name |
EPSON LM-C400/AM-C550/AM-C400 with FAX Ver.1.00 |
STARCOS 3.5 ID EAC+AA C1 |
category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
DE |
status |
active |
archived |
not_valid_after |
19.11.2029 |
01.09.2019 |
not_valid_before |
19.11.2024 |
05.07.2013 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0832_eimg.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0832_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0760a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0832_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0760b_pdf.pdf |
manufacturer |
SEIKO EPSON CORPORATION |
G+D Mobile Security GmbH |
manufacturer_web |
https://www.epson.com/ |
https://www.gi-de.com/de/de/mobile-security/ |
security_level |
EAL2, ALC_FLR.2 |
ALC_DVS.2, AVA_VAN.5, EAL4+ |
dgst |
353b43f9ad2ee96e |
e53e4ba4e8394b4b |
heuristics/cert_id |
JISEC-CC-CRP-C0832 |
BSI-DSZ-CC-0760-2013 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ATE_IND.2, ASE_REQ.2, ASE_CCL.1, ADV_TDS.1, ADV_FSP.2, AGD_PRE.1, ASE_SPD.1, ALC_CMS.2, ALC_CMC.2, ADV_ARC.1, AVA_VAN.2, ATE_FUN.1, ALC_DEL.1, AGD_OPE.1, ASE_TSS.1, ASE_INT.1, ATE_COV.1, ALC_FLR.2, ASE_OBJ.2, ASE_ECD.1 |
ASE_REQ.2, ASE_CCL.1, ADV_FSP.4, AGD_PRE.1, ATE_IND.3, ALC_LCD.2, ALC_TAT.3, ATE_FUN.2, ATE_DPT.1, ALC_CMC.5, ADV_SPM.1, APE_ECD.1, ADV_IMP.1, ALC_DVS.2, ASE_SPD.1, APE_OBJ.2, ADV_ARC.1, ALC_CMS.5, APE_SPD.1, ADV_INT.3, ADV_TDS.3, ASE_TSS.2, APE_REQ.2, ALC_DEL.1, AGD_OPE.1, ATE_COV.3, ALC_FLR.3, APE_INT.1, APE_CCL.1, ASE_INT.1, AVA_VAN.5, ASE_OBJ.2, ASE_ECD.1 |
heuristics/extracted_versions |
1.00 |
3.5 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0761-2013 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0761-2013 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0760-2013, BSI-DSZ-CC-0761-2013 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0761-2013, BSI-DSZ-CC-0760-2013, BSI-DSZ-CC-0813-2012 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0832
- certification_date: 01.11.2024
- claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- enhanced:
- assurance_level: EAL2 Augmented by ALC_FLR.2
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0832
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/s6ckaf000002jdrz-att/c0832_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This TOE is a multifunction peripheral (MFP) that has the functions, such as copy, print, scan, FAX, document storage and retrieval. This TOE provides Security Functions required for "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for MFPs. TOE security functionality The security functions of this TOE are as follows: Identification and Authentication Function Function to identify and authenticate users. Access Control Function for TOE Function Function to restrict available functions for each authorized user. Document Access Control Function Function to allow only the authorized users and the administrator to access to stored documents. Residual Data Overwrite Function Function to overwrite and delete unnecessary document data in the HDD and the Flash ROM. Network Protection Function Function to protect communication data using encryption communication protocols. Security Management Function Function to allow only the administrator to manage security functions. Self-Test Function Function to verify the integrity of executable codes at startup. Audit Log Function Function to record audit logs related to security events and allow only the administrator to view that log.
- evaluation_facility: Information Technology Security Center, Evaluation Department
- expiration_date: 19.11.2029
- product: EPSON LM-C400/AM-C550/AM-C400 with FAX
- product_type: Multifunction Peripheral
- protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/s6ckaf000002jdrz-att/c0832_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/s6ckaf000002jdrz-att/c0832_est.pdf
- toe_version: 1.00
- vendor: SEIKO EPSON CORPORATION
- expiration_date: 01.11.2029
- supplier: SEIKO EPSON CORPORATION
- toe_japan_name: EPSON LM-C400 / AM-C550 / AM-C400 with FAX 1.00
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0832_it4873.html
- toe_overseas_name: EPSON LM-C400 / AM-C550 / AM-C400 with FAX 1.00
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0813-2012 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010 |
heuristics/protection_profiles |
43ce79b420f23a00 |
78bcc246f0f43034 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056b.pdf |
pdf_data/cert_filename |
c0832_eimg.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Information-technology Promotion Agency,Japan
- /CreationDate: D:20250109162218+09'00'
- /Creator: Word 用 Acrobat PDFMaker 17
- /ModDate: D:20250130161540+09'00'
- /Producer: Adobe PDF Library 17.11.238
- /Subject:
- /Title: C0832_Certificate_01
- pdf_file_size_bytes: 234858
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
c0832_erpt.pdf |
0760a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0760-2013
- cert_item: STARCOS 3.5 ID EAC+AA C1
- cert_lab: BSI
- developer: Giesecke & Devrient GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0832-01-2024: 1
|
- DE:
- BSI-DSZ-CC-0760-2013: 24
- BSI-DSZ-CC-0761-2013: 2
- BSI-DSZ-CC-0813-2012: 5
- BSI-DSZ-CC-S-0007-2011: 2
- BSI-DSZ-CC-S-0008-2011: 2
- BSI-DSZ-CC-S-0009-2012: 2
- BSI-DSZ-CC-S-0010-2012: 2
- BSI-DSZ-CC-S-0012-2012: 2
- BSI-DSZ-CC-S-0015-2012: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 4
- EAL2 augmented: 2
|
- EAL:
- EAL 4: 7
- EAL 4 augmented: 3
- EAL 5: 3
- EAL 5+: 1
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 7
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.ADMIN: 2
- A.USER: 1
- T:
- T.CONF: 4
- T.DOC: 4
- T.FUNC: 2
- T.PROT: 2
|
|
pdf_data/report_keywords/vendor |
|
- GD:
- G&D: 2
- Giesecke & Devrient: 23
- Infineon:
- Infineon: 4
- Infineon Technologies: 4
- Infineon Technologies AG: 1
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 4
|
- SRC:
- SRC Security Research & Consulting: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- fault injection: 1
- physical tampering: 1
- SCA:
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 24: 1
- BSI 25: 1
- BSI 7125: 2
- BSI 7148: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
- BSI:
- AIS 20: 1
- AIS 25: 3
- AIS 26: 3
- AIS 31: 1
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 5
- AIS36: 1
- FIPS:
- FIPS 180-2: 1
- FIPS PUB 197: 1
- FIPS PUB 46-3: 1
- ICAO:
- ISO:
- ISO/IEC 14888-3: 1
- ISO/IEC 9797-1: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Report, Version 1.5, 27.06.2013, STARCOS 3.5 ID EAC+AA C1, SRC Security Research & Consulting GmbH (confidential document) [10] Configuration list for the TOE, Version 0.5, 01.08.2012, STARCOS 3.5 ID EAC+AA C1: 1
- Version 2.9, 27.07.2012, STARCOS 3.5 ID EAC+AA C1 Security Target, Giesecke & Devrient GmbH (confidential document) [7] Machine Readable Travel Document with "ICAO Application" Extended Access Control, Version 1.10: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20250109170129+09'00'
- /Creator: Word 用 Acrobat PDFMaker 20
- /ModDate: D:20250130161123+09'00'
- /Producer: Adobe PDF Library 20.5.172
- /Title:
- pdf_file_size_bytes: 438507
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 33
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20130712102207+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, MRTD, EAC, BAC, Reisepass, Extended Access Control, G&D. Giesecke & Devrient"
- /ModDate: D:20130712102611+02'00'
- /Producer: LibreOffice 3.6
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0760-2013
- pdf_file_size_bytes: 1053666
- pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
pdf_data/st_filename |
c0832_est.pdf |
0760b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0055-2009: 1
- BSI-CC-PP-0056-2009: 1
- BSI-PP-0002-2001: 1
- BSI-PP-0035-2007: 1
- BSI-PP-0056: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 3
- EAL 2 augmented: 1
|
- EAL:
- EAL 4: 2
- EAL 5: 2
- EAL4: 8
- EAL4 augmented: 2
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 5
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- APE:
- ATE:
- AVA:
- AVA_VAN.3: 2
- AVA_VAN.5: 7
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 16
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_SAR.1: 11
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_STG.1: 10
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 6
- FAU_STG.4.1: 1
- FDP:
- FDP_ACC.1: 30
- FDP_ACC.1.1: 2
- FDP_ACF.1: 24
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 6
- FDP_ACF.1.4: 2
- FDP_IFC: 1
- FDP_IFC.1: 4
- FDP_IFF: 1
- FDP_RIP.1: 7
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU.1: 15
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UID.1: 24
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 26
- FMT_MSA.1.1: 2
- FMT_MSA.3: 24
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 8
- FMT_MTD.1.1: 2
- FMT_SMF.1: 26
- FMT_SMF.1.1: 1
- FMT_SMR.1: 33
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FDI_EXP: 3
- FPT_FDI_EXP.1: 12
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1: 11
- FPT_STM.1.1: 1
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 8
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 13
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 5
- FAU_SAS.1: 16
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 3
- FCS_CKM.1: 33
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 25
- FCS_CKM.4.1: 1
- FCS_CMK: 1
- FCS_COP: 61
- FCS_COP.1: 9
- FCS_RND: 5
- FCS_RND.1: 14
- FCS_RND.1.1: 2
- FCS_RNG.1: 2
- FDP:
- FDP_ACC.1: 17
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 11
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_IFC.1: 5
- FDP_ITC: 1
- FDP_ITC.1: 12
- FDP_ITC.2: 12
- FDP_ITT.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 1
- FDP_UCT.1: 9
- FDP_UCT.1.1: 1
- FDP_UIT.1: 7
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_API: 13
- FIA_API.1: 11
- FIA_API.1.1: 2
- FIA_SOS.2: 1
- FIA_UAU.1: 7
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 10
- FIA_UAU.4.1: 1
- FIA_UAU.5: 11
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 9
- FIA_UAU.6.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 26
- FMT_LIM.1.1: 3
- FMT_LIM.2: 21
- FMT_LIM.2.1: 4
- FMT_MSA.1: 2
- FMT_MSA.3: 4
- FMT_MTD: 42
- FMT_MTD.1: 25
- FMT_MTD.3: 8
- FMT_MTD.3.1: 1
- FMT_SMF.1: 38
- FMT_SMF.1.1: 1
- FMT_SMR.1: 38
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS: 1
- FPT_FLS.1: 14
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 14
- FPT_PHP.3.1: 1
- FPT_RVM.1: 1
- FPT_SEP.1: 1
- FPT_TST: 1
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 2
- FPT_TST.2: 2
- FRU:
- FTP:
- FTP_ITC.1: 5
- FTP_TRP.1: 5
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.ADMIN: 6
- A.USER: 3
- D:
- D.CONF: 11
- D.DOC: 42
- D.FUNC: 26
- D.PROT: 8
- O:
- O.AUDIT: 5
- O.AUDIT_ACCESS: 4
- O.AUDIT_STORAGE: 4
- O.CONF: 10
- O.DOC: 10
- O.FUNC: 5
- O.INTERFACE: 5
- O.PROT: 5
- O.SOFTWARE: 5
- O.USER: 11
- OE:
- OE.ADMIN: 6
- OE.AUDIT: 3
- OE.AUDIT_ACCESS: 2
- OE.AUDIT_STORAGE: 2
- OE.INTERFACE: 3
- OE.PHISICAL: 1
- OE.PHYSICAL: 2
- OE.USER: 12
- T:
- T.CONF: 6
- T.DOC: 6
- T.FUNC: 3
- T.PROT: 3
|
- O:
- OE:
- OE.BAC-PP: 1
- OE.BAC_PP: 4
- T:
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- JH:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 8
- SHA-256: 5
- SHA-384: 4
- SHA-512: 2
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 4
- P-384: 4
- P-521: 6
- secp256r1: 2
- secp384r1: 2
- secp521r1: 2
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 12
- Physical Tampering: 5
- Physical tampering: 1
- fault injection: 1
- malfunction: 6
- physical tampering: 5
- SCA:
- DPA: 2
- Leak-Inherent: 6
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 10
- EF.DG1: 21
- EF.DG13: 1
- EF.DG14: 8
- EF.DG15: 3
- EF.DG16: 21
- EF.DG2: 9
- EF.DG3: 24
- EF.DG4: 23
- EF.DG5: 7
- EF.SOD: 10
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- AIS 20: 1
- AIS 31: 1
- AIS20: 2
- AIS31: 1
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
- FIPS:
- FIPS 180-2: 2
- FIPS PUB 180-2: 1
- FIPS PUB 186-2: 1
- FIPS PUB 197: 1
- FIPS PUB 46-3: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 4
- ISO/IEC 14888-3: 2
- ISO/IEC 7816-2: 1
- ISO/IEC 7816-4: 1
- ISO/IEC 9796-2: 2
- ISO/IEC14888-3: 1
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /CreationDate: D:20241209132032+09'00'
- /Creator: Microsoft® Word for Microsoft 365
- /MSIP_Label_549229e1-d9eb-40cf-aa20-8039fe5d6144_ContentBits: 2
- /MSIP_Label_549229e1-d9eb-40cf-aa20-8039fe5d6144_Enabled: true
- /MSIP_Label_549229e1-d9eb-40cf-aa20-8039fe5d6144_Method: Standard
- /MSIP_Label_549229e1-d9eb-40cf-aa20-8039fe5d6144_SiteId: 3ce358ea-700e-4f0f-bb37-fd0b7c21366c
- /ModDate: D:20250130161243+09'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 1302442
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 71
|
- /Author: ksz
- /Classification: Public
- /Comments:
- /Company:
- /CreationDate: D:20120726152004+02'00'
- /Creator: Acrobat PDFMaker 9.1 for Word
- /Date: 26.07.2012
- /Keywords: Version 2.9 Status 26.07.2012
- /ModDate: D:20120726152010+02'00'
- /Producer: Acrobat Distiller 9.3.3 (Windows)
- /State: Final
- /Styles: supported
- /Subject: STARCOS 3.5 ID EAC+AA C1
- /TOE_HW: Infineon M7820
- /TOE_Name: STARCOS 3.5 ID EAC+AA C1
- /TemplAuthor: Joern Treger
- /TemplVersion: 1.0
- /Title: Security Target Lite
- /Version: 2.9
- pdf_file_size_bytes: 416941
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 91
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |