name |
KONICA MINOLTA AccurioPress C4080 / AccurioPress C4070 / AccurioPrint C4065 with UK-112GM2-20 |
TCOS Passport Version 2.0, Release 2-BAC/P5CD080V0B |
category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
DE |
status |
active |
archived |
not_valid_after |
15.04.2026 |
01.09.2019 |
not_valid_before |
15.04.2021 |
30.05.2008 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0720_eimg.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0720_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0506a.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0720_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0506b.pdf |
manufacturer |
KONICA MINOLTA, INC. |
T-Systems Enterprise Services GmbH |
manufacturer_web |
https://www.konicaminolta.com/index.html |
https://www.t-systems.de/ |
security_level |
{} |
ADV_IMP.2, EAL4+, ALC_DVS.2 |
dgst |
6171283e8ac6eea1 |
1409067bcc8ea36a |
heuristics/cert_id |
JISEC-CC-CRP-C0720-01-2021 |
BSI-DSZ-CC-0506-2008 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ATE_COV.2, ADV_RCR.1, ALC_TAT.1, AVA_VLA.2, AVA_MSU.2, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_SOF.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_DVS.2, ALC_LCD.1, ADV_IMP.2, ATE_DPT.1, ADV_FSP.2, ADV_SPM.1 |
heuristics/extracted_versions |
20 |
2.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0445-2007, BSI-DSZ-CC-0446-2007, BSI-DSZ-CC-0410-2007 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0446-2007, BSI-DSZ-CC-0349-2006, BSI-DSZ-CC-0312-2005, BSI-DSZ-CC-0445-2007, BSI-DSZ-CC-0362-2006, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0348-2006, BSI-DSZ-CC-0227-2004, BSI-DSZ-CC-0410-2007 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0720
- certification_date: 01.04.2021
- claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
- enhanced:
- assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0720
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio100000006bm-att/c0720_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Product (MFP) that has the functions, such as copy, scan and Document storage and retrieval. The TOE provides the security functionality required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFP. TOE Security functions The TOE provides the following security functions: Identification and authentication function Access control function Storage encryption function Trusted communications function Security management function Audit function Software update verification function Self-testing function
- evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
- product: KONICA MINOLTA AccurioPress C4080 / AccurioPress C4070 / AccurioPrint C4065 with UK-112
- product_type: Multifunction Product
- protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio100000006bm-att/c0720_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio100000006bm-att/c0720_est.pdf
- toe_version: GM2-20
- vendor: KONICA MINOLTA, INC.
- expiration_date:
- supplier: KONICA MINOLTA, INC.
- toe_japan_name: KONICA MINOLTA AccurioPress C4080 / AccurioPress C4070 / AccurioPrint C4065 with UK-112GM2-20
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0720_it0772.html
- toe_overseas_name: KONICA MINOLTA AccurioPress C4080 / AccurioPress C4070 / AccurioPrint C4065 with UK-112GM2-20
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0410-2007 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0410-2007 |
heuristics/protection_profiles |
b2cfec7a92fa2940 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf |
{} |
pdf_data/cert_filename |
c0720_eimg.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0720-01-2021: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20210602111203+09'00'
- /Creator: Microsoft® Word for Office 365
- /ModDate: D:20210602115815+09'00'
- /Producer: Microsoft® Word for Office 365
- pdf_file_size_bytes: 83609
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
c0720_erpt.pdf |
0506a.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0506-2008
- cert_item: TCOS Passport Version 2.0 Release 2- BAC/P5CD080V0B
- cert_lab: BSI
- developer: T-Systems Enterprise Services GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0720-01-2021: 1
|
- DE:
- BSI-DSZ-CC-0410-2007: 1
- BSI-DSZ-CC-0445-2007: 3
- BSI-DSZ-CC-0446-2007: 2
- BSI-DSZ-CC-0506-2008: 18
- NL:
- CC-0410-2007: 1
- CC-0445-2007: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002-2001: 1
- BSI-PP-0017: 1
- BSI-PP-0017-2005: 3
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 4: 8
- EAL 4 augmented: 4
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 6
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_IMP.2: 5
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 6
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_SOF: 3
- AVA_VLA: 3
- AVA_VLA.2: 2
- AVA_VLA.3: 1
- AVA_VLA.4: 1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG: 1
- NXP:
- Philips:
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 3
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
- EF:
- EF.COM: 3
- EF.DG1: 3
- EF.DG2: 1
- EF.SOD: 1
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
- BSI:
- AIS 25: 1
- AIS 26: 1
- AIS 31: 1
- AIS 32: 1
- AIS 34: 3
- AIS 35: 1
- AIS 36: 2
- AIS 38: 1
- ICAO:
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- NXP P5CD080V0B Secure Smart Card Controller, Version 1.0, 06.06.2007, TÜV Informationstechnik GmbH (confidential document) [13] Certification Report for NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B and: 1
- und TCOS Passport Version 2.0 Release 2-BAC/SLE66CLX800PE, Version 0.7, 04.04.2008, T-Systems (confidential document) [15] Administrator’s Guide for TCOS Passport Version 2.0 Release 2-BAC, Version 1, 04.04.2008: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20210720120228+09'00'
- /Creator: Microsoft® Word for Office 365
- /ModDate: D:20210720120315+09'00'
- /Producer: Microsoft® Word for Office 365
- pdf_file_size_bytes: 419944
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 30
|
- /Author: Federal Office for Information Security
- /CreationDate: D:20080708062123+02'00'
- /Creator: Writer
- /Keywords: "TCOS Passport Version 2.0 Release 2-BAC/P5CD080V0B, T-Systems Enterprise Services GmbH, BSI-DSZ-CC-0506-2008"
- /ModDate: D:20080708074014+02'00'
- /Producer: StarOffice 8
- /Subject: Common Criteria Zertifizierung
- /Title: Zertifizierungsreport BSI-DSZ-CC-0506-2008
- pdf_file_size_bytes: 524294
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 32
|
pdf_data/st_filename |
c0720_est.pdf |
0506b.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0410-2007: 1
- BSI-DSZ-CC-0506: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002: 1
- BSI-PP-0017: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 24
- EAL 4 augmented: 1
- EAL 5: 1
- EAL4: 10
- EAL4 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ACM:
- ACM_AUT.1: 2
- ACM_CAP.4: 2
- ACM_SCP: 1
- ACM_SCP.2: 1
- ADO:
- ADO_DEL.2: 2
- ADO_GEL: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 4
- ADV_FSP.2: 1
- ADV_HLD: 4
- ADV_HLD.2: 1
- ADV_IMP: 2
- ADV_IMP.2: 10
- ADV_LLD: 2
- ADV_LLD.1: 1
- ADV_RCR: 2
- ADV_RCR.1: 1
- ADV_SPM: 1
- ADV_SPM.1: 3
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 1
- AGD_USR: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 9
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU: 1
- AVA_MSU.2: 1
- AVA_SOF: 1
- AVA_SOF.1: 1
- AVA_VLA: 1
- AVA_VLA.2: 1
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 13
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 3
- FAU_GEN.2.1: 1
- FAU_STG_EXT: 3
- FAU_STG_EXT.1: 5
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM.1: 37
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.4: 8
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 3
- FCS_CKM_EXT.4: 31
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 114
- FCS_COP.1.1: 7
- FCS_KDF_EXT: 3
- FCS_KDF_EXT.1: 13
- FCS_KDF_EXT.1.1: 4
- FCS_KYC_EXT: 4
- FCS_KYC_EXT.1: 6
- FCS_KYC_EXT.1.1: 3
- FCS_PCC_EXT: 3
- FCS_PCC_EXT.1: 7
- FCS_PCC_EXT.1.1: 2
- FCS_RBG_EXT: 2
- FCS_RBG_EXT.1: 38
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SMC_EXT.1: 7
- FCS_SNI_EXT: 3
- FCS_SNI_EXT.1: 5
- FCS_SNI_EXT.1.1: 3
- FCS_SNI_EXT.1.2: 2
- FCS_SNI_EXT.1.3: 2
- FCS_SSH_EXT.1: 4
- FCS_TLS_EXT.1: 4
- FDP:
- FDP_ACC.1: 15
- FDP_ACC.1.1: 1
- FDP_ACF.1: 13
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DSK_EXT: 2
- FDP_DSK_EXT.1: 7
- FDP_DSK_EXT.1.1: 2
- FDP_DSK_EXT.1.2: 2
- FDP_IFC.1: 1
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FIA:
- FIA_AFL.1: 3
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_PMG_EXT: 2
- FIA_PMG_EXT.1: 6
- FIA_PMG_EXT.1.1: 2
- FIA_PSK_EXT: 2
- FIA_PSK_EXT.1: 10
- FIA_PSK_EXT.1.1: 2
- FIA_PSK_EXT.1.2: 2
- FIA_PSK_EXT.1.3: 2
- FIA_UAU.1: 10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 3
- FIA_UAU.7.1: 1
- FIA_UID.1: 14
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 3
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 3
- FMT_MOF.1.1: 1
- FMT_MSA.1: 4
- FMT_MSA.1.1: 1
- FMT_MSA.3: 6
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 3
- FMT_MTD.1.1: 1
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_KYP_EXT: 2
- FPT_KYP_EXT.1: 4
- FPT_KYP_EXT.1.1: 2
- FPT_SKP_EXT: 2
- FPT_SKP_EXT.1: 7
- FPT_SKP_EXT.1.1: 2
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 7
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 7
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 3
- FTA:
- FTA_SSL.3: 3
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 13
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 6
- FTP_TRP.1.1: 2
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_SAS: 1
- FAU_SAS.1: 7
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 22
- FCS_CKM.1: 29
- FCS_CKM.2: 4
- FCS_CKM.4: 29
- FCS_COP: 48
- FCS_COP.1: 15
- FCS_RND: 12
- FCS_RND.1: 8
- FDP:
- FDP_ACC: 17
- FDP_ACC.1: 22
- FDP_ACF: 11
- FDP_ACF.1: 21
- FDP_ACF.1.2: 1
- FDP_ACF.1.4: 1
- FDP_DAU: 3
- FDP_DAU.1: 4
- FDP_IFC: 1
- FDP_IFC.1: 8
- FDP_IFF: 1
- FDP_ITC: 4
- FDP_ITC.1: 16
- FDP_ITC.2: 9
- FDP_UCT: 16
- FDP_UCT.1: 8
- FDP_UIT: 14
- FDP_UIT.1: 8
- FIA:
- FIA_API: 7
- FIA_API.1: 1
- FIA_UAU: 37
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 7
- FIA_UAU.5: 4
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 8
- FIA_UID: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 1
- FMT_LIM.1: 11
- FMT_LIM.1.1: 1
- FMT_LIM.2: 10
- FMT_LIM.2.1: 1
- FMT_MOF: 2
- FMT_MOF.1: 10
- FMT_MOF.1.1: 1
- FMT_MSA.1: 1
- FMT_MSA.2: 21
- FMT_MSA.3: 4
- FMT_MTD: 26
- FMT_MTD.1: 6
- FMT_SMF.1: 17
- FMT_SMF.1.1: 1
- FMT_SMR.1: 18
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 1
- FPT_FLS: 2
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_PHP: 1
- FPT_PHP.3: 11
- FPT_PHP.3.1: 1
- FPT_RVM: 1
- FPT_RVM.1: 7
- FPT_RVM.1.1: 1
- FPT_SEP: 1
- FPT_SEP.1: 9
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TST: 2
- FPT_TST.1: 8
- FPT_TST.1.1: 2
- FPT_TST.1.2: 1
- FPT_TST.1.3: 2
- FTP:
- FTP_ITC.1: 9
- FTP_TRP.1: 8
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- O:
- O.ACCESS_CONTROL: 7
- O.ADMIN_ROLES: 4
- O.AUDIT: 5
- O.COMMS_PROTECTION: 10
- O.KEY_MATERIAL: 1
- O.PURGE_DATA: 2
- O.STORAGE_ENCRYPTION: 7
- O.TSF_SELF_TEST: 1
- O.UPDATE_VERIFICATION: 2
- O.USER_AUTHORIZATION: 7
- OE:
- OE.ADMIN_TRAINING: 1
- OE.ADMIN_TRUST: 1
- OE.NETWORK_PROTE: 1
- OE.PHYSICAL_PROTE: 1
- OE.USER_TRAINING: 1
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_A: 1
- T.UNAUTHORIZED_U: 1
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 26
- AES-: 1
- AES-256: 4
- constructions:
- MAC:
- HMAC: 13
- HMAC-SHA-256: 6
- HMAC-SHA-384: 1
- HMAC-SHA-512: 4
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 18
- SHA-384: 10
- SHA-512: 14
- SHA384: 2
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 5
- IKEv1: 20
- IKEv2: 9
- IPsec:
- SSH:
- TLS:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 4
- P-384: 2
- P-521: 2
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 4
- Physical Tampering: 5
- Physical tampering: 1
- fault injection: 1
- malfunction: 4
- physical tampering: 2
- SCA:
- DPA: 1
- physical probing: 4
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 3
- EF.DG1: 3
- EF.DG2: 1
- EF.SOD: 1
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS PUB 180-3: 1
- FIPS PUB 186-4: 8
- FIPS PUB 197: 3
- FIPS PUB 198-1: 1
- ISO:
- ISO/IEC 10116: 14
- ISO/IEC 10118: 4
- ISO/IEC 10118-: 2
- ISO/IEC 18031:2011: 5
- ISO/IEC 18033-3: 1
- ISO/IEC 19772: 8
- NIST:
- NIST SP 800-108: 3
- NIST SP 800-132: 6
- NIST SP 800-38A: 3
- NIST SP 800-38B: 2
- NIST SP 800-38C: 2
- NIST SP 800-38D: 2
- NIST SP 800-90A: 7
- RFC:
- RFC 3602: 10
- RFC 4106: 6
- RFC 4109: 3
- RFC 4301: 2
- RFC 4303: 2
- RFC 4304: 5
- RFC 4868: 7
- RFC 5282: 3
|
- BSI:
- FIPS:
- FIPS 180-2: 1
- FIPS 180-288: 1
- FIPS 46-3: 3
- FIPS PUB 46-3: 1
- FIPS46: 2
- ICAO:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /CreationDate: D:20210719145643+09'00'
- /Creator: Microsoft® Word for Office 365
- /ModDate: D:20210719145643+09'00'
- /Producer: Microsoft® Word for Office 365
- pdf_file_size_bytes: 1020463
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 74
|
- /Author: T-Systems
- /CreationDate: D:20080702080234+02'00'
- /Creator: Writer
- /Keywords: "MRTD, EAC, BAC, Common Criteria, Zertifizierung"
- /ModDate: D:20080708074547+02'00'
- /Producer: StarOffice 8
- /Subject: Specification of the Security Target TCOS Passport Version 2.0 Release
- /Title: Specification of the Security Target TCOS Passport Version 2.0 Release Specification of the Security Target TCOS Passport Version 2.0 Release 2/P5CD080V0B Basic Access ControlVersion: 2.0.2.002
- pdf_file_size_bytes: 696246
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 79
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |