| name |
bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Control Software |
IDMotion V2 Multos Virtual Machine OS Multos V4.5.2, AMD version 0151v001 |
| category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
JP |
FR |
| status |
archived |
archived |
| not_valid_after |
08.04.2014 |
14.12.2023 |
| not_valid_before |
13.03.2009 |
14.12.2018 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0205_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_50fr.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0205_st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_50en.pdf |
| manufacturer |
Konica Minolta Business Technologies, Inc |
Gemalto / Trusted Labs |
| manufacturer_web |
https://www.konicaminolta.com/ |
https://www.gemalto.com |
| security_level |
EAL3 |
EAL7 |
| dgst |
2269d5f12e90117d |
efb9f87dde709ef7 |
| heuristics/cert_id |
JISEC-CC-CRP-C0205 |
ANSSI-CC-2018/50 |
| heuristics/cert_lab |
[] |
THALES |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, ADV_FSP.3, ALC_LCD.1, AVA_VLA.1, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ASE_TSS.1, ADV_ARC.1 |
ATE_FUN.2, ADV_CMC.5, ALC_DVS.2, ADV_IMP.2, ALC_CMC.5, AVA_VAN.5, ADV_LCD.2, ADV_TAT.3, ATE_COV.3, ALC_CMS.1, ADV_INT.3, ATE_DPT.4, ALC_TAT.3, ALC_LCD.2, ADV_FSP.6, ADV_SPM.1, ADV_ARC.1, ADV_TDS.6 |
| heuristics/extracted_versions |
751, 7522, 601, 6022 |
4.5.2 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0945-2017, ANSSI-CC-2018/35 |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0945-2017, ANSSI-CC-2018/35 |
| heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0205
- certification_date: 01.03.2009
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0205_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE TOE controls the entire operation of MFP, including the operation control processing and the image data management that are accepting from the panel of the main body of digital MFP (Multi Functional Peripheral, and hereinafter referred to as "MFP") or through the network. And TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in HDD for the danger of taking HDD that is the medium that stores the image data in MFP out illegally by using the HDD lock function loaded on the HDD. Besides, TOE has the deletion method to follow various overwrite deletion standards and it deletes all the data of HDD completely. TOE security functionality TOE provides the following security functions. - Administrator Function - SNMP Administrator Function - Service Mode Function - User Function - User Box Function - Secure Print Function - Overwrite deletion Function for all area - Encryption Key Generation Function - HDD validation Function - CF validation Function - Authentication Failure Counter Reset Function - Trust Channel Function - S/MIME Encryption Processing Function - External server authentication operation support Function - Encryption kit operation support Function - HDD lock operation support Function - CF lock operation support Function
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: Japanese: bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Zentai Control Software English: bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Control Software
- product_type: Control Software for digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0205_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0205_st.pdf
- toe_version: A0PN0Y0-0100-G00-15 (System Controller) A0PN0Y0-1D00-G00-11 (BIOS Controller)
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.04.2014
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Zentai Control Software A0PN0Y0-0100-G00-15 (System Controller) A0PN0Y0-1D00-G00-11 (BIOS Controller)
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0205_it8216.html
- toe_overseas_name: bizhub 751 / bizhub 601 / ineo 751 / ineo 601 / VarioLink 7522 / VarioLink 6022 Control Software A0PN0Y0-0100-G00-15 (System Controller) A0PN0Y0-1D00-G00-11 (BIOS Controller)
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0945-2017 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0945-2017 |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
c0205_erpt.pdf |
anssi-cc-2018_50fr.pdf |
| pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 7
- cc_version: Critères Communs version 3.1 révision 5
- cert_id: ANSSI-CC-2018/50
- cert_item: IDMotion V2 Multos Virtual Machine
- cert_item_version: OS version Multos V4.5.2 AMD version 0151v001
- cert_lab: THALES (TCS – CNES) 290 allée du Lac, 31670 Labège, France
- developer: Gemalto La Vigie, Avenue du jujubier, ZI Athélia IV, BP 90- 13702 La Ciotat Trusted Labs 6, rue de la Verrerie – CS20001, 92197 Meudon Cedex Infineon Technologies AG Am Campeon 1-12, 85579 Neubiberg Commanditaire Gemalto La Vigie, Avenue du jujubier, ZI Athélia IV, BP 90- 13702 La Ciotat
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Néant
|
| pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0205-01: 1
- Certification No. C0205: 1
|
- DE:
- FR:
- ANSSI-CC-2018/35: 2
- ANSSI-CC-2018/50: 15
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 4
- EAL2: 2
- EAL7: 3
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVICE: 1
- A.SETTING: 1
- T:
- T.ACCESS-GROUP-B: 1
- T.ACCESS-GROUP-BOX: 1
- T.ACCESS-NET-SET: 1
- T.ACCESS-PRIVATE: 1
- T.ACCESS-PRIVATE-BOX: 1
- T.ACCESS-PUBLIC-: 1
- T.ACCESS-PUBLIC-BOX: 1
- T.ACCESS-SECURE-: 1
- T.ACCESS-SECURE-PRINT: 1
- T.ACCESS-SETTING: 2
- T.BACKUP-RESTOR: 1
- T.BACKUP-RESTORE: 1
- T.BRING-OUT-CF: 2
- T.BRING-OUT-STOR: 1
- T.BRING-OUT-STORAGE: 1
- T.DISCARD-MFP: 2
- T.UNEXPECTEC-TRANSMISSION: 1
|
|
| pdf_data/report_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon Technologies AG: 2
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
- X509:
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- body of MFP or through the network. TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data stored in: 1
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20090409174039+09'00'
- /ModDate: D:20090409174039+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 406178
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
- /CreationDate: D:20181219113402+01'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.028
- /ModDate: D:20181219115454+01'00'
- /Producer: Microsoft® Word 2010
- /Subject:
- /Title:
- pdf_file_size_bytes: 749242
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
| pdf_data/st_filename |
c0205_st.pdf |
anssi-cible-cc-2018_50en.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 1
- EAL5: 3
- EAL5+: 1
- EAL7: 6
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_CMC.5: 4
- ADV_FSP.2: 1
- ADV_FSP.6: 3
- ADV_IMP.1: 3
- ADV_IMP.2: 2
- ADV_INT.3: 3
- ADV_LCD.2: 1
- ADV_SPM.1: 5
- ADV_TAT.3: 1
- ADV_TDS.4: 1
- ADV_TDS.6: 3
- ALC:
- ALC_CMC.5: 2
- ALC_CMS.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 5
- ALC_LCD.1: 1
- ALC_LCD.2: 5
- ALC_TAT.3: 5
- ATE:
- ATE_COV.1: 1
- ATE_COV.3: 3
- ATE_DPT.4: 3
- ATE_FUN.1: 2
- ATE_FUN.2: 3
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CAP.1: 2
- FCS_CKM: 2
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 4
- FCS_COP: 1
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 58
- FDP_ACC.1.1: 3
- FDP_ACF.1: 42
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 3
- FDP_ACP.1: 1
- FDP_IFC.1: 6
- FDP_ITC: 1
- FDP_ITC.1: 4
- FDP_ITC.2: 2
- FDP_RIP.1: 1
- FDP_UAU.7: 1
- FIA:
- FIA_AFL.1: 62
- FIA_AFL.1.1: 8
- FIA_AFL.1.2: 8
- FIA_ATD.1: 25
- FIA_ATD.1.1: 1
- FIA_EID: 2
- FIA_EID.1: 16
- FIA_EID.1.1: 3
- FIA_EID.1.2: 1
- FIA_NEW.1.2: 2
- FIA_SOS: 1
- FIA_SOS.1: 48
- FIA_SOS.1.1: 6
- FIA_SOS.2: 9
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_SSL.3: 1
- FIA_UAU.1: 23
- FIA_UAU.2: 63
- FIA_UAU.2.1: 6
- FIA_UAU.6: 11
- FIA_UAU.6.1: 1
- FIA_UAU.7: 19
- FIA_UAU.7.1: 1
- FIA_UID.1: 31
- FIA_UID.2: 50
- FIA_UID.2.1: 7
- FIA_USB.1: 22
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MAS.1: 1
- FMT_MOF.1: 33
- FMT_MOF.1.1: 4
- FMT_MSA: 3
- FMT_MSA.1: 32
- FMT_MSA.1.1: 3
- FMT_MSA.3: 31
- FMT_MSA.3.1: 5
- FMT_MSA.3.2: 5
- FMT_MTD.1: 105
- FMT_MTD.1.1: 12
- FMT_SMF.1: 109
- FMT_SMF.1.1: 1
- FMT_SMR.1: 167
- FMT_SMR.1.1: 6
- FMT_SMR.1.2: 6
- FMT_SMS.1: 1
- FMT_SOS.1: 1
- FTA:
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_ACC.2: 1
- FAU_ARP: 3
- FAU_ARP.1: 6
- FAU_ARP.1.1: 4
- FAU_GEN.1: 4
- FAU_SAA: 3
- FAU_SAA.1: 10
- FAU_SAA.1.1: 2
- FAU_SAA.1.2: 3
- FAU_SAS.1: 1
- FCS:
- FCS_CKM: 4
- FCS_COP: 5
- FCS_RNG: 4
- FDP:
- FDP_ACC: 5
- FDP_ACC.1: 4
- FDP_ACC.2: 13
- FDP_ACC.2.1: 2
- FDP_ACC.2.2: 1
- FDP_ACF: 4
- FDP_ACF.1: 13
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 1
- FDP_ITT.1: 1
- FDP_ROL: 3
- FDP_ROL.1: 5
- FDP_ROL.1.1: 1
- FDP_ROL.1.2: 1
- FDP_SDC.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 1
- FDP_UCT.1: 1
- FDP_UIT.1: 1
- FIA:
- FMT:
- FMT_LIM: 2
- FMT_LIM.2: 1
- FMT_MSA.1: 3
- FMT_MSA.3: 3
- FMT_SMF.1: 1
- FPT:
- FPT_FLS: 4
- FPT_FLS.1: 12
- FPT_FLS.1.1: 2
- FPT_PHP.3: 1
- FPT_RCV: 3
- FPT_RCV.4: 7
- FPT_RCV.4.1: 1
- FPT_TST.2: 1
- FRU:
- FRU_FLT.2: 1
- FRU_RSA: 3
- FRU_RSA.1: 6
- FRU_RSA.1.1: 1
- FTP:
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.NETWORK: 4
- A.SECRET: 2
- A.SERVICE: 2
- A.SETTING: 3
- O:
- O.AUTH-CAPABILITY: 10
- O.CHECK-CF: 4
- O.CHECK-HDD: 7
- O.CONFIG: 11
- O.CRYPT-KEY: 5
- O.CRYPTO-CAPABILITY: 4
- O.CRYPTO-MAIL: 4
- O.GROUP-BOX: 5
- O.LOCK-CF-CAPABILITY: 4
- O.LOCK-HDD-CAPABILITY: 7
- O.OVERWRITE-ALL: 7
- O.PRIVATE-BOX: 5
- O.PUBLIC-BOX: 8
- O.REGISTERED-USER: 14
- O.SECURE-PRINT: 8
- O.TRUSTED-PASS: 7
- OE:
- OE.ADMIN: 2
- OE.CRYPT: 3
- OE.CRYPTO: 1
- OE.FEED-BACK: 10
- OE.LOCK-CF: 3
- OE.LOCK-HDD: 3
- OE.NETWORK: 2
- OE.SECRET: 2
- OE.SERVER: 5
- OE.SERVICE: 2
- OE.SESSION: 2
- OE.SETTING-SECURITY: 2
- T:
- T.ACCESS-GROUP-BOX: 3
- T.ACCESS-PRIVATE-BOX: 3
- T.ACCESS-PUBLIC-BOX: 2
- T.ACCESS-SECURE-PRINT: 2
- T.ACCESS-SETTING: 2
- T.BACKUP-RESTORE: 3
- T.BRING-OUT-CF: 2
- T.BRING-OUT-STORAGE: 2
- T.DISCARD-MFP: 3
- T.UNEXPECTED-TRANSMISSION: 3
|
- A:
- A.APPLI_CONT: 9
- A.CIPHER: 3
- A.CLON: 3
- A.DECIPHER: 3
- A.DIS_MEMORY: 3
- A.LOAD: 3
- A.MOD_MEMORY: 3
- A.OPERATE: 3
- A.REMOVE: 3
- A.SECURITY: 3
- A.SIDE: 3
- A.TAMPER_ES: 3
- O:
- O.AES: 1
- O.APPLI_DEV: 12
- O.CIPHER: 3
- O.CLON: 2
- O.DECIPHER: 4
- O.DEV_DIS_ES: 13
- O.DIS: 1
- O.DIS_MEMORY: 2
- O.DLV_: 7
- O.DLV_AUDIT: 1
- O.DLV_DATA: 6
- O.EFECT_REMOVE: 1
- O.EFFECT_L: 1
- O.EFFECT_LOAD: 5
- O.EFFECT_R: 1
- O.EFFECT_REMOVE: 3
- O.FLAW: 1
- O.INIT_A: 2
- O.INIT_ACS: 7
- O.LOAD: 8
- O.MOD_MEMORY: 1
- O.OPERATE: 1
- O.REMOVE: 6
- O.RESOURCE: 4
- O.RESOURCES: 1
- O.RND: 1
- O.ROLLBACK: 5
- O.SAMPLES_ACS: 1
- O.SAMPLE_ACS: 4
- O.SECURITY: 5
- O.SEGREGATE: 5
- O.SIDE: 6
- O.TAMPER_ES: 17
- O.TEST_OPERA: 1
- OSP:
- OSP.CIPHER: 3
- OSP.CONF-ALU: 3
- T:
- T.APP_CORR: 6
- T.APP_DISC: 7
- T.APP_MOD: 7
- T.APP_READ: 7
- T.APP_REMOVE: 7
- T.CLON: 2
- T.DEL_REMOVE: 7
- T.DIS: 2
- T.DIS_DATA: 14
- T.DIS_TEST_ES: 5
- T.ERR_REMOVE: 6
- T.LOAD_APP: 8
- T.LOAD_MAN: 5
- T.LOAD_MOD: 5
- T.LOAD_OTHER: 5
- T.MOD: 5
- T.MOD_DATA: 7
- T.MOD_EXE: 10
- T.MOD_LOAD: 7
- T.MOD_SHARE: 8
- T.MOD_TSF: 8
- T.RESOURCES: 5
- T.RND: 2
- T.T_CMD: 10
- T.T_ES: 8
- T.T_TOOLS: 5
|
| pdf_data/st_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon: 5
- Infineon Technologies: 2
- Thales:
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- malfunction: 1
- SCA:
- Leak-Inherent: 4
- Physical Probing: 2
- physical probing: 1
- side channel: 1
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 186: 1
- FIPS 186-1: 1
- FIPS 186-2: 4
- FIPS PUB 197: 3
- X509:
|
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- ICAO:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
- ConfidentialDocument:
- INC., All Rights Reserved. 7 / 110 TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in: 1
|
- OutOfScope:
- out of scope: 2
- the TOE, the product also contain native applications and native modules used by ICAO application (out of scope of the TOE). Mel applications and native modules Native/MEL application: GMF v1.0 The GMF: 1
- to the context in which the security functions take place. Note that cryptographic primitives are out of scope. Table 16 shows how these security functions satisfy the TOE security functional requirements. 8.1: 1
|
| pdf_data/st_metadata |
- /Author: m-izumi
- /CreationDate: D:20090410164324+09'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20090410164324+09'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /Title: Microsoft Word - C0205_ST_en.doc
- pdf_file_size_bytes: 683223
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 110
|
- /CreationDate: D:20181113151704+01'00'
- /Creator: Microsoft® Word 2013
- /Keywords: Security Target, CC, MULTOS, IDMotion, Platform
- /ModDate: D:20181219115510+01'00'
- /Producer: Microsoft® Word 2013
- /Subject:
- /Title:
- pdf_file_size_bytes: 2271251
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 75
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |