Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
KONICA MINOLTA bizhub C750i/AccurioPrint C750i with FK-514, DEVELOP ineo+ 750i with FK-514 G00-33
JISEC-CC-CRP-C0692-01-2020
TCOS Smart Meter Security Module Version 1.0 Release 1/P60C144PVA
BSI-DSZ-CC-0957-V2-2016
name KONICA MINOLTA bizhub C750i/AccurioPrint C750i with FK-514, DEVELOP ineo+ 750i with FK-514 G00-33 TCOS Smart Meter Security Module Version 1.0 Release 1/P60C144PVA
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP DE
not_valid_after 24.11.2025 18.11.2026
not_valid_before 24.11.2020 18.11.2016
report_link https://www.commoncriteriaportal.org/files/epfiles/c0692_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0957V2a_pdf.pdf
st_link https://www.commoncriteriaportal.org/files/epfiles/c0692_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0957V2b_pdf.pdf
manufacturer KONICA MINOLTA, INC. T-Systems International GMBH
manufacturer_web https://www.t-systems.de/
security_level {} EAL4+, AVA_VAN.5
dgst 2a16992a8c09bdb5 6c674f76d69001ee
heuristics/cert_id JISEC-CC-CRP-C0692-01-2020 BSI-DSZ-CC-0957-V2-2016
heuristics/cert_lab [] BSI
heuristics/cpe_matches cpe:2.3:h:konicaminolta:bizhub_c750i:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_750i:-:*:*:*:*:*:*:* {}
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, APE_ECD.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_IND.3, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ATE_DPT.1, ASE_TSS.2, ASE_REQ.2, ALC_DVS.1, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1
heuristics/extracted_versions 33, 514 1.0
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0918-V6-2024, BSI-DSZ-CC-0831, BSI-DSZ-CC-0919-V3-2023, BSI-DSZ-CC-0831-V3-2021, BSI-DSZ-CC-0918-V5-2023, BSI-DSZ-CC-0831-V2-2020, BSI-DSZ-CC-0919-V2-2021, BSI-DSZ-CC-0831-V8-2024, BSI-DSZ-CC-0831-V7-2023, BSI-DSZ-CC-0831-V4-2021, BSI-DSZ-CC-0831-V6-2023, BSI-DSZ-CC-0918-V4-2022, BSI-DSZ-CC-1035-2017, BSI-DSZ-CC-0831-V9-2024, BSI-DSZ-CC-0831-V5-2022
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0957-2015, BSI-DSZ-CC-0978-2016
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0918-V6-2024, BSI-DSZ-CC-0831, BSI-DSZ-CC-0919-V3-2023, BSI-DSZ-CC-0831-V3-2021, BSI-DSZ-CC-0831-V2-2020, BSI-DSZ-CC-0919-V2-2021, BSI-DSZ-CC-0831-V8-2024, BSI-DSZ-CC-0831-V5-2022, BSI-DSZ-CC-0831-V7-2023, BSI-DSZ-CC-0831-V4-2021, BSI-DSZ-CC-0831-V6-2023, BSI-DSZ-CC-0918-V4-2022, BSI-DSZ-CC-0918-V7-2025, BSI-DSZ-CC-1035-2017, BSI-DSZ-CC-0831-V9-2024, BSI-DSZ-CC-0918-V5-2023
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0845-2012, BSI-DSZ-CC-0978-2016, BSI-DSZ-CC-0845-V2-2013, BSI-DSZ-CC-0666-2012, BSI-DSZ-CC-0957-2015
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0692
  • certification_date: 01.11.2020
  • claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
  • enhanced:
    • assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0692
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck99000000147s-att/c0692_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multi-Function Printer (MFP) that has the functions, such as Copy, Scan, Print, Fax and Document storage and retrieval functions. The TOE provides the security functions required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFP. TOE Security functions The TOE provides the following security functions: Identification and Authentication function Access Control function Encryption function Trusted Communications function Security Management function Audit function Trusted Operation function FAX Separation function
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: KONICA MINOLTA bizhub C750i/AccurioPrint C750i with FK-514, DEVELOP ineo+ 750i with FK-514
    • product_type: Multi-Function Printer
    • protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck99000000147s-att/c0692_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck99000000147s-att/c0692_est.pdf
    • toe_version: G00-33
    • vendor: KONICA MINOLTA, INC.
  • expiration_date:
  • supplier: KONICA MINOLTA, INC.
  • toe_japan_name: KONICA MINOLTA bizhub C750i / AccurioPrint C750i with FK-514, DEVELOP ineo+ 750i with FK-514G00-33
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0692_it0758.html
  • toe_overseas_name: KONICA MINOLTA bizhub C750i / AccurioPrint C750i with FK-514, DEVELOP ineo+ 750i with FK-514G00-33
  • category: Intelligent measuring systems
  • cert_id: BSI-DSZ-CC-0957-V2-2016
  • certification_date: 18.11.2016
  • enhanced:
    • applicant: Deutsche Telekom Security GmbH Untere Industriestraße 20 57250 Netphen
    • assurance_level: EAL4+,AVA_VAN.5
    • certification_date: 18.11.2016
    • description: The Target of Evaluation (TOE) is the product TCOS Smart Meter Security Module Version 1.0 Release 1/P60C144PVA developed by T-Systems International GmbH. The TOE is a Smart Meter Security Module according to the Technical Guideline BSI TR-03109-2, Version 1.1 intended to be used by a Smart Meter Gateway in a Smart Metering System. The TOE serves as cryptographic service provider for the Smart Meter Gateway and supports the Smart Meter Gateway for its specific cryptographic needs. These cryptographic services cover the following issues: Digital Signature Generation, Digital Signature Verification, Key Agreement for TLS, Key Agreement for Content Data Encryption, Key Pair Generation, Random Number Generation, Component Authentication via the PACE Protocol with Negotiation of Session Keys, Secure Messaging, and Secure Storage of Key Material and further data relevant for the Gateway.
    • entries: [frozendict({'id': 'BSI-DSZ-CC-0957-V2-2016-RA-01 (Ausstellungsdatum / Certification Date 27.09.2021)', 'description': 'Re-Assessment'}), frozendict({'id': 'BSI-DSZ-CC-0957-V2-2016 (Ausstellungsdatum / Certification Date 18.11.2016, gültig bis / valid until 17.11.2026)', 'description': 'TCOS Smart Meter Security Module Version 1.0 Release 2/P60C144PVE'}), frozendict({'id': 'BSI-DSZ-CC-0957-2015 (Ausstellungsdatum / Certification Date 09.02.2015, gültig bis / valid until 09.02.2025)', 'description': 'Security Target'})]
    • evaluation_facility: SRC Security Research & Consulting GmbH
    • expiration_date: 17.11.2026
    • product: TCOS Smart Meter Security Module Version 1.0 Release 2/P60C144PVE
    • protection_profile: Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP) - Schutzprofil für das Sicherheitsmodul der Kommunikationseinheit eines intelligenten Messsystems für Stoff- und Energiemengen Version 1.03, 11 December 2014, BSI-CC-PP-0077-V2-2015
    • report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0957V2a_pdf.pdf?__blob=publicationFile&v=1
    • target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0957V2b_pdf.pdf?__blob=publicationFile&v=1
  • product: TCOS Smart Meter Security Module Version 1.0 Release 2/P60C144PVE
  • subcategory: Security module for an Smart Metering Gateway
  • url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Smartmeter_Sicherheitsmodule/0957_0957V2_0957V2RA1.html
  • vendor: Deutsche Telekom Security GmbH
heuristics/st_references/directly_referenced_by {} BSI-DSZ-CC-0918-V6-2024, BSI-DSZ-CC-0919-V3-2023, BSI-DSZ-CC-0822-V6-2024, BSI-DSZ-CC-0918-2020, BSI-DSZ-CC-0918-V2-2021, BSI-DSZ-CC-0822-V4-2023, BSI-DSZ-CC-0918-V3-2022, BSI-DSZ-CC-0822-V5-2023, BSI-DSZ-CC-0918-V4-2022, BSI-DSZ-CC-0918-V7-2025, BSI-DSZ-CC-0919-V2-2021, BSI-DSZ-CC-0918-V5-2023
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0978-2016
heuristics/st_references/indirectly_referenced_by {} BSI-DSZ-CC-0918-V6-2024, BSI-DSZ-CC-0919-V3-2023, BSI-DSZ-CC-0822-V6-2024, BSI-DSZ-CC-0918-2020, BSI-DSZ-CC-0918-V2-2021, BSI-DSZ-CC-0822-V4-2023, BSI-DSZ-CC-0918-V3-2022, BSI-DSZ-CC-0822-V5-2023, BSI-DSZ-CC-0918-V4-2022, BSI-DSZ-CC-0918-V7-2025, BSI-DSZ-CC-0919-V2-2021, BSI-DSZ-CC-0918-V5-2023
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0978-2016
heuristics/protection_profiles {} 15eda6dafddbf8ca
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0077V2b_pdf.pdf
pdf_data/report_filename c0692_erpt.pdf 0957V2a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by AVA_VAN.5
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0957-V2-2016
    • cert_item: TCOS Smart Meter Security Module Version 1.0 Release 2/P60C144PVE
    • cert_lab: BSI
    • developer: T-Systems International GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP) - Schutzprofil für das Sicherheitsmodul der Kommunikationseinheit eines intelligenten Messsystems für Stoff- und Energiemengen Version 1.03, 11 December 2014, BSI-CC-PP-0077-V2-2015
pdf_data/report_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0692-01-2020: 1
  • DE:
    • BSI-DSZ-CC-0957-2015: 3
    • BSI-DSZ-CC-0957-V2-2016: 24
    • BSI-DSZ-CC-0978: 2
    • BSI-DSZ-CC-0978-2016: 5
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0077-V2-2015: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 7
    • EAL 2: 4
    • EAL 3: 4
    • EAL 4: 13
    • EAL 4 augmented: 3
    • EAL 5: 10
    • EAL 5+: 1
    • EAL 6: 4
    • EAL 7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 2
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 1
    • ALC_FLR: 3
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 2
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_RBG_EXT.1: 1
  • FCS:
    • FCS_CKM: 4
    • FCS_COP: 6
    • FCS_RNG.1: 1
  • FIA:
    • FIA_UAU.4: 1
    • FIA_UAU.5: 1
    • FIA_UID.1: 1
  • FTP:
    • FTP_ITC.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.NETWORK: 1
    • A.PHYSICAL: 1
    • A.TRAINED_USERS: 1
    • A.TRUSTED_ADMIN: 1
  • D:
    • D.TSF: 3
    • D.USER: 3
  • T:
    • T.NET_COMPROMISE: 1
    • T.TSF_COMPROMISE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • NXP:
    • NXP: 11
    • NXP Semiconductors: 4
pdf_data/report_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 4
  • SRC:
    • SRC Security Research & Consulting: 3
  • TSystems:
    • T-Systems International: 13
  • TUV:
    • TÜV Informationstechnik: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 6
  • constructions:
    • MAC:
      • CMAC: 3
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDSA:
      • ECDSA: 6
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/report_keywords/crypto_scheme
  • KA:
    • KA: 1
    • Key Agreement: 8
  • MAC:
    • MAC: 3
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 2
  • PACE:
    • PACE: 7
  • TLS:
    • TLS:
      • TLS: 6
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
  • RNG:
    • RNG: 2
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CTR:
    • CTR: 1
  • CBC:
    • CBC: 3
pdf_data/report_keywords/crypto_engine
  • SmartMX:
    • SmartMX2: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • FI:
    • fault injection: 2
    • malfunction: 1
  • SCA:
    • side channel: 2
  • other:
    • JIL: 2
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-03109-2: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • BSI:
    • AIS 1: 1
    • AIS 20: 3
    • AIS 25: 1
    • AIS 26: 3
    • AIS 31: 1
    • AIS 32: 1
    • AIS 34: 2
    • AIS 36: 5
    • AIS 46: 1
  • FIPS:
    • FIPS 180-2: 2
    • FIPS 186: 5
    • FIPS 197: 2
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • RFC:
    • RFC 5639: 5
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 1.0 Release 2/P60C144PVE, Version 1.2, 27 October 2016, SRC Security Research & Consulting GmbH (confidential document) 9 specifically • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung: 1
    • Version 1.0 Release 2/P60C144PVE, Version 1.3, 25 October 2016, T-Systems International GmbH (confidential document) [10] Guidance Documentation BSI-DSZ-CC-0957-V2-2016, Operational Guidance for users and: 1
    • Y/B/X)/yVE, BSI-DSZ-CC-0978, Version 2, 17 December 2015, TÜV Informationstechnik GmbH (confidential document) [14] Product Data Sheet, SmartMX2 family P60x080/144 VA/VE, Secure high performance smart card: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
pdf_data/report_metadata
  • /CreationDate: D:20210113133158+09'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20210113133310+09'00'
  • /Producer: Microsoft® Word 2019
  • pdf_file_size_bytes: 394164
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 32
pdf_data/st_filename c0692_est.pdf 0957V2b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0978: 1
    • BSI-DSZ-CC-0978-2016: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0035-2007: 1
    • BSI-CC-PP-0073-2014: 1
    • BSI-CC-PP-0077-V2-2015: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 5
    • EAL 6: 1
    • EAL 6 augmented: 1
    • EAL 6+: 1
    • EAL4: 4
    • EAL4 augmented: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 3
    • ADV_TDS: 2
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 3
    • ALC_DVS.1: 1
    • ALC_FLR.1: 2
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_TSS.2: 2
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.5: 10
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_CKM_EXT: 2
    • FAU_GEN: 10
    • FAU_GEN.1: 8
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 3
    • FAU_GEN.2.1: 1
    • FAU_STG_EXT: 3
    • FAU_STG_EXT.1: 5
    • FAU_STG_EXT.1.1: 2
  • FCS:
    • FCS_CKM.1: 33
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 2
    • FCS_CKM.4: 6
    • FCS_CKM.4.1: 1
    • FCS_CKM_EXT: 1
    • FCS_CKM_EXT.4: 16
    • FCS_CKM_EXT.4.1: 2
    • FCS_COP.1: 55
    • FCS_COP.1.1: 4
    • FCS_RBG_EXT: 2
    • FCS_RBG_EXT.1: 17
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_SNI_EXT.1.1: 1
    • FCS_SSH_EXT.1: 6
    • FCS_TLS_EXT.1: 6
  • FDP:
    • FDP_ACC.1: 7
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 6
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_FXS_EXT: 2
    • FDP_FXS_EXT.1: 6
    • FDP_FXS_EXT.1.1: 2
    • FDP_IFC.1: 1
    • FDP_ITC.1: 3
    • FDP_ITC.2: 3
  • FIA:
    • FIA_AFL.1: 3
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_PMG_EXT: 2
    • FIA_PMG_EXT.1: 6
    • FIA_PMG_EXT.1.1: 2
    • FIA_PSK_EXT: 2
    • FIA_PSK_EXT.1: 9
    • FIA_PSK_EXT.1.1: 2
    • FIA_PSK_EXT.1.2: 2
    • FIA_PSK_EXT.1.3: 2
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 3
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 10
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 3
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 3
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 5
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 5
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 3
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_SKP_EXT: 2
    • FPT_SKP_EXT.1: 6
    • FPT_SKP_EXT.1.1: 2
    • FPT_STM.1: 6
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 2
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 7
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 3
  • FTA:
    • FTA_SSL.3: 3
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 9
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 3
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 2
  • FAU:
    • FAU_SAS.1: 1
  • FCS:
    • FCS_CKM: 51
    • FCS_CKM.1: 16
    • FCS_CKM.2: 8
    • FCS_CKM.4: 45
    • FCS_CKM.4.1: 1
    • FCS_COP: 59
    • FCS_COP.1: 15
    • FCS_RNG: 6
    • FCS_RNG.1: 20
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC.1: 13
    • FDP_ACC.2: 17
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF: 2
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ETC.1: 7
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_IFC: 1
    • FDP_IFC.1: 8
    • FDP_ITC: 8
    • FDP_ITC.1: 20
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 14
    • FDP_ITT.1: 1
    • FDP_RIP: 1
    • FDP_RIP.1: 7
    • FDP_RIP.1.1: 1
    • FDP_SDI: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 8
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT.1: 8
    • FDP_UIT: 1
    • FDP_UIT.1: 7
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 3
    • FIA_SOS.1.1: 1
    • FIA_UAU: 18
    • FIA_UAU.1: 5
    • FIA_UAU.4: 6
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 6
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID: 1
    • FIA_UID.1: 14
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_LIM: 6
    • FMT_LIM.1: 25
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 23
    • FMT_LIM.2.1: 2
    • FMT_MSA.1: 2
    • FMT_MSA.3: 6
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 6
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 6
    • FPT_EMS.1: 15
    • FPT_EMS.1.1: 2
    • FPT_EMS.1.2: 2
    • FPT_FLS: 1
    • FPT_FLS.1: 11
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP: 1
    • FPT_PHP.3: 10
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ICT.1: 4
    • FTP_ITC: 1
    • FTP_ITC.1: 10
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.NETWORK: 1
    • A.PHYSICAL: 1
    • A.TRAINED_USERS: 1
    • A.TRUSTED_ADMIN: 1
  • D:
    • D.TSF: 3
    • D.USER: 31
  • O:
    • O.ACCESS: 1
    • O.ACCESS_CONTROL: 6
    • O.ADMIN_ROLES: 4
    • O.AUDIT: 5
    • O.COMMS_PROTECTION: 11
    • O.FAX_NET_SEPARATION: 1
    • O.PURGE_DATA: 2
    • O.STORAGE_ENCRYPTION: 4
    • O.TSF_SELF_TEST: 1
    • O.UPDATE_VERIFICATION: 2
    • O.USER_AUTHORIZATION: 7
  • OE:
    • OE.ADMIN_TRAINING: 1
    • OE.ADMIN_TRUST: 1
    • OE.NETWORK_PROTECTION: 1
    • OE.PHYSICAL_PROTECTION: 1
    • OE.USER_TRAINING: 1
  • T:
    • T.NET_COMPROMISE: 1
    • T.TSF_COMPROMISE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
  • O:
    • O.FW_HW: 1
    • O.HW_AES: 4
    • O.MEM_ACCESS: 3
    • O.PACE: 5
    • O.RND: 3
    • O.SFR_ACCESS: 3
  • OE:
    • OE.PACE: 1
  • OSP:
    • OSP.SM: 1
  • T:
    • T.RND: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 3
  • NXP:
    • NXP: 2
    • NXP Semiconductors: 1
pdf_data/st_keywords/eval_facility
  • TSystems:
    • T-Systems International: 79
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
      • AES-256: 2
  • constructions:
    • MAC:
      • HMAC: 6
      • HMAC-SHA-256: 2
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 2
  • AES_competition:
    • AES:
      • AES: 16
  • DES:
    • 3DES:
      • TDES: 3
      • Triple-DES: 2
    • DES:
      • DES: 4
  • constructions:
    • MAC:
      • CMAC: 4
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 5
      • Diffie-Hellman: 4
    • DSA:
      • DSA: 1
  • RSA:
    • RSA-2048: 1
    • RSA-3072: 1
  • ECC:
    • ECC:
      • ECC: 11
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 19
  • FF:
    • DH:
      • DH: 13
      • Diffie-Hellman: 5
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 8
    • SHA2:
      • SHA-256: 15
      • SHA-384: 6
      • SHA-512: 9
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 17
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 5
    • IKEv1: 14
    • IKEv2: 3
  • IPsec:
    • IPsec: 74
  • SSH:
    • SSH: 3
  • TLS:
    • TLS:
      • TLS: 3
  • PACE:
    • PACE: 66
  • TLS:
    • TLS:
      • TLS: 28
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 7
  • RNG:
    • RBG: 6
  • RNG:
    • RND: 4
    • RNG: 8
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CTR:
    • CTR: 4
  • CBC:
    • CBC: 4
pdf_data/st_keywords/ecc_curve
  • Brainpool:
    • brainpoolP256r1: 2
    • brainpoolP384r1: 2
    • brainpoolP512r1: 2
  • NIST:
    • NIST P-256: 1
    • NIST P-384: 1
    • P-256: 11
    • P-384: 15
    • secp256r1: 1
    • secp384r1: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • FI:
    • DFA: 1
    • Malfunction: 12
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 3
    • physical tampering: 5
  • SCA:
    • DPA: 2
    • Leak-Inherent: 4
    • Physical Probing: 2
    • SPA: 2
    • physical probing: 2
    • side channel: 1
    • side channels: 1
    • side-channels: 1
    • timing attacks: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03109: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS PUB 180-3: 2
    • FIPS PUB 186-4: 5
    • FIPS PUB 197: 2
    • FIPS PUB 198-1: 2
  • ISO:
    • ISO/IEC 18031:2011: 3
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-90A: 3
  • PKCS:
    • PKCS #1: 2
  • RFC:
    • RFC 2407: 1
    • RFC 3602: 7
    • RFC 4106: 2
    • RFC 4109: 2
    • RFC 4301: 3
    • RFC 4303: 3
    • RFC 4304: 3
    • RFC 4868: 5
    • RFC 5282: 1
    • RFC3602: 1
  • BSI:
    • AIS 36: 1
    • AIS36: 3
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • FIPS:
    • FIPS PUB 186-4: 1
    • FIPS186: 10
    • FIPS197: 3
  • ISO:
    • ISO/IEC 7810:2003: 1
  • RFC:
    • RFC 5639: 1
    • RFC5639: 11
  • X509:
    • X.509: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • entities. 72 As these external entities only indirectly interact with the TOE, these entities are out of scope for this ST. 73 During its pre-operational phases the TOE interacts with the Integrator and the: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: e08884
  • /CreationDate: D:20210108123203+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20210108123203+09'00'
  • /Producer: Acrobat Distiller 15.0 (Windows)
  • /Title: Microsoft Word - 公開用【C0692】[英] ASE_EagleZ+-2.00-201102_修正2.docx
  • pdf_file_size_bytes: 912731
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 71
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different