmbH
- /Title: Certificate BSI-DSZ-CC-1162-V2-2023
- pdf_file_size_bytes: 232198
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
| pdf_data/report_filename |
c0283_erpt.pdf |
1162V2a_pdf.pdf |
| pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2, AVA_VAN.5 valid until: 16 October 2028
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1162-V2-2023
- cert_item: CardOS V6.0 ID R1.1
- cert_lab: BSI
- developer: Eviden Germany GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: BSI-CC-PP-0056-V2-2012-MA-02 BSI-CC-PP-0068-V2-2011-MA-01 EN 419211-2:2013 (BSI-CC-PP-0059-2009-MA-02) EN 419211-4:2013 (BSI-CC-PP-0071-2012-MA-01) EN 419211-5:2013 (BSI-CC-PP-0072-2012-MA-01
|
| pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0283-01: 1
- Certification No. C0283: 1
|
- DE:
- BSI-DSZ-CC-1110-V5-2022: 1
- BSI-DSZ-CC-1110-V5-2022-MA-01: 6
- BSI-DSZ-CC-1162-2021: 3
- BSI-DSZ-CC-1162-2021-MA-01: 1
- BSI-DSZ-CC-1162-V2-2023: 19
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-2012-: 2
- BSI-CC-PP-0056-V2-2012-MA-02: 2
- BSI-CC-PP-0059-2009-: 2
- BSI-CC-PP-0059-2009-MA-02: 2
- BSI-CC-PP-0068-V2-: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 2
- BSI-CC-PP-0071-: 1
- BSI-CC-PP-0071-2012-: 2
- BSI-CC-PP-0071-2012-MA-01: 1
- BSI-CC-PP-0072-2012-: 2
- BSI-CC-PP-0072-2012-MA-01: 2
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 5
- EAL 4 augmented: 3
- EAL 5: 4
- EAL 5+: 1
- EAL 6: 1
- EAL5+: 1
- EAL6: 1
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_FLR: 2
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_DPT.2: 4
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.ADMINSHIP: 1
- A.CE: 1
- A.DEVICE: 1
- A.NETWORK: 1
- A.TOE_ADMIN: 1
- T:
- T.ACCESS: 2
- T.FAKE_CS: 2
- T.INTERNET: 2
|
|
| pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 5
- Infineon Technologies AG: 5
|
| pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 8
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102-1: 1
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 20: 3
- AIS 25: 4
- AIS 26: 4
- AIS 31: 3
- AIS 32: 1
- AIS 34: 4
- AIS 35: 1
- AIS 36: 5
- AIS 37: 3
- AIS 38: 1
- AIS 46: 3
- ICAO:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- ETR-COMP) for BSI-DSZ- CC-1110-V5-2022, Version 1, 2022-03-29, TÜV Informationstechnik GmbH (confidential document) Evaluation Technical Report for Composite Evaluation Addendum (ETR COMP_ADD_MA-01) for: 1
- Germany GmbH Packages & Release Notes, CardOS V6.0, 06/2023, Eviden Germany GmbH [13] STAR Reports (confidential documents): Site Technical Audit Report – Munich, Version 2, 2023-09-28, TÜV Informationstechnik GmbH Site: 1
- Technical Report Summary (ETR Summary), Version 5, 2023-09-28, TÜV Informationstechnik GmbH (confidential document) [8] Protection Profiles: Protection profiles for secure signature creation device – Part 2: Device: 1
- V6.0 ID R1.1 (BAC)’, Version 1.42, 2023-09-27, Eviden Germany GmbH (confidential document) 26 / 30 BSI-DSZ-CC-1162-V2-2023 Certification Report [12] Guidance documentation for the TOE: 1
- Version 1, 2022-08- 15, TÜV Informationstechnik GmbH (confidential document) [11] Configuration List for BSI-DSZ-CC-1162-V2-2023, Configuration List ’CardOS V6.0 ID R1.1’ and: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
| pdf_data/report_metadata |
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20110426174640+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /Manager: IPA
- /ModDate: D:20110426174731+09'00'
- /Producer: Acrobat Distiller 8.2.3 (Windows)
- /Title: CRP-e
- pdf_file_size_bytes: 794086
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 37
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smartcard, MRTD, SSCD, CardOS V6.0 ID R1.1, Eviden Germany GmbH"
- /Subject: Common Criteria, Certification, Zertifizierung, Smartcard, MRTD, SSCD, CardOS V6.0 ID R1.1, Eviden Germany GmbH
- /Title: Certification Report BSI-DSZ-CC-1162-V2-2023
- pdf_file_size_bytes: 409879
- pdf_hyperlinks: https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/, https://www.sogis.eu/
- pdf_is_encrypted: False
- pdf_number_of_pages: 30
|
| pdf_data/st_filename |
c0283_est.pdf |
1162V2b_pdf.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1110-: 1
- BSI-DSZ-CC-1162: 1
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0055-110: 2
- BSI-CC-PP- 0056-V2-2012-MA-02: 1
- BSI-CC-PP- 0059-2009-MA-02: 4
- BSI-CC-PP- 0068-V2-2011-MA-01: 7
- BSI-CC-PP- 0072-2012-MA-01: 1
- BSI-CC-PP- 0084-2014: 1
- BSI-CC-PP- 2200: 1
- BSI-CC-PP- 3020: 1
- BSI-CC-PP- 5785: 1
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0055-110: 10
- BSI-CC-PP-0056-: 2
- BSI-CC-PP-0056-V2-: 1
- BSI-CC-PP-0056-V2-2012-: 2
- BSI-CC-PP-0056-V2-2012-MA-: 1
- BSI-CC-PP-0056-V2-2012-MA-02: 22
- BSI-CC-PP-0059-: 2
- BSI-CC-PP-0059-2009-MA-: 1
- BSI-CC-PP-0059-2009-MA-02: 31
- BSI-CC-PP-0068-: 2
- BSI-CC-PP-0068-V2-: 2
- BSI-CC-PP-0068-V2-2011-: 3
- BSI-CC-PP-0068-V2-2011-MA-01: 55
- BSI-CC-PP-0071-2012-: 1
- BSI-CC-PP-0071-2012-MA-01: 7
- BSI-CC-PP-0072-: 1
- BSI-CC-PP-0072-2012-: 1
- BSI-CC-PP-0072-2012-MA-01: 11
- BSI-CC-PP-0084-2014: 10
- BSI-CC-PP-0086-2015: 4
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 6+: 1
- EAL4: 15
- EAL4 augmented: 4
- EAL6: 2
- EAL6 augmented: 2
- EAL6+: 1
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 6
- ADV_FSP.4: 3
- ADV_IMP.1: 3
- ADV_TDS.3: 4
- AGD:
- AGD_OPE.1: 3
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 2
- ALC_DVS.2: 9
- ALC_FLR.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT: 11
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ: 84
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS: 29
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 2
- ATE_DPT.2: 7
- ATE_FUN.1: 2
- ATE_IND.2: 1
- AVA:
- AVA_VAN.3: 1
- AVA_VAN.5: 9
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 14
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 7
- FAU_SAR.2.1: 1
- FAU_STG.1: 9
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 7
- FAU_STG.4.1: 1
- FDP:
- FDP_ACC.1: 9
- FDP_ACC.1.1: 1
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UAU.6: 7
- FIA_UAU.6.1: 1
- FIA_UID.1: 6
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.3: 5
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 7
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 16
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 2
- FTP_ITC.1.3: 2
- FTP_TRP.1: 7
- FTP_TRP.1.1: 1
|
- FAU:
- FAU_SAS.1: 9
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 138
- FCS_CKM.1: 35
- FCS_CKM.2: 14
- FCS_CKM.4: 68
- FCS_CKM.4.1: 2
- FCS_COP: 151
- FCS_COP.1: 26
- FCS_ITC: 1
- FCS_RNG: 1
- FCS_RNG.1: 24
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 39
- FDP_ACC.1: 27
- FDP_ACF: 34
- FDP_ACF.1: 53
- FDP_DAU: 7
- FDP_DAU.1: 1
- FDP_DAU.2: 2
- FDP_IFC.1: 15
- FDP_ITC.1: 24
- FDP_ITC.2: 24
- FDP_ITT.1: 1
- FDP_LIM: 2
- FDP_RIP.1: 22
- FDP_RIP.1.1: 2
- FDP_SDC.1: 1
- FDP_SDI: 12
- FDP_SDI.1: 2
- FDP_SDI.2: 5
- FDP_UCT: 12
- FDP_UCT.1: 3
- FDP_UIT: 16
- FDP_UIT.1: 6
- FIA:
- FIA_AFL: 38
- FIA_AFL.1: 10
- FIA_API: 15
- FIA_API.1: 9
- FIA_API.1.1: 1
- FIA_UAU: 99
- FIA_UAU.1: 26
- FIA_UAU.1.1: 5
- FIA_UAU.1.2: 1
- FIA_UAU.4: 2
- FIA_UAU.5: 17
- FIA_UAU.6: 4
- FIA_UID: 14
- FIA_UID.1: 24
- FIA_UID.1.1: 3
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 1
- FMT_LIM.1: 13
- FMT_LIM.1.1: 2
- FMT_LIM.2: 11
- FMT_LIM.2.1: 3
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MSA: 14
- FMT_MSA.1: 7
- FMT_MSA.2: 11
- FMT_MSA.2.1: 1
- FMT_MSA.3: 21
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MSA.4: 8
- FMT_MSA.4.1: 1
- FMT_MTD: 97
- FMT_MTD.1: 11
- FMT_MTD.3: 9
- FMT_MTD.3.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 55
- FMT_SMF.1.1: 1
- FMT_SMR: 19
- FMT_SMR.1: 43
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 9
- FPT_EMS.1: 17
- FPT_EMS.1.1: 1
- FPT_EMS.1.2: 1
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP.1: 6
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 11
- FPT_PHP.3.1: 1
- FPT_TST: 2
- FPT_TST.1: 16
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 2
- FPT_TST.2: 1
- FRU:
- FTP:
- FTP_ITC: 39
- FTP_ITC.1: 19
- FTP_TRP.1: 6
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ADMINSHIP: 3
- A.CE: 3
- A.DEVICE: 3
- A.NETWORK: 3
- A.TOE_ADMIN: 3
- O:
- O.ACCESS: 9
- O.AUDIT_LOGGED: 6
- O.COM_ATR_DEVICE: 10
- O.COM_CS: 8
- O.COM_OPERATOR: 7
- O.GENUINE: 7
- OE:
- OE.ADMIN: 3
- OE.CE: 3
- OE.DEVICE: 3
- OE.NETWORK: 4
- OE.SUPER: 4
- T:
- T.ACCESS: 2
- T.FAKE_CS: 2
- T.INTERNET: 2
|
- A:
- OE:
- OE.CGA_TC_: 1
- OE.HID_VAD: 9
- OE.SCA_TC_DTBS_: 1
- OE.SSCD_: 1
- OT:
- OT.TOE_: 1
- OT.TOE_TC_VAD_: 1
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 1
- TDEA: 1
- Triple-DES: 1
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- DH:
- DH: 11
- Diffie-Hellman: 16
- DSA:
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 3
- SHA-256: 11
- SHA-384: 7
- SHA-512: 6
|
| pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 4
- Key agreement: 1
- MAC:
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 1
- brainpoolP384r1: 1
- brainpoolP512r1: 1
- NIST:
- NIST P-384: 4
- NIST P-521: 4
- P-256: 4
- P-384: 8
- P-521: 8
- prime256v1: 1
- secp256r1: 1
- secp384r1: 1
- secp521r1: 1
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Malfunction: 7
- Physical Tampering: 6
- Physical tampering: 2
- fault injection: 1
- malfunction: 6
- physical tampering: 5
- SCA:
- physical probing: 4
- side channel: 1
- other:
|
| pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI TR-03110: 1
- BSI TR-03116: 1
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 1
- EF.DG1: 7
- EF.DG14: 7
- EF.DG15: 3
- EF.DG16: 6
- EF.DG2: 2
- EF.DG3: 12
- EF.DG4: 12
- EF.DG5: 1
- EF.SOD: 8
|
| pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
|
- BSI:
- AIS 20: 1
- AIS 31: 2
- AIS 36: 1
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
- FIPS:
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- FIPS PUB 197: 2
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-2: 1
- PKCS:
- RFC:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- it should then proceed with passive authentications. Others than above listed terminals are out of scope of this ST. In particular, terminals using Basic Access Control (BAC) may be functionally supported: 1
- out of scope: 1
|
| pdf_data/st_metadata |
- /Author: team RC Gate
- /Company: 株式会社リコー
- /CreationDate: D:20110425171517+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /ModDate: D:20110425171632+09'00'
- /Producer: Acrobat Distiller 8.2.3 (Windows)
- /Title: Security Target for RC Gate
- pdf_file_size_bytes: 499016
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 51
|
- /Author: Eviden Germany GmbH
- /Keywords: Common Criteria, CardOS, ASE, eID, ICAO, QSCD
- /Subject: Security Target CardOS V6.0
- /Title: Security Target 'CardOS V6.0 ID R1.1'
- pdf_file_size_bytes: 1793599
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 182
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
True |
| state/cert/download_ok |
False |
True |
| state/cert/extract_ok |
False |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |