Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
bizhub C352P / ineo+ 351P / magicolor 8460CK Control Software 9J06-0100-GM0-11-000
JISEC-CC-CRP-C0104
Digital Tachograph EFAS-4.10 V05.00
BSI-DSZ-CC-1117-2019
name bizhub C352P / ineo+ 351P / magicolor 8460CK Control Software 9J06-0100-GM0-11-000 Digital Tachograph EFAS-4.10 V05.00
scheme JP DE
not_valid_after 07.10.2013 25.09.2024
not_valid_before 27.06.2007 25.09.2019
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1117c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0104_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1117a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0104_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1117b_pdf.pdf
manufacturer Konica Minolta Business Technologies, Inc intellic GmbH
manufacturer_web https://www.konicaminolta.com/ https://www.intellic.eu
security_level EAL3 EAL4+, ATE_DPT.2, AVA_VAN.5
dgst 3533def3f2fee8a3 9bdc769a307beb62
heuristics/cert_id JISEC-CC-CRP-C0104 BSI-DSZ-CC-1117-2019
heuristics/cert_lab [] BSI
heuristics/extracted_sars ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_TSS.1, ASE_SPD.1, ATE_DPT.2, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 11, 000, 0100 4.10, 05.00
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-1055-2018
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0727-2011, BSI-DSZ-CC-1055-2018, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0980-2017, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-V3-2018, BSI-DSZ-CC-0606-2010, BSI-DSZ-CC-0726-2012, BSI-DSZ-CC-0891-V2-2016
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0104
  • certification_date: 01.06.2007
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 2.3
    • cert_link: https://www.ipa.go.jp/en/security/c0104_eimg.pdf
    • description: PRODUCT DESCRIPTION This product is the embedded software that is installed on the Konica Minolta Business Technologies, Inc. network printer ( bizhub C352P / ineo+ 351P / magicolor 8460CK )( Hereinafter referred to as “ printer ” ) . This software is on the flash memory on the printer controller carried in printer, and this controls the whole operation of printer such as the operation control processing and the image data management received from the panel of printer body or the network. This product offers the protection from exposure of the highly confidential document stored in the printer, and aims at protecting the data which may be exposed against a user's intention. In order to realize it, this offers the functions such as the function that limits the operation to the specific document only to the authorized user, the function that performs the overwrite deletion of the data domain which became unnecessary and the function that deletes the confidential information including a setting value. Moreover , this has the mechanism using the unauthorized access protection function (HDD Lock Function) with which HDD is equipped against the risk of taking out HDD (option part) unjustly which is a medium for storing image data in printer. If the encryption board, an option product, is installed in the printer controller, this provides the function of generating the encryption key that encrypts all data including image data written to the HDD.
    • evaluation_facility: Mizuho Information & Research Institute, Inc.Center for Evaluation of Information Security
    • product: bizhub C352P / ineo+ 351P / magicolor 8460CK Control Software
    • product_type: IT Product (data protection function in printer systems)
    • report_link: https://www.ipa.go.jp/en/security/c0104_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0104_est.pdf
    • toe_version: 9J06-0100-GM0-11-000
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.10.2013
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub C352P / ineo+ 351P / magicolor 8460CK Control Software 9J06-0100-GM0-11-000
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0104_it6080.html
  • toe_overseas_name: bizhub C352P / ineo+ 351P / magicolor 8460CK Control Software 9J06-0100-GM0-11-000
heuristics/protection_profiles {} 40651f75a5887085
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0094b_pdf.pdf
pdf_data/cert_filename 1117c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1117-2019: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0094-2017: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL 5: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
  • ATE:
    • ATE_DPT.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20191017115054+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, "
  • /ModDate: D:20191017122955+02'00'
  • /Producer: LibreOffice 6.2
  • /Subject: Certificate Digital Tachograph EFAS-4.10 V05.00
  • /Title: Certificate BSI-DSZ-CC-1117-2019
  • pdf_file_size_bytes: 294127
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename c0104_erpt.pdf 1117a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ATE_DPT.2 und AVA_VAN.5
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-1117-2019
    • cert_item: Digital Tachograph EFAS-4.10 V05.00
    • cert_lab: BSI
    • developer: Intellic GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Digital Tachograph - Vehicle Unit (VU PP) Version 1.0, 9 May 2017, BSI-CC-PP-0094-2017
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0104-01: 1
    • Certification No. C0104: 1
  • DE:
    • BSI-DSZ-CC-1055-2018: 3
    • BSI-DSZ-CC-1117-2019: 14
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0094-2017: 1
    • BSI-CC-PP-0094-2017: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 2
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 2+: 1
    • EAL 4: 5
    • EAL 4 augmented: 3
    • EAL 5: 4
    • EAL 5+: 1
    • EAL 6: 1
    • EAL6: 1
    • EAL6 augmented: 1
    • EAL6+: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR: 3
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_DPT.2: 4
  • AVA:
    • AVA_VAN.5: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVICE: 1
    • A.SETTING: 1
  • T:
    • T.ACCESS: 1
    • T.ACCESS-BOX: 1
    • T.ACCESS-NET: 1
    • T.ACCESS-SECURE-PRINT: 1
    • T.BRING-OUT: 1
    • T.DISCARD-PRINTER: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 1
    • Infineon Technologies AG: 1
pdf_data/report_keywords/eval_facility
  • SRC:
    • SRC Security Research & Consulting: 2
  • TUV:
    • TÜV Informationstechnik: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CMAC: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/report_keywords/cipher_mode
  • ECB:
    • ECB: 1
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 6
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • FIPS:
    • FIPS 180-1: 1
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
  • BSI:
    • AIS 20: 1
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 1
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 1
    • AIS 36: 3
    • AIS 38: 1
    • AIS 40: 1
    • AIS 46: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • panel of Printer body or the network. This TOE offers the protection from exposure of the highly confidential document stored in the Printer, and aims at protecting the data which may be exposed against a user’s: 1
  • ConfidentialDocument:
    • 08.2019, intellic Germany GmbH [7] Evaluation Technical Report, Version 1.1, 20.09.2019, SRC GmbH, (confidential document) [8] Digital Tachograph - Vehicle Unit (VU PP) Version 1.0, 9 May 2017, BSI-CC-PP- 0094-2017 [9: 1
    • COMP) - M7892 G12 and D11- BSI-DSZ-CC-0891-V3, TÜV Informationstechnik GmbH, Version 1, 2017-11-29 (confidential document) 21 / 25 Certification Report BSI-DSZ-CC-1117-2019 C. Excerpts from the Criteria For the meaning: 1
    • Version 04, Approved, 02.09.2019 file name: 1250-111-SEC-DE04_APPR_Konfigurationsliste.docx (confidential document) [12] Bedienungsanleitung Smart Tachograph EFAS-4.10, INTELLIC, Version 01, 2019, file name: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
pdf_data/report_metadata
  • /CreationDate: D:20070906134713+09'00'
  • /ModDate: D:20070906134713+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 338872
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 31
pdf_data/st_filename c0104_est.pdf 1117b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1117: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0094-2017: 3
    • BSI-CC-PP-0094: 1
    • BSI-CC-PP-0094-: 1
    • BSI-CC-PP-0094-2017: 8
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 6
    • EAL4: 1
  • EAL:
    • EAL 6: 2
    • EAL 6 augmented: 2
    • EAL4: 16
    • EAL4 augmented: 6
    • EAL6: 1
    • EAL6 augmented: 1
    • EAL6+: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.3: 2
    • ACM_SCP.1: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.2: 2
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.1: 2
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 3
    • ADV_FSP.4: 2
    • ADV_IMP.1: 2
    • ADV_TDS.3: 3
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 2
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 9
    • ATE_FUN.1: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM: 4
    • FCS_CKM.1: 8
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_COP: 2
    • FCS_COP.1: 6
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 6
    • FDP_ACC.1: 34
    • FDP_ACC.1.1: 3
    • FDP_ACF: 3
    • FDP_ACF.1: 42
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_ITC.1: 2
    • FDP_RIP.1: 1
  • FIA:
    • FIA_AFL.1: 62
    • FIA_AFL.1.1: 7
    • FIA_AFL.1.2: 7
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_NEW.1: 12
    • FIA_NEW.1.1: 1
    • FIA_NEW.1.2: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 47
    • FIA_SOS.1.1: 5
    • FIA_SOS.2: 10
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU: 9
    • FIA_UAU.1: 13
    • FIA_UAU.2: 64
    • FIA_UAU.2.1: 5
    • FIA_UAU.6: 10
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 15
    • FIA_UAU.7.1: 2
    • FIA_UID: 11
    • FIA_UID.1: 13
    • FIA_UID.2: 34
    • FIA_UID.2.1: 4
    • FIA_USB.1: 8
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_CKM.1: 1
    • FMT_MOF.1: 69
    • FMT_MOF.1.1: 3
    • FMT_MSA: 9
    • FMT_MSA.2: 2
    • FMT_MSA.3: 12
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 81
    • FMT_MTD.1.1: 6
    • FMT_SMF: 18
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 51
    • FMT_SMR.1.1: 3
    • FMT_SMR.1.2: 3
  • FPT:
    • FPT_RVM.1: 17
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 13
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FAU:
    • FAU_GEN.1: 23
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 7
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAS.1: 1
    • FAU_STG.1: 15
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FCO:
    • FCO_NRO.1: 9
    • FCO_NRO.1.1: 1
    • FCO_NRO.1.2: 1
    • FCO_NRO.1.3: 1
  • FCS:
    • FCS_CKM: 21
    • FCS_CKM.1: 53
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 20
    • FCS_CKM.2.1: 2
    • FCS_CKM.4: 46
    • FCS_CKM.4.1: 2
    • FCS_COP: 29
    • FCS_COP.1: 79
    • FCS_COP.1.1: 6
    • FCS_RNG: 4
    • FCS_RNG.1: 29
    • FCS_RNG.1.1: 4
    • FCS_RNG.1.2: 4
  • FDP:
    • FDP_ACC: 12
    • FDP_ACC.1: 82
    • FDP_ACC.1.1: 5
    • FDP_ACF: 11
    • FDP_ACF.1: 67
    • FDP_ACF.1.1: 10
    • FDP_ACF.1.2: 5
    • FDP_ACF.1.3: 5
    • FDP_ACF.1.4: 5
    • FDP_ETC.2: 12
    • FDP_ETC.2.1: 1
    • FDP_ETC.2.2: 1
    • FDP_ETC.2.3: 1
    • FDP_ETC.2.4: 1
    • FDP_IFC.1: 15
    • FDP_ITC: 12
    • FDP_ITC.1: 35
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 49
    • FDP_ITC.2.1: 1
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 1
    • FDP_ITT.1: 10
    • FDP_ITT.1.1: 1
    • FDP_MSA.3: 4
    • FDP_RIP: 1
    • FDP_RIP.1: 17
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 3
    • FDP_SDI.2: 20
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
  • FIA:
    • FIA_AFL.1: 24
    • FIA_AFL.1.1: 5
    • FIA_AFL.1.2: 4
    • FIA_API.1: 1
    • FIA_ATD.1: 15
    • FIA_ATD.1.1: 2
    • FIA_SOS.2: 1
    • FIA_UAU.1: 22
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.2: 10
    • FIA_UAU.2.1: 1
    • FIA_UAU.3: 8
    • FIA_UAU.3.1: 1
    • FIA_UAU.3.2: 1
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 10
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 11
    • FIA_UID.2: 18
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_LIM: 2
    • FMT_LIM.1: 3
    • FMT_LIM.2: 1
    • FMT_MOF.1: 29
    • FMT_MOF.1.1: 5
    • FMT_MSA.1: 29
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 52
    • FMT_MSA.3.1: 5
    • FMT_MSA.3.2: 5
    • FMT_MTD.1: 11
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 31
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 45
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 14
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 1
    • FPT_PHP.2: 9
    • FPT_PHP.2.1: 1
    • FPT_PHP.2.2: 1
    • FPT_PHP.2.3: 2
    • FPT_PHP.3: 12
    • FPT_PHP.3.1: 1
    • FPT_STM.1: 15
    • FPT_STM.1.1: 1
    • FPT_TDC: 8
    • FPT_TDC.1: 24
    • FPT_TDC.1.1: 2
    • FPT_TDC.1.2: 2
    • FPT_TST.1: 12
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_FLT.2: 3
  • FTP:
    • FTP_ITC.1: 27
    • FTP_ITC.1.1: 3
    • FTP_ITC.1.2: 3
    • FTP_ITC.1.3: 3
    • FTP_TRP.1: 5
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SETTING: 1
  • O:
    • O.BOX: 5
    • O.CHECK-HDD: 2
    • O.CONFIG: 9
    • O.CRYPT-KEY: 3
    • O.OVERWRITE-ALL: 2
    • O.SECURE-PRINT: 3
  • OE:
    • OE.CRYPT: 4
    • OE.FEED-BACK: 8
    • OE.LOCK-HDD: 1
  • T:
    • T.ACCESS-BOX: 1
    • T.ACCESS-NET-SETTING: 1
    • T.BACKUP-RESTORE: 1
    • T.DISCARD-PRINTER: 1
  • O:
    • O.AES: 2
    • O.RND: 2
    • O.SHA: 2
    • O.TDES: 2
  • OE:
    • OE.EOL: 4
pdf_data/st_keywords/eval_facility
  • SRC:
    • SRC Security Research & Consulting: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • AES_competition:
    • AES:
      • AES: 57
      • AES-: 1
      • AES-128: 8
      • AES-192: 4
      • AES-256: 4
  • DES:
    • 3DES:
      • TDES: 7
      • Triple-DES: 3
    • DES:
      • DES: 4
  • constructions:
    • MAC:
      • CMAC: 11
      • KMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 18
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 6
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 8
  • SHA:
    • SHA1:
      • SHA-1: 11
    • SHA2:
      • SHA-2: 4
      • SHA-256: 15
      • SHA-384: 9
      • SHA-512: 9
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 6
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RND: 2
    • RNG: 13
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 14
  • ECB:
    • ECB: 1
  • GCM:
    • GCM: 1
pdf_data/st_keywords/ecc_curve
  • Brainpool:
    • brainpoolP256r1: 1
    • brainpoolP384r1: 1
    • brainpoolP512r1: 1
  • NIST:
    • NIST P-256: 1
    • NIST P-384: 1
    • NIST P-521: 1
    • P-256: 1
    • P-384: 1
    • P-521: 1
    • secp256r1: 1
    • secp384r1: 1
    • secp521r1: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • physical tampering: 8
  • SCA:
    • Leak-Inherent: 2
  • other:
    • JIL: 4
    • reverse engineering: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
  • FIPS:
    • FIPS 180-1: 2
    • FIPS PUB 197: 2
  • BSI:
    • AIS36: 3
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 180-1: 3
    • FIPS 180-4: 6
    • FIPS 186-4: 5
    • FIPS 197: 6
    • FIPS PUB 180-4: 1
    • FIPS PUB 197: 1
    • FIPS PUB 46-3: 2
  • ISO:
    • ISO/IEC 7816-2: 1
    • ISO/IEC 7816-3: 1
    • ISO/IEC 7816-4: 1
    • ISO/IEC 7816-6: 1
    • ISO/IEC 7816-8: 1
    • ISO/IEC 9797-1: 1
  • PKCS:
    • PKCS#1: 5
  • RFC:
    • RFC 5480: 1
    • RFC 5639: 1
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • functions that are realized by the TOE. TOE offers the protection from exposure of the highly confidential document stored in the printer. Moreover, TOE can encrypt the image data written in HDD for the danger of: 1
  • OutOfScope:
    • 22 RSA Generated by ERCA; inserted in VU by VU manufacturer at the end of the manufacturing phase Out of scope of this ST Not applicable VU non- volatile memory Card.PK (conditional, possibly multiple) Card: 1
    • 25 ECC Generated by ERCA; inserted in VU by manufacturer at the end of the manufacturing phase Out of scope of this ST Not applicable VU non-volatile memory (conditional; only present if existing at time of: 1
    • 25 ECC Generated by MSCA ; obtained by VU in MSCA_Card certificate during mutual authentication Out of scope of this ST Not applicable VU non-volatile memory (conditional, possibly multiple) MSCA_VU- EGF.PK: 1
    • 25. ECC Generated by ERCA; inserted in VU by manufacturer at the end of the manufacturing phase Out of scope of this ST Not applicable VU non-volatile memory EUR.PK (previous) The previous public key of ERCA: 1
    • 25. ECC Generated by MSCA ; obtained by VU in MSCA_VU-EGF certificate during coupling to an EGF Out of scope of this ST Not applicable VU non-volatile memory (conditional, possibly multiple) Table 23 -: 1
    • C as part of the EUR.Link.C; obtained by VU during mutual authentication towards such card or EGF Out of scope of this ST Not applicable VU general non- volatile memory (conditional; only if the VU has: 1
    • Out of scope: 28
    • SW update credentials AES Derived by the VU from the SeedVu at the end of the manufacturing phase Out of scope for this ST Made unavailable when the VU has reached end of life VU SC non- volatile memory: 2
    • VU personalization AES Generated by the VU manufacturer at the end of the manufacturing phase Out of scope for this ST Not applicable. VU SC non- volatile memory K_Depers Key for de- personalizat ion VU: 1
    • by card or card manufacturer; obtained by VU in card certificate during mutual authentication Out of scope of this ST Not applicable VU non-volatile memory(conditional, possibly multiple) EGF_MA.PK EGF: 1
    • by card or card- Manufacturer; obtained by VU in card certificate during mutual authentication Out of scope of this ST Not applicable VU non- volatile memory MS.PK (conditional, possibly multiple) Public key: 1
    • data stored in the MC flash memory. AES Generated by the VU at the end of the manufacturing phase Out of scope for this ST Not applicable. VU SC non- volatile memory Table 26: Manufacturer specific keys and: 1
    • downloaded data files RSA Generated by VU manufacturer at the end of the manufacturing phase Out of scope of this ST. Made unavailable when the VU has reached end of life VU non- volatile memory EUR.PK: 1
    • downloaded logging data. AES Generated by the VU manufacturer at the end of the manufacturing phase Out of scope for this ST Not applicable. VU SC non- volatile memory K_ErrorLog_ MC ErrorLog: Key for MC data: 1
    • downloaded logging data. ECC Generated by the VU manufacturer at the end of the manufacturing phase Out of scope for this ST Not applicable. VU SC non- volatile memory K_ErrorLog_E nc ErrorLog: Key for download: 1
    • during SW update AES Generated by the VU manufacturer before distribution of a SW update package Out of scope for this ST Made unavailable at the end of the SW update process VU SC non- volatile memory: 2
    • foreign) MSCA; obtained by VU in MS certificate presented by a card during mutual authentication Out of scope of this ST Not applicable VU non- volatile memory Table 20 - First-generation asymmetric keys: 1
    • key generations). However, a VU will retrieve only one of these keys during the pairing process. Out of scope of this ST Made unavailable at the latest by end of calibration phase Not permanently stored; only: 1
    • obtained by VU in EGF certificate during mutual authentication as part of the coupling process Out of scope of this ST Not applicable VU non-volatile memory (conditional, possibly multiple) MSCA_Card.PK: 1
    • of the SW update compatibility header AES Generated by the VU manufacturer once for a product line Out of scope for this ST Made unavailable when the VU has reached end of life VU SC non- volatile memory: 1
    • personalization request AES Derived by the VU from the SeedVu at the end of the manufacturing phase Out of scope for this ST Not applicable. VU SC non- volatile memory KCOMP SW Update: Key for MAC of compatibilit: 1
    • phase. Note: as explained in [5] Annex 1C, Appendix 11, section 12.2, a VU contains only one KM-VU. Out of scope of this ST Made unavailable when the VU has reached end of life VU non- volatile memory KM-WC: 1
    • received from VU manufacturer; inserted by VU manufacturer at the end of the manufacturing phase Out of scope of this ST Made unavailable when the VU has reached end of life VU non- volatile memory K_VUDSRC: 1
    • received from VU manufacturer; inserted by VU manufacturer at the end of the manufacturing phase Out of scope of this ST Made unavailable when the VU has reached end of life VU non- volatile memory Table 24 -: 1
    • stored in the MC memory. AES Generated by the VU manufacturer at the end of the manufacturing phase Out of scope for this ST Not applicable. VU MC non- volatile memory K_DataSe_M AC Data storage: Key VU specific: 1
    • under KM) at the end of the manufacturing phase; obtained and decrypted by VU during pairing Out of scope of this ST Made unavailable at the latest by end of calibration phase Not permanently stored; only: 1
    • used by the VU to ensure AES Generated by the VU at the end of the manufacturing Out of scope for this ST Not applicable. VU SC non- Security Target EFAS-4.10 document number version author: 1
pdf_data/st_metadata
  • /CreationDate: D:20070904142335+09'00'
  • /Creator: クセロPDF v1.14 Rev0495
  • /ModDate: D:20070904142335+09'00'
  • /Producer: Xelo PDF Library
  • pdf_file_size_bytes: 1755408
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 90
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different