name |
ECOSYS M3860idnf, ECOSYS M3860idnfG(KYOCERA), P-6038ifMFP(TA Triumph-Adler/UTAX), with HDD |
STARCOS 3.5 ID GCC C2R |
category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
SE |
DE |
status |
active |
archived |
not_valid_after |
26.05.2025 |
18.11.2019 |
not_valid_before |
26.05.2020 |
17.11.2014 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Kyocera%20ECOSYS%20with%20HDD%20-%20Certifikat%20CCRA_signerat.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Kyocera%20ECOSYS%20with%20HDD%20-%20Certification%20Report.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0952a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Kyocera%20ECOSYS%20with%20HDD%20-%20ST%20v.%20104.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0952b_pdf.pdf |
manufacturer |
KYOCERA Document Solutions Inc. |
G+D Mobile Security GmbH |
manufacturer_web |
https://www.kyoceradocumentsolutions.com/ |
https://www.gi-de.com/de/de/mobile-security/ |
security_level |
EAL2+, ALC_FLR.2 |
EAL4+, ATE_DPT.2, ALC_DVS.2, AVA_VAN.5 |
dgst |
52f7856d28ac37d9 |
27e724cd297034a1 |
heuristics/cert_id |
CSEC2019007 |
BSI-DSZ-CC-0952-2014 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ALC_LCD.2, ASE_INT.1, ALC_DVS.2, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ASE_SPD.1, ATE_DPT.2, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_TAT.3, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ATE_IND.3, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ALC_CMC.5, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, APE_OBJ.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1 |
heuristics/extracted_versions |
- |
3.5 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0952-V2-2016 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0751-2013, BSI-DSZ-CC-0813-2012 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0952-V2-2016 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0751-2013, BSI-DSZ-CC-0813-2012 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0813-2012 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012 |
heuristics/protection_profiles |
{} |
0e62a9ea5e7ca3a7 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0061b_pdf.pdf |
pdf_data/cert_filename |
Kyocera ECOSYS with HDD - Certifikat CCRA_signerat.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20200528153116+02'00'
- /Creator: RICOH MP C4504ex
- /ModDate: D:20200528154528+02'00'
- /Producer: RICOH MP C4504ex
- pdf_file_size_bytes: 718478
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
Kyocera ECOSYS with HDD - Certification Report.pdf |
0952a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5 SOGIS Recognition Agreement
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0952-2014
- cert_item: STARCOS 3.5 ID GCC C2R
- cert_lab: BSI
- developer: Giesecke & Devrient GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Common Criteria Protection Profile Electronic Identity Card (ID_Card PP), Version 1.03, 16 December 2009, BSI-CC-PP-0061-2009 and in accordance with BSI Technische Richtlinie BSI-TR-03116-2, 2013
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0751-2013: 4
- BSI-DSZ-CC-0813-2012: 4
- BSI-DSZ-CC-0952-2014: 20
- BSI-DSZ-CC-S-0017-2014: 2
- BSI-DSZ-CC-S-0023-2013: 2
- BSI-DSZ-CC-S-0029-2014: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 7
- EAL 2: 4
- EAL 3: 4
- EAL 4: 14
- EAL 4 augmented: 3
- EAL 5: 8
- EAL 6: 3
- EAL 7: 4
- EAL5+: 1
- EAL6: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_TDS.1: 1
- AGD:
- ALC:
- ALC_CMC.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 3
- ASE:
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 3
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 6
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.DADMIN_TRUST: 1
- A.NETWORK: 1
- A.USER_EDUCATION: 1
- T:
- T.IMAGE_DATA: 1
- T.NETWORK: 1
- T.SETTING_DATA: 1
|
|
pdf_data/report_keywords/vendor |
|
- GD:
- G&D: 2
- Giesecke & Devrient: 19
- Infineon:
- Infineon: 3
- Infineon Technologies: 1
|
pdf_data/report_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 3
- TUV:
- TÜV Informationstechnik: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- fault injection: 1
- physical tampering: 1
- SCA:
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7138: 1
- BSI 7148: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ISO:
|
- BSI:
- AIS 20: 1
- AIS 25: 2
- AIS 26: 2
- AIS 31: 1
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 4
- ICAO:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Evaluation Technical Report (ETR) STARCOS 3.5 ID GCC C2R, SRC Security Research & Consulting GmbH (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product M7820 A11, Version 3, 02.04: 1
- TÜV Informationstechnik GmbH, Evaluation Body for IT Security (confidential document) [11] STARCOS 3.5 ID GCC C2 Configuration 1, Application Specification, Version 1.0, 14.03.2013: 1
- Version 1.1, 05.11.2014, Konfigurationsliste von STARCOS 3.5 ID GCC C2R, Giesecke & Devrient GmbH (confidential document) 21 / 34 Certification Report BSI-DSZ-CC-0952-2014 This page is intentionally left blank. 22 / 34: 1
- Version 2.7, 05.08.2013, STARCOS 3.5 ID GCC C2R Security Target, Giesecke & Devrient GmbH (confidential document) [7] Common Criteria Protection Profile Electronic Identity Card (ID_Card PP), Version 1.03, 15: 1
|
pdf_data/report_metadata |
- /Author: Ulf Noring
- /CreationDate: D:20200601165831+02'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20200601165831+02'00'
- /Producer: Microsoft® Word 2016
- /Subject: 19FMV3559-50:1
- /Title: Certification Report - KYOCERA ECOSYS M3860idnf, ECOSYS M3860idnfG, TA Tri-umph-Adler/UTAX P-6038if MFP, with HDD
- pdf_file_size_bytes: 474806
- pdf_hyperlinks: http://www.nmap.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20141203132656+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Giesecke & Devrient, G&D, STARCOS, nPA, Personalausweis, Identity Card, ID Card"
- /ModDate: D:20141203133150+01'00'
- /Producer: LibreOffice 4.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0952-2014
- pdf_file_size_bytes: 1238020
- pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
pdf_data/st_filename |
Kyocera ECOSYS with HDD - ST v. 104.pdf |
0952b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0035: 1
- BSI-CC-PP-0059-2009-MA-01: 2
- BSI-CC-PP-0061: 3
- BSI-PP-0055: 1
- BSI-PP-0056: 2
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2: 7
- EAL2 augmented: 1
|
- EAL:
- EAL 4: 2
- EAL 5: 2
- EAL4: 13
- EAL4 augmented: 3
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 4
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_DVS.1: 1
- ALC_DVS.2: 9
- APE:
- ASE:
- ATE:
- ATE_DPT.1: 2
- ATE_DPT.2: 9
- ATE_FUN.1: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 28
- FCS_CKM.1.1: 3
- FCS_CKM.2: 3
- FCS_CKM.4: 13
- FCS_COP.1: 27
- FCS_COP.1.1: 3
- FDP:
- FDP_ACC.1: 11
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_IFC.1: 11
- FDP_IFC.1.1: 1
- FDP_IFF.1: 8
- FDP_ITC.1: 3
- FDP_ITC.2: 3
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 8
- FIA_UAU.7.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 18
- FMT_MSA.1.1: 2
- FMT_MSA.3: 18
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 14
- FMT_MTD.1.1: 2
- FMT_SMF.1: 17
- FMT_SMF.1.1: 1
- FMT_SMR.1: 15
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FTA:
- FTA_SSL.3: 8
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 5
- FAU_SAS.1: 17
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 52
- FCS_CKM.1: 16
- FCS_CKM.2: 4
- FCS_CKM.4: 20
- FCS_COP: 56
- FCS_COP.1: 11
- FCS_RND: 7
- FCS_RND.1: 12
- FCS_RND.1.1: 2
- FCS_RNG.1: 3
- FDP:
- FDP_ACC: 16
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF: 23
- FDP_ACF.1: 21
- FDP_IFC.1: 5
- FDP_ITC.1: 7
- FDP_ITC.2: 8
- FDP_ITT.1: 1
- FDP_RIP: 4
- FDP_RIP.1: 13
- FDP_SDI: 14
- FDP_SDI.1: 3
- FDP_SDI.2: 7
- FIA:
- FIA_AFL: 32
- FIA_AFL.1: 8
- FIA_API: 20
- FIA_API.1: 4
- FIA_API.1.1: 3
- FIA_SOS.2: 1
- FIA_UAU: 45
- FIA_UAU.1: 10
- FIA_UAU.4: 6
- FIA_UAU.4.1: 1
- FIA_UAU.5: 15
- FIA_UAU.6: 8
- FIA_UIA: 1
- FIA_UID: 25
- FIA_UID.1: 11
- FMT:
- FMT_LIM: 13
- FMT_LIM.1: 16
- FMT_LIM.1.1: 2
- FMT_LIM.2: 15
- FMT_LIM.2.1: 2
- FMT_MOF: 2
- FMT_MOF.1: 1
- FMT_MSA: 14
- FMT_MSA.1: 5
- FMT_MSA.2: 1
- FMT_MSA.3: 8
- FMT_MSA.4: 1
- FMT_MTD: 86
- FMT_MTD.1: 12
- FMT_MTD.1.1: 2
- FMT_MTD.3: 9
- FMT_MTD.3.1: 1
- FMT_SMF: 5
- FMT_SMF.1: 38
- FMT_SMR: 4
- FMT_SMR.1: 31
- FPT:
- FPT_FLS: 3
- FPT_FLS.1: 12
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP: 6
- FPT_PHP.1: 5
- FPT_PHP.3: 14
- FPT_TST: 2
- FPT_TST.1: 15
- FPT_TST.1.3: 1
- FPT_TST.2: 2
- FRU:
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 5
- A.DADMIN_TRUST: 4
- A.NETWORK: 3
- A.NETWROK: 1
- A.USER_EDUCATION: 5
- O:
- O.ACCESS_CONTROL: 6
- O.DOC_OVERWRITE: 4
- O.FAX_CONTROL: 5
- O.HDD_ENCRYPTION: 7
- O.NETWORK_ENCRYPTION: 7
- O.SETTING_DATA: 7
- OE:
- OE.ACCESS: 4
- OE.DADMIN_TRUST: 3
- OE.NETWORK_PROTECTION: 3
- OE.USER_EDUCATION: 3
- T:
- T.IMAGE_DATA: 3
- T.NETWORK: 4
- T.SETTING_DATA: 4
|
- A:
- O:
- OE:
- OE.CGA_SSCD: 3
- OE.CGA_TC_SVD: 2
- OE.HID_TC_VAD: 1
- OE.HID_VAD: 2
- OE.SCA_TC_DTBS: 1
- T:
|
pdf_data/st_keywords/vendor |
|
- GD:
- Infineon:
- Infineon: 3
- Infineon Technologies AG: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 1
- DHE: 2
- Diffie-Hellman: 4
- RSA:
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 4
- SHA-384: 3
- SHA-512: 2
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-224: 2
- SHA-256: 3
- SHA-384: 1
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IPsec:
- TLS:
- SSL:
- SSL: 1
- SSLv1.0: 1
- SSLv2.0: 1
- SSLv3.0: 1
- TLS:
- TLS: 17
- TLS 1.2: 1
- TLSv1.0: 1
- TLSv1.1: 1
- TLSv1.2: 2
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_GCM_SHA384: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 14
- Physical Tampering: 4
- Physical tampering: 2
- fault injection: 1
- malfunction: 6
- physical tampering: 7
- SCA:
- DPA: 2
- Leak-Inherent: 6
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-4: 3
- FIPS 186-4: 2
- FIPS 197: 4
- FIPS 46-3: 1
- FIPS PUB 180-4: 3
- FIPS PUB 197: 3
- NIST:
- SP 800-135: 3
- SP 800-67: 1
- PKCS:
- RFC:
- RFC 2104: 2
- RFC 2409: 2
- RFC 5114: 1
- RFC2409: 2
- RFC5246: 11
- RFC5288: 4
- RFC5289: 4
|
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 180-4: 2
- FIPS 197: 4
- FIPS PUB 180-2: 2
- FIPS PUB 180-4: 1
- FIPS180-2: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-2: 1
- ISO/IEC 7816-4: 1
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- in case forwarding to the internal network fails, the TOE would prints the data. In this case it is out of scope of forwarding to the internal network and the security objective is fulfilled. FMT_MSA.1 (b: 1
- out of scope: 1
|
- OutOfScope:
- out of scope: 1
- to the plastic Identity Card is achieved by physical and organisational security measures being out of scope of the current ST. The TOE shall comprise at least a) the circuitry of the contactless chip incl: 1
|
pdf_data/st_metadata |
|
- /Author: stut
- /CreationDate: D:20141103145118+01'00'
- /Creator: Microsoft® Word 2010
- /Keywords: Version 2.9 Status 03.11.2014
- /ModDate: D:20141103145118+01'00'
- /Producer: Microsoft® Word 2010
- /Subject: STARCOS 3.5 ID GCC C2R
- /Title: Security Target Lite
- pdf_file_size_bytes: 2021253
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 132
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |