Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
TASKalfa 3050ci, TASKalfa 3550ci, TASKalfa 4550ci, TASKalfa 5550ci Data Security Kit (E) V1.00J
JISEC-CC-CRP-C0292
STARCOS 3.4 Health SMC-B C1
BSI-DSZ-CC-0692-2011
name TASKalfa 3050ci, TASKalfa 3550ci, TASKalfa 4550ci, TASKalfa 5550ci Data Security Kit (E) V1.00J STARCOS 3.4 Health SMC-B C1
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP DE
not_valid_after 06.06.2016 01.09.2019
not_valid_before 30.05.2011 21.07.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0292_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0692a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0292_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0692b_pdf.pdf
manufacturer KYOCERA MITA Corporation G+D Mobile Security GmbH
manufacturer_web https://www.kyoceramita.com/ https://www.gi-de.com/de/de/mobile-security/
security_level EAL3 EAL4+, AVA_VAN.5
dgst 4a593d8d91a65cd9 deaaec8413e98427
heuristics/cert_id JISEC-CC-CRP-C0292 BSI-DSZ-CC-0692-2011
heuristics/cert_lab [] BSI
heuristics/cpe_matches cpe:2.3:h:kyocera:taskalfa_3550ci:-:*:*:*:*:*:*:*, cpe:2.3:h:kyocera:taskalfa_5550ci:-:*:*:*:*:*:*:*, cpe:2.3:h:kyocera:taskalfa_3050ci:-:*:*:*:*:*:*:*, cpe:2.3:h:kyocera:taskalfa_305:-:*:*:*:*:*:*:*, cpe:2.3:h:kyocera:taskalfa_4550ci:-:*:*:*:*:*:*:* {}
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 ALC_LCD.2, ASE_INT.1, ALC_DVS.2, ASE_ECD.1, APE_ECD.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ADV_COMP.1, ALC_DEL.1, ALC_TAT.3, ALC_FLR.3, ATE_FUN.2, AGD_OPE.1, AGD_PRE.1, ATE_IND.3, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_IMP.2, ADV_TDS.3, ATE_DPT.1, ALC_CMC.5, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, APE_OBJ.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1
heuristics/extracted_versions 1.00 3.4
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0466-2008
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0466-2008
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0292
  • certification_date: 01.05.2011
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0292_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the firmware that controls Multi Function Printer (MFP and henceforth abbreviation) and the ASIC that operates security algorithm after the license of Data Security Kit (E) is applied to the following MFPs that mainly have copy function, scanner function and printer function. - TASKalfa 3050ci - TASKalfa 3550ci - TASKalfa 4550ci - TASKalfa 5550ci This TOE provides the copy function, the scanner function and the printer function as the basic functions of the MFP by controlling the MFP. In addition, the box function to store the image data is provided. TOE security functionality The TOE provides the following security functions that protect against leakage of the image data stored in HDD during the use of the above-mentioned basic functions. - Image Data Encryption Function - Image Data Overwrite-Erase Function
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • product: TASKalfa 3050ci, TASKalfa 3550ci, TASKalfa 4550ci, TASKalfa 5550ci Data Security Kit (E)
    • product_type: Data protection function in digital MFP
    • report_link: https://www.ipa.go.jp/en/security/c0292_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0292_est.pdf
    • toe_version: V1.00J
    • vendor: KYOCERA MITA Corporation
  • expiration_date: 01.06.2016
  • supplier: KYOCERA MITA Corporation
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0292_it0322.html
  • toe_japan_name: TASKalfa 3050ci, TASKalfa 3550ci, TASKalfa 4550ci, TASKalfa 5550ci Data Security Kit (E) V1.00J
  • toe_overseas_link: None
  • toe_overseas_name: -----
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0466-2008
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0466-2008
heuristics/protection_profiles {} a2003eb22f067b0a
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0053_V2b_pdf.pdf
pdf_data/report_filename c0292_erpt.pdf 0692a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0692-2011
    • cert_item: STARCOS 3.4 Health SMC-B C1
    • cert_lab: BSI
    • developer: Giesecke & Devrient GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0292-01: 1
    • Certification No. C0292: 1
  • DE:
    • BSI-DSZ-CC-0466-2008: 3
    • BSI-DSZ-CC-0466-2008-MA-01: 2
    • BSI-DSZ-CC-0692-2011: 22
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0053-V2-2009: 1
    • BSI-CC-PP-0053-V2-2009: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 4
  • EAL:
    • EAL 1: 1
    • EAL 4: 9
    • EAL 4 augmented: 3
    • EAL 5: 4
    • EAL1: 6
    • EAL2: 3
    • EAL3: 4
    • EAL4: 4
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 4
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_COMP.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 2
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 2
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 3
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 3
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 4
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_claims
  • A:
    • A.CE: 1
    • A.LOCATION: 1
    • A.NETWORK: 2
  • T:
    • T.RESIDUAL: 2
    • T.TEMP: 3
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • GD:
    • G&D: 3
    • Giesecke & Devrient: 16
  • NXP:
    • NXP: 4
    • NXP Semiconductors: 3
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
  • AES_competition:
    • HPC:
      • HPC: 3
  • DES:
    • 3DES:
      • TDES: 1
    • DES:
      • DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA 2048: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
pdf_data/report_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 3
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • Malfunction: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI TR-03116: 2
pdf_data/report_keywords/os_name
  • STARCOS:
    • STARCOS 3: 36
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • FIPS:
    • FIPS PUB 197: 2
  • BSI:
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 20: 4
    • AIS 25: 2
    • AIS 26: 2
    • AIS 32: 1
    • AIS 34: 3
    • AIS 35: 2
    • AIS 36: 4
    • AIS 37: 1
    • AIS 38: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Evaluation Technical Report Summary STARCOS 3.4 Health SMC-B C1, TÜV Informationstechnik GmbH (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product NXP P5CC052V0A Smart Card: 1
    • Version 1.8, 18th May 2011, Security Target STARCOS 3.4 Health SMC-B C1, Giesecke & Devrient GmbH (confidential document) [7] Protection Profile for Security Module Card Type B, Version 1.2, 17 November 2009: 1
    • and amendment BSI- DSZ-CC-0466-2008-MA-01, Version 1.3, 29th September 2010, T-Systems GEI GmbH (confidential document) 8 specifically • AIS 20, Version 1, 2. December 1999, Funktionalitätsklassen und: 1
    • list for the TOE, Version 1.2, 18th May 2011, Configuration List STARCOS 3.4 Health SMC-B C1 (confidential document) [12] Guidance Documentation STARCOS 3.4 Health HBA/SMC C1 – Main Document, Version 1.3, 13th: 1
pdf_data/report_metadata
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20110907133157+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Manager: IPA
  • /ModDate: D:20110907133231+09'00'
  • /Producer: Acrobat Distiller 8.3.0 (Windows)
  • /Title: CRP-e
  • pdf_file_size_bytes: 2223894
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 30
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20110812093356+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, STARCOS 3.4 Health SMC-B C1, Giesecke & Devrient GmbH"
  • /ModDate: D:20110812093709+02'00'
  • /Producer: OpenOffice.org 3.2
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0692-2011
  • pdf_file_size_bytes: 938502
  • pdf_hyperlinks: https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/, https://certificates.gi-de.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
pdf_data/st_filename c0292_est.pdf 0692b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0466-2008: 2
    • BSI-DSZ-CC-0466-2008-MA-01: 2
    • BSI-DSZ-CC-0466-2009: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0035: 2
    • BSI-PP-0006-2002: 1
    • BSI-PP-0053-V2: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 5
  • EAL:
    • EAL4: 9
    • EAL4 augmented: 3
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ATE:
    • ATE_DPT.1: 1
  • AVA:
    • AVA_VAN.5: 6
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 8
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 3
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FCS:
    • FCS_CKM: 12
    • FCS_CKM.1: 32
    • FCS_CKM.2: 4
    • FCS_CKM.4: 38
    • FCS_CKM.4.1: 1
    • FCS_COP: 62
    • FCS_COP.1: 19
    • FCS_RND.1: 1
    • FCS_RNG: 10
    • FCS_RNG.1: 19
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC.1: 26
    • FDP_ACC.1.1: 2
    • FDP_ACF: 1
    • FDP_ACF.1: 19
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 8
    • FDP_ITC.1: 28
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 20
    • FDP_RIP: 8
    • FDP_RIP.1: 9
    • FDP_SDI.1: 2
    • FDP_SDI.2: 5
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT.1: 9
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 7
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 10
    • FIA_AFL.1: 7
    • FIA_API: 7
    • FIA_API.1: 15
    • FIA_API.1.1: 4
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 2
    • FIA_UAU.1: 13
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 10
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 8
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 8
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 13
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM: 7
    • FMT_LIM.1: 21
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 20
    • FMT_LIM.2.1: 2
    • FMT_MOF.1: 1
    • FMT_MSA.1: 4
    • FMT_MSA.2: 11
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 12
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 34
    • FMT_MTD.1: 6
    • FMT_SMF.1: 19
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 25
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 13
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 12
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 14
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 2
  • FTP:
    • FTP_ITC.1: 12
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.CE: 4
    • A.LOCATION: 5
    • A.NETWORK: 5
  • O:
    • O.ENCRYPT: 5
    • O.REMAIN: 6
  • OE:
    • OE.CE: 3
    • OE.LOCATION: 3
    • OE.NETWORK: 3
  • T:
    • T.RESIDUAL: 4
    • T.TEMP: 3
  • OT:
    • OT.DS_CSA: 8
    • OT.TSS: 4
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • GD:
    • Giesecke & Devrient: 8
  • Infineon:
    • Infineon Technologies AG: 1
  • NXP:
    • NXP: 9
    • NXP Semiconductors: 2
  • STMicroelectronics:
    • STMicroelectronics: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
  • AES_competition:
    • HPC:
      • HPC: 31
    • RC:
      • RC4: 1
  • DES:
    • 3DES:
      • TDES: 2
      • Triple-DES: 1
    • DES:
      • DES: 5
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 1
      • SHA-224: 1
      • SHA-256: 4
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 19
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 5
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 1
    • RNG: 4
  • TRNG:
    • TRNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • Malfunction: 3
    • Physical Tampering: 1
    • Physical tampering: 1
    • fault injection: 3
    • malfunction: 4
    • physical tampering: 8
  • SCA:
    • DPA: 3
    • SPA: 1
    • physical probing: 3
    • side channels: 3
    • timing attacks: 1
  • other:
    • Bleichenbacher attack: 1
    • reverse engineering: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03116: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 3
pdf_data/st_keywords/os_name
  • STARCOS:
    • STARCOS 3: 136
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 1
  • BSI:
    • AIS20: 2
    • AIS31: 2
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS 180-2: 2
    • FIPS 46-3: 1
  • ISO:
    • ISO/IEC 7816: 2
    • ISO/IEC 7816-1: 1
    • ISO/IEC 7816-2: 1
    • ISO/IEC 7816-4: 2
  • PKCS:
    • PKCS #1: 2
    • PKCS#1: 3
  • X509:
    • X.509: 12
pdf_data/st_metadata
  • /Author: KYOCERA MITA Corporation
  • /CreationDate: D:20110706140247+09'00'
  • /Creator: CubePDF
  • /Keywords: Security Target
  • /ModDate: D:20110706140305+09'00'
  • /Producer: GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA
  • /Subject:
  • /Title: TASKalfa 3050ci, TASKalfa 3550ci, TASKalfa 4550ci, TASKalfa 5550ci Data Security Kit (E) Japan Version Security Target
  • pdf_file_size_bytes: 341401
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 30
  • /Author: Giesecke & Devrient GmbH
  • /Category: P5CC052V0A
  • /Comments: Final
  • /Company: Giesecke & Devrient
  • /CreationDate: D:20110601152640+02'00'
  • /Creator: Acrobat PDFMaker 9.1 für Word
  • /Keywords: SMC-B, Secure Module Card Type B, Starcos
  • /Manager: NXP
  • /ModDate: D:20110601152930+02'00'
  • /PINSMC-FBL: 3
  • /PINSMC-Length-max: 8
  • /PINSMC-Length-min: 6
  • /PINSMC-Limit: 10
  • /PUKSMC-Length: 8
  • /Producer: Acrobat Distiller 9.4.2 (Windows)
  • /SourceModified: D:20110601130704
  • /Subject: Security Target Lite STARCOS 3.4 Health SMC-B C1
  • /TOE_SMC-A: STARCOS 3.4 Health SMC-A C1
  • /TOE_SMC-B: STARCOS 3.4 Health SMC-B C1
  • /TOE_SMC-K: STARCOS 3.4 Health SMC-K C1
  • /Title: STARCOS 3.4 Health SMC-B C1
  • pdf_file_size_bytes: 520830
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 106
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different