name |
RICOH IM C6000/C5500/C4500 Version: J-1.01 |
CASA 1.0 and CASA 1.1 |
category |
Multi-Function Devices |
Other Devices and Systems |
scheme |
JP |
DE |
status |
archived |
active |
not_valid_after |
27.03.2024 |
01.10.2031 |
not_valid_before |
27.03.2019 |
02.10.2023 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0635_eimg.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0919V3c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0635_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0919V3a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0635_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0919V3b_pdf.pdf |
manufacturer |
Ricoh Company, Ltd. |
EMH metering GmbH & Co. KG |
manufacturer_web |
https://www.ricoh.com/ |
https://emh-metering.de |
security_level |
EAL2+, ALC_FLR.2 |
EAL4+, ALC_FLR.2, AVA_VAN.5 |
dgst |
2fb6a8cc9217ea02 |
8d5dbc2a431f6dc1 |
heuristics/cert_id |
JISEC-CC-CRP-C0635-01-2019 |
BSI-DSZ-CC-0919-V3-2023 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ATE_COV.2, ASE_TSS.1, ASE_INT.1, ATE_FUN.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_ARC.1, AGD_OPE.1, ASE_REQ.2, ASE_CCL.1, ALC_CMC.4, ALC_FLR.2, ADV_IMP.1 |
heuristics/extracted_versions |
1.01 |
1.1, 1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0919-V2-2021, BSI-DSZ-CC-0957-V2-2016 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0919-2019, BSI-DSZ-CC-0845-V2-2013, BSI-DSZ-CC-0845-2012, BSI-DSZ-CC-0957-V2-2016, BSI-DSZ-CC-0978-2016, BSI-DSZ-CC-0919-V2-2021, BSI-DSZ-CC-0666-2012, BSI-DSZ-CC-0957-2015 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0635
- certification_date: 01.03.2019
- claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- enhanced:
- assurance_level: EAL2 Augmented by ALC_FLR.2
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0635
- cert_link: https://www.ipa.go.jp/en/security/c0635_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
- evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
- product: RICOH IM C6000/C5500/C4500
- product_type: Multi Function Product
- protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- report_link: https://www.ipa.go.jp/en/security/c0635_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0635_est.pdf
- toe_version: J-1.01
- vendor: RICOH COMPANY, LTD.
- expiration_date: 01.04.2024
- supplier: RICOH COMPANY, LTD.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0635_it8683.html
- toe_japan_name: RICOH IM C6000/C5500/C4500J-1.01
- toe_overseas_link: None
- toe_overseas_name: -----
|
- category: Intelligent measuring systems
- cert_id: BSI-DSZ-CC-0919-V3-2023
- certification_date: 02.10.2023
- enhanced:
- applicant: EMH metering GmbH & Co.KG Matthias Göbel Neu-Galliner Weg 1 19258 Gallin
- assurance_level: EAL4+,AVA_VAN.5,ALC_FLR.2
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0919V3c_pdf.pdf?__blob=publicationFile&v=2
- certification_date: 02.10.2023
- description: The Target of Evaluation (TOE) is uniquely identified as CASA 1.0. This Smartmeter Gateway is the communication unit used within an intelligent metering system and is represented by the product CASA except for the integrated Security Module and external communication interfaces. The main functionality of the Gateway is the reception and the storage of measured values and status of the connected meters as well as the processing and the transfer of these measurements and status values to authorized entities.
- entries: [frozendict({'id': 'BSI-DSZ-CC-0919-V3-2023-MA-02', 'description': 'Security Target'}), frozendict({'id': 'BSI-DSZ-CC-0919-V3-2023-MA-01', 'description': 'Security Target'}), frozendict({'id': 'BSI-DSZ-CC-0919-V3-2023 (Ausstellungsdatum / Certification Date 02.10.2023 gültig bis / valid until 02.10.2031) Certification Report / Zertifizierungsreport Sicherheitsvorgaben / Security Target Zertifikat / Certificate Das Produkt CASA 1.0 wurde zur Ergänzung einer zweiten Hardware-Plattform, die durch CASA 1.1 (Hardware Version 11 301 / 11 302) gekennzeichnet ist, zur Ausweitung der Konfigurationsrechte des Service Technikers und wegen kleinerer Fehlerkorrekturen geändert. Die Änderungen führten für beide Hardware Plattformen zu einer neuen Software Version 31000000__X026d. Die Hardware Version für CASA 1.0 (10 301 / 10 302 / 10 303 / 10 304) ist unverändert.', 'description': 'The changes led for both hardware platforms to a new Software Version 31000000__X026d. The Hardware Version for CASA 1.0 (10 301 / 10 302 / 10303 / 10304) remains unchanged.'}), frozendict({'id': 'BSI-DSZ-CC-0919-V2-2021-RA-01', 'description': 'Certification Date'}), frozendict({'id': 'BSI-DSZCC-0919-V2-2021-MA-02', 'description': 'Security Target'}), frozendict({'id': 'BSI-DSZ-CC-0919-V2-2021-MA-01', 'description': 'The product CASA 1.0 was changed to improve the implementation representation regarding system stability and connectivity.. Therefore the software version number changed from 30100000__X026e to 30100000__X026f. The changes had no effect on the certified security functionality'}), frozendict({'id': 'BSI-DSZ-CC-0919-V2-2021', 'description': 'The changes led to a new Software Version 30100000__X026e. The Hardware Version (10 301 / 10 302 / 10 303 / 10 304) is still the same.'}), frozendict({'id': 'BSI-DSZ-CC-0919-2019-RA-01', 'description': 'Certification Date 16.12.2021'}), frozendict({'id': 'BSI-DSZ-CC-0919-2019-MA-01', 'description': 'The product CASA 1.0 was changed to correct the tariffing of meter data. Therefore the software version number changed from 30000000__X026b to 30000000__X026c. The changes had no effect on the certified security functionality.'}), frozendict({'id': 'BSI-DSZ-CC-0919-2019', 'description': 'Certificate'})]
- evaluation_facility: TÜV Informationstechnik GmbH
- expiration_date: 01.10.2031
- product: CASA 1.0 and CASA 1.1
- protection_profile: Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI-CC-PP-0073-2014
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0919V3a_pdf.pdf?__blob=publicationFile&v=2
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0919V3b_pdf.pdf?__blob=publicationFile&v=2
- product: CASA 1.0 and CASA 1.1
- subcategory: (Smart Meter Gateway)
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartMeter_Gateway/0919.html
- vendor: EMH metering GmbH & Co.KG
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0957-V2-2016 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0957-V2-2016, BSI-DSZ-CC-0978-2016 |
heuristics/protection_profiles |
43ce79b420f23a00 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf |
{} |
pdf_data/cert_filename |
c0635_eimg.pdf |
0919V3c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0635-01-2019: 1
|
- DE:
- BSI-DSZ-CC-0919-V3-2023: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 2
- EAL 4 augmented: 1
- EAL 5: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20190422140017+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20190422140250+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 167221
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smartmeter Gateway, SMGW, SMart Grid, EMH"
- /Subject: Common Criteria, Certification, Zertifizierung, Smartmeter Gateway, SMGW, SMart Grid, EMH
- /Title: Certification Report BSI-DSZ-CC-0919-V3-2023
- pdf_file_size_bytes: 336982
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0635_erpt.pdf |
0919V3a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.2 and AVA_VAN.5 valid until: 01 October 2031
