Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
bizhub C353/ ineo+ 353 Control Software
JISEC-CC-CRP-C0127
CardOS DI V4.2C CNS with Application for QES
BSI-DSZ-CC-0665-2010
name bizhub C353/ ineo+ 353 Control Software CardOS DI V4.2C CNS with Application for QES
category Multi-Function Devices Products for Digital Signatures
scheme JP DE
not_valid_after 28.12.2010 01.09.2019
not_valid_before 26.11.2007 10.12.2010
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080306_c0127_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0665a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080306_c0127_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0665b_pdf.pdf
manufacturer Konica Minolta Business Technologies, Inc Siemens IT Solutions and Services GmbH
manufacturer_web https://www.konicaminolta.com/ https://www.atos.net
security_level EAL3 EAL4+, AVA_VAN.5
dgst 185fc5d6d2f97fda ee3558dbe5d24978
heuristics/cert_id JISEC-CC-CRP-C0127 BSI-DSZ-CC-0665-2010
heuristics/cert_lab [] BSI
heuristics/extracted_sars AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ALC_DVS.1, ATE_IND.2, ADV_RCR.1, ATE_DPT.1, AVA_SOF.1, ADV_HLD.2, AGD_USR.1, ATE_COV.2, ATE_FUN.1, ADV_FSP.1 ADV_TDS.3, ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, APE_ECD.1, ASE_REQ.2, ADV_LLD.1, AGD_PRE.1, ATE_IND.2, AGD_USR.1, ASE_ECD.1, APE_OBJ.2, ADV_IMP.1, ALC_LCD.1, ADV_FSP.4, ATE_DPT.2, AVA_VLA.4, ASE_SPD.1, APE_INT.1, ATE_COV.2, AVA_MSU.3, ADV_INT.3, ASE_TSS.2, ALC_DVS.1, ALC_TAT.1, AGD_ADM.1, APE_CCL.1, AGD_OPE.1, ALC_CMS.4, APE_SPD.1, ALC_DEL.1, ADV_ARC.1, ADV_SPM.1, APE_REQ.2
heuristics/extracted_versions 353 4.2
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0482-2008, BSI-DSZ-CC-0667-2010
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0482-2008, BSI-DSZ-CC-0399-2007, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0668-2010, BSI-DSZ-CC-0476-2007, BSI-DSZ-CC-0223-2003, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0667-2010, BSI-DSZ-CC-0437-2008, BSI-DSZ-CC-0169-2002
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0127
  • certification_date: 01.11.2007
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 2.3
    • cert_link: https://www.ipa.go.jp/en/security/c0127_eimg.pdf
    • description: PRODUCT DESCRIPTION This product is the embedded software that is installed on the Konica Minolta Business Technologies, Inc. digital MFP (bizhub C353/ ineo+ 353)(Hereinafter referred to as “MFP”). This product offers the protection from exposure of the highly confidential document stored in the MFP, and aims at protecting the data which may be exposed against a user's intention. In order to realize it, this offers the functions such as the function that limits the operation to the specific document only to the authorized user, the function that performs the overwrite deletion of the data domain which became unnecessary and the function that deletes the confidential information including a setting value. Moreover , this has the mechanism using the unauthorized access protection function (HDD Lock Function) with which HDD is equipped against the risk of taking out HDD unjustly which is a medium for storing image data in MFP. If the encryption board, an option product, is installed in the MFP controller, this provides the function of generating the encryption key that encrypts all data including image data written to the HDD.
    • evaluation_facility: Mizuho Information & Research Institute, Inc.Center for Evaluation of Information Security
    • product: bizhub C353/ ineo+ 353 Control Software(Japanese Name) bizhub C353/ ineo+ 353 Control Software(English Name)
    • product_type: IT Product (data protection function in digital MFD)
    • report_link: https://www.ipa.go.jp/en/security/c0127_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0127_est.pdf
    • toe_version: A02E0Y0-0100-GM0-02
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.01.2011
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub C353/ ineo+ 353 Control Software A02E0Y0-0100-GM0-02
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0127_it7142.html
  • toe_overseas_name: bizhub C353/ ineo+ 353 Control Software A02E0Y0-0100-GM0-02
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0482-2008
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0482-2008, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0322-2005
heuristics/protection_profiles {} 40002c3611fc465f
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0006b.pdf
pdf_data/report_filename 20080306_c0127_erpt.pdf 0665a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0665-2010
    • cert_item: CardOS DI V4.2C CNS with Application for QES
    • cert_lab: BSI
    • developer: Siemens IT Solutions and Services GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0127-01: 1
    • Certification No. C0127: 1
  • DE:
    • BSI-DSZ-CC-0482: 1
    • BSI-DSZ-CC-0482-2008: 2
    • BSI-DSZ-CC-0665-2010: 22
    • BSI-DSZ-CC-0667-2010: 3
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0006-2002: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL 4: 9
    • EAL 4 augmented: 3
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 9
    • EAL4+: 1
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 4
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 2
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 2
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 2
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVER: 1
    • A.SERVICE: 1
    • A.SETTING: 1
  • T:
    • T.ACCESS: 1
    • T.ACCESS-GROUP-BOX: 1
    • T.ACCESS-NET: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.ACCESS-PUBLIC: 1
    • T.ACCESS-SECURE-PRINT: 1
    • T.BACKUP: 1
    • T.BRING-OUT: 1
    • T.DISCARD-MFP: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 5
    • Infineon Technologies: 1
    • Infineon Technologies AG: 4
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • 3DES:
      • TDES: 1
    • DES:
      • DES: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
  • RSA:
    • RSA 1024: 1
    • RSA 2048: 3
    • RSA1024: 1
    • RSA2048: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 2
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 3
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • FIPS:
    • FIPS 180-1: 1
    • FIPS 186: 1
    • FIPS 186-1: 1
    • FIPS PUB 197: 1
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
  • BSI:
    • AIS 25: 3
    • AIS 26: 3
    • AIS 32: 1
    • AIS 34: 2
    • AIS 36: 3
    • AIS 38: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 353)(Hereinafter referred to as “MFP”). This TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can encrypt the image data written in HDD for the danger of taking: 1
  • ConfidentialDocument:
    • 8] Evaluation Technical Report, Version 1.01, 29 October 2010, T-Systems GEI GmbH (confidential document) [9] ETR for composite evaluation according to AIS 36 for the Product SLE66CLX800PE / m1581-a14: 1
    • AG, Certification ID BSI-DSZ-CC-0482, Version 5, 16.03.2010, TÜV Informationstechnik GmbH (confidential document) [10] CardOS DI V4.2C CNS with Application for QES Configuration List 10/2010 , Version 0.1, 11.10: 1
    • confidential document) [11] Administrator Guidance CardOS DI V4.2C CNS, Edition 09/2010, Version 0.70, Siemens AG, 15.09: 1
pdf_data/report_metadata
  • /CreationDate: D:20080305165156+09'00'
  • /ModDate: D:20080305165156+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 309678
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 33
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20101229124339+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, QES, Signatur, Signaturkarte, signature, SSCD"
  • /ModDate: D:20101229124633+01'00'
  • /Producer: OpenOffice.org 3.1
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0665-2010
  • pdf_file_size_bytes: 956690
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 40
pdf_data/st_filename 20080306_c0127_est.pdf 0665b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0482-2008: 2
  • NL:
    • CC-3: 24
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0002-2001: 1
    • BSI-PP-0002: 1
    • BSI-PP-0002-2001: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 6
    • EAL4: 1
  • EAL:
    • EAL 4: 14
    • EAL 5+: 1
    • EAL4: 12
    • EAL4 augmented: 3
    • EAL4+: 2
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.3: 2
    • ACM_SCP.1: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.2: 2
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.1: 2
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
  • ACM:
    • ACM_AUT.1: 1
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL.2: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_ARC.1: 8
    • ADV_FSP.1: 1
    • ADV_FSP.2: 5
    • ADV_FSP.4: 4
    • ADV_IMP.1: 6
    • ADV_LLD.1: 1
    • ADV_SPM.1: 1
    • ADV_TDS.1: 2
    • ADV_TDS.2: 1
    • ADV_TDS.3: 6
  • AGD:
    • AGD_ADM.1: 1
    • AGD_OPE.1: 7
    • AGD_PRE.1: 11
    • AGD_USR.1: 1
  • ALC:
    • ALC_CMC.4: 4
    • ALC_CMS.4: 3
    • ALC_DEL: 1
    • ALC_DEL.1: 6
    • ALC_DVS: 1
    • ALC_DVS.1: 5
    • ALC_LCD.1: 6
    • ALC_TAT.1: 6
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 4
    • ATE_DPT.1: 2
    • ATE_DPT.2: 1
    • ATE_FUN.1: 6
    • ATE_IND.2: 4
  • AVA:
    • AVA_MSU.3: 1
    • AVA_VAN: 1
    • AVA_VAN.5: 12
    • AVA_VLA.4: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM: 4
    • FCS_CKM.1: 15
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 4
    • FCS_COP: 1
    • FCS_COP.1: 19
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC: 3
    • FDP_ACC.1: 50
    • FDP_ACC.1.1: 3
    • FDP_ACF: 3
    • FDP_ACF.1: 48
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_IFC: 3
    • FDP_IFC.1: 3
    • FDP_ITC: 1
    • FDP_ITC.1: 5
    • FDP_RIP.1: 1
  • FIA:
    • FIA_AFL.1: 87
    • FIA_AFL.1.1: 9
    • FIA_AFL.1.2: 9
    • FIA_ATD.1: 12
    • FIA_ATD.1.1: 1
    • FIA_NEW.1: 12
    • FIA_NEW.1.1: 1
    • FIA_NEW.1.2: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 67
    • FIA_SOS.1.1: 7
    • FIA_SOS.2: 11
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU: 11
    • FIA_UAU.1: 17
    • FIA_UAU.2: 119
    • FIA_UAU.2.1: 7
    • FIA_UAU.6: 10
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 17
    • FIA_UAU.7.1: 2
    • FIA_UID: 16
    • FIA_UID.1: 21
    • FIA_UID.2: 62
    • FIA_UID.2.1: 7
    • FIA_USB.1: 10
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_CKM.1: 1
    • FMT_MAS.1: 1
    • FMT_MOF.1: 111
    • FMT_MOF.1.1: 3
    • FMT_MSA: 12
    • FMT_MSA.1: 34
    • FMT_MSA.1.1: 3
    • FMT_MSA.2: 4
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 3
    • FMT_MTD.1: 191
    • FMT_MTD.1.1: 13
    • FMT_SMF: 19
    • FMT_SMF.1: 41
    • FMT_SMF.1.1: 1
    • FMT_SMR: 23
    • FMT_SMR.1: 112
    • FMT_SMR.1.1: 6
    • FMT_SMR.1.2: 6
  • FPT:
    • FPT_RVM.1: 19
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 13
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_SAS.1: 1
  • FCS:
    • FCS_CKM.1: 15
    • FCS_CKM.1.1: 2
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 1
    • FCS_COP: 8
    • FCS_COP.1: 10
    • FCS_COP.1.1: 2
    • FCS_RND.1: 1
  • FDP:
    • FDP_ACC: 22
    • FDP_ACC.1: 14
    • FDP_ACF: 15
    • FDP_ACF.1: 32
    • FDP_ACF.1.4: 1
    • FDP_ETC: 3
    • FDP_ETC.1: 5
    • FDP_IFC.1: 1
    • FDP_ITC: 4
    • FDP_ITC.1: 7
    • FDP_ITT.1: 1
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
    • FDP_SDI: 9
    • FDP_SDI.1: 1
    • FDP_SDI.2: 8
    • FDP_UIT: 8
    • FDP_UIT.1: 9
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 6
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 7
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 8
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM.1: 1
    • FMT_LIM.2: 1
    • FMT_MOF.1: 8
    • FMT_MOF.1.1: 1
    • FMT_MSA: 7
    • FMT_MSA.1: 11
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 7
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 14
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 7
    • FMT_MTD.1.1: 1
    • FMT_SMF: 4
    • FMT_SMF.1: 15
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_TEE.1.2: 1
  • FPT:
    • FPT_AMT.1: 1
    • FPT_FLS: 1
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP.1: 5
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 6
    • FPT_PHP.3.1: 1
    • FPT_SEP.1: 1
    • FPT_TEE.1: 7
    • FPT_TEE.1.1: 1
    • FPT_TEE.1.2: 1
    • FPT_TST.1: 10
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST.2: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 17
    • FTP_ITC.1: 9
    • FTP_ITC.1.1: 1
    • FTP_TRP: 9
    • FTP_TRP.1: 5
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 2
    • A.SERVER: 1
    • A.SETTING: 1
  • O:
    • O.CHECK-HDD: 5
    • O.CONFIG: 9
    • O.CRYPT-KEY: 1
    • O.CRYPTO-MAIL: 6
    • O.GROUP-BOX: 4
    • O.OVERWRITE-ALL: 5
    • O.PRIVATE-BOX: 3
    • O.PUBLIC-BOX: 6
    • O.REGISTERED-USER: 12
    • O.SECURE-PRINT: 6
    • O.TRUSTED-PASS: 3
  • OE:
    • OE.CRYPT: 5
    • OE.FEED-BACK: 12
    • OE.LOCK-HDD: 1
    • OE.SESSION: 1
  • T:
    • T.ACCESS-GROUP-BOX: 2
    • T.ACCESS-NET-SETTING: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.ACCESS-SETTING: 1
    • T.BACKUP-RESTORE: 1
    • T.DISCARD-MFP: 1
  • A:
    • A.CGA: 3
    • A.SCA: 3
  • OE:
    • OE.HI_VAD: 4
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 13
    • Infineon Technologies AG: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
  • DES:
    • 3DES:
      • 3DES: 1
    • DES:
      • DES: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
  • RSA:
    • RSA 2048: 3
    • RSA2048: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 8
  • RIPEMD:
    • RIPEMD160: 1
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-2: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • KA: 4
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 4
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • physical tampering: 5
  • SCA:
    • DPA: 1
    • SPA: 2
    • timing attacks: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
  • FIPS:
    • FIPS 180-1: 2
    • FIPS 186: 4
    • FIPS 186-1: 2
    • FIPS PUB 197: 5
  • X509:
    • X.509: 1
  • BSI:
    • AIS31: 2
    • AIS36: 1
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 2
  • FIPS:
    • FIPS PUB 180-2: 2
    • FIPS PUB 46-3: 1
  • ISO:
    • ISO/IEC 14443: 2
  • PKCS:
    • PKCS #1: 2
    • PKCS#1: 3
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • functions that are realized by the TOE. TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can encrypt the image data written in HDD for the danger of taking: 1
pdf_data/st_metadata
  • /Author:
  • /Company:
  • /CreationDate: D:20080304170621+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 7.0
  • /ModDate: D:20080304171340+09'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Title: Microsoft Word - 【C0127】Thames1_英文ST-1.03-080304.doc
  • /_AdHocReviewCycleID: -1264862075
  • /_AuthorEmail: [email protected]
  • /_AuthorEmailDisplayName: megumi tanabe
  • /_EmailSubject: 【Mosel ISO15408】 ST翻訳確認のお願い
  • pdf_file_size_bytes: 922218
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 131
  • /Author: Siemens AG, Siemens IT Solutions and Services
  • /CreationDate: D:20100809110619
  • /Creator: pdfFactory Pro www.pdffactory.com
  • /Keywords: Common Criteria Security Target CardOS DI CNS QES
  • /Producer: pdfFactory Pro 1.61 (Windows 2000 German)
  • /Subject: Common Criteria Security Target CardOS DI V4.2C CNS
  • /Title: Security Target CardOS DI V4.2C CNS with Application for QES
  • pdf_file_size_bytes: 305783
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 59
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different