Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
bizhub PRO C5500 / ineo+ 5500 Image Control Program A0E70Y0-00I1-G00-10
JISEC-CC-CRP-C0118
Application eTravel EAC v2.0, en configuration SAC, sur la carte à puce fermée MultiApp V3 masquée sur le composant M7820 A11
ANSSI-CC-2014/08
name bizhub PRO C5500 / ineo+ 5500 Image Control Program A0E70Y0-00I1-G00-10 Application eTravel EAC v2.0, en configuration SAC, sur la carte à puce fermée MultiApp V3 masquée sur le composant M7820 A11
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP FR
not_valid_after 07.10.2013 01.09.2019
not_valid_before 27.09.2007 03.02.2014
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0118_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Rapport%20ANSSI-CC-2014_08fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0118_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible%20ANSSI-CC-2014_08en.pdf
manufacturer Konica Minolta Business Technologies, Inc Gemalto - Infineon Technologies AG
manufacturer_web https://www.konicaminolta.com/ https://www.gemalto.com/
security_level EAL3 EAL5+, ALC_DVS.2, AVA_VAN.5
dgst 4004e83aef30c172 57e190bed691f233
heuristics/cert_id JISEC-CC-CRP-C0118 ANSSI-CC-2014/08
heuristics/cert_lab [] SERMA
heuristics/extracted_sars AGD_ADM.1, ATE_DPT.1, AVA_VLA.1, ALC_DVS.1, ADV_RCR.1, ADV_HLD.2, ATE_COV.2, AVA_MSU.1, ADV_FSP.1, ATE_IND.2, ATE_FUN.1, AGD_USR.1, AVA_SOF.1 ALC_DVS.2, AVA_VAN.5, ADV_ARC.1
heuristics/extracted_versions 5500, 10 2.0
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2014/62
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/06
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2014/62, ANSSI-CC-2016/75
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0640-2010, ANSSI-CC-2014/06, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0829-2012
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0118
  • certification_date: 01.09.2007
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 2.3
    • cert_link: https://www.ipa.go.jp/en/security/c0118_eimg.pdf
    • description: PRODUCT DESCRIPTION This product (bizhub PRO C5500 Image Control Program *1, that is installed with digital MFP (bizhub PRO C5500 Series) manufactured by Konica Minolta Business Technologies, Inc., is a software product for the purpose of reducing the risk for disclosure of document data in bizhub PRO C5500 Series. bizhub PRO C5500 Image Control Program prevents document data in bizhub PRO C5500 Series from disclosing during the use of functions such as copier and printer. It offers the protection function *2 with password lock system against the risk of reading data out illegally from HDD (Hard Disk Drive) which is a medium for storing temporarily document data. *1: shows “bizhub PRO C5500 / ineo+ 5500 Gazou Seigyo Program” for Japan and “bizhub PRO C5500 / ineo+ 5500 Image Control Program” for overseas. *2: HDD has the password so that it cannot be removed and read in another equipment. HDD lock password is set in the HDD lock function.
    • evaluation_facility: Mizuho Information & Research Institute, Inc.Center for Evaluation of Information Security
    • product: Japan : bizhub PRO C5500 / ineo+ 5500 Gazou Seigyo Program Overseas: bizhub PRO C5500 / ineo+ 5500 Image Control Program
    • product_type: IT Product (data protection function in digital MFD)
    • report_link: https://www.ipa.go.jp/en/security/c0118_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0118_est.pdf
    • toe_version: A0E70Y0-00I1-G00-10
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.10.2013
  • revalidations: [frozendict({'date': '2009-08', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0118_it7160_02.html'})]
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub PRO C5500 / ineo+ 5500 Gazou Seigyo Program A0E70Y0-00I1-G00-10
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0118_it7160.html
  • toe_overseas_name: bizhub PRO C5500/ineo+5500/bizhub PRO C5501/ ineo+5501 Image Control Program A0E70Y0-00I1-G00-60
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0829-2012
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0695-2011, BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0829-2012
maintenance_updates
pdf_data/report_filename c0118_erpt.pdf Rapport ANSSI-CC-2014_08fr.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 4
    • cert_id: ANSSI-CC-2014/08
    • cert_item: Application eTravel EAC v2.0, en configuration SAC, sur la carte à puce fermée MultiApp V3 masquée sur le composant M7820 A11
    • cert_item_version: Version de l’application eTravel EAC : 2.0 Version plateforme Java Card MultiApp : 3.0 Version du patch : 1.5
    • cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
    • developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: BSI-CC-PP-0068-V2, [PP SAC], version 1.0 Machine Readable Travel Document using Standard Inspection Procedure with PACE
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0118-01: 1
    • Certification No. C0118: 1
  • DE:
    • BSI-DSZ-CC-0829-2012: 3
  • FR:
    • ANSSI-CC-2014/06: 3
    • ANSSI-CC-2014/08: 22
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0068-V2: 1
    • BSI-CC-PP-0068-V2-2011: 1
    • BSI-PP- 0035-2007: 1
    • BSI-PP-0035-2007: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 1
    • EAL4: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 3
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_claims
  • T:
    • T.HDDACCESS: 1
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 39
  • Infineon:
    • Infineon: 2
    • Infineon Technologies: 23
    • Infineon Technologies AG: 1
pdf_data/report_keywords/eval_facility
  • CESTI:
    • CESTI: 1
  • Serma:
    • Serma Technologies: 3
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 1
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 3
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ICAO:
    • ICAO: 1
pdf_data/report_metadata
  • /Author: m-izumi
  • /CreationDate: D:20071112113529+09'00'
  • /Creator: PScript5.dll Version 5.2
  • /ModDate: D:20071112113529+09'00'
  • /Producer: Acrobat Distiller 8.0.0 (Windows)
  • /Title: <4D6963726F736F667420576F7264202D20495494468FD8373136302094468FD895F18D908F915F89708CEA94C52E646F63>
  • pdf_file_size_bytes: 347074
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 24
  • /Author: Duquesnoy
  • /CreationDate: D:20140318135125+01'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20140318135125+01'00'
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /Title: Microsoft Word - Rapport ANSSI-CC-2014_08fr.doc
  • pdf_file_size_bytes: 296543
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
pdf_data/st_filename c0118_est.pdf Cible ANSSI-CC-2014_08en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0829-2012: 1
  • NL:
    • CC-1: 6
    • CC-2: 4
    • CC-3: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0056-V2-2012: 1
    • BSI-CC-PP-0068-V2-2011: 1
    • BSI-PP-0035: 1
    • BSI-PP-0055: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 9
  • EAL:
    • EAL 5+: 1
    • EAL5: 2
    • EAL5 augmented: 2
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.3: 2
    • ACM_SCP.1: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.2: 2
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.1: 2
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
  • ADV:
    • ADV_ARC.1: 1
  • ALC:
    • ALC_DVS.2: 2
  • AVA:
    • AVA_VAN.5: 2
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ACC.1: 10
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 11
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
  • FIA:
    • FIA_AFL.1: 11
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_SOS.1: 23
    • FIA_SOS.1.1: 2
    • FIA_UAU.1: 7
    • FIA_UAU.2: 19
    • FIA_UAU.7: 13
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 7
    • FIA_UID.2: 14
  • FMT:
    • FMT_MOF.1: 26
    • FMT_MOF.1.1: 1
    • FMT_MSA.3: 3
    • FMT_MTD.1: 27
    • FMT_MTD.1.1: 3
    • FMT_SMF: 1
    • FMT_SMF.1: 15
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 27
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_RVM.1: 21
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 10
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 8
    • FAU_SAS.1: 5
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 23
    • FCS_CKM.1: 8
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 3
    • FCS_CKM.4: 16
    • FCS_CKM.4.1: 1
    • FCS_COP: 24
    • FCS_COP.1: 5
    • FCS_COP.1.1: 4
    • FCS_RND: 8
    • FCS_RND.1: 8
    • FCS_RND.1.1: 2
  • FDP:
    • FDP_ACC: 5
    • FDP_ACC.1: 3
    • FDP_ACC.1.1: 1
    • FDP_ACF: 7
    • FDP_ACF.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_ITC.1: 5
    • FDP_ITC.2: 5
    • FDP_RIP: 2
    • FDP_RIP.1: 1
    • FDP_RIP.1.1: 1
    • FDP_UCT: 2
    • FDP_UCT.1.1: 1
    • FDP_UIT: 2
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 12
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_API: 7
    • FIA_API.1: 4
    • FIA_API.1.1: 1
    • FIA_SOS.2: 1
    • FIA_UAU: 25
    • FIA_UAU.1: 2
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4: 1
    • FIA_UAU.4.1: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6.1: 1
    • FIA_UID: 11
    • FIA_UID.1: 3
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
  • FMT:
    • FMT_LIM: 6
    • FMT_LIM.1: 15
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 14
    • FMT_LIM.2.1: 3
    • FMT_MSA.1: 1
    • FMT_MSA.3: 2
    • FMT_MTD: 15
    • FMT_MTD.1: 1
    • FMT_MTD.1.1: 4
    • FMT_SMF.1: 13
    • FMT_SMF.1.1: 1
    • FMT_SMR: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 6
    • FPT_EMS.1: 6
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS: 1
    • FPT_FLS.1: 2
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 4
    • FPT_PHP.3.1: 1
    • FPT_TST: 3
    • FPT_TST.1: 3
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 5
    • FTP_ITC.1: 2
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • O:
    • O.IA: 7
    • O.MANAGE: 5
  • OE:
    • OE.ADMIN: 4
    • OE.CE: 4
    • OE.HDD: 6
    • OE.NET: 4
    • OE.SECMOD: 4
    • OE.SECRET: 3
  • T:
    • T.HDDACCESS: 3
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 410
pdf_data/st_keywords/eval_facility
  • Serma:
    • Serma Technologies: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 8
  • DES:
    • 3DES:
      • 3DES: 2
      • TDES: 5
      • Triple-DES: 3
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDH: 6
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 3
      • Diffie-Hellman: 5
  • RSA:
    • RSA 1024: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-224: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 4
  • MAC:
    • MAC: 6
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 109
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • Physical Tampering: 2
    • Physical tampering: 2
    • fault injection: 1
    • malfunction: 4
  • SCA:
    • DPA: 2
    • Leak-Inherent: 1
    • SPA: 1
    • physical probing: 3
    • timing attacks: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 3
    • EF.DG1: 7
    • EF.DG15: 2
    • EF.DG16: 5
    • EF.DG2: 5
    • EF.DG3: 1
    • EF.DG4: 1
    • EF.DG5: 1
    • EF.DG6: 2
    • EF.SOD: 4
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2005-003-003: 1
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 1
  • ISO:
    • ISO/IEC 15408: 6
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS 186-3: 1
    • FIPS 197: 1
    • FIPS PUB 46-3: 1
    • FIPS180-2: 1
    • FIPS46-3: 1
  • ICAO:
    • ICAO: 12
  • ISO:
    • ISO/IEC 14443: 4
    • ISO/IEC 7816-4: 1
  • NIST:
    • SP 800-67: 1
  • PKCS:
    • PKCS#3: 2
  • RFC:
    • RFC 3369: 1
  • SCP:
    • SCP01: 1
    • SCP02: 1
    • SCP03: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • to the plastic travel document is achieved by physical and organisational security measures being out of scope of the current ST. The TOE comprises: i) the circuitry of the contactless/contact chip incl. all IC: 1
pdf_data/st_metadata
  • /CreationDate: D:20071113094330+09'00'
  • /ModDate: D:20071113094330+09'00'
  • /Producer: Acrobat Distiller 5.0.5 (Windows)
  • pdf_file_size_bytes: 618679
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 61
  • /Author: Antoine de Lavernette
  • /CreationDate: D:20140123162320+01'00'
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: Security Target, CC, eTravel
  • /ModDate: D:20140123162320+01'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: MRTD
  • /Title: eTravel EAC v2 Security Target
  • pdf_file_size_bytes: 889635
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 65
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different