name |
Xerox VersaLink C605X / C505X with Disk OverwriteController ROM Ver. 1.90.3 |
IDMotion V2 Multos Virtual Machine OS Multos V4.5.2, AMD version 0151v001 |
category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
FR |
status |
active |
archived |
not_valid_after |
05.03.2028 |
14.12.2023 |
not_valid_before |
05.03.2023 |
14.12.2018 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0780_eimg.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0780_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_50fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0780_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_50en.pdf |
manufacturer |
Xerox Corporation |
Gemalto / Trusted Labs |
manufacturer_web |
https://www.xerox.com |
https://www.gemalto.com |
security_level |
{} |
EAL7 |
dgst |
2fb410eb35d37a24 |
efb9f87dde709ef7 |
heuristics/cert_id |
JISEC-CC-CRP-C0780-01-2023 |
ANSSI-CC-2018/50 |
heuristics/cert_lab |
[] |
THALES |
heuristics/cpe_matches |
cpe:2.3:h:xerox:versalink_c605:-:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ADV_TAT.3, ALC_LCD.2, ATE_DPT.4, ADV_INT.3, ADV_LCD.2, AVA_VAN.5, ADV_FSP.6, ALC_CMS.1, ALC_DVS.2, ALC_TAT.3, ATE_FUN.2, ADV_ARC.1, ADV_CMC.5, ADV_IMP.2, ALC_CMC.5, ADV_TDS.6, ATE_COV.3, ADV_SPM.1 |
heuristics/extracted_versions |
1.90.3 |
4.5.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2018/35, BSI-DSZ-CC-0945-2017 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2018/35, BSI-DSZ-CC-0945-2017, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0780
- certification_date: 01.03.2023
- claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
- enhanced:
- assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0780
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000qnm-att/c0780_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Device that has the functions such as copy, scan, print, fax. The TOE provides the security functionality required by the protection profile for Multifunction Device, “Protection Profile for Hardcopy Devices 1.0”. TOE security functionality The TOE provides the following security functions: Identification and Authentication Access Control Data Encryption Trusted Communications Security Management Security Auditing Trusted Operation PSTN Fax-Network Separation Overwrite Hard Disk
- evaluation_facility: Information Technology Security Center, Evaluation Department
- product: Xerox VersaLink C605X / C505X with Disk Overwrite
- product_type: Multifunction Device
- protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000qnm-att/c0780_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000qnm-att/c0780_est.pdf
- toe_version: Controller ROM Ver. 1.90.3
- vendor: Xerox Corporation
- expiration_date:
- supplier: Xerox Corporation
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0780_it2823.html
- toe_overseas_name: Xerox VersaLink C605X / C505X with Disk OverwriteController ROM Ver. 1.90.3
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0945-2017 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0945-2017 |
heuristics/protection_profiles |
b2cfec7a92fa2940 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf |
{} |
pdf_data/cert_filename |
c0780_eimg.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0780-01-2023: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20230317120629+09'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20230317120844+09'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 87272
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
c0780_erpt.pdf |
anssi-cc-2018_50fr.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 7
- cc_version: Critères Communs version 3.1 révision 5
- cert_id: ANSSI-CC-2018/50
- cert_item: IDMotion V2 Multos Virtual Machine
- cert_item_version: OS version Multos V4.5.2 AMD version 0151v001
- cert_lab: THALES (TCS – CNES) 290 allée du Lac, 31670 Labège, France
- developer: Gemalto La Vigie, Avenue du jujubier, ZI Athélia IV, BP 90- 13702 La Ciotat Trusted Labs 6, rue de la Verrerie – CS20001, 92197 Meudon Cedex Infineon Technologies AG Am Campeon 1-12, 85579 Neubiberg Commanditaire Gemalto La Vigie, Avenue du jujubier, ZI Athélia IV, BP 90- 13702 La Ciotat
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Néant
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0780-01-2023: 1
|
- DE:
- FR:
- ANSSI-CC-2018/35: 2
- ANSSI-CC-2018/50: 15
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 4
- EAL2: 2
- EAL7: 3
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FCS:
- FCS_RBG_EXT.1: 1
- FCS_TLS_EXT.1.1: 1
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon Technologies AG: 2
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 4
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /CreationDate: D:20230413100458+09'00'
- /Creator: Word 用 Acrobat PDFMaker 17
- /ModDate: D:20230413100550+09'00'
- /Producer: Adobe PDF Library 17.11.238
- /SourceModified: D:20230331031105
- /Title:
- pdf_file_size_bytes: 382909
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 31
|
- /CreationDate: D:20181219113402+01'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.028
- /ModDate: D:20181219115454+01'00'
- /Producer: Microsoft® Word 2010
- /Subject:
- /Title:
- pdf_file_size_bytes: 749242
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
pdf_data/st_filename |
c0780_est.pdf |
anssi-cible-cc-2018_50en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 1
- EAL5: 3
- EAL5+: 1
- EAL7: 6
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_CMC.5: 4
- ADV_FSP.2: 1
- ADV_FSP.6: 3
- ADV_IMP.1: 3
- ADV_IMP.2: 2
- ADV_INT.3: 3
- ADV_LCD.2: 1
- ADV_SPM.1: 5
- ADV_TAT.3: 1
- ADV_TDS.4: 1
- ADV_TDS.6: 3
- ALC:
- ALC_CMC.5: 2
- ALC_CMS.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 5
- ALC_LCD.1: 1
- ALC_LCD.2: 5
- ALC_TAT.3: 5
- ATE:
- ATE_COV.1: 1
- ATE_COV.3: 3
- ATE_DPT.4: 3
- ATE_FUN.1: 2
- ATE_FUN.2: 3
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 13
- FAU_GEN.1: 14
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 4
- FAU_SAR.2.1: 1
- FAU_STG.1: 6
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 5
- FAU_STG.4.1: 1
- FAU_STG_EXT: 2
- FAU_STG_EXT.1: 5
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM.1: 31
- FCS_CKM.1.1: 2
- FCS_CKM.4: 7
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 1
- FCS_CKM_EXT.4: 24
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 87
- FCS_COP.1.1: 8
- FCS_KDF_EXT.1: 5
- FCS_KYC_EXT: 1
- FCS_KYC_EXT.1: 8
- FCS_KYC_EXT.1.1: 3
- FCS_RBG_EXT: 1
- FCS_RBG_EXT.1: 13
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SMC_EXT.1: 5
- FCS_SNI_EXT.1.1: 1
- FCS_SSH_EXT.1: 6
- FCS_TLS_EXT: 1
- FCS_TLS_EXT.1: 16
- FCS_TLS_EXT.1.1: 2
- FDP:
- FDP_ACC.1: 9
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DSK_EXT: 1
- FDP_DSK_EXT.1: 7
- FDP_DSK_EXT.1.1: 2
- FDP_DSK_EXT.1.2: 2
- FDP_FXS_EXT: 1
- FDP_FXS_EXT.1: 7
- FDP_FXS_EXT.1.1: 2
- FDP_RIP.1: 4
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 1
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_PMG: 3
- FIA_PMG_EXT: 1
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.1: 10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 1
- FIA_USB.1: 4
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.3: 6
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 8
- FMT_MTD.1.1: 1
- FMT_SMF: 2
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_KYP_EXT: 1
- FPT_KYP_EXT.1: 7
- FPT_KYP_EXT.1.1: 2
- FPT_SKP_EXT: 1
- FPT_SKP_EXT.1: 6
- FPT_SKP_EXT.1.1: 2
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 7
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 7
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 3
- FTA:
- FTA_SSL.3: 4
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 10
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 10
- FTP_TRP.1.1: 4
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
- FAU:
- FAU_ACC.2: 1
- FAU_ARP: 3
- FAU_ARP.1: 6
- FAU_ARP.1.1: 4
- FAU_GEN.1: 4
- FAU_SAA: 3
- FAU_SAA.1: 10
- FAU_SAA.1.1: 2
- FAU_SAA.1.2: 3
- FAU_SAS.1: 1
- FCS:
- FCS_CKM: 4
- FCS_COP: 5
- FCS_RNG: 4
- FDP:
- FDP_ACC: 5
- FDP_ACC.1: 4
- FDP_ACC.2: 13
- FDP_ACC.2.1: 2
- FDP_ACC.2.2: 1
- FDP_ACF: 4
- FDP_ACF.1: 13
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 1
- FDP_ITT.1: 1
- FDP_ROL: 3
- FDP_ROL.1: 5
- FDP_ROL.1.1: 1
- FDP_ROL.1.2: 1
- FDP_SDC.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 1
- FDP_UCT.1: 1
- FDP_UIT.1: 1
- FIA:
- FMT:
- FMT_LIM: 2
- FMT_LIM.2: 1
- FMT_MSA.1: 3
- FMT_MSA.3: 3
- FMT_SMF.1: 1
- FPT:
- FPT_FLS: 4
- FPT_FLS.1: 12
- FPT_FLS.1.1: 2
- FPT_PHP.3: 1
- FPT_RCV: 3
- FPT_RCV.4: 7
- FPT_RCV.4.1: 1
- FPT_TST.2: 1
- FRU:
- FRU_FLT.2: 1
- FRU_RSA: 3
- FRU_RSA.1: 6
- FRU_RSA.1.1: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- O:
- O.ACCESS: 1
- O.ACCESS_CONTROL: 6
- O.ADMIN_ROLES: 4
- O.AUDIT: 9
- O.COMMS: 1
- O.COMMS_PROTECTION: 11
- O.FAX_NET_SEPARATION: 1
- O.IMAGE_OVERWRITE: 1
- O.KEY_MATERIAL: 1
- O.PURGE_DATA: 2
- O.STORAGE_ENCRYPTION: 6
- O.TSF_SELF_TEST: 1
- O.UPDATE: 1
- O.UPDATE_VERIFICATION: 1
- O.USER_AUTHORIZATION: 7
- OE:
- OE.ADMIN_TRAININ: 1
- OE.ADMIN_TRUST: 1
- OE.NETWORK_PROT: 1
- OE.PHYSICAL_PROTE: 1
- OE.USER_TRAINING: 1
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_A: 1
- T.UNAUTHORIZED_U: 1
|
- A:
- A.APPLI_CONT: 9
- A.CIPHER: 3
- A.CLON: 3
- A.DECIPHER: 3
- A.DIS_MEMORY: 3
- A.LOAD: 3
- A.MOD_MEMORY: 3
- A.OPERATE: 3
- A.REMOVE: 3
- A.SECURITY: 3
- A.SIDE: 3
- A.TAMPER_ES: 3
- O:
- O.AES: 1
- O.APPLI_DEV: 12
- O.CIPHER: 3
- O.CLON: 2
- O.DECIPHER: 4
- O.DEV_DIS_ES: 13
- O.DIS: 1
- O.DIS_MEMORY: 2
- O.DLV_: 7
- O.DLV_AUDIT: 1
- O.DLV_DATA: 6
- O.EFECT_REMOVE: 1
- O.EFFECT_L: 1
- O.EFFECT_LOAD: 5
- O.EFFECT_R: 1
- O.EFFECT_REMOVE: 3
- O.FLAW: 1
- O.INIT_A: 2
- O.INIT_ACS: 7
- O.LOAD: 8
- O.MOD_MEMORY: 1
- O.OPERATE: 1
- O.REMOVE: 6
- O.RESOURCE: 4
- O.RESOURCES: 1
- O.RND: 1
- O.ROLLBACK: 5
- O.SAMPLES_ACS: 1
- O.SAMPLE_ACS: 4
- O.SECURITY: 5
- O.SEGREGATE: 5
- O.SIDE: 6
- O.TAMPER_ES: 17
- O.TEST_OPERA: 1
- OSP:
- OSP.CIPHER: 3
- OSP.CONF-ALU: 3
- T:
- T.APP_CORR: 6
- T.APP_DISC: 7
- T.APP_MOD: 7
- T.APP_READ: 7
- T.APP_REMOVE: 7
- T.CLON: 2
- T.DEL_REMOVE: 7
- T.DIS: 2
- T.DIS_DATA: 14
- T.DIS_TEST_ES: 5
- T.ERR_REMOVE: 6
- T.LOAD_APP: 8
- T.LOAD_MAN: 5
- T.LOAD_MOD: 5
- T.LOAD_OTHER: 5
- T.MOD: 5
- T.MOD_DATA: 7
- T.MOD_EXE: 10
- T.MOD_LOAD: 7
- T.MOD_SHARE: 8
- T.MOD_TSF: 8
- T.RESOURCES: 5
- T.RND: 2
- T.T_CMD: 10
- T.T_ES: 8
- T.T_TOOLS: 5
|
pdf_data/st_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon: 5
- Infineon Technologies: 2
- Thales:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 8
- SHA-384: 4
- SHA-512: 3
- SHA256: 6
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IPsec:
- SSH:
- TLS:
- TLS:
- TLS: 58
- TLS 1.0: 2
- TLS 1.1: 2
- TLS 1.2: 3
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 10
- P-384: 6
- P-521: 6
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 3
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
- TLS_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- malfunction: 1
- SCA:
- Leak-Inherent: 4
- Physical Probing: 2
- physical probing: 1
- side channel: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 180-3: 1
- FIPS PUB 186-4: 7
- FIPS PUB 197: 1
- FIPS PUB 198-1: 1
- ISO:
- ISO/IEC 10116: 4
- ISO/IEC 18031:2011: 3
- ISO/IEC 18033-3: 1
- ISO/IEC 19772: 4
- ISO/IEC18031:2011: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38B: 1
- NIST SP 800-38C: 1
- NIST SP 800-38D: 1
- NIST SP 800-90A: 2
- RFC:
- RFC 2246: 2
- RFC 2818: 3
- RFC 4346: 2
- RFC 5246: 2
- X509:
|
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- ICAO:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 2
- the TOE, the product also contain native applications and native modules used by ICAO application (out of scope of the TOE). Mel applications and native modules Native/MEL application: GMF v1.0 The GMF: 1
- to the context in which the security functions take place. Note that cryptographic primitives are out of scope. Table 16 shows how these security functions satisfy the TOE security functional requirements. 8.1: 1
|
pdf_data/st_metadata |
|
- /CreationDate: D:20181113151704+01'00'
- /Creator: Microsoft® Word 2013
- /Keywords: Security Target, CC, MULTOS, IDMotion, Platform
- /ModDate: D:20181219115510+01'00'
- /Producer: Microsoft® Word 2013
- /Subject:
- /Title:
- pdf_file_size_bytes: 2271251
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 75
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |