name |
IFX_CCI_000Dh, IFX_CCI_0020h, IFX_CCI_0031h, IFX_CCI_0032h, IFX_CCI_0034h, IFX_CCI_0037h design step T31 and M31 with optional HSL v2.62.7626, optional SCL version v2.04.003, UMSLC lib v01.00.0234 with specific IC-dedicated firmware identifier 80.301.05.1 and user guidance
|
Following MFP with Fax Option JAPAN: MFP: imagio MP 6001 SP,imagio MP 7501 SP Fax Option: imagio FAX Unit Type 18 Overseas: MFP: Ricoh Aficio MP 6001 SP, Ricoh Aficio MP 7001 SP, Ricoh Aficio MP 8001 SP, Ricoh Aficio MP 9001 SP, Savin 9060sp, Savin 9070sp, Savin 9080sp, Savin 9090sp, Lanier LD360sp, Lanier LD370sp, Lanier LD380sp, Lanier LD390sp, Lanier MP 6001 SP, Lanier MP 7001 SP, Lanier MP 8001 SP, Lanier MP 9001 SP, Gestetner MP 6001 SP,Gestetner MP 7001 SP, Gestetner MP 8001 SP,Gestetner MP 9001 SP, nashuatec MP 6001 SP, nashuatec MP 7001 SP, nashuatec MP 8001 SP,nashuatec MP 9001 SP, Rex-Rotary MP 6001 SP,Rex-Rotary MP 7001 SP, Rex-Rotary MP 8001 SP,Rex-Rotary MP 9001 SP, infotec MP 6001 SP,infotec MP 7001 SP, infotec MP 8001 SP,infotec MP 9001 SP Fax Option: Option Type 9001 MFP Version: Software System/Copy 1.15 Network Support 8.65 Scanner 01.19 Printer 1.15 Fax 02.00.00 Web Support 1.09 Web Uapl 1.05 Network Doc Box 1.04 Hardware Ic Key 1100 Ic Ctlr 03 FCU Version : GWFCU3-16(WW) 02.00.00
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
Multi-Function Devices
|
not_valid_before |
2023-07-07
|
2010-09-28
|
not_valid_after |
2028-07-07
|
2015-10-01
|
scheme |
DE
|
JP
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1126V3b_pdf.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0274_est.pdf
|
status |
active
|
archived
|
manufacturer |
Infineon Technologies AG
|
Ricoh Company, Ltd.
|
manufacturer_web |
https://www.infineon.com/
|
https://www.ricoh.com/
|
security_level |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
EAL3 |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1126V3a_pdf.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0274_erpt.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1126V3c_pdf.pdf
|
None
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) |
|
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
True
|
False
|
state/cert/download_ok |
True
|
False
|
state/cert/extract_ok |
True
|
False
|
state/cert/pdf_hash |
a898d4a86157ec15bbf8808d48e406f7f122e51b7b855ddb11be4e459ca5a2ad
|
None
|
state/cert/txt_hash |
5c1c68e813e57fcba15f6bed7a6c597a8e08789a567c4a8b7d8b9be399551e98
|
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
00a41e81b661048cf27a1758e91d178685fa882516e7a5415362ed5fb421e0e4
|
fdb58b3d82b8a7f8f8cd5a753d082480d80df5dc0b8c3c3ba63444fbf313e2a0
|
state/report/txt_hash |
ab887f73d00ba5894ade1984c8d30a34e6dafdb258d43c8ee13e1d29f0cd6adf
|
e1ecace10b97b3ceb9358eb1fb8a3c7cf6e558fa0a9accba2f0abbe17aa210f6
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
997668cece5a72d92950ca339967e2d7cb63ce9e17b222197f45de16e3fe9370
|
1fdc299bf7b896af57e30c5e70a7b554efd5d276f254641eb72dc0d370432206
|
state/st/txt_hash |
9fa4f995b4cf5d09a7509f851e5c8341c220dd2c62a198639683107aad11061c
|
511fd76f93a4d02c7ce683a602532d539a6ce00654dfe7027e4c8eafe768634d
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
BSI-DSZ-CC-1126-V3-2023
|
JISEC-CC-CRP-C0274
|
heuristics/cert_lab |
BSI |
None
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
80.301.05.1, 01.00.0234, 2.04.003, 2.62.7626 |
01.19, 1.05, 02.00.00, 1.09, 1.04, 1.15, 8.65 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
None
|
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1126-V2-2021 |
None
|
heuristics/report_references/indirectly_referenced_by |
None
|
None
|
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-1126-V2-2021, BSI-DSZ-CC-1126-2019 |
None
|
heuristics/scheme_data |
None
|
- cert_id:
C0274
- supplier:
RICOH COMPANY, LTD.
- toe_overseas_name:
Following MFP with Fax Option
MFP:
Ricoh Aficio MP 6001 SP, Ricoh Aficio MP 7001 SP,
Ricoh Aficio MP 8001 SP, Ricoh Aficio MP 9001 SP, Savin 9060sp,
Savin 9070sp, Savin 9080sp, Savin 9090sp, Lanier LD360sp,
Lanier LD370sp, Lanier LD380sp, Lanier LD390sp,
Lanier MP 6001 SP, Lanier MP 7001 SP, Lanier MP 8001 SP,
Lanier MP 9001 SP, Gestetner MP 6001 SP, Gestetner MP 7001 SP,
Gestetner MP 8001 SP, Gestetner MP 9001 SP,
nashuatec MP 6001 SP, nashuatec MP 7001 SP,
nashuatec MP 8001 SP, nashuatec MP 9001 SP, < Cont. >
- expiration_date:
2015-10
- claim:
EAL3
- certification_date:
2010-09
- toe_overseas_link:
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0274_it0292.html
- toe_japan_name:
MFP:
imagio MP 6001 SP, imagio MP 7501 SP
Fax Option:
imagio FAX Unit Type 18
- enhanced:
- product:
Following MFP with Fax Option
JAPAN:
MFP:
imagio MP 6001 SP, imagio MP 7501 SP
Fax Option:
imagio FAX Unit Type 18
Overseas:
MFP:
Ricoh Aficio MP 6001 SP, Ricoh Aficio MP 7001 SP, Ricoh Aficio MP 8001 SP, Ricoh Aficio MP 9001 SP, Savin 9060sp, Savin 9070sp, Savin 9080sp, Savin 9090sp, Lanier LD360sp, Lanier LD370sp, Lanier LD380sp, Lanier LD390sp, Lanier MP 6001 SP, Lanier MP 7001 SP, Lanier MP 8001 SP, Lanier MP 9001 SP, Gestetner MP 6001 SP, Gestetner MP 7001 SP, Gestetner MP 8001 SP, Gestetner MP 9001 SP, nashuatec MP 6001 SP, nashuatec MP 7001 SP, nashuatec MP 8001 SP, nashuatec MP 9001 SP, Rex-Rotary MP 6001 SP, Rex-Rotary MP 7001 SP, Rex-Rotary MP 8001 SP, Rex-Rotary MP 9001 SP, infotec MP 6001 SP, infotec MP 7001 SP, infotec MP 8001 SP, infotec MP 9001 SP
Fax Option:
Fax Option Type 9001
- toe_version:
MFP Version :
Software
System/Copy 1.15
Network Support 8.65
Scanner 01.19
Printer 1.15
Fax 02.00.00
Web Support 1.09
Web Uapl 1.05
Network Doc Box 1.04
Hardware
Ic Key 1100
Ic Ctlr 03
FCU Version : GWFCU3-16(WW) 02.00.00
- product_type:
Multi Function Product
- certification_date:
2010-09-28
- cc_version:
3.1
- assurance_level:
EAL3
- vendor:
RICOH COMPANY, LTD.
- evaluation_facility:
Information Technology Security Center Evaluation Department
- report_link:
https://www.ipa.go.jp/en/security/c0274_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0274_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0274_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE is a digital MFP which can digitize and manage as well as print and fax paper documents. It also provides a secure environment for using copier, scanner, printer, document server, and fax (optional) functions.
TOE security functionality
The major security functions of the TOE are:
-
Audit, which creates audit logs of security events.
-
Identification and Authentication, which identifies and authenticates users.
-
Document Data Access Control, which controls each users operation of documents.
-
Stored Data Protection, which encrypts stored document data on hard disk.
-
Network Communication Data Protection, which encrypts network communications.
-
Security Management, which provides total management of the security function settings.
-
Service Mode Lock, which controls the maintenance functions.
-
Telephone Line Intrusion Protection, which permits fax only communication.
-
MFP Control Software Verification, which checks the integrity of the software.
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
1126V3c_pdf.pdf
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
- cc_cert_id:
- DE:
- BSI-DSZ-CC-1126-V3-2023:
1
- cc_protection_profile_id:
- cc_security_level:
- EAL:
- EAL 5:
2
- EAL 2:
1
- EAL 5 augmented:
1
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- Infineon:
- Infineon Technologies AG:
1
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- ISO:
- ISO/IEC 15408:
2
- ISO/IEC 18045:
2
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
None
|
pdf_data/cert_metadata |
- pdf_file_size_bytes:
233749
- pdf_is_encrypted:
False
- pdf_number_of_pages:
1
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /Keywords:
Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-1126-V3-2023, IFX_CCI_000Dh, IFX_CCI_0020h, IFX_CCI_0031h, IFX_CCI_0032h, IFX_CCI_0034h, IFX_CCI_0037h design step T31 and M31 with optional HSLv2.62.7626, optional SCL version v2.04.003, UMSLC lib v01.00.0234 with specific IC-dedicated firmware identifier 80.301.05.1 and user guidance, Infineon Technologies AG
- /Subject:
Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-1126-V3-2023, IFX_CCI_000Dh, IFX_CCI_0020h, IFX_CCI_0031h, IFX_CCI_0032h, IFX_CCI_0034h, IFX_CCI_0037h design step T31 and M31 with optional HSLv2.62.7626, optional SCL version v2.04.003, UMSLC lib v01.00.0234 with specific IC-dedicated firmware identifier 80.301.05.1 and user guidance, Infineon Technologies AG
- /Title:
Certificate BSI-DSZ-CC-1126-V3-2023
- pdf_hyperlinks:
|
None
|
pdf_data/report_filename |
1126V3a_pdf.pdf
|
c0274_erpt.pdf
|
pdf_data/report_frontpage |
- DE:
- match_rules:
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
- cert_id:
BSI-DSZ-CC-1126-V3-2023
- cert_item:
IFX_CCI_000Dh, IFX_CCI_0020h, IFX_CCI_0031h, IFX_CCI_0032h, IFX_CCI_0034h, IFX_CCI_0037h design step T31 and M31 with optional HSL v2.62.7626, optional SCL version v2.04.003, UMSLC lib v01.00.0234 with specific IC-dedicated firmware identifier 80.301.05.1 and user guidance
- developer:
Infineon Technologies AG
- cert_lab:
BSI
- ref_protection_profiles:
Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP- 0084-2014
- cc_version:
PP conformant plus product specific extensions Common Criteria Part 2 extended
- cc_security_level:
Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5 valid until: 6 July 2028
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1126-V3-2023:
18
- BSI-DSZ-CC-1126-V2-2021:
2
|
- JP:
- CRP-C0274-01:
1
- Certification No. C0274:
1
|
pdf_data/report_keywords/cc_claims |
|
- T:
- T.ILLEGAL_USE:
4
- T.UNAUTH_ACCESS:
7
- T.ABUSE_SEC_MNG:
3
- T.SALVAGE:
3
- T.TRANSIT:
3
- T.FAX_LINE:
3
- A:
- A.ADMIN:
2
- A.SUPERVISOR:
1
- A.NETWORK:
1
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0084-2014:
1
- BSI-CC-PP-0084-2014:
3
|
|
pdf_data/report_keywords/cc_sar |
- ALC:
- ALC_DVS.2:
5
- ALC_FLR:
3
- ALC_CMC.4:
1
- ALC_CMS.5:
1
- ALC_DEL.1:
1
- ALC_LCD.1:
1
- ALC_TAT.2:
1
- AVA:
|
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 5:
8
- EAL 2:
3
- EAL 1:
1
- EAL 4:
1
- EAL5+:
1
- EAL6:
1
- EAL 5 augmented:
3
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process/ConfidentialDocument |
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification:
1
- IFX_CCI_0037h T31 and M31 Security Target”, Version 4.5, 2023-02-20, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report, Version 1, 2023-05-26, “EVALUATION TECHNICAL REPORT SUMMARY (ETR:
1
- TÜV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January:
1
- “EVALUATION TECHNICAL REPORT FOR COMPOSITE EVALUATION (ETR COMP)”, TÜV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE, “Configuration Management Scope M5270 T31 and M31”, Version 1:
1
- 2019-07-10, Infineon Technologies AG (confidential document) [12] See table 2 in section B.2 [13] See table 2 in section B.2 [14] See table 2 in section B.2:
1
- Standards Compliance Verification”, Version 1, 2019-07-09, TÜV Informationstechnik GmbH (confidential document) 7 See section 9.1 for specific AIS. 24 / 28 BSI-DSZ-CC-1126-V3-2023 Certification Report C:
1
|
- users, receives the document data from client computers which are connected via Network, stores the confidential document data into HDD of the TOE, and performs outputting by print and delivery. Therefore, the TOE is a:
1
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik:
5
|
- ITSC:
- Information Technology Security Center:
3
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
- SCA:
- physical probing:
1
- SPA:
1
- DPA:
1
- FI:
- physical tampering:
1
- DFA:
1
|
|
pdf_data/report_keywords/side_channel_analysis/FI |
- physical tampering:
1
- DFA:
1
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- NIST:
- NIST SP 800-67:
1
- NIST SP 800-38A:
2
- NIST SP 800-38B:
3
- BSI:
- AIS 34:
2
- AIS 1:
1
- AIS 14:
1
- AIS 19:
1
- AIS 23:
1
- AIS 25:
1
- AIS 26:
1
- AIS 31:
2
- AIS 35:
2
- AIS 36:
3
- AIS 38:
1
- AIS 47:
1
- AIS31:
2
- ISO:
- ISO/IEC 15408:
4
- ISO/IEC 18045:
4
- ISO/IEC 17065:
2
|
- FIPS:
- BSI:
- CC:
- CCMB-2006-09-001:
2
- CCMB-2007-09-002:
2
- CCMB-2007-09-003:
2
- CCMB-2007-09-004:
2
|
pdf_data/report_keywords/standard_id/BSI |
- AIS 34:
2
- AIS 1:
1
- AIS 14:
1
- AIS 19:
1
- AIS 23:
1
- AIS 25:
1
- AIS 26:
1
- AIS 31:
2
- AIS 35:
2
- AIS 36:
3
- AIS 38:
1
- AIS 47:
1
- AIS31:
2
|
|
pdf_data/report_keywords/standard_id/FIPS |
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- DES:
- DES:
- 3DES:
- TDES:
3
- Triple-DES:
2
- TDEA:
1
- constructions:
|
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES |
6
|
3
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI TR-02102:
1
- BSI 7148:
1
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
- Infineon:
- Infineon Technologies AG:
11
- Infineon:
4
- Infineon Technologies:
1
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
463276
- pdf_is_encrypted:
False
- pdf_number_of_pages:
28
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-1126-V3-2023, IFX_CCI_000Dh, IFX_CCI_0020h, IFX_CCI_0031h, IFX_CCI_0032h, IFX_CCI_0034h, IFX_CCI_0037h design step T31 and M31 with optional HSLv2.62.7626, optional SCL version v2.04.003, UMSLC lib v01.00.0234 with specific IC-dedicated firmware identifier 80.301.05.1 and user guidance, Infineon Technologies AG
- /Subject: Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-1126-V3-2023, IFX_CCI_000Dh, IFX_CCI_0020h, IFX_CCI_0031h, IFX_CCI_0032h, IFX_CCI_0034h, IFX_CCI_0037h design step T31 and M31 with optional HSLv2.62.7626, optional SCL version v2.04.003, UMSLC lib v01.00.0234 with specific IC-dedicated firmware identifier 80.301.05.1 and user guidance, Infineon Technologies AG
- /Title:
Certification Report BSI-DSZ-CC-1126-V3-2023
- pdf_hyperlinks:
https://www.bsi.bund.de/zertifizierung, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte
|
- pdf_file_size_bytes:
347696
- pdf_is_encrypted:
False
- pdf_number_of_pages:
48
- /CreationDate: D:20110302164536+09'00'
- /Author:
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /Producer: Acrobat Distiller 8.2.3 (Windows)
- /ModDate: D:20110302164555+09'00'
- /Title:
CRP-e
- pdf_hyperlinks:
|
pdf_data/report_metadata//Author |
Bundesamt für Sicherheit in der Informationstechnik
|
|
pdf_data/report_metadata//Title |
Certification Report BSI-DSZ-CC-1126-V3-2023
|
CRP-e
|
pdf_data/report_metadata/pdf_file_size_bytes |
463276
|
347696
|
pdf_data/report_metadata/pdf_hyperlinks |
https://www.bsi.bund.de/zertifizierung, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte |
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
28
|
48
|
pdf_data/st_filename |
1126V3b_pdf.pdf
|
c0274_est.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
- O:
- O.RND:
1
- O.TDES:
1
- O.AES:
1
- T:
|
- O:
- O.AUDIT:
16
- O.DOC_ACC:
9
- O.MANAGE:
11
- O.MEM:
11
- O.NET:
10
- O.GENUINE:
9
- O.LINE_PROTECT:
7
- O.LINE:
2
- T:
- T.ILLEGAL_USE:
4
- T.UNAUTH_ACCESS:
3
- T.ABUSE_SEC_MNG:
4
- T.SALVAGE:
3
- T.TRANSIT:
4
- T.FAX_LINE:
3
- A:
- A.ADMIN:
5
- A.SUPERVISOR:
4
- A.NETWORK:
5
- OE:
- OE.ADMIN:
3
- OE.SUPERVISOR:
3
- OE.NETWORK:
3
|
pdf_data/st_keywords/cc_claims/O |
- O.RND:
1
- O.TDES:
1
- O.AES:
1
|
- O.AUDIT:
16
- O.DOC_ACC:
9
- O.MANAGE:
11
- O.MEM:
11
- O.NET:
10
- O.GENUINE:
9
- O.LINE_PROTECT:
7
- O.LINE:
2
|
pdf_data/st_keywords/cc_claims/T |
|
- T.ILLEGAL_USE:
4
- T.UNAUTH_ACCESS:
3
- T.ABUSE_SEC_MNG:
4
- T.SALVAGE:
3
- T.TRANSIT:
4
- T.FAX_LINE:
3
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_ARC.1:
2
- ADV_FSP.5: 4
- ADV_IMP.1: 2
- ADV_INT.2: 1
- ADV_TDS.4: 1
- ADV_FSP: 1
- ADV_FSP.4: 2
- ADV_TDS.3: 1
|
- ADV_ARC.1:
1
- ADV_FSP.3: 1
- ADV_TDS.2: 2
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 |
2
|
1
|
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 |
2
|
1
|
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 |
2
|
1
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_DVS: 1
- ALC_DVS.2: 8
- ALC_CMC.4: 1
- ALC_CMS.5: 3
- ALC_DEL.1:
1
- ALC_LCD.1:
1
- ALC_TAT.2: 1
- ALC_CMS: 1
- ALC_CMS.4: 1
- ALC_DVS.1:
1
|
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1:
1
- ALC_DVS.1:
1
- ALC_LCD.1:
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_LCD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE |
- ASE_INT: 13
- ASE_CCL: 5
- ASE_SPD: 4
- ASE_OBJ: 4
- ASE_ECD: 4
- ASE_REQ: 20
- ASE_TSS: 5
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_SPD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.2:
1
- ATE_DPT.3: 1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- ATE_DPT.1:
1
|
- ATE_COV.2:
1
- ATE_DPT.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL5+:
3
- EAL5:
5
- EAL 5:
3
- EAL5 augmented:
1
- EAL 5 augmented:
3
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS.1:
7
- FAU_SAS:
4
- FAU_GEN:
1
- FAU_SAS.1.1:
1
- FCS:
- FCS_RNG.1:
8
- FCS_RNG:
4
- FCS_COP:
8
- FCS_CKM:
6
- FCS_RNG.1.1:
1
- FCS_RNG.1.2:
1
- FCS_COP.1:
8
- FCS_CKM.1:
8
- FCS_CKM.4:
9
- FDP:
- FDP_ACC.1:
19
- FDP_ACF.1:
18
- FDP_SDC:
2
- FDP_SDC.1:
5
- FDP_SDI.2:
5
- FDP_ITT.1:
3
- FDP_IFC.1:
7
- FDP_UCT.1:
7
- FDP_UIT.1:
7
- FDP_ACC:
9
- FDP_ACF:
11
- FDP_ITC.1:
8
- FDP_ITC.2:
8
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
2
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
2
- FDP_ACF.1.4:
1
- FDP_SDI.2.1:
1
- FDP_SDI.2.2:
1
- FDP_SDC.1.1:
1
- FDP_UCT.1.1:
1
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FIA:
- FIA_API:
2
- FIA_API.1:
7
- FIA_API.1.1:
1
- FMT:
- FMT_MSA.1:
12
- FMT_MSA.3:
16
- FMT_SMF.1:
9
- FMT_LIM:
15
- FMT_LIM.1:
7
- FMT_LIM.2:
5
- FMT_SMR.1:
6
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MSA.1.1:
1
- FMT_SMF.1.1:
1
- FPT:
- FPT_TST.2:
29
- FPT_TST:
5
- FPT_TST.1:
11
- FPT_FLS.1:
5
- FPT_PHP.3:
3
- FPT_ITT.1:
3
- FPT_TST.2.1:
1
- FRU:
- FTP:
- FTP_ITC.1:
12
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1:
2
|
- FAU:
- FAU_GEN.1:
12
- FAU_GEN.1.1:
1
- FAU_SAR.1:
11
- FAU_SAR.2:
9
- FAU_STG.1:
9
- FAU_STG.4:
9
- FAU_GEN.1.2:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3:
1
- FAU_STG.4.1:
1
- FCS:
- FCS_CKM.1:
10
- FCS_COP.1:
9
- FCS_CKM.2:
2
- FCS_CKM.4:
7
- FCS_CKM.1.1:
1
- FCS_COP.1.1:
1
- FDP:
- FDP_ACC.1:
16
- FDP_ACF.1:
12
- FDP_IFC.1:
12
- FDP_IFF.1:
10
- FDP_ITC.1:
2
- FDP_ITC.2:
2
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_IFC.1.1:
1
- FDP_IFF.1.1:
1
- FDP_IFF.1.2:
1
- FDP_IFF.1.3:
1
- FDP_IFF.1.4:
1
- FDP_IFF.1.5:
1
- FDP_ADF.1:
1
- FIA:
- FIA_AFL.1:
10
- FIA_ATD.1:
11
- FIA_SOS.1:
8
- FIA_UAU.2:
12
- FIA_UAU.7:
9
- FIA_UID.2:
10
- FIA_USB.1:
10
- FIA_UAU.1:
6
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1.1:
1
- FIA_SOS.1.1:
1
- FIA_UID.1:
8
- FIA_UAU.2.1:
1
- FIA_UAU.7.1:
1
- FIA_UID.2.1:
1
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FMT:
- FMT_MSA.1:
12
- FMT_MSA.3:
14
- FMT_MTD.1:
18
- FMT_SMF.1:
19
- FMT_SMR.1:
19
- FMT_MSA.1.1:
1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FPT_STM.1:
10
- FPT_TST.1:
9
- FPT_STM.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FTP:
- FTP_ITC.1:
8
- FTP_TRP.1:
10
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1.1:
1
- FTP_TRP.1.2:
2
- FTP_TRP.1.3:
2
- FTP_TST.1:
1
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_SAS.1:
7
- FAU_SAS:
4
- FAU_GEN:
1
- FAU_SAS.1.1:
1
|
- FAU_GEN.1:
12
- FAU_GEN.1.1:
1
- FAU_SAR.1:
11
- FAU_SAR.2:
9
- FAU_STG.1:
9
- FAU_STG.4:
9
- FAU_GEN.1.2:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3:
1
- FAU_STG.4.1:
1
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_RNG.1: 8
- FCS_RNG: 4
- FCS_COP: 8
- FCS_CKM: 6
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FCS_COP.1:
8
- FCS_CKM.1:
8
- FCS_CKM.4:
9
|
- FCS_CKM.1:
10
- FCS_COP.1:
9
- FCS_CKM.2: 2
- FCS_CKM.4:
7
- FCS_CKM.1.1: 1
- FCS_COP.1.1: 1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
8
|
10
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
9
|
7
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
8
|
9
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACC.1:
19
- FDP_ACF.1:
18
- FDP_SDC: 2
- FDP_SDC.1: 5
- FDP_SDI.2: 5
- FDP_ITT.1: 3
- FDP_IFC.1:
7
- FDP_UCT.1: 7
- FDP_UIT.1: 7
- FDP_ACC: 9
- FDP_ACF: 11
- FDP_ITC.1:
8
- FDP_ITC.2:
8
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
2
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
2
- FDP_ACF.1.4:
1
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_SDC.1.1: 1
- FDP_UCT.1.1: 1
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
|
- FDP_ACC.1:
16
- FDP_ACF.1:
12
- FDP_IFC.1:
12
- FDP_IFF.1: 10
- FDP_ITC.1:
2
- FDP_ITC.2:
2
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_IFC.1.1: 1
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ADF.1: 1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
19
|
16
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
18
|
12
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
7
|
12
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
8
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
8
|
2
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_API:
2
- FIA_API.1:
7
- FIA_API.1.1:
1
|
- FIA_AFL.1:
10
- FIA_ATD.1:
11
- FIA_SOS.1:
8
- FIA_UAU.2:
12
- FIA_UAU.7:
9
- FIA_UID.2:
10
- FIA_USB.1:
10
- FIA_UAU.1:
6
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1.1:
1
- FIA_SOS.1.1:
1
- FIA_UID.1:
8
- FIA_UAU.2.1:
1
- FIA_UAU.7.1:
1
- FIA_UID.2.1:
1
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MSA.1:
12
- FMT_MSA.3:
16
- FMT_SMF.1:
9
- FMT_LIM: 15
- FMT_LIM.1: 7
- FMT_LIM.2: 5
- FMT_SMR.1:
6
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MSA.1.1:
1
- FMT_SMF.1.1:
1
|
- FMT_MSA.1:
12
- FMT_MSA.3:
14
- FMT_MTD.1: 18
- FMT_SMF.1:
19
- FMT_SMR.1:
19
- FMT_MSA.1.1:
1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
12
|
12
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
16
|
14
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
9
|
19
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
6
|
19
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_TST.2: 29
- FPT_TST: 5
- FPT_TST.1:
11
- FPT_FLS.1: 5
- FPT_PHP.3: 3
- FPT_ITT.1: 3
- FPT_TST.2.1: 1
|
- FPT_STM.1: 10
- FPT_TST.1:
9
- FPT_STM.1.1: 1
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
11
|
9
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_ITC.1:
12
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1:
2
|
- FTP_ITC.1:
8
- FTP_TRP.1:
10
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
- FTP_TST.1: 1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 |
12
|
8
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 |
2
|
10
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/TRNG |
|
|
pdf_data/st_keywords/side_channel_analysis |
- SCA:
- Leak-Inherent:
5
- Physical Probing:
2
- side channel:
1
- SPA:
1
- DPA:
2
- FI:
|
|
pdf_data/st_keywords/standard_id |
- NIST:
- NIST SP 800-67:
1
- NIST SP 800-38A:
1
- NIST SP 800-38B:
1
- BSI:
- ISO:
- ISO/IEC 7816-3:
1
- ISO/IEC 9798-2:
1
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
- FIPS:
- BSI:
- CC:
- CCMB-2006-09-002:
1
- CCMB-2007-09-002:
2
- CCMB-2007-09-003:
2
- CCMB-2006-09-001:
1
- CCMB-2007-09-0004:
1
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
- CCMB-2006-09-002:
1
- CCMB-2007-09-002:
2
- CCMB-2007-09-003:
2
- CCMB-2006-09-001:
1
- CCMB-2007-09-0004:
1
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- DES:
- 3DES:
- TDES:
10
- Triple-DES:
2
- TDEA:
1
- constructions:
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
15
|
3
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
- Infineon:
- Infineon Technologies:
7
- Infineon Technologies AG:
10
- Infineon:
3
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
455866
- pdf_is_encrypted:
False
- pdf_number_of_pages:
53
- /Author:
heinkel
- /Title:
Microsoft Word - IFX_CCI_000Dh_T31_M31_SecurityTargetLite.docx
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
2449170
- pdf_is_encrypted:
False
- pdf_number_of_pages:
83
- /Creator: Mar-C4_ST_ENG_20110223.doc - Microsoft Word
- /CreationDate: D:20110223182103
- /Title:
Mar-C4_ST_ENG_20110223.doc
- /Author:
p000266068
- /Producer: Acrobat PDFWriter 5.0 Windows NT
- pdf_hyperlinks:
|
pdf_data/st_metadata//Author |
heinkel
|
p000266068
|
pdf_data/st_metadata//Title |
Microsoft Word - IFX_CCI_000Dh_T31_M31_SecurityTargetLite.docx
|
Mar-C4_ST_ENG_20110223.doc
|
pdf_data/st_metadata/pdf_file_size_bytes |
455866
|
2449170
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
53
|
83
|
dgst |
4afb29a996cf7186
|
97e4283cc2be0953
|