Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
RICOH Pro C5310S/C5300S J-1.00
JISEC-CC-CRP-C0718-01-2021
NXP JCOP6.x on SN200.C04 Secure Element, versions JCOP6.0 R1.13.0 "SN200", JCOP6.1 R1.04.0 "SN200", JCOP6.1 R1.04.0 "SN210", JCOP6.4 R1.06.0 "SN200", JCOP6.4 R1.06.0 "SN210", JCOP6.5 R1.04.0 "SN200", JCOP6.5 R1.04.0 "SN210", JCOP6.6 R1.06.0 "SN200", JCOP6.6 R1.06.0 "SN210"
NSCIB-CC-2300044-02-CR
name RICOH Pro C5310S/C5300S J-1.00 NXP JCOP6.x on SN200.C04 Secure Element, versions JCOP6.0 R1.13.0 "SN200", JCOP6.1 R1.04.0 "SN200", JCOP6.1 R1.04.0 "SN210", JCOP6.4 R1.06.0 "SN200", JCOP6.4 R1.06.0 "SN210", JCOP6.5 R1.04.0 "SN200", JCOP6.5 R1.04.0 "SN210", JCOP6.6 R1.06.0 "SN200", JCOP6.6 R1.06.0 "SN210"
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP NL
not_valid_after 14.04.2026 16.10.2029
not_valid_before 14.04.2021 16.10.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0718_eimg.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300044-02-Cert.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0718_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300044-02-CR.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0718_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300044-02-ST_Lite.pdf
manufacturer Ricoh Company, Ltd. NXP Semiconductors
manufacturer_web https://www.ricoh.com/ https://www.nxp.com/
security_level EAL2+, ALC_FLR.2 ALC_FLR.1, EAL5+, AVA_VAN.5, ASE_TSS.2, ALC_DVS.2
dgst 2ea4809408962176 95893e5e9f05e993
heuristics/cert_id JISEC-CC-CRP-C0718-01-2021 NSCIB-CC-2300044-02-CR
heuristics/cert_lab []
heuristics/cpe_matches cpe:2.3:h:ricoh:pro_c5310s:-:*:*:*:*:*:*:*, cpe:2.3:h:ricoh:pro_c5300s:-:*:*:*:*:*:*:* {}
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ATE_COV.2, ALC_FLR.1, AVA_VAN.5, ATE_DPT.3, ALC_DVS.2, AGD_OPE.1, ASE_TSS.2
heuristics/extracted_versions 1.00 6.0, 1.04.0, 6.6, 1.06.0, 6.1, 6.5, 6.4, 1.13.0
heuristics/report_references/directly_referencing {} NSCIB-CC-2200037-02-CR
heuristics/report_references/indirectly_referencing {} NSCIB-CC-2200037-02-CR
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0718
  • certification_date: 01.04.2021
  • claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • enhanced:
    • assurance_level: EAL2 Augmented by ALC_FLR.2
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0718
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000001fda-att/c0718_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. Network Protection Function: Enables the TOE to protect network communications using encryption. Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. Security Management Function: Enables the TOE administrator to control security functions. Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: RICOH Pro C5310S/C5300S
    • product_type: Multi Function Product
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000001fda-att/c0718_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000001fda-att/c0718_est.pdf
    • toe_version: J-1.00
    • vendor: RICOH COMPANY, LTD.
  • expiration_date:
  • supplier: RICOH COMPANY, LTD.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0718_it0765.html
  • toe_japan_name: RICOH Pro C5310S / C5300SJ-1.00
  • toe_overseas_link: None
  • toe_overseas_name: -----
heuristics/st_references/directly_referencing {} NSCIB-CC-2200037-02-CR
heuristics/st_references/indirectly_referencing {} NSCIB-CC-2200037-02-CR
heuristics/protection_profiles 43ce79b420f23a00 94167fd161e87d71
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099b_pdf.pdf
pdf_data/cert_filename c0718_eimg.pdf NSCIB-CC-2300044-02-Cert.pdf
pdf_data/cert_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0718-01-2021: 1
  • NL:
    • NSCIB-2300044-02: 1
    • NSCIB-CC-2300044-02: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0099-2017: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
  • EAL:
    • EAL2: 1
    • EAL5: 1
    • EAL5 augmented: 1
    • EAL7: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.3: 1
  • ASE:
    • ASE_TSS.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/vendor
  • NXP:
    • NXP: 1
    • NXP Semiconductors: 1
pdf_data/cert_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 1
  • Riscure:
    • Riscure: 1
pdf_data/cert_keywords/os_name
  • JCOP:
    • JCOP6: 10
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-1: 2
    • ISO/IEC 18045: 4
    • ISO/IEC 18045:2008: 1
pdf_data/cert_metadata
  • /CreationDate: D:20210602111328+09'00'
  • /Creator: Microsoft® Word for Office 365
  • /ModDate: D:20210602115910+09'00'
  • /Producer: Microsoft® Word for Office 365
  • pdf_file_size_bytes: 128904
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
  • /Author: Haak
  • /CreationDate: D:20241022122957+01'00'
  • /Creator: Microsoft® Word 2021
  • /ModDate: D:20241022122957+01'00'
  • /Producer: Microsoft® Word 2021
  • /Title: NSCIB Certificate
  • pdf_file_size_bytes: 137267
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename c0718_erpt.pdf NSCIB-CC-2300044-02-CR.pdf
pdf_data/report_frontpage
  • NL:
  • NL:
    • cert_id: NSCIB-CC-2300044-02-CR
    • cert_item: NXP JCOP6.x on SN200.C04 Secure Element, versions JCOP6.0 R1.13.0 "SN200", JCOP6.1 R1.04.0 "SN200", JCOP6.1 R1.04.0 "SN210", JCOP6.4 R1.06.0 "SN200", JCOP6.4 R1.06.0 "SN210", JCOP6.5 R1.04.0 "SN200", JCOP6.5 R1.04.0 "SN210", JCOP6.6 R1.06.0 "SN200", JCOP6.6 R1.06.0 "SN210
    • cert_lab: Riscure B.V.
    • developer: NXP Semiconductors
pdf_data/report_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0718-01-2021: 1
  • NL:
    • NSCIB-2300044-02: 1
    • NSCIB-CC-2200037-02-CR: 1
    • NSCIB-CC-2300044-02-CR: 15
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0099-2017: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
  • EAL:
    • EAL 5: 1
    • EAL 5 augmented: 1
    • EAL4: 1
    • EAL5: 1
    • EAL5 augmented: 1
    • EAL5+: 1
    • EAL6: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
  • ALC:
    • ALC_DVS.2: 2
    • ALC_FLR.1: 2
  • ASE:
    • ASE_TSS.2: 2
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
  • AVA:
    • AVA_VAN.5: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 2
    • T.DOC: 2
    • T.FUNC: 1
    • T.PROT: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • NXP:
    • NXP: 17
    • NXP Semiconductors: 4
pdf_data/report_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 4
  • Riscure:
    • Riscure: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 4
  • TLS:
    • TLS:
      • TLS: 2
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
  • TRNG:
    • TRNG: 1
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • fault injection: 2
  • SCA:
    • side channel: 4
    • side-channel: 3
  • other:
    • JIL: 2
    • JIL-AAPS: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 2
pdf_data/report_keywords/os_name
  • JCOP:
    • JCOP 6: 34
    • JCOP6: 106
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • to the following proprietary or non-standard algorithms, protocols and implementations: • FELICA (out of scope as there are no security claims). Not all key sizes specified in the [ST] have sufficient: 1
pdf_data/report_metadata
  • /CreationDate: D:20210602111636+09'00'
  • /Creator: Microsoft® Word for Office 365
  • /ModDate: D:20210602120025+09'00'
  • /Producer: Microsoft® Word for Office 365
  • pdf_file_size_bytes: 600224
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 36
pdf_data/st_filename c0718_est.pdf NSCIB-CC-2300044-02-ST_Lite.pdf
pdf_data/st_keywords/cc_cert_id
  • NL:
    • NSCIB-CC-2200037-02: 1
    • NSCIB-CC-2300044-02: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0055: 1
    • BSI-CC-PP-0084-2014: 1
    • BSI-PP-0055: 1
    • BSI-PP-0084-2014: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 1
  • EAL:
    • EAL 6: 1
    • EAL4: 1
    • EAL4 augmented: 1
    • EAL5: 9
    • EAL5 augmented: 4
    • EAL6: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
  • AGD:
    • AGD_OPE.1: 2
  • ALC:
    • ALC_DVS.2: 4
    • ALC_FLR.1: 4
  • ASE:
    • ASE_CCL: 2
    • ASE_ECD: 1
    • ASE_INT: 2
    • ASE_REQ: 2
    • ASE_SPD: 2
    • ASE_TSS: 2
    • ASE_TSS.2: 4
  • AVA:
    • AVA_VAN.5: 5
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 8
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 9
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 7
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 31
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 31
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 8
    • FDP_ACF.1.4: 3
    • FDP_IFC: 1
    • FDP_IFC.1: 4
    • FDP_IFF: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 14
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 18
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 20
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 23
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 22
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 29
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 5
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 17
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 4
  • FAU:
    • FAU_ARP.1: 14
    • FAU_ARP.1.1: 1
    • FAU_GEN: 1
    • FAU_SAA.1: 3
    • FAU_SAS: 4
    • FAU_SAS.1: 7
    • FAU_SAS.1.1: 2
  • FCO:
    • FCO_NRO: 1
    • FCO_NRO.1: 1
    • FCO_NRO.2: 6
    • FCO_NRO.2.1: 2
    • FCO_NRO.2.2: 1
    • FCO_NRO.2.3: 2
  • FCS:
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 2
    • FCS_CKM.4: 8
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 12
    • FCS_COP.1.1: 17
    • FCS_RNG.1: 5
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 58
    • FDP_ACC.1.1: 2
    • FDP_ACC.2: 11
    • FDP_ACC.2.1: 4
    • FDP_ACC.2.2: 3
    • FDP_ACF: 1
    • FDP_ACF.1: 32
    • FDP_ACF.1.1: 5
    • FDP_ACF.1.2: 6
    • FDP_ACF.1.3: 5
    • FDP_ACF.1.4: 7
    • FDP_IFC: 2
    • FDP_IFC.1: 47
    • FDP_IFC.1.1: 1
    • FDP_IFC.2: 27
    • FDP_IFC.2.1: 4
    • FDP_IFC.2.2: 4
    • FDP_IFF: 2
    • FDP_IFF.1: 39
    • FDP_IFF.1.1: 5
    • FDP_IFF.1.2: 6
    • FDP_IFF.1.3: 6
    • FDP_IFF.1.4: 6
    • FDP_IFF.1.5: 6
    • FDP_ITC: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 13
    • FDP_ITC.2.1: 1
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 1
    • FDP_RIP.1: 55
    • FDP_RIP.1.1: 8
    • FDP_ROL.1: 10
    • FDP_ROL.1.1: 2
    • FDP_ROL.1.2: 3
    • FDP_SDI.1: 1
    • FDP_SDI.2: 5
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UIT: 1
    • FDP_UIT.1: 4
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 6
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 19
    • FIA_UAU.1.1: 3
    • FIA_UAU.1.2: 3
    • FIA_UAU.4: 9
    • FIA_UAU.4.1: 2
    • FIA_UAU.5: 3
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID: 1
    • FIA_UID.1: 59
    • FIA_UID.1.1: 5
    • FIA_UID.1.2: 5
    • FIA_UID.2: 3
    • FIA_UID.2.1: 1
    • FIA_USB.1: 4
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA: 7
    • FMT_MSA.1: 75
    • FMT_MSA.1.1: 9
    • FMT_MSA.2: 2
    • FMT_MSA.2.1: 2
    • FMT_MSA.3: 72
    • FMT_MSA.3.1: 11
    • FMT_MSA.3.2: 10
    • FMT_MTD.1: 7
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 5
    • FMT_MTD.3.1: 1
    • FMT_REV: 1
    • FMT_SMF: 3
    • FMT_SMF.1: 74
    • FMT_SMF.1.1: 8
    • FMT_SMR: 2
    • FMT_SMR.1: 93
    • FMT_SMR.1.1: 7
    • FMT_SMR.1.2: 7
  • FPR:
    • FPR_UNO.1: 7
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS.1: 34
    • FPT_FLS.1.1: 7
    • FPT_PHP.3: 4
    • FPT_PHP.3.1: 1
    • FPT_RCV.2: 1
    • FPT_RCV.3: 2
    • FPT_RCV.3.1: 2
    • FPT_RCV.3.2: 2
    • FPT_RCV.3.3: 2
    • FPT_RCV.3.4: 1
    • FPT_TDC.1: 5
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC.1: 15
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 5
    • A.ADMIN: 10
    • A.USER: 4
  • D:
    • D.DOC: 6
    • D.FUNC: 6
  • O:
    • O.AUDIT: 9
    • O.CONF: 18
    • O.DOC: 18
    • O.FUNC: 9
    • O.INTERFACE: 9
    • O.PROT: 9
    • O.SOFTWARE: 9
    • O.STORAGE: 14
    • O.USER: 21
  • OE:
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 2
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
    • OE.AUDIT_STORAGE: 3
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 21
  • T:
    • T.CONF: 10
    • T.DOC: 14
    • T.FUNC: 7
    • T.PROT: 5
  • A:
    • A.APPS-PROVIDER: 6
    • A.CAP_FILE: 4
    • A.DELETION: 1
    • A.PROCESS-SEC-IC: 5
    • A.USE_DIAG: 6
    • A.USE_KEYS: 6
    • A.VERIFICATION: 3
    • A.VERIFICATION-AU: 1
    • A.VERIFICATION-AUT: 1
    • A.VERIFICATION-AUTHORITY: 4
  • D:
    • D.API_DATA: 3
    • D.APP_: 1
    • D.APP_CODE: 6
    • D.APP_C_: 1
    • D.APP_C_DATA: 5
    • D.APP_I_DATA: 8
    • D.APP_KEYS: 10
    • D.APSD_KEYS: 4
    • D.ATTACK_COUNTER: 8
    • D.CARD_: 1
    • D.CARD_MNGT_: 1
    • D.CARD_MNGT_DATA: 1
    • D.CONFIG_ITEM: 7
    • D.CRYPTO: 6
    • D.ISD_KEYS: 4
    • D.JCS_: 1
    • D.JCS_CODE: 7
    • D.JCS_DATA: 8
    • D.PIN: 11
    • D.SEC_DATA: 6
    • D.TOE_IDENTIFICATION: 2
    • D.TOE_IDENTIFIER: 3
    • D.UPDATE_IMAGE: 25
    • D.VASD_KEYS: 3
  • O:
    • O.APPLET: 15
    • O.APPLET_: 2
    • O.APPLET_CURRENT: 6
    • O.APPLET_LOADED: 5
    • O.APPLET_MIGRATION_DATASTORE: 6
    • O.APPLET_MIGRATION_PLAN: 2
    • O.BIO-MNGT: 1
    • O.CODE_CAP_: 2
    • O.CODE_CAP_FILE: 10
    • O.CODE_PKG: 1
    • O.DELETION: 4
    • O.EXT-MEM: 1
    • O.INSTALL: 3
    • O.JAVAOBJECT: 63
    • O.LOAD: 4
    • O.REMOTE: 1
    • O.SENSITIVE_ARRAYS_INTEG: 1
    • O.SENSITIVE_RESULTS_INTEG: 1
  • OE:
    • OE.APPS-PROVIDER: 5
    • OE.CAP_FILE: 7
    • OE.CARD-: 2
    • OE.CARD-MANAGEMENT: 1
    • OE.CODE-EVIDENCE: 20
    • OE.CONFID-UPDATE-: 2
    • OE.CONFID-UPDATE-IMAGE: 3
    • OE.KEY-CHANGE: 6
    • OE.PROCESS_SEC_: 2
    • OE.PROCESS_SEC_IC: 3
    • OE.SCP: 12
    • OE.SECURITY-: 1
    • OE.SECURITY-DOMA: 2
    • OE.SECURITY-DOMAINS: 2
    • OE.USE_DIAG: 6
    • OE.USE_KEYS: 6
    • OE.VERIFICATION: 28
    • OE.VERIFICATION-A: 2
    • OE.VERIFICATION-AUTHORITY: 3
  • OP:
    • OP.ARRAY_AASTORE: 3
    • OP.ARRAY_ACCESS: 4
    • OP.ARRAY_LENGTH: 3
    • OP.CREATE: 7
    • OP.DELETE_APPLET: 4
    • OP.DELETE_CAP_: 2
    • OP.DELETE_CAP_FILE: 2
    • OP.DELETE_CAP_FILE_APPLET: 2
    • OP.EXPORT_: 1
    • OP.EXPORT_APPLET_DATA: 5
    • OP.IMPORT_: 1
    • OP.IMPORT_APPLET_DATA: 6
    • OP.INSTANCE_FIELD: 3
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 6
    • OP.JAVA: 5
    • OP.MODIFY_: 1
    • OP.PUT: 6
    • OP.PUTFIELD: 1
    • OP.PUTSTATIC: 1
    • OP.READ_CONFIG_: 1
    • OP.THROW: 5
    • OP.TRIGGER_: 1
    • OP.TRIGGER_UPDATE: 3
    • OP.TYPE_ACCESS: 5
    • OP.USE_CONFIG_: 1
  • OSP:
    • OSP.KEY-CHANGE: 5
    • OSP.PROCESS-TOE: 5
    • OSP.SECURITY-DOM: 2
    • OSP.SECURITY-DOMAINS: 3
    • OSP.VERIFICATION: 3
  • OT:
    • OT.ALARM: 14
    • OT.APPLI-AUTH: 12
    • OT.ATTACK-COUNT: 1
    • OT.ATTACK-COUNTE: 1
    • OT.ATTACK-COUNTER: 4
    • OT.AUTH-LOAD-UPD: 2
    • OT.AUTH-LOAD-UPDATE-IMAGE: 3
    • OT.CARD-: 4
    • OT.CARD-CONFIGUR: 2
    • OT.CARD-CONFIGURATION: 4
    • OT.CARD-MANAGEM: 16
    • OT.CARD-MANAGEMENT: 16
    • OT.CIPHER: 6
    • OT.COMM_: 5
    • OT.COMM_AUTH: 8
    • OT.COMM_CONFIDENTIALITY: 4
    • OT.COMM_INTEGRITY: 3
    • OT.CONFID-UPDATE-: 2
    • OT.CONFID-UPDATE-IMAGE: 4
    • OT.DATASTORE_: 2
    • OT.DATASTORE_ACCESS: 4
    • OT.DOMAIN-RIGHTS: 8
    • OT.FIREWALL: 10
    • OT.GLOBAL_: 6
    • OT.GLOBAL_ARRAYS_CONFID: 3
    • OT.GLOBAL_ARRAYS_INTEG: 2
    • OT.IDENTIFICATION: 7
    • OT.KEY-MNGT: 4
    • OT.NATIVE: 10
    • OT.OBJ-DELETION: 4
    • OT.OPERATE: 24
    • OT.PIN-MNGT: 6
    • OT.REALLOCATION: 6
    • OT.RESOURCES: 5
    • OT.RESTRICTED-MO: 3
    • OT.RESTRICTED-MODE: 4
    • OT.RND: 6
    • OT.SCP: 42
    • OT.SECURE_AC_: 2
    • OT.SECURE_AC_ACTIVATION: 4
    • OT.SECURE_LOAD_: 4
    • OT.SECURE_LOAD_ACODE: 6
    • OT.SENSITIVE_: 2
    • OT.SENSITIVE_RESULTS_INTEG: 2
    • OT.SID: 14
    • OT.TOE_: 2
    • OT.TOE_IDENTIFICATION: 3
    • OT.TRANSACTION: 4
  • R:
    • R.JAVA: 10
  • SA:
    • SA.ALARM: 2
    • SA.APPLET-MIGR: 1
    • SA.CARD-MANAGEM: 1
    • SA.CIPHER: 2
    • SA.CONFID-APPLI-D: 1
    • SA.CONFID-APPLI-DATA: 1
    • SA.CONFID-JCS-CO: 1
    • SA.CONFID-JCS-CODE: 1
    • SA.CONFID-JCS-DAT: 1
    • SA.CONFID-JCS-DATA: 1
    • SA.CONFID-UPDATE: 1
    • SA.CONFID-UPDATE-IMAGE: 1
    • SA.CONFIG-APPLET: 1
    • SA.DELETION: 1
    • SA.EXE-APPLI-CODE: 3
    • SA.EXE-JCS-CODE: 3
    • SA.FIREWALL: 2
    • SA.INSTALL: 2
    • SA.INTEG-APPLI-CO: 1
    • SA.INTEG-APPLI-CODE: 2
    • SA.INTEG-APPLI-DA: 1
    • SA.INTEG-APPLI-DATA: 2
    • SA.INTEG-JCS-CODE: 3
    • SA.INTEG-JCS-DATA: 1
    • SA.INTEG-UPDATE-I: 1
    • SA.INTEG-UPDATE-IMAGE: 1
    • SA.KEY-MNGT: 2
    • SA.NATIVE: 4
    • SA.OBJ-DELETION: 3
    • SA.OPERATE: 2
    • SA.OSU: 1
    • SA.PIN-MNGT: 2
    • SA.RESOURCES: 3
    • SA.RM: 1
    • SA.SCP: 5
    • SA.SID: 3
    • SA.TRANSACTION: 2
    • SA.VERIFICATION: 3
  • T:
    • T.AM_DATASTORE_: 1
    • T.AM_DATASTORE_ACCESS: 4
    • T.ATTACK-COUNTER: 5
    • T.COM_EXPLOIT: 5
    • T.CONFID-APPLI-DA: 2
    • T.CONFID-APPLI-DATA: 1
    • T.CONFID-JCS-CODE: 3
    • T.CONFID-JCS-DATA: 3
    • T.CONFID-UPDATE-I: 2
    • T.CONFID-UPDATE-IMAGE: 3
    • T.CONFIG: 5
    • T.DELETION: 2
    • T.EXE-CODE: 6
    • T.EXE-CODE-REMOTE: 1
    • T.INSTALL: 2
    • T.INTEG-APPLI-COD: 2
    • T.INTEG-APPLI-CODE: 4
    • T.INTEG-APPLI-DATA: 10
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 3
    • T.INTEG-UPDATE-IM: 2
    • T.INTEG-UPDATE-IMAGE: 3
    • T.INTERRUPT-OSU: 5
    • T.LIFE_CYCLE: 5
    • T.NATIVE: 3
    • T.OBJ-DELETION: 3
    • T.PHYSICAL: 3
    • T.RESOURCES: 3
    • T.RND: 5
    • T.SID: 6
    • T.UNAUTH-LOAD-UP: 2
    • T.UNAUTH-LOAD-UPDATE-IMAGE: 3
    • T.UNAUTHORIZED_: 2
    • T.UNAUTHORIZED_CARD_MNGT: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • NXP:
    • NXP: 420
    • NXP Semiconductors: 26
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • 3DES: 2
  • AES_competition:
    • AES:
      • AES: 9
  • DES:
    • 3DES:
      • 3DES: 3
      • TDES: 1
      • Triple-DES: 1
      • TripleDES: 1
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CBC-MAC: 2
      • CMAC: 3
      • HMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 2
    • EdDSA:
      • EdDSA: 4
  • FF:
    • DH:
      • Diffie-Hellman: 5
  • RSA:
    • RSA 1024: 1
    • RSA-CRT: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 1
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-224: 2
      • SHA-256: 3
      • SHA-384: 2
      • SHA-512: 2
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 3
  • KEX:
    • Key Exchange: 2
  • MAC:
    • MAC: 5
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 10
  • TLS:
    • TLS:
      • TLS1.2: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 11
    • RNG: 11
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CCM:
    • CCM: 36
  • ECB:
    • ECB: 2
  • GCM:
    • GCM: 4
pdf_data/st_keywords/ecc_curve
  • Curve:
    • Curve25519: 1
pdf_data/st_keywords/crypto_library
  • Generic:
    • Crypto Library 1.3.3: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • FI:
    • DFA: 1
    • Fault Injection: 1
    • Physical Tampering: 2
    • malfunction: 2
    • physical tampering: 2
  • SCA:
    • DPA: 3
    • SPA: 2
    • physical probing: 3
    • side channel: 1
    • side-channel: 1
    • timing attack: 1
    • timing attacks: 1
  • other:
    • JIL: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 2
pdf_data/st_keywords/os_name
  • JCOP:
    • JCOP 6: 43
    • JCOP6: 248
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS197: 2
  • NIST:
    • NIST SP 800-90A: 2
  • BSI:
    • AIS 20: 2
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • FIPS:
    • FIPS 197: 1
  • ICAO:
    • ICAO: 1
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.2.1: 1
  • JavaCard:
    • JC3.0.5: 1
    • Java Card 3.0.4: 1
    • Java Card 3.1: 1
pdf_data/st_keywords/javacard_api_const
  • ALG:
    • AES:
      • ALG_AES_BLOCK_128_CBC_NOPAD: 1
      • ALG_AES_BLOCK_128_CBC_NOPAD_STANDARD: 2
      • ALG_AES_BLOCK_128_ECB_NOPAD: 1
      • ALG_AES_CBC_ISO9797_M1: 1
      • ALG_AES_CBC_ISO9797_M2: 1
      • ALG_AES_CBC_ISO9797_M2_STANDARD: 2
      • ALG_AES_CBC_PKCS5: 1
      • ALG_AES_CMAC16: 1
      • ALG_AES_CMAC16_STANDARD: 1
      • ALG_AES_ECB_ISO9797_M1: 1
      • ALG_AES_ECB_ISO9797_M2: 1
      • ALG_AES_ECB_PKCS5: 1
      • ALG_AES_MAC_128_NOPAD: 1
    • DES:
      • ALG_DES_CBC_ISO9797_M1: 1
      • ALG_DES_CBC_ISO9797_M2: 1
      • ALG_DES_CBC_NOPAD: 1
      • ALG_DES_CBC_PKCS5: 1
      • ALG_DES_CMAC8: 1
      • ALG_DES_ECB_ISO9797_M1: 1
      • ALG_DES_ECB_ISO9797_M2: 2
      • ALG_DES_ECB_NOPAD: 1
      • ALG_DES_ECB_PKCS5: 1
      • ALG_DES_MAC4_ISO9797_1_M1_ALG3: 1
      • ALG_DES_MAC4_ISO9797_1_M2_ALG3: 1
      • ALG_DES_MAC4_ISO9797_M1: 1
      • ALG_DES_MAC4_ISO9797_M2: 1
      • ALG_DES_MAC4_PKCS5: 1
      • ALG_DES_MAC8_ISO9797_1_M1_ALG3: 1
      • ALG_DES_MAC8_ISO9797_1_M2_ALG3: 1
      • ALG_DES_MAC8_ISO9797_M1: 1
      • ALG_DES_MAC8_ISO9797_M2: 1
      • ALG_DES_MAC8_NOPAD: 1
      • ALG_DES_MAC8_PKCS5: 1
    • EC:
      • ALG_EC_SVDP_DH: 1
      • ALG_EC_SVDP_DHC: 1
      • ALG_EC_SVDP_DHC_KDF: 1
      • ALG_EC_SVDP_DHC_PLAIN: 1
      • ALG_EC_SVDP_DH_KDF: 1
      • ALG_EC_SVDP_DH_PLAIN: 1
      • ALG_EC_SVDP_DH_PLAIN_XY: 2
    • ECDSA:
      • ALG_ECDSA_SHA_224: 1
      • ALG_ECDSA_SHA_256: 2
      • ALG_ECDSA_SHA_384: 1
      • ALG_ECDSA_SHA_512: 1
    • HMAC:
      • ALG_HMAC_SHA_256: 1
      • ALG_HMAC_SHA_384: 1
      • ALG_HMAC_SHA_512: 1
    • RSA:
      • ALG_RSA_NOPAD: 1
      • ALG_RSA_PKCS1: 1
      • ALG_RSA_PKCS1_OAEP: 1
      • ALG_RSA_SHA_224_PKCS1: 1
      • ALG_RSA_SHA_224_PKCS1_PSS: 1
      • ALG_RSA_SHA_256_PKCS1: 1
      • ALG_RSA_SHA_256_PKCS1_PSS: 1
      • ALG_RSA_SHA_384_PKCS1: 1
      • ALG_RSA_SHA_384_PKCS1_PSS: 1
      • ALG_RSA_SHA_512_PKCS1: 1
      • ALG_RSA_SHA_512_PKCS1_PSS: 1
      • ALG_RSA_SHA_PKCS1: 1
    • SHA:
      • ALG_SHA_224: 1
      • ALG_SHA_256: 3
      • ALG_SHA_384: 3
      • ALG_SHA_512: 3
    • XDH:
      • ALG_XDH: 1
  • misc:
    • LENGTH_AES_128: 4
    • LENGTH_AES_192: 4
    • LENGTH_AES_256: 4
    • LENGTH_DES3_2KEY: 4
    • LENGTH_DES3_3KEY: 4
    • LENGTH_EC_FP_128: 1
    • LENGTH_EC_FP_192: 1
    • LENGTH_EC_FP_224: 2
    • LENGTH_EC_FP_256: 3
    • LENGTH_EC_FP_384: 1
    • LENGTH_EC_FP_521: 2
    • LENGTH_RSA_1024: 1
    • LENGTH_SHA: 1
    • LENGTH_SHA_256: 2
    • LENGTH_SHA_384: 1
    • LENGTH_SHA_512: 2
    • PAD_PKCS1_OAEP: 1
    • SIG_CIPHER_AES_CMAC16: 1
    • SIG_CIPHER_DES_CMAC8: 1
    • SIG_CIPHER_ECDSA: 1
    • SIG_CIPHER_RSA: 1
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • com:
    • com.nxp.id.jcopx.security: 1
  • java:
    • java.rmi: 1
  • javacard:
    • javacard.framework: 2
    • javacard.security: 2
  • javacardx:
    • javacardx.crypto: 1
pdf_data/st_metadata
  • /Author: RICOH
  • /CreationDate: D:20210528093716+09'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20210528093716+09'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Title: RICOH Pro C5310S/C5300S Security Target
  • pdf_file_size_bytes: 1275021
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 91
  • /Author: NXP B.V.
  • /CreationDate: D:20240821144615+02'00'
  • /Creator: DITA Open Toolkit 3.3.1
  • /Keywords: ASE, JCOP, Common Criteria, EAL5 augmented
  • /Producer: Apache FOP Version 2.3
  • /Subject: NXP JCOP6.x on SN200.C04 Secure Element
  • /Title: Security Target Lite
  • pdf_file_size_bytes: 1059097
  • pdf_hyperlinks: mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 160
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different