name |
Dell C5765dn Color Laser Multifunction Printer Version: Controller ROM Ver. 2.205.1 IOT ROM Ver. 3.0.2 ADF ROM Ver. 11.1.0 Fax ROM Ver. 100.19.0 |
HP PageWide Enterprise Color Flow MFP 785, HP PageWide Enterprise Color MFP 586, HP LaserJet Enterprise MFP M528, HP PageWide Managed Color Flow MFP E77650, HP PageWide Managed Color Flow MFP E77660, HP Color LaserJet Managed MFP E57540, HP LaserJet Managed MFP E52545, and HP LaserJet Managed MFP E52645 multifunction printers (MFPs) with HP FutureSmart 4.11.0.1 Firmware |
category |
Multi-Function Devices |
Multi-Function Devices |
scheme |
JP |
IT |
status |
archived |
active |
not_valid_after |
03.10.2019 |
19.07.2026 |
not_valid_before |
25.09.2014 |
19.07.2021 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0437_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_hp_mfp_fs411_v1.1_en.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0437_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_hp_mfp_3bcf_hcdpp_v1.2.pdf |
manufacturer |
Dell, Inc. |
HP Inc. |
manufacturer_web |
https://www.dell.com |
https://www8.hp.com/hpnext/tags/hp-inc#.Vjdf803sn4g |
security_level |
EAL3 |
{} |
dgst |
1a0a8f102637d244 |
91ae91434a998300 |
heuristics/cert_id |
JISEC-CC-CRP-C0437 |
OCSI/CERT/ATS/11/2020/RC |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
cpe:2.3:h:hp:pagewide_enterprise_color_mfp_586:-:*:*:*:*:*:*:*, cpe:2.3:h:hp:laserjet_4:-:*:*:*:*:*:*:*, cpe:2.3:o:hp:futuresmart_4:-:*:*:*:*:*:*:*, cpe:2.3:o:hp:pagewide_enterprise_color_mfp_586_firmware:-:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2021-3662, CVE-2021-39238, CVE-2019-6318, CVE-2009-0940, CVE-2021-39237, CVE-2009-0941 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ATE_FUN.1, ALC_DVS.1, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1, ALC_CMC.3, ATE_IND.2, ASE_SPD.1, ASE_OBJ.2, ADV_TDS.2, ATE_COV.2, ALC_CMS.3, ASE_REQ.2, ADV_ARC.1, ALC_DEL.1, ATE_DPT.1, AGD_OPE.1, ALC_LCD.1, ASE_ECD.1, ADV_FSP.3, AVA_VAN.2 |
AGD_PRE.1, ASE_CCL.1, ALC_CMS.1, ASE_INT.1, ASE_TSS.1, ADV_FSP.1, AVA_VAN.1, AGD_OPE.1, ATE_IND.1, ASE_REQ.1, ASE_OBJ.1, ASE_ECD.1, ASE_SPD.1, ALC_CMC.1 |
heuristics/extracted_versions |
100.19.0, 11.1.0, 3.0.2, 2.205.1 |
4.11.0.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0437
- certification_date: 01.09.2014
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0437_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such basic functions as copy, print, scan, and fax. The TOE is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the MFD via internal network, and general user client which is directly connected to the MFD. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator's Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - Fax Flow Security - Self Test
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Dell C5765dn Color Laser Multifunction Printer
- product_type: Multi Function Device
- report_link: https://www.ipa.go.jp/en/security/c0437_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0437_est.pdf
- toe_version: Controller ROM Ver. 2.205.1 IOT ROM Ver. 3.0.2 ADF ROM Ver. 11.1.0 Fax ROM Ver. 100.19.0
- vendor: Dell Inc.
- expiration_date: 01.10.2019
- supplier: Dell Inc.
- toe_japan_name: Dell C5765dn Color Laser Multifunction PrinterController ROM Ver. 2.205.1, IOT ROM Ver. 3.0.2, ADF ROM Ver. 11.1.0, Fax ROM Ver. 100.19.0
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0437_it3445.html
- toe_overseas_name: Dell C5765dn Color Laser Multifunction PrinterController ROM Ver. 2.205.1, IOT ROM Ver. 3.0.2, ADF ROM Ver. 11.1.0, Fax ROM Ver. 100.19.0
|
- certification_date: 19.07.2021
- level: conforme a PP_HCD_V1.0
- report_link_en: https://www.ocsi.gov.it/documenti/certificazioni/hp/cr_hp_mfp_fs411_v1.1_en.pdf
- report_link_it: https://www.ocsi.gov.it/documenti/certificazioni/hp/rc_hp_mfp_fs411_v1.1_it.pdf
- revision_date: 25.10.2021
- supplier: HP, Inc.
- target_link: https://www.ocsi.gov.it/documenti/certificazioni/hp/st_hp_mfp_3bcf_hcdpp_v1.2.pdf
- title: HP PageWide Enterprise Color Flow MFP 785, HP PageWide Enterprise Color
MFP 586, HP LaserJet Enterprise MFP M528, HP PageWide Managed Color
Flow MFP E77650, HP PageWide Managed Color Flow MFP E77660, HP Color
LaserJet Managed MFP E57540, HP LaserJet Managed MFP E52545,
and HP LaserJet Managed MFP E52645 multifunction printers (MFPs)
with HP FutureSmart 4.11.0.1 Firmware
- vulnerability_note_link: https://www.ocsi.gov.it/documenti/certificazioni/hp/nota_ocsi_cve_2021_39238.pdf
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0437_erpt.pdf |
cr_hp_mfp_fs411_v1.1_en.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0437-01: 1
- Certification No. C0437: 1
|
- IT:
- OCSI/CERT/ATS/11/2020/RC: 34
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- AGD:
- AGD_OPE.1: 3
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.1: 3
- ALC_CMS.1: 3
- ALC_FLR: 1
- ASE:
- ASE_CCL.1: 3
- ASE_ECD.1: 3
- ASE_INT.1: 3
- ASE_OBJ.1: 3
- ASE_REQ.1: 3
- ASE_SPD.1: 3
- ASE_TSS.1: 3
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.ADMIN: 1
- A.SECMODE: 1
- A.USER: 1
- T:
- T.COMM_TAP: 2
- T.CONFDATA: 2
- T.CONSUME: 2
- T.DATA_SEC: 2
- T.RECOVER: 2
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 3
|
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
- NIST:
- P-256: 4
- P-384: 4
- P-521: 2
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
- X509:
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- ISO:
- PKCS:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20141112134831+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20141112134854+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 332931
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 38
|
- /Author: OCSI
- /CreationDate: D:20211025090419+02'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20211025090419+02'00'
- /Producer: Microsoft® Word 2010
- /Title: Certification Report "HP Multifunction Printers (MFPs) with HP FutureSmart 4.11.0.1 Firmware"
- pdf_file_size_bytes: 853608
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
pdf_data/st_filename |
c0437_est.pdf |
st_hp_mfp_3bcf_hcdpp_v1.2.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 2
- ASE_INT.1: 2
- ASE_OBJ.1: 2
- ASE_REQ.1: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 2
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 2
- FAU_SAR.2: 8
- FAU_SAR.2.1: 1
- FAU_STG: 1
- FAU_STG.1: 10
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 3
- FCS_COP.1: 10
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 11
- FDP_IFC.1.1: 1
- FDP_IFF: 1
- FDP_IFF.1: 10
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 30
- FIA_AFL.1.1: 4
- FIA_AFL.1.2: 4
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU.1: 19
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 9
- FIA_UAU.7.1: 1
- FIA_UIA.1: 1
- FIA_UID.1: 15
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 8
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA: 2
- FMT_MSA.1: 11
- FMT_MSA.1.1: 1
- FMT_MSA.3: 11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 11
- FMT_MTD.1.1: 1
- FMT_SMF.1: 17
- FMT_SMF.1.1: 1
- FMT_SMR.1: 15
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 10
- FPT_STM.1.1: 1
- FPT_TST.1: 8
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_TRP.1: 8
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 19
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAR.1: 1
- FAU_SAR.2: 1
- FAU_STG: 2
- FAU_STG.1: 1
- FAU_STG.4: 1
- FAU_STG_EXT.1: 11
- FAU_STG_EXT.1.1: 3
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 48
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.4: 24
- FCS_CKM.4.1: 3
- FCS_CKM_EXT.4: 20
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 109
- FCS_COP.1.1: 4
- FCS_KDF_EXT.1: 4
- FCS_KYC: 2
- FCS_KYC_EXT: 1
- FCS_KYC_EXT.1: 25
- FCS_KYC_EXT.1.1: 2
- FCS_PCC_EXT.1: 2
- FCS_RBG: 2
- FCS_RBG_EXT.1: 34
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 3
- FCS_SMC_EXT.1: 4
- FCS_SNI_EXT.1: 2
- FCS_SSH_EXT.1: 1
- FCS_SSH_EXT.1.5: 1
- FCS_SSH_EXT.1.7: 1
- FCS_TLS_EXT.1: 4
- FDP:
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_ACF.1: 17
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DSK: 2
- FDP_DSK_EXT.1: 15
- FDP_DSK_EXT.1.1: 2
- FDP_DSK_EXT.1.2: 4
- FDP_FXS: 2
- FDP_FXS_EXT: 1
- FDP_FXS_EXT.1: 14
- FDP_FXS_EXT.1.1: 2
- FDP_FXS_EXT.1.2: 1
- FDP_IFC.1: 1
- FDP_ITC.1: 5
- FDP_ITC.2: 5
- FDP_RIP.1: 13
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 17
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 15
- FIA_ATD.1.1: 1
- FIA_PMG: 2
- FIA_PMG_EXT: 1
- FIA_PMG_EXT.1: 20
- FIA_PMG_EXT.1.1: 2
- FIA_PSK: 2
- FIA_PSK_EXT: 1
- FIA_PSK_EXT.1: 23
- FIA_PSK_EXT.1.1: 2
- FIA_PSK_EXT.1.2: 2
- FIA_PSK_EXT.1.3: 3
- FIA_UAU.1: 16
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 8
- FIA_UAU.7.1: 1
- FIA_UID.1: 16
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 18
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 19
- FMT_MOF.1.1: 1
- FMT_MSA.1: 20
- FMT_MSA.1.1: 1
- FMT_MSA.3: 11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 2
- FMT_MTD.1: 22
- FMT_MTD.1.1: 1
- FMT_SMF.1: 16
- FMT_SMF.1.1: 1
- FMT_SMR.1: 20
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_KYP: 2
- FPT_KYP_EXT: 1
- FPT_KYP_EXT.1: 13
- FPT_KYP_EXT.1.1: 2
- FPT_SKP: 2
- FPT_SKP_EXT: 1
- FPT_SKP_EXT.1: 13
- FPT_SKP_EXT.1.1: 2
- FPT_STM.1: 16
- FPT_STM.1.1: 1
- FPT_TST: 2
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 19
- FPT_TST_EXT.1.1: 2
- FPT_TUD: 2
- FPT_TUD_EXT: 1
- FPT_TUD_EXT.1: 19
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FTA:
- FTA_SSL.3: 11
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 16
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 24
- FTP_TRP.1.1: 2
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.ADMIN: 5
- A.SECMODE: 5
- A.USER: 3
- O:
- O.AUDITS: 8
- O.CIPHER: 6
- O.COMM_SEC: 7
- O.FAX_SEC: 5
- O.MANAGE: 9
- O.RESIDUAL: 4
- O.RESTRICT: 7
- O.USER: 7
- O.VERIFY: 4
- OE:
- OE.ADMIN: 3
- OE.PHYSICAL: 3
- OE.SEC: 9
- OE.USER: 3
- T:
- T.COMM_TAP: 5
- T.CONFDATA: 3
- T.CONSUME: 5
- T.DATA_SEC: 3
- T.RECOVER: 5
|
- A:
- A.NETWORK: 3
- A.PHYSICAL: 3
- A.TRAINED_USERS: 4
- A.TRUSTED_ADMIN: 3
- D:
- O:
- O.ACCESS_CONTROL: 21
- O.ADMIN_ROLES: 15
- O.AUDIT: 16
- O.COMMS_PROTECTION: 39
- O.FAX_NET_SEPARATION: 7
- O.IMAGE_OVERWRITE: 9
- O.KEY_MATERIAL: 7
- O.PURGE_DATA: 1
- O.STORAGE_ENCRYPTION: 17
- O.TSF_SELF_TEST: 7
- O.UPDATE_VERIFICATION: 11
- O.USER: 4
- O.USER_AUTHORIZATION: 18
- OE:
- OE.ADMIN_TRAINING: 3
- OE.ADMIN_TRUST: 3
- OE.NETWORK_PROTECTION: 3
- OE.PHYSICAL_PROTECTION: 3
- OE.USER_TRAINING: 3
- T:
- T.NET_COMPROMISE: 3
- T.TSF_COMPROMISE: 2
- T.TSF_FAILURE: 3
- T.UNAUTHORIZED_ACCESS: 5
- T.UNAUTHORIZED_UPDATE: 3
|
pdf_data/st_keywords/vendor |
|
- Microsoft:
- Microsoft: 6
- Microsoft Corporation: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- AES:
- AES: 55
- AES-: 1
- AES-128: 1
- AES-256: 6
- constructions:
- MAC:
- HMAC: 23
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
- SHA3:
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IKE: 17
- IKEv1: 41
- IKEv2: 5
- IPsec:
- SSH:
- TLS:
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 14
- P-384: 14
- P-521: 14
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- malfunction: 2
- physical tampering: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- RFC:
- X509:
|
- FIPS:
- FIPS 140-2: 7
- FIPS 180-3: 1
- FIPS PUB 180-3: 1
- FIPS PUB 186-4: 2
- FIPS PUB 197: 1
- FIPS180-4: 5
- FIPS186-4: 9
- FIPS197: 5
- FIPS198-1: 3
- ISO:
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-90A: 2
- PKCS:
- RFC:
- RFC 3602: 6
- RFC 4106: 2
- RFC 4109: 2
- RFC 4301: 3
- RFC 4303: 2
- RFC 4304: 1
- RFC 4868: 3
- RFC 5282: 1
- RFC2407: 2
- RFC2408: 2
- RFC2409: 2
- RFC3526: 3
- RFC3602: 2
- RFC4109: 2
- RFC4301: 3
- RFC4303: 2
- RFC4868: 2
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20141104101551+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20141104101551+09'00'
- /Producer: Acrobat Distiller 10.1.12 (Windows)
- /Title:
- pdf_file_size_bytes: 488409
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 94
|
- /Author: Anthony J Peterson;[email protected]
- /Comments:
- /Company:
- /ContentTypeId: 0x0101004FF4B889DDA4C643B09D6F0293167C5E
- /CreationDate: D:20211007081120-06'00'
- /Creator: Acrobat PDFMaker 11 for Word
- /Keywords:
- /ModDate: D:20211007081247-06'00'
- /Producer: Adobe PDF Library 11.0
- /SourceModified: D:20210824183044
- /Subject:
- /Title: HP 3BCF HCDPP Security Target
- pdf_file_size_bytes: 1508538
- pdf_hyperlinks: https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=13816, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=1871, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=24416, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=21159, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=6765, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=23804, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=30955, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/Details?validation=17215, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=12290, https://csrc.nist.gov/Projects/Cryptographic-Module-Validation-Program/Certificate/3252, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=1929, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=3946, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=8574, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=22432
- pdf_is_encrypted: False
- pdf_number_of_pages: 164
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |