| name |
bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Control Software |
eTravel EAC v1.2 masquée sur le composant S3CC9LC |
| category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
JP |
FR |
| status |
archived |
archived |
| not_valid_after |
08.04.2014 |
01.09.2019 |
| not_valid_before |
13.03.2009 |
16.03.2012 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0205_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2012-09fr.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0205_st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2012-09en.pdf |
| manufacturer |
Konica Minolta Business Technologies, Inc |
Gemalto / Samsung |
| manufacturer_web |
https://www.konicaminolta.com/ |
https://www.gemalto.com/ |
| security_level |
EAL3 |
EAL4+, AVA_VLA.4, AVA_MSU.3, ADV_IMP.2, ALC_DVS.2 |
| dgst |
2269d5f12e90117d |
7c1a2e19236b65ac |
| heuristics/cert_id |
JISEC-CC-CRP-C0205 |
ANSSI-CC-2012/09 |
| heuristics/cert_lab |
[] |
SERMA |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, ADV_FSP.3, ALC_LCD.1, AVA_VLA.1, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ASE_TSS.1, ADV_ARC.1 |
AVA_VLA.4, ALC_DVS.2, ADV_IMP.2, AVA_MSU.3 |
| heuristics/extracted_versions |
751, 7522, 601, 6022 |
1.2 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2009/17, BSI-DSZ-CC-0624-2010, ANSSI-CC-2008/45 |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0482-2008, BSI-DSZ-CC-0399-2007, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0400-2007, BSI-DSZ-CC-0411-2007, BSI-DSZ-CC-0438-2007, BSI-DSZ-CC-0452-2007, BSI-DSZ-CC-0223-2003, BSI-DSZ-CC-0501-2008, ANSSI-CC-2008/45, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0410-2007, ANSSI-CC-2008/28, ANSSI-CC-2009/17, BSI-DSZ-CC-0624-2010, BSI-DSZ-CC-0404-2007 |
| heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0205
- certification_date: 01.03.2009
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0205_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE TOE controls the entire operation of MFP, including the operation control processing and the image data management that are accepting from the panel of the main body of digital MFP (Multi Functional Peripheral, and hereinafter referred to as "MFP") or through the network. And TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in HDD for the danger of taking HDD that is the medium that stores the image data in MFP out illegally by using the HDD lock function loaded on the HDD. Besides, TOE has the deletion method to follow various overwrite deletion standards and it deletes all the data of HDD completely. TOE security functionality TOE provides the following security functions. - Administrator Function - SNMP Administrator Function - Service Mode Function - User Function - User Box Function - Secure Print Function - Overwrite deletion Function for all area - Encryption Key Generation Function - HDD validation Function - CF validation Function - Authentication Failure Counter Reset Function - Trust Channel Function - S/MIME Encryption Processing Function - External server authentication operation support Function - Encryption kit operation support Function - HDD lock operation support Function - CF lock operation support Function
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: Japanese: bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Zentai Control Software English: bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Control Software
- product_type: Control Software for digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0205_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0205_st.pdf
- toe_version: A0PN0Y0-0100-G00-15 (System Controller) A0PN0Y0-1D00-G00-11 (BIOS Controller)
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.04.2014
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Zentai Control Software A0PN0Y0-0100-G00-15 (System Controller) A0PN0Y0-1D00-G00-11 (BIOS Controller)
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0205_it8216.html
- toe_overseas_name: bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Control Software A0PN0Y0-0100-G00-15 (System Controller) A0PN0Y0-1D00-G00-11 (BIOS Controller)
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
627a214702fd03e7 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0026_ma1b.pdf |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
c0205_erpt.pdf |
ANSSI-CC_2012-09fr.pdf |
| pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 4 augmenté ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4
- cc_version: Critères Communs version 2.3 conforme à la norme ISO 15408:2005
- cert_id: ANSSI-CC-2012/09
- cert_item: eTravel EAC v1.2 masquée sur le composant S3CC9LC
- cert_item_version: T1004548 avec softmask S1081425 révision 01 02
- cert_lab: Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France
- developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Samsung Electronics La Boursidière, RN 186, Bâtiment Jura, BP 202, 92357 Le Plessis-Robinson, France Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\\(s\\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI-PP-0026, [PP EAC], version 1.2 Protection Profile – Machine Readable Travel Document with ICAO application, Extended Access Control
|
| pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0205-01: 1
- Certification No. C0205: 1
|
- DE:
- BSI-DSZ-CC-0624-: 1
- BSI-DSZ-CC-0624-2010: 3
- BSI-DSZ-CC-0624-2010-MA-01: 1
- FR:
- ANSSI-2009/17: 1
- ANSSI-CC-2012/09: 23
- DCSSI-2008/45: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002-: 1
- BSI-PP-0002-2001: 2
- BSI-PP-0026: 2
- BSI-PP-0026-2006-MA-: 1
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 3
- EAL4+: 1
- EAL5: 1
- EAL5+: 1
- EAL7: 1
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 1
- ACM_CAP: 1
- ACM_SCP: 1
- ADO:
- ADV:
- ADV_FSP: 1
- ADV_HLD: 1
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_LLD: 1
- ADV_RCR: 1
- ADV_SPM: 1
- AGD:
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
- AVA_CCA: 1
- AVA_MSU: 1
- AVA_MSU.3: 2
- AVA_SOF: 1
- AVA_VLA: 2
- AVA_VLA.4: 2
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVICE: 1
- A.SETTING: 1
- T:
- T.ACCESS-GROUP-B: 1
- T.ACCESS-GROUP-BOX: 1
- T.ACCESS-NET-SET: 1
- T.ACCESS-PRIVATE: 1
- T.ACCESS-PRIVATE-BOX: 1
- T.ACCESS-PUBLIC-: 1
- T.ACCESS-PUBLIC-BOX: 1
- T.ACCESS-SECURE-: 1
- T.ACCESS-SECURE-PRINT: 1
- T.ACCESS-SETTING: 2
- T.BACKUP-RESTOR: 1
- T.BACKUP-RESTORE: 1
- T.BRING-OUT-CF: 2
- T.BRING-OUT-STOR: 1
- T.BRING-OUT-STORAGE: 1
- T.DISCARD-MFP: 2
- T.UNEXPECTEC-TRANSMISSION: 1
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
- X509:
|
- BSI:
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- CCMB-2005-08-004: 1
- ICAO:
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- body of MFP or through the network. TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data stored in: 1
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20090409174039+09'00'
- /ModDate: D:20090409174039+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 406178
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
- /Comments: Developpeur
- /Company: SGDSN/ANSSI
- /CreationDate: D:20120320094044+01'00'
- /Keywords:
- /ModDate: D:20120320094044+01'00'
- /Producer: Acrobat Distiller 8.0.0 (Windows)
- /SourceModified: D:20120319122111
- pdf_file_size_bytes: 249858
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
| pdf_data/st_filename |
c0205_st.pdf |
ANSSI-CC-cible_2012-09en.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002: 1
- BSI-PP-0017: 1
- BSI-PP-0026: 2
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 1
- EAL4: 2
- EAL4 augmented: 1
- EAL4+: 1
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_FSP: 1
- ADV_HLD: 1
- ADV_IMP: 1
- ADV_IMP.2: 2
- ADV_LLD: 1
- ADV_RCR: 1
- ALC:
- AVA:
- AVA_MSU.3: 2
- AVA_VLA.4: 2
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CAP.1: 2
- FCS_CKM: 2
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 4
- FCS_COP: 1
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 58
- FDP_ACC.1.1: 3
- FDP_ACF.1: 42
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 3
- FDP_ACP.1: 1
- FDP_IFC.1: 6
- FDP_ITC: 1
- FDP_ITC.1: 4
- FDP_ITC.2: 2
- FDP_RIP.1: 1
- FDP_UAU.7: 1
- FIA:
- FIA_AFL.1: 62
- FIA_AFL.1.1: 8
- FIA_AFL.1.2: 8
- FIA_ATD.1: 25
- FIA_ATD.1.1: 1
- FIA_EID: 2
- FIA_EID.1: 16
- FIA_EID.1.1: 3
- FIA_EID.1.2: 1
- FIA_NEW.1.2: 2
- FIA_SOS: 1
- FIA_SOS.1: 48
- FIA_SOS.1.1: 6
- FIA_SOS.2: 9
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_SSL.3: 1
- FIA_UAU.1: 23
- FIA_UAU.2: 63
- FIA_UAU.2.1: 6
- FIA_UAU.6: 11
- FIA_UAU.6.1: 1
- FIA_UAU.7: 19
- FIA_UAU.7.1: 1
- FIA_UID.1: 31
- FIA_UID.2: 50
- FIA_UID.2.1: 7
- FIA_USB.1: 22
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MAS.1: 1
- FMT_MOF.1: 33
- FMT_MOF.1.1: 4
- FMT_MSA: 3
- FMT_MSA.1: 32
- FMT_MSA.1.1: 3
- FMT_MSA.3: 31
- FMT_MSA.3.1: 5
- FMT_MSA.3.2: 5
- FMT_MTD.1: 105
- FMT_MTD.1.1: 12
- FMT_SMF.1: 109
- FMT_SMF.1.1: 1
- FMT_SMR.1: 167
- FMT_SMR.1.1: 6
- FMT_SMR.1.2: 6
- FMT_SMS.1: 1
- FMT_SOS.1: 1
- FTA:
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 6
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 9
- FCS_CKM.1: 27
- FCS_CKM.4: 10
- FCS_COP: 21
- FCS_COP.1: 58
- FCS_RND: 9
- FCS_RND.1: 14
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC.1: 2
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 2
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DAU: 1
- FDP_DAU.1: 4
- FDP_UCT: 2
- FDP_UCT.1: 4
- FDP_UIT: 2
- FDP_UIT.1: 6
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 16
- FIA_API.1: 8
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 26
- FIA_UAU.1: 3
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 6
- FIA_UAU.5: 6
- FIA_UAU.6: 6
- FIA_UID.1: 3
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 12
- FMT_LIM.1.1: 2
- FMT_LIM.2: 11
- FMT_LIM.2.1: 2
- FMT_MOF.1: 1
- FMT_MTD: 7
- FMT_MTD.1: 13
- FMT_MTD.3: 1
- FMT_MTD.3.1: 1
- FMT_SMF.1: 2
- FMT_SMF.1.1: 1
- FMT_SMR.1: 2
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 3
- FPT_FLS.1.1: 1
- FPT_PHP: 1
- FPT_PHP.3: 5
- FPT_PHP.3.1: 1
- FPT_RVM.1: 3
- FPT_RVM.1.1: 1
- FPT_SEP.1: 3
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TST.1: 4
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.NETWORK: 4
- A.SECRET: 2
- A.SERVICE: 2
- A.SETTING: 3
- O:
- O.AUTH-CAPABILITY: 10
- O.CHECK-CF: 4
- O.CHECK-HDD: 7
- O.CONFIG: 11
- O.CRYPT-KEY: 5
- O.CRYPTO-CAPABILITY: 4
- O.CRYPTO-MAIL: 4
- O.GROUP-BOX: 5
- O.LOCK-CF-CAPABILITY: 4
- O.LOCK-HDD-CAPABILITY: 7
- O.OVERWRITE-ALL: 7
- O.PRIVATE-BOX: 5
- O.PUBLIC-BOX: 8
- O.REGISTERED-USER: 14
- O.SECURE-PRINT: 8
- O.TRUSTED-PASS: 7
- OE:
- OE.ADMIN: 2
- OE.CRYPT: 3
- OE.CRYPTO: 1
- OE.FEED-BACK: 10
- OE.LOCK-CF: 3
- OE.LOCK-HDD: 3
- OE.NETWORK: 2
- OE.SECRET: 2
- OE.SERVER: 5
- OE.SERVICE: 2
- OE.SESSION: 2
- OE.SETTING-SECURITY: 2
- T:
- T.ACCESS-GROUP-BOX: 3
- T.ACCESS-PRIVATE-BOX: 3
- T.ACCESS-PUBLIC-BOX: 2
- T.ACCESS-SECURE-PRINT: 2
- T.ACCESS-SETTING: 2
- T.BACKUP-RESTORE: 3
- T.BRING-OUT-CF: 2
- T.BRING-OUT-STORAGE: 2
- T.DISCARD-MFP: 3
- T.UNEXPECTED-TRANSMISSION: 3
|
- A:
- A.INSP_SYS: 1
- A.PERS_AGENT: 1
- D:
- OE:
- OE.EXAM_MRTD: 1
- OE.PASS_AUTH_SIGN: 1
- OE.PROT_LOGICAL_MRTD: 1
- OT:
- OT.AC_PERS: 1
- OT.DATA_CONF: 1
- OT.DATA_INT: 1
- OT.IDENTIFICATION: 1
- OT.PROT_ABUSE_FUNC: 1
- OT.PROT_INF_LEAK: 1
- OT.PROT_MALFUNCTION: 1
- OT.PROT_PHYS_TAMPER: 1
- T:
- T.INFORMATION_LEAKAGE: 1
- T.MALFUNCTION: 1
- T.PHYS_TAMPER: 1
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 6
- SHA-256: 7
- SHA-384: 6
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 1
- Physical Tampering: 2
- Physical tampering: 3
- fault injection: 1
- malfunction: 3
- physical tampering: 1
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 4
- timing attacks: 1
- other:
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 11
- EF.DG1: 22
- EF.DG10: 1
- EF.DG11: 1
- EF.DG12: 1
- EF.DG13: 3
- EF.DG14: 8
- EF.DG15: 2
- EF.DG16: 22
- EF.DG2: 9
- EF.DG3: 15
- EF.DG4: 15
- EF.DG5: 8
- EF.DG6: 2
- EF.DG7: 1
- EF.DG8: 1
- EF.DG9: 1
- EF.SOD: 10
|
| pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 186: 1
- FIPS 186-1: 1
- FIPS 186-2: 4
- FIPS PUB 197: 3
- X509:
|
- BSI:
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- FIPS:
- FIPS 180-2: 8
- FIPS 46-3: 2
- FIPS PUB 46-3: 1
- FIPS180-2: 6
- FIPS46-3: 2
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- PKCS:
- RFC:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
- ConfidentialDocument:
- INC., All Rights Reserved. 7 / 110 TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in: 1
|
|
| pdf_data/st_metadata |
- /Author: m-izumi
- /CreationDate: D:20090410164324+09'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20090410164324+09'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /Title: Microsoft Word - C0205_ST_en.doc
- pdf_file_size_bytes: 683223
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 110
|
- /CreationDate: D:20120320094137+01'00'
- /Keywords:
- /ModDate: D:20120320094137+01'00'
- /Producer: Microsoft® Office Word 2007
- pdf_file_size_bytes: 945987
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 75
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |