Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Scrambler Board GP-1010 V2.0 for the e-STUDIO 550/650/810
JISEC-CC-CRP-C0005
ID-One Cosmo V7.0-n SmartCard in configuration Basic on NXP P5CC037 V0A
ANSSI-CC-2009/49
name Scrambler Board GP-1010 V2.0 for the e-STUDIO 550/650/810 ID-One Cosmo V7.0-n SmartCard in configuration Basic on NXP P5CC037 V0A
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP FR
not_valid_after 10.12.2010 01.09.2019
not_valid_before 16.03.2004 19.11.2009
report_link https://www.commoncriteriaportal.org/files/epfiles/c0005.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc_2009-49en.pdf
st_link https://www.commoncriteriaportal.org/files/epfiles/ https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-cible_2009-49en.pdf
manufacturer Toshiba TEC Corporation Oberthur Card System / Philips (NXP)
manufacturer_web https://www.oberthur.com/
security_level EAL2 EAL5+
dgst 425cad8b5d70f463 b85325d7a479f5e7
heuristics/cert_id JISEC-CC-CRP-C0005 ANSSI-CC-2009/49
heuristics/cert_lab [] THALES
heuristics/extracted_sars {} ALC_DVS.2, AVA_VAN.5, ADV_IMP.2, AVA_MSU.3, AVA_VLA.4
heuristics/extracted_versions 2.0 7.0
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0465-2008
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0465-2008
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0005
  • certification_date: 01.03.2004
  • claim: EAL2
  • enhanced:
    • assurance_level: EAL2
    • cert_link: https://www.ipa.go.jp/en/security/c0005_eimg.pdf
    • description: PRODUCT DESCRIPTION The TOE includes a single piece of hardware which encrypts/decrypts image data (hereinafter called "the Scrambler Board"). The Scramble Board is used for mitigating risks that image data, which remains in a digital copier after a copy is made on a sheet of paper (hereinafter called "the User's Residual Document Data"), may by disclosed. The TOE also includes software which has two functions: one function encrypts image data of paper document when the image data is converted into an electronic form, and the other function clears entire actual data area where the image data, written on a HDD, exists. The TOE is an optional function to Toshiba TEC Corporation's digital copier, "e-STUDIO 550/650/810".
    • evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology securitycenter (JEITA ITSC)
    • product: Scrambler Board GP-1010 V2.0 for the e-STUDIO 550/650/810
    • product_type: IT Product (Data protection function for the digital copier )
    • vendor: TOSHIBA TEC CORPORATION
  • expiration_date: 01.01.2011
  • supplier: TOSHIBA TEC CORPORATION
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0005_it3018.html
  • toe_japan_name: Scrambler-board GP-1010 V2.0
  • toe_overseas_link: None
  • toe_overseas_name: -----
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0465-2008
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0465-2008
maintenance_updates
protection_profile_links {} {}
pdf_data/report_filename c0005.pdf anssi-cc_2009-49en.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 5 augmented ADV_IMP.2, ALC_DVS.2, AVA_VAN.5
    • cc_version: Common Criteria version 3.1
    • cert_id: ANSSI-CC-2009/49
    • cert_item: ID-One Cosmo V7.0-n SmartCard in configuration Basic on NXP P5CC037 V0A
    • cert_item_version: JavaCard Platform version for any configuration: 7.0-n Optional Code r4.0 Generic version for any configuration: 069774
    • cert_lab: THALES - CEACI (T3S – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France Phone: +33 (0)5 62 88 28 01 or 18, email : [email protected]
    • developer: Oberthur Technologies1 50 quai Michelet 92300 Levallois-Perret, France NXP Semiconductors GmbH1 Stresemannallee 101 D-22502 Hamburg, Germany Sponsor Oberthur Technologies 50 quai Michelet, 92300 Levallois-Perret, France
    • match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements']
    • ref_protection_profiles: PP/0304] Java Card System - Standard 2.1.1 Configuration Protection Profile – version 1.0b, August 2003 Certified by ANSSI
pdf_data/report_keywords/cc_cert_id
  • JP:
    • Certification No. C0005: 1
  • DE:
    • BSI-DSZ-CC-0465-2008: 2
  • FR:
    • ANSSI-CC-2009/49: 18
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002-2001: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 1
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 4: 1
    • EAL 5: 3
    • EAL 5 augmented: 2
    • EAL 7: 1
    • EAL4: 1
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 and: 1
pdf_data/report_keywords/cc_sar
  • ADO:
    • ADO_DEL: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_IMP.2: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_MSU.3: 1
    • AVA_VAN: 1
    • AVA_VAN.5: 1
    • AVA_VLA.4: 1
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 24
    • NXP Semiconductors: 3
  • Oberthur:
    • Oberthur: 2
    • Oberthur Technologies: 15
pdf_data/report_keywords/eval_facility
  • Thales:
    • THALES - CEACI: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 1
  • SCP:
    • SCP01: 1
    • SCP02: 1
    • SCP03: 1
pdf_data/report_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 1
  • JavaCard:
    • Java Card 2.2.2: 1
pdf_data/report_metadata
  • /CreationDate: D:20040526154004+09'00'
  • /ModDate: D:20040526154004+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 13611
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20100204113205+01'00'
  • /Keywords:
  • /ModDate: D:20100204113205+01'00'
  • /Producer: Acrobat Distiller 8.0.0 (Windows)
  • pdf_file_size_bytes: 156868
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename anssi-cc-cible_2009-49en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0465: 1
    • BSI-DSZ-CC-0465-: 1
    • BSI-DSZ-CC-0465-2008: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL5: 3
    • EAL5 augmented: 3
    • EAL5+: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_IMP.2: 4
  • ALC:
    • ALC_DVS.2: 3
  • AVA:
    • AVA_VAN.5: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP: 2
    • FAU_ARP.1: 4
    • FAU_GEN: 1
    • FAU_GEN.1: 2
    • FAU_SAA: 1
    • FAU_SAA.1: 2
    • FAU_SAR: 1
    • FAU_SAR.1: 2
  • FCO:
    • FCO_NRO: 3
    • FCO_NRO.2: 9
  • FCS:
    • FCS_CKM: 5
    • FCS_CKM.1: 3
    • FCS_CKM.2: 1
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 1
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 2
    • FCS_CKM.4.1: 1
    • FCS_COP: 6
    • FCS_COP.1: 6
    • FCS_COP.1.1: 1
    • FCS_RND: 1
    • FCS_RNG: 4
    • FCS_RNG.1: 7
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC: 5
    • FDP_ACC.2: 9
    • FDP_ACF: 4
    • FDP_ACF.1: 18
    • FDP_IFC: 2
    • FDP_IFC.1: 1
    • FDP_IFC.2: 2
    • FDP_IFF: 2
    • FDP_IFF.1: 10
    • FDP_ITC: 2
    • FDP_ITC.1: 3
    • FDP_ITC.2: 5
    • FDP_RIP: 9
    • FDP_RIP.1: 10
    • FDP_ROL: 1
    • FDP_ROL.1: 2
    • FDP_SDI.1: 1
    • FDP_SDI.1.1: 1
    • FDP_SDI.2: 1
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT: 1
    • FDP_UCT.1: 1
    • FDP_UIT: 1
    • FDP_UIT.1: 2
  • FIA:
    • FIA_AFL: 4
    • FIA_AFL.1: 8
    • FIA_ATD: 2
    • FIA_ATD.1: 3
    • FIA_UAU: 6
    • FIA_UAU.1: 4
    • FIA_UAU.4: 2
    • FIA_UAU.7: 2
    • FIA_UID: 4
    • FIA_UID.1: 6
    • FIA_UID.2: 1
    • FIA_USB.1: 2
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF: 2
    • FMT_MOF.1: 2
    • FMT_MSA: 11
    • FMT_MSA.1: 6
    • FMT_MSA.2: 1
    • FMT_MSA.3: 8
    • FMT_MTD: 3
    • FMT_MTD.1: 3
    • FMT_MTD.2: 2
    • FMT_MTD.3: 1
    • FMT_MTD.3.1: 1
    • FMT_SMF: 4
    • FMT_SMF.1: 4
    • FMT_SMR: 6
    • FMT_SMR.1: 9
    • FMT_SMR.2: 6
  • FPR:
    • FPR_UNO: 4
    • FPR_UNO.1: 5
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS: 5
    • FPT_FLS.1: 5
    • FPT_PHP: 3
    • FPT_PHP.2: 3
    • FPT_PHP.3: 2
    • FPT_RCV: 3
    • FPT_RCV.3: 8
    • FPT_RCV.4: 1
    • FPT_TDC: 1
    • FPT_TDC.1: 3
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 2
    • FPT_TST.1: 6
  • FRU:
    • FRU_FLT: 1
    • FRU_FLT.1: 1
    • FRU_RSA: 1
    • FRU_RSA.1: 1
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.APPLET: 1
    • A.NATIVE: 1
    • A.VERIFICATION: 1
  • D:
    • D.API_DATA: 3
    • D.APPLILIFECYC: 1
    • D.APP_CODE: 5
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 3
    • D.ARRAY: 3
    • D.AUDITLOG: 1
    • D.CONFIG: 2
    • D.CRYPTO: 4
    • D.GLPIN: 1
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.KEY: 2
    • D.LOADFILE: 1
    • D.NB_REMAINTRYGLB: 1
    • D.PIN: 6
    • D.SEC_DATA: 7
    • D.SENSITIVE_DATA: 1
  • O:
    • O.ALARM: 1
    • O.APPLET: 16
    • O.CARD-MANAGEMENT: 3
    • O.CIPHER: 1
    • O.CODE_PCKG: 8
    • O.CODE_PKG: 6
    • O.DELETION: 1
    • O.FIREWALL: 1
    • O.INSTALL: 1
    • O.JAVAOBJEC: 4
    • O.JAVAOBJECT: 31
    • O.KEY-MNGT: 1
    • O.LOAD: 3
    • O.NATIVE: 1
    • O.OBJ-DELETION: 1
    • O.OPERATE: 1
    • O.PIN-MNGT: 1
    • O.REALLOCATION: 1
    • O.RESOURCES: 1
    • O.SCP: 3
    • O.SECURE_COMPARE: 1
    • O.SHRD_VAR_CONFID: 1
    • O.SHRD_VAR_INTEG: 1
    • O.SID: 1
    • O.TRANSACTION: 1
  • OE:
    • OE.APPLET: 1
    • OE.NATIVE: 1
    • OE.VERIFICATION: 1
  • OP:
    • OP.ARRAY_ACCESS: 3
    • OP.CREATE: 5
    • OP.DELETE_APPLET: 3
    • OP.DELETE_PCKG: 2
    • OP.DELETE_PCKG_APPLET: 2
    • OP.INSTANCE_FIELD: 2
    • OP.INVK_INTERFACE: 4
    • OP.INVK_VIRTUAL: 3
    • OP.JAVA: 4
    • OP.PUT: 4
    • OP.RECEIVE: 1
    • OP.SEND: 1
    • OP.THROW: 3
    • OP.TYPE_ACCESS: 3
  • OSP:
    • OSP.VERIFICATION: 1
  • R:
    • R.JAVA: 9
  • T:
    • T.CONFID-APPLI-DATA: 1
    • T.CONFID-JCS-CODE: 1
    • T.CONFID-JCS-DATA: 1
    • T.CONFIGURATION: 2
    • T.CONF_DATA_APPLET: 2
    • T.DELETION: 1
    • T.EXE-CODE: 2
    • T.INSTALL: 1
    • T.INTEG-APPLI-CODE: 4
    • T.INTEG-APPLI-DATA: 4
    • T.INTEG-APPLICODE: 1
    • T.INTEG-APPLIDATA: 1
    • T.INTEG-JCS-CODE: 1
    • T.INTEG-JCS-DATA: 1
    • T.NATIVE: 1
    • T.OBJ-DELETION: 1
    • T.PHYSICAL: 1
    • T.RESSOURCES: 1
    • T.SID: 2
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 4
  • Oberthur:
    • OBERTHUR: 2
    • Oberthur: 1
    • Oberthur Technologies: 182
pdf_data/st_keywords/eval_facility
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • 3DES:
      • 3DES: 1
      • TDES: 4
    • DES:
      • DES: 19
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • Diffie-Hellman: 4
pdf_data/st_keywords/pq_crypto
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 8
pdf_data/st_keywords/cipher_mode
pdf_data/st_keywords/ecc_curve
pdf_data/st_keywords/crypto_engine
pdf_data/st_keywords/tls_cipher_suite
pdf_data/st_keywords/crypto_library
pdf_data/st_keywords/vulnerability
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
    • malfunction: 2
    • physical tampering: 4
  • SCA:
    • DPA: 1
    • SPA: 1
    • physical probing: 2
  • other:
    • JIL: 1
pdf_data/st_keywords/technical_report_id
pdf_data/st_keywords/device_model
pdf_data/st_keywords/tee_name
pdf_data/st_keywords/os_name
pdf_data/st_keywords/cplc_data
pdf_data/st_keywords/ic_data_group
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 180-3: 1
    • FIPS PUB 180-2: 1
    • FIPS PUB 186-2: 1
    • FIPS PUB 46-3: 5
    • FIPS PUB 81: 4
  • PKCS:
    • PKCS#1: 2
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 5
  • JavaCard:
    • Java Card 2.2.2: 5
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 3
pdf_data/st_keywords/javacard_packages
  • java:
    • java.rmi: 1
  • javacard:
    • javacard.framework: 3
    • javacard.security: 1
  • javacardx:
    • javacardx.framework.util: 1
pdf_data/st_keywords/certification_process
pdf_data/st_metadata
  • /CreationDate: D:20091125163231+01'00'
  • /Keywords:
  • /ModDate: D:20091125163231+01'00'
  • /Producer: AFPL Ghostscript 8.50
  • pdf_file_size_bytes: 639639
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 89
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/convert_ok False True
state/st/download_ok False True
state/st/extract_ok False True
state/st/pdf_hash Different Different
state/st/txt_hash Different Different