name |
ECOSYS M3860idnf, ECOSYS M3860idnfG(KYOCERA), P-6038ifMFP(TA Triumph-Adler/UTAX), with HDD |
Electronic Health Card and SSCD Version 2.10 |
category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
SE |
DE |
status |
active |
archived |
not_valid_after |
26.05.2025 |
01.09.2019 |
not_valid_before |
26.05.2020 |
07.10.2009 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Kyocera%20ECOSYS%20with%20HDD%20-%20Certifikat%20CCRA_signerat.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Kyocera%20ECOSYS%20with%20HDD%20-%20Certification%20Report.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0425a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Kyocera%20ECOSYS%20with%20HDD%20-%20ST%20v.%20104.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0425b_pdf.pdf |
manufacturer |
KYOCERA Document Solutions Inc. |
Gemalto |
manufacturer_web |
https://www.kyoceradocumentsolutions.com/ |
https://www.gemalto.com/ |
security_level |
EAL2+, ALC_FLR.2 |
EAL4+, AVA_MSU.3, ALC_DVS.2, AVA_VLA.4 |
dgst |
52f7856d28ac37d9 |
c2669b60564931e6 |
heuristics/cert_id |
CSEC2019007 |
BSI-DSZ-CC-0425-2009 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ATE_COV.2, ADV_RCR.1, ALC_TAT.1, AVA_VLA.4, ATE_DPT.2, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_SOF.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_DVS.2, ALC_LCD.1, ADV_IMP.2, ADV_FSP.2, ADV_SPM.1, AVA_MSU.3 |
heuristics/extracted_versions |
- |
2.10 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0663-2009 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0437-2008 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0663-2009 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0437-2008, BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0399-2007, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0223-2003 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0437-2008 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0437-2008 |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
Kyocera ECOSYS with HDD - Certifikat CCRA_signerat.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20200528153116+02'00'
- /Creator: RICOH MP C4504ex
- /ModDate: D:20200528154528+02'00'
- /Producer: RICOH MP C4504ex
- pdf_file_size_bytes: 718478
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
Kyocera ECOSYS with HDD - Certification Report.pdf |
0425a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0425-2009
- cert_item: Electronic Health Card and SSCD Version 2.10
- cert_lab: BSI
- developer: Gemalto
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0425: 1
- BSI-DSZ-CC-0425-2009: 20
- BSI-DSZ-CC-0437-2008: 1
- BSI-DSZ-CC-0437-2008-MA-02: 3
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP- 0002-2001: 1
- BSI-PP- 0006-2002: 1
- BSI-PP-0006-2002: 1
- BSI-PP-0020-V2-2007-MA02: 4
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 4: 9
- EAL 4 augmented: 3
- EAL 4+: 2
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 6
- EAL5+: 2
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_TDS.1: 1
- AGD:
- ALC:
- ALC_CMC.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 3
- ASE:
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_IMP.2: 5
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_DVS.1: 1
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_VLA: 3
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.DADMIN_TRUST: 1
- A.NETWORK: 1
- A.USER_EDUCATION: 1
- T:
- T.IMAGE_DATA: 1
- T.NETWORK: 1
- T.SETTING_DATA: 1
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon: 3
- Infineon Technologies AG: 2
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
- BSI 8: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ISO:
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 20: 4
- AIS 25: 3
- AIS 26: 3
- AIS 31: 2
- AIS 32: 1
- AIS 34: 4
- AIS 35: 2
- AIS 36: 3
- AIS 37: 1
- AIS 38: 1
- FIPS:
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Electronic Health Card and SSCD, TOE version 2.10, document version 2.15, 2009-05-26, Gemalto (confidential document) [7] Evaluation Technical Report, Version 4, Date: 2009-10-02, BSI-DSZ-CC-0425, Electronic Health: 1
- SLE66CX182PE / m1564-a14, All Products with RSA2048 V1.5 library, Version 1, 2008-04-02, TÜVIT (confidential document) [14] Infineon Technologies AG, Security and Chipcard ICs, Security Target, SLE66CX680PE/m1534-a14: 1
- STD Configuration Check List For GeGKOS on INFINEON SLE66CX680 PE, version 3.0 2008-04-08, Gemalto (confidential documents) [9] Security Target BSI-DSZ-CC-0425-2009, Document Reference: ASE02R10559 V0.9, Date 08: 1
- and SSCD 2.10 (confidential document) [8] Configuration list for the TOE: Configuration Check Electronic Health Card and SSCD, version 3: 1
|
pdf_data/report_metadata |
- /Author: Ulf Noring
- /CreationDate: D:20200601165831+02'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20200601165831+02'00'
- /Producer: Microsoft® Word 2016
- /Subject: 19FMV3559-50:1
- /Title: Certification Report - KYOCERA ECOSYS M3860idnf, ECOSYS M3860idnfG, TA Tri-umph-Adler/UTAX P-6038if MFP, with HDD
- pdf_file_size_bytes: 474806
- pdf_hyperlinks: http://www.nmap.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20091022134539+02'00'
- /Creator: Writer
- /Keywords: "Electronic Health Card and SSCD Version 2.10, Gemalto, CC, Common Criteria, Zertifzierung, elektronische Gesundheitskarte (eGK)"
- /ModDate: D:20091028064538+01'00'
- /Producer: StarOffice 9
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0425-2009
- pdf_file_size_bytes: 724657
- pdf_hyperlinks: https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
pdf_data/st_filename |
Kyocera ECOSYS with HDD - ST v. 104.pdf |
0425b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0437-: 1
- BSI-DSZ-CC-0437-2008: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0006-2002: 1
- BSI-PP-0020: 2
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2: 7
- EAL2 augmented: 1
|
- EAL:
- EAL 4: 17
- EAL4: 12
- EAL4 augmented: 3
- EAL4+: 1
- EAL5: 1
- EAL5 augmented: 1
- EAL5+: 4
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_AUT.1: 4
- ACM_CAP.3: 3
- ACM_CAP.4: 4
- ACM_SCP.1: 1
- ACM_SCP.2: 5
- ACM_XXX: 1
- ADO:
- ADO_DEL.2: 6
- ADO_IGS.1: 10
- ADV:
- ADV_FSP.1: 18
- ADV_FSP.2: 6
- ADV_HLD.1: 3
- ADV_HLD.2: 6
- ADV_IMP.1: 5
- ADV_IMP.2: 13
- ADV_LLD.1: 9
- ADV_RCR.1: 11
- ADV_SPM: 1
- ADV_SPM.1: 8
- AGD:
- AGD_ADM.1: 16
- AGD_USR: 2
- AGD_USR.1: 8
- ALC:
- ALC_DVS: 1
- ALC_DVS.1: 10
- ALC_DVS.2: 1
- ALC_LCD.1: 7
- ALC_TAT: 1
- ALC_TAT.1: 11
- ATE:
- ATE_COV.2: 6
- ATE_DPT.1: 4
- ATE_DPT.2: 1
- ATE_FUN.1: 11
- ATE_IND.2: 6
- AVA:
- AVA_MSU.3: 13
- AVA_SOF.1: 8
- AVA_VLA.4: 14
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 28
- FCS_CKM.1.1: 3
- FCS_CKM.2: 3
- FCS_CKM.4: 13
- FCS_COP.1: 27
- FCS_COP.1.1: 3
- FDP:
- FDP_ACC.1: 11
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_IFC.1: 11
- FDP_IFC.1.1: 1
- FDP_IFF.1: 8
- FDP_ITC.1: 3
- FDP_ITC.2: 3
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 8
- FIA_UAU.7.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 18
- FMT_MSA.1.1: 2
- FMT_MSA.3: 18
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 14
- FMT_MTD.1.1: 2
- FMT_SMF.1: 17
- FMT_SMF.1.1: 1
- FMT_SMR.1: 15
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FTA:
- FTA_SSL.3: 8
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FCS:
- FCS_CKM: 32
- FCS_CKM.1: 16
- FCS_CKM.1.1: 1
- FCS_CKM.2: 5
- FCS_CKM.3: 3
- FCS_CKM.4: 28
- FCS_CKM.4.1: 1
- FCS_COP: 72
- FCS_COP.1: 24
- FCS_COP.1.1: 1
- FCS_RND: 5
- FCS_RND.1: 17
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 43
- FDP_ACC.1: 24
- FDP_ACC.1.1: 2
- FDP_ACC.2: 21
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 2
- FDP_ACF: 48
- FDP_ACF.1: 48
- FDP_ACF.1.1: 5
- FDP_ACF.1.2: 5
- FDP_ETC: 5
- FDP_ETC.1: 5
- FDP_IFC.1: 12
- FDP_ITC: 9
- FDP_ITC.1: 20
- FDP_ITC.2: 14
- FDP_RIP: 12
- FDP_RIP.1: 8
- FDP_SDI: 21
- FDP_SDI.1: 1
- FDP_SDI.2: 16
- FDP_UCT.1: 11
- FDP_UIT: 30
- FDP_UIT.1: 25
- FDP_UIT.1.2: 2
- FIA:
- FIA_AFL: 24
- FIA_AFL.1: 19
- FIA_ATD: 8
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_UAU: 7
- FIA_UAU.1: 20
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 11
- FIA_UAU.4.1: 1
- FIA_UID: 10
- FIA_UID.1: 18
- FIA_UID.1.1: 2
- FIA_UID.1.2: 4
- FMT:
- FMT_LIM: 6
- FMT_LIM.1: 19
- FMT_LIM.1.1: 2
- FMT_LIM.2: 18
- FMT_LIM.2.1: 1
- FMT_MOF.1: 11
- FMT_MOF.1.1: 1
- FMT_MSA: 22
- FMT_MSA.1: 9
- FMT_MSA.1.1: 4
- FMT_MSA.2: 34
- FMT_MSA.2.1: 1
- FMT_MSA.3: 22
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 2
- FMT_MTD: 44
- FMT_MTD.1: 21
- FMT_MTD.3: 4
- FMT_SMF: 31
- FMT_SMF.1: 14
- FMT_SMR: 29
- FMT_SMR.1: 17
- FPT:
- FPT_AMT: 1
- FPT_AMT.1: 10
- FPT_AMT.1.1: 1
- FPT_FLS: 2
- FPT_FLS.1: 11
- FPT_FLS.1.1: 2
- FPT_PHP: 8
- FPT_PHP.1: 8
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 12
- FPT_PHP.3.1: 1
- FPT_RVM.1: 13
- FPT_SEP.1: 12
- FPT_SEP.1.1: 2
- FPT_SEP.1.2: 1
- FPT_TRP: 1
- FPT_TST: 1
- FPT_TST.1: 13
- FPT_TST.1.1: 2
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FRU:
- FTP:
- FTP_ITC: 36
- FTP_ITC.1: 21
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 7
- FTP_ITC.1.3: 5
- FTP_TRP: 16
- FTP_TRP.1: 17
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 4
- FTP_TRP.1.3: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 5
- A.DADMIN_TRUST: 4
- A.NETWORK: 3
- A.NETWROK: 1
- A.USER_EDUCATION: 5
- O:
- O.ACCESS_CONTROL: 6
- O.DOC_OVERWRITE: 4
- O.FAX_CONTROL: 5
- O.HDD_ENCRYPTION: 7
- O.NETWORK_ENCRYPTION: 7
- O.SETTING_DATA: 7
- OE:
- OE.ACCESS: 4
- OE.DADMIN_TRUST: 3
- OE.NETWORK_PROTECTION: 3
- OE.USER_EDUCATION: 3
- T:
- T.IMAGE_DATA: 3
- T.NETWORK: 4
- T.SETTING_DATA: 4
|
- A:
- D:
- D.DTBS: 11
- D.DTBS-: 1
- D.IMAGE: 12
- D.RAD: 25
- D.SCD: 32
- D.SIGNATURE: 16
- D.SIGN_APPLI: 4
- D.SVD: 26
- D.VAD: 8
- O:
- OE:
- OT:
- OT.EEPROM: 10
- OT.INIT: 3
- OT.SCD_UNIQUE: 3
- T:
- T.EEPROM: 8
- T.RND: 2
- T.SCD_DERIVE: 1
|
pdf_data/st_keywords/vendor |
|
- Gemalto:
- Gemalto: 2
- Gemalto N.V: 2
- Infineon:
- Infineon Technologies AG: 3
|
pdf_data/st_keywords/eval_facility |
|
- TUV:
- TUV Informationstechnik: 1
- TÜViT: 1
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 1
- DHE: 2
- Diffie-Hellman: 4
- RSA:
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 4
- SHA-384: 3
- SHA-512: 2
|
- RIPEMD:
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 8
- SHA-384: 1
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IPsec:
- TLS:
- SSL:
- SSL: 1
- SSLv1.0: 1
- SSLv2.0: 1
- SSLv3.0: 1
- TLS:
- TLS: 17
- TLS 1.2: 1
- TLSv1.0: 1
- TLSv1.1: 1
- TLSv1.2: 2
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_GCM_SHA384: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Malfunction: 12
- Physical Tampering: 2
- Physical tampering: 1
- fault injection: 1
- malfunction: 4
- physical tampering: 11
- SCA:
- physical probing: 4
- side channels: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-4: 3
- FIPS 186-4: 2
- FIPS 197: 4
- FIPS 46-3: 1
- FIPS PUB 180-4: 3
- FIPS PUB 197: 3
- NIST:
- SP 800-135: 3
- SP 800-67: 1
- PKCS:
- RFC:
- RFC 2104: 2
- RFC 2409: 2
- RFC 5114: 1
- RFC2409: 2
- RFC5246: 11
- RFC5288: 4
- RFC5289: 4
|
- BSI:
- AIS 20: 3
- AIS 34: 2
- AIS 36: 1
- AIS20: 1
- AIS31: 3
- AIS36: 1
- CC:
- CCMB-2005-08-001: 3
- CCMB-2005-08-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS PUB 46-3: 1
- ISO:
- PKCS:
- PKCS #1: 1
- PKCS#1: 2
- PKCS1: 2
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- in case forwarding to the internal network fails, the TOE would prints the data. In this case it is out of scope of forwarding to the internal network and the security objective is fulfilled. FMT_MSA.1 (b: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
|
- /Author: FDefranc
- /CreationDate: D:20090918121942+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20091028064707+01'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Title: Security Target lite Electronic Health Card and SSCD 2.10
- pdf_file_size_bytes: 1095009
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 120
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |