name |
IFX_CCI_00002Dh, IFX_CCI_000039h, IFX_CCI_00003Ah, IFX_CCI_000044h, IFX_CCI_000045h, IFX_CCI_000046h, IFX_CCI_000047h, IFX_CCI_000048h, IFX_CCI_000049h, IFX_CCI_00004Ah, IFX_CCI_00004Bh, IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh design step T11 with firmware 80.306.16.0, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.11.003, optional ACL v3.02.000 and user guidance
|
Ricoh imagio MP 5000SP/4000SP with security card Type 9 Version: - Firmware Configuration System Version V2.16-00 System/Copy 1.11.1, Network Support 7.26, Network DocBox 1.10C, Web Support 1.59, Web Uapl 1.15, animation 1.3, Scanner 01.24, RPDL 7.33, Printer 1.11, MSIS 7.15.02, RPCS Font 1.01, Engine 1.04:05, OpePanel 1.01, LANG0 1.01, LANG1 1.01, ADF 15.000:15, - ASIC Ic Key 1100 - Option Data Erase Opt 1.01m
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
Multi-Function Devices
|
not_valid_before |
2020-11-17
|
2010-02-25
|
not_valid_after |
2025-11-17
|
2015-03-01
|
scheme |
DE
|
JP
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1107b_pdf.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0246_est.pdf
|
status |
active
|
archived
|
manufacturer |
Infineon Technologies AG
|
Ricoh Company, Ltd.
|
manufacturer_web |
https://www.infineon.com/
|
https://www.ricoh.com/
|
security_level |
ALC_FLR.1, EAL6+ |
ALC_FLR.2, EAL3+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1107a_pdf.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0246_erpt.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1107c_pdf.pdf
|
None
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.1™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': None}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
True
|
False
|
state/cert/download_ok |
True
|
False
|
state/cert/extract_ok |
True
|
False
|
state/cert/pdf_hash |
1510e51ff2a3776d4bcc892909c82ecede5b53c87ceef7b4c6b321004d4fddc6
|
None
|
state/cert/txt_hash |
d3c8dc85c70d2b965c43a09003de09811c513754615f294ecb89e353ef6eb476
|
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
f9f02a7cc62d69aeeab52730b0ec09c1164def94afc085feb805fab169692d8a
|
7fa424b1dd452cb2c7793a3a8bece7e5e5410ba457ff44bb46ecb91b0d9d645f
|
state/report/txt_hash |
e901b1ca784fd7c9088641c6f6096ba18b49d14bbc1c15cd36ce43c3f71fef83
|
5710d2d89500845be1fd471294a614fc1a27e0cf8b667c6d9e0c0dd45701409c
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
9eec0acaf939ff46915c7cbd7455bb7c836783630e869100fc63acb15b59f97e
|
4b88251809d96351ffcb5e2065b5c303a9dc0305316eec39aeae2ab7bd136885
|
state/st/txt_hash |
eeabc40ab1d7090d1b59567d9cf1ba2d939501edaed739c66971b22ea5763975
|
e3085316072214aba0f74dd921d8747846705a1f62f96a828b9949928b327ab0
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
BSI-DSZ-CC-1107-2020
|
JISEC-CC-CRP-C0246
|
heuristics/cert_lab |
BSI |
None
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
3.02.000, 80.306.16.0, 3.52.9708, 2.11.003, 01.30.0564, 05.03.4097 |
1.01, 1.11, 01.24, 7.26, 1.3, 15.000, 1.04, 7.33, 1.59, 1.11.1, 1.15, 1.10, 2.16, 7.15.02 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
ANSSI-CC-2021/44, ANSSI-CC-2022/16, ANSSI-CC-2022/15, ANSSI-CC-2022/14, ANSSI-CC-2021/29, ANSSI-CC-2021/45, ANSSI-CC-2021/42, ANSSI-CC-2021/43, ANSSI-CC-2021/36, ANSSI-CC-2022/17, ANSSI-CC-2022/53, ANSSI-CC-2022/18, ANSSI-CC-2021/54 |
None
|
heuristics/report_references/directly_referencing |
None
|
None
|
heuristics/report_references/indirectly_referenced_by |
NSCIB-CC-0362721-CR, ANSSI-CC-2022/55, ANSSI-CC-2021/45, ANSSI-CC-2021/43, ANSSI-CC-2022/17v2, ANSSI-CC-2021/44, ANSSI-CC-2022/56, ANSSI-CC-2022/36, ANSSI-CC-2021/29, ANSSI-CC-2022/34v2, ANSSI-CC-2021/54, ANSSI-CC-2022/23, ANSSI-CC-2022/53, ANSSI-CC-2022/18, ANSSI-CC-2021/36v2, ANSSI-CC-2022/16, ANSSI-CC-2022/22, ANSSI-CC-2022/34, ANSSI-CC-2022/15, ANSSI-CC-2022/14, ANSSI-CC-2022/57, ANSSI-CC-2022/52, ANSSI-CC-2022/18v2, ANSSI-CC-2021/42, ANSSI-CC-2022/10, ANSSI-CC-2022/17, ANSSI-CC-2022/11, ANSSI-CC-2022/14v2, NSCIB-CC-0362720-CR, ANSSI-CC-2022/15v2, ANSSI-CC-2022/36v2, ANSSI-CC-2022/54, ANSSI-CC-2021/36, ANSSI-CC-2023/29, ANSSI-CC-2022/13, ANSSI-CC-2022/12, ANSSI-CC-2022/37, ANSSI-CC-2022/16v2 |
None
|
heuristics/report_references/indirectly_referencing |
None
|
None
|
heuristics/scheme_data |
None
|
- cert_id:
C0246
- supplier:
RICOH COMPANY, LTD.
- toe_overseas_name:
-----
- expiration_date:
2015-03
- claim:
EAL3+
ALC_FLR.2
PP
- certification_date:
2010-02
- toe_overseas_link:
None
- toe_japan_name:
Ricoh imagio MP 5000SP/4000SP
with security card Type 9
- Firmware Configuration
System VersionV2.16-00
System/Copy1.11.1,
Network Support7.26,
Network DocBox1.10C,
Web Support1.59,
Web Uapl1.15, animation1.3,
Scanner01.24,
RPDL7.33,
Printer;1.11,
MSIS7.15.02,
RPCS Font1.01,
Engine1.04:05,
OpePanel1.01,
LANG01.01,
LANG11.01,
ADF15.000:15
- ASIC
Ic Key1100
- Option
Data Erase Opt1.01m
- toe_japan_link:
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0246_it9257.html
- enhanced:
- product:
Ricoh imagio MP 5000SP/4000SP with security card Type 9
- toe_version:
- Firmware Configuration
System VersionV2.16-00
System/Copy1.11.1
Network Support7.26
Network DocBox1.10C
Web Support1.59
Web Uapl1.15
animation1.3
Scanner01.24
RPDL7.33
Printer1.11
MSIS7.15.02
RPCS Font1.01
Engine1.04:05
OpePanel1.01
LANG01.01
LANG11.01
ADF15.000:15
- ASIC
Ic Key1100
- Option
Data Erase Opt1.01m
- product_type:
Multi Function Product
- certification_date:
2010-02-25
- cc_version:
3.1
- assurance_level:
EAL3 Augmented with ALC_FLR.2
- protection_profile:
2600.1, Protection Profile for Hardcopy Devices, Operational Environment A 1.0, dated June 2009
- vendor:
RICOH COMPANY, LTD.
- evaluation_facility:
Electronic Commerce Security Technology Laboratory Inc.
Evaluation Center
- report_link:
https://www.ipa.go.jp/en/security/c0246_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0246_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0246_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE conforms to the international security standard: "IEEE Std 2600.1TM-2009" security Protection Profile for Digital Multi-function Products. The TOE is a digital Multi-function Product which is composed of Copy Function, Scanner Function, Printer Function and Document Server Function, and it creates a safe environment for customers to use the functions.
TOE security functionality
The main security functions are described as follows:
-
Audit Function: to generate / review audit log of the event.
-
Identification and Authentication Function: to identify and authenticate users, to lock out, to protect passwords, and to enforce automated logout.
-
Access Control Function: to control available functions for each user, and to control the document operation.
-
Network Protection Function: to protect information on the Network with use of the encrypted communication.
-
Residual Data Delete Function: to overwrite the residual data on the Hard Disk with the specific pattern data.
-
Security Management Function: to make the administrators control the security functions.
-
Software Verification Function: to ensure the genuine control software by verifying the integrity of the executable codes.
|
heuristics/st_references/directly_referenced_by |
ANSSI-CC-2021/44, ANSSI-CC-2021/45, ANSSI-CC-2021/42, ANSSI-CC-2021/43, ANSSI-CC-2022/53 |
None
|
heuristics/st_references/directly_referencing |
None
|
None
|
heuristics/st_references/indirectly_referenced_by |
ANSSI-CC-2021/44, ANSSI-CC-2021/45, ANSSI-CC-2021/42, ANSSI-CC-2021/43, ANSSI-CC-2022/53 |
None
|
heuristics/st_references/indirectly_referencing |
None
|
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
1107c_pdf.pdf
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
- cc_cert_id:
- cc_protection_profile_id:
- cc_security_level:
- EAL:
- EAL 6:
1
- EAL 5:
1
- EAL 2:
1
- EAL 6 augmented:
1
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- Infineon:
- Infineon Technologies AG:
1
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- ISO:
- ISO/IEC 15408:
2
- ISO/IEC 18045:
2
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
None
|
pdf_data/cert_metadata |
- pdf_file_size_bytes:
243258
- pdf_is_encrypted:
False
- pdf_number_of_pages:
1
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate:
D:20201124150949+01'00'
- /Creator:
Writer
- /Keywords:
Common Criteria, Certification, Zertifizierung, SmartCard, Infineon Technologies AG, PP-0084
- /ModDate:
D:20201124151045+01'00'
- /Producer:
LibreOffice 6.3
- /Subject:
Common Criteria Certification
- /Title:
Certificate BSI-DSZ-CC-1107-2020
- pdf_hyperlinks:
|
None
|
pdf_data/report_filename |
1107a_pdf.pdf
|
c0246_erpt.pdf
|
pdf_data/report_frontpage |
- DE:
- match_rules:
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
- cert_id:
BSI-DSZ-CC-1107-2020
- cert_item:
IFX_CCI_00002Dh, IFX_CCI_000039h, IFX_CCI_00003Ah, IFX_CCI_000044h, IFX_CCI_000045h, IFX_CCI_000046h, IFX_CCI_000047h, IFX_CCI_000048h, IFX_CCI_000049h, IFX_CCI_00004Ah, IFX_CCI_00004Bh, IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh design step T11 with firmware 80.306.16.0, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.11.003, optional ACL v3.02.000 and user guidance
- developer:
Infineon Technologies AG
- cert_lab:
BSI
- ref_protection_profiles:
Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP- 0084-2014
- cc_version:
PP conformant plus product specific extensions Common Criteria Part 2 extended
- cc_security_level:
Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0246-01:
1
- Certification No. C0246:
1
|
pdf_data/report_keywords/cc_claims |
|
- T:
- T.DOC:
2
- T.FUNC:
1
- T.PROT:
1
- T.CONF:
2
- A:
- A.ACCESS:
1
- A.USER:
1
- A.ADMIN:
2
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0084-2014:
1
- BSI-CC-PP-0084-2014:
3
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- ALC:
- ALC_FLR.1:
5
- ALC_FLR:
3
- ALC_CMC.5:
1
- ALC_CMS.5:
1
- ALC_DEL.1:
1
- ALC_DVS.2:
1
- ALC_LCD.1:
1
- ALC_TAT.3:
1
|
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_FLR.1:
5
- ALC_FLR:
3
- ALC_CMC.5:
1
- ALC_CMS.5:
1
- ALC_DEL.1:
1
- ALC_DVS.2:
1
- ALC_LCD.1:
1
- ALC_TAT.3:
1
|
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 6:
4
- EAL 5:
4
- EAL 2:
2
- EAL 1:
1
- EAL 4:
1
- EAL 2+:
1
- EAL5+:
1
- EAL6:
1
- EAL 6 augmented:
3
|
- EAL3:
3
- EAL3 augmented:
2
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- out of scope:
1
- 000, 2020-02-07 Table 2: Deliverables of the TOE Please note that NRG functionality and toolbox are out of scope of this evaluation, hence no evaluated TOE guidance documentation applies. However, respective:
1
- ConfidentialDocument:
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification:
1
- IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh T11 Security Target”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report, Version 3, 2020-11-13, “ETR Summary”, TÜV Informationstechnik:
1
- confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January:
1
- BSI-DSZ-CC-1107-2020, Version 3, 2020-11-13, “ETR for Composition”, TÜV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE, 2019-09-13, “Configuration Management Plan” (confidential:
1
- Standards Compliance Verification”, Version 1, 2020-07-14, TÜV Informationstechnik GmbH (confidential document) [22] “Site Technical Audit Report (STAR) Amkor Technology, Portugal”, Version 1, 2020- 10-12, TÜV:
1
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
- MAC:
- KEX:
- KA:
- Key agreement:
1
- Key Agreement:
1
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik:
31
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
- SCA:
- physical probing:
1
- SPA:
2
- DPA:
2
- FI:
|
|
pdf_data/report_keywords/side_channel_analysis/FI |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS197:
3
- FIPS186-4:
6
- FIPS PUB 186-4:
1
- PKCS:
- BSI:
- AIS 34:
2
- AIS 1:
1
- AIS 14:
1
- AIS 19:
1
- AIS 20:
2
- AIS 23:
1
- AIS 25:
1
- AIS 26:
1
- AIS 27:
1
- AIS 31:
2
- AIS 32:
1
- AIS 35:
2
- AIS 36:
2
- AIS 37:
1
- AIS 38:
1
- AIS 41:
1
- AIS 46:
1
- AIS 47:
1
- AIS31:
4
- AIS20:
3
- AIS 30:
1
- RFC:
- ISO:
- ISO/IEC 15408:
4
- ISO/IEC 18045:
4
- ISO/IEC 17065:
2
|
- CC:
- CCMB-2006-09-001:
2
- CCMB-2007-09-002:
2
- CCMB-2007-09-003:
2
- CCMB-2007-09-004:
2
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- Triple-DES:
2
- TDES:
4
- TDEA:
1
- constructions:
|
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI TR-02102:
1
- BSI 7148:
1
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
- Infineon:
- Infineon Technologies AG:
22
- Infineon:
3
- Infineon Technologies:
9
- GD:
- G&D:
1
- Giesecke & Devrient:
1
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
467899
- pdf_is_encrypted:
False
- pdf_number_of_pages:
36
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate:
D:20201124145337+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, SmartCard, Infineon Technologies AG, PP-0084"
- /ModDate:
D:20201124150440+01'00'
- /Producer:
LibreOffice 6.3
- /Subject: Common Criteria Certification
- /Title:
Certification Report BSI-DSZ-CC-1107-2020
- pdf_hyperlinks:
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte
|
- pdf_file_size_bytes:
230440
- pdf_is_encrypted:
False
- pdf_number_of_pages:
29
- /ModDate:
D:20100629170727+09'00'
- /CreationDate:
D:20100629170727+09'00'
- /Title:
untitled
- /Producer:
Acrobat Distiller 6.0 (Windows)
- pdf_hyperlinks:
|
pdf_data/report_metadata//CreationDate |
D:20201124145337+01'00'
|
D:20100629170727+09'00'
|
pdf_data/report_metadata//ModDate |
D:20201124150440+01'00'
|
D:20100629170727+09'00'
|
pdf_data/report_metadata//Producer |
LibreOffice 6.3
|
Acrobat Distiller 6.0 (Windows)
|
pdf_data/report_metadata//Title |
Certification Report BSI-DSZ-CC-1107-2020
|
untitled
|
pdf_data/report_metadata/pdf_file_size_bytes |
467899
|
230440
|
pdf_data/report_metadata/pdf_hyperlinks |
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte |
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
36
|
29
|
pdf_data/st_filename |
1107b_pdf.pdf
|
c0246_est.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
- O:
- O.RND:
1
- O.TDES:
2
- O.AES:
2
- O.RSA:
5
- O.ECC:
5
- O.AES-TDES-MAC:
5
- T:
|
- O:
- O.DOC:
18
- O.FUNC:
9
- O.PROT:
9
- O.CONF:
18
- O.USER:
21
- O.INTERFACE:
9
- O.SOFTWARE:
9
- O.AUDIT:
9
- T:
- T.DOC:
10
- T.FUNC:
5
- T.PROT:
5
- T.CONF:
10
- A:
- A.ACCESS:
5
- A.USER:
4
- A.ADMIN:
10
- OE:
- OE.AUDIT_STORAGE:
4
- OE.AUDIT_ACCESS:
3
- OE.INTERFACE:
4
- OE.PHYSICAL:
1
- OE.USER:
21
- OE.ADMIN:
8
- OE.AUDIT:
3
- OE.AUDIT_ACCESS_AUTHORIZED:
1
- OE.PHYISCAL:
3
|
pdf_data/st_keywords/cc_claims/O |
- O.RND:
1
- O.TDES:
2
- O.AES:
2
- O.RSA:
5
- O.ECC:
5
- O.AES-TDES-MAC:
5
|
- O.DOC:
18
- O.FUNC:
9
- O.PROT:
9
- O.CONF:
18
- O.USER:
21
- O.INTERFACE:
9
- O.SOFTWARE:
9
- O.AUDIT:
9
|
pdf_data/st_keywords/cc_claims/T |
|
- T.DOC:
10
- T.FUNC:
5
- T.PROT:
5
- T.CONF:
10
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_ARC.1:
1
- ADV_FSP.5: 4
- ADV_IMP.2: 2
- ADV_INT.3: 1
- ADV_TDS.5: 1
- ADV_SPM.1: 6
- ADV_IMP: 1
- ADV_FSP: 1
- ADV_FSP.4: 2
|
- ADV_ARC.1:
1
- ADV_FSP.3: 1
- ADV_TDS.2: 2
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_DVS: 1
- ALC_FLR.1: 4
- ALC_CMC.5: 3
- ALC_CMS.5: 3
- ALC_DEL.1:
1
- ALC_DVS.2: 1
- ALC_LCD.1:
1
- ALC_TAT.3: 1
- ALC_CMS: 1
- ALC_CMS.4: 1
- ALC_CMC: 1
- ALC_FLR: 1
|
- ALC_FLR.2: 3
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1:
1
- ALC_DVS.1: 2
- ALC_LCD.1:
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_LCD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE |
- ASE_INT: 14
- ASE_CCL: 4
- ASE_SPD: 4
- ASE_OBJ: 6
- ASE_ECD: 4
- ASE_REQ: 30
- ASE_TSS: 5
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_SPD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.3: 2
- ATE_DPT.3: 1
- ATE_FUN.2: 1
- ATE_IND.2:
1
- ATE_COV: 1
|
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2:
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL6+:
2
- EAL6:
5
- EAL 6:
2
- EAL5+:
1
- EAL6 augmented:
2
- EAL 6 augmented:
2
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS:
4
- FAU_SAS.1:
6
- FAU_GEN:
1
- FAU_SAS.1.1:
1
- FCS:
- FCS_RNG:
23
- FCS_COP:
34
- FCS_CKM:
28
- FCS_RNG.1:
11
- FCS_CKM.1:
19
- FCS_CKM.4:
15
- FCS_COP.1:
13
- FCS_CKM.2:
3
- FDP:
- FDP_SDC:
2
- FDP_SDC.1:
5
- FDP_SDI.2:
5
- FDP_ITT.1:
4
- FDP_IFC.1:
8
- FDP_UCT.1:
9
- FDP_UIT.1:
9
- FDP_ACC:
10
- FDP_ACF:
11
- FDP_ACC.1:
18
- FDP_ACF.1:
15
- FDP_ITC.1:
15
- FDP_ITC.2:
15
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
2
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
2
- FDP_ACF.1.4:
1
- FDP_SDI.1:
1
- FDP_SDI.2.1:
1
- FDP_SDI.2.2:
1
- FDP_SDC.1.1:
1
- FDP_UCT.1.1:
2
- FDP_UIT.1.2:
1
- FIA:
- FIA_API:
2
- FIA_API.1:
7
- FIA_UID:
7
- FIA_UID.1:
6
- FIA_UID.2:
3
- FIA_API.1.1:
1
- FMT:
- FMT_LIM:
16
- FMT_LIM.1:
8
- FMT_LIM.2:
6
- FMT_MSA.1:
8
- FMT_MSA.3:
11
- FMT_SMF.1:
11
- FMT_SMR.1:
16
- FMT_MTD:
10
- FMT_SMR:
8
- FMT_SMF:
8
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MSA.1.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MTD.1:
1
- FPT:
- FPT_TST.2:
28
- FPT_TST:
5
- FPT_TST.1:
11
- FPT_FLS.1:
6
- FPT_PHP.3:
4
- FPT_ITT.1:
4
- FPT_TST.2.1:
1
- FRU:
- FTP:
- FTP_ITC.1:
15
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1:
4
|
- FAU:
- FAU_STG.1:
9
- FAU_STG.4:
8
- FAU_SAR.1:
10
- FAU_SAR.2:
7
- FAU_GEN.1:
12
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2:
6
- FAU_GEN.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3:
1
- FAU_STG.4.1:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
- FDP:
- FDP_IFF:
1
- FDP_IFC:
1
- FDP_ACF.1:
27
- FDP_ACC.1:
29
- FDP_ACC.1.1:
2
- FDP_ACF.1.1:
2
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
2
- FDP_ACF.1.4:
2
- FDP_RIP.1:
6
- FDP_RIP.1.1:
1
- FDP_IFC.1:
4
- FIA:
- FIA_AFL.1:
8
- FIA_UAU.7:
7
- FIA_SOS.1:
8
- FIA_UAU.1:
14
- FIA_UID.1:
17
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1:
9
- FIA_ATD.1.1:
1
- FIA_SOS.1.1:
1
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.7.1:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_USB.1:
7
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FMT:
- FMT_SMF.1:
20
- FMT_SMR.1:
26
- FMT_MSA.3:
24
- FMT_MSA.1:
23
- FMT_MSA.1.1:
2
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MTD.1:
11
- FMT_MTD.1.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FPT_FDI_EXP:
4
- FPT_FDI_EXP.1:
11
- FPT_FDI_EXP.1.1:
2
- FPT_STM.1:
9
- FPT_TST.1:
6
- FPT_STM.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FTA:
- FTA_SSL.3:
10
- FTA_SSL.3.1:
1
- FTP:
- FTP_ITC.1:
18
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TST.1:
1
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_SAS:
4
- FAU_SAS.1:
6
- FAU_GEN:
1
- FAU_SAS.1.1:
1
|
- FAU_STG.1:
9
- FAU_STG.4:
8
- FAU_SAR.1:
10
- FAU_SAR.2:
7
- FAU_GEN.1:
12
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2:
6
- FAU_GEN.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3:
1
- FAU_STG.4.1:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_SDC: 2
- FDP_SDC.1: 5
- FDP_SDI.2: 5
- FDP_ITT.1: 4
- FDP_IFC.1:
8
- FDP_UCT.1: 9
- FDP_UIT.1: 9
- FDP_ACC: 10
- FDP_ACF: 11
- FDP_ACC.1:
18
- FDP_ACF.1:
15
- FDP_ITC.1: 15
- FDP_ITC.2: 15
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
2
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
2
- FDP_ACF.1.4:
1
- FDP_SDI.1: 1
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_SDC.1.1: 1
- FDP_UCT.1.1: 2
- FDP_UIT.1.2: 1
|
- FDP_IFF: 1
- FDP_IFC: 1
- FDP_ACF.1:
27
- FDP_ACC.1:
29
- FDP_ACC.1.1:
2
- FDP_ACF.1.1:
2
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
2
- FDP_ACF.1.4:
2
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FDP_IFC.1:
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
18
|
29
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
15
|
27
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
8
|
4
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_API: 2
- FIA_API.1: 7
- FIA_UID: 7
- FIA_UID.1:
6
- FIA_UID.2: 3
- FIA_API.1.1: 1
|
- FIA_AFL.1: 8
- FIA_UAU.7: 7
- FIA_SOS.1: 8
- FIA_UAU.1: 14
- FIA_UID.1:
17
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1.1: 1
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7.1: 1
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
6
|
17
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_LIM: 16
- FMT_LIM.1: 8
- FMT_LIM.2: 6
- FMT_MSA.1:
8
- FMT_MSA.3:
11
- FMT_SMF.1:
11
- FMT_SMR.1:
16
- FMT_MTD: 10
- FMT_SMR: 8
- FMT_SMF: 8
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MSA.1.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MTD.1:
1
|
- FMT_SMF.1:
20
- FMT_SMR.1:
26
- FMT_MSA.3:
24
- FMT_MSA.1:
23
- FMT_MSA.1.1:
2
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MTD.1:
11
- FMT_MTD.1.1: 1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
8
|
23
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
11
|
24
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
1
|
11
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
11
|
20
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
16
|
26
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_TST.2: 28
- FPT_TST: 5
- FPT_TST.1:
11
- FPT_FLS.1: 6
- FPT_PHP.3: 4
- FPT_ITT.1: 4
- FPT_TST.2.1: 1
|
- FPT_FDI_EXP: 4
- FPT_FDI_EXP.1: 11
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1: 9
- FPT_TST.1:
6
- FPT_STM.1.1: 1
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
11
|
6
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_ITC.1:
15
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1: 4
|
- FTP_ITC.1:
18
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TST.1: 1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 |
15
|
18
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 |
1
|
1
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
- SCA:
- Leak-Inherent:
5
- Physical Probing:
2
- side channel:
1
- SPA:
1
- DPA:
2
- FI:
|
|
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- BSI:
- RFC:
- ISO:
- ISO/IEC 7816-3:
1
- ISO/IEC 14443:
6
- ISO/IEC 18092:
4
- ISO/IEC 14443-4:
1
- ISO/IEC14443-3:
1
- CC:
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
- CC:
- CCMB-2006-09-001:
1
- CCMB-2007-09-002:
1
- CCMB-2007-09-003:
1
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
- CCMB-2006-09-001:
1
- CCMB-2007-09-002:
1
- CCMB-2007-09-003:
1
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- DES:
- 3DES:
- TDES:
17
- Triple-DES:
1
- TDEA:
1
- miscellaneous:
- constructions:
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
- Infineon:
- Infineon Technologies:
7
- Infineon Technologies AG:
13
- Infineon:
3
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
556806
- pdf_is_encrypted:
False
- pdf_number_of_pages:
69
- /Creator:
Microsoft Word - IFX_CCI_002Dh_SecurityTargetLite_CC.docx
- /Producer:
Nuance PDF Create 8
- /CreationDate:
D:20201127091611+01'00'
- /ModDate:
D:20201127091611+01'00'
- /Author:
Infineon Technologies AG
- /Title:
Microsoft Word - IFX_CCI_002Dh_SecurityTargetLite_CC.docx
- /Keywords: 32-bit security controller
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
464939
- pdf_is_encrypted:
False
- pdf_number_of_pages:
65
- /CreationDate:
D:20100618152326+09'00'
- /Author:
- /Creator:
PScript5.dll Version 5.2.2
- /Producer:
Acrobat Distiller 7.0.5 (Windows)
- /ModDate:
D:20100618152326+09'00'
- /Title:
Microsoft Word - C0246ST_eng_2010-6-18.doc
- pdf_hyperlinks:
|
pdf_data/st_metadata//Author |
Infineon Technologies AG
|
|
pdf_data/st_metadata//CreationDate |
D:20201127091611+01'00'
|
D:20100618152326+09'00'
|
pdf_data/st_metadata//Creator |
Microsoft Word - IFX_CCI_002Dh_SecurityTargetLite_CC.docx
|
PScript5.dll Version 5.2.2
|
pdf_data/st_metadata//ModDate |
D:20201127091611+01'00'
|
D:20100618152326+09'00'
|
pdf_data/st_metadata//Producer |
Nuance PDF Create 8
|
Acrobat Distiller 7.0.5 (Windows)
|
pdf_data/st_metadata//Title |
Microsoft Word - IFX_CCI_002Dh_SecurityTargetLite_CC.docx
|
Microsoft Word - C0246ST_eng_2010-6-18.doc
|
pdf_data/st_metadata/pdf_file_size_bytes |
556806
|
464939
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
69
|
65
|
dgst |
3a743d7536826ace
|
93cdda41b5a03cdf
|