Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Scrambler Board GP-1010 V2.0 for the e-STUDIO 550/650/810
JISEC-CC-CRP-C0005
FIN.X RTOS SE V5
OCSI/CERT/LEO/08/2021/RC
name Scrambler Board GP-1010 V2.0 for the e-STUDIO 550/650/810 FIN.X RTOS SE V5
category Multi-Function Devices Operating Systems
scheme JP IT
status archived active
not_valid_after 10.12.2010 21.06.2027
not_valid_before 16.03.2004 21.06.2022
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0005.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/rc_finx_rtos_se_v5_v1.0.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_finx_rtos_se_v5_rev02_lite.pdf
manufacturer Toshiba TEC Corporation MBDA Italia S.p.A.
manufacturer_web https://www.toshibatec.co.jp/en/ https://www.mbda-systems.com/
security_level EAL2 {}
dgst 1ca981c1dbed4283 e1338a1b4a36e01a
heuristics/cert_id JISEC-CC-CRP-C0005 OCSI/CERT/LEO/08/2021/RC
heuristics/extracted_sars {} ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_REQ.2, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1
heuristics/extracted_versions 2.0 -
heuristics/report_references/directly_referencing {} OCSI/CERT/RES/06/2014/RC
heuristics/report_references/indirectly_referencing {} OCSI/CERT/RES/06/2014/RC, OCSI/CERT/RES/03/2012/RC
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0195
  • certification_date:
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the system software of the digital multi function device “e-STUDIO2330C/2820C/2830C/3520C/3530C/4520C” manufactured by TOSHIBA TEC CORPORATION. The TOE controls general functions as a digital multi function device (Copy, Scan, Print and Fax), and provides functions of e-Filing Box and Shared folder. TOE Security functions The TOE provides function of data overwrite and complete deletion on the user document data deleted from HDD in the “e-STUDIO2330C/2820C/2830C/3520C/3530C/4520C” (except following data: fax reception; expired user document data stored in e-Filing Box and Shared folder after such data’s effective period). The function of data overwrite and complete deletion includes the function to collectively and completely delete all user document data from the HDD before the HDD is disposed or replaced. This function also prevents unauthorized restore of data.
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • product: Japanese: e-STUDIO 2330C/2820C/2830C/ 3520C/3530C/4520C System Software English: System Software for e-STUDIO 2330C/2820C/2830C/ 3520C/3530C/4520C
    • product_type: data protection function in Multi Function Device
    • toe_version: V3.0
    • vendor: TOSHIBA TEC CORPORATION
  • expiration_date: 01.03.2013
  • supplier: TOSHIBA TEC CORPORATION
  • toe_japan_name: e-STUDIO2330C/2820C/2830C/ 3520C/3530C/4520C System Software V3.0
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0195_it8200.html
  • toe_overseas_name: System Software for e-STUDIO2330C/ 2820C/2830C/3520C/3530C/4520C V3.0
heuristics/protection_profiles {} c40ae795865a0dba, e34797b67a3163c5
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_V4.2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf
pdf_data/report_filename c0005.pdf rc_finx_rtos_se_v5_v1.0.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • Certification No. C0005: 1
  • IT:
    • OCSI/CERT/LEO/08/2021/RC: 26
    • OCSI/CERT/RES/06/2014/RC: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 1
  • EAL:
    • EAL2: 1
    • EAL4: 3
    • EAL4+: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 3
  • AGD:
    • AGD_OPE.1: 3
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.1: 3
    • ALC_CMS.1: 3
    • ALC_FLR: 1
    • ALC_TSU_EXT.1: 3
  • ASE:
    • ASE_CCL.1: 3
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.2: 3
    • ASE_REQ.2: 3
    • ASE_SPD.1: 3
    • ASE_TSS.1: 3
  • ATE:
    • ATE_IND.1: 4
  • AVA:
    • AVA_VAN.1: 3
pdf_data/report_keywords/eval_facility
  • LVSLeonardo:
    • LVS Leonardo: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 10
  • TLS:
    • TLS:
      • TLS: 7
      • TLS v1.2: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 21
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC 15408: 6
pdf_data/report_metadata
  • /CreationDate: D:20040526154004+09'00'
  • /ModDate: D:20040526154004+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 13611
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: OCSI
  • /CreationDate: D:20220621125759+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20220621130817+02'00'
  • /Producer: Microsoft® Word 2016
  • /Title: Rapporto di Certificazione del prodotto "FIN.X RTOS SE V5"
  • pdf_file_size_bytes: 903328
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 26
pdf_data/st_filename st_finx_rtos_se_v5_rev02_lite.pdf
pdf_data/st_keywords/cc_cert_id
pdf_data/st_keywords/cc_protection_profile_id
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL1: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_TSU_EXT.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 4
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 1
  • FCS:
    • FCS_CKM.1: 6
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 6
    • FCS_CKM.2.1: 2
    • FCS_CKM_EXT: 1
    • FCS_CKM_EXT.4: 8
    • FCS_CKM_EXT.4.1: 2
    • FCS_CKM_EXT.4.2: 1
    • FCS_COP.1: 26
    • FCS_COP.1.1: 25
    • FCS_RBG_EXT: 1
    • FCS_RBG_EXT.1: 6
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSHC_EXT: 1
    • FCS_SSHC_EXT.1: 3
    • FCS_SSHC_EXT.1.1: 1
    • FCS_SSHS_EXT: 2
    • FCS_SSHS_EXT.1: 2
    • FCS_SSHS_EXT.1.1: 1
    • FCS_SSH_EXT: 2
    • FCS_SSH_EXT.1: 8
    • FCS_SSH_EXT.1.1: 1
    • FCS_SSH_EXT.1.2: 1
    • FCS_SSH_EXT.1.3: 1
    • FCS_SSH_EXT.1.4: 1
    • FCS_SSH_EXT.1.5: 1
    • FCS_SSH_EXT.1.6: 1
    • FCS_SSH_EXT.1.7: 1
    • FCS_SSH_EXT.1.8: 1
    • FCS_STO_EXT: 1
    • FCS_STO_EXT.1: 4
    • FCS_STO_EXT.1.1: 1
    • FCS_TLSC_EXT.1: 14
    • FCS_TLSC_EXT.1.1: 4
    • FCS_TLSC_EXT.1.2: 2
    • FCS_TLSC_EXT.1.3: 2
    • FCS_TLSC_EXT.2: 8
    • FCS_TLSC_EXT.2.1: 5
    • FCS_TLSC_EXT.3: 8
    • FCS_TLSC_EXT.3.1: 1
    • FCS_TLSC_EXT.4: 7
    • FCS_TLSC_EXT.4.1: 1
    • FCS_TLSC_EXT.5: 7
    • FCS_TLSC_EXT.5.1: 1
    • FCS_TLSS_EXT: 1
    • FCS_TLSS_EXT.1: 8
    • FCS_TLSS_EXT.1.1: 4
    • FCS_TLSS_EXT.1.2: 1
    • FCS_TLSS_EXT.1.3: 1
    • FCS_TLSS_EXT.2: 7
    • FCS_TLSS_EXT.2.1: 1
    • FCS_TLSS_EXT.2.2: 1
    • FCS_TLSS_EXT.2.3: 1
    • FCS_TLSS_EXT.3: 6
    • FCS_TLSS_EXT.3.1: 1
    • FCS_TLS_EXT.1: 6
    • FCS_TLS_EXT.1.1: 3
  • FDP:
    • FDP_ACF_EXT: 1
    • FDP_ACF_EXT.1: 4
    • FDP_ACF_EXT.1.1: 1
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 4
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU: 1
    • FIA_UAU.5: 4
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
  • FMT:
    • FMT_MOF_EXT.1: 6
    • FMT_MOF_EXT.1.1: 1
    • FMT_SMF_EXT: 2
    • FMT_SMF_EXT.1: 4
    • FMT_SMF_EXT.1.1: 2
  • FPT:
    • FPT_ACF_EXT: 1
    • FPT_ACF_EXT.1: 4
    • FPT_ACF_EXT.1.1: 1
    • FPT_ACF_EXT.1.2: 1
    • FPT_ASLR_EXT: 1
    • FPT_ASLR_EXT.1: 4
    • FPT_ASLR_EXT.1.1: 1
    • FPT_SBOP_EXT: 1
    • FPT_SBOP_EXT.1: 4
    • FPT_SBOP_EXT.1.1: 1
    • FPT_TST_EXT: 1
    • FPT_TST_EXT.1: 4
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT: 4
    • FPT_TUD_EXT.1: 5
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.2: 4
    • FPT_TUD_EXT.2.1: 2
    • FPT_TUD_EXT.2.2: 1
  • FTA:
    • FTA_TAB: 1
    • FTA_TAB.1: 5
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC_EXT.1: 9
    • FTP_ITC_EXT.1.1: 1
    • FTP_TRP: 1
    • FTP_TRP.1: 4
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.PLATFORM: 3
    • A.PROPER_ADMIN: 3
    • A.PROPER_USER: 3
  • O:
    • O.ACCOUNTABILITY: 6
    • O.INTEGRITY: 6
    • O.MANAGEMENT: 6
    • O.PROTECTED_COMMS: 8
    • O.PROTECTED_STORAGE: 4
  • OE:
    • OE.PLATFORM: 3
    • OE.PROPER_ADMIN: 3
    • OE.PROPER_USER: 3
  • T:
    • T.LIMITED_PHYSICAL_ACCESS: 2
    • T.LOCAL_ATTACK: 2
    • T.NETWORK_ATTACK: 6
    • T.NETWORK_EAVESDROP: 4
pdf_data/st_keywords/vendor
pdf_data/st_keywords/eval_facility
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 12
      • AES-128: 2
      • AES-192: 1
      • AES-256: 3
  • constructions:
    • MAC:
      • HMAC: 11
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDHE: 1
    • ECDSA:
      • ECDSA: 9
  • FF:
    • DH:
      • DH: 4
      • Diffie-Hellman: 7
    • DSA:
      • DSA: 6
pdf_data/st_keywords/pq_crypto
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 2
  • SHA:
    • SHA1:
      • SHA-1: 7
    • SHA2:
      • SHA-2: 5
      • SHA-256: 6
      • SHA-384: 3
      • SHA-512: 6
      • SHA256: 5
      • SHA384: 4
      • SHA512: 4
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • KEX: 2
    • Key Exchange: 2
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 103
    • SSHv2: 3
  • TLS:
    • SSL:
      • SSL 2.0: 1
      • SSL 3.0: 1
    • TLS:
      • TLS: 119
      • TLS 1.0: 1
      • TLS 1.1: 1
      • TLS 1.2: 5
      • TLS v1.2: 3
  • VPN:
    • VPN: 4
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 7
    • PRNG: 1
  • RNG:
    • RBG: 1
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CTR:
    • CTR: 3
  • GCM:
    • GCM: 4
  • XTS:
    • XTS: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 4
    • P-384: 4
    • P-521: 4
    • secp256r1: 4
    • secp384r1: 4
    • secp521r1: 4
pdf_data/st_keywords/crypto_engine
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 3
    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 3
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_RSA_WITH_AES_128_CBC_SHA: 3
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_RSA_WITH_AES_256_CBC_SHA: 3
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 3
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 3
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 16
pdf_data/st_keywords/vulnerability
pdf_data/st_keywords/side_channel_analysis
pdf_data/st_keywords/technical_report_id
pdf_data/st_keywords/device_model
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 87
pdf_data/st_keywords/os_name
pdf_data/st_keywords/cplc_data
pdf_data/st_keywords/ic_data_group
pdf_data/st_keywords/standard_id
  • CC:
    • CCIMB-2012-09-003: 1
    • CCMB-2012-09-001: 1
  • FIPS:
    • FIPS 186-4: 2
    • FIPS PUB 186-4: 5
    • FIPS140: 2
    • FIPS186: 1
    • FIPS186-4: 4
    • FIPS197: 2
    • FIPS198-1: 1
  • NIST:
    • NIST SP 800-131A: 1
    • NIST SP 800-38A: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-38E: 1
    • NIST SP 800-57: 2
    • NIST SP 800-90A: 1
  • RFC:
    • RFC 3526: 2
    • RFC 4151: 1
    • RFC 4251: 1
    • RFC 4252: 5
    • RFC 4253: 11
    • RFC 4256: 2
    • RFC 4344: 3
    • RFC 5246: 21
    • RFC 5280: 4
    • RFC 5288: 12
    • RFC 5289: 24
    • RFC 5656: 16
    • RFC 5759: 1
    • RFC 6125: 2
    • RFC 6668: 3
    • RFC 6960: 1
    • RFC 8017: 1
    • RFC 8268: 2
    • RFC 8332: 7
  • X509:
    • X.509: 16
    • x.509: 2
pdf_data/st_keywords/javacard_version
pdf_data/st_keywords/javacard_api_const
pdf_data/st_keywords/javacard_packages
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects that are accessible to users but cannot be used to store: 1
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • out of scope: 2
pdf_data/st_metadata
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/convert_ok False True
state/st/download_ok False True
state/st/extract_ok False True
state/st/pdf_hash Different Different
state/st/txt_hash Different Different