Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Samsung MFP Security Kit Type_A V2.0
KECS-CISS-0228-2010
Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B
ANSSI-CC-2015/16
name Samsung MFP Security Kit Type_A V2.0 Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme KR FR
not_valid_after 01.06.2019 15.05.2020
not_valid_before 22.04.2010 15.05.2015
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CISS-228-EN.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_16.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CISS-228-ST-EN.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_16_Cible.pdf
manufacturer HP Inc. Incard Division / ST Microelectronics
manufacturer_web https://www8.hp.com/hpnext/tags/hp-inc#.Vjdf803sn4g
security_level EAL3 EAL5+, ALC_DVS.2, AVA_VAN.5
dgst 4abff534c43328df bb81f40b202b203a
heuristics/cert_id KECS-CISS-0228-2010 ANSSI-CC-2015/16
heuristics/cert_lab [] SERMA
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ALC_TAT.2, ASE_REQ.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 2.0 2.11.0
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2015/17
heuristics/report_references/directly_referencing {} ANSSI-CC-2012/68
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2015/17
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2009/26, ANSSI-CC-2010/01, ANSSI-CC-2009/05, ANSSI-CC-2009/51, ANSSI-CC-2009/06, ANSSI-CC-2012/68, ANSSI-CC-2009/50, ANSSI-CC-2010/02, ANSSI-CC-2009/62, ANSSI-CC-2009/28
heuristics/scheme_data
  • category: Digital Multifunction Printer
  • cert_id: KECS-CISS-0228-2010
  • certification_date: 22.04.2010
  • enhanced:
    • assurance_level: EAL3
    • cc_version: CC V3.1 R2
    • cert_id: KECS-CISS-0228-2010
    • cert_link: https://itscc.kr/file/download.do?file=KPR100000001228
    • certification_date: 22.04.2010
    • developer: Samsung Electronics Co., Ltd.
    • expiration_date: 01.06.2019
    • holder: HP Inc.
    • maintenance_update: [frozendict({'name': 'Samsung MFP Security Kit Type_A V2.0 Assurance maintenance1', 'certification_date': datetime.date(2013, 7, 5), 'cert_id': 'KECS-CISS-0228a-2010', 'maintenance_link': 'https://itscc.kr/file/download.do?file=KPR200000001181', 'target_link': 'https://itscc.kr/file/download.do?file=KPR200000001182'})]
    • product: Samsung MFP Security Kit Type_A V2.0
    • product_type: Digital Multifunction Printer
    • protection_profile: None
    • report_link: https://itscc.kr/file/download.do?file=KPR100000001227
    • target_link: https://itscc.kr/file/download.do?file=KPR100000001229
  • level: EAL3
  • product: Samsung MFP Security Kit Type_A V2.0
  • product_link: https://itscc.kr/certprod/view.do?product_id=228&product_class=4
  • vendor: HP Inc.
heuristics/st_references/directly_referencing {} ANSSI-CC-2012/68
heuristics/st_references/indirectly_referencing {} ANSSI-CC-2012/68
heuristics/protection_profiles {} 090c1a53c73889d8
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-07en.pdf
pdf_data/report_filename CISS-228-EN.pdf ANSSI-CC-2015_16.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 3
    • cert_id: ANSSI-CC-2015/16
    • cert_item: Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B
    • cert_item_version: Version 2.11.0
    • cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
    • developer: STMicroelectronics S.r.l. – Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie STMicroelectronics 29 Boulevard Romain Rolland, 75669 Paris Cedex 14, France Commanditaire STMicroelectronics S.r.l. – Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: PP JCS] Java Card protection profile – closed configuration, version 3.0
pdf_data/report_keywords/cc_cert_id
  • KR:
    • KECS-CISS-0228-2010: 1
  • FR:
    • ANSSI-CC-2012/68: 2
    • ANSSI-CC-2012/68-S02: 1
    • ANSSI-CC-2015/16: 16
    • ANSSI-CC-PP-2010/07-M01: 1
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-: 1
    • ANSSI-CC-PP-2010/07-M01: 1
  • BSI:
    • BSI-PP-0035-2007: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 2
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 1
    • EAL4: 2
    • EAL6: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_FLR.1: 1
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.PHYSICAL_SECURITY: 1
    • A.SSL: 1
    • A.TIME_STAMP: 1
    • A.TRUSTED_ADMINISTRATOR: 1
    • A.TRUSTED_AUTHENTICATION_SERVER: 1
    • A.TRUSTED_NETWORK: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Samsung:
    • Samsung: 17
  • STMicroelectronics:
    • STMicroelectronics: 6
pdf_data/report_keywords/eval_facility
  • KOSYAS:
    • KOSYAS: 2
  • Serma:
    • Serma Technologies: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 3
pdf_data/report_metadata
  • /Author: Administrator
  • /CreationDate: D:20101027144102+09'00'
  • /Creator: Haansoft Hangul 2007 7, 5, 12, 604
  • /ModDate: D:20101027144117+09'00'
  • /PDFVersion: 1.4
  • /Producer: Haansoft PDF 1.3.0.407
  • /Title: KECS-CISS-0228-2010_인증보고서(Samsung MFP Security Kit Type_A V2.0).hwp
  • pdf_file_size_bytes: 301262
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 22
  • /Author: Administrateur
  • /CreationDate: D:20150522134001+02'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ANSSI-CC-CER-F-07.016
  • /ModDate: D:20150522134001+02'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B
  • /Title: ANSSI-CC-2015/16
  • pdf_file_size_bytes: 579179
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
pdf_data/st_filename CISS-228-ST-EN.pdf ANSSI-CC-2015_16_Cible.pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2012/68: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0055: 2
    • BSI-PP- 0035: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 10
  • EAL:
    • EAL4+: 1
    • EAL5: 12
    • EAL5 augmented: 2
    • EAL5+: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 13
    • ADV_FSP.1: 4
    • ADV_FSP.2: 2
    • ADV_FSP.3: 14
    • ADV_TDS.1: 3
    • ADV_TDS.2: 15
  • AGD:
    • AGD_OPE.1: 13
    • AGD_PRE.1: 9
  • ALC:
    • ALC_CMC.3: 14
    • ALC_CMS.1: 1
    • ALC_CMS.3: 7
    • ALC_DEL.1: 6
    • ALC_DVS.1: 7
    • ALC_LCD.1: 8
  • ASE:
    • ASE_CCL.1: 15
    • ASE_ECD.1: 13
    • ASE_INT: 1
    • ASE_INT.1: 15
    • ASE_OBJ: 1
    • ASE_OBJ.2: 12
    • ASE_REQ: 2
    • ASE_REQ.1: 2
    • ASE_REQ.2: 14
    • ASE_SPD: 1
    • ASE_SPD.1: 9
    • ASE_TSS.1: 6
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 6
    • ATE_DPT.1: 6
    • ATE_FUN.1: 12
    • ATE_IND.2: 8
  • AVA:
    • AVA_VAN.2: 8
  • ADV:
    • ADV_ARC.1: 7
    • ADV_FSP.1: 4
    • ADV_FSP.2: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 9
    • ADV_IMP.1: 10
    • ADV_INT.2: 2
    • ADV_TDS.1: 2
    • ADV_TDS.3: 4
    • ADV_TDS.4: 9
  • AGD:
    • AGD_OPE.1: 7
    • AGD_PRE.1: 7
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.1: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 3
    • ALC_DVS.2: 9
    • ALC_LCD.1: 4
    • ALC_TAT.1: 2
    • ALC_TAT.2: 4
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 2
    • ASE_ECD: 2
    • ASE_ECD.1: 5
    • ASE_INT.1: 6
    • ASE_OBJ: 2
    • ASE_OBJ.2: 4
    • ASE_REQ: 2
    • ASE_REQ.1: 2
    • ASE_REQ.2: 3
    • ASE_SPD: 2
    • ASE_SPD.1: 3
    • ASE_TSS: 2
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 4
    • ATE_DPT.1: 1
    • ATE_DPT.3: 2
    • ATE_FUN.1: 7
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.4: 1
    • AVA_VAN.5: 9
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 7
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 8
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 7
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.4: 11
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_IFC.1: 8
    • FDP_IFC.2: 18
    • FDP_IFC.2.1: 2
    • FDP_IFC.2.2: 2
    • FDP_IFF.1: 26
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 2
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 2
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 25
    • FIA_AFL.1.1: 3
    • FIA_AFL.1.2: 3
    • FIA_UAU.1: 11
    • FIA_UAU.2: 22
    • FIA_UAU.2.1: 2
    • FIA_UAU.7: 10
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 10
    • FIA_UID.2: 19
    • FIA_UID.2.1: 2
  • FMT:
    • FMT_MOF.1: 8
    • FMT_MOF.1.1: 1
    • FMT_MSA.3: 8
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RCV.4: 7
    • FPT_RCV.4.1: 1
    • FPT_STM.1: 4
  • FAU:
    • FAU_ARP: 5
    • FAU_ARP.1: 3
    • FAU_SAA.1: 2
    • FAU_SAS.1: 2
  • FCS:
    • FCS_CKM: 3
    • FCS_CKM.1: 4
    • FCS_CKM.2: 2
    • FCS_CKM.3: 2
    • FCS_CKM.4: 2
    • FCS_COP: 9
    • FCS_COP.1: 4
    • FCS_RNG: 2
    • FCS_RNG.1: 7
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC: 8
    • FDP_ACC.2: 1
    • FDP_ACF: 7
    • FDP_ACF.1: 4
    • FDP_IFC: 3
    • FDP_IFC.1: 7
    • FDP_IFF: 3
    • FDP_IFF.1: 5
    • FDP_ITT.1: 4
    • FDP_RIP: 36
    • FDP_RIP.1: 3
    • FDP_ROL: 12
    • FDP_ROL.1: 3
    • FDP_SDI.2: 2
  • FIA:
    • FIA_ATD: 2
    • FIA_UID: 1
    • FIA_USB: 2
  • FMT:
    • FMT_LIM: 5
    • FMT_LIM.1: 13
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 12
    • FMT_LIM.2.1: 1
    • FMT_MSA: 14
    • FMT_MSA.1: 2
    • FMT_MSA.2: 2
    • FMT_MSA.3: 4
    • FMT_MTD: 6
    • FMT_SMF.1: 6
    • FMT_SMR: 1
    • FMT_SMR.1: 3
  • FPR:
    • FPR_UNO.1: 3
  • FPT:
    • FPT_FLS: 17
    • FPT_FLS.1: 5
    • FPT_ITT.1: 2
    • FPT_PHP.3: 2
    • FPT_TDC.1: 1
    • FPT_TST.1: 2
  • FRU:
    • FRU_FLT.2: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.PHYSICAL_SECUR: 1
    • A.PHYSICAL_SECURITY: 1
    • A.SSL: 3
    • A.TIMESTAMP: 1
    • A.TIME_STAMP: 1
    • A.TRUSTED_ADMIN: 1
    • A.TRUSTED_ADMINISTRATOR: 3
    • A.TRUSTED_AUTHE: 1
    • A.TRUSTED_AUTHENTICATION_SERVER: 2
    • A.TRUSTED_NETW: 1
    • A.TRUSTED_NETWORK: 2
  • O:
    • O.AUDITS: 8
    • O.CONTROL_DATA_AC: 2
    • O.CONTROL_DATA_ACCESS: 2
    • O.FAXLINE: 5
    • O.HANDLING_AUTHENTICATION_FAILURE: 4
    • O.IDENTIFICATION_AN: 4
    • O.IDENTIFICATION_AND_AUTHENTICATION_FOR_NETWORK_SCA: 2
    • O.IDENTIFICATION_AND_AUTHENTICATION_FOR_NETWORK_SCAN_SERV: 1
    • O.IDENTIFICATION_AND_AUTHENTICATION_ON_ADMINISTRATO: 2
    • O.IDENTIFICATION_AND_AUTHENTICATION_ON_ADMINISTRATOR: 1
    • O.IMAGE_OVERWRITE: 6
    • O.NETWORK_ACCESS_: 2
    • O.NETWORK_ACCESS_CONTROL: 4
    • O.STORAGE_DATA_ENCRYPTION: 5
  • OE:
    • OE.PHYSICAL_SECURITY: 2
    • OE.SSL: 2
    • OE.TIME_STAMP: 3
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_ADMINISTRATOR: 1
    • OE.TRUSTED_AUTHENTICATION_SERVER: 2
    • OE.TRUSTED_NETWORK: 2
  • T:
    • T.AUDITS: 2
    • T.CERTIFICATION_: 1
    • T.CERTIFICATION_TRIAL_IN_A_ROW: 2
    • T.CHANGE_AND_RE: 1
    • T.CHANGE_AND_READ_STORAGE_DATA: 2
    • T.DATA_ACCESS: 3
    • T.INFAX: 1
    • T.RECOVER: 2
    • T.TOE_ACCESS_ON: 1
    • T.TOE_ACCESS_ON_NETWORK: 2
    • T.UNAUTHORIZED_: 2
    • T.UNAUTHORIZED_ACCESS_ON_NETWORK_SCAN_SERVICE: 2
    • T.UNAUTHORIZED_ACCESS_ON_TOE: 3
  • A:
    • A.NO-DELETION: 5
    • A.NO-INSTALL: 5
    • A.VERIFICATION: 4
    • A.XXX: 1
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.CRYPTO: 6
    • D.EMBEDDED_SW_CODE: 4
    • D.EMBEDDED_SW_DATA: 4
    • D.GP_CODE: 3
    • D.GP_SENSITIVE_DATA: 3
    • D.JCS_CODE: 4
    • D.JCS_DATA: 6
    • D.PIN: 9
    • D.SEC_DATA: 5
  • O:
    • O.ALARM: 21
    • O.APPLET: 1
    • O.CIPHER: 40
    • O.FIREWALL: 26
    • O.GLOBAL_ARRAYS_CONFID: 15
    • O.GLOBAL_ARRAYS_INTEG: 8
    • O.GP_REGISTRY: 10
    • O.JAVA: 3
    • O.JAVAOB: 2
    • O.JAVAOBJECT: 20
    • O.KEY-MNGT: 15
    • O.KEY_MNGT: 1
    • O.LIFE_CYCLE: 12
    • O.NATIVE: 12
    • O.OBJ-DEL: 1
    • O.OBJ-DELETION: 6
    • O.OPERATE: 34
    • O.PIN-MNGT: 13
    • O.REALLOCATION: 9
    • O.RESOURCES: 9
    • O.RND: 1
    • O.ROLES: 7
    • O.SCP: 65
    • O.SID: 25
    • O.SIDE_CHANNEL: 10
    • O.TRANSACTION: 16
  • OE:
    • OE.CARD-MANAGEMENT: 12
    • OE.CARD_MANAGEMENT: 16
    • OE.MANAGEMENT_OF_SECRETS: 3
    • OE.NO-DELETION: 6
    • OE.NO-INSTALL: 5
    • OE.SCP: 3
    • OE.VERIFICATION: 32
  • OP:
    • OP.ARRAY_ACCESS: 4
    • OP.CARD_LOCK: 4
    • OP.CARD_TERMINATE: 4
    • OP.CREATE: 7
    • OP.GET_CARD_LIFE_CYCLE_: 1
    • OP.GET_CARD_LIFE_CYCLE_STATE: 2
    • OP.INSTANCE_FIELD: 4
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 6
    • OP.JAVA: 5
    • OP.MANAGE_APP_LIFE_CYC: 1
    • OP.MANAGE_APP_LIFE_CYCLE_STATE: 3
    • OP.PUT: 6
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 5
  • OSP:
    • OSP.CARD_ADMINISTRATION_DISABLED: 5
    • OSP.MANAGEMENT_OF_SECRETS: 6
    • OSP.ROLES: 5
    • OSP.VERIFICATION: 5
  • R:
    • R.JAVA: 5
  • T:
    • T.CONFID-APPLI-DATA: 17
    • T.CONFID-JCS-CODE: 6
    • T.CONFID-JCS-DATA: 11
    • T.EXE-CODE: 9
    • T.INTEG-: 1
    • T.INTEG-APPLI-CODE: 10
    • T.INTEG-APPLI-DATA: 21
    • T.INTEG-JCS-CODE: 6
    • T.INTEG-JCS-DATA: 10
    • T.LEAKAGE: 1
    • T.LIFE_CYCLE: 7
    • T.NATIVE: 4
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 9
    • T.RESOURCES: 7
    • T.SID: 16
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • Samsung:
    • Samsung: 112
  • STMicroelectronics:
    • STM: 15
    • STMicroelectronics: 8
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 8
  • AES_competition:
    • AES:
      • AES: 7
  • DES:
    • 3DES:
      • 3-DES: 2
      • Triple-DES: 1
      • TripleDES: 1
    • DES:
      • DES: 7
  • constructions:
    • MAC:
      • CBC-MAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • Diffie-Hellman: 5
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
      • SHA1: 2
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 1
      • SHA-512: 2
      • SHA224: 2
      • SHA256: 2
      • SHA384: 2
      • SHA512: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 4
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 12
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 1
    • RNG: 4
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 5
  • ECB:
    • ECB: 2
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
  • Neslib:
    • NesLib v.3.1: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 1
    • Physical tampering: 2
    • fault injection: 2
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • DPA: 3
    • Leak-Inherent: 1
    • SPA: 1
    • physical probing: 4
    • side channel: 1
    • timing attacks: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
  • FIPS:
    • FIPS PUB 197: 2
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
  • PKCS:
    • PKCS#1: 1
    • PKCS1: 1
    • PKCS3: 1
  • SCP:
    • SCP02: 1
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 2
  • JavaCard:
    • Java Card 3.0.4: 1
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
  • javacard:
    • javacard.framework: 4
    • javacard.framework.applet: 1
    • javacard.security: 23
    • javacard.security.interface: 4
  • javacardx:
    • javacardx.crypto: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
    • and is out of the scope of current evaluation. Any other application being loaded pre-issuance is out of scope of current evaluation. 4.1.2.1 Java Card Platform The Java technology, embedded on the TOE: 1
    • interface for the secure management of applications on the smart card. The Card Manager is out of scope of current evaluation and its administrative interface is permanently disabled before TOE delivery: 1
    • of the TOE to the parties responsible of the following usage phases. Application development is out of scope of current evaluation. TOE Construction phase includes: Product Development Product: 1
    • out of scope: 4
pdf_data/st_metadata
  • /Author: KOSYAS_JY
  • /CreationDate: D:20101026094759
  • /Creator: ePapyrus PDF-Pro 4 Free
  • /ModDate: D:20101026094759
  • /Producer: ePapyrus PDF-Pro 4 Free
  • /Title: Microsoft Word - [ST] Samsung MFP Security Kit Type_A V2.0_En_Final-r1.docx
  • pdf_file_size_bytes: 2302864
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 94
  • /Author: Luca Di Cosmo
  • /CreationDate: D:20150402161829+02'00'
  • /Creator: Microsoft® Word 2013
  • /ModDate: D:20150522134244+02'00'
  • /Producer: Microsoft® Word 2013
  • /Title: J-Safe_SB23YR80B_Security_Target
  • pdf_file_size_bytes: 1236830
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 90
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different