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0919-V3-2023
- cert_item: CASA 1.0 and CASA 1.1
- cert_lab: BSI
- developer: EMH metering GmbH & Co. KG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI- CC-PP-0073-2014
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0635-01-2019: 1
|
- DE:
- BSI-DSZ-CC-0919-V2-2021: 3
- BSI-DSZ-CC-0919-V3-2023: 14
- BSI-DSZ-CC-0957-V2-2016: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0073-2014: 3
- BSI-CC-PP-0077-V2: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 4
- EAL2 augmented: 2
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 8
- EAL 4 augmented: 3
- EAL 5: 3
- EAL 5+: 1
- EAL 6: 1
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.ADMIN: 2
- A.USER: 1
- T:
- T.CONF: 2
- T.DOC: 2
- T.FUNC: 1
- T.PROT: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 3
- TÜViT: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-03109: 1
- BSI TR-03109-1: 1
- BSI TR-03109-3: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
- BSI:
- AIS 32: 1
- AIS 34: 2
- AIS 38: 1
- AIS 46: 2
- AIS 48: 2
- FIPS:
- FIPS 140-2: 2
- FIPS 180-4: 2
- FIPS 197: 6
- FIPS180-4: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- RFC:
- RFC 2104: 3
- RFC 3394: 3
- RFC 4493: 4
- RFC 5084: 3
- RFC 5289: 2
- RFC 5639: 3
- RFC5289: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- GmbH & Co. KG [7] Evaluation Technical Report, Version 3, 2023-09-26, TÜV Informationstechnik GmbH (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- list for the TOE CASA-Konfigurationsliste, Version 17, 2023-09-14, EMH metering GmbH & Co. KG (confidential document) [10] CASA 1.0 und CASA 1.1 Benutzerhandbuch für Letztverbraucher, Version 1.53, 2023-06-15, EMH: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20190610141722+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20190610143710+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 542098
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 37
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smartmeter Gateway, SMGW, SMart Grid, EMH"
- /Subject: Common Criteria, Certification, Zertifizierung, Smartmeter Gateway, SMGW, SMart Grid, EMH
- /Title: Certification Report BSI-DSZ-CC-0919-V3-2023
- pdf_file_size_bytes: 498412
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 27
|
pdf_data/st_filename |
c0635_est.pdf |
0919V3b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0957-V2-2016: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0073: 1
- BSI-CC-PP-0077-2013: 3
- BSI-CC-PP-0077-V2: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 5
- EAL 4 augmented: 2
- EAL4: 1
- EAL4 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 2
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 6
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 10
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 8
- FAU_SAR.2.1: 1
- FAU_STG.1: 9
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 7
- FCS_COP.1: 10
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 31
- FDP_ACC.1.1: 2
- FDP_ACF.1: 31
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 8
- FDP_ACF.1.4: 3
- FDP_IFC: 1
- FDP_IFC.1: 4
- FDP_IFF: 1
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 14
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 8
- FIA_UAU.7.1: 1
- FIA_UID.1: 18
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 20
- FMT_MSA.1.1: 2
- FMT_MSA.3: 22
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 12
- FMT_MTD.1.1: 1
- FMT_SMF.1: 23
- FMT_SMF.1.1: 1
- FMT_SMR.1: 29
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FDI_EXP: 5
- FPT_FDI_EXP.1: 11
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 9
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 17
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 4
|
- FAU:
- FAU_ARP: 10
- FAU_ARP.1: 1
- FAU_CON.1.2: 1
- FAU_GEN: 37
- FAU_GEN.1: 22
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAA: 11
- FAU_SAA.1: 4
- FAU_SAR: 30
- FAU_SAR.1: 7
- FAU_STG: 32
- FAU_STG.1: 7
- FAU_STG.2: 16
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FAU_STG.3: 3
- FAU_STG.4: 3
- FCO:
- FCO_NRO: 3
- FCO_NRO.1: 1
- FCO_NRO.2: 10
- FCO_NRO.2.1: 1
- FCO_NRO.2.2: 1
- FCO_NRO.2.3: 1
- FCS:
- FCS_CKM: 46
- FCS_CKM.1: 17
- FCS_CKM.2: 6
- FCS_CKM.4: 32
- FCS_CKM.4.1: 1
- FCS_COP: 62
- FCS_COP.1: 11
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 9
- FDP_ACC.2: 11
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 6
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 3
- FDP_IFC: 29
- FDP_IFC.1: 12
- FDP_IFC.2: 4
- FDP_IFF: 25
- FDP_IFF.1: 25
- FDP_IFF.1.3: 1
- FDP_ITC.1: 12
- FDP_ITC.2: 12
- FDP_RIP: 2
- FDP_RIP.1: 1
- FDP_RIP.2: 9
- FDP_RIP.2.1: 1
- FDP_SDI: 2
- FDP_SDI.1: 1
- FDP_SDI.2: 8
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_AFL: 3
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 3
- FIA_ATD.1: 13
- FIA_ATD.1.1: 1
- FIA_UAU: 5
- FIA_UAU.1: 2
- FIA_UAU.2: 9
- FIA_UAU.2.1: 1
- FIA_UAU.5: 7
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 9
- FIA_UAU.6.1: 1
- FIA_UID: 3
- FIA_UID.1: 8
- FIA_UID.2: 12
- FIA_UID.2.1: 1
- FIA_USB: 3
- FIA_USB.1: 8
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 10
- FMT_MOF.1.1: 1
- FMT_MSA: 61
- FMT_MSA.1: 9
- FMT_MSA.3: 12
- FMT_SMF: 2
- FMT_SMF.1: 19
- FMT_SMF.1.1: 1
- FMT_SMR: 3
- FMT_SMR.1: 30
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_CON: 6
- FPR_CON.1: 10
- FPR_CON.1.1: 3
- FPR_CON.1.2: 4
- FPR_PSE: 2
- FPR_PSE.1: 9
- FPR_PSE.1.1: 3
- FPR_PSE.1.2: 2
- FPR_PSE.1.3: 2
- FPT:
- FPT_FLS: 3
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_PHP: 3
- FPT_PHP.1: 9
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_RPL: 3
- FPT_RPL.1: 8
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_SDI.2: 2
- FPT_STM: 3
- FPT_STM.1: 19
- FPT_STM.1.1: 1
- FPT_TST: 3
- FPT_TST.1: 10
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 5
- A.ADMIN: 10
- A.USER: 4
- D:
- O:
- O.AUDIT: 9
- O.CONF: 18
- O.DOC: 18
- O.FUNC: 9
- O.INTERFACE: 9
- O.PROT: 9
- O.SOFTWARE: 9
- O.STORAGE: 14
- O.USER: 21
- OE:
- OE.ADMIN: 8
- OE.AUDIT: 3
- OE.AUDIT_ACCESS: 2
- OE.AUDIT_ACCESS_AUTHORIZED: 1
- OE.AUDIT_STORAGE: 3
- OE.INTERFACE: 4
- OE.PHYSICAL: 4
- OE.USER: 21
- T:
- T.CONF: 10
- T.DOC: 14
- T.FUNC: 7
- T.PROT: 5
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 1
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA2:
- SHA-256: 2
- SHA-384: 1
- SHA-512: 2
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IPsec:
- TLS:
- TLS:
- TLS1.0: 1
- TLS1.1: 1
- TLS1.2: 1
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 3
- brainpoolP384r1: 3
- brainpoolP512r1: 3
- NIST:
- NIST P-256: 3
- NIST P-384: 3
- P-256: 3
- P-384: 3
- ansip384r1: 3
- prime256v1: 3
- secp256r1: 3
- secp384r1: 3
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 3
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- malfunction: 2
- physical tampering: 2
|
pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI TR-03109: 1
- BSI TR-03109-1: 2
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- NIST:
|
- FIPS:
- FIPS 140-2: 4
- FIPS 180-4: 4
- FIPS 197: 6
- RFC:
- RFC 2104: 4
- RFC 2616: 3
- RFC 3394: 4
- RFC 3565: 3
- RFC 4493: 6
- RFC 5084: 6
- RFC 5246: 4
- RFC 5289: 5
- RFC 5639: 7
- RFC 5905: 4
- RFC5246: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: RICOH
- /CreationDate: D:20190322160717+09'00'
- /Creator: Microsoft® Word for Office 365
- /ModDate: D:20190322160717+09'00'
- /Producer: Microsoft® Word for Office 365
- /Title: RICOH IM C6000/C5500/C4500 Security Target
- pdf_file_size_bytes: 1093265
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 85
|
- /Author: EMH metering GmbH & Co. KG
- /Subject:
- /Title: CASA 1.0 and CASA 1.1 Security Target
- pdf_file_size_bytes: 2169093
- pdf_hyperlinks: http://www.jtc1sc27.din.de/sce/sd6
- pdf_is_encrypted: False
- pdf_number_of_pages: 131
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |