name |
Following MFP with FCU(Fax Option Type C5000) MFP: Ricoh Aficio MP C2800, Ricoh Aficio MP C2800G, Ricoh Aficio MP C3300, Ricoh Aficio MP C3300G, Savin C2828, Savin C2828G, Savin C3333, Savin C3333G, Lanier LD528C, Lanier LD528CG, Lanier LD533C, Lanier LD533CG, Lanier MP C2800, Lanier MP C3300, Gestetner MP C2800, Gestetner MP C3300, nashuatec MP C2800, nashuatec MP C3300, Rex-Rotary MP C2800, Rex-Rotary MP C3300, infotec MP C2800, infotec MP C3300 FCU: Fax Option Type C5000 MFP Software /Hardware Version : Software System/Copy 1.22 Network Support 8.27 Scanner 01.23 Printer 1.22 Fax 04.00.00 Web Support 1.10 Web Uapl 1.08 Network Doc Box 1.03 Hardware Ic Key 1100 Ic Ctlr 03 FCU Version : GWFCU3-13(WW) 04.04.00
|
NXP JCOP 8.9 with eUICC extension on SN300 Secure Element, version JCOP-eUICC 8.9 R1.06.00.1.2, NXP JCOP 8.9 with eUICC extension on SN300 Secure Element, version JCOP-eUICC 8.9 R1.06.01.1.2
|
category |
Multi-Function Devices
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2010-08-31
|
2023-12-14
|
not_valid_after |
2015-09-01
|
2028-12-14
|
scheme |
JP
|
NL
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0266_est.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300100-01-ST-Lite_v1.2.pdf
|
status |
archived
|
active
|
manufacturer |
Ricoh Company, Ltd.
|
NXP Semiconductors Germany GmbH
|
manufacturer_web |
https://www.ricoh.com/
|
https://www.nxp.com
|
security_level |
EAL3 |
ALC_DVS.2, AVA_VAN.5, EAL4+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0266_erpt.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300100-01-CR.pdf
|
cert_link |
None
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300100-01.1-Cert.pdf
|
protection_profiles |
|
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Embedded UICC for Consumer Devices Protection Profile', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0100b_pdf.pdf', 'pp_ids': frozenset({'UICC_CD'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card System - Open Configuration Protection Profile', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0099V2b_pdf.pdf', 'pp_ids': None}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
False
|
True
|
state/cert/download_ok |
False
|
True
|
state/cert/extract_ok |
False
|
True
|
state/cert/pdf_hash |
None
|
2e51d3b780d02b4f7c6a2113878a3b00a2f0b0611fca7a8e8f4f32b76d74fbfe
|
state/cert/txt_hash |
None
|
c80e7978fbeab20819fd3bdca57e81da00606a24708dbd44bf8dd8fe6c593bdb
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
4a2725db8285c4280f1e18e1273122278ed97c7aa4bafd2877dbf4200557a88c
|
a12531a543f222af422a146957919104ecbc9b44535a9ce45c102afd73717126
|
state/report/txt_hash |
37d11d7d44bb18cebb5ba8182d96ac3ffdeaefba5f77c33246c6320aa4d95f1f
|
e9f5c26d50e032ec1349f52099261842f9007c58a8b8d1f9b98ef076cfe38db4
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
00eb8923e3de7e92705f4d9f86598c5d6c3110ad8d88995d7368d91611ab4345
|
978ce29914920008382b554f515cea7be7b20af3dd6dbd1b70849799668f2144
|
state/st/txt_hash |
98830cf4fb98dba7b8104d47ab10f40cfcda2d6689fe75e56105e6bc646625b9
|
dce0fe0d0a01335e8060bcb8029a8ceb6e009f8a7c64713c072a7c89e9f1ec8b
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
JISEC-CC-CRP-C0266
|
NSCIB-CC-2300100-01-CR
|
heuristics/cert_lab |
None
|
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
1.08, 1.22, 1.03, 8.27, 04.00.00, 04.04.00, 1.10, 01.23 |
8.9, 1.06.00.1.2, 1.06.01.1.2 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
None
|
heuristics/report_references/directly_referencing |
None
|
NSCIB-CC-2300083-01-CR |
heuristics/report_references/indirectly_referenced_by |
None
|
None
|
heuristics/report_references/indirectly_referencing |
None
|
NSCIB-CC-2300083-01-CR |
heuristics/scheme_data |
- cert_id:
C0266
- supplier:
RICOH COMPANY, LTD.
- toe_overseas_name:
Following MFP with FCU(Fax Option Type C5000)
MFP: Ricoh Aficio MP C2800, Ricoh Aficio MP C2800G, Ricoh Aficio MP C3300, Ricoh Aficio MP C3300G, Savin C2828, Savin C2828G, Savin C3333, Savin C3333G, Lanier LD528C, Lanier LD528CG, Lanier LD533C, Lanier LD533CG, Lanier MP C2800, Lanier MP C3300, Gestetner MP C2800, Gestetner MP C3300, nashuatec MP C2800, nashuatec MP C3300, Rex-Rotary MP C2800, Rex-Rotary MP C3300, infotec MP C2800, infotec MP C3300
FCU: Fax Option Type C5000
MFP Software /Hardware Version : < Cont. >
- expiration_date:
2015-09
- claim:
EAL3
- certification_date:
2010-08
- toe_overseas_link:
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0266_it0289.html
- toe_japan_name:
-----
- enhanced:
- product:
Following MFP with FCU(Fax Option Type C5000)
MFP:
Ricoh Aficio MP C2800, Ricoh Aficio MP C2800G, Ricoh Aficio MP C3300, Ricoh Aficio MP C3300G, Savin C2828, Savin C2828G, Savin C3333, Savin C3333G, Lanier LD528C, Lanier LD528CG, Lanier LD533C, Lanier LD533CG, Lanier MP C2800, Lanier MP C3300, Gestetner MP C2800, Gestetner MP C3300, nashuatec MP C2800, nashuatec MP C3300, Rex-Rotary MP C2800, Rex-Rotary MP C3300, infotec MP C2800, infotec MP C3300
FCU:
Fax Option Type C5000
- toe_version:
MFP Software /Hardware Version :
Software
System/Copy 1.22
Network Support 8.27
Scanner 01.23
Printer 1.22
Fax 04.00.00
Web Support 1.10
Web Uapl 1.08
Network Doc Box 1.03
Hardware
Ic Key 1100
Ic Ctlr 03
FCU Version : GWFCU3-13(WW) 04.04.00
- product_type:
Multi Function Product
- certification_date:
2010-08-31
- cc_version:
3.1
- assurance_level:
EAL3
- vendor:
RICOH COMPANY, LTD.
- evaluation_facility:
Information Technology Security Center Evaluation Department
- report_link:
https://www.ipa.go.jp/en/security/c0266_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0266_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0266_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE is a digital MFP which can digitize and manage as well as print and fax paper documents. It also provides a secure environment for using copier, scanner, printer, document server, and fax (optional) functions.
TOE security functionality
The major security functions of the TOE are:
-
Audit, which creates audit logs of security events.
-
Identification and Authentication, which identifies and authenticates users.
-
Document Data Access Control, which controls each users operation of documents.
-
Stored Data Protection, which encrypts stored document data on hard disk.
-
Network Communication Data Protection, which encrypts network communications.
-
Security Management, which provides total management of the security function settings.
-
Service Mode Lock, which controls the maintenance functions.
-
Telephone Line Intrusion Protection, which permits fax only communication.
-
MFP Control Software Verification, which checks the integrity of the software.
|
None
|
heuristics/st_references/directly_referenced_by |
None
|
None
|
heuristics/st_references/directly_referencing |
None
|
NSCIB-CC-2300083-01-CR |
heuristics/st_references/indirectly_referenced_by |
None
|
None
|
heuristics/st_references/indirectly_referencing |
None
|
NSCIB-CC-2300083-01-CR |
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
NSCIB-CC-2300100-01.1-Cert.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
- cc_cert_id:
- NL:
- NSCIB-CC-2300100-01:
1
- NSCIB-2300100-01:
1
- cc_protection_profile_id:
- BSI:
- BSI-CC-PP-0099-V2-2020:
1
- cc_security_level:
- EAL:
- EAL4:
1
- EAL2:
1
- EAL7:
1
- EAL4 augmented:
1
- cc_sar:
- ALC:
- ALC_DVS.2:
1
- ALC_FLR.3:
1
- ALC_FLR:
1
- AVA:
- cc_sfr:
- cc_claims:
- vendor:
- NXP:
- NXP Semiconductors:
1
- NXP:
2
- eval_facility:
- TUV:
- TÜV Informationstechnik:
1
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- ISO:
- ISO/IEC 15408-1:
2
- ISO/IEC 18045:
4
- ISO/IEC 18045:2008:
1
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
pdf_data/cert_metadata |
None
|
- pdf_file_size_bytes:
93017
- pdf_is_encrypted:
False
- pdf_number_of_pages:
1
- /Title:
NSCIB Certificate
- /Author:
Haak
- /Creator:
Microsoft® Word 2021
- /CreationDate:
D:20231218225328+00'00'
- /ModDate:
D:20231218225328+00'00'
- /Producer:
Microsoft® Word 2021
- pdf_hyperlinks:
|
pdf_data/report_filename |
c0266_erpt.pdf
|
NSCIB-CC-2300100-01-CR.pdf
|
pdf_data/report_frontpage |
|
- NL:
- cert_id:
NSCIB-CC-2300100-01-CR
- cert_item:
NXP JCOP 8.9 with eUICC extension on SN300 Secure Element, version JCOP-eUICC 8.9 R1.06.00.1.2, NXP JCOP 8.9 with eUICC extension on SN300 Secure Element, version JCOP-eUICC 8.9 R1.06.01.1.2
- developer:
NXP Semiconductors Germany GmbH
- cert_lab:
TÜV Informationstechnik GmbH
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0266-01:
1
- Certification No. C0266:
1
|
- NL:
- NSCIB-CC-2300100-01-CR:
13
- NSCIB-2300100-01:
3
- NSCIB-2300083-01-CR:
1
- NSCIB-2300083-01:
1
|
pdf_data/report_keywords/cc_claims |
- T:
- T.ILLEGAL_USE:
4
- T.UNAUTH_ACCESS:
7
- T.ABUSE_SEC_MNG:
3
- T.SALVAGE:
3
- T.TRANSIT:
3
- T.FAX_LINE:
3
- A:
- A.ADMIN:
2
- A.SUPERVISOR:
1
- A.NETWORK:
1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0099-V2-2020:
1
- BSI-CC-PP-0100-2018:
1
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
|
- EAL4:
2
- EAL4+:
1
- EAL 4:
1
- EAL4 augmented:
1
- EAL 4 augmented:
1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- users, receives the document data from client computers which are connected via Network, stores the confidential document data into HDD of the TOE, and performs outputting by print and delivery. Therefore, the TOE is a:
1
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center:
3
|
- TUV:
- TÜV Informationstechnik:
2
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224:
1
- SHA-256:
1
- SHA-384:
1
- SHA-512:
1
- SHA3:
- SHA3-224:
1
- SHA3-256:
1
- SHA3-384:
1
- SHA3-512:
1
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
- JavaCard:
- GlobalPlatform:
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- BSI:
- CC:
- CCMB-2006-09-001:
2
- CCMB-2007-09-002:
2
- CCMB-2007-09-003:
2
- CCMB-2007-09-004:
2
|
|
pdf_data/report_keywords/standard_id/BSI |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/symmetric_crypto/AES_competition |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP:
29
- NXP Semiconductors:
4
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata//Author |
|
sjon
|
pdf_data/report_metadata//CreationDate |
D:20110216120931+09'00'
|
D:20231215215207+00'00'
|
pdf_data/report_metadata//Creator |
Word 用 Acrobat PDFMaker 8.1
|
Microsoft® Word 2021
|
pdf_data/report_metadata//ModDate |
D:20110216120934+09'00'
|
D:20231215215207+00'00'
|
pdf_data/report_metadata//Producer |
Acrobat Distiller 8.2.3 (Windows)
|
Microsoft® Word 2021
|
pdf_data/report_metadata//Title |
CRP-e
|
Certification Report
|
pdf_data/report_metadata/pdf_file_size_bytes |
519570
|
303044
|
pdf_data/report_metadata/pdf_hyperlinks |
|
https://www.sogis.eu/, http://www.commoncriteriaportal.org/, https://trustcb.com/common-criteria/nscib/, https://nscib.nl/, mailto:[email protected] |
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
47
|
13
|
pdf_data/st_filename |
c0266_est.pdf
|
NSCIB-CC-2300100-01-ST-Lite_v1.2.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- NL:
- NSCIB-2300100-01:
1
- NSCIB-2300083-01:
1
|
pdf_data/st_keywords/cc_claims |
- O:
- O.AUDIT:
16
- O.MANAGE:
11
- O.MEM:
11
- O.NET:
9
- O.GENUINE:
9
- O.LINE_PROTECT:
7
- O.DOC_ACC:
8
- O.LINE:
1
- T:
- T.ILLEGAL_USE:
4
- T.UNAUTH_ACCESS:
3
- T.ABUSE_SEC_MNG:
4
- T.SALVAGE:
3
- T.TRANSIT:
4
- T.FAX_LINE:
3
- A:
- A.ADMIN:
5
- A.SUPERVISOR:
4
- A.NETWORK:
5
- OE:
- OE.ADMIN:
3
- OE.SUPERVISOR:
3
- OE.NETWORK:
3
|
- D:
- D.UPDATE_IMAGE:
26
- D.APP_CODE:
6
- D.APP_C_DATA:
4
- D.APP_I_DATA:
7
- D.APP_KEYS:
9
- D.PIN:
10
- D.APSD_KEYS:
5
- D.ISD_KEYS:
4
- D.VASD_KEYS:
3
- D.CARD_MNGT_:
1
- D.API_DATA:
3
- D.CRYPTO:
6
- D.JCS_CODE:
7
- D.JCS_DATA:
8
- D.SEC_DATA:
6
- D.CONFIG_ITEM:
7
- D.RESTRICTED_:
1
- D.TOE_IDENTIFIER:
3
- D.APP_C_:
1
- D.CARD_:
1
- D.CARD_MNGT_DATA:
1
- D.APP_:
1
- D.JCS_:
1
- D.RESTRICTED_MODE_STATE:
1
- D.TOE_IDENTIFICATION:
2
- D.SECRETS:
2
- D.SK:
2
- D.MNO_KEYS:
2
- D.PROFILE_NAA_PRAMS:
1
- D.PROFILE_NAA_PARAMS:
2
- O:
- O.REMOTE:
1
- O.BIO-MNGT:
1
- O.EXT-MEM:
1
- O.SENSITIVE_ARRAYS_INTEG:
1
- O.SENSITIVE_RESULTS_INTEG:
1
- O.LOAD:
3
- O.INSTALL:
2
- O.DELETION:
3
- O.APPLET:
15
- O.CODE_CAP_FILE:
11
- O.JAVAOBJECT:
67
- O.APPLET_LOADED:
2
- O.APPLET_CURRENT:
2
- O.CODE_CAP_:
2
- T:
- T.RND:
5
- T.CONFID-UPDATE-IMAGE:
3
- T.INTEG-UPDATE-IMAGE:
3
- T.UNAUTH-LOAD-UPDATE-IMAGE:
3
- T.INTERRUPT-OSU:
4
- T.CONFIG:
4
- T.COM_EXPLOIT:
4
- T.LIFE_CYCLE:
4
- T.UNAUTHORIZED_CARD_MNGT:
3
- T.INTEG-APPLI-DATA:
13
- T.RESTRICTED-MODE:
3
- T.CONFID-CONT:
4
- T.INTEG-CONT:
3
- T.EXE-CONT:
4
- T.CONT-DOS:
4
- T.CONT-SID:
4
- T.INTEG-CODE:
1
- T.INSTALL:
3
- T.DELETION:
3
- T.EXE-CODE-REMOTE:
1
- T.CONFID-APPLI-DATA:
3
- T.CONFID-JCS-CODE:
4
- T.INTEG-JCS-CODE:
4
- T.CONFID-JCS-DATA:
4
- T.INTEG-JCS-DATA:
4
- T.INTEG-APPLI-CODE:
5
- T.EXE-CODE:
8
- T.NATIVE:
4
- T.SID:
8
- T.CONFID-APPLI-DA:
1
- T.INTEG-APPLI-COD:
2
- T.RESOURCES:
3
- T.UNAUTHORIZED_:
1
- T.OBJ-DELETION:
2
- T.PHYSICAL:
2
- T.CONFID-UPDATE-I:
1
- T.UNAUTH-LOAD-UP:
1
- T.INTEG-UPDATE-IM:
1
- T.RESTRICTED-MOD:
1
- T.CONFID-:
1
- T.INTEG-APPLI-:
1
- A:
- A.USE_DIAG:
5
- A.USE_KEYS:
5
- A.PROCESS-SEC-IC:
4
- A.APPS-PROVIDER:
4
- A.VERIFICATION-AUTHORITY:
4
- A.TRUSTED-GUESTOS:
3
- A.APPS-:
1
- A.DELETION:
1
- A.CAP_FILE:
3
- A.VERIFICATION:
2
- A.TRUSTED-GUESTO:
1
- A.VERIFICATION-AU:
1
- R:
- OT:
- OT.IDENTIFICATION:
5
- OT.CONFID-UPDATE-IMAGE:
3
- OT.AUTH-LOAD-UPDATE-IMAGE:
3
- OT.SECURE_LOAD_ACODE:
3
- OT.SECURE_AC_ACTIVATION:
3
- OT.TOE_IDENTIFICATION:
3
- OT.CARD-CONFIGURATION:
3
- OT.ATTACK-COUNTER:
3
- OT.RESTRICTED-MODE:
3
- OT.DOMAIN-RIGHTS:
7
- OT.APPLI-AUTH:
8
- OT.COMM_AUTH:
6
- OT.COMM_INTEGRITY:
3
- OT.COMM_CONFIDENTIALITY:
3
- OT.CONT_SEP:
8
- OT.CONT_PRIV:
6
- OT.CONT_DOS:
4
- OT.RND:
5
- OT.SCP:
34
- OT.CARD-MANAGEMENT:
3
- OT.CARD-:
3
- OT.INSTALL:
1
- OT.LOAD:
1
- OT.DELETION:
1
- OT.SENSITIVE_RESULTS_INTEG:
3
- OT.FIREWALL:
10
- OT.SID:
8
- OT.GLOBAL_:
6
- OT.ARRAY_VIEWS_:
4
- OT.SENSITIVE_:
2
- OT.NATIVE:
6
- OT.OPERATE:
20
- OT.REALLOCATION:
4
- OT.RESOURCES:
5
- OT.ALARM:
14
- OT.CIPHER:
4
- OT.KEY-MNGT:
4
- OT.PIN-MNGT:
4
- OT.TRANSACTION:
4
- OT.OBJ-DELETION:
3
- OT.COMM_:
5
- OT.CARD-MANAGEM:
16
- OT.CONFID-UPDATE-:
2
- OT.AUTH-LOAD-UPD:
2
- OT.SECURE_LOAD_:
4
- OT.SECURE_AC_:
2
- OT.TOE_:
2
- OT.CARD-CONFIGUR:
2
- OT.ATTACK-COUNT:
1
- OT.RESTRICTED-MO:
3
- OT.ATTACK-COUNTE:
1
- OT.GLOBAL_ARRAYS_CONFID:
1
- OT.GLOBAL_ARRAYS_INTEG:
1
- OT.ARRAY_VIEWS_CONFID:
1
- OT.ARRAY_VIEWS_INTEG:
1
- OT.CONT-SEP:
1
- OT.CONT-PRIV:
1
- OT.CONT-DOS:
1
- OT.SECURE-CHANNELS:
1
- OT.INTERNALSECURE-CHANNELS:
1
- OP:
- OP.ARRAY_ACCESS:
4
- OP.ARRAY_LENGTH:
3
- OP.ARRAY_T_ALOAD:
3
- OP.ARRAY_:
1
- OP.ARRAY_AASTORE:
3
- OP.CREATE:
7
- OP.DELETE_APPLET:
4
- OP.DELETE_CAP_:
2
- OP.INSTANCE_FIELD:
3
- OP.INVK_VIRTUAL:
6
- OP.INVK_INTERFACE:
7
- OP.JAVA:
5
- OP.THROW:
5
- OP.TYPE_ACCESS:
5
- OP.PUT:
6
- OP.READ_CONFIG_:
1
- OP.MODIFY_:
1
- OP.USE_CONFIG_:
1
- OP.TRIGGER_:
1
- OP.CONT_ACCESS:
7
- OP.ARRAY_T_ASTORE:
2
- OP.PUTFIELD:
1
- OP.PUTSTATIC:
1
- OP.DELETE_CAP_FILE:
2
- OP.DELETE_CAP_FILE_APPLET:
2
- OP.TRIGGER_UPDATE:
3
- OE:
- OE.USE_DIAG:
5
- OE.USE_KEYS:
5
- OE.CAP_FILE:
5
- OE.VERIFICATION:
17
- OE.CODE-EVIDENCE:
13
- OE.SCP:
16
- OE.CARD-MANAGEMENT:
1
- OE.PROCESS_SEC_IC:
2
- OE.CONFID-UPDATE-IMAGE:
2
- OE.APPS-PROVIDER:
4
- OE.VERIFICATION-AUTHORITY:
2
- OE.KEY-CHANGE:
5
- OE.SECURITY-DOMAINS:
1
- OE.TRUSTED-GUESTOS:
2
- OE.SECURITY-:
1
- OE.IC:
3
- OE.RE:
7
- OE.CARD-:
2
- OE.TRUSTED-GUEST:
1
- OE.VERIFICATION-A:
2
- OE.SECURITY-DOMA:
2
- OE.PROCESS_SEC_:
2
- OE.CONFID-UPDATE-:
2
- OE.TRUSTED-GUES:
1
- SA:
- SA.CONFID-UPDATE:
1
- SA.CONFID-APPLI-D:
1
- SA.CONFID-JCS-CO:
1
- SA.CONFID-JCS-DAT:
1
- SA.INTEG-UPDATE-I:
1
- SA.INTEG-APPLI-CO:
1
- SA.INTEG-APPLI-DA:
1
- SA.INTEG-JCS-CODE:
3
- SA.EXE-APPLI-CODE:
3
- SA.EXE-JCS-CODE:
3
- SA.NATIVE:
4
- SA.FIREWALL:
2
- SA.VERIFICATION:
3
- SA.CARD-MANAGEM:
1
- SA.INSTALL:
2
- SA.SID:
3
- SA.OBJ-DELETION:
3
- SA.DELETION:
1
- SA.ALARM:
2
- SA.OPERATE:
2
- SA.RESOURCES:
3
- SA.CIPHER:
2
- SA.KEY-MNGT:
2
- SA.PIN-MNGT:
2
- SA.SCP:
5
- SA.TRANSACTION:
2
- SA.CONFIG-APPLET:
1
- SA.OSU:
1
- SA.RM:
1
- SA.CONTEXT-SEPAR:
1
- SA.CONFID-APPLI-DATA:
1
- SA.CONFID-JCS-CODE:
1
- SA.CONFID-JCS-DATA:
1
- SA.INTEG-APPLI-CODE:
2
- SA.INTEG-APPLI-DATA:
2
- SA.INTEG-JCS-DATA:
1
- SA.CONFID-UPDATE-IMAGE:
1
- SA.INTEG-UPDATE-IMAGE:
1
- OSP:
- OSP.PROCESS-TOE:
4
- OSP.KEY-CHANGE:
4
- OSP.SECURITY-DOMAINS:
3
- OSP.VERIFICATION:
2
- OSP.SECURITY-DOM:
1
|
pdf_data/st_keywords/cc_claims/A |
- A.ADMIN:
5
- A.SUPERVISOR:
4
- A.NETWORK:
5
|
- A.USE_DIAG:
5
- A.USE_KEYS:
5
- A.PROCESS-SEC-IC:
4
- A.APPS-PROVIDER:
4
- A.VERIFICATION-AUTHORITY:
4
- A.TRUSTED-GUESTOS:
3
- A.APPS-:
1
- A.DELETION:
1
- A.CAP_FILE:
3
- A.VERIFICATION:
2
- A.TRUSTED-GUESTO:
1
- A.VERIFICATION-AU:
1
|
pdf_data/st_keywords/cc_claims/O |
- O.AUDIT:
16
- O.MANAGE:
11
- O.MEM:
11
- O.NET:
9
- O.GENUINE:
9
- O.LINE_PROTECT:
7
- O.DOC_ACC:
8
- O.LINE:
1
|
- O.REMOTE:
1
- O.BIO-MNGT:
1
- O.EXT-MEM:
1
- O.SENSITIVE_ARRAYS_INTEG:
1
- O.SENSITIVE_RESULTS_INTEG:
1
- O.LOAD:
3
- O.INSTALL:
2
- O.DELETION:
3
- O.APPLET:
15
- O.CODE_CAP_FILE:
11
- O.JAVAOBJECT:
67
- O.APPLET_LOADED:
2
- O.APPLET_CURRENT:
2
- O.CODE_CAP_:
2
|
pdf_data/st_keywords/cc_claims/OE |
- OE.ADMIN:
3
- OE.SUPERVISOR:
3
- OE.NETWORK:
3
|
- OE.USE_DIAG:
5
- OE.USE_KEYS:
5
- OE.CAP_FILE:
5
- OE.VERIFICATION:
17
- OE.CODE-EVIDENCE:
13
- OE.SCP:
16
- OE.CARD-MANAGEMENT:
1
- OE.PROCESS_SEC_IC:
2
- OE.CONFID-UPDATE-IMAGE:
2
- OE.APPS-PROVIDER:
4
- OE.VERIFICATION-AUTHORITY:
2
- OE.KEY-CHANGE:
5
- OE.SECURITY-DOMAINS:
1
- OE.TRUSTED-GUESTOS:
2
- OE.SECURITY-:
1
- OE.IC:
3
- OE.RE:
7
- OE.CARD-:
2
- OE.TRUSTED-GUEST:
1
- OE.VERIFICATION-A:
2
- OE.SECURITY-DOMA:
2
- OE.PROCESS_SEC_:
2
- OE.CONFID-UPDATE-:
2
- OE.TRUSTED-GUES:
1
|
pdf_data/st_keywords/cc_claims/T |
- T.ILLEGAL_USE:
4
- T.UNAUTH_ACCESS:
3
- T.ABUSE_SEC_MNG:
4
- T.SALVAGE:
3
- T.TRANSIT:
4
- T.FAX_LINE:
3
|
- T.RND:
5
- T.CONFID-UPDATE-IMAGE:
3
- T.INTEG-UPDATE-IMAGE:
3
- T.UNAUTH-LOAD-UPDATE-IMAGE:
3
- T.INTERRUPT-OSU:
4
- T.CONFIG:
4
- T.COM_EXPLOIT:
4
- T.LIFE_CYCLE:
4
- T.UNAUTHORIZED_CARD_MNGT:
3
- T.INTEG-APPLI-DATA:
13
- T.RESTRICTED-MODE:
3
- T.CONFID-CONT:
4
- T.INTEG-CONT:
3
- T.EXE-CONT:
4
- T.CONT-DOS:
4
- T.CONT-SID:
4
- T.INTEG-CODE:
1
- T.INSTALL:
3
- T.DELETION:
3
- T.EXE-CODE-REMOTE:
1
- T.CONFID-APPLI-DATA:
3
- T.CONFID-JCS-CODE:
4
- T.INTEG-JCS-CODE:
4
- T.CONFID-JCS-DATA:
4
- T.INTEG-JCS-DATA:
4
- T.INTEG-APPLI-CODE:
5
- T.EXE-CODE:
8
- T.NATIVE:
4
- T.SID:
8
- T.CONFID-APPLI-DA:
1
- T.INTEG-APPLI-COD:
2
- T.RESOURCES:
3
- T.UNAUTHORIZED_:
1
- T.OBJ-DELETION:
2
- T.PHYSICAL:
2
- T.CONFID-UPDATE-I:
1
- T.UNAUTH-LOAD-UP:
1
- T.INTEG-UPDATE-IM:
1
- T.RESTRICTED-MOD:
1
- T.CONFID-:
1
- T.INTEG-APPLI-:
1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0084:
1
- BSI-CC-PP-0099-V2-2020:
2
- BSI-CC-PP-0100-2018:
1
- BSI-CC-PP-0084-2014:
1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.3:
1
- ADV_TDS.2:
2
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_CMC.3:
1
- ALC_CMS.3:
1
- ALC_DEL.1:
1
- ALC_DVS.1:
2
- ALC_LCD.1:
1
- ATE:
- ATE_COV.2:
1
- ATE_DPT.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- ASE:
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
- AGD:
- ALC:
- AVA:
- ASE:
- ASE_INT:
2
- ASE_CCL:
2
- ASE_SPD:
2
- ASE_ECD:
1
- ASE_REQ:
2
- ASE_TSS:
2
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_OPE.1:
1
- AGD_PRE.1: 1
|
|
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 |
1
|
2
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_CMC.3:
1
- ALC_CMS.3:
1
- ALC_DEL.1:
1
- ALC_DVS.1:
2
- ALC_LCD.1:
1
|
|
pdf_data/st_keywords/cc_sar/ASE |
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
- ASE_INT:
2
- ASE_CCL:
2
- ASE_SPD:
2
- ASE_ECD:
1
- ASE_REQ:
2
- ASE_TSS:
2
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
|
- EAL4:
5
- EAL4 augmented:
3
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1:
12
- FAU_GEN.1.1:
1
- FAU_SAR.1:
11
- FAU_SAR.2:
9
- FAU_STG.1:
8
- FAU_STG.4:
8
- FAU_GEN.1.2:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG:
1
- FAU_STG.3:
1
- FAU_STG.4.1:
1
- FCS:
- FCS_CKM.1:
10
- FCS_COP.1:
9
- FCS_CKM.2:
2
- FCS_CKM.4:
7
- FCS_CKM.1.1:
1
- FCS_COP.1.1:
1
- FDP:
- FDP_ACC.1:
16
- FDP_ACF.1:
12
- FDP_IFC.1:
12
- FDP_IFF.1:
10
- FDP_ITC.1:
1
- FDP_ITC.2:
2
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_IFC.1.1:
1
- FDP_IFF.1.1:
1
- FDP_IFF.1.2:
1
- FDP_IFF.1.3:
1
- FDP_IFF.1.4:
1
- FDP_IFF.1.5:
1
- FDP_ADF.1:
1
- FDP_ITC:
1
- FIA:
- FIA_AFL.1:
10
- FIA_ATD.1:
11
- FIA_SOS.1:
8
- FIA_UAU.2:
12
- FIA_UAU.7:
9
- FIA_UID.2:
10
- FIA_USB.1:
10
- FIA_UAU.1:
6
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1.1:
1
- FIA_SOS.1.1:
1
- FIA_UID.1:
8
- FIA_UAU.2.1:
1
- FIA_UAU.7.1:
1
- FIA_UID.2.1:
1
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FMT:
- FMT_MSA.1:
12
- FMT_MSA.3:
14
- FMT_MTD.1:
17
- FMT_SMF.1:
19
- FMT_SMR.1:
19
- FMT_MSA.1.1:
1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MTD.1.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FPT_STM.1:
10
- FPT_TST.1:
9
- FPT_STM.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FTP:
- FTP_ITC.1:
8
- FTP_TRP.1:
10
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1.1:
1
- FTP_TRP.1.2:
2
- FTP_TRP.1.3:
2
- FTP_TST.1:
1
|
- FAU:
- FAU_SAS.1:
8
- FAU_SAS:
4
- FAU_GEN:
1
- FAU_SAS.1.1:
2
- FAU_ARP.1:
14
- FAU_SAA.1:
3
- FAU_ARP.1.1:
1
- FCO:
- FCO_NRO:
1
- FCO_NRO.2:
6
- FCO_NRO.1:
1
- FCO_NRO.2.1:
2
- FCO_NRO.2.2:
1
- FCO_NRO.2.3:
2
- FCS:
- FCS_CKM.1:
16
- FCS_COP.1:
13
- FCS_RNG.1:
17
- FCS_CKM.5:
1
- FCS_RNG:
1
- FCS_CKM.2:
7
- FCS_CKM.4:
12
- FCS_CKM.1.1:
5
- FCS_CKM.4.1:
4
- FCS_COP.1.1:
17
- FCS_RNG.1.1:
2
- FCS_RNG.1.2:
2
- FCS_CKM.2.1:
2
- FCS_CKM.3:
4
- FCS_CKM.3.1:
1
- FCS_RNG.2:
1
- FDP:
- FDP_ACF.1:
31
- FDP_IFC:
2
- FDP_IFF:
2
- FDP_ACC:
1
- FDP_ACF:
1
- FDP_ITC:
1
- FDP_ITC.2:
17
- FDP_IFC.2:
24
- FDP_IFF.1:
37
- FDP_UIT:
1
- FDP_UIT.1:
4
- FDP_ROL.1:
10
- FDP_ACC.1:
53
- FDP_ACC.2:
16
- FDP_ACC.2.1:
5
- FDP_ACC.2.2:
4
- FDP_ACF.1.1:
5
- FDP_ACF.1.2:
7
- FDP_ACF.1.3:
7
- FDP_ACF.1.4:
9
- FDP_IFC.1:
46
- FDP_IFC.1.1:
1
- FDP_IFF.1.1:
4
- FDP_IFF.1.2:
6
- FDP_IFF.1.3:
7
- FDP_IFF.1.4:
8
- FDP_IFF.1.5:
6
- FDP_RIP.1:
56
- FDP_RIP.1.1:
9
- FDP_ITC.1:
8
- FDP_ROL.1.2:
3
- FDP_ROL.1.1:
2
- FDP_SDI.2:
6
- FDP_SDI.1:
2
- FDP_SDI.2.1:
2
- FDP_SDI.2.2:
2
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FDP_ITC.2.1:
1
- FDP_ITC.2.2:
1
- FDP_ITC.2.3:
1
- FDP_ITC.2.4:
1
- FDP_ITC.2.5:
2
- FDP_ACC.1.1:
3
- FDP_IFC.2.1:
3
- FDP_IFC.2.2:
3
- FIA:
- FIA_UID:
1
- FIA_UID.1:
61
- FIA_UAU.1:
19
- FIA_UAU.4:
9
- FIA_AFL.1:
8
- FIA_API:
1
- FIA_ATD.1:
6
- FIA_ATD.1.1:
1
- FIA_UID.2:
3
- FIA_UID.2.1:
1
- FIA_USB.1:
4
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FIA_UID.1.1:
7
- FIA_UID.1.2:
5
- FIA_UAU.1.1:
4
- FIA_UAU.1.2:
3
- FIA_UAU.4.1:
2
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FMT:
- FMT_MSA:
7
- FMT_SMF:
3
- FMT_REV:
1
- FMT_SMR:
2
- FMT_MSA.1:
72
- FMT_MSA.3:
66
- FMT_SMF.1:
72
- FMT_SMR.1:
90
- FMT_MSA.1.1:
9
- FMT_MSA.2:
2
- FMT_MSA.2.1:
2
- FMT_MSA.3.1:
11
- FMT_MSA.3.2:
10
- FMT_SMF.1.1:
8
- FMT_SMR.1.1:
7
- FMT_SMR.1.2:
7
- FMT_MTD.1:
7
- FMT_MTD.1.1:
1
- FMT_MTD.3:
5
- FMT_MTD.3.1:
1
- FPR:
- FPR_UNO.1:
7
- FPR_UNO.1.1:
1
- FPT:
- FPT_FLS.1:
30
- FPT_PHP.3:
4
- FPT_EMS:
1
- FPT_FLS.1.1:
8
- FPT_TDC.1:
5
- FPT_TDC.1.1:
1
- FPT_TDC.1.2:
2
- FPT_RCV.3:
2
- FPT_RCV.2:
1
- FPT_RCV.3.1:
2
- FPT_RCV.3.2:
2
- FPT_RCV.3.3:
2
- FPT_RCV.3.4:
1
- FPT_PHP.3.1:
1
- FTP:
- FTP_ITC:
1
- FTP_ITC.1:
15
- FTP_TRP.1:
4
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
2
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_GEN.1:
12
- FAU_GEN.1.1:
1
- FAU_SAR.1:
11
- FAU_SAR.2:
9
- FAU_STG.1:
8
- FAU_STG.4:
8
- FAU_GEN.1.2:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG:
1
- FAU_STG.3:
1
- FAU_STG.4.1:
1
|
- FAU_SAS.1:
8
- FAU_SAS:
4
- FAU_GEN:
1
- FAU_SAS.1.1:
2
- FAU_ARP.1:
14
- FAU_SAA.1:
3
- FAU_ARP.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_CKM.1:
10
- FCS_COP.1:
9
- FCS_CKM.2:
2
- FCS_CKM.4:
7
- FCS_CKM.1.1:
1
- FCS_COP.1.1:
1
|
- FCS_CKM.1:
16
- FCS_COP.1:
13
- FCS_RNG.1: 17
- FCS_CKM.5: 1
- FCS_RNG: 1
- FCS_CKM.2:
7
- FCS_CKM.4:
12
- FCS_CKM.1.1:
5
- FCS_CKM.4.1: 4
- FCS_COP.1.1:
17
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FCS_CKM.2.1: 2
- FCS_CKM.3: 4
- FCS_CKM.3.1: 1
- FCS_RNG.2: 1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
10
|
16
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 |
1
|
5
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
2
|
7
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
7
|
12
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
9
|
13
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 |
1
|
17
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACC.1:
16
- FDP_ACF.1:
12
- FDP_IFC.1:
12
- FDP_IFF.1:
10
- FDP_ITC.1:
1
- FDP_ITC.2:
2
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_IFC.1.1:
1
- FDP_IFF.1.1:
1
- FDP_IFF.1.2:
1
- FDP_IFF.1.3:
1
- FDP_IFF.1.4:
1
- FDP_IFF.1.5:
1
- FDP_ADF.1: 1
- FDP_ITC:
1
|
- FDP_ACF.1:
31
- FDP_IFC: 2
- FDP_IFF: 2
- FDP_ACC: 1
- FDP_ACF: 1
- FDP_ITC:
1
- FDP_ITC.2:
17
- FDP_IFC.2: 24
- FDP_IFF.1:
37
- FDP_UIT: 1
- FDP_UIT.1: 4
- FDP_ROL.1: 10
- FDP_ACC.1:
53
- FDP_ACC.2: 16
- FDP_ACC.2.1: 5
- FDP_ACC.2.2: 4
- FDP_ACF.1.1:
5
- FDP_ACF.1.2:
7
- FDP_ACF.1.3:
7
- FDP_ACF.1.4:
9
- FDP_IFC.1:
46
- FDP_IFC.1.1:
1
- FDP_IFF.1.1:
4
- FDP_IFF.1.2:
6
- FDP_IFF.1.3:
7
- FDP_IFF.1.4:
8
- FDP_IFF.1.5:
6
- FDP_RIP.1: 56
- FDP_RIP.1.1: 9
- FDP_ITC.1:
8
- FDP_ROL.1.2: 3
- FDP_ROL.1.1: 2
- FDP_SDI.2: 6
- FDP_SDI.1: 2
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 2
- FDP_ACC.1.1:
3
- FDP_IFC.2.1: 3
- FDP_IFC.2.2: 3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
16
|
53
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 |
1
|
3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
12
|
31
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
1
|
5
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
1
|
7
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
1
|
7
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
1
|
9
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
12
|
46
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF.1 |
10
|
37
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF.1.1 |
1
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF.1.2 |
1
|
6
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF.1.3 |
1
|
7
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF.1.4 |
1
|
8
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF.1.5 |
1
|
6
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
1
|
8
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
2
|
17
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_AFL.1:
10
- FIA_ATD.1:
11
- FIA_SOS.1: 8
- FIA_UAU.2: 12
- FIA_UAU.7: 9
- FIA_UID.2:
10
- FIA_USB.1:
10
- FIA_UAU.1:
6
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1.1:
1
- FIA_SOS.1.1: 1
- FIA_UID.1:
8
- FIA_UAU.2.1: 1
- FIA_UAU.7.1: 1
- FIA_UID.2.1:
1
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
|
- FIA_UID: 1
- FIA_UID.1:
61
- FIA_UAU.1:
19
- FIA_UAU.4: 9
- FIA_AFL.1:
8
- FIA_API: 1
- FIA_ATD.1:
6
- FIA_ATD.1.1:
1
- FIA_UID.2:
3
- FIA_UID.2.1:
1
- FIA_USB.1:
4
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FIA_UID.1.1: 7
- FIA_UID.1.2: 5
- FIA_UAU.1.1: 4
- FIA_UAU.1.2: 3
- FIA_UAU.4.1: 2
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 |
10
|
8
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 |
11
|
6
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
6
|
19
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
8
|
61
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 |
10
|
3
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 |
10
|
4
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MSA.1:
12
- FMT_MSA.3:
14
- FMT_MTD.1:
17
- FMT_SMF.1:
19
- FMT_SMR.1:
19
- FMT_MSA.1.1:
1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MTD.1.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
|
- FMT_MSA: 7
- FMT_SMF: 3
- FMT_REV: 1
- FMT_SMR: 2
- FMT_MSA.1:
72
- FMT_MSA.3:
66
- FMT_SMF.1:
72
- FMT_SMR.1:
90
- FMT_MSA.1.1:
9
- FMT_MSA.2: 2
- FMT_MSA.2.1: 2
- FMT_MSA.3.1:
11
- FMT_MSA.3.2:
10
- FMT_SMF.1.1:
8
- FMT_SMR.1.1:
7
- FMT_SMR.1.2:
7
- FMT_MTD.1:
7
- FMT_MTD.1.1:
1
- FMT_MTD.3: 5
- FMT_MTD.3.1: 1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
12
|
72
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 |
1
|
9
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
14
|
66
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 |
1
|
11
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
1
|
10
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
17
|
7
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
19
|
72
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
8
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
19
|
90
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
7
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
7
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_STM.1:
10
- FPT_TST.1:
9
- FPT_STM.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
|
- FPT_FLS.1:
30
- FPT_PHP.3:
4
- FPT_EMS:
1
- FPT_FLS.1.1:
8
- FPT_TDC.1:
5
- FPT_TDC.1.1:
1
- FPT_TDC.1.2:
2
- FPT_RCV.3:
2
- FPT_RCV.2:
1
- FPT_RCV.3.1:
2
- FPT_RCV.3.2:
2
- FPT_RCV.3.3:
2
- FPT_RCV.3.4:
1
- FPT_PHP.3.1:
1
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_ITC.1:
8
- FTP_TRP.1:
10
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
- FTP_TST.1: 1
|
- FTP_ITC: 1
- FTP_ITC.1:
15
- FTP_TRP.1:
4
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
2
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 |
8
|
15
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 |
10
|
4
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
- ECB:
- CBC:
- CTR:
- CFB:
- GCM:
- CCM:
- XTS:
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
- Generic:
- Crypto Library ..................................................12:
1
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- Brainpool:
- Curve:
- Edwards:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224:
3
- SHA-256:
4
- SHA-384:
3
- SHA-512:
3
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
- ALG:
- DES:
- ALG_DES_CBC_ISO9797_M1:
1
- ALG_DES_CBC_ISO9797_M2:
1
- ALG_DES_CBC_NOPAD:
1
- ALG_DES_ECB_ISO9797_M1:
1
- ALG_DES_ECB_ISO9797_M2:
2
- ALG_DES_ECB_NOPAD:
1
- ALG_DES_CBC_PKCS5:
1
- ALG_DES_ECB_PKCS5:
1
- ALG_DES_CBC_PKCS7:
1
- ALG_DES_ECB_PKCS7:
1
- ALG_DES_MAC4_ISO9797_1_M1_ALG3:
1
- ALG_DES_MAC4_ISO9797_1_M2_ALG3:
1
- ALG_DES_MAC4_ISO9797_M1:
1
- ALG_DES_MAC4_ISO9797_M2:
1
- ALG_DES_MAC8_ISO9797_1_M1_ALG3:
1
- ALG_DES_MAC8_ISO9797_1_M2_ALG3:
1
- ALG_DES_MAC8_ISO9797_M1:
1
- ALG_DES_MAC8_ISO9797_M2:
1
- ALG_DES_MAC8_NOPAD:
1
- ALG_DES_MAC4_PKCS5:
1
- ALG_DES_MAC8_PKCS5:
1
- ALG_DES_CMAC8:
1
- RSA:
- ALG_RSA_NOPAD:
1
- ALG_RSA_PKCS1:
1
- ALG_RSA_PKCS1_OAEP:
1
- ALG_RSA_SHA_224_PKCS1:
1
- ALG_RSA_SHA_224_PKCS1_PSS:
1
- ALG_RSA_SHA_256_PKCS1:
1
- ALG_RSA_SHA_256_PKCS1_PSS:
1
- ALG_RSA_SHA_384_PKCS1:
1
- ALG_RSA_SHA_384_PKCS1_PSS:
1
- ALG_RSA_SHA_512_PKCS1:
1
- ALG_RSA_SHA_512_PKCS1_PSS:
1
- ALG_RSA_SHA_PKCS1:
1
- ECDSA:
- ALG_ECDSA_SHA_224:
1
- ALG_ECDSA_SHA_256:
2
- ALG_ECDSA_SHA_384:
1
- ALG_ECDSA_SHA_512:
1
- AES:
- ALG_AES_BLOCK_128_CBC_NOPAD:
1
- ALG_AES_BLOCK_128_CBC_NOPAD_STANDARD:
2
- ALG_AES_BLOCK_128_ECB_NOPAD:
1
- ALG_AES_CBC_ISO9797_M1:
1
- ALG_AES_CBC_ISO9797_M2:
1
- ALG_AES_CBC_ISO9797_M2_STANDARD:
1
- ALG_AES_ECB_ISO9797_M1:
1
- ALG_AES_ECB_ISO9797_M2:
1
- ALG_AES_CBC_PKCS5:
1
- ALG_AES_ECB_PKCS5:
1
- ALG_AES_CBC_PKCS7:
2
- ALG_AES_ECB_PKCS7:
2
- ALG_AES_CBC_ISO9797_STANDARD:
1
- ALG_AES_CFB:
1
- ALG_AES_MAC_128_NOPAD:
1
- ALG_AES_CMAC8:
1
- ALG_AES_CMAC16:
1
- ALG_AES_CMAC16_STANDARD:
1
- ALG_AES_CMAC_128:
1
- HMAC:
- ALG_HMAC_SHA_256:
1
- ALG_HMAC_SHA_384:
1
- ALG_HMAC_SHA_512:
1
- EC:
- ALG_EC_SVDP_DH:
1
- ALG_EC_SVDP_DH_KDF:
1
- ALG_EC_SVDP_DH_PLAIN:
1
- ALG_EC_SVDP_DHC:
1
- ALG_EC_SVDP_DHC_KDF:
1
- ALG_EC_SVDP_DHC_PLAIN:
1
- ALG_EC_SVDP_DH_PLAIN_XY:
2
- SHA:
- ALG_SHA_256:
3
- ALG_SHA_384:
3
- ALG_SHA_512:
3
- ALG_SHA_224:
1
- SHA3:
- ALG_SHA3_224:
1
- ALG_SHA3_256:
1
- ALG_SHA3_384:
1
- ALG_SHA3_512:
1
- misc:
- SIG_CIPHER_RSA:
1
- SIG_CIPHER_ECDSA:
1
- SIG_CIPHER_EDDSA:
1
- SIG_CIPHER_EDDSAPH:
1
- SIG_CIPHER_AES_CMAC8:
1
- SIG_CIPHER_AES_CMAC16:
1
- SIG_CIPHER_AES_CMAC128:
1
- SIG_CIPHER_DES_CMAC8:
1
- PAD_PKCS1_OAEP:
1
- TYPE_ACCESS:
5
- LENGTH_DES3_2KEY:
4
- LENGTH_DES3_3KEY:
4
- LENGTH_AES_128:
4
- LENGTH_AES_192:
4
- LENGTH_AES_256:
4
- LENGTH_EC_FP_128:
2
- LENGTH_EC_FP_160:
1
- LENGTH_EC_FP_192:
2
- LENGTH_EC_FP_224:
2
- LENGTH_EC_FP_256:
3
- LENGTH_EC_FP_528:
2
- LENGTH_EC_FP_384:
1
- LENGTH_SHA:
1
- LENGTH_SHA_224:
1
- LENGTH_SHA_256:
2
- LENGTH_SHA_384:
1
- LENGTH_SHA_512:
2
- LENGTH_SHA3_224:
1
- LENGTH_SHA3_256:
1
- LENGTH_SHA3_384:
1
- LENGTH_SHA3_512:
1
- LENGTH_RSA_1024:
1
- curves:
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.security:
3
- javacard.framework:
2
- javacardx:
- javacardx.crypto:
1
- javacardx.security:
1
- org:
- com:
- com.nxp.id.jcopx.security:
1
|
pdf_data/st_keywords/javacard_version |
|
- JavaCard:
- Java Card 3.1:
2
- JC3.1:
1
- GlobalPlatform:
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/TRNG/TRNG |
3
|
2
|
pdf_data/st_keywords/side_channel_analysis |
|
- SCA:
- physical probing:
3
- side channel:
2
- side-channel:
1
- DPA:
2
- SPA:
1
- timing attacks:
2
- timing attack:
1
- FI:
- Physical Tampering:
2
- physical tampering:
2
- malfunction:
2
- DFA:
2
- Fault Injection:
1
- other:
|
pdf_data/st_keywords/standard_id |
- FIPS:
- BSI:
- CC:
- CCMB-2006-09-001:
1
- CCMB-2007-09-002:
1
- CCMB-2007-09-003:
1
- CCMB-2007-09-0004:
1
|
- FIPS:
- FIPS 140-3:
2
- FIPS 197:
1
- FIPS PUB 186-3:
1
- BSI:
- AIS20:
2
- AIS31:
1
- AIS 20:
2
- RFC:
- RFC 5639:
1
- RFC 8032:
1
- RFC 7748:
1
- ISO:
- SCP:
- CC:
- CCMB-2017-04-001:
2
- CCMB-2017-04-002:
2
- CCMB-2017-04-003:
2
- CCMB-2017-04-004:
2
|
pdf_data/st_keywords/standard_id/BSI |
|
- AIS20:
2
- AIS31:
1
- AIS 20:
2
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2006-09-001:
1
- CCMB-2007-09-002:
1
- CCMB-2007-09-003:
1
- CCMB-2007-09-0004:
1
|
- CCMB-2017-04-001:
2
- CCMB-2017-04-002:
2
- CCMB-2017-04-003:
2
- CCMB-2017-04-004:
2
|
pdf_data/st_keywords/standard_id/FIPS |
|
- FIPS 140-3:
2
- FIPS 197:
1
- FIPS PUB 186-3:
1
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- DES:
- 3DES:
- Triple-DES:
4
- 3DES:
1
- TDES:
2
- TripleDES:
1
- TDEA:
4
- miscellaneous:
- constructions:
- MAC:
- HMAC:
10
- CBC-MAC:
2
- CMAC:
3
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
3
|
22
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP:
457
- NXP Semiconductors:
24
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
1778215
- pdf_is_encrypted:
False
- pdf_number_of_pages:
80
- /Creator:
MP_C2800_ST_Eng.doc - Microsoft Word
- /CreationDate:
D:20110105172042
- /Title:
MP_C2800_ST_Eng.doc
- /Author:
p000266068
- /Producer:
Acrobat PDFWriter 5.0 Windows NT
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
1316128
- pdf_is_encrypted:
False
- pdf_number_of_pages:
183
- /Title:
Security Target Lite
- /Author:
NXP B.V.
- /Subject: NXP JCOP 8.9 with eUICC extension on SN300 Secure Element
- /Keywords: NXP, ASE, JCOP 8.9 with eUICC extension on SN300 Secure Element, Single Chip Secure Element and NFC Controller, JCOP, Common Criteria, EAL4 augmented
- /Creator:
DITA Open Toolkit 3.3.1
- /Producer:
Apache FOP Version 2.3
- /CreationDate:
D:20231130133951Z
- /ModDate: D:20231130134109-00'00'
- pdf_hyperlinks:
mailto:[email protected]
|
pdf_data/st_metadata//Author |
p000266068
|
NXP B.V.
|
pdf_data/st_metadata//CreationDate |
D:20110105172042
|
D:20231130133951Z
|
pdf_data/st_metadata//Creator |
MP_C2800_ST_Eng.doc - Microsoft Word
|
DITA Open Toolkit 3.3.1
|
pdf_data/st_metadata//Producer |
Acrobat PDFWriter 5.0 Windows NT
|
Apache FOP Version 2.3
|
pdf_data/st_metadata//Title |
MP_C2800_ST_Eng.doc
|
Security Target Lite
|
pdf_data/st_metadata/pdf_file_size_bytes |
1778215
|
1316128
|
pdf_data/st_metadata/pdf_hyperlinks |
|
mailto:[email protected] |
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
80
|
183
|
dgst |
5723efcbb184b84c
|
1cebdb71a0606a03
|