| name |
bizhub C353/ ineo+ 353 Control Software |
MTCOS Pro 2.6 SSCD / P71D352 (N7121) |
| category |
Multi-Function Devices |
Products for Digital Signatures |
| scheme |
JP |
DE |
| status |
archived |
active |
| not_valid_after |
28.12.2010 |
27.10.2028 |
| not_valid_before |
26.11.2007 |
27.10.2023 |
| cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1211c_pdf.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080306_c0127_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1211a_pdf.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080306_c0127_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1211b_pdf.pdf |
| manufacturer |
Konica Minolta Business Technologies, Inc |
MaskTech International GmbH |
| manufacturer_web |
https://www.konicaminolta.com/ |
https://www.masktech.de/ |
| security_level |
EAL3 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
| dgst |
185fc5d6d2f97fda |
d50de8f311b752e5 |
| heuristics/cert_id |
JISEC-CC-CRP-C0127 |
BSI-DSZ-CC-1211-2023 |
| heuristics/cert_lab |
[] |
BSI |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ALC_DVS.1, ATE_IND.2, ADV_RCR.1, ATE_DPT.1, AVA_SOF.1, ADV_HLD.2, AGD_USR.1, ATE_COV.2, ATE_FUN.1, ADV_FSP.1 |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ALC_FLR.1, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, ALC_COMP.1, ATE_COV.2, ASE_TSS.2, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ADV_ARC.1, ALC_TAT.2 |
| heuristics/extracted_versions |
353 |
2.6 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1147-V3-2023 |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1136-V3-2022, BSI-DSZ-CC-1036-2019 |
| heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1148-V3-2023, BSI-DSZ-CC-1147-V3-2023 |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1136-V2-2022, BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-0973-V2-2016, BSI-DSZ-CC-1136-2021, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-V3-2018, BSI-DSZ-CC-1033-2019, BSI-DSZ-CC-1136-V3-2022, BSI-DSZ-CC-1034-2019, BSI-DSZ-CC-1001-2018, BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-0996-2018, BSI-DSZ-CC-1036-2019, BSI-DSZ-CC-0995-2018 |
| heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0127
- certification_date: 01.11.2007
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.3
- cert_link: https://www.ipa.go.jp/en/security/c0127_eimg.pdf
- description: PRODUCT DESCRIPTION This product is the embedded software that is installed on the Konica Minolta Business Technologies, Inc. digital MFP (bizhub C353/ ineo+ 353)(Hereinafter referred to as “MFP”). This product offers the protection from exposure of the highly confidential document stored in the MFP, and aims at protecting the data which may be exposed against a user's intention. In order to realize it, this offers the functions such as the function that limits the operation to the specific document only to the authorized user, the function that performs the overwrite deletion of the data domain which became unnecessary and the function that deletes the confidential information including a setting value. Moreover , this has the mechanism using the unauthorized access protection function (HDD Lock Function) with which HDD is equipped against the risk of taking out HDD unjustly which is a medium for storing image data in MFP. If the encryption board, an option product, is installed in the MFP controller, this provides the function of generating the encryption key that encrypts all data including image data written to the HDD.
- evaluation_facility: Mizuho Information & Research Institute, Inc.Center for Evaluation of Information Security
- product: bizhub C353/ ineo+ 353 Control Software(Japanese Name) bizhub C353/ ineo+ 353 Control Software(English Name)
- product_type: IT Product (data protection function in digital MFD)
- report_link: https://www.ipa.go.jp/en/security/c0127_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0127_est.pdf
- toe_version: A02E0Y0-0100-GM0-02
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.01.2011
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub C353/ ineo+ 353 Control Software A02E0Y0-0100-GM0-02
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0127_it7142.html
- toe_overseas_name: bizhub C353/ ineo+ 353 Control Software A02E0Y0-0100-GM0-02
|
- category: Digital signature
- cert_id: BSI-DSZ-CC-1211-2023
- certification_date: 27.10.2023
- enhanced:
- applicant: MaskTech International GmbH Nordostpark 45 90411 Nürnberg
- assurance_level: EAL5+,ALC_DVS.2,AVA_VAN.5
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1211c_pdf.pdf?__blob=publicationFile&v=3
- certification_date: 27.10.2023
- description: The fundamental change in this re-evaluation is the porting of the embedded software to NXP Semiconductors Germany GmbH hardware P71D352 (N7121) (certification-ID: BSI-DSZ-CC-1136-V3), which implies a different delivery procedure. The hardware-depending tools have also changed, which leads to changes in the Configuration Management System. Furthermore the TOE supports import of signing keys and the creation of electronic signatures with the imported key.
- entries: [frozendict({'id': 'EN'}), frozendict({'id': 'EN'}), frozendict({'id': 'Protection'}), frozendict({'id': 'Protection'}), frozendict({'id': 'EN'})]
- evaluation_facility: SRC Security Research & Consulting GmbH
- expiration_date: 26.10.2028
- product: MTCOS Pro 2.6 SSCD / P71D352 (N7121)
- protection_profile: EN 419211-2:2013 - Protection profiles for secure signature creation device - Part 2: Device with key generation, 18 May 2013, BSI-CC-PP-0059-2009-MA-02EN 419211-3:2013 - Protection profiles for secure signature creation device - Part 3: Device with key import, 14 September 2013, BSI-CC-PP-0075-2012-MA-01Protection profiles for secure signature creation device - Part 4: Extension for device with key generation and trusted communication with certificate generation application 1.0.1, CEN / CENELEC (TC224/WG17), November 2012, BSI-CC-PP-0071-2012Protection profiles for secure signature creation device - Part 5: Extension for device with key generation and trusted channel to signature creation application, CEN / ISSS - Information Society Standardization System, 12 October 2013, BSI-CC-PP-0072-20EN 419211-6:2014 - Protection profiles for secure signature creation device - Part 6: Extension for device with key import and trusted channel to signature creation application, 25 July 2014, BSI-CC-PP-0076-2013-MA-01
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1211a_pdf.pdf?__blob=publicationFile&v=2
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1211b_pdf.pdf?__blob=publicationFile&v=2
- product: MTCOS Pro 2.6 SSCD / P71D352 (N7121)
- subcategory: Secure Signature Creation Devices (SSCD)
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Digitale_Signatur-Sichere_Signaturerstellungseinheiten/1211.html
- vendor: MaskTech International GmbH
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1136-V3-2022 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1136-V3-2022 |
| heuristics/protection_profiles |
{} |
1f7ea2e05de5b88b, 4a814d0e3c9f9082, d918b28fd7bb5d79, d9553e7194783182, 27abdb9c6ab375a7 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf |
| pdf_data/cert_filename |
|
1211c_pdf.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 1
- BSI-CC-PP-0071-2012-MA-01: 1
- BSI-CC-PP-0072-2012-MA-01: 1
- BSI-CC-PP-0075-2012-MA-01: 1
- BSI-CC-PP-0076-2013-MA-01: 1
|
| pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 5: 2
- EAL 5 augmented: 1
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smartcard, MRTD, SSCD, MTCOS Pro 2.6 SSCD / P71D352 (N7121) MaskTechInternational GmbH"
- /Subject: Common Criteria, Certification, Zertifizierung, Smartcard, MRTD, SSCD, MTCOS Pro 2.6 SSCD / P71D352 (N7121) MaskTechInternational GmbH
- /Title: Certificate BSI-DSZ-CC-1211-2023
- pdf_file_size_bytes: 231878
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
| pdf_data/report_filename |
20080306_c0127_erpt.pdf |
1211a_pdf.pdf |
| pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5 valid until: 26 October 2028
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1211-2023
- cert_item: MTCOS Pro 2.6 SSCD / P71D352 (N7121
- cert_lab: BSI
- developer: MaskTech International GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: EN 419211-2:2013 (BSI-CC-PP-0059-2009-MA-02), EN 419211-3:2013 (BSI-CC-PP-0075-2012-MA-01), EN 419211-4:2013 (BSI-CC-PP-0071-2012-MA-01) EN 419211-5:2013 (BSI-CC-PP-0072-2012-MA-01), EN 419211-6:2014 (BSI-CC-PP-0076-2013-MA-01
|
| pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0127-01: 1
- Certification No. C0127: 1
|
- DE:
- BSI-DSZ-CC-1036-2019: 3
- BSI-DSZ-CC-1064-2020-MA-01: 1
- BSI-DSZ-CC-1136-V3-2022: 10
- BSI-DSZ-CC-1136-V3-2022-MA-01: 2
- BSI-DSZ-CC-1211-2023: 18
- BSI-DSZ-CC-S-0181-2022: 1
- BSI-DSZ-CC-S-0207-: 1
- BSI-DSZ-CC-S-0232-2023: 1
- BSI-DSZ-CC-S-0233-2023: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0072-2012-MA-01: 1
- BSI-CC-PP- 0075-2012-MA-01: 1
- BSI-CC-PP- 0084-2014: 1
- BSI-CC-PP-0056-v2-2012: 1
- BSI-CC-PP-0059-2009-MA-02: 3
- BSI-CC-PP-0068-V2-2011-MA01: 1
- BSI-CC-PP-0071-: 1
- BSI-CC-PP-0071-2012-MA-01: 3
- BSI-CC-PP-0072-2012-MA-01: 3
- BSI-CC-PP-0075-2012-MA-01: 3
- BSI-CC-PP-0076-2013-MA-01: 3
- BSI-CC-PP-0084-2014: 3
- BSI-CC-PP-0086-2015: 1
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 1
- EAL 5: 8
- EAL 5 augmented: 3
- EAL 5+: 1
- EAL 6: 1
- EAL5+: 1
- EAL6: 4
- EAL6 augmented: 3
- EAL6+: 1
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_COMP.1: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_FLR: 2
- ALC_FLR.1: 3
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ATE:
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVER: 1
- A.SERVICE: 1
- A.SETTING: 1
- T:
- T.ACCESS: 1
- T.ACCESS-GROUP-BOX: 1
- T.ACCESS-NET: 1
- T.ACCESS-PRIVATE-BOX: 1
- T.ACCESS-PUBLIC: 1
- T.ACCESS-SECURE-PRINT: 1
- T.BACKUP: 1
- T.BRING-OUT: 1
- T.DISCARD-MFP: 1
|
|
| pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 5
- NXP Semiconductors: 11
|
| pdf_data/report_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 3
- TUV:
- TÜV Informationstechnik: 1
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102-1: 1
- BSI TR-03110: 1
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- FIPS:
- FIPS 180-1: 1
- FIPS 186: 1
- FIPS 186-1: 1
- FIPS PUB 197: 1
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 2
|
- BSI:
- AIS 20: 2
- AIS 25: 3
- AIS 26: 3
- AIS 31: 2
- AIS 32: 1
- AIS 34: 3
- AIS 35: 2
- AIS 36: 3
- AIS 37: 2
- AIS 38: 1
- AIS 46: 3
- AIS 47: 1
- AIS36: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- 353)(Hereinafter referred to as “MFP”). This TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can encrypt the image data written in HDD for the danger of taking: 1
|
- ConfidentialDocument:
- 1.6, 20 October 2023, Evaluation Technical Report (ETR), SRC Security Research & Consulting GmbH (confidential document) [9] EN 419211-2:2013 - Protection profiles for secure signature creation device - Part 2: Device: 1
- 2023, Configuration List of MTCOS Pro 2.6 SSCD / P71D352 (N7121), MaskTech International GmbH (confidential document) [19] User Guidance – MTCOS Pro 2.6 SSCD / P71D352 (N7121), Version 1.3, 30 August 2023, MaskTech: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- creation device with key generation, Version 0.1, 09 September 2022, MaskTech International GmbH (confidential document) 26 / 30 BSI-DSZ-CC-1211-2023 Certification Report C. Excerpts from the Criteria For the meaning: 1
- key generation and key import, MTCOS Pro 2.6 SSCD / P71D352 (N7121), MaskTech International GmbH (confidential document) 7 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie für: 1
|
| pdf_data/report_metadata |
- /CreationDate: D:20080305165156+09'00'
- /ModDate: D:20080305165156+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 309678
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 33
|
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smartcard, MRTD, SSCD, MTCOS Pro 2.6 SSCD / P71D352 (N7121) MaskTechInternational GmbH"
- /Subject: Common Criteria, Certification, Zertifizierung, Smartcard, MRTD, SSCD, MTCOS Pro 2.6 SSCD / P71D352 (N7121) MaskTechInternational GmbH
- /Title: Certification Report BSI-DSZ-CC-1211-2023
- pdf_file_size_bytes: 433901
- pdf_hyperlinks: https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/, https://www.sogis.eu/
- pdf_is_encrypted: False
- pdf_number_of_pages: 30
|
| pdf_data/st_filename |
20080306_c0127_est.pdf |
1211b_pdf.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1136-V3-2022: 1
- BSI-DSZ-CC-1211: 2
- BSI-DSZ-CC-1211-2023: 1
- BSI-DSZ-CC-S-0207-2021: 1
- BSI-DSZ-CC-S-0214-2022: 1
- BSI-DSZ-CC-S-0232-2023: 1
- BSI-DSZ-CC-S-0233-2023: 1
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0071: 1
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-CC-PP-0059: 1
- BSI-CC-PP-0059-2009-MA-02: 2
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-CC-PP-0071-2012-MA-01: 2
- BSI-CC-PP-0072: 1
- BSI-CC-PP-0072-2012-MA-01: 2
- BSI-CC-PP-0075: 1
- BSI-CC-PP-0075-2012-MA-01: 1
- BSI-CC-PP-0075-MA-01: 1
- BSI-CC-PP-0076: 1
- BSI-CC-PP-0076-2013-MA-01: 1
- BSI-CC-PP-0084-2014: 2
- BSI-CC-PP-0086-2015: 1
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL5: 10
- EAL5 augmented: 6
- EAL6: 1
- EAL6 augmented: 1
|
| pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 2
- ACM_SCP.1: 2
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.2: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU.1: 2
- AVA_SOF.1: 2
- AVA_VLA.1: 2
|
- ADV:
- ADV_ARC.1: 4
- ADV_FSP.4: 1
- ADV_FSP.5: 2
- ADV_IMP.1: 3
- ADV_INT.2: 2
- ADV_TDS.3: 1
- ADV_TDS.4: 2
- AGD:
- AGD_OPE.1: 3
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.5: 2
- ALC_DEL.1: 2
- ALC_DVS.2: 9
- ALC_FLR.1: 1
- ALC_LCD.1: 2
- ALC_TAT.2: 2
- ASE:
- ASE_CCL.1: 3
- ASE_ECD.1: 3
- ASE_INT.1: 3
- ASE_OBJ.2: 3
- ASE_REQ.2: 3
- ASE_SPD.1: 3
- ASE_TSS.1: 3
- ASE_TSS.2: 1
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 1
- ATE_DPT.3: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM: 4
- FCS_CKM.1: 15
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 4
- FCS_COP: 1
- FCS_COP.1: 19
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC: 3
- FDP_ACC.1: 50
- FDP_ACC.1.1: 3
- FDP_ACF: 3
- FDP_ACF.1: 48
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 3
- FDP_IFC: 3
- FDP_IFC.1: 3
- FDP_ITC: 1
- FDP_ITC.1: 5
- FDP_RIP.1: 1
- FIA:
- FIA_AFL.1: 87
- FIA_AFL.1.1: 9
- FIA_AFL.1.2: 9
- FIA_ATD.1: 12
- FIA_ATD.1.1: 1
- FIA_NEW.1: 12
- FIA_NEW.1.1: 1
- FIA_NEW.1.2: 1
- FIA_SOS: 1
- FIA_SOS.1: 67
- FIA_SOS.1.1: 7
- FIA_SOS.2: 11
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_UAU: 11
- FIA_UAU.1: 17
- FIA_UAU.2: 119
- FIA_UAU.2.1: 7
- FIA_UAU.6: 10
- FIA_UAU.6.1: 1
- FIA_UAU.7: 17
- FIA_UAU.7.1: 2
- FIA_UID: 16
- FIA_UID.1: 21
- FIA_UID.2: 62
- FIA_UID.2.1: 7
- FIA_USB.1: 10
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_CKM.1: 1
- FMT_MAS.1: 1
- FMT_MOF.1: 111
- FMT_MOF.1.1: 3
- FMT_MSA: 12
- FMT_MSA.1: 34
- FMT_MSA.1.1: 3
- FMT_MSA.2: 4
- FMT_MSA.3: 22
- FMT_MSA.3.1: 4
- FMT_MSA.3.2: 3
- FMT_MTD.1: 191
- FMT_MTD.1.1: 13
- FMT_SMF: 19
- FMT_SMF.1: 41
- FMT_SMF.1.1: 1
- FMT_SMR: 23
- FMT_SMR.1: 112
- FMT_SMR.1.1: 6
- FMT_SMR.1.2: 6
- FPT:
- FPT_RVM.1: 19
- FPT_RVM.1.1: 1
- FPT_SEP.1: 13
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FTA:
- FTA_SSL.3: 9
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 8
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FCS:
- FCS_CKM: 112
- FCS_CKM.1: 30
- FCS_CKM.2: 11
- FCS_CKM.4: 44
- FCS_CKM.4.1: 1
- FCS_COP: 141
- FCS_COP.1: 24
- FCS_COP.1.1: 1
- FCS_RND: 1
- FCS_RND.1: 13
- FCS_RND.1.1: 1
- FCS_RND.1.2: 1
- FCS_RNG: 3
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 77
- FDP_ACC.1: 36
- FDP_ACF: 36
- FDP_ACF.1: 36
- FDP_AFC: 18
- FDP_DAU: 10
- FDP_DAU.1: 1
- FDP_DAU.2: 2
- FDP_IFC.1: 19
- FDP_ITC: 8
- FDP_ITC.1: 25
- FDP_ITC.2: 22
- FDP_ITT.1: 1
- FDP_RIP.1: 10
- FDP_RIP.1.1: 1
- FDP_SDC.1: 1
- FDP_SDI: 21
- FDP_SDI.1: 2
- FDP_SDI.2: 5
- FDP_UCT: 10
- FDP_UCT.1: 1
- FDP_UIT: 12
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 23
- FIA_AFL.1: 7
- FIA_API: 1
- FIA_API.1: 8
- FIA_API.1.1: 1
- FIA_UAU: 25
- FIA_UAU.1: 20
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UAU.4: 2
- FIA_UAU.4.1: 1
- FIA_UAU.5: 2
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 12
- FIA_UAU.6.1: 1
- FIA_UID.1: 21
- FIA_UID.1.1: 2
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 2
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MOF.1: 8
- FMT_MOF.1.1: 1
- FMT_MSA: 69
- FMT_MSA.1: 9
- FMT_MSA.2: 9
- FMT_MSA.2.1: 1
- FMT_MSA.3: 20
- FMT_MSA.4: 4
- FMT_MTD: 44
- FMT_MTD.1: 5
- FMT_SMF.1: 29
- FMT_SMF.1.1: 2
- FMT_SMR.1: 35
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 20
- FPT_EMS.1: 7
- FPT_FLS.1: 11
- FPT_FLS.1.1: 1
- FPT_ITC: 1
- FPT_ITT.1: 1
- FPT_PHP.1: 7
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 10
- FPT_PHP.3.1: 1
- FPT_TST: 1
- FPT_TST.1: 13
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FTP:
- FTP_ITC: 40
- FTP_ITC.1: 16
- FTP_TRP.1: 4
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.NETWORK: 2
- A.SERVER: 1
- A.SETTING: 1
- O:
- O.CHECK-HDD: 5
- O.CONFIG: 9
- O.CRYPT-KEY: 1
- O.CRYPTO-MAIL: 6
- O.GROUP-BOX: 4
- O.OVERWRITE-ALL: 5
- O.PRIVATE-BOX: 3
- O.PUBLIC-BOX: 6
- O.REGISTERED-USER: 12
- O.SECURE-PRINT: 6
- O.TRUSTED-PASS: 3
- OE:
- OE.CRYPT: 5
- OE.FEED-BACK: 12
- OE.LOCK-HDD: 1
- OE.SESSION: 1
- T:
- T.ACCESS-GROUP-BOX: 2
- T.ACCESS-NET-SETTING: 1
- T.ACCESS-PRIVATE-BOX: 1
- T.ACCESS-SETTING: 1
- T.BACKUP-RESTORE: 1
- T.DISCARD-MFP: 1
|
- A:
- A.CGA: 3
- A.CSP: 5
- A.SCA: 3
- O:
- O.AES: 1
- O.ECC: 1
- O.PUF: 1
- O.RND: 1
- O.RSA: 1
- O.SHA: 1
- O.TDES: 1
- OE:
- OE.CGA_TC_: 1
- OE.HID_VAD: 7
- OT:
- OT.EMSEC_: 1
- OT.TOE_TC_: 1
|
| pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 1
- NXP Semiconductors: 7
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 12
- TDEA: 1
- TDES: 5
- Triple-DES: 3
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 3
- SHA-256: 8
- SHA-384: 3
- SHA-512: 4
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Malfunction: 1
- fault injection: 2
- malfunction: 1
- physical tampering: 4
- SCA:
- Leak-Inherent: 1
- physical probing: 2
- side channel: 2
|
| pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI TR-02102-1: 1
- BSI TR-03110: 1
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- FIPS:
- FIPS 180-1: 2
- FIPS 186: 4
- FIPS 186-1: 2
- FIPS PUB 197: 5
- X509:
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 180-4: 1
- FIPS PUB 140-3: 1
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- FIPS PUB 197: 1
- ICAO:
- ISO:
- ISO/IEC 10116-2017: 1
- ISO/IEC 15408-1: 1
- ISO/IEC 15408-2: 1
- ISO/IEC 15408-3: 1
- ISO/IEC 7816: 2
- NIST:
- NIST SP 800-38B: 1
- NIST SP 800-56A: 1
- NIST SP 800-67: 1
- NIST SP 800-90A: 1
- PKCS:
- PKCS #1: 2
- PKCS #15: 1
- PKCS#1: 2
- PKCS#3: 1
- RFC:
- X509:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
- ConfidentialDocument:
- functions that are realized by the TOE. TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can encrypt the image data written in HDD for the danger of taking: 1
|
|
| pdf_data/st_metadata |
- /Author:
- /Company:
- /CreationDate: D:20080304170621+09'00'
- /Creator: Word 用 Acrobat PDFMaker 7.0
- /ModDate: D:20080304171340+09'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Title: Microsoft Word - 【C0127】Thames1_英文ST-1.03-080304.doc
- /_AdHocReviewCycleID: -1264862075
- /_AuthorEmail: [email protected]
- /_AuthorEmailDisplayName: megumi tanabe
- /_EmailSubject: 【Mosel ISO15408】 ST翻訳確認のお願い
- pdf_file_size_bytes: 922218
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 131
|
- /Author: MaskTech International GmbH
- /Keywords: Common Criteria, CC, Secure Signature Creation Device, SSCD, MTCOS, EAL 5+
- /Subject: Common Criteria Certification
- /Title: MTCOS Pro 2.6 SSCD / P71D352 (N7121)- Security Target lite
- pdf_file_size_bytes: 1200444
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 130
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
True |
| state/cert/download_ok |
False |
True |
| state/cert/extract_ok |
False |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |