name |
Data Security Kit(D) Software V1.00E |
Applet CryptoSmart V2.0 on platform Oberthur COSMO64RSA D V5.2 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
FR |
status |
archived |
archived |
not_valid_after |
31.01.2013 |
01.09.2019 |
not_valid_before |
31.10.2006 |
01.12.2005 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/files/epfiles/c0057_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2005_42.pdf |
st_link |
https://www.commoncriteriaportal.org/files/epfiles/ |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2005_42.pdf |
manufacturer |
KYOCERA MITA Corporation |
ERCOM SA. |
manufacturer_web |
|
https://www.ercom.fr |
security_level |
EAL3 |
EAL2+, ALC_FLR.3, ADV_LLD.1, ADV_HLD.2, AVA_VLA.2, ADV_IMP.1, ALC_DVS.1, ALC_TAT.1, AVA_MSU.1 |
dgst |
48b4705efb8d55e7 |
ae17d8fbc713b10c |
heuristics/cert_id |
JISEC-CC-CRP-C0057 |
ANSSI-CC-2005/42 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ATE_IND.2, ADV_IMP.1, AVA_MSU.1, ADV_RCR.1, ADV_SPM.1, ALC_TAT.1, ASE_ENV.1, ASE_INT.1, AVA_SOF.1, ATE_COV.1, ADV_FSP.1, AGD_ADM.1, ASE_DES.1, ATE_FUN.1, ASE_OBJ.1, ASE_TSS.1, AGD_USR.1, ASE_PPC.1, ALC_FLR.3, ALC_DVS.1, AVA_VLA.2, ASE_SRE.1, ADV_HLD.2, ADV_LLD.1, ASE_REQ.1 |
heuristics/extracted_versions |
1.00 |
2.0, 5.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0227-2004, ANSSI-CC-2002/05 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0227-2004, ANSSI-CC-2002/05 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0057
- certification_date: 01.10.2006
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.1
- cert_link: https://www.ipa.go.jp/en/security/c0057_eimg.pdf
- description: PRODUCT DESCRIPTION This TOE is a software module that is installed on the MFPs "KM-C2520/KM-C3225/KM-C3232, CS-C2520/CS-C3225/CS-C3232" of KYOCERA MITA Corporation, and which provides the ordinary functions, and also security functions for protecting residue data. This TOE is installed on the above-mentioned MFPs and protects image data remaining on the HDDs from unjust exposure, after various copying, printing, and network scanning processings, by providing an HDD overwriting function. And it has the administrator authentication function that identifies and authenticates a TOE machine administrator who sets the HDD overwrite deletion method and operates it.
- evaluation_facility: Japan Electronics & Information Technology Industries Association, Information Technology Security Center
- product: Data Security Kit(D) Software
- product_type: IT Product (data protection function in digital Multi Function Device)
- toe_version: V1.00E
- vendor: KYOCERA MITA Corporation
- expiration_date: 01.03.2013
- revalidations: [frozendict({'date': '2007-10', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0057_it5065_02.html'})]
- supplier: KYOCERA MITA Corporation
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0057_it5065.html
- toe_overseas_name: Data Security Kit(D) Software V2.10E
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0057_ecvr.pdf |
2005_42.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0057: 1
|
- DE:
- FR:
- Rapport de certification 2002/05: 1
- Rapport de certification 2005/42: 12
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL1: 1
- EAL2: 2
- EAL21: 1
- EAL3: 1
- EAL4: 1
- EAL4+: 1
- EAL5: 1
- EAL5+: 1
- EAL7: 2
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 1
- ACM_CAP: 1
- ACM_CAP.2: 1
- ACM_SCP: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.1: 2
- ADO_IGS: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_HLD: 1
- ADV_HLD.2: 3
- ADV_IMP: 4
- ADV_INT: 1
- ADV_LLD: 4
- ADV_RCR: 1
- ADV_RCR.1: 1
- ADV_SPM: 1
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 1
- AGD_USR: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 1
- ALC_DVS.1: 4
- ALC_FLR: 2
- ALC_FLR.3: 4
- ALC_TAT: 4
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 1
- AVA_MSU: 1
- AVA_MSU.1: 3
- AVA_SOF: 1
- AVA_SOF.1: 1
- AVA_VLA: 1
- AVA_VLA.2: 3
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.4: 1
- FCS_COP.1: 1
- FDP:
- FDP_ACC.2: 1
- FDP_ACF.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_ATD.1: 1
- FIA_UAU.2: 1
- FIA_UID.2: 1
- FMT:
- FMT_MSA.1: 1
- FMT_MSA.2: 1
- FMT_MSA.3: 1
- FMT_MTD.1: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPR:
- FPT:
- FPT_ITC.1: 1
- FPT_ITI.1: 1
- FPT_RVM: 1
- FPT_SEP.1: 1
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Oberthur:
- Oberthur: 32
- Oberthur Card Systems: 1
- Philips:
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCIMB-2004-01-001: 1
- CCIMB-2004-01-002: 1
- CCIMB-2004-01-003: 1
- CCIMB-2004-01-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20061102202158+09'00'
- /ModDate: D:20061102202158+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12898
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: DCSSI
- /CreationDate: D:20051202153151+01'00'
- /Creator: Acrobat PDFMaker 5.0 pour Word
- /Keywords: CER/F/07.3
- /ModDate: D:20051202153200+01'00'
- /Producer: Acrobat Distiller 5.0 (Windows)
- /Subject: Applet CryptoSmart V2.0 sur base Oberthur COSMO64RSA D V5.2
- /Title: Rapport de certification 2005/42
- pdf_file_size_bytes: 720603
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 21
|
pdf_data/st_filename |
|
cible2005_42.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL1+: 2
- EAL2: 4
- EAL2+: 2
|
pdf_data/st_keywords/cc_sar |
|
- ACM:
- ADO:
- ADO_DEL.1: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP.1: 1
- ADV_HLD.2: 4
- ADV_IMP.1: 4
- ADV_LLD.1: 4
- ADV_RCR.1: 1
- ADV_SPM.1: 1
- AGD:
- AGD_ADM.1: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS.1: 4
- ALC_FLR.3: 4
- ALC_TAT.1: 4
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU.1: 4
- AVA_SOF.1: 1
- AVA_VLA.2: 4
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_SPE: 2
- FAU_SPE.1: 7
- FAU_SPE.1.1: 2
- FAU_SPE.1.2: 2
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 6
- FCS_CKM.1.1: 5
- FCS_CKM.1.2: 5
- FCS_CKM.1.3: 5
- FCS_CKM.1.4: 5
- FCS_CKM.4: 9
- FCS_CKM.4.1: 1
- FCS_COP: 2
- FCS_COP.1: 33
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 6
- FDP_ACC.2: 27
- FDP_ACF: 2
- FDP_ACF.1: 38
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 16
- FIA_ATD: 2
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_UAU: 2
- FIA_UAU.1: 2
- FIA_UAU.2: 8
- FIA_UID: 2
- FIA_UID.1: 4
- FIA_UID.2: 6
- FMT:
- FMT_MSA: 2
- FMT_MSA.1: 22
- FMT_MSA.2: 14
- FMT_MSA.2.1: 1
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 2
- FMT_MTD.1: 11
- FMT_SMF: 2
- FMT_SMF.1: 12
- FMT_SMF.1.1: 2
- FMT_SMR: 2
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNL: 2
- FPR_UNL.1: 6
- FPR_UNL.1.1: 1
- FPT:
- FPT_ITC: 2
- FPT_ITC.1: 8
- FPT_ITC.1.1: 1
- FPT_ITI: 2
- FPT_ITI.1: 7
- FPT_ITI.1.1: 1
- FPT_RVM: 3
- FPT_RVM.1: 8
- FPT_RVM.1.1: 1
- FPT_SEP: 3
- FPT_SEP.1: 8
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
- Gemplus:
- Oberthur:
- Oberthur: 2
- Oberthur Card Systems: 2
- Philips:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- ISO:
- ISO/IEC 9796-2: 1
- ISO/IEC 9797: 2
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: el
- /CreationDate: D:20051014123139
- /Creator: PDFCreator Version 0.8.0
- /Keywords:
- /ModDate: D:20051014123139
- /Producer: AFPL Ghostscript 8.14
- /Subject:
- /Title: Cible CryptoSmart v1.8
- pdf_file_size_bytes: 444379
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 52
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |