Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
AR-FR21 VERSION M.10
JISEC-CC-CRP-C0031
Samsung SDS SPass V1.0
KECS-ISIS-0120-2008
name AR-FR21 VERSION M.10 Samsung SDS SPass V1.0
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP KR
not_valid_after 07.10.2013 01.06.2019
not_valid_before 07.09.2005 24.09.2008
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0031_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20101026101942.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0031_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20090325092515.pdf
manufacturer Sharp Corporation Samsung SDS
manufacturer_web https://sharp-world.com/ https://www.sds.samsung.co.kr
security_level EAL3 AVA_VLA.3, ATE_DPT.2, ADV_IMP.2, EAL4+, ALC_DVS.2
dgst 36325f308cd6b2ab 2634f4726941d5b8
heuristics/cert_id JISEC-CC-CRP-C0031 KECS-ISIS-0120-2008
heuristics/extracted_sars ADV_HLD.2, AGD_USR.1, AVA_VLA.1, ALC_DVS.1, ADV_RCR.1, AVA_MSU.1, ATE_DPT.1, AGD_ADM.1, ADV_FSP.1, ATE_IND.2, ATE_COV.2, AVA_SOF.1, ATE_FUN.1 ADV_HLD.2, ATE_IND.2, ATE_COV.2, ALC_LCD.1, ASE_TSS.1, ASE_ENV.1, ATE_VLA.4, ADV_FSP.2, ADV_SPM.1, ALC_DVS.2, ADV_IMP.2, ATE_DVS.2, ASE_PPC.1, ADV_LLD.1, ADV_RCR.1, ASE_OBJ.1, ASE_REQ.1, AVA_MSU.2, AGD_ADM.1, ASE_SRE.1, ADV_DVS.2, ATE_DPT.2, ASE_INT.1, ATE_FUN.1, AGD_USR.1, ALC_TAT.1, ASE_DES.1, ATE_SOF.1, AVA_VLA.3, AVA_SOF.1
heuristics/extracted_versions 10 1.0
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0031
  • certification_date: 01.09.2005
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cert_link: https://www.ipa.go.jp/en/security/c0031_eimg.pdf
    • description: PRODUCT DESCRIPTION The TOE is a firmware product for a Multi Function Device (hereafter referred as to “MFD”) to reduce the risk that the inside image data be disclosed. The TOE is provided as an upgrade kit for the firmware of the MFD. The TOE offers security functions to counter the threats to image data written into the HDD and the Flash Memory, which are non-volatile mass storage devices inside the MFD. The TOE encrypts image data of the document that each job handles, before the image data are temporarily spooled to the HDD or the Flash Memory when the MFD processes jobs of copy, printer, image-scanning, fax etc., which are the funda-mental functions of the MFD. And when each job is completed, the TOE clears the area occupied by the image data, by over-writing. In addition, the TOE offers encryption and password authentica-tion for image data that a user saves into the HDD to reuse later. By these functions, the TOE secures secrecy of the non-volatile image data in the MFD, and counters unauthorized disclosure.
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: AR-FR21
    • product_type: IT Product ( data protection function in Multi Function Device )
    • report_link: https://www.ipa.go.jp/en/security/c0031_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0031_est.pdf
    • toe_version: VERSION M.10
    • vendor: Sharp Corporation
  • expiration_date: 01.10.2013
  • supplier: Sharp Corporation
  • toe_japan_name: AR-FR21 VERSION M.10
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0031_it5045.html
  • toe_overseas_name: AR-FR21 VERSION M.10
  • category: e-Passport
  • cert_id: KECS-ISIS-0120-2008
  • certification_date: 24.09.2008
  • enhanced:
  • level: EAL4+
  • product: 삼성 SDS SPass V1.0
  • product_link: https://itscc.kr/certprod/view.do?product_id=120&product_class=4
  • vendor: Samsung SDS
pdf_data/report_filename c0031_erpt.pdf 20101026101942.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0031-01: 1
    • Certification No. C0031: 1
  • KR:
    • KECS‐ISIS‐0120‐2008: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL 4+: 1
    • EAL4: 1
    • EAL4+: 3
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 1
    • ACM_CAP.4: 1
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL.1: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.2: 1
    • ADV_HLD.2: 1
    • ADV_IMP.2: 2
    • ADV_LLD.1: 1
    • ADV_RCR.1: 1
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM.1: 1
  • ALC:
    • ALC_DVS.2: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_DES.1: 1
    • ASE_ENV.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_PPC.1: 1
    • ASE_REQ.1: 1
    • ASE_SRE.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_DPT: 2
    • ATE_DPT.2: 1
    • ATE_DVS.2: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
    • ATE_SOF.1: 1
    • ATE_VLA.4: 1
  • AVA:
    • AVA_MSU.2: 1
    • AVA_VLA.4: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.NETWORK: 1
    • A.OPERATOR: 1
    • A.USER: 1
  • T:
    • T.RECOVER: 1
    • T.SHUNT: 1
    • T.SPOOF: 1
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 19
pdf_data/report_keywords/eval_facility
  • KISA:
    • KISA: 1
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 4
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • malfunction: 2
  • SCA:
    • DPA: 1
    • SPA: 1
  • other:
    • reverse engineering: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SSC: 2
pdf_data/report_keywords/ic_data_group
  • EF:
    • EF.COM: 1
    • EF.SOD: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 2
    • CCIMB-99-033: 2
  • ISO:
    • ISO/IEC 15408:1999: 1
  • ICAO:
    • ICAO: 8
  • PKCS:
    • PKCS#3: 1
  • SCP:
    • SCP02: 1
pdf_data/report_keywords/javacard_version
  • GlobalPlatform:
    • Global Platform 2.1.1: 1
pdf_data/report_keywords/javacard_api_const
  • curves:
    • SM2: 2
pdf_data/report_metadata
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20051025135031+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 6.0
  • /Manager: IPA
  • /ModDate: D:20051025135318+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /SourceModified: D:20051025044506
  • /Title: CRP-e
  • pdf_file_size_bytes: 327544
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 27
  • /Author: Administrator
  • /CreationDate: D:20101026094746+09'00'
  • /Creator: PScript5.dll Version 5.2
  • /ModDate: D:20101026094805+09'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /Title: Microsoft Word - 삼성SDS_SPass_V1.0_KECS-ISIS-0120-2008_영문.docx
  • pdf_file_size_bytes: 717299
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 36
pdf_data/st_filename c0031_est.pdf 20090325092515.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 4
  • EAL:
    • EAL 4: 1
    • EAL3: 1
    • EAL4: 37
    • EAL4+: 8
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.3: 3
    • ACM_SCP.1: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 3
  • ADV:
    • ADV_FSP.1: 10
    • ADV_HLD.1: 3
    • ADV_HLD.2: 1
    • ADV_RCR.1: 3
  • AGD:
    • AGD_ADM.1: 6
    • AGD_USR.1: 4
  • ALC:
    • ALC_DVS.1: 3
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 1
    • ATE_FUN.1: 4
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.1: 2
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
  • ACM:
    • ACM_AUT.1: 11
    • ACM_CAP.3: 3
    • ACM_CAP.4: 21
    • ACM_SCP.1: 1
    • ACM_SCP.2: 8
  • ADO:
    • ADO_DEL.2: 10
    • ADO_IGS.1: 9
  • ADV:
    • ADV_DVS.2: 1
    • ADV_FSP.1: 10
    • ADV_FSP.2: 12
    • ADV_HLD.1: 1
    • ADV_HLD.2: 20
    • ADV_IMP.1: 5
    • ADV_IMP.2: 18
    • ADV_LLD.1: 21
    • ADV_RCR.1: 11
    • ADV_SPM.1: 19
  • AGD:
    • AGD_ADM.1: 21
    • AGD_USR.1: 15
  • ALC:
    • ALC_DVS.1: 3
    • ALC_DVS.2: 17
    • ALC_LCD.1: 9
    • ALC_TAT.1: 12
  • ATE:
    • ATE_COV.2: 8
    • ATE_DPT.2: 14
    • ATE_FUN.1: 16
    • ATE_IND.2: 10
  • AVA:
    • AVA_MSU.2: 15
    • AVA_SOF.1: 9
    • AVA_VLA.4: 25
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 13
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 6
    • FCS_COP.1: 15
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ITC.1: 2
    • FDP_RIP.1: 11
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 29
    • FIA_AFL.1.1: 3
    • FIA_AFL.1.2: 3
    • FIA_SOS.1: 30
    • FIA_SOS.1.1: 4
    • FIA_UAU.1: 13
    • FIA_UAU.2: 42
    • FIA_UAU.2.1: 3
    • FIA_UAU.6: 10
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 14
    • FIA_UAU.7.1: 2
    • FIA_UID.1: 15
    • FIA_UID.2: 34
    • FIA_UID.2.1: 3
  • FMT:
    • FMT_MOF.1: 11
    • FMT_MOF.1.1: 1
    • FMT_MSA.2: 7
    • FMT_MTD.1: 35
    • FMT_MTD.1.1: 4
    • FMT_SMF.1: 20
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 43
    • FMT_SMR.1.1: 3
    • FMT_SMR.1.2: 3
  • FPR:
    • FPR_RVM.1: 6
  • FPT:
    • FPT_RVM.1: 16
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 16
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FAU:
    • FAU_ARP.1: 9
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 3
    • FAU_SAA.1: 11
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 8
    • FCS_CKM.4.1: 1
    • FCS_COP: 5
    • FCS_COP.1: 10
    • FCS_COP.1.1: 5
  • FDP:
    • FDP_ACC.1: 6
    • FDP_ACC.2: 7
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF.1: 8
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 4
    • FDP_ITC.1: 4
    • FDP_RIP: 1
    • FDP_RIP.1: 7
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 11
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 9
    • FIA_UAU.4.1: 1
    • FIA_UAU.6: 9
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 14
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 10
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 13
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 1
    • FMT_MTD.2: 8
    • FMT_MTD.2.1: 1
    • FMT_MTD.2.2: 1
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ACC.2: 1
    • FPT_AMT.1: 8
    • FPT_AMT.1.1: 1
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_PHP: 1
    • FPT_PHP.3: 10
    • FPT_PHP.3.1: 1
    • FPT_RCV.2: 1
    • FPT_RCV.3: 8
    • FPT_RCV.3.1: 1
    • FPT_RCV.3.2: 1
    • FPT_RCV.3.3: 1
    • FPT_RCV.3.4: 1
    • FPT_RCV.4: 8
    • FPT_RCV.4.1: 1
    • FPT_SEP.1: 8
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_TST.1: 10
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.NETWORK: 5
    • A.OPERATOR: 5
    • A.USER: 4
  • O:
    • O.MANAGE: 7
    • O.NSP: 4
    • O.REMOVE: 4
    • O.RESIDUAL: 6
    • O.UAU: 7
  • OE:
    • OE.BROWSER: 6
    • OE.CIPHER: 3
    • OE.CLIENT: 5
    • OE.FIREWALL: 3
    • OE.OPERATE: 3
    • OE.USER: 3
  • T:
    • T.RECOVER: 5
    • T.SHUNT: 5
    • T.SPOOF: 5
  • A:
    • A.APP_INS: 3
    • A.ATK_LEV: 3
    • A.SEC_CNL: 3
    • A.TOE_HNDL: 3
    • A.TSF_DAT: 2
    • A.UNDER_HW: 4
  • O:
    • O.ACC_AUTH: 3
    • O.APP_SEP: 2
    • O.AUTH_ISS: 3
    • O.AUTH_RPR: 5
    • O.AUTH_USR: 5
    • O.CNR_LEAK: 10
    • O.DAT_PROT: 5
    • O.REM_RES: 3
    • O.ROLLBACK: 5
  • OE:
    • OE.APP_INS: 3
    • OE.ATK_LEV: 2
    • OE.C_TAMPER: 2
    • OE.OPN_PLAT: 7
    • OE.SEC_CNL: 2
    • OE.TRAINING: 5
    • OE.TSF_DAT: 3
    • OE.UNDER_HW: 4
  • T:
    • T.ABN_END: 3
    • T.ISS_ABU: 4
    • T.LEAK_INF: 3
    • T.LOGI_ATK: 7
    • T.REP_AUTH: 3
    • T.RES_COL: 3
    • T.RES_REU: 4
    • T.SES_TEAR: 4
    • T.TAMPER: 5
    • T.UNAU_APP: 4
    • T.UNAU_IFD: 7
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • Samsung:
    • Samsung: 79
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
    • Rijndael:
      • Rijndael: 4
  • DES:
    • DES:
      • DES: 4
  • miscellaneous:
    • SEED:
      • SEED: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Physical tampering: 1
    • malfunction: 1
    • physical tampering: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
  • FIPS:
    • FIPS PUB 197: 1
  • ISO:
    • ISO/IEC 15408:1999: 2
  • FIPS:
    • FIPS PUB 46-3: 1
    • FIPS PUB 81: 1
  • ISO:
    • ISO/IEC 10536: 2
    • ISO/IEC 14443: 2
    • ISO/IEC 7810: 2
    • ISO/IEC 7816: 2
  • PKCS:
    • PKCS#1: 1
    • PKCS#2: 1
pdf_data/st_metadata
  • /Author: K.Nakagawa
  • /Company: SHARP Corporation
  • /CreationDate: D:20050907142225+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 6.0
  • /ModDate: D:20050907143412+09'00'
  • /Producer: Acrobat Distiller 6.0.1 (Windows)
  • /SourceModified: D:20050907045051
  • /Subject: [DSK_ST]
  • /Title: Security Target AR-FR21 M.10
  • pdf_file_size_bytes: 1079246
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 45
  • /Author: <C0CCC1D8C8A3>
  • /CreationDate: D:20090322235351
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20090322235351
  • /Producer: ePapyrus PSI 8.53
  • /Title: (Microsoft Word - [KC067-SP-0101]MULTOS - Security Target1.2_Public__\271\256\261\270\274\366\301\244clear.doc)
  • pdf_file_size_bytes: 580685
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 74
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different