| name |
MX-FR41 Version:D.10 |
Infineon smartcard IC (Security Controller) M7794 A12 with optional RSA2048/4096 v1.02.013, EC v1.02.013 and Toolbox v1.02.013 |
| category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
JP |
DE |
| status |
archived |
archived |
| not_valid_after |
09.01.2019 |
01.09.2019 |
| not_valid_before |
25.12.2013 |
26.07.2012 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0424_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0814a_pdf.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0424_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0814b_pdf.pdf |
| manufacturer |
Sharp Corporation |
Infineon Technologies AG |
| manufacturer_web |
https://sharp-world.com/ |
https://www.infineon.com/ |
| security_level |
EAL3 |
EAL4+, ATE_DPT.2, AVA_VAN.5, ALC_DVS.2 |
| dgst |
3652b6c872b7da45 |
b8a67f1313f8b0bc |
| heuristics/cert_id |
JISEC-CC-CRP-C0424 |
BSI-DSZ-CC-0814-2012 |
| heuristics/cert_lab |
[] |
BSI |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
CVE-2017-15361 |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, AVA_VAN.2, ADV_FSP.3, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
ADV_TDS.3, ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, APE_ECD.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, APE_OBJ.2, ADV_IMP.1, ALC_LCD.1, ADV_FSP.4, ALC_DVS.2, ATE_DPT.2, ASE_SPD.1, APE_INT.1, ATE_COV.2, ADV_INT.3, ALC_TAT.1, APE_CCL.1, AGD_OPE.1, ALC_CMS.4, APE_SPD.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ADV_SPM.1, APE_REQ.2 |
| heuristics/extracted_versions |
10 |
1.02.013 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0854-2013, BSI-DSZ-CC-0883-2013 |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0786-2012 |
| heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1017-2017, BSI-DSZ-CC-0964-2015, BSI-DSZ-CC-0883-2013, CRP289, BSI-DSZ-CC-1014-2017, ANSSI-CC-2015/32, ANSSI-CC-2014/77, ANSSI-CC-2016/24, SERTIT-056, ANSSI-CC-2017/27, BSI-DSZ-CC-0963-V3-2021, ANSSI-CC-2014/76, BSI-DSZ-CC-0944-2014, BSI-DSZ-CC-0963-V2-2017, ANSSI-CC-2017/28, CRP287, CRP288, ANSSI-CC-2020/83, CRP275, BSI-DSZ-CC-0963-2015, ANSSI-CC-2017/29, CRP286, BSI-DSZ-CC-0854-2013, BSI-DSZ-CC-0917-2014, ANSSI-CC-2015/31, ANSSI-CC-2015/33, BSI-DSZ-CC-0990-2016, ANSSI-CC-2017/26, ANSSI-CC-2020/84, BSI-DSZ-CC-0990-V2-2017, ANSSI-CC-2020/85 |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0786-2012 |
| heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0424
- certification_date: 01.12.2013
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0424_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is an IT product, composed of 2 parts, to protect data in a Multi Function Device (hereafter referred to as an "MFD"). One part is a hardware part in an MFD and provided in the form of an MFD. The other part is a firmware product and provided as an upgrade kit for the firmware of the MFD. An MFD is an office machine that has imaging functions such as copy, printer, image scanning and fax. TOE security functions The TOE counters unauthorized disclosure of image data by: - the encryption function, which encrypts data, such as image data that the MFD handles, before storing the data to the HDD in the MFD, - the cryptographic key generation function, generates a seed for a cryptographic key once when the TOE is installed, and generates a constant cryptographic key from the seed whenever the MFD is powered, and stores the key in a volatile memory for the encryption function, - the data erasure function, which automatically overwrites to erase image data no longer in use in the HDD, and overwrites to erase all data when invoked by the administrator of an MFD in use or no longer in use, - the authentication function, which authenticates the TOE administrator with a password, and provides the TOE administrator with a management function for changing his password, - the confidential file function, which provides image data filed by users with password protection, and - the network protection functions, which counters malicious attempts (of unauthorized network-accesses, communication data wiretaps, and network settings falsifications), and - the fax flow control function, which counters attempts to access to the internal network via the MFD network interface from public telephone networks on the MFD fax interface.
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: MX-FR41
- product_type: data protection function in Multi Function Device
- report_link: https://www.ipa.go.jp/en/security/c0424_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0424_est.pdf
- toe_version: D.10
- vendor: Sharp Corporation
- expiration_date: 01.01.2019
- revalidations: [frozendict({'date': '2014-02', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0424_it3467_01.html'})]
- supplier: Sharp Corporation
- toe_japan_name: MX-FR41D.10
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0424_it3467.html
- toe_overseas_name: MX-FR41D.11
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
f6d23054061d72ba |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
c0424_erpt.pdf |
0814a_pdf.pdf |
| pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0814-2012
- cert_item: Infineon smartcard IC (Security Controller) M7794 A12 with optional RSA2048/4096 v1.02.013, EC v1.02.013 and Toolbox v1.02.013
- cert_lab: BSI
- developer: Infineon Technologies AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
| pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0424-01: 1
- Certification No. C0424: 1
|
- DE:
- BSI-DSZ-CC-0786-2012: 3
- BSI-DSZ-CC-0814-2012: 24
- BSI-DSZ-CC-S-0007-2011: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0035-2007: 1
- BSI-CC-PP-0035-2007: 2
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 7
- EAL 4 augmented: 3
- EAL 5: 4
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 6
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 6
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.OPERATOR: 1
- T:
- T.RECOVER: 2
- T.REMOTE: 2
- T.SPOOF: 1
- T.TAMPER: 1
- T.TAP: 2
|
|
| pdf_data/report_keywords/vendor |
|
- GD:
- Infineon:
- Infineon: 12
- Infineon Technologies: 7
- Infineon Technologies AG: 21
|
| pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 3
|
- TUV:
- TÜV Informationstechnik: 4
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
- ECC:
- RSA:
- RSA 1024: 1
- RSA-2048: 2
- RSA2048: 2
- RSA4096: 2
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 5
- physical tampering: 1
- SCA:
- DPA: 5
- SPA: 5
- physical probing: 1
- other:
|
| pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI TR-02102: 1
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
- FIPS:
|
- BSI:
- AIS 20: 2
- AIS 25: 3
- AIS 26: 3
- AIS 31: 4
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 4
- AIS 38: 1
- AIS31: 1
- AIS47: 1
- ISO:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Technical Report Summary (ETR Summary), Version 2, 2012-07-16, TÜV Informationstechnik GmbH, (confidential document) 8 specifically • AIS 20, Anwendungshinweise und Interpretationen zum Schema (AIS) AIS 20: 1
- Version 1.0, 2012-01-11, Infineon Technologies AG (confidential document) [12] SLx 70 Family Production and Personalization User’s Manual, 2011-10-20, Infineon Technologies: 1
- according to AIS 36 for the Product M7794 A12, Version 2, 2012-07-16, TÜV Informationstechnik GmbH (confidential document) [11] Configuration Management Scope M7794 A12 including optional Software Libraries RSA – EC –: 1
- optional Software Libraries RSA – EC – Toolbox, Version 1.3,2012-07-16, Infineon Technologies AG (confidential document) [7] Security Target BSI-DSZ-CC-0814-2012, M7794 A12, Version 1.2, 2012-07-16 (sanitised public: 1
|
| pdf_data/report_metadata |
- /CreationDate: D:20140128103614+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20140128103649+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 248012
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 35
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20120803065851+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Infineon smartcard IC (Security Controller) M7794 A12 with optional RSA2048/4096 v1.02.013, EC v1.02.013 and Toolbox v1.02.013, Infineon Technologies AG"
- /ModDate: D:20120803070947+02'00'
- /Producer: OpenOffice.org 3.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0814-2012
- pdf_file_size_bytes: 1121169
- pdf_hyperlinks: https://www.bsi.bund.dea/, http://www.bsi.bund.de/, https://www.bsi.bund.de/zertifizierung
- pdf_is_encrypted: False
- pdf_number_of_pages: 43
|
| pdf_data/st_filename |
c0424_est.pdf |
0814b_pdf.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL4: 5
- EAL4 augmented: 1
- EAL4+: 1
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.2: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 2
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 9
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.2: 9
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 12
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 8
- FCS_COP.1: 14
- FCS_COP.1.1: 1
- FDP:
- FDP_IFC.1: 9
- FDP_IFC.1.1: 1
- FDP_IFF.1: 8
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_RIP.1: 11
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL: 21
- FIA_AFL.1: 4
- FIA_SOS: 15
- FIA_SOS.1: 2
- FIA_UAU: 46
- FIA_UAU.1: 10
- FIA_UAU.2: 2
- FIA_UAU.7: 2
- FIA_UID: 25
- FIA_UID.1: 10
- FIA_UID.2: 2
- FMT:
- FMT_MOF: 27
- FMT_MOF.1: 3
- FMT_MSA.3: 5
- FMT_MTD: 29
- FMT_MTD.1: 3
- FMT_SMF.1: 36
- FMT_SMF.1.1: 1
- FMT_SMR: 20
- FMT_SMR.1: 16
- FTA:
- FTA_TSE.1: 9
- FTA_TSE.1.1: 1
- FTP:
- FTP_TRP.1: 18
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 5
- FAU_SAS.1: 8
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 20
- FCS_CKM.1: 31
- FCS_CKM.2: 5
- FCS_CKM.4: 23
- FCS_COP: 39
- FCS_COP.1: 27
- FCS_RNG: 12
- FCS_RNG.1: 28
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC.1: 19
- FDP_ACC.1.1: 1
- FDP_ACF.1: 15
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 6
- FDP_ITC.1: 17
- FDP_ITC.2: 17
- FDP_ITT.1: 4
- FDP_SDI.1: 12
- FDP_SDI.1.1: 1
- FDP_SDI.2: 12
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FIA:
- FIA_SOS.2: 3
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 2
- FMT:
- FMT_LIM: 3
- FMT_LIM.1: 5
- FMT_LIM.2: 5
- FMT_MSA.1: 14
- FMT_MSA.1.1: 1
- FMT_MSA.2: 9
- FMT_MSA.3: 15
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR.1: 6
- FPT:
- FPT_AMT.1: 1
- FPT_FLS.1: 5
- FPT_ITT.1: 4
- FPT_PHP.3: 4
- FPT_TST: 7
- FPT_TST.1: 11
- FPT_TST.2: 31
- FPT_TST.2.1: 1
- FRU:
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.NETWORK: 4
- A.OPERATOR: 4
- O:
- O.FAXTONET: 6
- O.FILTER: 9
- O.MANAGE: 13
- O.REMOVE: 7
- O.RESIDUAL: 7
- O.TRP: 8
- O.USER: 7
- OE:
- OE.CIPHER: 3
- OE.ERASEALL: 3
- OE.FIREWALL: 3
- OE.OPERATE: 3
- OE.PC-USER: 4
- OE.SUBNET: 3
- OE.USER: 3
- T:
- T.RECOVER: 5
- T.REMOTE: 3
- T.SPOOF: 4
- T.TAMPER: 3
- T.TAP: 4
|
|
| pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 3
- Infineon Technologies: 15
- Infineon Technologies AG: 14
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- RSA:
- RSA 1024: 1
- RSA-2048: 1
- RSA2048: 1
- RSA4096: 1
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 6
- Malfunction: 12
- malfunction: 1
- SCA:
- DPA: 6
- Leak-Inherent: 9
- Physical Probing: 2
- SPA: 4
- side channel: 1
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 1
- FIPS:
- ISO:
- ISO/IEC 15946-: 1
- ISO/IEC 18092: 4
- ISO/IEC 7816-3: 1
- RFC:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /Author: K.Nakagawa
- /Company:
- /CreationDate: D:20140127162007+09'00'
- /Creator: Word 用 Acrobat PDFMaker 10.1
- /GTS_PDFXConformance: PDF/X-1a:2001
- /GTS_PDFXVersion: PDF/X-1:2001
- /Keywords:
- /ModDate: D:20140127162757+09'00'
- /Producer: Adobe PDF Library 10.0
- /SourceModified: D:20140127070515
- /Subject: MX-FR41
- /Title: Security Target
- /Trapped: /False
- pdf_file_size_bytes: 853652
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 42
|
- /Author: Steffen Heinkel
- /CreationDate: D:20120716171922
- /Creator: Microsoft® Office Word 2007
- /Keywords: M7794 A12 CC EAL 4+ security controller
- /ModDate: D:20120716171922
- /Producer: Microsoft® Office Word 2007
- /Title: M7794 A12 EAL4+
- pdf_file_size_bytes: 841174
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 68
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |