name |
EPSON LM-C400/AM-C550/AM-C400 with FAX Ver.1.00 |
Infineon Smart Card IC (Security Controller) SLE66CX322P with RSA 2048/m1484 a24/ m1484a27 and m1484b14 |
category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
DE |
status |
active |
archived |
not_valid_after |
19.11.2029 |
01.09.2019 |
not_valid_before |
19.11.2024 |
01.10.2003 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0832_eimg.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0832_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0223a.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0832_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0223b.pdf |
manufacturer |
SEIKO EPSON CORPORATION |
Infineon Technologies AG |
manufacturer_web |
https://www.epson.com/ |
https://www.infineon.com/ |
security_level |
EAL2, ALC_FLR.2 |
ALC_DVS.2, EAL5+, AVA_MSU.3, AVA_VLA.4 |
dgst |
353b43f9ad2ee96e |
578022056a0633d7 |
heuristics/cert_id |
JISEC-CC-CRP-C0832 |
BSI-DSZ-CC-0223-2003 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
CVE-2021-3011 |
heuristics/extracted_sars |
ADV_ARC.1, ASE_TSS.1, AGD_OPE.1, ALC_CMC.2, ADV_FSP.2, ALC_FLR.2, ASE_REQ.2, AVA_VAN.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_ECD.1, ALC_DEL.1, ADV_TDS.1, ASE_OBJ.2, ALC_CMS.2, ATE_COV.1, ASE_INT.1, ASE_SPD.1, ATE_FUN.1 |
ADV_IMP.2, ASE_OBJ.1, ATE_COV.2, AGD_USR.1, ASE_REQ.1, ASE_TSS.1, AVA_VLA.4, ADV_SPM.3, ADV_INT.1, ASE_DES.1, ADV_RCR.2, ALC_DVS.2, ATE_IND.2, ADV_HLD.3, ASE_PPC.1, AGD_ADM.1, ADV_FSP.3, ATE_DPT.2, ASE_SRE.1, AVA_CCA.1, AVA_MSU.3, ALC_LCD.2, ASE_INT.1, ALC_TAT.2, ATE_FUN.1, ASE_ENV.1, AVA_SOF.1, ADV_LLD.1 |
heuristics/extracted_versions |
1.00 |
2048 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2003/12, BSI-DSZ-CC-0266-2005, ANSSI-CC-2003/14, BSI-DSZ-CC-0242-2004 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0169-2002 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0322-2005, ANSSI-CC-2009/17, BSI-DSZ-CC-0281-2005, BSI-DSZ-CC-0338-2005, BSI-DSZ-CC-0354-2006, BSI-DSZ-CC-0538-2008, BSI-DSZ-CC-0345-2006, BSI-DSZ-CC-0626-2009, BSI-DSZ-CC-0507-2008, BSI-DSZ-CC-0523-2008, BSI-DSZ-CC-0340-2005, BSI-DSZ-CC-0344-2005, BSI-DSZ-CC-0447-2008, BSI-DSZ-CC-0784-2013, ANSSI-CC-2011/79, BSI-DSZ-CC-0648-2010, BSI-DSZ-CC-0572-2008, BSI-DSZ-CC-0665-2010, 2006-1-INF-311, JISEC-CC-CRP-C0229, BSI-DSZ-CC-0593-2009, BSI-DSZ-CC-0407-2008, ANSSI-CC-2011/13, ANSSI-CC-2007/20, BSI-DSZ-CC-0425-2009, BSI-DSZ-CC-0667-2010, BSI-DSZ-CC-0431-2007, BSI-DSZ-CC-0457-2008, BSI-DSZ-CC-0315-2005, BSI-DSZ-CC-0316-2005, BSI-DSZ-CC-0406-2007, BSI-DSZ-CC-0430-2008, ANSSI-CC-2012/09, ANSSI-CC-2006/08, BSI-DSZ-CC-0242-2004, ANSSI-CC-2011/80, BSI-DSZ-CC-0337-2005, ANSSI-CC-2011/10, BSI-DSZ-CC-0401-2006, BSI-DSZ-CC-0668-2010, BSI-DSZ-CC-0628-2009, BSI-DSZ-CC-0470-2008, BSI-DSZ-CC-0629-2010, ANSSI-CC-2010/06, ANSSI-CC-2003/12, BSI-DSZ-CC-0627-2009, BSI-DSZ-CC-0663-2009, ANSSI-CC-2011/16, BSI-DSZ-CC-0498-2009, ANSSI-CC-2005/52, BSI-DSZ-CC-0437-2008, BSI-DSZ-CC-0568-2008, BSI-DSZ-CC-0495-2009, BSI-DSZ-CC-0630-2010, BSI-DSZ-CC-0456-2009, ANSSI-CC-2003/14, BSI-DSZ-CC-0476-2007, BSI-DSZ-CC-0399-2007, BSI-DSZ-CC-0576-2009, BSI-DSZ-CC-0533-2009, BSI-DSZ-CC-0554-2009, BSI-DSZ-CC-0482-2008, BSI-DSZ-CC-0266-2005, ANSSI-CC-2011/12, BSI-DSZ-CC-0528-2008 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0169-2002 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0832
- certification_date: 01.11.2024
- claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- enhanced:
- assurance_level: EAL2 Augmented by ALC_FLR.2
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0832
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/s6ckaf000002jdrz-att/c0832_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This TOE is a multifunction peripheral (MFP) that has the functions, such as copy, print, scan, FAX, document storage and retrieval. This TOE provides Security Functions required for "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for MFPs. TOE security functionality The security functions of this TOE are as follows: Identification and Authentication Function Function to identify and authenticate users. Access Control Function for TOE Function Function to restrict available functions for each authorized user. Document Access Control Function Function to allow only the authorized users and the administrator to access to stored documents. Residual Data Overwrite Function Function to overwrite and delete unnecessary document data in the HDD and the Flash ROM. Network Protection Function Function to protect communication data using encryption communication protocols. Security Management Function Function to allow only the administrator to manage security functions. Self-Test Function Function to verify the integrity of executable codes at startup. Audit Log Function Function to record audit logs related to security events and allow only the administrator to view that log.
- evaluation_facility: Information Technology Security Center, Evaluation Department
- expiration_date: 19.11.2029
- product: EPSON LM-C400/AM-C550/AM-C400 with FAX
- product_type: Multifunction Peripheral
- protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/s6ckaf000002jdrz-att/c0832_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/s6ckaf000002jdrz-att/c0832_est.pdf
- toe_version: 1.00
- vendor: SEIKO EPSON CORPORATION
- expiration_date: 01.11.2029
- supplier: SEIKO EPSON CORPORATION
- toe_japan_name: EPSON LM-C400 / AM-C550 / AM-C400 with FAX 1.00
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0832_it4873.html
- toe_overseas_name: EPSON LM-C400 / AM-C550 / AM-C400 with FAX 1.00
|
|
heuristics/st_references/directly_referenced_by |
{} |
2004-03-INF-71 |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
2004-03-INF-71 |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
43ce79b420f23a00 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf |
{} |
pdf_data/cert_filename |
c0832_eimg.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Information-technology Promotion Agency,Japan
- /CreationDate: D:20250109162218+09'00'
- /Creator: Word 用 Acrobat PDFMaker 17
- /ModDate: D:20250130161540+09'00'
- /Producer: Adobe PDF Library 17.11.238
- /Subject:
- /Title: C0832_Certificate_01
- pdf_file_size_bytes: 234858
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
c0832_erpt.pdf |
0223a.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0223-2003
- cert_item: Infineon Smart Card IC (Security Controller) SLE66CX322P with RSA 2048 / m1484a24, m1484a27 and m1484b14
- cert_lab: BSI
- developer: Infineon Technologies AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0832-01-2024: 1
|
- DE:
- BSI-DSZ-CC-0169-2002: 4
- BSI-DSZ-CC-0223-2003: 26
- NL:
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 4
- EAL2 augmented: 2
|
- EAL:
- EAL 1: 1
- EAL 4: 1
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 9
- EAL5: 10
- EAL5 augmented: 3
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 2
- ACM_CAP: 2
- ACM_CAP.4: 2
- ACM_SCP: 4
- ACM_SCP.3: 2
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 2
- ADO_IGS: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP: 2
- ADV_FSP.3: 1
- ADV_HLD: 2
- ADV_HLD.3: 1
- ADV_IMP: 3
- ADV_IMP.2: 1
- ADV_INT: 2
- ADV_INT.1: 1
- ADV_LLD: 2
- ADV_LLD.1: 1
- ADV_RCR: 2
- ADV_RCR.2: 1
- ADV_SPM: 2
- ADV_SPM.3: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 1
- AGD_USR: 2
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 5
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.2: 2
- ALC_TAT: 2
- ALC_TAT.2: 2
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT: 2
- ATE_DPT.2: 1
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_IND: 2
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 2
- AVA_CCA.1: 1
- AVA_MSU: 2
- AVA_MSU.3: 4
- AVA_SOF: 4
- AVA_SOF.1: 1
- AVA_VLA: 4
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 5
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FCS:
- FCS_CKM.1: 1
- FCS_COP.1: 1
- FCS_RND.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_IFC.1: 1
- FDP_ITT.1: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 1
- FPT:
- FPT_FLS.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FPT_SEP.1: 1
- FPT_TST.2: 1
- FRU:
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.ADMIN: 2
- A.USER: 1
- T:
- T.CONF: 4
- T.DOC: 4
- T.FUNC: 2
- T.PROT: 2
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 16
- Infineon Technologies: 1
- Infineon Technologies AG: 15
- Philips:
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 4
|
- TUV:
- TÜV Informationstechnik: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 1
- malfunction: 1
- physical tampering: 1
- SCA:
- DPA: 5
- Physical Probing: 1
- physical probing: 2
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
- BSI:
- AIS 25: 2
- AIS 26: 3
- AIS 31: 2
- AIS 32: 1
- AIS 36: 4
- ISO:
- ISO/IEC 15408: 1999: 1
- ISO/IEC15408: 1999: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 1.3, 21.05.2003 (confidential document) Certification Report BSI-DSZ-CC-0223-2003 B-28 This page is intentionally left blank: 1
- 13] RSA 2048 bit Support, SLE66CX322P, RSA Interface Specification, Version 02.02, (confidential document) [14] RSA 2048 bit Support, SLE66CX322P, Arithmetic Library, Version 02.02 (confidential document: 1
- AG, Philips Semiconductors [11] SLE66CxxxP, Products and Bondout Errata Sheet, Version 06.03, (confidential document) [12] SLE66CxxxP, Security Controller Family, Confidential Instruction Set, 10.01, (confidential: 1
- Book Version 09.02, (confidential document) [10] Smartcard IC Platform Protection Profile, Version 1.0, Juli 2001, BSI registration ID: 1
- Controller) SLE66CX322P with RSA2048 / m1484b14 and SLE66CX165P with RSA2048 / m1489b14 (confidential document) [9] Infineon Technologies AG, Security and Chipcard ICs, SLE66CxxxP, Security Controller Family: 1
- Management Scope (ACM_SCP), Version 1.b.1, 14.07.2003 (i.e. TOE Configuration List for version b14, confidential document) [30] Infineon Technologies AG, Secure Mobile Solutions, SLE66CX322P / m1484, Impact Analysis: 1
- Scope (ACM_SCP), Version 1.a.1, 14.07.2003 (i.e. TOE Configuration List for versions a24 and a27, confidential document) [29] Infineon Technologies AG, Secure Mobile Solutions, SLE66CX322P with RSA 2048 / m1484: 1
- Security Controller) SLE66CX322P with RSA2048 / m1484b14 and SLE66CX165P with RSA2048 / m1489b14 (confidential document) [28] Infineon Technologies AG, Secure Mobile Solutions, SLE66CX322P with RSA 2048 / m1484: 1
- with RSA2048 / m1484a24 and m1484a27 and SLE66CX165P with RSA2048 / m1489a24 and m1489a27 (confidential document) [8] Evaluation Technical Report, Version 1.1, 21 July 2003, for the Product Smart Card IC: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20250109170129+09'00'
- /Creator: Word 用 Acrobat PDFMaker 20
- /ModDate: D:20250130161123+09'00'
- /Producer: Adobe PDF Library 20.5.172
- /Title:
- pdf_file_size_bytes: 438507
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 33
|
- /Author: BSI
- /CreationDate: D:20031009145406+02'00'
- /Creator: AdobePS5.dll Version 5.2
- /ModDate: D:20031009145527+02'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Title: 0223a.doc
- pdf_file_size_bytes: 323981
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 50
|
pdf_data/st_filename |
c0832_est.pdf |
0223b.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 3
- EAL 2 augmented: 1
|
- EAL:
- EAL 5: 4
- EAL 5 augmented: 4
- EAL5: 4
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 5
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_AUT.1: 2
- ACM_CAP.4: 1
- ACM_SCP: 3
- ACM_SCP.2: 1
- ACM_SCP.3: 4
- ADO:
- ADO_DEL.2: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 5
- ADV_HLD.3: 4
- ADV_IMP.2: 3
- ADV_INT.1: 2
- ADV_LLD.1: 13
- ADV_RCR.2: 3
- ADV_SPM.3: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 3
- ALC_LCD.2: 1
- ALC_TAT.2: 2
- ATE:
- ATE_COV.2: 2
- ATE_DPT.2: 1
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_CCA.1: 2
- AVA_MSU.3: 3
- AVA_SOF: 3
- AVA_SOF.1: 2
- AVA_VLA.4: 4
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 16
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_SAR.1: 11
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_STG.1: 10
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 6
- FAU_STG.4.1: 1
- FDP:
- FDP_ACC.1: 30
- FDP_ACC.1.1: 2
- FDP_ACF.1: 24
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 6
- FDP_ACF.1.4: 2
- FDP_IFC: 1
- FDP_IFC.1: 4
- FDP_IFF: 1
- FDP_RIP.1: 7
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU.1: 15
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UID.1: 24
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 26
- FMT_MSA.1.1: 2
- FMT_MSA.3: 24
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 8
- FMT_MTD.1.1: 2
- FMT_SMF.1: 26
- FMT_SMF.1.1: 1
- FMT_SMR.1: 33
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FDI_EXP: 3
- FPT_FDI_EXP.1: 12
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1: 11
- FPT_STM.1.1: 1
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 8
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 13
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_SAS.1: 7
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 14
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 8
- FCS_COP.1: 18
- FCS_COP.1.1: 3
- FCS_RND: 2
- FCS_RND.1: 4
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC.1: 15
- FDP_ACC.1.1: 1
- FDP_ACF.1: 13
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 5
- FDP_ITC.1: 5
- FDP_ITT.1: 3
- FMT:
- FMT_LIM.1: 4
- FMT_LIM.2: 4
- FMT_MSA.1: 11
- FMT_MSA.1.1: 1
- FMT_MSA.2: 8
- FMT_MSA.3: 12
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SEP.1: 1
- FMT_SMR.1: 6
- FPT:
- FPT_AMT.1: 4
- FPT_FLS.1: 4
- FPT_ITT.1: 3
- FPT_PHP.3: 4
- FPT_SEP.1: 3
- FPT_TST: 2
- FPT_TST.1: 11
- FPT_TST.2: 23
- FPT_TST.2.1: 2
- FRU:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.ADMIN: 6
- A.USER: 3
- D:
- D.CONF: 11
- D.DOC: 42
- D.FUNC: 26
- D.PROT: 8
- O:
- O.AUDIT: 5
- O.AUDIT_ACCESS: 4
- O.AUDIT_STORAGE: 4
- O.CONF: 10
- O.DOC: 10
- O.FUNC: 5
- O.INTERFACE: 5
- O.PROT: 5
- O.SOFTWARE: 5
- O.USER: 11
- OE:
- OE.ADMIN: 6
- OE.AUDIT: 3
- OE.AUDIT_ACCESS: 2
- OE.AUDIT_STORAGE: 2
- OE.INTERFACE: 3
- OE.PHISICAL: 1
- OE.PHYSICAL: 2
- OE.USER: 12
- T:
- T.CONF: 6
- T.DOC: 6
- T.FUNC: 3
- T.PROT: 3
|
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 7
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Malfunction: 8
- malfunction: 1
- SCA:
- DPA: 2
- Leak-Inherent: 10
- Physical Probing: 2
- SPA: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- FIPS:
- ISO:
- ISO/IEC 7816-3: 1
- ISO/IEC 9796-1: 2
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /CreationDate: D:20241209132032+09'00'
- /Creator: Microsoft® Word for Microsoft 365
- /MSIP_Label_549229e1-d9eb-40cf-aa20-8039fe5d6144_ContentBits: 2
- /MSIP_Label_549229e1-d9eb-40cf-aa20-8039fe5d6144_Enabled: true
- /MSIP_Label_549229e1-d9eb-40cf-aa20-8039fe5d6144_Method: Standard
- /MSIP_Label_549229e1-d9eb-40cf-aa20-8039fe5d6144_SiteId: 3ce358ea-700e-4f0f-bb37-fd0b7c21366c
- /ModDate: D:20250130161243+09'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 1302442
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 71
|
- /CreationDate: D:20020506124239
- /ModDate: D:20020705095253+02'00'
- /Producer: Acrobat Distiller 4.0 for Windows
- pdf_file_size_bytes: 168420
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 42
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |