name |
Samsung MFP Security Kit Type_A V2.0 |
Fuji Xerox ApeosPort-V C7780/C6680/C5580 DocuCentre-V C7780/C6680/C5580 Series Controller Software, Version: Controller ROM Ver. 1.0.13 |
category |
Multi-Function Devices |
Other Devices and Systems |
scheme |
KR |
JP |
status |
archived |
archived |
not_valid_after |
01.06.2019 |
05.08.2019 |
not_valid_before |
22.04.2010 |
11.07.2014 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CISS-228-EN.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0434_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CISS-228-ST-EN.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0434_est.pdf |
manufacturer |
HP Inc. |
Fuji Xerox Co., Ltd. |
manufacturer_web |
https://www8.hp.com/hpnext/tags/hp-inc#.Vjdf803sn4g |
https://www.fujixerox.co.jp/eng/ |
security_level |
EAL3 |
EAL3 |
dgst |
4abff534c43328df |
a14a689b4fd8d675 |
heuristics/cert_id |
KECS-CISS-0228-2010 |
JISEC-CC-CRP-C0434 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
heuristics/extracted_versions |
2.0 |
1.0.13 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Digital Multifunction Printer
- cert_id: KECS-CISS-0228-2010
- certification_date: 22.04.2010
- enhanced:
- assurance_level: EAL3
- cc_version: CC V3.1 R2
- cert_id: KECS-CISS-0228-2010
- cert_link: https://itscc.kr/file/download.do?file=KPR100000001228
- certification_date: 22.04.2010
- developer: Samsung Electronics Co., Ltd.
- expiration_date: 01.06.2019
- holder: HP Inc.
- maintenance_update: [frozendict({'name': 'Samsung MFP Security Kit Type_A V2.0 Assurance maintenance1', 'certification_date': datetime.date(2013, 7, 5), 'cert_id': 'KECS-CISS-0228a-2010', 'maintenance_link': 'https://itscc.kr/file/download.do?file=KPR200000001181', 'target_link': 'https://itscc.kr/file/download.do?file=KPR200000001182'})]
- product: Samsung MFP Security Kit Type_A V2.0
- product_type: Digital Multifunction Printer
- protection_profile: None
- report_link: https://itscc.kr/file/download.do?file=KPR100000001227
- target_link: https://itscc.kr/file/download.do?file=KPR100000001229
- level: EAL3
- product: Samsung MFP Security Kit Type_A V2.0
- product_link: https://itscc.kr/certprod/view.do?product_id=228&product_class=4
- vendor: HP Inc.
|
- cert_id: JISEC-CC-CRP-C0434
- certification_date: 01.07.2014
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0434_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the software to control Multi Function Device (MFD) that provides such basic functions as copy, print, scan, and fax. The MFD is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the MFD via internal network, and general user client which is directly connected to the MFD. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator's Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - Fax Flow Security - Self Test
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Japanese : Fuji Xerox ApeosPort-V C7780/C6680/C5580 DocuCentre-V C7780/C6680/C5580 Series Controller Software English : Fuji Xerox ApeosPort-V C7780/C6680/C5580 DocuCentre-V C7780/C6680/C5580 Series Controller Software
- product_type: Control Software for Multi Function Device
- report_link: https://www.ipa.go.jp/en/security/c0434_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0434_est.pdf
- toe_version: Controller ROM Ver. 1.0.13
- vendor: Fuji Xerox Co., Ltd.
- expiration_date: 01.08.2019
- supplier: Fuji Xerox Co., Ltd.
- toe_japan_name: Fuji Xerox ApeosPort-V C7780/C6680/C5580 DocuCentre-V C7780/C6680/C5580 Series Controller Software Controller ROM Ver. 1.0.13
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0434_it3452.html
- toe_overseas_name: Fuji Xerox ApeosPort-V C7780/C6680/C5580 DocuCentre-V C7780/C6680/C5580 Series Controller Software Controller ROM Ver. 1.0.13
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
CISS-228-EN.pdf |
c0434_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0434-01: 1
- Certification No. C0434: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.PHYSICAL_SECURITY: 1
- A.SSL: 1
- A.TIME_STAMP: 1
- A.TRUSTED_ADMINISTRATOR: 1
- A.TRUSTED_AUTHENTICATION_SERVER: 1
- A.TRUSTED_NETWORK: 1
|
- A:
- A.ACCESS: 1
- A.ADMIN: 1
- A.SECMODE: 1
- A.USER: 1
- T:
- T.COMM_TAP: 2
- T.CONFDATA: 2
- T.CONSUME: 2
- T.DATA_SEC: 2
- T.RECOVER: 2
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Administrator
- /CreationDate: D:20101027144102+09'00'
- /Creator: Haansoft Hangul 2007 7, 5, 12, 604
- /ModDate: D:20101027144117+09'00'
- /PDFVersion: 1.4
- /Producer: Haansoft PDF 1.3.0.407
- /Title: KECS-CISS-0228-2010_인증보고서(Samsung MFP Security Kit Type_A V2.0).hwp
- pdf_file_size_bytes: 301262
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 22
|
- /CreationDate: D:20140929120356+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20140929120503+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 372797
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 38
|
pdf_data/st_filename |
CISS-228-ST-EN.pdf |
c0434_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 13
- ADV_FSP.1: 4
- ADV_FSP.2: 2
- ADV_FSP.3: 14
- ADV_TDS.1: 3
- ADV_TDS.2: 15
- AGD:
- AGD_OPE.1: 13
- AGD_PRE.1: 9
- ALC:
- ALC_CMC.3: 14
- ALC_CMS.1: 1
- ALC_CMS.3: 7
- ALC_DEL.1: 6
- ALC_DVS.1: 7
- ALC_LCD.1: 8
- ASE:
- ASE_CCL.1: 15
- ASE_ECD.1: 13
- ASE_INT: 1
- ASE_INT.1: 15
- ASE_OBJ: 1
- ASE_OBJ.2: 12
- ASE_REQ: 2
- ASE_REQ.1: 2
- ASE_REQ.2: 14
- ASE_SPD: 1
- ASE_SPD.1: 9
- ASE_TSS.1: 6
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 6
- ATE_DPT.1: 6
- ATE_FUN.1: 12
- ATE_IND.2: 8
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 10
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 7
- FAU_SAR.2.1: 1
- FAU_STG.1: 8
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 7
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 9
- FCS_CKM.1.1: 1
- FCS_CKM.4: 11
- FCS_CKM.4.1: 1
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_IFC.1: 8
- FDP_IFC.2: 18
- FDP_IFC.2.1: 2
- FDP_IFC.2.2: 2
- FDP_IFF.1: 26
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 2
- FDP_IFF.1.5: 2
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 25
- FIA_AFL.1.1: 3
- FIA_AFL.1.2: 3
- FIA_UAU.1: 11
- FIA_UAU.2: 22
- FIA_UAU.2.1: 2
- FIA_UAU.7: 10
- FIA_UAU.7.1: 1
- FIA_UID.1: 10
- FIA_UID.2: 19
- FIA_UID.2.1: 2
- FMT:
- FMT_MOF.1: 8
- FMT_MOF.1.1: 1
- FMT_MSA.3: 8
- FMT_MTD.1: 8
- FMT_MTD.1.1: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RCV.4: 7
- FPT_RCV.4.1: 1
- FPT_STM.1: 4
|
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 2
- FAU_SAR.2: 8
- FAU_SAR.2.1: 1
- FAU_STG: 1
- FAU_STG.1: 10
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 3
- FCS_COP.1: 10
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 11
- FDP_IFC.1.1: 1
- FDP_IFF: 1
- FDP_IFF.1: 10
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 30
- FIA_AFL.1.1: 4
- FIA_AFL.1.2: 4
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU.1: 19
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 9
- FIA_UAU.7.1: 1
- FIA_UIA.1: 1
- FIA_UID.1: 15
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 8
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA: 2
- FMT_MSA.1: 11
- FMT_MSA.1.1: 1
- FMT_MSA.3: 11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 11
- FMT_MTD.1.1: 1
- FMT_SMF.1: 17
- FMT_SMF.1.1: 1
- FMT_SMR.1: 15
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 10
- FPT_STM.1.1: 1
- FPT_TST.1: 8
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_TRP.1: 8
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.PHYSICAL_SECUR: 1
- A.PHYSICAL_SECURITY: 1
- A.SSL: 3
- A.TIMESTAMP: 1
- A.TIME_STAMP: 1
- A.TRUSTED_ADMIN: 1
- A.TRUSTED_ADMINISTRATOR: 3
- A.TRUSTED_AUTHE: 1
- A.TRUSTED_AUTHENTICATION_SERVER: 2
- A.TRUSTED_NETW: 1
- A.TRUSTED_NETWORK: 2
- O:
- O.AUDITS: 8
- O.CONTROL_DATA_AC: 2
- O.CONTROL_DATA_ACCESS: 2
- O.FAXLINE: 5
- O.HANDLING_AUTHENTICATION_FAILURE: 4
- O.IDENTIFICATION_AN: 4
- O.IDENTIFICATION_AND_AUTHENTICATION_FOR_NETWORK_SCA: 2
- O.IDENTIFICATION_AND_AUTHENTICATION_FOR_NETWORK_SCAN_SERV: 1
- O.IDENTIFICATION_AND_AUTHENTICATION_ON_ADMINISTRATO: 2
- O.IDENTIFICATION_AND_AUTHENTICATION_ON_ADMINISTRATOR: 1
- O.IMAGE_OVERWRITE: 6
- O.NETWORK_ACCESS_: 2
- O.NETWORK_ACCESS_CONTROL: 4
- O.STORAGE_DATA_ENCRYPTION: 5
- OE:
- OE.PHYSICAL_SECURITY: 2
- OE.SSL: 2
- OE.TIME_STAMP: 3
- OE.TRUSTED_ADMIN: 1
- OE.TRUSTED_ADMINISTRATOR: 1
- OE.TRUSTED_AUTHENTICATION_SERVER: 2
- OE.TRUSTED_NETWORK: 2
- T:
- T.AUDITS: 2
- T.CERTIFICATION_: 1
- T.CERTIFICATION_TRIAL_IN_A_ROW: 2
- T.CHANGE_AND_RE: 1
- T.CHANGE_AND_READ_STORAGE_DATA: 2
- T.DATA_ACCESS: 3
- T.INFAX: 1
- T.RECOVER: 2
- T.TOE_ACCESS_ON: 1
- T.TOE_ACCESS_ON_NETWORK: 2
- T.UNAUTHORIZED_: 2
- T.UNAUTHORIZED_ACCESS_ON_NETWORK_SCAN_SERVICE: 2
- T.UNAUTHORIZED_ACCESS_ON_TOE: 3
|
- A:
- A.ACCESS: 3
- A.ADMIN: 5
- A.SECMODE: 5
- A.USER: 3
- O:
- O.AUDITS: 8
- O.CIPHER: 6
- O.COMM_SEC: 7
- O.FAX_SEC: 5
- O.MANAGE: 9
- O.RESIDUAL: 4
- O.RESTRICT: 7
- O.USER: 7
- O.VERIFY: 4
- OE:
- OE.ADMIN: 3
- OE.PHYSICAL: 3
- OE.SEC: 9
- OE.USER: 3
- T:
- T.COMM_TAP: 5
- T.CONFDATA: 3
- T.CONSUME: 5
- T.DATA_SEC: 3
- T.RECOVER: 5
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- FIPS:
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- RFC:
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: KOSYAS_JY
- /CreationDate: D:20101026094759
- /Creator: ePapyrus PDF-Pro 4 Free
- /ModDate: D:20101026094759
- /Producer: ePapyrus PDF-Pro 4 Free
- /Title: Microsoft Word - [ST] Samsung MFP Security Kit Type_A V2.0_En_Final-r1.docx
- pdf_file_size_bytes: 2302864
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 94
|
- /Author:
- /CreationDate: D:20140926160828+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20140926160828+09'00'
- /Producer: Acrobat Distiller 10.1.12 (Windows)
- /Title:
- pdf_file_size_bytes: 611945
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 97
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |