name |
KONICA MINOLTA AccurioPress C4080 / AccurioPress C4070 / AccurioPrint C4065 with UK-112GM2-20 |
Green Hills Software INTEGRITY-178B Separation Kernel, comprising: INTEGRITY-178B Real Time Operating System (RTOS), version IN-ICR750-0101-GH01_Rel running on Compact PCI card, version CPN 944-2021-021 with PowerPC, version 750CXe |
category |
Multi-Function Devices |
Operating Systems |
scheme |
JP |
US |
status |
active |
archived |
not_valid_after |
15.04.2026 |
20.07.2012 |
not_valid_before |
15.04.2021 |
01.09.2008 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0720_eimg.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0720_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10119-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0720_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10119-st.pdf |
manufacturer |
KONICA MINOLTA, INC. |
Green Hills Software, Inc. |
manufacturer_web |
https://www.konicaminolta.com/index.html |
https://www.ghs.com/ |
security_level |
{} |
EAL6+ |
dgst |
6171283e8ac6eea1 |
b5cd888a6f1f1a60 |
heuristics/cert_id |
JISEC-CC-CRP-C0720-01-2021 |
CCEVS-VR-10119-2008 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ALC_LCD.2, ADV_INI_EXP.1, AGD_USR.1, ADV_IMP_EXP.3, ALC_DVS.2, ADV_RCR.3, ADV_ARC_EXP.1, AVA_SOF.1, AVA_CCA_EXP.2, ATE_FUN.2, ALC_TAT.3, ALC_FLR.3, ADV_CTD_EXP.1, ADV_LTD_EXP.1, ATE_IND.3, AGD_ADM_EXP.1, ADV_INT_EXP.3, ATE_DPT.3, AVA_VLA_EXP.4, ADV_LLD_EXP.2, ADV_SPM.3, ADV_HLD_EXP.4, ATE_COV.3, AVA_MSU.3, ADV_FSP_EXP.4 |
heuristics/extracted_versions |
20 |
021, 2021, 944, 0101 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0720
- certification_date: 01.04.2021
- claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
- enhanced:
- assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0720
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio100000006bm-att/c0720_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Product (MFP) that has the functions, such as copy, scan and Document storage and retrieval. The TOE provides the security functionality required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFP. TOE Security functions The TOE provides the following security functions: Identification and authentication function Access control function Storage encryption function Trusted communications function Security management function Audit function Software update verification function Self-testing function
- evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
- product: KONICA MINOLTA AccurioPress C4080 / AccurioPress C4070 / AccurioPrint C4065 with UK-112
- product_type: Multifunction Product
- protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio100000006bm-att/c0720_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio100000006bm-att/c0720_est.pdf
- toe_version: GM2-20
- vendor: KONICA MINOLTA, INC.
- expiration_date:
- supplier: KONICA MINOLTA, INC.
- toe_japan_name: KONICA MINOLTA AccurioPress C4080 / AccurioPress C4070 / AccurioPrint C4065 with UK-112GM2-20
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0720_it0772.html
- toe_overseas_name: KONICA MINOLTA AccurioPress C4080 / AccurioPress C4070 / AccurioPrint C4065 with UK-112GM2-20
|
- category: Operating System
- certification_date: 01.09.2008
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date:
- id: CCEVS-VR-VID10119
- product: Green Hills Software INTEGRITY-178B Separation Kernel, comprising: INTEGRITY-178B Real Time Operating System (RTOS), version IN-ICR750-0101-GH01_Rel running on Compact PCI card, version CPN 944-2021-021 with PowerPC, version 750CXe
- scheme: US
- url: https://www.niap-ccevs.org/product/10119
- vendor: Green Hills Software, Inc.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
b2cfec7a92fa2940 |
{} |
maintenance_updates |
|
- maintenance_date: 31.07.2009
- maintenance_report_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10119-add1.pdf
- maintenance_st_link: None
- maintenance_title: Green Hills Software INTEGRITY-178B Separation Kernel, comprising: INTEGRITY-178B Real Time Operating System (RTOS), version IN-ISP448-0100-SK_LMFWPCD2_Rel running on JSF PCD System Processor CCA, version 437140-007 with PowerPC, version 7448
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf |
{} |
pdf_data/cert_filename |
c0720_eimg.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0720-01-2021: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20210602111203+09'00'
- /Creator: Microsoft® Word for Office 365
- /ModDate: D:20210602115815+09'00'
- /Producer: Microsoft® Word for Office 365
- pdf_file_size_bytes: 83609
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
c0720_erpt.pdf |
st_vid10119-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-10119-2008
- cert_item: Green Hills Software INTEGRITY-178B Separation Kernel
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0720-01-2021: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ACM:
- ACM_AUT.2: 1
- ACM_CAP.5: 1
- ACM_SCP.3: 1
- ADO:
- ADO_DEL_EXP.2: 1
- ADO_IGS.1: 2
- ADV:
- ADV_ARC_EXP.1: 1
- ADV_CTD_EXP.1: 1
- ADV_FSP_EXP.4: 1
- ADV_HLD_EXP.4: 1
- ADV_IMP_EXP.3: 1
- ADV_INI_EXP.1: 1
- ADV_INT_EXP.3: 1
- ADV_LLD_EXP.2: 1
- ADV_LTD_EXP.1: 1
- ADV_RCR.3: 1
- ADV_SPM.3: 1
- AGD:
- AGD_ADM_EXP.1: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS.2: 1
- ALC_FLR.3: 1
- ALC_LCD.2: 1
- ALC_TAT.3: 1
- AMA:
- ATE:
- ATE_COV.3: 1
- ATE_DPT.3: 1
- ATE_FUN.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_CCA_EXP.2: 1
- AVA_MSU.3: 1
- AVA_SOF.1: 1
- AVA_VLA_EXP.4: 2
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
- A:
- A.COVERT_CHANNELS: 1
- A.PHYSICAL: 1
- A.SUBJECT_ALLOCATION: 1
- A.TRUSTED_FLOWS: 1
- A.TRUSTED_INDIVIDUAL: 1
- T:
- T.ADMIN_ERROR: 1
- T.ALTERED_DELIVERY: 1
- T.CONFIGURATION_CHANGE: 1
- T.CONFIGURATION_INTEGRITY: 1
- T.COVERT_CHANNEL_EXPLOIT: 1
- T.DENIAL_OF_SERVICE: 1
- T.INCORRECT_CONFIG: 1
- T.INCORRECT_LOAD: 1
- T.INSECURE_STATE: 1
- T.LEAST_PRIVILEGE: 1
- T.POOR_DESIGN: 1
- T.POOR_IMPLEMENTATION: 1
- T.POOR_TEST: 1
- T.TSF_COMPROMISE: 1
- T.UNAUTHORIZED_ACCESS: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20210720120228+09'00'
- /Creator: Microsoft® Word for Office 365
- /ModDate: D:20210720120315+09'00'
- /Producer: Microsoft® Word for Office 365
- pdf_file_size_bytes: 419944
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 30
|
- /Author:
- /CreationDate: D:20080916094423-04'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /ModDate: D:20080916094434-04'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20080916134407
- /Title: National Information Assurance Partnership
- pdf_file_size_bytes: 130448
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
pdf_data/st_filename |
c0720_est.pdf |
st_vid10119-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ACM:
- ACM_AUT: 1
- ACM_AUT.2: 12
- ACM_CAP: 1
- ACM_CAP.5: 28
- ACM_CAP.5.4: 1
- ACM_SCP: 1
- ACM_SCP.3: 6
- ADO:
- ADO_DEL_EXP: 1
- ADO_DEL_EXP.2: 18
- ADO_IGS: 1
- ADO_IGS.1: 7
- ADV:
- ADV_ARC_EXP: 1
- ADV_ARC_EXP.1: 10
- ADV_CTD_EXP: 1
- ADV_CTD_EXP.1: 13
- ADV_FSP_EXP: 1
- ADV_FSP_EXP.4: 14
- ADV_HLD: 2
- ADV_HLD_EXP: 1
- ADV_HLD_EXP.4: 12
- ADV_IMP_EXP: 1
- ADV_IMP_EXP.3: 8
- ADV_INI_EXP: 1
- ADV_INI_EXP.1: 40
- ADV_INT_EXP: 1
- ADV_INT_EXP.3: 37
- ADV_LLD: 2
- ADV_LLD_EXP: 1
- ADV_LLD_EXP.2: 12
- ADV_LTD_EXP: 1
- ADV_LTD_EXP.1: 11
- ADV_RCR: 1
- ADV_RCR.3: 10
- ADV_SPM: 1
- ADV_SPM.3: 12
- AGD:
- AGD_ADM_EXP: 1
- AGD_ADM_EXP.1: 19
- AGD_USR: 1
- AGD_USR.1: 11
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 9
- ALC_FLR: 1
- ALC_FLR.3: 18
- ALC_LCD: 1
- ALC_LCD.2: 12
- ALC_TAT: 1
- ALC_TAT.3: 11
- AMA:
- AMA_AMP_EXP: 1
- AMA_AMP_EXP.1: 15
- ATE:
- ATE_COV: 1
- ATE_COV.3: 8
- ATE_DPT: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 5
- ATE_FUN: 1
- ATE_FUN.2: 12
- ATE_IND: 1
- ATE_IND.3: 9
- AVA:
- AVA_CCA_EXP: 1
- AVA_CCA_EXP.2: 13
- AVA_MSU: 1
- AVA_MSU.3: 15
- AVA_SOF: 1
- AVA_SOF.1: 9
- AVA_VLA_EXP: 1
- AVA_VLA_EXP.4: 15
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 13
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 3
- FAU_GEN.2.1: 1
- FAU_STG_EXT: 3
- FAU_STG_EXT.1: 5
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM.1: 37
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.4: 8
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 3
- FCS_CKM_EXT.4: 31
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 114
- FCS_COP.1.1: 7
- FCS_KDF_EXT: 3
- FCS_KDF_EXT.1: 13
- FCS_KDF_EXT.1.1: 4
- FCS_KYC_EXT: 4
- FCS_KYC_EXT.1: 6
- FCS_KYC_EXT.1.1: 3
- FCS_PCC_EXT: 3
- FCS_PCC_EXT.1: 7
- FCS_PCC_EXT.1.1: 2
- FCS_RBG_EXT: 2
- FCS_RBG_EXT.1: 38
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SMC_EXT.1: 7
- FCS_SNI_EXT: 3
- FCS_SNI_EXT.1: 5
- FCS_SNI_EXT.1.1: 3
- FCS_SNI_EXT.1.2: 2
- FCS_SNI_EXT.1.3: 2
- FCS_SSH_EXT.1: 4
- FCS_TLS_EXT.1: 4
- FDP:
- FDP_ACC.1: 15
- FDP_ACC.1.1: 1
- FDP_ACF.1: 13
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DSK_EXT: 2
- FDP_DSK_EXT.1: 7
- FDP_DSK_EXT.1.1: 2
- FDP_DSK_EXT.1.2: 2
- FDP_IFC.1: 1
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FIA:
- FIA_AFL.1: 3
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_PMG_EXT: 2
- FIA_PMG_EXT.1: 6
- FIA_PMG_EXT.1.1: 2
- FIA_PSK_EXT: 2
- FIA_PSK_EXT.1: 10
- FIA_PSK_EXT.1.1: 2
- FIA_PSK_EXT.1.2: 2
- FIA_PSK_EXT.1.3: 2
- FIA_UAU.1: 10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 3
- FIA_UAU.7.1: 1
- FIA_UID.1: 14
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 3
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 3
- FMT_MOF.1.1: 1
- FMT_MSA.1: 4
- FMT_MSA.1.1: 1
- FMT_MSA.3: 6
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 3
- FMT_MTD.1.1: 1
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_KYP_EXT: 2
- FPT_KYP_EXT.1: 4
- FPT_KYP_EXT.1.1: 2
- FPT_SKP_EXT: 2
- FPT_SKP_EXT.1: 7
- FPT_SKP_EXT.1.1: 2
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 7
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 7
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 3
- FTA:
- FTA_SSL.3: 3
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 13
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 6
- FTP_TRP.1.1: 2
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_ARP: 2
- FAU_ARP.1: 5
- FAU_ARP.1.1: 1
- FAU_GEN: 3
- FAU_GEN.1: 8
- FAU_SAR_EXP: 2
- FAU_SAR_EXP.1: 4
- FAU_SAR_EXP.1.1: 1
- FAU_SAR_EXP.1.2: 1
- FAU_SEL.1: 1
- FAU_SEL_EXP: 2
- FAU_SEL_EXP.1: 3
- FAU_SEL_EXP.1.1: 1
- FDP:
- FDP_ATD_EXP.1: 1
- FDP_IFC: 2
- FDP_IFC.2: 4
- FDP_IFC.2.1: 1
- FDP_IFC.2.2: 1
- FDP_IFF: 4
- FDP_IFF.1: 13
- FDP_IFF.3: 5
- FDP_IFF.3.1: 1
- FDP_RIP: 2
- FDP_RIP.2: 4
- FDP_RIP.2.1: 1
- FIA:
- FIA_ATD_EXP.1: 8
- FIA_ATD_EXP.1.1: 3
- FIA_USB_EXP.1: 10
- FIA_USB_EXP.1.1: 3
- FIA_USB_EXP.1.2: 3
- FIA_USB_EXP.1.3: 3
- FMT:
- FMT_MCD_EXP: 2
- FMT_MCD_EXP.1: 4
- FMT_MCD_EXP.1.1: 1
- FMT_MOF.1: 24
- FMT_MOF.1.1: 7
- FMT_MSA.3: 1
- FMT_MSA_EXP: 4
- FMT_MSA_EXP.1: 4
- FMT_MSA_EXP.1.1: 1
- FMT_MSA_EXP.1.2: 1
- FMT_MSA_EXP.3: 4
- FMT_MSA_EXP.3.1: 1
- FMT_MTD: 2
- FMT_MTD.1: 8
- FMT_MTD.1.1: 2
- FMT_MTD.3: 5
- FMT_MTD.3.1: 1
- FMT_SMF: 2
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FPT:
- FPT_AMT: 2
- FPT_AMT.1: 8
- FPT_AMT.1.1: 3
- FPT_CFG_EXP: 3
- FPT_CFG_EXP.1: 5
- FPT_CFG_EXP.1.1: 2
- FPT_CFG_EXP.1.2: 2
- FPT_CFG_EXP.1.3: 2
- FPT_CFG_EXP.1.4: 1
- FPT_ESS_EXP: 2
- FPT_ESS_EXP.1: 5
- FPT_ESS_EXP.1.1: 1
- FPT_ESS_EXP.1.2: 1
- FPT_ESS_EXP.1.3: 1
- FPT_FLS: 2
- FPT_FLS.1: 7
- FPT_FLS.1.1: 1
- FPT_HLT_EXP: 2
- FPT_HLT_EXP.1: 4
- FPT_HLT_EXP.1.1: 1
- FPT_HLT_EXP.1.2: 1
- FPT_MTN_EXP: 4
- FPT_MTN_EXP.1: 5
- FPT_MTN_EXP.1.1: 1
- FPT_MTN_EXP.1.2: 1
- FPT_MTN_EXP.1.3: 1
- FPT_MTN_EXP.2: 4
- FPT_MTN_EXP.2.1: 1
- FPT_PLP_EXP: 3
- FPT_PLP_EXP.1: 4
- FPT_PLP_EXP.1.1: 1
- FPT_RCV: 2
- FPT_RCV.4: 5
- FPT_RCV.4.1: 1
- FPT_RCV_EXP: 2
- FPT_RCV_EXP.2: 5
- FPT_RCV_EXP.2.1: 1
- FPT_RCV_EXP.2.2: 1
- FPT_RCV_EXP.2.3: 1
- FPT_RCV_EXP.2.4: 1
- FPT_RCV_EXP.2.5: 1
- FPT_RST_EXP: 2
- FPT_RST_EXP.1: 4
- FPT_RST_EXP.1.1: 1
- FPT_RST_EXP.1.2: 1
- FPT_RVM: 2
- FPT_RVM.1: 4
- FPT_RVM.1.1: 1
- FPT_SEP: 2
- FPT_SEP.3: 4
- FPT_SEP.3.1: 1
- FPT_SEP.3.2: 1
- FPT_SEP.3.3: 1
- FPT_STM: 2
- FPT_STM.1: 5
- FPT_STM.1.1: 1
- FPT_TST: 1
- FPT_TST.1: 2
- FPT_TST_EXP: 2
- FPT_TST_EXP.1: 5
- FPT_TST_EXP.1.1: 1
- FPT_TST_EXP.1.2: 1
- FPT_TST_EXP.1.3: 1
- FPT_TST_EXP.1.4: 1
- FRU:
- FRU_PRU_EXP: 2
- FRU_PRU_EXP.1: 3
- FRU_PRU_EXP.1.1: 1
- FRU_RSA: 2
- FRU_RSA.2: 4
- FRU_RSA.2.1: 1
- FRU_RSA.2.2: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- O:
- O.ACCESS_CONTROL: 7
- O.ADMIN_ROLES: 4
- O.AUDIT: 5
- O.COMMS_PROTECTION: 10
- O.KEY_MATERIAL: 1
- O.PURGE_DATA: 2
- O.STORAGE_ENCRYPTION: 7
- O.TSF_SELF_TEST: 1
- O.UPDATE_VERIFICATION: 2
- O.USER_AUTHORIZATION: 7
- OE:
- OE.ADMIN_TRAINING: 1
- OE.ADMIN_TRUST: 1
- OE.NETWORK_PROTE: 1
- OE.PHYSICAL_PROTE: 1
- OE.USER_TRAINING: 1
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_A: 1
- T.UNAUTHORIZED_U: 1
|
- A:
- A.COVERT_CHANNELS: 1
- A.PHYSICAL: 1
- A.SUBJECT_ALLOCATION: 1
- A.TRUSTED_FLOWS: 1
- A.TRUSTED_INDIVIDUAL: 1
- O:
- O.ACCESS: 1
- O.ADMIN_GUIDANCE: 1
- O.AUDIT_GENERATION: 1
- O.AUTHORIZED_SUBJECT: 1
- O.BOUNDED_EXECUTION: 1
- O.CHANGE_MANAGEMENT: 1
- O.CONFIGURATION_CHANGE: 1
- O.CORRECT_CONFIG: 1
- O.CORRECT_INIT: 1
- O.CORRECT_LOAD: 1
- O.CORRECT_TSF_OPERATION: 1
- O.COVERT_CHANNEL_ANALYSIS: 1
- O.CRYPTOGRAPHY: 1
- O.FUNCTIONAL_TESTING: 1
- O.INIT_SECURE_STATE: 1
- O.INSTALL_GUIDANCE: 1
- O.INTERNAL_LEAST_PRIVILEGE: 1
- O.MANAGE: 1
- O.RATINGS_MAINTENANCE: 1
- O.RECOVERY_SECURE_STATE: 1
- O.REFERENCE_MONITOR: 1
- O.RESIDUAL_INFORMATION: 1
- O.RESOURCE_ALLOCATION: 1
- O.SECURE_STATE: 1
- O.SOUND_DESIGN: 1
- O.SOUND_IMPLEMENTATION: 1
- O.SUBJECT_ISOLATION: 1
- O.TRANSITION: 1
- O.TRUSTED_DELIVERY: 1
- O.TSF_INTEGRITY: 1
- O.USER_GUIDANCE: 1
- O.VULNERABILITY_ANALYSIS_TEST: 1
- OE:
- OE.COVERT_CHANNELS: 1
- OE.PHYSICAL: 1
- OE.SUBJECT_ALLOCATION: 1
- OE.TRUSTED_FLOWS: 1
- OE.TRUSTED_INDIVIDUAL: 1
- T:
- T.ADMIN_ERROR: 1
- T.ALTERED_DELIVERY: 1
- T.CONFIGURATION_CHANGE: 1
- T.CONFIGURATION_INTEGRITY: 1
- T.COVERT_CHANNEL_EXPLOIT: 1
- T.DENIAL_OF_SERVICE: 1
- T.INCORRECT_CONFIG: 1
- T.INCORRECT_LOAD: 1
- T.INSECURE_STATE: 1
- T.LEAST_PRIVILEGE: 1
- T.POOR_DESIGN: 1
- T.POOR_IMPLEMENTATION: 1
- T.POOR_TEST: 1
- T.TSF_COMPROMISE: 1
- T.UNAUTHORIZED_ACCESS: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 26
- AES-: 1
- AES-256: 4
- constructions:
- MAC:
- HMAC: 13
- HMAC-SHA-256: 6
- HMAC-SHA-384: 1
- HMAC-SHA-512: 4
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 18
- SHA-384: 10
- SHA-512: 14
- SHA384: 2
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 5
- IKEv1: 20
- IKEv2: 9
- IPsec:
- SSH:
- TLS:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 4
- P-384: 2
- P-521: 2
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS PUB 180-3: 1
- FIPS PUB 186-4: 8
- FIPS PUB 197: 3
- FIPS PUB 198-1: 1
- ISO:
- ISO/IEC 10116: 14
- ISO/IEC 10118: 4
- ISO/IEC 10118-: 2
- ISO/IEC 18031:2011: 5
- ISO/IEC 18033-3: 1
- ISO/IEC 19772: 8
- NIST:
- NIST SP 800-108: 3
- NIST SP 800-132: 6
- NIST SP 800-38A: 3
- NIST SP 800-38B: 2
- NIST SP 800-38C: 2
- NIST SP 800-38D: 2
- NIST SP 800-90A: 7
- RFC:
- RFC 3602: 10
- RFC 4106: 6
- RFC 4109: 3
- RFC 4301: 2
- RFC 4303: 2
- RFC 4304: 5
- RFC 4868: 7
- RFC 5282: 3
|
- CC:
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- FIPS:
- FIPS PUB 186-2: 1
- FIPS PUB 186-23: 1
- FIPS PUB 186-3: 2
- FIPS PUB 198: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /CreationDate: D:20210719145643+09'00'
- /Creator: Microsoft® Word for Office 365
- /ModDate: D:20210719145643+09'00'
- /Producer: Microsoft® Word for Office 365
- pdf_file_size_bytes: 1020463
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 74
|
- /Author: SAIC CCTL IA Team
- /Company: Green Hills Software, Inc.
- /CreationDate: D:20080702095952-04'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /Manager: Julie Taylor
- /ModDate: D:20080702100156-04'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20080530140402
- /Subject: Security Target
- /Title: Green Hills Software INTEGRITY-178B Partitioning Kernel Security Target
- pdf_file_size_bytes: 612709
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 67
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |