name |
RICOH Pro C5310S/C5300S J-1.00 |
Carte UpTeq NFC3.2.2_Generic v1.0 sur composant ST33G1M2-F |
category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
FR |
status |
active |
archived |
not_valid_after |
14.04.2026 |
31.03.2025 |
not_valid_before |
14.04.2021 |
23.05.2016 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0718_eimg.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat%20ANSSI-CC-2016_22-S04.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0718_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016-22.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0718_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible-Lite-2016-22.pdf |
manufacturer |
Ricoh Company, Ltd. |
Gemalto / STMicroelectronics |
manufacturer_web |
https://www.ricoh.com/ |
https://www.gemalto.com/ |
security_level |
EAL2+, ALC_FLR.2 |
ALC_DVS.2, EAL4+, AVA_VAN.5 |
dgst |
2ea4809408962176 |
ba5484f422a0a49b |
heuristics/cert_id |
JISEC-CC-CRP-C0718-01-2021 |
ANSSI-CC-2016/22 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
cpe:2.3:h:ricoh:pro_c5310s:-:*:*:*:*:*:*:*, cpe:2.3:h:ricoh:pro_c5300s:-:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ADV_COMP.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ADV_FSP.4, ASE_CCL.1 |
heuristics/extracted_versions |
1.00 |
3.2.2, 1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2016/31 |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2014/46 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2016/31 |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2014/46 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0718
- certification_date: 01.04.2021
- claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- enhanced:
- assurance_level: EAL2 Augmented by ALC_FLR.2
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0718
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000001fda-att/c0718_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. Network Protection Function: Enables the TOE to protect network communications using encryption. Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. Security Management Function: Enables the TOE administrator to control security functions. Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
- evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
- product: RICOH Pro C5310S/C5300S
- product_type: Multi Function Product
- protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000001fda-att/c0718_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000001fda-att/c0718_est.pdf
- toe_version: J-1.00
- vendor: RICOH COMPANY, LTD.
- expiration_date:
- supplier: RICOH COMPANY, LTD.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0718_it0765.html
- toe_japan_name: RICOH Pro C5310S / C5300SJ-1.00
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2014/46 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2014/46 |
heuristics/protection_profiles |
43ce79b420f23a00 |
7b81fd67c02d34de |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-04en.pdf |
pdf_data/cert_filename |
c0718_eimg.pdf |
certificat ANSSI-CC-2016_22-S04.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0718-01-2021: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20210602111328+09'00'
- /Creator: Microsoft® Word for Office 365
- /ModDate: D:20210602115910+09'00'
- /Producer: Microsoft® Word for Office 365
- pdf_file_size_bytes: 128904
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
- /Author:
- /CreationDate: D:20201222180522+01'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20201222180522+01'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 275772
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
c0718_erpt.pdf |
ANSSI-CC-2016-22.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2016/22
- cert_item: Carte UpTeq NFC3.2.2_Generic v1.0 sur composant ST33G1M2-F
- cert_item_version: T1032507, Release A
- cert_lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto La Vigie, Av du Jujubier ZI Athelia IV, 13705 La Ciotat Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P. 2, 13106 Rousset, France Commanditaire Gemalto La Vigie, Av du Jujubier ZI Athelia IV, 13705 La Ciotat Cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: PPUSIMB], version 2.0.2, (U)SIM Java Card Platform Protection Profile - Basic configuration
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0718-01-2021: 1
|
- FR:
- ANSSI-CC-2014/46: 4
- ANSSI-CC-2014/46-S01: 1
- ANSSI-CC-2016/22: 19
- ANSSI-CC-PP-2010/04: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 4
- EAL2 augmented: 2
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL2: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- AGD_APP: 3
- AGD_OPE: 1
- AGD_PRE: 1
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.ADMIN: 2
- A.USER: 1
- T:
- T.CONF: 2
- T.DOC: 2
- T.FUNC: 1
- T.PROT: 1
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- STMicroelectronics:
|
pdf_data/report_keywords/eval_facility |
|
- Serma:
- Serma Safety & Security: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20210602111636+09'00'
- /Creator: Microsoft® Word for Office 365
- /ModDate: D:20210602120025+09'00'
- /Producer: Microsoft® Word for Office 365
- pdf_file_size_bytes: 600224
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 36
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: Rapport ptf
- pdf_file_size_bytes: 215543
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
pdf_data/st_filename |
c0718_est.pdf |
Cible-Lite-2016-22.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2014/46: 1
- ANSSI-CC-PP-2010/03: 1
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 4
- EAL4 augmented: 2
- EAL4+: 2
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 2
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 5
- ADV_COMP.1: 2
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 9
- ADV_IMP.1: 4
- ADV_TDS.1: 2
- ADV_TDS.2: 1
- ADV_TDS.3: 4
- AGD:
- AGD_ADM: 1
- AGD_OPE.1: 9
- AGD_PRE.1: 3
- AGD_USR: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 5
- ALC_LCD.1: 3
- ALC_TAT.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 4
- ASE_OBJ.2: 2
- ASE_REQ.1: 2
- ASE_REQ.2: 1
- ASE_SPD.1: 3
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 5
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 10
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 8
- FAU_SAR.2.1: 1
- FAU_STG.1: 9
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 7
- FCS_COP.1: 10
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 31
- FDP_ACC.1.1: 2
- FDP_ACF.1: 31
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 8
- FDP_ACF.1.4: 3
- FDP_IFC: 1
- FDP_IFC.1: 4
- FDP_IFF: 1
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 14
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 8
- FIA_UAU.7.1: 1
- FIA_UID.1: 18
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 20
- FMT_MSA.1.1: 2
- FMT_MSA.3: 23
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 12
- FMT_MTD.1.1: 1
- FMT_SMF.1: 22
- FMT_SMF.1.1: 1
- FMT_SMR.1: 29
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FDI_EXP: 5
- FPT_FDI_EXP.1: 11
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 9
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 17
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 4
|
- FAU:
- FAU_ARP.1: 19
- FAU_ARP.1.1: 1
- FAU_SAA.1: 3
- FAU_SAS.1: 2
- FCO:
- FCS:
- FCS_CKM: 105
- FCS_CKM.1: 28
- FCS_CKM.2: 10
- FCS_CKM.3: 5
- FCS_CKM.4: 57
- FCS_CKM.4.1: 1
- FCS_COP: 70
- FCS_COP.1: 23
- FCS_RND: 1
- FCS_RND.1: 10
- FCS_RND.1.1: 2
- FCS_RNG.1: 2
- FDP:
- FDP_ACC: 39
- FDP_ACC.1: 23
- FDP_ACC.2: 6
- FDP_ACF: 30
- FDP_ACF.1: 26
- FDP_IFC: 31
- FDP_IFC.1: 21
- FDP_IFC.2: 4
- FDP_IFF: 25
- FDP_IFF.1: 22
- FDP_IFF.1.2: 1
- FDP_IFF.1.4: 1
- FDP_ITC: 18
- FDP_ITC.1: 24
- FDP_ITC.2: 37
- FDP_ITT.1: 2
- FDP_RIP: 70
- FDP_RIP.1: 10
- FDP_ROL: 18
- FDP_ROL.1: 7
- FDP_SDI.2: 6
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 12
- FDP_UIT.1: 4
- FIA:
- FIA_ATD: 12
- FIA_ATD.1: 3
- FIA_UAU: 15
- FIA_UAU.1: 2
- FIA_UAU.4: 1
- FIA_UID: 28
- FIA_UID.1: 15
- FIA_UID.2: 1
- FIA_USB: 6
- FIA_USB.1: 3
- FMT:
- FMT_LIM.1: 5
- FMT_LIM.2: 5
- FMT_MOF: 7
- FMT_MOF.1: 1
- FMT_MSA: 123
- FMT_MSA.1: 18
- FMT_MSA.2: 2
- FMT_MSA.3: 26
- FMT_MSA.3.1: 2
- FMT_MTD: 20
- FMT_MTD.1: 3
- FMT_MTD.3: 1
- FMT_SMF: 45
- FMT_SMF.1: 28
- FMT_SMF.1.1: 1
- FMT_SMR: 51
- FMT_SMR.1: 39
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO: 5
- FPR_UNO.1: 11
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 50
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_ITT: 5
- FPT_ITT.1: 3
- FPT_PHP.3: 2
- FPT_RCV: 24
- FPT_RCV.3: 11
- FPT_RCV.4: 1
- FPT_TDC.1: 9
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 1
- FRU:
- FTP:
- FTP_ITC: 19
- FTP_ITC.1: 10
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 5
- A.ADMIN: 10
- A.USER: 4
- D:
- O:
- O.AUDIT: 9
- O.CONF: 18
- O.DOC: 18
- O.FUNC: 9
- O.INTERFACE: 9
- O.PROT: 9
- O.SOFTWARE: 9
- O.STORAGE: 14
- O.USER: 21
- OE:
- OE.ADMIN: 8
- OE.AUDIT: 3
- OE.AUDIT_ACCESS: 2
- OE.AUDIT_ACCESS_AUTHORIZED: 1
- OE.AUDIT_STORAGE: 3
- OE.INTERFACE: 4
- OE.PHYSICAL: 4
- OE.USER: 21
- T:
- T.CONF: 10
- T.DOC: 14
- T.FUNC: 7
- T.PROT: 5
|
- A:
- A.APPLET: 3
- A.APPS-PROVIDER: 4
- A.CONTROLLING-: 2
- A.CONTROLLING-AUTHORITY: 2
- A.KEY-ESCROW: 1
- A.MOBILE-: 1
- A.MOBILE-OPERATOR: 3
- A.OTA-ADMIN: 3
- A.PERSONALIZER: 1
- A.PRODUCTION: 1
- A.VERIFICA: 1
- A.VERIFICATION: 3
- A.VERIFICATION-: 2
- A.VERIFICATION-AUTHORITY: 1
- D:
- D.API_DATA: 3
- D.APP_CODE: 7
- D.APP_C_DATA: 5
- D.APP_I_DATA: 6
- D.APP_KEYS: 1
- D.APSD_KEYS: 3
- D.CARD_MNGT_DATA: 3
- D.CASD_KEYS: 3
- D.CRYPTO: 4
- D.GASD_KEYS: 2
- D.GP_CODE: 1
- D.ISD_KEYS: 3
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.OPTIONAL_PF_SERVICE: 2
- D.PIN: 2
- D.SEC_DATA: 7
- D.VASD_KEYS: 2
- O:
- O.ALARM: 11
- O.APPLET: 16
- O.APPLI-AUTH: 8
- O.CARD-: 1
- O.CARD-MANAGEMENT: 25
- O.CIPHER: 10
- O.CODE_PKG: 14
- O.COMM_AUTH: 6
- O.COMM_CONFIDENT: 1
- O.COMM_CONFIDENTIALITY: 4
- O.COMM_INTEGRITY: 8
- O.DELETION: 4
- O.DOMAIN-RIGHTS: 7
- O.FIREWALL: 15
- O.GLOBAL_: 2
- O.GLOBAL_ARRAYS_CONFID: 4
- O.GLOBAL_ARRAYS_INTEG: 7
- O.INSTALL: 7
- O.JAVAOBJECT: 38
- O.KEY-: 1
- O.KEY-MNGT: 5
- O.LOAD: 9
- O.NATIVE: 7
- O.OBJ-DELETION: 7
- O.OPERATE: 19
- O.PIN-: 1
- O.PIN-MNGT: 8
- O.REALLOCATION: 5
- O.REMOTE_SERVICE_A: 2
- O.REMOTE_SERVICE_ACTIV: 1
- O.REMOTE_SERVICE_ACTIVATION: 5
- O.REMOTE_SERVICE_AUDIT: 7
- O.RESOURCES: 8
- O.RND: 11
- O.SCP: 20
- O.SCP-SUPPORT: 19
- O.SID: 9
- O.TRANSACTION: 5
- OE:
- OE.ACTIVATION-KEY-: 1
- OE.ACTIVATION-KEY-ESCROW: 2
- OE.AID-: 1
- OE.AID-MANAGEMENT: 3
- OE.AP: 1
- OE.AP-KEYS: 4
- OE.APPLET: 7
- OE.APPS-: 1
- OE.APPS-PROVIDER: 4
- OE.BASIC-: 2
- OE.BASIC-APPS-: 3
- OE.BASIC-APPS-VALIDATION: 9
- OE.CA: 1
- OE.CA-KEYS: 5
- OE.CODE-: 1
- OE.CODE-EVIDENCE: 10
- OE.CONTROLLING-: 2
- OE.CONTROLLING-AUTHORITY: 1
- OE.CONTROLLINGAUTHORITY: 1
- OE.GEMACTIVATE-ADMIN: 5
- OE.KEY: 1
- OE.KEY-: 2
- OE.KEY-CHANGE: 5
- OE.KEY-ESCROW: 4
- OE.KEY-GENERATION: 2
- OE.MOBILE-: 1
- OE.MOBILE-OPERATOR: 4
- OE.OPERATOR-: 1
- OE.OPERATOR-KEYS: 3
- OE.OTA-: 2
- OE.OTA-ADMIN: 3
- OE.OTA-LOADING: 3
- OE.OTA-SERVERS: 3
- OE.PERSONALIZER: 4
- OE.PRODUCTION: 5
- OE.QUOTAS: 5
- OE.SECURE-APPS-: 2
- OE.SECURE-APPS-CERTIFICATION: 1
- OE.SECURITY-: 1
- OE.SECURITY-DOMAINS: 2
- OE.SHARE-: 1
- OE.SHARE-CONTROL: 3
- OE.TRUSTED-APPS-: 3
- OE.TRUSTED-APPS-DEVELOPER: 2
- OE.TRUSTED-APPS_PRE-: 3
- OE.TRUSTED-APPS_PRE-ISSUANCE-LOADING: 1
- OE.VA: 1
- OE.VA-KEYS: 4
- OE.VERIFICATION: 20
- OE.VERIFICATION-: 1
- OE.VERIFICATION-AUTHORITY: 2
- OE.VERIFICATIONAUTHORITY: 1
- OP:
- OP.ARRAY_ACCESS: 4
- OP.CREATE: 7
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.INSTANCE_FIELD: 4
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 5
- OP.PUT: 6
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- OSP.ACTIVATION-KEY-: 1
- OSP.ACTIVATION-KEY-ESCROW: 2
- OSP.AID-: 1
- OSP.AID-MANAGEMENT: 1
- OSP.APSD-KEYS: 3
- OSP.BASIC-APPS-: 1
- OSP.BASIC-APPS-VALIDATION: 1
- OSP.CASD-KEYS: 2
- OSP.KEY-: 2
- OSP.KEY-CHANGE: 2
- OSP.KEY-ESCROW: 4
- OSP.KEY-GENERATION: 2
- OSP.OPERATOR-: 1
- OSP.OPERATOR-KEYS: 1
- OSP.OTA-LOADING: 3
- OSP.OTA-SERVERS: 2
- OSP.PERSONALIZER: 3
- OSP.PRODUCTION: 6
- OSP.QUOTAS: 2
- OSP.RNG: 5
- OSP.SECURE-APPS-: 1
- OSP.SECURE-APPS-CERTIFICATION: 2
- OSP.SECURITY-: 1
- OSP.SECURITY-DOMAINS: 2
- OSP.SERVICE_AUDIT: 4
- OSP.SHARE-: 1
- OSP.SHARE-CONTROL: 2
- OSP.TRUSTED-APPS-: 1
- OSP.TRUSTED-APPS-DEVELOPER: 3
- OSP.TRUSTED-APPS_PRE-: 1
- OSP.TRUSTED-APPS_PRE-ISSUANCE-: 1
- OSP.TRUSTED-APPS_PRE-ISSUANCE-LOADING: 1
- OSP.VASD-KEYS: 3
- OSP.VERIFICATION: 2
- R:
- T:
- T.COM_EXPLOIT: 3
- T.CONFID-APPLI-: 1
- T.CONFID-APPLI-DATA: 3
- T.CONFID-JCS-: 2
- T.CONFID-JCS-CODE: 2
- T.CONFID-JCS-DATA: 1
- T.DELETION: 3
- T.EXE-CODE: 7
- T.INSTALL: 2
- T.INTEG-APPLI-: 4
- T.INTEG-APPLI-CODE: 3
- T.INTEG-APPLI-DATA: 5
- T.INTEG-JCS-: 1
- T.INTEG-JCS-CODE: 1
- T.INTEG-JCS-DATA: 3
- T.INTEG-USER-DATA: 2
- T.LIFE_CYCLE: 3
- T.NATIVE: 3
- T.OBJ-DELETION: 3
- T.PHYSICAL: 6
- T.RESOURCES: 2
- T.RND: 1
- T.SID: 8
- T.TOE_CLONING: 2
- T.TOE_IMPERSONATION: 3
- T.UNAUTHORIZED_ACCE: 1
- T.UNAUTHORIZED_ACCESS: 2
- T.UNAUTHORIZED_ACCESS_TO_SERVICE: 1
- T.UNAUTHORIZED_CARD_M: 1
- T.UNAUTHORIZED_CARD_MNGT: 1
- T.UNAUTHORIZED_TOE_: 2
- T.UNAUTHORIZED_TOE_CODE_UPDATE: 2
- T.UNAUTHORIZED_TOE_CODE_UPDATE_BLOCK: 1
|
pdf_data/st_keywords/vendor |
|
- Gemalto:
- NXP:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
- MAC:
- CBC-MAC: 1
- CMAC: 3
- HMAC: 13
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
- SHA224: 5
- SHA256: 6
- SHA384: 6
- SHA512: 6
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 1
- Key agreement: 1
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_PSK_WITH_3DES_EDE_CBC_SHA: 1
- TLS_PSK_WITH_AES_128_CBC_SHA: 1
- TLS_PSK_WITH_NULL_SHA: 1
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 4
- fault induction: 2
- malfunction: 7
- physical tampering: 3
- SCA:
- DPA: 1
- Leak-Inherent: 3
- Physical Probing: 2
- physical probing: 4
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- NIST:
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- FIPS 140-2: 1
- FIPS 180-3: 5
- FIPS PUB 186-2: 1
- FIPS PUB 197: 4
- FIPS PUB 46-3: 4
- FIPS PUB 81: 2
- ISO:
- ISO/IEC 10116: 4
- ISO/IEC 3309: 2
- ISO/IEC 9796-2: 1
- ISO/IEC 9797-1: 4
- NIST:
- PKCS:
- PKCS #1: 2
- PKCS#1: 9
- PKCS#5: 8
- RFC:
- RFC2409: 3
- RFC4279: 1
- RFC4785: 1
- SCP:
- SCP02: 6
- SCP03: 5
- SCP80: 8
- SCP81: 4
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
- ALG:
- AES:
- ALG_AES_BLOCK_128_CBC_NOPAD: 1
- ALG_AES_BLOCK_128_ECB_NOPAD: 1
- ALG_AES_CBC_ISO9797_M1: 1
- ALG_AES_CBC_ISO9797_M2: 1
- ALG_AES_CBC_PKCS5: 1
- ALG_AES_ECB_ISO9797_M1: 1
- ALG_AES_ECB_ISO9797_M2: 1
- ALG_AES_ECB_PKCS5: 1
- ALG_AES_MAC_128_NOPAD: 1
- ALG_AES_MAC_192_NOPAD: 1
- ALG_AES_MAC_256_NOPAD: 1
- DES:
- ALG_DES_CBC_ISO9797_M1: 1
- ALG_DES_CBC_ISO9797_M2: 1
- ALG_DES_CBC_NOPAD: 1
- ALG_DES_CBC_PKCS5: 1
- ALG_DES_ECB_ISO9797_M1: 1
- ALG_DES_ECB_ISO9797_M2: 1
- ALG_DES_ECB_NOPAD: 1
- ALG_DES_ECB_PKCS5: 1
- ALG_DES_MAC4_ISO9797_1_M2_ALG3: 1
- ALG_DES_MAC4_ISO9797_M1: 1
- ALG_DES_MAC4_ISO9797_M2: 1
- ALG_DES_MAC4_NOPAD: 1
- ALG_DES_MAC4_PKCS5: 1
- ALG_DES_MAC8_ISO9797_1_M2_ALG3: 1
- ALG_DES_MAC8_ISO9797_M1: 1
- ALG_DES_MAC8_ISO9797_M2: 1
- ALG_DES_MAC8_NOPAD: 1
- ALG_DES_MAC8_PKCS5: 1
- ECDSA:
- ALG_ECDSA_SHA: 1
- ALG_ECDSA_SHA_224: 1
- ALG_ECDSA_SHA_256: 1
- ALG_ECDSA_SHA_384: 1
- ALG_ECDSA_SHA_512: 1
- HMAC:
- ALG_HMAC_MD5: 1
- ALG_HMAC_SHA1: 1
- ALG_HMAC_SHA_256: 1
- ALG_HMAC_SHA_384: 1
- ALG_HMAC_SHA_512: 1
- ISO3309:
- ALG_ISO3309_CRC16: 1
- ALG_ISO3309_CRC32: 1
- MD:
- RSA:
- ALG_RSA_MD5_PKCS1: 1
- ALG_RSA_MD5_PKCS1_PSS: 1
- ALG_RSA_MD5_RFC2409: 1
- ALG_RSA_NOPAD: 1
- ALG_RSA_PKCS1_OAEP: 1
- ALG_RSA_SHA_224_PKCS1: 1
- ALG_RSA_SHA_224_PKCS1_PSS: 1
- ALG_RSA_SHA_256_PKCS1: 1
- ALG_RSA_SHA_256_PKCS1_PSS: 1
- ALG_RSA_SHA_384_PKCS1: 1
- ALG_RSA_SHA_384_PKCS1_PSS: 1
- ALG_RSA_SHA_512_PKCS1: 1
- ALG_RSA_SHA_512_PKCS1_PSS: 1
- ALG_RSA_SHA_ISO9796: 1
- ALG_RSA_SHA_PKCS1: 1
- ALG_RSA_SHA_PKCS1_PSS: 1
- ALG_RSA_SHA_RFC2409: 1
- SHA:
- ALG_SHA_224: 1
- ALG_SHA_256: 1
- ALG_SHA_384: 1
- ALG_SHA_512: 1
- misc:
|
pdf_data/st_keywords/javacard_packages |
|
- javacard:
- javacard.framework: 2
- javacard.security: 5
- javacardx:
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- parameters for cryptographic operations, the use of these other values are not advised; and clearly out of scope of the TOE. See [AGD] for details. JCS.RNG This security function provides random value using a: 1
|
pdf_data/st_metadata |
- /Author: RICOH
- /CreationDate: D:20210528093716+09'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20210528093716+09'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Title: RICOH Pro C5310S/C5300S Security Target
- pdf_file_size_bytes: 1275021
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 91
|
- /Author: mbruyere
- /CreationDate: D:20160519142646+02'00'
- /Creator: Microsoft® Word 2013
- /ModDate: D:20160519142646+02'00'
- /Producer: Microsoft® Word 2013
- pdf_file_size_bytes: 3765581
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 130
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |