| name |
bizhub PRO 1050P zentai seigyo software Overseas: bizhub PRO 1050P control software |
eTugra SAM v1.4 |
| category |
Other Devices and Systems |
Products for Digital Signatures |
| scheme |
JP |
IT |
| status |
archived |
active |
| not_valid_after |
07.10.2013 |
16.04.2029 |
| not_valid_before |
21.02.2005 |
16.04.2024 |
| cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_FP_etugra_sam_14_v1.0_en.pdf |
| report_link |
https://www.commoncriteriaportal.org/files/epfiles/c0021_it4030_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_etugra_sam_14_v1.0_en.pdf |
| st_link |
https://www.commoncriteriaportal.org/files/epfiles/ |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_etugra_sam_14_v10.pdf |
| manufacturer |
Konica Minolta Business Technologies, Inc |
E-Tugra EBG Information Technologies and Services Joint Stock Company |
| manufacturer_web |
|
https://e-tugra.com.tr/ |
| security_level |
EAL3 |
EAL4+, AVA_VAN.5 |
| dgst |
35b4fb97647b2538 |
f4885e7bbdd8eb7d |
| heuristics/cert_id |
JISEC-CC-CRP-C0021 |
OCSI/CERT/CCL/01/2023/RC |
| heuristics/cert_lab |
[] |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
CVE-2022-36997, CVE-2022-36998, CVE-2022-37000, CVE-2022-36996, CVE-2024-52945, CVE-2022-36990, CVE-2022-36984, CVE-2022-36994, CVE-2022-42299, CVE-2022-36987, CVE-2022-36999, CVE-2022-36991, CVE-2022-42303, CVE-2022-42301, CVE-2022-42302, CVE-2022-36992, CVE-2022-36993, CVE-2022-42300, CVE-2022-42304, CVE-2022-36988, CVE-2022-36985, CVE-2022-36989, CVE-2022-42305, CVE-2022-36995, CVE-2022-36986, CVE-2024-33672, CVE-2022-42307, CVE-2023-28759 |
| heuristics/indirect_transitive_cves |
{} |
CVE-2022-36997, CVE-2022-36998, CVE-2022-37000, CVE-2022-36996, CVE-2024-52945, CVE-2022-36990, CVE-2022-36984, CVE-2022-36994, CVE-2022-42299, CVE-2022-36987, CVE-2022-36999, CVE-2022-36991, CVE-2022-42303, CVE-2022-42301, CVE-2022-42302, CVE-2022-36992, CVE-2022-36993, CVE-2022-42300, CVE-2022-42304, CVE-2022-36988, CVE-2022-36985, CVE-2022-36989, CVE-2022-42305, CVE-2022-36995, CVE-2022-36986, CVE-2024-33672, CVE-2022-42307, CVE-2023-28759 |
| heuristics/extracted_sars |
{} |
ADV_TDS.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, ADV_IMP.1, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_DVS.1, ALC_TAT.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ASE_TSS.1, ADV_FSP.4, ADV_ARC.1 |
| heuristics/extracted_versions |
- |
1.4 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
OCSI/CERT/CCL/01/2022/RC |
| heuristics/report_references/directly_referencing |
{} |
OCSI/CERT/CCL/13/2021/RC |
| heuristics/report_references/indirectly_referenced_by |
{} |
OCSI/CERT/CCL/01/2022/RC |
| heuristics/report_references/indirectly_referencing |
{} |
OCSI/CERT/CCL/13/2021/RC |
| heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0021
- certification_date: 01.02.2005
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.1
- cert_link: https://www.ipa.go.jp/en/security/c0021_eimg.pdf
- description: PRODUCT DESCRIPTION This product (it is called "bizhub PRO 1050P control software (*1)", hereafter.) is the software installed with digital MFP (it is called "bizhub PRO 1050P series", hereafter.) manufactured by Konica Minolta Business Technologies, Inc. and for the purpose of reducing the danger to be leaked the document data stored by every user.bizhub PRO 1050P control software prevents the document data from leaking in the function to use printer etc. To protect the document data, this software has "User BOX" function and several control capabilities, additionally high-confidential hard disk drive (HDD) with lock system (*2) to store the document.Bizhub PRO 1050P control software is provided with bizhub PRO 1050P series. (*1) "bizhub PRO 1050P zentai seigyo software" for Japan and "bizhub PRO 1050P control software" are the same product with different calling name. (*2) HDD has the password so that the hard disk cannot be removed and read in another equipment.
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center(JEITA ITSC)
- product: Japan : bizhub PRO 1050P zentai seigyo software Overseas: bizhub PRO 1050P control software
- product_type: IT Product (data protection function in digital MFD)
- report_link: https://www.ipa.go.jp/en/security/c0021_erpt_2.pdf
- target_link: https://www.ipa.go.jp/en/security/c0021_est2.pdf
- toe_version: Image control program(Image control I1):11-0000 Controller control program(IP control P1):10-0000
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.10.2013
- revalidations: [frozendict({'date': '2008-10', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0021_it4030_06.html'})]
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub PRO 1050P control software Image control program(Image control I1):11-0000 Controller control program(IP control P1):10-0000
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0021_it4030.html
- toe_overseas_name: bizhub PRO 1050P/1050eP control software Image control program (Image control I1) : 70-0000 Controller control program (IP control P1) : 31-0000
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
eabbd431e1f174cd |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-cc-pp-2018_02fr_pp.pdf |
| pdf_data/cert_filename |
|
cr_FP_etugra_sam_14_v1.0_en.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
- IT:
- OCSI/CERT/CCL/01/2023/RC: 1
- OCSI/CERT/CCL/13/2021/RC: 1
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
- /Author: Tiziano Inzerilli
- /CreationDate: D:20240419162007+02'00'
- /ModDate: D:20240419162007+02'00'
- /Producer: Microsoft: Print To PDF
- /Title: Certification Report "eTugra SAM v1.4".pdf
- pdf_file_size_bytes: 373181
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
| pdf_data/report_filename |
c0021_it4030_ecvr.pdf |
cr_etugra_sam_14_v1.0_en.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0021: 1
|
- IT:
- OCSI/CERT/CCL/01/2023/RC: 25
- OCSI/CERT/CCL/13/2021/RC: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4+: 4
- EAL2: 4
- EAL4: 10
- EAL4 augmented: 3
- EAL4+: 1
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR: 4
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
- CCLab:
- CCLab Software Laboratory: 5
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ISO:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20050222184150+09'00'
- /ModDate: D:20050222184150+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 16296
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /Author: OCSI
- /CreationDate: D:20240416084741+02'00'
- /Creator: Microsoft® Word per Microsoft 365
- /ModDate: D:20240416084741+02'00'
- /Producer: Microsoft® Word per Microsoft 365
- /Title: Certification Report "eTugra SAM v1.4"
- pdf_file_size_bytes: 656782
- pdf_hyperlinks: https://www.commoncriteriaportal.org/, https://www.sogis.eu/
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
| pdf_data/st_filename |
|
st_etugra_sam_14_v10.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 9
- EAL 4 augmented: 5
|
| pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 1
- AGD_PRE: 2
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FCS:
- FCS_CKM: 25
- FCS_CKM.1: 17
- FCS_CKM.2: 6
- FCS_CKM.4: 29
- FCS_CKM.4.1: 1
- FCS_COP: 26
- FCS_COP.1: 14
- FCS_RNG: 3
- FCS_RNG.1: 11
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 91
- FDP_ACC.1: 43
- FDP_ACF: 60
- FDP_ACF.1: 49
- FDP_ETC: 15
- FDP_ETC.2: 8
- FDP_IFC: 29
- FDP_IFC.1: 24
- FDP_IFF: 15
- FDP_IFF.1: 14
- FDP_ITC: 15
- FDP_ITC.1: 12
- FDP_ITC.2: 22
- FDP_UCT.1: 7
- FDP_UCT.1.1: 1
- FDP_UIT.1: 8
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 11
- FIA_AFL.1: 1
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1: 12
- FIA_ATD.1.1: 1
- FIA_UAU: 15
- FIA_UAU.1: 5
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UAU.5: 4
- FIA_UID.1: 5
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FIA_USB.1: 18
- FIA_USB.1.1: 1
- FIA_USB.1.2: 2
- FIA_USB.1.3: 1
- FIA_UTD.1: 1
- FMT:
- FMT_MSA: 38
- FMT_MSA.1: 10
- FMT_MSA.2: 9
- FMT_MSA.2.1: 1
- FMT_MSA.3: 26
- FMT_MTD.1: 6
- FMT_MTD.1.1: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 10
- FMT_SMR.2: 13
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_PHP.1: 11
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 9
- FPT_PHP.3.1: 1
- FPT_RPL.1: 7
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TDC.1: 14
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TRP: 2
- FTP:
- FTP_ITC: 8
- FTP_ITC.1: 11
- FTP_TDC.1: 2
- FTP_TRP: 24
- FTP_TRP.1: 15
|
| pdf_data/st_keywords/cc_claims |
|
- A:
- A.ACCESS_PROTECTED: 4
- A.AUTH_DATA: 4
- A.CA: 4
- A.PRIVILEGED_USER: 4
- A.SEC_REQ: 4
- A.SIGNER_AUTHENTICATION_DATA_PROTECTION: 4
- A.SIGNER_DEVICE: 4
- A.SIGNER_ENROLMENT: 4
- A.TSP_AUDITED: 4
- OE:
- OE.CA_REQUEST_CERTIFICATE: 4
- OE.CERTIFICATE_VERFICATION: 2
- OE.CERTIFICATE_VERIFICATION: 1
- OE.CRYPTOMODULE_CERTIFIED: 5
- OE.DELEGATED_AUTHENTICATION: 3
- OE.DEVICE: 10
- OE.ENV: 9
- OE.SIGNER_AUTHENTICATION_DATA: 6
- OE.SVD_AUTHENTICITY: 5
- OSP:
- OSP.CRYPTO: 4
- OSP.RANDOM: 5
- OT:
- OT.AUDIT_PROTECTION: 5
- OT.CRYPTO: 6
- OT.DTBSR_INTEGRITY: 4
- OT.PRIVILEGED_USER_AUTHENTICATION: 6
- OT.PRIVILEGED_USER_MANAGEMENT: 19
- OT.PRIVILEGED_USER_PROTECTION: 18
- OT.RANDOM: 20
- OT.REFERENCE_SIGNER_AUTHENTICATION_DATA: 7
- OT.SAD_VERIFICATION: 18
- OT.SAP: 8
- OT.SIGNATURE_AUTHENTICATION_DATA_PROTECTION: 19
- OT.SIGNATURE_INTEGRITY: 18
- OT.SIGNER_KEY_PAIR_GENERATION: 19
- OT.SIGNER_MANAGEMENT: 5
- OT.SIGNER_PROTECTION: 20
- OT.SVD: 4
- OT.SYSTEM_PROTECTION: 19
- R:
- R.AUDIT: 2
- R.RANDOM: 2
- R.SAD: 27
- R.SVD: 42
- R.TSF_DATA: 11
- T:
- T.ADMIN_IMPERSONATION: 8
- T.AUDIT_ALTERATION: 7
- T.AUTHENTICATION_SIGNER_IMPERSONATION: 10
- T.AUTHORISATION_DATA_DISCLOSE: 3
- T.AUTHORISATION_DATA_UPDATE: 10
- T.CONTEXT_ALTERATION: 11
- T.DTBSR_FORGERY: 7
- T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_: 1
- T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCL: 2
- T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCLOSED: 3
- T.ENROLMENT_SIGNER_IMPERSONATION: 10
- T.MAINTENANCE_AUTHENTICATION_DISCLOSE: 6
- T.PRIVILEGED_USER_INSERTION: 10
- T.RANDOM: 9
- T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_: 1
- T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DA: 1
- T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DATA_MODIFICATION: 2
- T.SAD_FORGERY: 6
- T.SAP_BYPASS: 7
- T.SAP_REPLAY: 7
- T.SIGNATURE_FORGERY: 7
- T.SIGNATURE_REQUEST_DISCLOSURE: 7
- T.SIGNER_AUTHENTICATION_DATA_MODIFIED: 6
- T.SVD_FORGERY: 8
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
- CCLab:
- CCLab Software Laboratory: 1
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- MD:
- SHA:
- SHA2:
- SHA-224: 2
- SHA-256: 1
- SHA-384: 2
- SHA224: 2
- SHA256: 7
- SHA384: 3
- SHA512: 5
- SHA3:
- SHA-3: 1
- SHA3-224: 4
- SHA3-256: 3
- SHA3-384: 5
- SHA3-512: 5
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP224r1: 2
- brainpoolP256r1: 2
- brainpoolP256t1: 2
- brainpoolP320r1: 2
- brainpoolP320t1: 2
- brainpoolP384r1: 2
- brainpoolP384t1: 2
- brainpoolP512r1: 2
- brainpoolP512t1: 2
- NIST:
- NIST P-256: 2
- P-256: 2
- P-384: 2
- P-521: 4
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 3
- FIPS:
- FIPS 140-3: 1
- FIPS 186-5: 7
- FIPS 202: 1
- FIPS PUB 140-3: 1
- FIPS PUB 186-5: 1
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 19790: 8
- ISO/IEC 19790:2012: 1
- PKCS:
- RFC:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- used to authenticate the signer are managed by the IdP or mobile application via SSA and are thus out of scope of this ST. 145 [selection: [assignment: the rules describing how delegated authentication is: 1
|
| pdf_data/st_metadata |
|
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
True |
| state/cert/download_ok |
False |
True |
| state/cert/extract_ok |
False |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
False |
True |
| state/st/download_ok |
False |
True |
| state/st/extract_ok |
False |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |