name |
HDD Data Encryption Kit E-Series 2.10 |
MultiApp V4 JavaCard Virtual Machine |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
FR |
status |
archived |
active |
not_valid_after |
25.04.2021 |
22.04.2027 |
not_valid_before |
25.04.2016 |
28.05.2020 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2020_33-s01.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0506_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_33fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0506_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible_anssi_cc_2020-33.pdf |
manufacturer |
Canon Inc. |
Gemalto |
manufacturer_web |
https://www.canon.com/ |
https://www.gemalto.com/ |
security_level |
EAL3 |
EAL7 |
dgst |
62bf2f602b0262f1 |
dfa48e7ac54d10f0 |
heuristics/cert_id |
JISEC-CC-CRP-C0506 |
ANSSI-CC-2020/33 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ALC_LCD.2, ASE_INT.1, ADV_LCD.2, ALC_DVS.2, ASE_ECD.1, ADV_TAT.3, ASE_TSS.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ADV_FSP.6, ATE_FUN.2, ALC_TAT.3, AGD_OPE.1, AGD_PRE.1, ATE_IND.3, ADV_ARC.1, ALC_CMC.5, ADV_CMC.5, ADV_IMP.2, ASE_OBJ.2, ASE_REQ.2, ATE_DPT.4, ADV_INT.3, ALC_CMS.1, ASE_CCL.1, ADV_TDS.6, ATE_COV.3, ADV_SPM.1 |
heuristics/extracted_versions |
2.10 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0891-V4-2019, ANSSI-CC-2017/76 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2017/07, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-V4-2019, BSI-DSZ-CC-0891-V3-2018, ANSSI-CC-2017/76, ANSSI-CC-2017/54, BSI-DSZ-CC-0891-V2-2016 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0506
- certification_date: 01.04.2016
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0506_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is an optional hardware product to encrypt data to be stored in the HDD of Canon Multifunctional Product (MFP) and printer. By using this product, data to be stored in the HDD can be encrypted without compromising the scalability or processing performance of the Canon MFP and printer. TOE security functionality The TOE provides the following security functions. - HDD Data Encryption - Cryptographic Key Management - Self-Test
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: HDD Data Encryption Kit E-Series
- product_type: Cryptographic hardware for MFPs and printers
- report_link: https://www.ipa.go.jp/en/security/c0506_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0506_est.pdf
- toe_version: 2.10
- vendor: Canon Inc.
- expiration_date: 01.05.2021
- revalidations: [frozendict({'date': '2017-04', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0506_it5534_02.html'})]
- supplier: Canon Inc.
- toe_japan_name: HDD Data Encryption Kit E-Series 2.10
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0506_it5534.html
- toe_overseas_name: HDD Data Encryption Kit E-Series 2.11
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0891-V2-2016 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0891-V2-2016 |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
|
certificat-anssi-cc-2020_33-s01.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: DUCLOS Charlene
- /CreationDate: D:20220429113327+02'00'
- /Creator: Microsoft® Word 2019
- /Keywords: version x.x, révision x
- /ModDate: D:20220429113327+02'00'
- /Producer: Microsoft® Word 2019
- /Title: ANSSI-CC-2020/33
- pdf_file_size_bytes: 251233
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
c0506_erpt.pdf |
anssi-cc-2020_33fr.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 7
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2020/33
- cert_item: MultiApp V4 JavaCard Virtual Machine
- cert_item_version: Référence 4.0.1
- cert_lab: Serma Safety & Security 14 rue Galilée, CS 10071, 33608 Pessac Cedex, France
- developer: Gemalto 6 rue de la verrerie, 92190 Meudon, France Trusted Labs 6 rue de la verrerie, 92190 Meudon, France Infineon Technologies AG Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la verrerie, 92190 Meudon, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Néant
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0506-01: 1
- Certification No. C0506: 1
|
- DE:
- BSI-DSZ-CC-0891-V4-2019: 1
- FR:
- ANSSI-CC-2017/76: 2
- ANSSI-CC-2017/76-S01: 1
- ANSSI-CC-2020/33: 15
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 3: 1
- EAL 5: 2
- EAL 7: 7
- EAL2: 1
- EAL5: 2
- EAL7: 2
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.PHYSICAL_ACCESS_MANAGED: 1
- T:
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 1
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 4
|
- Serma:
- Serma Safety & Security: 1
- TrustedLabs:
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20160715155737+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20160715155828+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 447686
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 29
|
- /Author: Pat
- /CreationDate: D:20200604113216+02'00'
- /Creator: PDF24 Creator
- /ModDate: D:20200604113216+02'00'
- /Producer: GPL Ghostscript 9.26
- /Title: Microsoft Word - ANSSI-CC-2020_33fr.doc
- pdf_file_size_bytes: 481052
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
pdf_data/st_filename |
c0506_est.pdf |
cible_anssi_cc_2020-33.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0891-V2-2016: 1
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL5+: 1
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 1
- EAL7: 8
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 6
- ADV_CMC.5: 3
- ADV_FSP.1: 2
- ADV_FSP.2: 2
- ADV_FSP.4: 3
- ADV_FSP.6: 11
- ADV_IMP.1: 5
- ADV_IMP.2: 6
- ADV_INT.3: 4
- ADV_LCD.2: 1
- ADV_SPM.1: 7
- ADV_TAT.3: 1
- ADV_TDS.1: 1
- ADV_TDS.3: 3
- ADV_TDS.4: 3
- ADV_TDS.6: 15
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 6
- AGD_PRE: 1
- AGD_PRE.1: 5
- ALC:
- ALC_CMC.5: 7
- ALC_CMS.1: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 6
- ALC_LCD.1: 3
- ALC_LCD.2: 6
- ALC_TAT.1: 2
- ALC_TAT.3: 10
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 3
- ATE_COV.3: 5
- ATE_DPT.1: 1
- ATE_DPT.4: 4
- ATE_FUN.1: 6
- ATE_FUN.2: 5
- ATE_IND.3: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 7
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 4
- FCS_COP.1: 7
- FCS_COP.1.1: 1
- FDP:
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FPT:
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
|
- FAU:
- FAU_ARP.1: 16
- FAU_ARP.1.1: 1
- FAU_SAA.1: 2
- FCO:
- FCS:
- FCS_CKM.1: 3
- FCS_CKM.2: 2
- FCS_CKM.3: 2
- FCS_CKM.4: 2
- FCS_COP.1: 3
- FCS_RND.1: 1
- FDP:
- FDP_ACC: 22
- FDP_ACC.1: 4
- FDP_ACC.2: 2
- FDP_ACF: 19
- FDP_ACF.1: 6
- FDP_IFC: 15
- FDP_IFC.1: 5
- FDP_IFF: 13
- FDP_IFF.1: 8
- FDP_ITC: 2
- FDP_RIP: 16
- FDP_ROL: 12
- FDP_ROL.1: 3
- FDP_SDI.1: 1
- FDP_SDI.2: 3
- FDP_UIT: 2
- FIA:
- FIA_ATD: 8
- FIA_ATD.1: 1
- FIA_UAU: 1
- FIA_UID: 4
- FIA_UID.1: 1
- FIA_USB: 2
- FMT:
- FMT_MSA: 54
- FMT_MSA.1: 5
- FMT_MSA.2: 3
- FMT_MSA.3: 10
- FMT_MTD: 16
- FMT_MTD.1: 2
- FMT_MTD.3: 1
- FMT_REV: 1
- FMT_SMF: 14
- FMT_SMF.1: 4
- FMT_SMR: 18
- FMT_SMR.1: 8
- FPR:
- FPT:
- FPT_FLS: 21
- FPT_FLS.1: 4
- FPT_ITT: 1
- FPT_PHP: 1
- FPT_PHP.3: 1
- FPT_RCV: 10
- FPT_RCV.3: 7
- FPT_TDC.1: 9
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.PHYSICAL_ACCESS_MANAGED: 3
- O:
- O.CORRECT_TSF_OPERATION: 4
- O.CORRECT_TSF_OPETATION: 2
- O.CRYPTO: 7
- OE:
- OE.PHYSICAL_ACCESS_MANAGED: 6
- T:
|
- A:
- A.ALARM-ENV: 4
- A.APPLET: 5
- A.CIPHER: 4
- A.DELETION: 8
- A.FIREWALL-ENV: 4
- A.GLOBAL_ARRAYS_CONFI: 1
- A.GLOBAL_ARRAYS_CONFID: 3
- A.INSTALL-ENV: 4
- A.KEY-MNGT: 4
- A.LOAD: 4
- A.OBJ-: 1
- A.OBJ-DELETION: 3
- A.OPERATE-ENV: 4
- A.PIN-MNGT: 4
- A.REALLOCATION: 4
- A.RESOURCES: 4
- A.SID: 4
- A.TRANSACTION: 4
- A.VERIFICATION: 5
- D:
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 3
- D.APP_I_DATA: 4
- D.CRYPTO: 3
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.PIN: 4
- D.SEC_DATA: 7
- O:
- O.ALARM: 15
- O.APPLET: 1
- O.CARD-MANAGEMENT: 1
- O.DELETION: 1
- O.FIREWALL: 15
- O.GLOBAL_ARRAYS_CONFID: 2
- O.GLOBAL_ARRAYS_INTEG: 3
- O.INSTALL: 8
- O.JAVAOBJECT: 31
- O.KEY-MNGT: 1
- O.LOAD: 1
- O.NATIVE: 11
- O.OBJ-DELETION: 1
- O.OPERATE: 16
- O.PIN-: 1
- O.REALLOCATION: 1
- O.RESOURCES: 1
- O.RND: 4
- O.SCP: 3
- O.SID: 1
- O.TRANSACTION: 1
- OE:
- OE.ALARM-ENV: 2
- OE.APPLET: 4
- OE.CARD-MANAGEMENT: 1
- OE.CARD_MANAGEMENT: 15
- OE.CIPHER: 7
- OE.CODE-EVIDENCE: 10
- OE.DELETION: 3
- OE.FIREWALL-ENV: 4
- OE.GLOBAL_ARRAYS_CONFID: 4
- OE.GLOBAL_ARRAYS_INTEG: 1
- OE.INSTALL-ENV: 2
- OE.KEY-MNGT: 5
- OE.LOAD: 7
- OE.OBJ-DELETION: 5
- OE.OPERATE: 1
- OE.OPERATE-ENV: 4
- OE.PIN-MNGT: 7
- OE.REALLOCATION: 4
- OE.RESOURCES: 6
- OE.RND: 4
- OE.SCP: 22
- OE.SID: 8
- OE.TRANSACTION: 5
- OE.VERIFICATION: 26
- OP:
- OP.ARRAY_ACCESS: 6
- OP.CREATE: 12
- OP.INSTANCE_FIELD: 6
- OP.INVK_INTERFACE: 10
- OP.INVK_VIRTUAL: 8
- OP.JAVA: 8
- OP.PUT: 9
- OP.THROW: 7
- OP.TYPE_ACCESS: 7
- OSP:
- OSP.RND: 4
- OSP.VERIFICATION: 4
- OT:
- OT.GLOBAL_ARRAYS_INTEG: 1
- R:
- T:
- T.CONFID-APPLI-DATA: 4
- T.CONFID-JCS-CODE: 4
- T.CONFID-JCS-DATA: 4
- T.DELETION: 3
- T.EXE-CODE: 8
- T.INSTALL: 4
- T.INTEG-APPLI-CODE: 7
- T.INTEG-APPLI-DATA: 8
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 4
- T.NATIVE: 4
- T.OBJ-DELETION: 4
- T.PHYSICAL: 4
- T.RESOURCES: 3
- T.SID: 8
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- fault induction: 2
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 1
- Leak-Inherent: 3
- physical probing: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/st_keywords/javacard_version |
|
- JavaCard:
- Java Card 2.2.2: 3
- Java Card 3.0.4: 4
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 1
- javacard.framework.service: 1
- javacard.security: 1
- javacardx:
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives OE.SCP.RECOVERY and OE.SCP.SUPPORT are: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: Canon Inc.
- /CreationDate: D:20160715151953+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /Keywords:
- /ModDate: D:20160715151954+09'00'
- /Producer: Adobe LiveCycle PDFGenerator
- /Subject:
- /Title: HDD Data Encryption Kit E-Series Security Target
- pdf_file_size_bytes: 420636
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 21
|
- /Author: Maria Christofi
- /CreationDate: D:20200309171000+01'00'
- /Creator: Microsoft® Word 2013
- /Keywords: Security Target, CC
- /ModDate: D:20200309171000+01'00'
- /Producer: Microsoft® Word 2013
- /Subject: Security Target
- /Title: Security Target: Formal assurance for MultiAppV4 JCS
- pdf_file_size_bytes: 1571623
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 61
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |