name |
Votiro Secure Data Sanitization Engine Version 7.1
|
Ricoh imagio MP 5000SP/4000SP with security card Type 9 Version: - Firmware Configuration System Version V2.16-00 System/Copy 1.11.1, Network Support 7.26, Network DocBox 1.10C, Web Support 1.59, Web Uapl 1.15, animation 1.3, Scanner 01.24, RPDL 7.33, Printer 1.11, MSIS 7.15.02, RPCS Font 1.01, Engine 1.04:05, OpePanel 1.01, LANG0 1.01, LANG1 1.01, ADF 15.000:15, - ASIC Ic Key 1100 - Option Data Erase Opt 1.01m
|
category |
Other Devices and Systems
|
Multi-Function Devices
|
not_valid_before |
2017-11-08
|
2010-02-25
|
not_valid_after |
2022-11-08
|
2015-03-01
|
scheme |
AU
|
JP
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_Votiro_SDS_v1.2.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0246_est.pdf
|
status |
archived
|
archived
|
manufacturer |
Votiro Cybersec Limited
|
Ricoh Company, Ltd.
|
manufacturer_web |
https://www.votiro.com/
|
https://www.ricoh.com/
|
security_level |
EAL2 |
ALC_FLR.2, EAL3+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CR_2017_110_Votiro_SDS_v7.1.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0246_erpt.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFS-T049%20EPL%20copy%20of%20certificate.pdf
|
None
|
protection_profiles |
|
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.1™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': None}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
True
|
False
|
state/cert/download_ok |
True
|
False
|
state/cert/extract_ok |
True
|
False
|
state/cert/pdf_hash |
9a4fe62643b3f086b0c1b9c9aa876e24d89f4afa7c3998c36b48aed590c64df7
|
None
|
state/cert/txt_hash |
b9579ee679d7454bb669211272b600b5fbffd6335969f6ff694e6ac1c11866ff
|
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
476b0420fd2a7f8f4dae6702a25a59452b7cf523f445d8ca88f9543b200e27f7
|
7fa424b1dd452cb2c7793a3a8bece7e5e5410ba457ff44bb46ecb91b0d9d645f
|
state/report/txt_hash |
ef33e3f6baa54aa4a01e3f9a0ab020b8dfe530b2fa6df1f106f30f37f49753ce
|
5710d2d89500845be1fd471294a614fc1a27e0cf8b667c6d9e0c0dd45701409c
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
18c4b20590d55c0b76147bd5d3a87962db5969b4bfdf4f7dd53c99bda5d97c68
|
4b88251809d96351ffcb5e2065b5c303a9dc0305316eec39aeae2ab7bd136885
|
state/st/txt_hash |
0c9539bc33919dadbc3c07ba9062be547b54ed88f6493e0807c86bb1213ef64d
|
e3085316072214aba0f74dd921d8747846705a1f62f96a828b9949928b327ab0
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
Certificate Number: 2017/110
|
JISEC-CC-CRP-C0246
|
heuristics/cert_lab |
None
|
None
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
7.1 |
1.01, 1.11, 01.24, 7.26, 1.3, 15.000, 1.04, 7.33, 1.59, 1.11.1, 1.15, 1.10, 2.16, 7.15.02 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/scheme_data |
None
|
- cert_id:
C0246
- supplier:
RICOH COMPANY, LTD.
- toe_overseas_name:
-----
- expiration_date:
2015-03
- claim:
EAL3+
ALC_FLR.2
PP
- certification_date:
2010-02
- toe_overseas_link:
None
- toe_japan_name:
Ricoh imagio MP 5000SP/4000SP
with security card Type 9
- Firmware Configuration
System VersionV2.16-00
System/Copy1.11.1,
Network Support7.26,
Network DocBox1.10C,
Web Support1.59,
Web Uapl1.15, animation1.3,
Scanner01.24,
RPDL7.33,
Printer;1.11,
MSIS7.15.02,
RPCS Font1.01,
Engine1.04:05,
OpePanel1.01,
LANG01.01,
LANG11.01,
ADF15.000:15
- ASIC
Ic Key1100
- Option
Data Erase Opt1.01m
- toe_japan_link:
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0246_it9257.html
- enhanced:
- product:
Ricoh imagio MP 5000SP/4000SP with security card Type 9
- toe_version:
- Firmware Configuration
System VersionV2.16-00
System/Copy1.11.1
Network Support7.26
Network DocBox1.10C
Web Support1.59
Web Uapl1.15
animation1.3
Scanner01.24
RPDL7.33
Printer1.11
MSIS7.15.02
RPCS Font1.01
Engine1.04:05
OpePanel1.01
LANG01.01
LANG11.01
ADF15.000:15
- ASIC
Ic Key1100
- Option
Data Erase Opt1.01m
- product_type:
Multi Function Product
- certification_date:
2010-02-25
- cc_version:
3.1
- assurance_level:
EAL3 Augmented with ALC_FLR.2
- protection_profile:
2600.1, Protection Profile for Hardcopy Devices, Operational Environment A 1.0, dated June 2009
- vendor:
RICOH COMPANY, LTD.
- evaluation_facility:
Electronic Commerce Security Technology Laboratory Inc.
Evaluation Center
- report_link:
https://www.ipa.go.jp/en/security/c0246_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0246_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0246_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE conforms to the international security standard: "IEEE Std 2600.1TM-2009" security Protection Profile for Digital Multi-function Products. The TOE is a digital Multi-function Product which is composed of Copy Function, Scanner Function, Printer Function and Document Server Function, and it creates a safe environment for customers to use the functions.
TOE security functionality
The main security functions are described as follows:
-
Audit Function: to generate / review audit log of the event.
-
Identification and Authentication Function: to identify and authenticate users, to lock out, to protect passwords, and to enforce automated logout.
-
Access Control Function: to control available functions for each user, and to control the document operation.
-
Network Protection Function: to protect information on the Network with use of the encrypted communication.
-
Residual Data Delete Function: to overwrite the residual data on the Hard Disk with the specific pattern data.
-
Security Management Function: to make the administrators control the security functions.
-
Software Verification Function: to ensure the genuine control software by verifying the integrity of the executable codes.
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
EFS-T049 EPL copy of certificate.pdf
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
- cc_cert_id:
- AU:
- Certificate Number: 2017/110:
1
- cc_protection_profile_id:
- cc_security_level:
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
None
|
pdf_data/cert_metadata |
- pdf_file_size_bytes:
833849
- pdf_is_encrypted:
False
- pdf_number_of_pages:
1
- /Title:
KM_C364e-20171116083920
- /Creator:
KM_C364e
- /Producer:
KONICA MINOLTA bizhub C364e
- /CreationDate:
D:20171116083920+10'00'
- /ModDate:
D:20171116083920+10'00'
- pdf_hyperlinks:
|
None
|
pdf_data/report_filename |
CR_2017_110_Votiro_SDS_v7.1.pdf
|
c0246_erpt.pdf
|
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- Certification Report 2017/110:
1
- AU:
- Certification Report 2017/110:
1
|
- JP:
- CRP-C0246-01:
1
- Certification No. C0246:
1
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NO_EVIL:
1
- A.INSTALL:
1
- A.PHYSICAL_PROTECT:
1
- A.LOGICAL_PROTECT:
1
- A.TIME:
1
- A.CRYPTO:
1
|
- T:
- T.DOC:
2
- T.FUNC:
1
- T.PROT:
1
- T.CONF:
2
- A:
- A.ACCESS:
1
- A.USER:
1
- A.ADMIN:
2
|
pdf_data/report_keywords/cc_claims/A |
- A.NO_EVIL:
1
- A.INSTALL:
1
- A.PHYSICAL_PROTECT:
1
- A.LOGICAL_PROTECT:
1
- A.TIME:
1
- A.CRYPTO:
1
|
- A.ACCESS:
1
- A.USER:
1
- A.ADMIN:
2
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
|
- EAL3:
3
- EAL3 augmented:
2
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- out of scope:
1
- initialisation of the TOE is handled by the underlying OS on which it is installed and therefore out of scope of this evaluation. Email integration and virus inspection have not been tested as part of this:
1
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
- BAE:
- BAE Applied Intelligence:
2
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2006-09-001:
2
- CCMB-2007-09-002:
2
- CCMB-2007-09-003:
2
- CCMB-2007-09-004:
2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
67576
- pdf_is_encrypted:
False
- pdf_number_of_pages:
18
- /Author: Terence.caulfield
- /CreationDate:
D:20171116111535+11'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate:
D:20171116111535+11'00'
- /Producer:
Acrobat Distiller 15.0 (Windows)
- /Title:
Microsoft Word - R32170506
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
230440
- pdf_is_encrypted:
False
- pdf_number_of_pages:
29
- /ModDate:
D:20100629170727+09'00'
- /CreationDate:
D:20100629170727+09'00'
- /Title:
untitled
- /Producer:
Acrobat Distiller 6.0 (Windows)
- pdf_hyperlinks:
|
pdf_data/report_metadata//CreationDate |
D:20171116111535+11'00'
|
D:20100629170727+09'00'
|
pdf_data/report_metadata//ModDate |
D:20171116111535+11'00'
|
D:20100629170727+09'00'
|
pdf_data/report_metadata//Producer |
Acrobat Distiller 15.0 (Windows)
|
Acrobat Distiller 6.0 (Windows)
|
pdf_data/report_metadata//Title |
Microsoft Word - R32170506
|
untitled
|
pdf_data/report_metadata/pdf_file_size_bytes |
67576
|
230440
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
18
|
29
|
pdf_data/st_filename |
ST_Votiro_SDS_v1.2.pdf
|
c0246_est.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims/A |
- A.NO_EVIL:
2
- A.INSTALL:
2
- A.PHYSICAL_PROTECT:
2
- A.LOGICAL_PROTECT:
2
- A.TIME:
2
- A.CRYPTO:
2
|
- A.ACCESS:
5
- A.USER:
4
- A.ADMIN:
10
|
pdf_data/st_keywords/cc_claims/O |
- O.AUDIT:
3
- O.RESOURCE_MANAGME: 1
- O.CDR: 2
- O.ANONYMITY: 2
- O.FAILSAFE: 3
- O.FILE_RETRIEVAL: 3
- O.RESOURCE_MANAGMENT: 2
- O.POLICY: 1
|
- O.DOC: 18
- O.FUNC: 9
- O.PROT: 9
- O.CONF: 18
- O.USER: 21
- O.INTERFACE: 9
- O.SOFTWARE: 9
- O.AUDIT:
9
|
pdf_data/st_keywords/cc_claims/O/O.AUDIT |
3
|
9
|
pdf_data/st_keywords/cc_claims/OE |
- OE.INSTALL:
2
- OE.LOGICAL_SECURITY:
1
- OE.NO_EVIL:
2
- OE.PHYSICAL_SECURITY:
2
- OE.TIME:
2
- OE.CRYPTO:
2
- OE.LOGICAL_PROTECT:
1
|
- OE.AUDIT_STORAGE:
4
- OE.AUDIT_ACCESS:
3
- OE.INTERFACE:
4
- OE.PHYSICAL:
1
- OE.USER:
21
- OE.ADMIN:
8
- OE.AUDIT:
3
- OE.AUDIT_ACCESS_AUTHORIZED:
1
- OE.PHYISCAL:
3
|
pdf_data/st_keywords/cc_claims/T |
- T.UNAUTHORISED_ACCESS:
2
- T.DENIAL_OF_SERVICE:
2
- T.MALICIOUS_FILES:
2
- T.UNAUTHORISED_DOWNLOAD:
2
|
- T.DOC:
10
- T.FUNC:
5
- T.PROT:
5
- T.CONF:
10
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- ADV_ARC.1:
1
|
- ADV_ARC.1:
1
- ADV_FSP.3: 1
- ADV_TDS.2: 2
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1:
1
|
- ALC_FLR.2: 3
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1:
1
- ALC_DVS.1: 2
- ALC_LCD.1: 1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE |
- ASE_INT: 3
- ASE_CCL: 3
- ASE_SPD: 3
- ASE_OBJ: 3
- ASE_ECD: 3
- ASE_REQ: 3
- ASE_TSS: 3
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_SPD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_IND.2:
1
- ATE_COV.1: 1
- ATE_FUN.1:
1
|
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.2 |
1
|
2
|
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1:
5
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FCS:
- FDP:
- FDP_CDR_EXT.1:
9
- FDP_IFF.1:
6
- FDP_CDR_EXT.1.1:
2
- FDP_CDR_EXT.1.2:
2
- FDP_CDR_EXT.1.3:
2
- FDP_CDR_EXT.1.4:
2
- FDP_CDR_EXT.1.5:
2
- FDP_IFC.1:
6
- FDP_RIP.2:
5
- FDP_IFC.1.1:
1
- FDP_IFF.1.1:
1
- FDP_IFF.1.2:
1
- FDP_IFF.1.3:
1
- FDP_IFF.1.4:
1
- FDP_IFF.1.5:
1
- FDP_RIP.2.1:
1
- FDP_ACC.1:
1
- FIA:
- FMT:
- FMT_MSA.1:
5
- FMT_MSA.3:
6
- FMT_SAE.1:
7
- FMT_SMF.1:
7
- FMT_SMR.1:
6
- FMT_MSA.1.1:
1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_SAE.1.1:
1
- FMT_SAE.1.2:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPR:
- FPR_UNL.1:
5
- FPR_UNL.1.1:
1
- FPT:
- FPT_FLS.1:
6
- FPT_STM.1:
7
- FPT_FLS.1.1:
1
- FPT_STM.1.1:
1
- FRU:
- FRU_FLT.1:
5
- FRU_RSA.1:
5
- FRU_FLT.1.1:
1
- FRU_RSA.1.1:
1
|
- FAU:
- FAU_STG.1:
9
- FAU_STG.4:
8
- FAU_SAR.1:
10
- FAU_SAR.2:
7
- FAU_GEN.1:
12
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2:
6
- FAU_GEN.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3:
1
- FAU_STG.4.1:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
- FDP:
- FDP_IFF:
1
- FDP_IFC:
1
- FDP_ACF.1:
27
- FDP_ACC.1:
29
- FDP_ACC.1.1:
2
- FDP_ACF.1.1:
2
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
2
- FDP_ACF.1.4:
2
- FDP_RIP.1:
6
- FDP_RIP.1.1:
1
- FDP_IFC.1:
4
- FIA:
- FIA_AFL.1:
8
- FIA_UAU.7:
7
- FIA_SOS.1:
8
- FIA_UAU.1:
14
- FIA_UID.1:
17
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1:
9
- FIA_ATD.1.1:
1
- FIA_SOS.1.1:
1
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.7.1:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_USB.1:
7
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FMT:
- FMT_SMF.1:
20
- FMT_SMR.1:
26
- FMT_MSA.3:
24
- FMT_MSA.1:
23
- FMT_MSA.1.1:
2
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MTD.1:
11
- FMT_MTD.1.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FPT_FDI_EXP:
4
- FPT_FDI_EXP.1:
11
- FPT_FDI_EXP.1.1:
2
- FPT_STM.1:
9
- FPT_TST.1:
6
- FPT_STM.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FTA:
- FTA_SSL.3:
10
- FTA_SSL.3.1:
1
- FTP:
- FTP_ITC.1:
18
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TST.1:
1
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_GEN.1:
5
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
|
- FAU_STG.1: 9
- FAU_STG.4: 8
- FAU_SAR.1: 10
- FAU_SAR.2: 7
- FAU_GEN.1:
12
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4.1: 1
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2.1: 1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 |
5
|
12
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_CDR_EXT.1: 9
- FDP_IFF.1: 6
- FDP_CDR_EXT.1.1: 2
- FDP_CDR_EXT.1.2: 2
- FDP_CDR_EXT.1.3: 2
- FDP_CDR_EXT.1.4: 2
- FDP_CDR_EXT.1.5: 2
- FDP_IFC.1:
6
- FDP_RIP.2: 5
- FDP_IFC.1.1: 1
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_RIP.2.1: 1
- FDP_ACC.1:
1
|
- FDP_IFF: 1
- FDP_IFC: 1
- FDP_ACF.1: 27
- FDP_ACC.1:
29
- FDP_ACC.1.1: 2
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FDP_IFC.1:
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
1
|
29
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
6
|
4
|
pdf_data/st_keywords/cc_sfr/FIA |
|
- FIA_AFL.1: 8
- FIA_UAU.7: 7
- FIA_SOS.1: 8
- FIA_UAU.1: 14
- FIA_UID.1:
17
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1.1: 1
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7.1: 1
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
1
|
17
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MSA.1:
5
- FMT_MSA.3:
6
- FMT_SAE.1: 7
- FMT_SMF.1:
7
- FMT_SMR.1:
6
- FMT_MSA.1.1:
1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
|
- FMT_SMF.1:
20
- FMT_SMR.1:
26
- FMT_MSA.3:
24
- FMT_MSA.1:
23
- FMT_MSA.1.1:
2
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MTD.1: 11
- FMT_MTD.1.1: 1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
5
|
23
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
6
|
24
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
7
|
20
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
6
|
26
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_FLS.1: 6
- FPT_STM.1:
7
- FPT_FLS.1.1: 1
- FPT_STM.1.1:
1
|
- FPT_FDI_EXP: 4
- FPT_FDI_EXP.1: 11
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1:
9
- FPT_TST.1: 6
- FPT_STM.1.1:
1
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 |
7
|
9
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1.1 |
1
|
1
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2006-09-001:
1
- CCMB-2007-09-002:
1
- CCMB-2007-09-003:
1
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata//Author |
Terence.caulfield
|
|
pdf_data/st_metadata//CreationDate |
D:20171116130507+11'00'
|
D:20100618152326+09'00'
|
pdf_data/st_metadata//Creator |
PScript5.dll Version 5.2.2
|
PScript5.dll Version 5.2.2
|
pdf_data/st_metadata//ModDate |
D:20171116130507+11'00'
|
D:20100618152326+09'00'
|
pdf_data/st_metadata//Producer |
Acrobat Distiller 15.0 (Windows)
|
Acrobat Distiller 7.0.5 (Windows)
|
pdf_data/st_metadata//Title |
Microsoft Word - R31681197
|
Microsoft Word - C0246ST_eng_2010-6-18.doc
|
pdf_data/st_metadata/pdf_file_size_bytes |
183112
|
464939
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
28
|
65
|
dgst |
4854f479d7e5a37e
|
93cdda41b5a03cdf
|