name |
KONICA MINOLTA AccurioPress C4080 / AccurioPress C4070 / AccurioPrint C4065 with UK-112GM2-20 |
NXP Smart Card Controller P5CC037V0A with specific IC Dedicated Software |
category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
DE |
status |
active |
archived |
not_valid_after |
15.04.2026 |
01.09.2019 |
not_valid_before |
15.04.2021 |
20.06.2008 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0720_eimg.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0720_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0465a.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0720_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0465b.pdf |
manufacturer |
KONICA MINOLTA, INC. |
NXP Semiconductors |
manufacturer_web |
https://www.konicaminolta.com/index.html |
https://www.nxp.com/ |
security_level |
{} |
EAL5+, AVA_MSU.3, ALC_DVS.2, AVA_VLA.4 |
dgst |
6171283e8ac6eea1 |
dc1e6226f3a5b527 |
heuristics/cert_id |
JISEC-CC-CRP-C0720-01-2021 |
BSI-DSZ-CC-0465-2008 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ALC_LCD.2, AGD_USR.1, ALC_DVS.2, AVA_SOF.1, ATE_COV.2, ATE_DPT.2, AGD_ADM.1, ADV_INT.1, ADV_RCR.2, ATE_FUN.1, ADV_IMP.2, ALC_TAT.2, ADV_HLD.3, AVA_VLA.4, ADV_SPM.3, ATE_IND.2, ADV_LLD.1, ADV_FSP.3, AVA_CCA.1, AVA_MSU.3 |
heuristics/extracted_versions |
20 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2009/49, BSI-DSZ-CC-0550-2008, BSI-DSZ-CC-0612-2010 |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0661-2011, ANSSI-CC-2009/49, BSI-DSZ-CC-0550-2008, BSI-DSZ-CC-0612-2010 |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0720
- certification_date: 01.04.2021
- claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
- enhanced:
- assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0720
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio100000006bm-att/c0720_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Product (MFP) that has the functions, such as copy, scan and Document storage and retrieval. The TOE provides the security functionality required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFP. TOE Security functions The TOE provides the following security functions: Identification and authentication function Access control function Storage encryption function Trusted communications function Security management function Audit function Software update verification function Self-testing function
- evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
- product: KONICA MINOLTA AccurioPress C4080 / AccurioPress C4070 / AccurioPrint C4065 with UK-112
- product_type: Multifunction Product
- protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio100000006bm-att/c0720_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio100000006bm-att/c0720_est.pdf
- toe_version: GM2-20
- vendor: KONICA MINOLTA, INC.
- expiration_date:
- supplier: KONICA MINOLTA, INC.
- toe_japan_name: KONICA MINOLTA AccurioPress C4080 / AccurioPress C4070 / AccurioPrint C4065 with UK-112GM2-20
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0720_it0772.html
- toe_overseas_name: KONICA MINOLTA AccurioPress C4080 / AccurioPress C4070 / AccurioPrint C4065 with UK-112GM2-20
|
|
heuristics/st_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0661-2011, ANSSI-CC-2009/49 |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0661-2011, ANSSI-CC-2009/49 |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
b2cfec7a92fa2940 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf |
{} |
pdf_data/cert_filename |
c0720_eimg.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0720-01-2021: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20210602111203+09'00'
- /Creator: Microsoft® Word for Office 365
- /ModDate: D:20210602115815+09'00'
- /Producer: Microsoft® Word for Office 365
- pdf_file_size_bytes: 83609
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
c0720_erpt.pdf |
0465a.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0465-2008
- cert_item: NXP Smart Card Controller P5CC037V0A with specific IC Dedicated Software
- cert_lab: BSI
- developer: NXP Semiconductors Germany GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0720-01-2021: 1
|
- DE:
- BSI-DSZ-CC-0465: 1
- BSI-DSZ-CC-0465-2008: 19
- BSI-DSZ-CC-0466: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 4: 5
- EAL 5: 4
- EAL 5 augmented: 4
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 6
- EAL5: 6
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.3: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 6
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.2: 1
- ALC_TAT: 2
- ALC_TAT.2: 1
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_VLA: 3
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG: 1
- NXP:
- NXP: 19
- NXP Semiconductors: 17
- Philips:
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- SCA:
- DPA: 1
- SPA: 1
- physical probing: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
- BSI:
- AIS 25: 3
- AIS 26: 2
- AIS 31: 3
- AIS 32: 1
- AIS 34: 3
- AIS 35: 3
- AIS 36: 1
- AIS 38: 1
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Card Controller, NXP Semiconductors, Business Line Identification, Version 1.4, April 16th, 2008 (confidential document) [7] Evaluation Technical Report, BSI-DSZ-CC-0465, Version 1.1, April 18th, 2008, NXP P5CC037V0A: 1
- Secure Smart Card Controller, BSIDSZ-CC-0465, T-Systems GEI GmbH, Version 1.1, 16.04.2008 (confidential document) 8 specifically • AIS 25, Version 3, 6 August 2007, Anwendung der CC auf Integrierte Schaltungen: 1
- Smart Card Controller, T-Systems (confidential document) [8] Configuration List for the NXP P5xC012/02x/037/052 family of Secure Smart Card Controllers: 1
- Version 1.2, NXP Semiconductors, April 16th, 2008 (confidential document) [9] Security Target Lite, Evaluation of the P5CC037V0A Secure Smart Card Controller, NXP: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20210720120228+09'00'
- /Creator: Microsoft® Word for Office 365
- /ModDate: D:20210720120315+09'00'
- /Producer: Microsoft® Word for Office 365
- pdf_file_size_bytes: 419944
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 30
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20080702083229+02'00'
- /Creator: Writer
- /Keywords: "NXP Smart Card Controller P5CC037V0A with specific IC Dedicated Software, NXP Semiconductors Germany GmbH, BSI-DSZ-CC-0465-2008"
- /ModDate: D:20080702084729+02'00'
- /Producer: OpenOffice.org 2.4
- /Subject: Common Criteria Zertifizierung
- /Title: Zertifizierungsreport BSI-DSZ-CC-0465-2008
- pdf_file_size_bytes: 558799
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
pdf_data/st_filename |
c0720_est.pdf |
0465b.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 4
- EAL 5 augmented: 2
- EAL4: 4
- EAL4 augmented: 1
- EAL4+: 1
- EAL5: 34
- EAL5 augmented: 1
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ACM:
- ACM_AUT: 1
- ACM_AUT.1: 1
- ACM_CAP: 1
- ACM_CAP.4: 2
- ACM_SCP: 4
- ACM_SCP.2: 4
- ACM_SCP.3: 5
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 2
- ADO_IGS: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP: 4
- ADV_FSP.2: 4
- ADV_FSP.3: 6
- ADV_HLD: 1
- ADV_HLD.3: 1
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_LLD: 1
- ADV_LLD.1: 1
- ADV_RCR: 4
- ADV_RCR.2: 1
- ADV_SPM: 1
- ADV_SPM.3: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 2
- AGD_USR: 2
- AGD_USR.1: 2
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_LCD: 1
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.2: 1
- ATE:
- ATE_COV.2: 2
- ATE_DPT.2: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_CCA.1: 1
- AVA_MSU: 2
- AVA_MSU.3: 2
- AVA_SOF.1: 2
- AVA_VLA.4: 4
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 13
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 3
- FAU_GEN.2.1: 1
- FAU_STG_EXT: 3
- FAU_STG_EXT.1: 5
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM.1: 37
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.4: 8
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 3
- FCS_CKM_EXT.4: 31
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 114
- FCS_COP.1.1: 7
- FCS_KDF_EXT: 3
- FCS_KDF_EXT.1: 13
- FCS_KDF_EXT.1.1: 4
- FCS_KYC_EXT: 4
- FCS_KYC_EXT.1: 6
- FCS_KYC_EXT.1.1: 3
- FCS_PCC_EXT: 3
- FCS_PCC_EXT.1: 7
- FCS_PCC_EXT.1.1: 2
- FCS_RBG_EXT: 2
- FCS_RBG_EXT.1: 38
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SMC_EXT.1: 7
- FCS_SNI_EXT: 3
- FCS_SNI_EXT.1: 5
- FCS_SNI_EXT.1.1: 3
- FCS_SNI_EXT.1.2: 2
- FCS_SNI_EXT.1.3: 2
- FCS_SSH_EXT.1: 4
- FCS_TLS_EXT.1: 4
- FDP:
- FDP_ACC.1: 15
- FDP_ACC.1.1: 1
- FDP_ACF.1: 13
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DSK_EXT: 2
- FDP_DSK_EXT.1: 7
- FDP_DSK_EXT.1.1: 2
- FDP_DSK_EXT.1.2: 2
- FDP_IFC.1: 1
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FIA:
- FIA_AFL.1: 3
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_PMG_EXT: 2
- FIA_PMG_EXT.1: 6
- FIA_PMG_EXT.1.1: 2
- FIA_PSK_EXT: 2
- FIA_PSK_EXT.1: 10
- FIA_PSK_EXT.1.1: 2
- FIA_PSK_EXT.1.2: 2
- FIA_PSK_EXT.1.3: 2
- FIA_UAU.1: 10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 3
- FIA_UAU.7.1: 1
- FIA_UID.1: 14
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 3
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 3
- FMT_MOF.1.1: 1
- FMT_MSA.1: 4
- FMT_MSA.1.1: 1
- FMT_MSA.3: 6
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 3
- FMT_MTD.1.1: 1
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_KYP_EXT: 2
- FPT_KYP_EXT.1: 4
- FPT_KYP_EXT.1.1: 2
- FPT_SKP_EXT: 2
- FPT_SKP_EXT.1: 7
- FPT_SKP_EXT.1.1: 2
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 7
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 7
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 3
- FTA:
- FTA_SSL.3: 3
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 13
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 6
- FTP_TRP.1.1: 2
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 4
- FCS_CKM.4: 3
- FCS_COP.1: 13
- FCS_COP.1.1: 1
- FCS_RND.1: 5
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC.1: 33
- FDP_ACC.1.1: 2
- FDP_ACF.1: 30
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 10
- FDP_ITC: 1
- FDP_ITC.1: 4
- FDP_ITC.2: 4
- FDP_ITT.1: 6
- FDP_SDI.1: 1
- FMT:
- FMT_LIM.1: 3
- FMT_LIM.2: 3
- FMT_MSA.1: 29
- FMT_MSA.1.1: 2
- FMT_MSA.2: 4
- FMT_MSA.3: 22
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_SMF.1: 14
- FMT_SMF.1.1: 1
- FMT_SMR.1: 8
- FPT:
- FPT_AMT.1: 1
- FPT_FLS.1: 7
- FPT_ITT.1: 6
- FPT_PHP.3: 7
- FPT_SEP.1: 15
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FRU:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- O:
- O.ACCESS_CONTROL: 7
- O.ADMIN_ROLES: 4
- O.AUDIT: 5
- O.COMMS_PROTECTION: 10
- O.KEY_MATERIAL: 1
- O.PURGE_DATA: 2
- O.STORAGE_ENCRYPTION: 7
- O.TSF_SELF_TEST: 1
- O.UPDATE_VERIFICATION: 2
- O.USER_AUTHORIZATION: 7
- OE:
- OE.ADMIN_TRAINING: 1
- OE.ADMIN_TRUST: 1
- OE.NETWORK_PROTE: 1
- OE.PHYSICAL_PROTE: 1
- OE.USER_TRAINING: 1
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_A: 1
- T.UNAUTHORIZED_U: 1
|
- O:
- O.CONFIG: 6
- O.MEM_ACCESS: 8
- O.MF_FW: 8
- O.RND: 3
- O.SFR_ACCESS: 8
- T:
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 80
- NXP Semiconductors: 14
- Philips:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 26
- AES-: 1
- AES-256: 4
- constructions:
- MAC:
- HMAC: 13
- HMAC-SHA-256: 6
- HMAC-SHA-384: 1
- HMAC-SHA-512: 4
|
- DES:
- 3DES:
- TDEA: 3
- Triple-DEA: 1
- Triple-DES: 9
- DES:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 18
- SHA-384: 10
- SHA-512: 14
- SHA384: 2
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 5
- IKEv1: 20
- IKEv2: 9
- IPsec:
- SSH:
- TLS:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 4
- P-384: 2
- P-521: 2
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 10
- fault injection: 4
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 1
- Leak-Inherent: 13
- Physical Probing: 2
- physical probing: 1
- timing attacks: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS PUB 180-3: 1
- FIPS PUB 186-4: 8
- FIPS PUB 197: 3
- FIPS PUB 198-1: 1
- ISO:
- ISO/IEC 10116: 14
- ISO/IEC 10118: 4
- ISO/IEC 10118-: 2
- ISO/IEC 18031:2011: 5
- ISO/IEC 18033-3: 1
- ISO/IEC 19772: 8
- NIST:
- NIST SP 800-108: 3
- NIST SP 800-132: 6
- NIST SP 800-38A: 3
- NIST SP 800-38B: 2
- NIST SP 800-38C: 2
- NIST SP 800-38D: 2
- NIST SP 800-90A: 7
- RFC:
- RFC 3602: 10
- RFC 4106: 6
- RFC 4109: 3
- RFC 4301: 2
- RFC 4303: 2
- RFC 4304: 5
- RFC 4868: 7
- RFC 5282: 3
|
- BSI:
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 1
- FIPS:
- FIPS PUB 46: 1
- FIPS PUB 46-3: 3
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /CreationDate: D:20210719145643+09'00'
- /Creator: Microsoft® Word for Office 365
- /ModDate: D:20210719145643+09'00'
- /Producer: Microsoft® Word for Office 365
- pdf_file_size_bytes: 1020463
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 74
|
- /Author: Hans-Gerd Albertsen
- /CreationDate: D:20080416151517Z
- /Keywords: Security IC (Smart Card) evaluation; Assurance Level EAL5+ (AVA_VLA.4); BSI-PP-0002-2001 compliant; P5CC037V0A Security Requirements, Security Objectives and Security Functions
- /ModDate: D:20080701142411+02'00'
- /Producer: AFPL Ghostscript 8.14
- /Subject: P5CC037V0A Common Criteria Evaluation
- /Title: Security Target Lite P5CC037V0A
- pdf_file_size_bytes: 600145
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 68
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |