Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
TOSHIBA e-STUDIO2040C/2540C/3040C/3540C/4540C MULTIFUNCTIONAL DIGITAL SYSTEMS Version: SYS V1.0
JISEC-CC-CRP-C0328
Infineon Smart Card IC (Security Controller) SLE88CFX4000P/m8830b17, SLE88CFX4002P/m8834b17, SLE88CFX3520P/m8847b17, SLE88CFX2920P/m8849b17, SLE88CF4000P/m8845b17, SLE88CF4002P/m8846b17 SLE88CF3520P/m8848b17, SLE88CF2920P/m8850b17 each with PSL V0.50.23_E107 or PSL V0.50.23_E110 and specific IC Dedicated Software
BSI-DSZ-CC-0376-2006
name TOSHIBA e-STUDIO2040C/2540C/3040C/3540C/4540C MULTIFUNCTIONAL DIGITAL SYSTEMS Version: SYS V1.0 Infineon Smart Card IC (Security Controller) SLE88CFX4000P/m8830b17, SLE88CFX4002P/m8834b17, SLE88CFX3520P/m8847b17, SLE88CFX2920P/m8849b17, SLE88CF4000P/m8845b17, SLE88CF4002P/m8846b17 SLE88CF3520P/m8848b17, SLE88CF2920P/m8850b17 each with PSL V0.50.23_E107 or PSL V0.50.23_E110 and specific IC Dedicated Software
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP DE
not_valid_after 02.11.2016 01.09.2019
not_valid_before 28.10.2011 21.06.2006
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0328_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0376a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0328_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0376b.pdf
manufacturer Toshiba TEC Corporation Infineon Technologies AG
manufacturer_web https://www.toshibatec.co.jp/en/ https://www.infineon.com/
security_level ALC_FLR.2, EAL3+ EAL5+, AVA_VLA.4, AVA_MSU.3, ALC_DVS.2
dgst 59f4a79c9d094937 8aec7cfe97ab46bc
heuristics/cert_id JISEC-CC-CRP-C0328 BSI-DSZ-CC-0376-2006
heuristics/cert_lab [] BSI
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, AVA_VAN.2, ADV_FSP.3, ALC_LCD.1, ALC_FLR.2, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ADV_INT.1, ATE_FUN.1, ASE_INT.1, ADV_LLD.1, ADV_IMP.2, ASE_ENV.1, ADV_RCR.2, ATE_IND.2, AGD_USR.1, ASE_REQ.1, ADV_HLD.3, ADV_FSP.3, ASE_SRE.1, ALC_DVS.2, ATE_DPT.2, AVA_VLA.4, ATE_COV.2, AVA_MSU.3, ASE_PPC.1, ALC_LCD.2, ADV_SPM.3, ASE_DES.1, AGD_ADM.1, AVA_SOF.1, ASE_OBJ.1, ASE_TSS.1, ALC_TAT.2, AVA_CCA.1
heuristics/extracted_versions 1.0 0.50.23
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2008/37, BSI-DSZ-CC-0395-2007
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0269-2006
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-1158-2020, BSI-DSZ-CC-0878-2013, BSI-DSZ-CC-0632-2011, BSI-DSZ-CC-1069-2018, BSI-DSZ-CC-1158-V4-2025, BSI-DSZ-CC-1158-V3-2025, BSI-DSZ-CC-1015-V2-2020, ANSSI-CC-2008/37, BSI-DSZ-CC-1158-V2-2023, BSI-DSZ-CC-1015-2017, BSI-DSZ-CC-0936-2015, BSI-DSZ-CC-0395-2007
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0269-2006
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0328
  • certification_date: 01.10.2011
  • claim: EAL3+ ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL3 Augmented with ALC_FLR.2
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0328_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE applies to complete Multifunction Peripheral (MFP) that includes the entire hardware and software components that provide the functionality for printing and scanning documents over the network, through email and on the MFP; and document storage and retrieval. It is assumed that MFP is utilized from a control panel of TOE or as for a user terminal connected to LAN or USB in TOE. TOE Security functions The TOE provides the following security features: - User Authentication The TOE prompts the user to enter the User ID and password from the control panel or client PC to execute identity authentication - User Access Control The TOE controls access to user's document data which is saved in the internal HDD - Secure Erase The TOE removes residual data with DoD secure-erase mechanism before releasing resources from HDD of TOE - Secure Channel The TOE provides support for SSL and is allowed to secure different protocols such as https. The SSL/TLS functionality also permits the TOE to be securely administered from the Web UI, as well as, being used to secure the connection between the TOE and any other external server. - Data Encryption The TOE encrypts the user's document data which is saved in the internal HDD. - Audit Data Generation and Review The TOE generates audit logs for tracking the state of the TOE at any given instance of time. All logs are available for viewing only to TOE U.AUDITOR and U.ADMINISTRATOR role. - TSF Data Protection Only an administrator role user has the capability to manage the configuration and enable/disable available services and protocols. U. ADMINISTRATOR can modify the TSF data. - TSF Self Protection The TOE performs integrity tests on its static executable and configuration files using verification of their digital signature against the known TOSHIBA signatures. This allows the TOE to detect any tampering of its trusted state.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: TOSHIBA e-STUDIO2040C/2540C/3040C/ 3540C/4540C MULTIFUNCTIONAL DIGITAL SYSTEMS
    • product_type: Multifunction Peripheral
    • protection_profile: IEEE Std 2600.1-2009
    • report_link: https://www.ipa.go.jp/en/security/c0328_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0328_est.pdf
    • toe_version: SYS V1.0
    • vendor: Toshiba Tec Corporation
  • expiration_date: 01.11.2016
  • supplier: Toshiba Tec Corporation
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0328_it0296.html
  • toe_overseas_name: TOSHIBA e-STUDIO2040C/2540C/ 3040C/3540C/4540C MULTIFUNCTIONAL DIGITAL SYSTEMS SYS V1.0
heuristics/protection_profiles 32475ccb695b1644 {}
maintenance_updates
  • maintenance_date: 19.05.2009
  • maintenance_report_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0376_ma3.pdf
  • maintenance_st_link: None
  • maintenance_title: Infineon Smart Card IC (Security Controller) SLE88CFX4000P/M8830-b17, SLE88CFX4002P/M8834-b17, SLE88CFX3520P/M8847-b17, SLE88CFX2920P/M8849-b17, SLE88CF4000P/M8845-b17, SLE88CF4002P/M8846-b17, SLE88CF3520P/M8848-b17, SLE88CF2920P/M8850-b17 each with specific IC Dedicated Software

  • maintenance_date: 10.09.2007
  • maintenance_report_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0376_ma2.pdf
  • maintenance_st_link: None
  • maintenance_title: Infineon Smart Card IC (Security Controller)SLE88CFX4000P/m8830b17, SLE88CFX4002P/m8834 b17, SLE88CFX3520P/m8847b17,SLE88CFX2920P/m8849b17, SLE88CF4000P/m8845b17, SLE88CF4002P/m8846b17, SLE88CF3520P/m8848b17, SLE88CF2920P/m8850b17, each with

  • maintenance_date: 28.02.2007
  • maintenance_report_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0376_ma1.pdf
  • maintenance_st_link: None
  • maintenance_title: Infineon Smart Card IC (Security Controller) SLE88CFX4000P/m8830b17, SLE88CFX4002P/m8834b17, SLE88CFX3520P/m8847b17, SLE88CFX2920P/m8849b17, SLE88CF4000P/m8845b17, SLE88CF4002P/m8846b17, SLE88CF3520P/m8848b17, SLE88CF2920P/m8850b17
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf {}
pdf_data/report_filename c0328_erpt.pdf 0376a.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0376-2006
    • cert_item: Infineon Smart Card IC (Security Controller) SLE88CFX4000P/m8830b17, SLE88CFX4002P/m8834b17 SLE88CFX3520P/m8847b17, SLE88CFX2920P/m8849b17 SLE88CF4000P/m8845b17, SLE88CF4002P/m8846b17 SLE88CF3520P/m8848b17, SLE88CF2920P/m8850b17 each with PSL V0.50.23_E107 or PSL V0.50.23_E110 and specific IC Dedicated Software
    • cert_lab: BSI
    • developer: Infineon Technologies AG Certification Report V1.0 ZS-01-01-F-330 V3.28
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0328-01: 1
    • Certification No. C0328: 1
  • DE:
    • BSI-DSZ-CC-0269-2006: 1
    • BSI-DSZ-CC-0376: 3
    • BSI-DSZ-CC-0376-2006: 23
  • NL:
    • CC-0269-2006: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002-2001: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 4
    • EAL3 augmented: 1
  • EAL:
    • EAL 1: 1
    • EAL 4: 1
    • EAL 5: 2
    • EAL 5 augmented: 2
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 10
    • EAL5: 9
    • EAL5 augmented: 2
    • EAL5+: 1
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 2
    • ACM_CAP: 2
    • ACM_CAP.4: 2
    • ACM_SCP: 3
    • ACM_SCP.3: 3
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 2
    • ADO_IGS: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP: 2
    • ADV_FSP.3: 2
    • ADV_HLD: 2
    • ADV_HLD.3: 2
    • ADV_IMP: 2
    • ADV_IMP.2: 2
    • ADV_INT: 2
    • ADV_INT.1: 2
    • ADV_LLD: 2
    • ADV_LLD.1: 1
    • ADV_RCR: 2
    • ADV_RCR.2: 2
    • ADV_SPM: 2
    • ADV_SPM.3: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_ADM.1: 1
    • AGD_USR: 2
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.2: 6
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_LCD.2: 3
    • ALC_TAT: 2
    • ALC_TAT.2: 3
  • ASE:
    • ASE_DES.1: 1
    • ASE_ENV.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_PPC.1: 1
    • ASE_REQ.1: 1
    • ASE_SRE.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 2
    • ATE_COV.2: 1
    • ATE_DPT: 2
    • ATE_DPT.2: 2
    • ATE_FUN: 2
    • ATE_FUN.1: 1
    • ATE_IND: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA: 2
    • AVA_CCA.1: 2
    • AVA_MSU: 2
    • AVA_MSU.3: 5
    • AVA_SOF: 4
    • AVA_SOF.1: 1
    • AVA_VLA: 4
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 6
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 1
  • FCS:
    • FCS_COP.1: 5
    • FCS_RND.1: 1
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1: 1
    • FDP_IFC.1: 1
    • FDP_ITT.1: 1
  • FMT:
    • FMT_LIM.1: 1
    • FMT_LIM.2: 1
    • FMT_MSA.1: 1
    • FMT_MSA.3: 1
    • FMT_SMF.1: 1
  • FPT:
    • FPT_FLS.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP.3: 1
    • FPT_SEP.1: 1
    • FPT_TST.2: 1
  • FRU:
    • FRU_FLT.2: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 4
    • T.DOC: 4
    • T.FUNC: 2
    • T.PROT: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Infineon:
    • Infineon: 23
    • Infineon Technologies: 2
    • Infineon Technologies AG: 20
  • Philips:
    • Philips: 1
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 3
  • TUV:
    • TÜV Informationstechnik: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • AES_competition:
    • AES:
      • AES: 14
  • DES:
    • 3DES:
      • 3DES: 1
      • Triple-DES: 4
    • DES:
      • DES: 11
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 10
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 8
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 3
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • FI:
    • Malfunction: 1
    • malfunction: 1
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Physical Probing: 1
    • physical probing: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • FIPS:
    • FIPS PUB 197: 1
  • BSI:
    • AIS 25: 2
    • AIS 26: 3
    • AIS 31: 3
    • AIS 32: 2
    • AIS 34: 3
    • AIS 36: 5
    • AIS 38: 1
    • AIS31: 1
    • AIS36: 1
    • AIS38: 5
  • ISO:
    • ISO/IEC 15408:1999: 1
    • ISO/IEC15408: 1999: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • a user to create an e-Filing Box. Specific users or TOE administrators can save, print and edit confidential documents. e-Filing Box Storage area that allows a user to save document CRP-C0328-01 35 data. This area: 1
  • ConfidentialDocument:
    • 2006, (confidential document) [12] SLE88CFXxxxxP Preliminary Hardware Reference Manual, Edition 2005- 03, Infineon Technologies: 1
    • 2006, (confidential document) [15] SLE88CFXxxxxP Errata Sheet, Edition May 04, 2006, Infineon Technologies AG, 04.05.2006: 1
    • December 2005, (confidential document) [14] SLE 88 Family – Delta Manual for SDK 2.9 SP4, Edition 2006-01, Infineon Technologies AG: 1
    • Management Scope (ACM_SCP), Version 1.3, Date 15.05.2006 (i.e. TOE Configuration List, confidential document) [10] ETR-lite for composition according to AIS 36 for the Product Infineon Smart Card IC: 1
    • March 2005, (confidential document) [13] SLE88 Family Application Design Reference Manual, Edition Dec. 2005, Infineon Technologies AG: 1
    • Product Infineon Smart Card IC SLE88CFX4000P/m8830, Version 1.32, Date 13.06.06, T- Systems (confidential document) [8] Smartcard IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID: 1
    • Version 1.30, T-Systems GEI GmbH, 16.05.2006 (confidential document) [11] SLE88CFXxxxxP PSL & Security Reference Manual, Edition 2006-03, Infineon Technologies AG: 1
pdf_data/report_metadata
  • /CreationDate: D:20120427102328+09'00'
  • /Creator: Microsof Word 2010
  • /ModDate: D:20120427102410+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 738739
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 36
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Category: Common Criteria Zertfizierung Certification
  • /Company: BSI, Postfach 200363, 53133 Bonn
  • /CreationDate: D:20060622153124+02'00'
  • /Creator: Acrobat PDFMaker 7.0.7 für Word
  • /Keywords: CC, Common Criteria, Smartcard, Zertifizierung, Certification
  • /ModDate: D:20060622153636+02'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /SourceModified: D:20060622133104
  • /Title: Certification Report BSI-DSZ-CC-0376-2006
  • pdf_file_size_bytes: 334503
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 50
pdf_data/st_filename c0328_est.pdf 0376b.pdf
pdf_data/st_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10340-2009: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 3: 1
    • EAL 3 augmented: 1
    • EAL3: 2
    • EAL3 augmented: 1
  • EAL:
    • EAL 5: 4
    • EAL 5 augmented: 4
    • EAL5: 4
    • EAL5 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 4
    • ALC_LCD.1: 1
  • APE:
    • APE_REQ: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ACM:
    • ACM_AUT.1: 1
    • ACM_CAP.4: 2
    • ACM_SCP: 3
    • ACM_SCP.2: 1
    • ACM_SCP.3: 5
  • ADO:
    • ADO_DEL.2: 1
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 3
    • ADV_HLD.3: 4
    • ADV_IMP.2: 3
    • ADV_INT.1: 2
    • ADV_LLD.1: 3
    • ADV_RCR.2: 1
    • ADV_SPM.3: 2
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS: 1
    • ALC_DVS.2: 3
    • ALC_LCD.2: 2
    • ALC_TAT.2: 2
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.2: 2
    • ATE_FUN.1: 1
    • ATE_IND.2: 2
  • AVA:
    • AVA_CCA.1: 1
    • AVA_MSU.3: 4
    • AVA_SOF: 5
    • AVA_SOF.1: 1
    • AVA_VLA.4: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 9
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 11
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 9
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.4: 2
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 37
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 29
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC: 1
    • FDP_IFC.1: 2
    • FDP_IFF: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 10
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 13
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 10
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 19
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 8
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 12
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 22
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 22
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 26
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 2
    • FPT_FDI_EXP.1: 14
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
    • FPT_TST.1: 8
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 9
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_SAS.1: 4
  • FCS:
    • FCS_CKM.1: 9
    • FCS_CKM.4: 9
    • FCS_COP.1: 25
    • FCS_COP.1.1: 5
    • FCS_RND: 2
    • FCS_RND.1: 4
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ACC.1: 15
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 5
    • FDP_ITC.1: 7
    • FDP_ITT.1: 3
  • FMT:
    • FMT_LIM.1: 4
    • FMT_LIM.2: 4
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 9
    • FMT_MSA.3: 13
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
  • FPT:
    • FPT_AMT.1: 4
    • FPT_FLS.1: 8
    • FPT_ITT.1: 3
    • FPT_LIM.2: 1
    • FPT_PHP.3: 7
    • FPT_SEP.1: 4
    • FPT_TST: 2
    • FPT_TST.1: 8
    • FPT_TST.2: 21
    • FPT_TST.2.1: 2
  • FRU:
    • FRU_FLT.2: 8
pdf_data/st_keywords/cc_claims
  • A:
    • A: 2
    • A.ACCESS: 3
    • A.ADMIN: 6
    • A.USER: 3
  • D:
    • D.CONF: 7
    • D.DOC: 43
    • D.FUNC: 13
    • D.PROT: 6
  • O:
    • O.AUDIT: 8
    • O.AUDIT_ACCESS: 5
    • O.AUDIT_ACCESS_AUTHORIZED: 1
    • O.AUDIT_STORAGE: 7
    • O.AUDIT_STORAGE_PROTECTED: 1
    • O.CONF: 16
    • O.CRYPTOGRAPHY: 8
    • O.DOC: 25
    • O.FUNC: 8
    • O.INTERFACE: 8
    • O.PROT: 8
    • O.SOFTWARE: 6
    • O.USER: 12
  • OE:
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 1
    • OE.AUDIT_STRAGE: 1
    • OE.INTERFACE: 3
    • OE.PHYISCAL: 1
    • OE.PHYSICAL: 2
    • OE.USER: 12
  • T:
    • T.CONF: 6
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
  • O:
    • O.ADD-: 1
    • O.RND: 1
  • T:
    • T.RND: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 4
    • Microsoft Corporation: 1
  • Infineon:
    • Infineon: 4
    • Infineon Technologies AG: 10
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • AES_competition:
    • AES:
      • AES: 18
  • DES:
    • 3DES:
      • 3DES: 4
      • Triple-DES: 1
    • DES:
      • DES: 18
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 11
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 13
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 2
    • RNG: 11
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
  • FI:
    • DFA: 1
    • Malfunction: 8
    • malfunction: 1
  • SCA:
    • DPA: 4
    • Leak-Inherent: 10
    • Physical Probing: 2
    • SPA: 1
  • other:
    • reverse engineering: 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 1
  • BSI:
    • AIS31: 5
  • FIPS:
    • FIPS PUB 180-1: 1
    • FIPS PUB 197: 1
    • FIPS PUB 46-3: 2
  • ISO:
    • ISO/IEC 7816-3: 1
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • e-Filing that each user can create. It is suitable for specific users or U.ADMINISTRATOR to store confidential documents. In addition user can operate various functions to the document such as print/edit/manage, etc. (5: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate: D:20111013103741+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20111013103741+09'00'
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 887125
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 66
  • /Author: Jürgen Noller
  • /Baustein: SLE88CFX4000P
  • /BausteinVersion: b17
  • /Classification: Public
  • /Company: Infineon Technologies AG
  • /CreationDate: D:20060426092942+02'00'
  • /Creator: Acrobat PDFMaker 6.0 for Word
  • /Datum: 25-04-2006
  • /Dokument: Security Target
  • /EEPROM: 400 kBytes
  • /Jahr: 2006
  • /ModDate: D:20060426095845+02'00'
  • /PP_Augmentations: Smartcard Integrated Circuit Platform Augmentations V0.98
  • /PP_Date: July 2001
  • /PP_Short: BSI-PP-0002; Version 1.0, July 2001
  • /PP_Version: 1.0
  • /Producer: Acrobat Distiller 6.0.1 (Windows)
  • /Protection Profile: [BSI_PP]
  • /ROM: 80 kBytes
  • /SourceModified: D:20060426072828
  • /Technologie: 0,13 µm
  • /Title: Security Target
  • /Version: 1.3
  • /XRAM: 16 kBytes
  • /_AdHocReviewCycleID: -1249368381
  • /_AuthorEmail: Juergen.Noller@infineon.com
  • /_AuthorEmailDisplayName: Noller Juergen (SMS SEC PS)
  • /_EmailSubject: ST 88ziger
  • /m-Nummer: m8830
  • pdf_file_size_bytes: 473772
  • pdf_hyperlinks: mailto:CRYPTO@1408Bit, mailto:Crypto@1408BIT
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 53
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different