name |
bizhub PRO C6500 Gazou Seigyo Program Overseas: bizhub PRO C6500 Image Control Program A03U0Y0-00I1-G00-15 |
IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration) |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
NL |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
19.11.2023 |
not_valid_before |
22.03.2007 |
19.11.2018 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Signed%20certificate%20CC-18-196231.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0087_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20NSCIB-CC-196231-CR.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0087_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST-BAC-Lite]%202018_2000037746%20-%20Security%20Target%20Lite%20IDeal%20Pass%20v2.3-i%20JC%20(BAC%20Configuration)%20(v1.0,%202018-09-07).pdf |
manufacturer |
Konica Minolta Business Technologies, Inc |
Idemia |
manufacturer_web |
https://www.konicaminolta.com/ |
https://www.idemia.com |
security_level |
EAL3 |
ADV_TDS.4, ALC_CMS.5, ATE_DPT.3, ADV_INT.2, ADV_FSP.5, EAL4+, ALC_DVS.2, ALC_TAT.2 |
dgst |
237f0a3d5ded3e29 |
ce867531085e33f8 |
heuristics/cert_id |
JISEC-CC-CRP-C0087 |
NSCIB-CC-196231-CR |
heuristics/cert_lab |
[] |
|
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
ALC_CMS.5, AVA_VAN.5, ADV_TDS.4, ATE_DPT.3, ALC_DVS.2, ADV_ARC.1, ADV_FSP.5, ADV_INT.2, ALC_TAT.2, ADV_SPM.1 |
heuristics/extracted_versions |
15 |
2.3 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2018/27, NSCIB-CC-195748-CR |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0782-2012, ANSSI-CC-2016/66, NSCIB-CC-195748-CR, BSI-DSZ-CC-0782-V3-2017, BSI-DSZ-CC-0782-V4-2018, ANSSI-CC-2017/59, ANSSI-CC-2018/27, BSI-DSZ-CC-0782-V2-2015 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0087
- certification_date: 01.03.2007
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.3
- cert_link: https://www.ipa.go.jp/en/security/c0087_eimg.pdf
- description: PRODUCT DESCRIPTION This product (bizhub PRO C6500 Image Control Program *1, that is installed with digital MFP (bizhub PRO C6500 Series) manufactured by Konica Minolta Business Technologies, Inc., is a software product for the purpose of reducing the risk for disclosure of document data in bizhub PRO C6500 Series. bizhub PRO C6500 Image Control Program prevents document data in bizhub PRO C6500 Series from disclosing during the use of functions such as copier and printer. It offers the protection function *2 with password lock system against the risk of reading data out illegally from HDD (Hard Disk Drive) which is a medium for storing temporarily document data. *1: with shows "bizhub PRO C6500 Gazou Seigyo Program" for Japan and "bizhub PRO C6500 Image Control Program" for overseas. *2: HDD has the password so that it cannot be removed and read in another equipment. HDD lock password is set in the HDD lock function.
- evaluation_facility: Mizuho Information & Research Institute, Inc.Center for Evaluation of Information Security
- product: Japan : bizhub PRO C6500 Gazou Seigyo Program Overseas: bizhub PRO C6500 Image Control Program
- product_type: IT Product (data protection function in digital MFD)
- report_link: https://www.ipa.go.jp/en/security/c0087_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0087_est.pdf
- toe_version: A03U0Y0-00I1-G00-15
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.10.2013
- revalidations: [frozendict({'date': '2009-08', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0087_it6100_03.html'})]
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub PRO C6500 Gazou Seigyo Program A03U0Y0-00I1-G00-15
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0087_it6100.html
- toe_overseas_name: bizhub PRO C6500/bizhub PRO C6500P/ineo+6500/ bizhub PRO C6501/bizhub PRO C6501P/bizhub PRO C65hc/ineo+6501 Image Control Program A03U0Y0-00I1-G00-60
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2018/27 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0782-V4-2018, ANSSI-CC-2018/27 |
heuristics/protection_profiles |
{} |
60455fc9564e2545 |
maintenance_updates |
- maintenance_date: 05.08.2009
- maintenance_report_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0087kz_eacr3.pdf
- maintenance_st_link: None
- maintenance_title: bizhub PRO C6500/bizhub PRO C6500P/ineo+6500/bizhub PRO C6501/bizhub PRO C6501P/bizhub PRO C65hc/ineo+6501 Gazou Seigyo Program Overseas: bbizhub PRO C6500/bizhub PRO C6500P/ineo+6500/bizhub PRO C6501/bizhub PRO C6501P/bizhub PRO C65hc/ineo+6501 Image Control Program A03U0Y0-00I1-G00-60
- maintenance_date: 19.11.2008
- maintenance_report_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0087kz_eacr2.pdf
- maintenance_st_link: None
- maintenance_title: bizhub PRO C6500/bizhub PRO C6500P/ineo+6500/ bizhub PRO C6501/bizhub PRO C6501P/ineo+6501 Gazou Seigyo Program Overseas: bizhub PRO C6500/bizhub PRO C6500P/ineo+6500/ bizhub PRO C6501/bizhub PRO C6501P/ineo+6501 Image Control Program A03U0Y0-00I1-G00-41
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf |
pdf_data/cert_filename |
|
Signed certificate CC-18-196231.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
- ADV:
- ADV_FSP.5: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- ALC:
- ALC_CMS.5: 1
- ALC_DVS.2: 1
- ALC_TAT.2: 1
- ATE:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ICAO:
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20181119163400+01'00'
- /Creator: BHC364e
- /ModDate: D:20181119163400+01'00'
- /Producer: KONICA MINOLTA bizhub C364e
- /Title: BHC364e-20181119163400
- pdf_file_size_bytes: 202344
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0087_ecvr.pdf |
Certification Report NSCIB-CC-196231-CR.pdf |
pdf_data/report_frontpage |
|
- NL:
- cert_id: NSCIB-CC-196231-CR
- cert_item: IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration
- cert_lab: Brightsight
- developer: IDEMIA
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0087: 1
|
- FR:
- NL:
- CC-19-180045: 1
- CC-195748: 2
- NSCIB-CC-196231-CR: 12
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL4: 2
- EAL4 augmented: 1
- EAL4+: 2
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_FSP.5: 2
- ADV_INT.2: 2
- ADV_TDS.4: 2
- AGD:
- ALC:
- ALC_CMS.5: 2
- ALC_DVS.2: 2
- ALC_TAT.2: 2
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no security risk to the TOE. 2.5 Documentation The following documentation is: 1
- out of scope: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20070323205319+09'00'
- /ModDate: D:20070328204205+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 13865
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: p646
- /CreationDate: D:20181120153406+01'00'
- /Creator: PDFCreator Version 1.2.0
- /Keywords:
- /ModDate: D:20181120153406+01'00'
- /Producer: GPL Ghostscript 9.0
- /Subject:
- /Title: Certification Report NSCIB-CC-196231-CR
- pdf_file_size_bytes: 630780
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
pdf_data/st_filename |
c0087_est.pdf |
[ST-BAC-Lite] 2018_2000037746 - Security Target Lite IDeal Pass v2.3-i JC (BAC Configuration) (v1.0, 2018-09-07).pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0055-2009: 1
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-PP-0035: 1
- BSI-PP-0055: 1
- BSI-PP-0056: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 6
- EAL4 augmented: 2
- EAL5: 1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 2
- ACM_SCP.1: 2
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.2: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU.1: 2
- AVA_SOF.1: 2
- AVA_VLA.1: 2
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.5: 4
- ADV_INT.2: 4
- ADV_SPM.1: 1
- ADV_TDS.4: 4
- AGD:
- ALC:
- ALC_CMS.5: 4
- ALC_DVS.2: 5
- ALC_TAT.2: 4
- ATE:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_ACC.1: 10
- FDP_ACC.1.1: 1
- FDP_ACF.1: 11
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FIA:
- FIA_AFL.1: 11
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_SOS.1: 23
- FIA_SOS.1.1: 2
- FIA_UAU.1: 7
- FIA_UAU.2: 19
- FIA_UAU.7: 13
- FIA_UAU.7.1: 1
- FIA_UID.1: 7
- FIA_UID.2: 14
- FMT:
- FMT_MOF.1: 26
- FMT_MOF.1.1: 1
- FMT_MSA.3: 3
- FMT_MTD.1: 27
- FMT_MTD.1.1: 3
- FMT_SMF: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 27
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_RVM.1: 21
- FPT_RVM.1.1: 1
- FPT_SEP.1: 10
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 7
- FAU_SAS.1: 11
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 30
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 22
- FCS_CKM.4.1: 1
- FCS_COP: 51
- FCS_COP.1: 9
- FCS_RND: 9
- FCS_RND.1: 13
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC.1: 18
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 13
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_IFC.1: 4
- FDP_ITC: 2
- FDP_ITC.1: 12
- FDP_ITC.2: 12
- FDP_UCT.1: 11
- FDP_UCT.1.1: 1
- FDP_UIT: 1
- FDP_UIT.1: 10
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 3
- FIA_AFL.1.2: 3
- FIA_API: 16
- FIA_API.1: 5
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 6
- FIA_UAU.1: 10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 16
- FIA_UAU.4.1: 1
- FIA_UAU.5: 10
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 4
- FIA_UAU.6: 12
- FIA_UAU.6.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 8
- FMT_LIM.1: 18
- FMT_LIM.1.1: 3
- FMT_LIM.2: 19
- FMT_LIM.2.1: 4
- FMT_MSA.1: 1
- FMT_MSA.2: 1
- FMT_MSA.3: 3
- FMT_MTD: 35
- FMT_MTD.1: 5
- FMT_SMF.1: 18
- FMT_SMF.1.1: 1
- FMT_SMR.1: 19
- FMT_SMR.1.1: 3
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS.1: 1
- FPT_EMS.1.1: 1
- FPT_EMS.1.2: 1
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_PHP.3: 10
- FPT_PHP.3.1: 1
- FPT_RVM.1: 1
- FPT_SEP.1: 1
- FPT_TST.1: 9
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 2
- FTP:
- FTP_ITC.1: 5
- FTP_TRP.1: 5
|
pdf_data/st_keywords/cc_claims |
- O:
- OE:
- OE.ADMIN: 4
- OE.CE: 4
- OE.HDD: 6
- OE.NET: 4
- OE.SECMOD: 4
- OE.SECRET: 3
- T:
|
- A:
- OE:
- OE.AA_MRTD: 6
- OE.MRTD_: 2
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 11
- AES-: 1
- AES-128: 1
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-224: 2
- SHA-256: 1
- SHA-384: 2
- SHA-512: 1
- SHA224: 1
- SHA256: 1
- SHA384: 1
- SHA512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- Physical Tampering: 5
- Physical tampering: 1
- fault injection: 1
- malfunction: 7
- physical tampering: 1
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 4
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 9
- EF.DG1: 27
- EF.DG13: 4
- EF.DG14: 3
- EF.DG15: 8
- EF.DG16: 27
- EF.DG2: 10
- EF.DG3: 7
- EF.DG4: 6
- EF.DG5: 8
- EF.SOD: 9
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2005-003-003: 1
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 1
- ISO:
|
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 180-4: 2
- FIPS 46-3: 2
- FIPS PUB 197: 1
- FIPS46: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 6
- ISO/IEC 18013: 6
- ISO/IEC 7816-2: 1
- ISO/IEC 7816-4: 1
- ISO/IEC15946-2: 1
- RFC:
- RFC 5639: 1
- RFC-5639: 1
- RFC3369: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no risk to the TOE security. Figure 1: TOE 1.4.2 TOE usage and security features: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /CreationDate: D:20070531113225+09'00'
- /ModDate: D:20070531113225+09'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- pdf_file_size_bytes: 616321
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 60
|
- /Author: IDEMIA
- /CreationDate: D:20180907132327+02'00'
- /Creator: Microsoft® Word 2016
- /Keywords: NSCIB-CC-196231, ASE Lite, ICAO, ePassport, BAC
- /ModDate: D:20180907132327+02'00'
- /Producer: Microsoft® Word 2016
- /Subject: ASE Lite 2018_2000037746, v1.0, 2018-09-07
- /Title: Security Target Lite IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration)
- pdf_file_size_bytes: 1486764
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 102
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |