name |
RICOH Pro C5310S/C5300S J-1.00 |
NXP J3D081_M59_DF and J3D081_M61_DF Secure Smart Card Controller Revision 2 of JCOP V2.4.2 R2 |
category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
DE |
status |
active |
archived |
not_valid_after |
14.04.2026 |
01.09.2019 |
not_valid_before |
14.04.2021 |
31.07.2013 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0718_eimg.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0718_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0860a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0718_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0860b_pdf.pdf |
manufacturer |
Ricoh Company, Ltd. |
NXP Semiconductors Germany GmbH Business Line Identification |
manufacturer_web |
https://www.ricoh.com/ |
https://www.nxp.com |
security_level |
EAL2+, ALC_FLR.2 |
ASE_TSS.2, ALC_DVS.2, EAL4+, AVA_VAN.5 |
dgst |
2ea4809408962176 |
9c4abfb7ef7e0f82 |
heuristics/cert_id |
JISEC-CC-CRP-C0718-01-2021 |
BSI-DSZ-CC-0860-2013 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
cpe:2.3:h:ricoh:pro_c5310s:-:*:*:*:*:*:*:*, cpe:2.3:h:ricoh:pro_c5300s:-:*:*:*:*:*:*:* |
cpe:2.3:h:nxp:j3d081_m61_df:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3d081_m61:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3d081_m59_df:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3d081_m59:-:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2021-3011 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, APE_REQ.2, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ALC_TAT.2, ASE_TSS.2, ADV_TDS.4, ASE_REQ.2, APE_INT.1, APE_SPD.1, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 |
heuristics/extracted_versions |
1.00 |
2.4.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0864-2012, BSI-DSZ-CC-0707-2012 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0864-2012, BSI-DSZ-CC-0707-2012, BSI-DSZ-CC-0633-2010, BSI-DSZ-CC-0555-2009 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0718
- certification_date: 01.04.2021
- claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- enhanced:
- assurance_level: EAL2 Augmented by ALC_FLR.2
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0718
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000001fda-att/c0718_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. Network Protection Function: Enables the TOE to protect network communications using encryption. Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. Security Management Function: Enables the TOE administrator to control security functions. Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
- evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
- product: RICOH Pro C5310S/C5300S
- product_type: Multi Function Product
- protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000001fda-att/c0718_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000001fda-att/c0718_est.pdf
- toe_version: J-1.00
- vendor: RICOH COMPANY, LTD.
- expiration_date:
- supplier: RICOH COMPANY, LTD.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0718_it0765.html
- toe_japan_name: RICOH Pro C5310S / C5300SJ-1.00
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
43ce79b420f23a00 |
85bef5b6f16c4d33 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf |
pdf_data/cert_filename |
c0718_eimg.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0718-01-2021: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20210602111328+09'00'
- /Creator: Microsoft® Word for Office 365
- /ModDate: D:20210602115910+09'00'
- /Producer: Microsoft® Word for Office 365
- pdf_file_size_bytes: 128904
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
c0718_erpt.pdf |
0860a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0860-2013
- cert_item: NXP J3D081_M59_DF and J3D081_M61_DF Secure Smart Card Controller Revision 2 of JCOP V2.4.2 R2
- cert_lab: BSI
- developer: NXP Semiconductors Germany GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0718-01-2021: 1
|
- DE:
- BSI-DSZ-CC-0707: 1
- BSI-DSZ-CC-0707-2011: 1
- BSI-DSZ-CC-0707-2012: 1
- BSI-DSZ-CC-0783: 1
- BSI-DSZ-CC-0784: 1
- BSI-DSZ-CC-0860-2013: 24
- BSI-DSZ-CC-0864: 1
- BSI-DSZ-CC-0864-2011: 1
- BSI-DSZ-CC-0864-2012: 1
- FR:
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 4
- EAL2 augmented: 2
|
- EAL:
- EAL 4: 7
- EAL 4 augmented: 3
- EAL 5: 3
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 7
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 1
- AGD_PRE: 2
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 6
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.ADMIN: 2
- A.USER: 1
- T:
- T.CONF: 2
- T.DOC: 2
- T.FUNC: 1
- T.PROT: 1
|
- OE:
- OE.PROCESS_SEC_IC: 1
- OE.USE_DIAG: 1
- OE.USE_KEYS: 1
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 28
- NXP Semiconductors: 19
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
- BSI:
- AIS 20: 1
- AIS 25: 2
- AIS 26: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 3
- AIS 37: 1
- AIS 38: 1
- AIS36: 1
- FIPS:
- FIPS 00: 1
- FIPS 180-3: 1
- FIPS 46-3: 3
- PKCS:
- SCP:
|
pdf_data/report_keywords/javacard_version |
|
- GlobalPlatform:
- Global Platform (version 2.2.1: 1
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 2013, Doc.No. 209431, NXP Semiconductors Germany GmbH (confidential document) [12] User manual JCOP V2.4.2 Revision 2 secure smart card controller, Rev. 3.3, 27 February 2013: 1
- 3.0, 17 October 2011, Doc.No. 219530, NXP Semiconductors Germany GmbH (confidential document) [15] Certification Report, BSI-DSZ-CC-0707-2012 for NXP Secure Smart Card Controllers: 1
- Box JCOP V2.4.2, Rev. 3.3, 28 February 2013, Doc.No. 22113313 , NXP Semiconductors Germany GmbH (confidential document) [14] Product hardware data sheet JCOP V2.4.2 Revision 2 J3D081_DF secure smart card controller: 1
- Card Controller Revision 2 (confidential document) [11] Administrator manual JCOP V2.4.2 Revision 2 secure smart card controller, Rev. 3.1, 15: 1
- No. 209233, NXP Semiconductors Germany GmbH (confidential document) 12 specifically • AIS 25, Version 7, Anwendung der CC auf Integrierte Schaltungen including JIL: 1
- Secure Smart Card Controller Revision 2 Security Target, NXP Semiconductors Germany GmbH (confidential document) [7] Java Card System - Open Configuration Protection Profile, Version 2.6, 19 April 2010: 1
- Technical Report NXP J3D081_M59_DF, J3D081_M61_DF Secure Smart Card Controller, Brightsight (confidential document) [10] Configuration list for the TOE, Version 1.3, NXP J3D145 J2D145 J3D145 J2D145 J3D145DF Secure: 1
- according to AIS36, v3.0, 12 December 2012, Brightsight (confidential document) 13 Please note that [6] and [8] contain incorrect references to older versions of the document 27: 1
- with DESFire EV1 Version 1.2, 8 June 2012, T-Tystems GmbH (confidential document) [18] ETR for composition, BSI-DSZ-CC-0864, NXP Crypto library V2.7 on SmartMX: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20210602111636+09'00'
- /Creator: Microsoft® Word for Office 365
- /ModDate: D:20210602120025+09'00'
- /Producer: Microsoft® Word for Office 365
- pdf_file_size_bytes: 600224
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 36
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20130819095646+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, NXP J3D081_M59_DF, and J3D081_M61_DF Secure Smart Card Controller Revision 2, JCOP, NXP"
- /ModDate: D:20130819095857+02'00'
- /Producer: LibreOffice 3.6
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0860-2013
- pdf_file_size_bytes: 1027140
- pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 42
|
pdf_data/st_filename |
c0718_est.pdf |
0860b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0707: 2
- BSI-DSZ-CC-0860: 2
- BSI-DSZ-CC-0864: 3
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0017: 2
- BSI-PP-0035: 2
- BSI-PP-0035-2007: 1
- BSI-PP-0035-2007―: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 2
- EAL 4 augmented: 2
- EAL 5: 1
- EAL4: 19
- EAL4 augmented: 1
- EAL5: 1
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 2
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 4
- AGD_PRE: 1
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 2
- ALC_DVS.1: 2
- ALC_DVS.2: 8
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 3
- ASE_TSS.2: 8
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_VAN.3: 2
- AVA_VAN.5: 9
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 10
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 8
- FAU_SAR.2.1: 1
- FAU_STG.1: 9
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 7
- FCS_COP.1: 10
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 31
- FDP_ACC.1.1: 2
- FDP_ACF.1: 31
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 8
- FDP_ACF.1.4: 3
- FDP_IFC: 1
- FDP_IFC.1: 4
- FDP_IFF: 1
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 14
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 8
- FIA_UAU.7.1: 1
- FIA_UID.1: 18
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 20
- FMT_MSA.1.1: 2
- FMT_MSA.3: 23
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 12
- FMT_MTD.1.1: 1
- FMT_SMF.1: 22
- FMT_SMF.1.1: 1
- FMT_SMR.1: 29
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FDI_EXP: 5
- FPT_FDI_EXP.1: 11
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 9
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 17
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 4
|
- FAU:
- FAU_ARP.1: 29
- FAU_ARP.1.1: 1
- FAU_GEN: 1
- FAU_SAA.1: 2
- FAU_SAS: 13
- FAU_SAS.1: 5
- FAU_SAS.1.1: 1
- FCO:
- FCS:
- FCS_CKM.1: 46
- FCS_CKM.1.1: 1
- FCS_CKM.2: 10
- FCS_CKM.2.1: 1
- FCS_CKM.3: 7
- FCS_CKM.3.1: 1
- FCS_CKM.4: 47
- FCS_CKM.4.1: 1
- FCS_COP: 35
- FCS_COP.1: 37
- FCS_RNG: 3
- FCS_RNG.1: 19
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 72
- FDP_ACC.1: 24
- FDP_ACC.2: 9
- FDP_ACF: 65
- FDP_ACF.1: 44
- FDP_IFC: 25
- FDP_IFC.1: 17
- FDP_IFC.2: 2
- FDP_IFF: 20
- FDP_IFF.1: 13
- FDP_ITC: 10
- FDP_ITC.1: 17
- FDP_ITC.2: 27
- FDP_RIP: 91
- FDP_RIP.1: 10
- FDP_ROL: 11
- FDP_ROL.1: 10
- FDP_SDI.2: 8
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 7
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 12
- FIA_AFL.1: 2
- FIA_ATD: 9
- FIA_ATD.1: 2
- FIA_UAU.1: 3
- FIA_UAU.2: 4
- FIA_UAU.5: 4
- FIA_UID: 18
- FIA_UID.1: 11
- FIA_UID.2: 6
- FIA_USB: 8
- FIA_USB.1: 3
- FMT:
- FMT_MSA: 146
- FMT_MSA.1: 21
- FMT_MSA.2: 3
- FMT_MSA.3: 32
- FMT_MTD: 18
- FMT_MTD.1: 7
- FMT_MTD.3: 1
- FMT_REV: 1
- FMT_SMF: 42
- FMT_SMF.1: 29
- FMT_SMF.1.1: 1
- FMT_SMR: 35
- FMT_SMR.1: 39
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 9
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 40
- FPT_FLS.1: 25
- FPT_FLS.1.1: 1
- FPT_ITC.1: 1
- FPT_PHP: 6
- FPT_PHP.3: 3
- FPT_RCV: 10
- FPT_RCV.3: 4
- FPT_RPL.1: 6
- FPT_TDC.1: 11
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FRU:
- FTP:
- FTP_ITC: 18
- FTP_ITC.1: 6
- FTP_TRP.1: 8
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 5
- A.ADMIN: 10
- A.USER: 4
- D:
- O:
- O.AUDIT: 9
- O.CONF: 18
- O.DOC: 18
- O.FUNC: 9
- O.INTERFACE: 9
- O.PROT: 9
- O.SOFTWARE: 9
- O.STORAGE: 14
- O.USER: 21
- OE:
- OE.ADMIN: 8
- OE.AUDIT: 3
- OE.AUDIT_ACCESS: 2
- OE.AUDIT_ACCESS_AUTHORIZED: 1
- OE.AUDIT_STORAGE: 3
- OE.INTERFACE: 4
- OE.PHYSICAL: 4
- OE.USER: 21
- T:
- T.CONF: 10
- T.DOC: 14
- T.FUNC: 7
- T.PROT: 5
|
- A:
- A.APPLET: 4
- A.DF_SECURE-: 1
- A.DF_SECURE-VALUE: 1
- A.DF_SECURE-VALUES: 4
- A.DF_TERMINAL-: 1
- A.DF_TERMINAL-SUPPORT: 4
- A.NATIVE: 1
- A.PPROCESS-SEC-IC: 1
- A.PROCESS-SEC-IC: 2
- A.PROCESS_SEC_IC: 2
- A.USE_DIAG: 7
- A.USE_KEY: 1
- A.USE_KEYS: 6
- A.VERIFICATION: 3
- D:
- D.ADMIN_CONF_DATA: 3
- D.API_DATA: 3
- D.APP_CODE: 10
- D.APP_C_DATA: 3
- D.APP_I_DATA: 8
- D.APP_KEY: 1
- D.CRYPTO: 7
- D.DF_CODE: 1
- D.DF_DATA: 1
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.PERSO_CONF_DATA: 4
- D.PIN: 12
- D.SEC_DATA: 7
- O:
- O.APPLET: 18
- O.CIPHER: 1
- O.CODE_: 1
- O.CODE_PKG: 13
- O.DF_TYPE-CONSISTENCY: 1
- O.EXT-MEM: 1
- O.EXT_MEM_IN: 2
- O.EXT_MEM_INSTANCE: 8
- O.JAVAOBJECT: 36
- O.NON_SB_CONTENT: 1
- O.NON_SB_SFR: 4
- O.REMOTE_MTHD: 4
- O.REMOTE_OBJ: 4
- O.RMI_SERVICE: 5
- O.ROR: 2
- O.SB_CONTENT: 3
- O.SB_SFR: 5
- O.SCP: 1
- OE:
- OE.APPLET: 7
- OE.CARD-MANAGEMENT: 1
- OE.DF_SECURE-VALUES: 4
- OE.DF_TERMINAL-SUPPORT: 1
- OE.NATIVE: 1
- OE.PROCESS_SEC_IC: 6
- OE.SCP: 2
- OE.USE_DIAG: 9
- OE.USE_KEYS: 7
- OE.VERIFICATION: 20
- OE.XYZ: 1
- OP:
- OP.ARRAY_ACCESS: 4
- OP.CREATE: 7
- OP.CREATE_EXT_MEM_INSTANCE: 3
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.GET_ROR: 2
- OP.INSTANCE_FIELD: 4
- OP.INVK_INTERFACE: 6
- OP.INVK_VIRTUAL: 5
- OP.INVOKE: 3
- OP.JAVA: 5
- OP.PUT: 6
- OP.READ_EXT_MEM: 3
- OP.RET_RORD: 2
- OP.SB_ACCESS: 3
- OP.SB_ACCESS_SFR: 3
- OP.THROW: 4
- OP.TYPE_ACCESS: 4
- OP.WRITE_EXT_MEM: 3
- OSP:
- OSP.PROCESS-TOE: 5
- OSP.VERIFICATION: 3
- OT:
- OT.ALARM: 15
- OT.CARD-: 2
- OT.CARD-MANAGEMENT: 17
- OT.CIPHER: 11
- OT.DELETION: 7
- OT.DF_AUTHENTICATION: 7
- OT.DF_CONFIDENTIALITY: 8
- OT.DF_DATA-: 1
- OT.DF_DATA-ACCESS: 8
- OT.DF_TRANSACTION: 8
- OT.DF_TYPE-: 1
- OT.DF_TYPE-CONSISTENCY: 5
- OT.EXT-MEM: 14
- OT.FIREWALL: 18
- OT.GLOBAL_ARRAYS_CONFID: 9
- OT.GLOBAL_ARRAYS_INTEG: 10
- OT.IDENTIFICATION: 10
- OT.INSTALL: 10
- OT.KEY-: 1
- OT.KEY-MNGT: 9
- OT.LOAD: 9
- OT.MF_FW: 8
- OT.NATIVE: 9
- OT.OBJ-DELETION: 8
- OT.OPERATE: 21
- OT.PIN-MNGT: 11
- OT.REALLOCATION: 9
- OT.REMOTE: 8
- OT.RESOURCES: 10
- OT.RND: 12
- OT.SCP: 40
- OT.SEC_BOX_FW: 11
- OT.SID: 13
- OT.TRANSACTION: 9
- OT.VERIFICATION: 1
- OT.XYZ: 1
- R:
- T:
- T.CONFID-APPLI-DATA: 5
- T.CONFID-JCS-CODE: 5
- T.CONFID-JCS-DATA: 5
- T.DELETION: 4
- T.DF_CLONING: 6
- T.DF_DATA-MODIFICATION: 5
- T.DF_DATA_MODIFICATION: 1
- T.DF_IMPERSONATE: 6
- T.EXE-CODE: 8
- T.EXE-CODE-REMOTE: 4
- T.INSTALL: 4
- T.INTEG-APPLI-: 2
- T.INTEG-APPLI-CODE: 8
- T.INTEG-APPLI-DATA: 8
- T.INTEG-JCS-CODE: 5
- T.INTEG-JCS-DATA: 5
- T.NATIVE: 5
- T.OBJ-DELETION: 4
- T.OS_OPERATE: 7
- T.PHYSICAL: 4
- T.RESOURCES: 4
- T.RND: 7
- T.SEC_BOX_BORDER: 7
- T.SID: 8
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 156
- NXP Semiconductors: 21
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 1
- TDEA: 1
- TDES: 2
- Triple-DES: 7
- TripleDES: 1
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 7
- Fault Injection: 1
- Physical tampering: 3
- malfunction: 5
- physical tampering: 1
- SCA:
- DPA: 10
- SPA: 2
- physical probing: 3
- side channel: 15
- side-channel: 1
- side-channels: 2
- timing attack: 1
- timing attacks: 6
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- NIST:
|
- BSI:
- AIS 20: 7
- AIS20: 2
- AIS31: 1
- CC:
- FIPS:
- FIPS 180-3: 6
- FIPS 186-3: 5
- FIPS 197: 2
- FIPS 46-3: 1
- FIPS PUB 180-3: 1
- FIPS PUB 186-2: 1
- FIPS PUB 186-3: 1
- FIPS PUB 81: 2
- ICAO:
- ISO:
- ISO/IEC 11770: 2
- ISO/IEC 15946-1: 1
- ISO/IEC 9796-: 1
- PKCS:
- PKCS #1: 1
- PKCS#1: 2
- PKCS#3: 2
- PKCS1: 1
- RFC:
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 2
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- Global Platform 2.2.1: 1
- GlobalPlatform 2.2.1: 2
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 4
- javacard.framework.applet: 1
- javacard.security: 4
- javacardx:
- javacardx.crypto: 2
- javacardx.rmi: 1
- javacardx.security: 1
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- Groups marked with ‗IT‘ are considered in the TOE IT environment, and groups marked with ‗—‗ are out of scope of this evaluation. Table 8. TOE Groups Overview Group Description Scope Core (CoreG) The CoreG: 1
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives OT.SCP.RECOVERY and OT.SCP.SUPPORT are: 1
- out of scope: 2
|
pdf_data/st_metadata |
- /Author: RICOH
- /CreationDate: D:20210528093716+09'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20210528093716+09'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Title: RICOH Pro C5310S/C5300S Security Target
- pdf_file_size_bytes: 1275021
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 91
|
- /Author: NXP Semiconductors
- /CreationDate: D:20130909160805Z
- /Creator: Microsoft® Office Word 2007
- /Keywords: JCOP, ST, Security Target Lite
- /ModDate: D:20130909161018+02'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: Security Target Lite
- /Title: NXP J3D081_M59_DF, and J3D081_M61_DF Secure Smart Card Controller Revision 2
- pdf_file_size_bytes: 1619732
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 143
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |