Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
KONICA MINOLTA bizhub 651i/bizhub 551i/bizhub 451i/bizhub 361i/bizhub 301i with FK-514, DEVELOP ineo 651i/ineo 551i/ineo 451i/ineo 361i/ineo 301i with FK-514G00-R6
JISEC-CC-CRP-C0830-01-2024
Sony Xperia™ X and Sony Xperia™ X Performance
CSEC2010003
name KONICA MINOLTA bizhub 651i/bizhub 551i/bizhub 451i/bizhub 361i/bizhub 301i with FK-514, DEVELOP ineo 651i/ineo 551i/ineo 451i/ineo 361i/ineo 301i with FK-514G00-R6 Sony Xperia™ X and Sony Xperia™ X Performance
category Multi-Function Devices Mobility
scheme JP SE
status active archived
not_valid_after 24.10.2029 07.12.2021
not_valid_before 24.10.2024 07.12.2016
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0830_eimg.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ccra%20cert%20sony%20x.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0830_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20Sony%20X.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0830_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Sony-CC-SecurityTarget_v1.2(348227)_TMP.pdf
manufacturer KONICA MINOLTA, INC. Sony Mobile Communications Inc.
manufacturer_web https://www.konicaminolta.com/index.html https://www.sonymobile.com/se/
security_level {} EAL1
dgst 281ddb994c2023e3 69e48d085b8d8069
heuristics/cert_id JISEC-CC-CRP-C0830-01-2024 CSEC2010003
heuristics/extracted_sars AGD_OPE.1, AGD_PRE.1, ASE_OBJ.1, ATE_IND.1, ASE_ECD.1, AVA_VAN.1, ASE_CCL.1, ALC_CMC.1, ADV_FSP.1, ALC_CMS.1, ASE_SPD.1, ASE_INT.1, ASE_TSS.1, ASE_REQ.1 ALC_TSU_EXT.1, AGD_OPE.1, AGD_PRE.1, ASE_OBJ.1, ATE_IND.1, ASE_ECD.1, AVA_VAN.1, ASE_CCL.1, ALC_CMC.1, ADV_FSP.1, ALC_CMS.1, ASE_SPD.1, ASE_INT.1, ASE_TSS.1, ASE_REQ.1
heuristics/extracted_versions 514 -
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0830
  • certification_date: 01.10.2024
  • claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
  • enhanced:
    • assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0830
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/s6ckaf000001l6sb-att/c0830_eimg.pdf
    • certification_date: 24.10.2024
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multi-Function Printer (MFP) that has the functions, such as Copy, Scan, Print, Fax and Document storage and retrieval functions. The TOE provides the security functions required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFP. TOE security functionality The TOE provides the following security functions: Identification and Authentication function Access Control function Encryption function Trusted Communications function Security Management function Audit function Trusted Operation function FAX Separation function
    • evaluation_facility: ECSEC Laboratory Inc., Evaluation Center
    • expiration_date: 24.10.2029
    • product: KONICA MINOLTA bizhub 651i / bizhub 551i / bizhub 451i / bizhub 361i / bizhub 301i with FK-514, DEVELOP ineo 651i / ineo 551i / ineo 451i / ineo 361i / ineo 301i with FK-514
    • product_type: Multi-Function Printer
    • protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/s6ckaf000001l6sb-att/c0830_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/s6ckaf000001l6sb-att/c0830_est.pdf
    • toe_version: G00-R6
    • vendor: KONICA MINOLTA, INC.
  • expiration_date: 01.10.2029
  • supplier: KONICA MINOLTA, INC.
  • toe_japan_name: KONICA MINOLTA bizhub 651i / bizhub 551i / bizhub 451i / bizhub 361i / bizhub 301i with FK-514, DEVELOP ineo 651i / ineo 551i / ineo 451i / ineo 361i / ineo 301i with FK-514 G00-R6
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0830_it4877.html
  • toe_overseas_name: KONICA MINOLTA bizhub 651i / bizhub 551i / bizhub 451i / bizhub 361i / bizhub 301i with FK-514, DEVELOP ineo 651i / ineo 551i / ineo 451i / ineo 361i / ineo 301i with FK-514 G00-R6
heuristics/protection_profiles b2cfec7a92fa2940 b43e1d04965c0a49
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v2.0.pdf
pdf_data/cert_filename c0830_eimg.pdf ccra cert sony x.pdf
pdf_data/cert_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0830-01-2024: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
pdf_data/cert_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 1
  • atsec:
    • atsec: 1
pdf_data/cert_metadata
  • /Author: Information-technology Promotion Agency, Japan
  • /CreationDate: D:20241202102246+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 20
  • /Keywords:
  • /ModDate: D:20241202102540+09'00'
  • /Producer: Adobe PDF Library 20.5.172
  • /Subject:
  • /Title: C0830_Certificate_01
  • pdf_file_size_bytes: 374382
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
  • /CreationDate: D:20170403155121+02'00'
  • /ModDate: D:20230313140935+01'00'
  • pdf_file_size_bytes: 261750
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename c0830_erpt.pdf Certification Report Sony X.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0830-01-2024: 1
  • SE:
    • CSEC201003: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_TSU_EXT.1: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_RBG_EXT.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.NETWORK: 1
    • A.PHYSICAL: 1
    • A.TRAINED_USERS: 1
    • A.TRUSTED_ADMIN: 1
  • D:
    • D.TSF: 3
    • D.USER: 3
  • T:
    • T.NET_COMPROMISE: 1
    • T.TSF_COMPROMISE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Qualcomm:
    • Qualcomm: 3
pdf_data/report_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 4
  • atsec:
    • atsec: 6
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 3
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 2
  • TLS:
    • TLS:
      • TLS: 1
  • VPN:
    • VPN: 1
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CTR:
    • CTR: 1
pdf_data/report_keywords/vulnerability
  • CVE:
    • CVE-2016-0839: 1
    • CVE-2016-0841: 1
    • CVE-2016-2428: 1
    • CVE-2016-2429: 1
    • CVE-2016-2463: 1
    • CVE-2016-2464: 1
    • CVE-2016-2506: 1
    • CVE-2016-2507: 1
    • CVE-2016-2508: 1
    • CVE-2016-3741: 1
    • CVE-2016-3742: 1
    • CVE-2016-3743: 1
    • CVE-2016-3820: 1
    • CVE-2016-3821: 1
    • CVE-2016-3822: 1
    • CVE-2016-3840: 1
    • CVE-2016-3861: 1
    • CVE-2016-3862: 1
    • CVE-2016-3863: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/tee_name
  • other:
    • TEE: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS 140-2: 1
  • ISO:
    • ISO/IEC 17025: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • expected to return to its user. Note: Defending against device re-use after physical compromise is out of scope for this protection profile. T.FLAWAPP: Malicious or Flawed Application Swedish Certification Body: 1
    • out of scope: 1
pdf_data/report_metadata
  • /Author:
  • /CreationDate: D:20241128150228+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 20
  • /ModDate: D:20241128151432+09'00'
  • /Producer: Adobe PDF Library 20.5.172
  • /Title:
  • pdf_file_size_bytes: 461385
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 32
  • /Ansvarigt Område/enhet: CSEC
  • /Author: Imre Juhász
  • /C-datum: 2008
  • /CSECID:
  • /Category:
  • /Comments:
  • /Company:
  • /ContentTypeId: 0x010100F76CA16D2B00D340871F443D8708C84D010072C770E6C96E7A4EA94967F9D5C0E603
  • /CreationDate: D:20170403103416+02'00'
  • /Creator: Acrobat PDFMaker 11 för Word
  • /Current Version:
  • /DDocBinder: Scheme (CB)
  • /DDocCabinet: QMS
  • /DDocID: 2005-03-05-64D6-T9YR
  • /DDocLastModDate: 2006-03-16 10:56:39
  • /DDocLibrary: https://haddock.fmv.se/domdoc/CSECLib.nsf
  • /DDocRevision: 3,7
  • /DDocTitle: 035 CB General Document - Template
  • /Datum, skapat: -
  • /Deluppdragsbenämning:
  • /Dokument Status: Aktiv
  • /Dokumentansvarig: Imre Juhász
  • /Dokumentansvarigs enhet: KC Ledsyst
  • /Dokumentbeteckning:
  • /Dokumentdatum: 2017-04-03
  • /Dokumenttitel: Certification Report Sony Xperia X and Sony Xperia X Performance
  • /Dokumenttyp: CB
  • /FMV_beteckning: 16FMV2071-76:1
  • /Fastställarens roll: Certifier
  • /Fastställt av: Imre Juhász
  • /Fastställt av1: Imre Juhász
  • /Giltigt från: -
  • /Infoklass: HEMLIG/
  • /Informationsklass:
  • /Keywords:
  • /Klassificeringsnr: 25 550
  • /MallVersion: 7.0
  • /ModDate: D:20170403124210+02'00'
  • /Paragraf:
  • /Platina: 1
  • /Producer: Adobe PDF Library 11.0
  • /Referens ID: CSEC-37-1156
  • /Sekr. gäller tom.: -
  • /SourceModified: D:20170403083341
  • /Stämpel: 1
  • /Subject: 16FMV2071-76:1
  • /Title: Certification Report Sony Xperia X and Sony Xperia X Performance
  • /Uncontrolled: 0.000000
  • /Uppdragsbenämning:
  • /Utgåva: 2.0
  • /_dlc_DocId: CSEC-37-1156
  • /_dlc_DocIdItemGuid: 671c079c-346d-423e-ac5c-f1312a8a09be
  • /_dlc_DocIdUrl: http://sp.fmv.se/sites/CSEC/_layouts/15/DocIdRedir.aspx?ID=CSEC-37-1156, CSEC-37-1156
  • pdf_file_size_bytes: 145099
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
pdf_data/st_filename c0830_est.pdf Sony-CC-SecurityTarget_v1.2(348227)_TMP.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL1: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_TSU_EXT: 1
    • ALC_TSU_EXT.1: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 3
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 10
    • FAU_GEN.1: 8
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 3
    • FAU_GEN.2.1: 1
    • FAU_STG_EXT: 3
    • FAU_STG_EXT.1: 5
    • FAU_STG_EXT.1.1: 2
  • FCS:
    • FCS_CKM.1: 33
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 2
    • FCS_CKM.4: 6
    • FCS_CKM.4.1: 1
    • FCS_CKM_EXT: 3
    • FCS_CKM_EXT.4: 16
    • FCS_CKM_EXT.4.1: 2
    • FCS_COP.1: 55
    • FCS_COP.1.1: 4
    • FCS_RBG_EXT: 2
    • FCS_RBG_EXT.1: 16
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_SNI_EXT.1.1: 1
    • FCS_SSH_EXT.1: 6
    • FCS_TLS_EXT.1: 6
  • FDP:
    • FDP_ACC.1: 7
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 6
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_FXS_EXT: 2
    • FDP_FXS_EXT.1: 6
    • FDP_FXS_EXT.1.1: 2
    • FDP_IFC.1: 1
    • FDP_ITC.1: 3
    • FDP_ITC.2: 3
  • FIA:
    • FIA_AFL.1: 3
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_PMG_EXT: 2
    • FIA_PMG_EXT.1: 6
    • FIA_PMG_EXT.1.1: 2
    • FIA_PSK_EXT: 2
    • FIA_PSK_EXT.1: 9
    • FIA_PSK_EXT.1.1: 2
    • FIA_PSK_EXT.1.2: 2
    • FIA_PSK_EXT.1.3: 2
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 3
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 10
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 3
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 4
    • FMT_MOF.1.1: 1
    • FMT_MSA: 1
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 5
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 4
    • FMT_MTD.1.1: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_SKP_EXT: 2
    • FPT_SKP_EXT.1: 6
    • FPT_SKP_EXT.1.1: 2
    • FPT_STM.1: 6
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 2
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 7
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 3
  • FTA:
    • FTA_SSL.3: 3
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 9
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 3
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 2
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 14
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 1
    • FCS_CKM.2.1: 6
    • FCS_CKM_EXT.1: 3
    • FCS_CKM_EXT.1.1: 2
    • FCS_CKM_EXT.1.2: 1
    • FCS_CKM_EXT.1.3: 1
    • FCS_CKM_EXT.1.4: 2
    • FCS_CKM_EXT.2: 3
    • FCS_CKM_EXT.2.1: 1
    • FCS_CKM_EXT.3: 4
    • FCS_CKM_EXT.3.1: 1
    • FCS_CKM_EXT.3.2: 1
    • FCS_CKM_EXT.4: 3
    • FCS_CKM_EXT.4.1: 2
    • FCS_CKM_EXT.4.2: 1
    • FCS_CKM_EXT.5: 3
    • FCS_CKM_EXT.5.1: 1
    • FCS_CKM_EXT.5.2: 1
    • FCS_CKM_EXT.6: 3
    • FCS_CKM_EXT.6.1: 1
    • FCS_CKM_EXT.7: 3
    • FCS_CKM_EXT.7.1: 1
    • FCS_COP: 1
    • FCS_COP.1: 34
    • FCS_COP.1.1: 5
    • FCS_RBG: 1
    • FCS_RBG_EXT.1: 12
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_RBG_EXT.1.3: 1
    • FCS_SRV: 1
    • FCS_SRV_EXT.1: 4
    • FCS_SRV_EXT.1.1: 1
    • FCS_STG: 1
    • FCS_STG_EXT.1: 3
    • FCS_STG_EXT.1.1: 1
    • FCS_STG_EXT.1.2: 1
    • FCS_STG_EXT.1.3: 1
    • FCS_STG_EXT.1.4: 1
    • FCS_STG_EXT.1.5: 1
    • FCS_TLSC: 1
    • FCS_TLSC_EXT.1: 3
    • FCS_TLSC_EXT.1.1: 2
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.1.4: 1
    • FCS_TLSC_EXT.1.5: 1
    • FCS_TLSC_EXT.2: 5
    • FCS_TLSC_EXT.2.1: 1
    • FCS_TLSC_EXT.2.2: 1
    • FCS_TLSC_EXT.2.3: 1
    • FCS_TLSC_EXT.2.4: 1
    • FCS_TLSC_EXT.2.5: 1
  • FDP:
    • FDP_ACF: 2
    • FDP_ACF_EXT.1: 3
    • FDP_ACF_EXT.1.1: 1
    • FDP_ACF_EXT.1.2: 1
    • FDP_DAR: 2
    • FDP_DAR_EXT.1: 3
    • FDP_DAR_EXT.1.1: 1
    • FDP_DAR_EXT.1.2: 1
    • FDP_IFC: 2
    • FDP_IFC_EXT.1: 4
    • FDP_IFC_EXT.1.1: 1
    • FDP_STG: 2
    • FDP_STG_EXT.1: 3
    • FDP_STG_EXT.1.1: 1
    • FDP_UPC: 2
    • FDP_UPC_EXT.1: 3
    • FDP_UPC_EXT.1.1: 1
    • FDP_UPC_EXT.1.2: 1
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL_EXT.1: 4
    • FIA_AFL_EXT.1.1: 1
    • FIA_AFL_EXT.1.2: 1
    • FIA_AFL_EXT.1.3: 1
    • FIA_BLT: 2
    • FIA_BLT_EXT.1: 3
    • FIA_BLT_EXT.1.1: 1
    • FIA_PAE: 2
    • FIA_PAE_EXT.1: 4
    • FIA_PMG: 2
    • FIA_PMG_EXT.1: 3
    • FIA_PMG_EXT.1.1: 1
    • FIA_TRT: 2
    • FIA_TRT_EXT.1: 3
    • FIA_TRT_EXT.1.1: 1
    • FIA_UAU: 2
    • FIA_UAU.7: 2
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT.1: 3
    • FIA_UAU_EXT.1.1: 1
    • FIA_UAU_EXT.2: 4
    • FIA_UAU_EXT.2.1: 1
    • FIA_UAU_EXT.2.2: 1
    • FIA_UAU_EXT.3: 3
    • FIA_UAU_EXT.3.1: 1
  • FMT:
    • FMT_MOF: 2
    • FMT_MOF_EXT.1: 3
    • FMT_MOF_EXT.1.1: 3
    • FMT_MOF_EXT.1.2: 3
    • FMT_SMF: 2
    • FMT_SMF_EXT.1: 14
    • FMT_SMF_EXT.1.1: 2
    • FMT_SMF_EXT.2: 3
    • FMT_SMF_EXT.2.1: 1
  • FPT:
    • FPT_AEX: 2
    • FPT_AEX_EXT.1: 3
    • FPT_AEX_EXT.1.1: 1
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.2: 3
    • FPT_AEX_EXT.2.1: 1
    • FPT_AEX_EXT.3: 3
    • FPT_AEX_EXT.3.1: 1
    • FPT_AEX_EXT.4: 3
    • FPT_AEX_EXT.4.1: 1
    • FPT_AEX_EXT.4.2: 1
    • FPT_KST: 2
    • FPT_KST_EXT.1: 3
    • FPT_KST_EXT.1.1: 1
    • FPT_KST_EXT.2: 3
    • FPT_KST_EXT.2.1: 1
    • FPT_KST_EXT.3: 3
    • FPT_KST_EXT.3.1: 1
    • FPT_NOT: 1
    • FPT_NOT_EXT.1: 3
    • FPT_NOT_EXT.1.1: 1
    • FPT_STM: 2
    • FPT_STM.1: 2
    • FPT_STM.1.1: 1
    • FPT_TST: 2
    • FPT_TST_EXT.1: 3
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.2: 3
    • FPT_TST_EXT.2.1: 1
    • FPT_TUD: 2
    • FPT_TUD_EXT.1: 3
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.2: 3
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
    • FPT_TUD_EXT.2.3: 1
    • FPT_TUD_EXT.2.4: 1
    • FPT_TUD_EXT.2.6: 1
  • FTA:
    • FTA_SSL: 2
    • FTA_SSL_EXT.1: 3
    • FTA_SSL_EXT.1.1: 1
    • FTA_SSL_EXT.1.2: 1
    • FTA_SSL_EXT.1.3: 1
    • FTA_TAB.1: 2
    • FTA_TAB.1.1: 1
    • FTA_WSE: 2
    • FTA_WSE_EXT.1: 3
    • FTA_WSE_EXT.1.1: 1
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC_EXT.1: 3
    • FTP_ITC_EXT.1.1: 1
    • FTP_ITC_EXT.1.2: 1
    • FTP_ITC_EXT.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.NETWORK: 1
    • A.PHYSICAL: 1
    • A.TRAINED_USERS: 1
    • A.TRUSTED_ADMIN: 1
  • D:
    • D.TSF: 3
    • D.USER: 31
  • O:
    • O.ACCESS: 1
    • O.ACCESS_CONTROL: 6
    • O.ADMIN_ROLES: 4
    • O.AUDIT: 5
    • O.COMMS_PROTECTION: 11
    • O.FAX_NET_SEPARATION: 1
    • O.PURGE_DATA: 2
    • O.STORAGE_ENCRYPTION: 4
    • O.TSF_SELF_TEST: 1
    • O.UPDATE_VERIFICATION: 2
    • O.USER_AUTHORIZATION: 7
  • OE:
    • OE.ADMIN_TRAINING: 1
    • OE.ADMIN_TRUST: 1
    • OE.NETWORK_PROTECTION: 1
    • OE.PHYSICAL_PROTECTION: 1
    • OE.USER_TRAINING: 1
  • T:
    • T.NET_COMPROMISE: 1
    • T.TSF_COMPROMISE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
  • A:
    • A.CONFIG: 1
    • A.NOTIFY: 1
    • A.PRECAUTION: 1
  • O:
    • O.AUTH: 1
    • O.COMMS: 1
    • O.CONFIG: 1
    • O.INTEGRITY: 1
    • O.STORAGE: 1
  • OE:
    • OE.CONFIG: 1
    • OE.NOTIFY: 1
    • OE.PRECAUTION: 1
  • T:
    • T.EAVESDROP: 1
    • T.FLAWAPP: 2
    • T.NETWORK: 1
    • T.PERSISTENT: 2
    • T.PHYSICAL: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Broadcom:
    • Broadcom: 4
  • Microsoft:
    • Microsoft: 5
  • Qualcomm:
    • Qualcomm: 9
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
      • AES-256: 2
  • constructions:
    • MAC:
      • HMAC: 6
      • HMAC-SHA-256: 2
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 2
  • AES_competition:
    • AES:
      • AES: 27
      • AES-: 1
      • AES-256: 1
  • constructions:
    • MAC:
      • HMAC: 5
      • HMAC-SHA-256: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 5
      • Diffie-Hellman: 4
  • RSA:
    • RSA-2048: 1
    • RSA-3072: 1
  • ECC:
    • ECC:
      • ECC: 6
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 7
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 18
      • SHA-384: 9
      • SHA-512: 11
  • PBKDF:
    • PBKDF: 9
    • PBKDF2: 2
  • SHA:
    • SHA1:
      • SHA-1: 7
    • SHA2:
      • SHA-2: 1
      • SHA-224: 1
      • SHA-256: 8
      • SHA-384: 2
      • SHA-512: 2
      • SHA256: 2
      • SHA384: 1
      • SHA512: 1
  • scrypt:
    • scrypt: 4
pdf_data/st_keywords/crypto_scheme
  • AEAD:
    • AEAD: 1
  • MAC:
    • MAC: 7
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 5
    • IKEv1: 14
    • IKEv2: 3
  • IPsec:
    • IPsec: 83
  • SSH:
    • SSH: 3
  • TLS:
    • TLS:
      • TLS: 3
  • IKE:
    • IKE: 2
  • IPsec:
    • IPsec: 7
  • TLS:
    • TLS:
      • TLS: 25
      • TLS 1.0: 2
      • TLS 1.1: 2
      • TLS 1.2: 4
      • TLS v1.0: 1
  • VPN:
    • VPN: 33
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 8
  • RNG:
    • RBG: 4
  • PRNG:
    • DRBG: 3
  • RNG:
    • RBG: 8
    • RNG: 6
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CTR:
    • CTR: 4
  • CBC:
    • CBC: 11
  • CCM:
    • CCM: 3
  • CTR:
    • CTR: 4
  • ECB:
    • ECB: 6
  • GCM:
    • GCM: 4
  • XTS:
    • XTS: 9
pdf_data/st_keywords/ecc_curve
  • NIST:
    • NIST P-224: 1
    • P-224: 1
    • P-256: 10
    • P-384: 10
    • P-521: 10
    • secp256r1: 3
    • secp384r1: 3
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 4
    • TLS_RSA_WITH_AES_256_CBC_SHA: 4
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 3
  • OpenSSL:
    • OpenSSL: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/tee_name
  • ARM:
    • ARM TrustZone: 1
    • TrustZone: 1
  • IBM:
    • SE: 2
  • other:
    • TEE: 19
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS PUB 180-3: 2
    • FIPS PUB 186-4: 5
    • FIPS PUB 197: 3
    • FIPS PUB 198-1: 2
  • ISO:
    • ISO/IEC 18031:2011: 3
  • NIST:
    • NIST SP 800-38A: 3
    • NIST SP 800-90A: 3
  • PKCS:
    • PKCS #1: 2
  • RFC:
    • RFC 2407: 1
    • RFC 3602: 7
    • RFC 4106: 2
    • RFC 4109: 2
    • RFC 4301: 3
    • RFC 4303: 3
    • RFC 4304: 3
    • RFC 4868: 5
    • RFC 5282: 1
    • RFC3602: 1
  • CC:
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS 104-2: 1
    • FIPS 140-2: 6
    • FIPS 180-4: 3
    • FIPS 186-2: 1
    • FIPS 186-4: 5
    • FIPS 197: 5
    • FIPS 198-1: 3
    • FIPS PUB 186-4: 8
    • FIPS PUB 197: 4
  • NIST:
    • NIST SP 800-108: 1
    • NIST SP 800-132: 2
    • NIST SP 800-38A: 2
    • NIST SP 800-38C: 2
    • NIST SP 800-38D: 2
    • NIST SP 800-38E: 2
    • NIST SP 800-38F: 4
    • NIST SP 800-57: 2
    • SP 800-38: 4
    • SP 800-56A: 2
    • SP 800-90A: 1
  • RFC:
    • RFC 2818: 2
    • RFC 4346: 2
    • RFC 4492: 8
    • RFC 5246: 14
    • RFC 5280: 4
    • RFC 5289: 4
    • RFC 5759: 2
    • RFC 6125: 2
  • X509:
    • X.509: 5
pdf_data/st_keywords/javacard_packages
  • com:
    • com.android.voicemail.permission: 1
  • java:
    • java.security.cert: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • These services, including some specific Xperia in Business services, such as Xperia Care, are out of scope of the TOE. 1 Much of the information provided in this section originates from the Android Security: 1
    • expected to return to its user. Note: Defending against device re-use after physical compromise is out of scope for this protection profile. T.FLAWAPP Malicious or Flawed Application Applications loaded onto the: 1
    • out of scope: 2
pdf_data/st_metadata
  • /CreationDate: D:20241126142823+09'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20241126142823+09'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 1951524
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 84
  • /AAPL:Keywords: []
  • /Author: Rasma
  • /CreationDate: D:20170127123826Z
  • /Creator: Word
  • /Keywords:
  • /ModDate: D:20170403152705+02'00'
  • /Producer: Mac OS X 10.12.2 Quartz PDFContext
  • /Subject:
  • /Title: Sony-CC-SecurityTarget_v1.2
  • pdf_file_size_bytes: 1236228
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 61
state/cert/convert_garbage False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different