name |
TOSHIBA e-STUDIO2010AC/2510AC all of the above with FAX Unit(GD-1370J/GD-1370NA/GD-1370EU) and FIPS Hard Disk Kit(GE-1230) Version: SYS V1.0
|
TOSHIBA e-STUDIO2515AC/3015AC/3515AC/4515AC/5015AC all of the above with FAX Unit(GD-1370J/GD-1370NA/GD-1370EU) and FIPS Hard Disk Kit(GE-1230) Version : SYS V1.0
|
category |
Multi-Function Devices
|
Multi-Function Devices
|
not_valid_before |
2019-03-13
|
2019-03-13
|
not_valid_after |
2024-03-13
|
2024-03-13
|
scheme |
JP
|
JP
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/C0629_est.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/C0633_est.pdf
|
status |
archived
|
archived
|
manufacturer |
Toshiba TEC Corporation
|
Toshiba TEC Corporation
|
manufacturer_web |
https://www.toshibatec.co.jp/en/
|
https://www.toshibatec.co.jp/en/
|
security_level |
|
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/C0629_erpt.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/C0633_erpt.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0629_eimg.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0633_eimg.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Hardcopy Devices', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/c0553_pp.pdf', 'pp_ids': frozenset({'PP_HCD_V1.0'})}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Hardcopy Devices', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/c0553_pp.pdf', 'pp_ids': frozenset({'PP_HCD_V1.0'})}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
True
|
True
|
state/cert/download_ok |
True
|
True
|
state/cert/extract_ok |
True
|
True
|
state/cert/pdf_hash |
fb39fd5c4ec8d6629db91ff7893388e73ea2c897ea96ba19c4cf8959d7ef40c1
|
3f44fd8e7856f15306bb2893b4586beee8eeb83f40f77b90220575ce224078ef
|
state/cert/txt_hash |
160859671b10ee8483e3eb559156e212d4ea00166484445e8e787ecd367a17d3
|
4959508320672795595883d68cf07b5f7cf900d415795f9e84ed94374c572be2
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
02e0df4dea3fe58d1400a2c81dd72ecc6fe8708ac39a6ac2e71a641a1d924bbf
|
50931c7731b64eded9ee2c0d5150737761bc4e7d0bfa6ac79cf0b4c29e9e5755
|
state/report/txt_hash |
65352247455faaf17bdd0e22dc5e3bdacc80a1c04df56daed099e432997454f2
|
59e30956e6fc219479265ab5844c91f142afad25b30e3d693117fec291f0e36f
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
e62eeb6bdba0fcc0245833f5b9945b9839706bf4214fba4a1c925dc6f172ab7d
|
27abb7b31b3174bfbc405d429b8d7ee789a1b366068ab08799c72d9a7598b9b8
|
state/st/txt_hash |
9e05e4f952a93c1e07fe6bd32e27289679f17dfb57360dfd62c1f5829a916e42
|
882dafd36dc4d881190a84519dff32e0d14dbb04ab9929d85f386e33bed94bf9
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
JISEC-CC-CRP-C0629-01-2019
|
JISEC-CC-CRP-C0633-01-2019
|
heuristics/cert_lab |
None
|
None
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_sars |
ASE_REQ.1, ADV_FSP.1, ALC_CMC.1, AGD_OPE.1, ASE_SPD.1, AGD_PRE.1, ALC_CMS.1, ASE_OBJ.1, ATE_IND.1, ASE_ECD.1, ASE_CCL.1, AVA_VAN.1, ASE_TSS.1, ASE_INT.1 |
ASE_REQ.1, ADV_FSP.1, ALC_CMC.1, AGD_OPE.1, ASE_SPD.1, AGD_PRE.1, ALC_CMS.1, ASE_OBJ.1, ATE_IND.1, ASE_ECD.1, ASE_CCL.1, AVA_VAN.1, ASE_TSS.1, ASE_INT.1 |
heuristics/extracted_versions |
1.0 |
1.0 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/scheme_data/cert_id |
C0629
|
C0633
|
heuristics/scheme_data/certification_date |
2019-03
|
2019-03
|
heuristics/scheme_data/claim |
PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
|
PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
|
heuristics/scheme_data/enhanced/assurance_level |
ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
|
ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
|
heuristics/scheme_data/enhanced/cc_version |
3.1 Release5
|
3.1 Release5
|
heuristics/scheme_data/enhanced/cert_id |
JISEC-C0629
|
JISEC-C0633
|
heuristics/scheme_data/enhanced/cert_link |
https://www.ipa.go.jp/en/security/c0629_eimg.pdf
|
https://www.ipa.go.jp/en/security/c0633_eimg.pdf
|
heuristics/scheme_data/enhanced/certification_date |
2019-03-13
|
2019-03-13
|
heuristics/scheme_data/enhanced/description |
PRODUCT DESCRIPTION
Description of TOE
The TOE is a Multifunction Peripheral (MFP) that has the functions, such as copy, print, scan and fax. The TOE is capable of implementing the functionality required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFD.
TOE Security functions
The TOE provides the following security features:
-
Identification and Authentication Function
-
Access Control Function
-
Stored Data Encryption Function
-
Network Protection Function
-
Security Management Function
-
Audit Function
-
Software Verification Function
-
Self-testing Function
-
Fax Line Separation Function
|
PRODUCT DESCRIPTION
Description of TOE
The TOE is a Multifunction Peripheral (MFP) that has the functions, such as copy, print, scan and fax. The TOE is capable of implementing the functionality required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFD.
TOE Security functions
The TOE provides the following security features:
-
Identification and Authentication Function
-
Access Control Function
-
Stored Data Encryption Function
-
Network Protection Function
-
Security Management Function
-
Audit Function
-
Software Verification Function
-
Self-testing Function
-
Fax Line Separation Function
|
heuristics/scheme_data/enhanced/evaluation_facility |
Information Technology Security Center Evaluation Department
|
Information Technology Security Center Evaluation Department
|
heuristics/scheme_data/enhanced/product |
TOSHIBA e-STUDIO2010AC/2510AC all of the above with FAX Unit(GD-1370J/GD-1370NA/GD-1370EU) and FIPS Hard Disk Kit(GE-1230)
|
TOSHIBA e-STUDIO2515AC/3015AC/3515AC/4515AC/
5015AC all of the above with FAX Unit(GD-1370J/GD-1370NA/GD-1370EU) and FIPS Hard Disk Kit(GE-1230)
|
heuristics/scheme_data/enhanced/product_type |
Multifunction Product
|
Multifunction Product
|
heuristics/scheme_data/enhanced/protection_profile |
Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
|
Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
|
heuristics/scheme_data/enhanced/report_link |
https://www.ipa.go.jp/en/security/C0629_erpt.pdf
|
https://www.ipa.go.jp/en/security/C0633_erpt.pdf
|
heuristics/scheme_data/enhanced/target_link |
https://www.ipa.go.jp/en/security/C0629_est.pdf
|
https://www.ipa.go.jp/en/security/C0633_est.pdf
|
heuristics/scheme_data/enhanced/toe_version |
SYS V1.0
|
SYS V1.0
|
heuristics/scheme_data/enhanced/vendor |
TOSHIBA TEC CORPORATION
|
TOSHIBA TEC CORPORATION
|
heuristics/scheme_data/expiration_date |
2024-04
|
2024-04
|
heuristics/scheme_data/supplier |
TOSHIBA TEC CORPORATION
|
TOSHIBA TEC CORPORATION
|
heuristics/scheme_data/toe_japan_name |
TOSHIBA e-STUDIO2010AC/2510AC
all of the above with FAX Unit(GD-1370J/GD-1370NA/GD-1370EU) and FIPS Hard Disk Kit(GE-1230)SYS V1.0
|
TOSHIBA e-STUDIO2515AC/3015AC/3515AC/4515AC/5015AC
all of the above with FAX Unit(GD-1370J/GD-1370NA/GD-1370EU) and FIPS Hard Disk Kit(GE-1230)
SYS V1.0
|
heuristics/scheme_data/toe_overseas_link |
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0629_it8689.html
|
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0633_it8690.html
|
heuristics/scheme_data/toe_overseas_name |
TOSHIBA e-STUDIO2010AC/2510AC
all of the above with FAX Unit(GD-1370J/GD-1370NA/GD-1370EU) and FIPS Hard Disk Kit(GE-1230)
SYS V1.0
|
TOSHIBA e-STUDIO2515AC/3015AC/3515AC/4515AC/5015AC
all of the above with FAX Unit(GD-1370J/GD-1370NA/GD-1370EU) and FIPS Hard Disk Kit(GE-1230)
SYS V1.0
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
c0629_eimg.pdf
|
c0633_eimg.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/cc_cert_id/JP |
- JISEC-CC-CRP-C0629-01-2019:
1
|
- JISEC-CC-CRP-C0633-01-2019:
1
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/eval_facility |
- ITSC:
- Information Technology Security Center:
1
|
- ITSC:
- Information Technology Security Center:
1
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_metadata//CreationDate |
D:20190424140032+09'00'
|
D:20190424144259+09'00'
|
pdf_data/cert_metadata//Creator |
Microsoft® Word 2010
|
Microsoft® Word 2010
|
pdf_data/cert_metadata//ModDate |
D:20190424140202+09'00'
|
D:20190424144403+09'00'
|
pdf_data/cert_metadata//Producer |
Microsoft® Word 2010
|
Microsoft® Word 2010
|
pdf_data/cert_metadata/pdf_file_size_bytes |
85608
|
85665
|
pdf_data/cert_metadata/pdf_hyperlinks |
|
|
pdf_data/cert_metadata/pdf_is_encrypted |
True
|
True
|
pdf_data/cert_metadata/pdf_number_of_pages |
2
|
2
|
pdf_data/report_filename |
C0629_erpt.pdf
|
C0633_erpt.pdf
|
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/JP |
- JISEC-CC-CRP-C0629-01-2019:
1
|
- JISEC-CC-CRP-C0633-01-2019:
1
|
pdf_data/report_keywords/cc_claims |
- D:
- T:
- T.UNAUTHORIZED_ACCESS:
1
- T.TSF_COMPROMISE:
1
- T.TSF_FAILURE:
1
- T.UNAUTHORIZED_UPDATE:
1
- T.NET_COMPROMISE:
1
- A:
- A.PHYSICAL:
1
- A.NETWORK:
1
- A.TRUSTED_ADMIN:
1
- A.TRAINED_USERS:
1
|
- D:
- T:
- T.UNAUTHORIZED_ACCESS:
1
- T.TSF_COMPROMISE:
1
- T.TSF_FAILURE:
1
- T.UNAUTHORIZED_UPDATE:
1
- T.NET_COMPROMISE:
1
- A:
- A.PHYSICAL:
1
- A.NETWORK:
1
- A.TRUSTED_ADMIN:
1
- A.TRAINED_USERS:
1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_CMC.1:
1
- ALC_CMS.1:
1
- ATE:
- AVA:
- ASE:
- ASE_INT.1:
1
- ASE_CCL.1:
1
- ASE_SPD.1:
1
- ASE_OBJ.1:
1
- ASE_ECD.1:
1
- ASE_REQ.1:
1
- ASE_TSS.1:
1
|
- ADV:
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_CMC.1:
1
- ALC_CMS.1:
1
- ATE:
- AVA:
- ASE:
- ASE_INT.1:
1
- ASE_CCL.1:
1
- ASE_SPD.1:
1
- ASE_OBJ.1:
1
- ASE_ECD.1:
1
- ASE_REQ.1:
1
- ASE_TSS.1:
1
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center:
4
|
- ITSC:
- Information Technology Security Center:
4
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001:
2
- CCMB-2017-04-002:
2
- CCMB-2017-04-003:
2
- CCMB-2017-04-004:
2
|
- CC:
- CCMB-2017-04-001:
2
- CCMB-2017-04-002:
2
- CCMB-2017-04-003:
2
- CCMB-2017-04-004:
2
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC:
1
- HMAC-SHA-256:
1
- HMAC-SHA-512:
1
|
- AES_competition:
- constructions:
- MAC:
- HMAC:
1
- HMAC-SHA-256:
1
- HMAC-SHA-512:
1
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata//CreationDate |
D:20190605144545+09'00'
|
D:20190605145208+09'00'
|
pdf_data/report_metadata//Creator |
Microsoft® Word 2010
|
Microsoft® Word 2010
|
pdf_data/report_metadata//ModDate |
D:20190605144656+09'00'
|
D:20190605145246+09'00'
|
pdf_data/report_metadata//Producer |
Microsoft® Word 2010
|
Microsoft® Word 2010
|
pdf_data/report_metadata/pdf_file_size_bytes |
390607
|
405257
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
True
|
True
|
pdf_data/report_metadata/pdf_number_of_pages |
32
|
33
|
pdf_data/st_filename |
C0629_est.pdf
|
C0633_est.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords |
- cc_cert_id:
- cc_protection_profile_id:
- cc_security_level:
- cc_sar:
- ADV:
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_CMC.1:
1
- ALC_CMS.1:
1
- ATE:
- AVA:
- ASE:
- ASE_SPD.1:
2
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.1:
1
- ASE_REQ.1:
1
- ASE_TSS.1:
1
- cc_sfr:
- FAU:
- FAU_STG_EXT:
3
- FAU_GEN.1:
12
- FAU_GEN.2:
6
- FAU_STG_EXT.1:
7
- FAU_GEN:
14
- FAU_STG_EXT.1.1:
2
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2.1:
1
- FCS:
- FCS_CKM_EXT:
5
- FCS_KDF_EXT:
4
- FCS_KYC_EXT:
4
- FCS_RBG_EXT:
2
- FCS_SMC_EXT:
2
- FCS_TLS_EXT:
3
- FCS_CKM.1:
43
- FCS_CKM.4:
12
- FCS_CKM_EXT.4:
27
- FCS_COP.1:
124
- FCS_RBG_EXT.1:
36
- FCS_SMC_EXT.1:
15
- FCS_TLS_EXT.1:
20
- FCS_KYC_EXT.1:
9
- FCS_KDF_EXT.1:
20
- FCS_KDF_EXT.1.1:
3
- FCS_KYC_EXT.1.1:
4
- FCS_RBG_EXT.1.1:
3
- FCS_RBG_EXT.1.2:
3
- FCS_SMC_EXT.1.1:
2
- FCS_TLS_EXT.1.1:
2
- FCS_CKM.1.1:
2
- FCS_CKM.4.1:
2
- FCS_CKM_EXT.4.1:
1
- FCS_COP.1.1:
6
- FCS_SNI_EXT.1.1:
1
- FCS_PCC_EXT.1:
1
- FCS_SSH_EXT.1:
6
- FCS_ITC_EXT.1:
1
- FCS_ITC.1:
2
- FCS_RGB_EXT.1:
2
- FCS_COP:
1
- FDP:
- FDP_DSK_EXT:
2
- FDP_FXS_EXT:
2
- FDP_ACC.1:
9
- FDP_ACF.1:
7
- FDP_FXS_EXT.1:
8
- FDP_DSK_EXT.1:
8
- FDP_DSK_EXT.1.1:
2
- FDP_DSK_EXT.1.2:
2
- FDP_FXS_EXT.1.1:
2
- FDP_ITC.1:
1
- FDP_ITC.2:
1
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_IFC.1:
1
- FDP_ACC:
2
- FIA:
- FIA_PMG_EXT:
4
- FIA_AFL.1:
5
- FIA_ATD.1:
7
- FIA_UAU.1:
9
- FIA_UAU.7:
5
- FIA_UID.1:
12
- FIA_USB.1:
5
- FIA_PMG:
4
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1.1:
1
- FIA_PMG_EXT.1.1:
1
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.7.1:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FIA_PMG_EXT.1:
3
- FIA_UAU:
1
- FMT:
- FMT_MOF.1:
5
- FMT_MSA.1:
6
- FMT_MSA.3:
8
- FMT_MTD.1:
5
- FMT_SMF.1:
18
- FMT_SMR.1:
14
- FMT_MOF.1.1:
1
- FMT_MSA.1.1:
1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MTD.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FPT_KYP_EXT:
2
- FPT_SKP_EXT:
2
- FPT_TST_EXT:
2
- FPT_TUD_EXT:
2
- FPT_SKP_EXT.1:
9
- FPT_STM.1:
9
- FPT_TST_EXT.1:
8
- FPT_TUD_EXT.1:
11
- FPT_KYP_EXT.1:
4
- FPT_SKP_EXT.1.1:
2
- FPT_TST_EXT.1.1:
2
- FPT_TUD_EXT.1.1:
2
- FPT_TUD_EXT.1.2:
2
- FPT_TUD_EXT.1.3:
3
- FPT_STM.1.1:
1
- FPT_KYP_EXT.1.1:
1
- FTA:
- FTA_SSL.3:
5
- FTA_SSL.3.1:
1
- FTP:
- FTP_ITC.1:
17
- FTP_TRP.1:
17
- FTP_ITC.1.1:
2
- FTP_TRP.1.1:
3
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1.2:
2
- FTP_TRP.1.3:
2
- cc_claims:
- D:
- O:
- O.AUDIT:
5
- O.COMMS_PROTECTION:
12
- O.STORAGE_ENCRYPTION:
8
- O.PURGE_DATA:
3
- O.UPDATE_VERIFICATION:
2
- O.ACCESS_CONTROL:
6
- O.USER_AUTHORIZATION:
7
- O.FAX_NET_SEPARATION:
1
- O.ADMIN_ROLES:
4
- O.ACCESS:
1
- O.TSF_SELF_TEST:
1
- O.KEY_MATERIAL:
1
- T:
- T.UNAUTHORIZED_ACCESS:
1
- T.TSF_COMPROMISE:
1
- T.TSF_FAILURE:
1
- T.UNAUTHORIZED_UPDATE:
1
- T.NET_COMPROMISE:
1
- A:
- A.PHYSICAL:
1
- A.NETWORK:
1
- A.TRUSTED_ADMIN:
1
- A.TRAINED_USERS:
1
- OE:
- OE.PHYSICAL_PROTECTION:
1
- OE.NETWORK_PROTECTION:
1
- OE.ADMIN_TRUST:
1
- OE.USER_TRAINING:
1
- OE.ADMIN_TRAINING:
1
- vendor:
- eval_facility:
- symmetric_crypto:
- AES_competition:
- constructions:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS:
40
- TLS 1.0:
1
- TLS 1.1:
1
- TLS 1.2:
2
- TLS1.2:
3
- IPsec:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA:
3
- TLS_RSA_WITH_AES_256_CBC_SHA:
3
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA:
1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA:
1
- TLS_RSA_WITH_AES_128_CBC_SHA256:
3
- TLS_RSA_WITH_AES_256_CBC_SHA256:
3
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256:
1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256:
1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA:
1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA:
1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA:
1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA:
1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256:
1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384:
1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:
1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384:
1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256:
1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384:
1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256:
1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384:
1
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- FIPS:
- FIPS140-2:
1
- FIPS PUB 197:
1
- FIPS PUB 186-4:
2
- FIPS PUB 198-1:
2
- FIPS PUB 180-3:
1
- FIPSPUB 180-3:
1
- NIST:
- NIST SP 800-108:
2
- NIST SP 800-132:
1
- NIST SP 800-90A:
7
- NIST SP 800-38A:
2
- NIST SP 800-38D:
1
- NIST SP 800-90B:
1
- RFC:
- RFC 2818:
3
- RFC 2246:
1
- RFC 4346:
1
- RFC 5246:
3
- RFC2818:
1
- ISO:
- ISO/IEC 10116:
2
- ISO/IEC 10118:
4
- ISO/IEC 18031:2011:
5
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
- cc_cert_id:
- cc_protection_profile_id:
- cc_security_level:
- cc_sar:
- ADV:
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_CMC.1:
1
- ALC_CMS.1:
1
- ATE:
- AVA:
- ASE:
- ASE_SPD.1:
2
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.1:
1
- ASE_REQ.1:
1
- ASE_TSS.1:
1
- cc_sfr:
- FAU:
- FAU_STG_EXT:
3
- FAU_GEN.1:
12
- FAU_GEN.2:
6
- FAU_STG_EXT.1:
7
- FAU_GEN:
14
- FAU_STG_EXT.1.1:
2
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2.1:
1
- FCS:
- FCS_CKM_EXT:
5
- FCS_KDF_EXT:
4
- FCS_KYC_EXT:
4
- FCS_RBG_EXT:
2
- FCS_SMC_EXT:
2
- FCS_TLS_EXT:
3
- FCS_CKM.1:
43
- FCS_CKM.4:
12
- FCS_CKM_EXT.4:
27
- FCS_COP.1:
124
- FCS_RBG_EXT.1:
36
- FCS_SMC_EXT.1:
15
- FCS_TLS_EXT.1:
20
- FCS_KYC_EXT.1:
9
- FCS_KDF_EXT.1:
20
- FCS_KDF_EXT.1.1:
3
- FCS_KYC_EXT.1.1:
4
- FCS_RBG_EXT.1.1:
3
- FCS_RBG_EXT.1.2:
3
- FCS_SMC_EXT.1.1:
2
- FCS_TLS_EXT.1.1:
2
- FCS_CKM.1.1:
2
- FCS_CKM.4.1:
2
- FCS_CKM_EXT.4.1:
1
- FCS_COP.1.1:
6
- FCS_SNI_EXT.1.1:
1
- FCS_PCC_EXT.1:
1
- FCS_SSH_EXT.1:
6
- FCS_ITC_EXT.1:
1
- FCS_ITC.1:
2
- FCS_RGB_EXT.1:
2
- FCS_COP:
1
- FDP:
- FDP_DSK_EXT:
2
- FDP_FXS_EXT:
2
- FDP_ACC.1:
9
- FDP_ACF.1:
7
- FDP_FXS_EXT.1:
8
- FDP_DSK_EXT.1:
8
- FDP_DSK_EXT.1.1:
2
- FDP_DSK_EXT.1.2:
2
- FDP_FXS_EXT.1.1:
2
- FDP_ITC.1:
1
- FDP_ITC.2:
1
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_IFC.1:
1
- FDP_ACC:
2
- FIA:
- FIA_PMG_EXT:
4
- FIA_AFL.1:
5
- FIA_ATD.1:
7
- FIA_UAU.1:
9
- FIA_UAU.7:
5
- FIA_UID.1:
12
- FIA_USB.1:
5
- FIA_PMG:
4
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1.1:
1
- FIA_PMG_EXT.1.1:
1
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.7.1:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FIA_PMG_EXT.1:
3
- FIA_UAU:
1
- FMT:
- FMT_MOF.1:
5
- FMT_MSA.1:
6
- FMT_MSA.3:
8
- FMT_MTD.1:
5
- FMT_SMF.1:
18
- FMT_SMR.1:
14
- FMT_MOF.1.1:
1
- FMT_MSA.1.1:
1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MTD.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FPT_KYP_EXT:
2
- FPT_SKP_EXT:
2
- FPT_TST_EXT:
2
- FPT_TUD_EXT:
2
- FPT_SKP_EXT.1:
9
- FPT_STM.1:
9
- FPT_TST_EXT.1:
8
- FPT_TUD_EXT.1:
11
- FPT_KYP_EXT.1:
4
- FPT_SKP_EXT.1.1:
2
- FPT_TST_EXT.1.1:
2
- FPT_TUD_EXT.1.1:
2
- FPT_TUD_EXT.1.2:
2
- FPT_TUD_EXT.1.3:
3
- FPT_STM.1.1:
1
- FPT_KYP_EXT.1.1:
1
- FTA:
- FTA_SSL.3:
5
- FTA_SSL.3.1:
1
- FTP:
- FTP_ITC.1:
17
- FTP_TRP.1:
17
- FTP_ITC.1.1:
2
- FTP_TRP.1.1:
3
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1.2:
2
- FTP_TRP.1.3:
2
- cc_claims:
- D:
- O:
- O.AUDIT:
5
- O.COMMS_PROTECTION:
12
- O.STORAGE_ENCRYPTION:
8
- O.PURGE_DATA:
3
- O.UPDATE_VERIFICATION:
2
- O.ACCESS_CONTROL:
6
- O.USER_AUTHORIZATION:
7
- O.FAX_NET_SEPARATION:
1
- O.ADMIN_ROLES:
4
- O.ACCESS:
1
- O.TSF_SELF_TEST:
1
- O.KEY_MATERIAL:
1
- T:
- T.UNAUTHORIZED_ACCESS:
1
- T.TSF_COMPROMISE:
1
- T.TSF_FAILURE:
1
- T.UNAUTHORIZED_UPDATE:
1
- T.NET_COMPROMISE:
1
- A:
- A.PHYSICAL:
1
- A.NETWORK:
1
- A.TRUSTED_ADMIN:
1
- A.TRAINED_USERS:
1
- OE:
- OE.PHYSICAL_PROTECTION:
1
- OE.NETWORK_PROTECTION:
1
- OE.ADMIN_TRUST:
1
- OE.USER_TRAINING:
1
- OE.ADMIN_TRAINING:
1
- vendor:
- eval_facility:
- symmetric_crypto:
- AES_competition:
- constructions:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS:
40
- TLS 1.0:
1
- TLS 1.1:
1
- TLS 1.2:
2
- TLS1.2:
3
- IPsec:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA:
3
- TLS_RSA_WITH_AES_256_CBC_SHA:
3
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA:
1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA:
1
- TLS_RSA_WITH_AES_128_CBC_SHA256:
3
- TLS_RSA_WITH_AES_256_CBC_SHA256:
3
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256:
1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256:
1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA:
1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA:
1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA:
1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA:
1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256:
1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384:
1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:
1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384:
1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256:
1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384:
1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256:
1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384:
1
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- FIPS:
- FIPS140-2:
1
- FIPS PUB 197:
1
- FIPS PUB 186-4:
2
- FIPS PUB 198-1:
2
- FIPS PUB 180-3:
1
- FIPSPUB 180-3:
1
- NIST:
- NIST SP 800-108:
2
- NIST SP 800-132:
1
- NIST SP 800-90A:
7
- NIST SP 800-38A:
2
- NIST SP 800-38D:
1
- NIST SP 800-90B:
1
- RFC:
- RFC 2818:
3
- RFC 2246:
1
- RFC 4346:
1
- RFC 5246:
3
- RFC2818:
1
- ISO:
- ISO/IEC 10116:
2
- ISO/IEC 10118:
4
- ISO/IEC 18031:2011:
5
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
pdf_data/st_metadata//CreationDate |
D:20190530084637+09'00'
|
D:20190530085830+09'00'
|
pdf_data/st_metadata//Creator |
Microsoft® Word 2016
|
Microsoft® Word 2016
|
pdf_data/st_metadata//ModDate |
D:20190530084637+09'00'
|
D:20190530085830+09'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Word 2016
|
Microsoft® Word 2016
|
pdf_data/st_metadata/pdf_file_size_bytes |
2149272
|
2147935
|
pdf_data/st_metadata/pdf_hyperlinks |
https://www.rambus.com/intel-ivy-bridge-random-number-generator/ |
https://www.rambus.com/intel-ivy-bridge-random-number-generator/ |
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
71
|
71
|
dgst |
4abe91df17abb65a
|
46223f59fc5f4805
|