Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
RICOH MP C2503/C1803 Version:J-1.00
JISEC-CC-CRP-C0436
IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application
ANSSI-CC-2018/22
name RICOH MP C2503/C1803 Version:J-1.00 IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP FR
not_valid_after 02.09.2019 09.07.2023
not_valid_before 28.08.2014 09.07.2018
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0436_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_22fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0436_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_22en.pdf
manufacturer Ricoh Company, Ltd. Idemia
manufacturer_web https://www.ricoh.com/ https://www.idemia.com
security_level EAL2+, ALC_FLR.2 ALC_DVS.2, EAL5+, AVA_VAN.5
dgst 63aaeb511b0dc0bf 2c0fa55136a3d581
heuristics/cert_id JISEC-CC-CRP-C0436 ANSSI-CC-2018/22
heuristics/cert_lab [] CEA
heuristics/cpe_matches cpe:2.3:h:ricoh:mp_c2503:-:*:*:*:*:*:*:* {}
heuristics/extracted_sars ATE_IND.2, ASE_ECD.1, ATE_FUN.1, ASE_OBJ.2, AGD_PRE.1, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, ASE_TSS.1, ASE_SPD.1, ASE_INT.1, ADV_FSP.2, ASE_CCL.1, ALC_FLR.2, ALC_DEL.1, ASE_REQ.2, ALC_CMC.2, ADV_TDS.1, AGD_OPE.1, ALC_CMS.2 ALC_LCD.1, ASE_ECD.1, ATE_FUN.1, ALC_CMS.5, AGD_PRE.1, ATE_DPT.3, ADV_TDS.4, ADV_ARC.1, ASE_OBJ.2, ASE_TSS.1, ADV_IMP.1, ASE_SPD.1, ASE_INT.1, ALC_TAT.2, ASE_CCL.1, ATE_COV.2, AVA_VAN.5, ADV_INT.2, ADV_FSP.5, ALC_DEL.1, ASE_REQ.2, ALC_CMC.4, AGD_OPE.1, ALC_DVS.2
heuristics/extracted_versions 1.00 2.15, 1.4.8
heuristics/report_references/directly_referencing {} ANSSI-CC-2017/59, ANSSI-CC-2016/70
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2017/59, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0879-2014, ANSSI-CC-2016/70, BSI-DSZ-CC-0879-V2-2015, ANSSI-CC-2016/66, BSI-DSZ-CC-0782-V2-2015, ANSSI-CC-2016/67
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0436
  • certification_date: 01.08.2014
  • claim: EAL2+ ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.2
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0436_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of “U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)”, which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: RICOH MP C2503/C1803
    • product_type: Multi Function Product
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/c0436_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0436_est.pdf
    • toe_version: J-1.00
    • vendor: RICOH COMPANY, LTD.
  • expiration_date: 01.09.2019
  • supplier: RICOH COMPANY, LTD.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0436_it3477.html
  • toe_japan_name: RICOH MP C2503/C1803 J-1.00
  • toe_overseas_link: None
  • toe_overseas_name: -----
heuristics/st_references/directly_referencing {} ANSSI-CC-2017/59
heuristics/st_references/indirectly_referencing {} ANSSI-CC-2017/59
heuristics/protection_profiles 43ce79b420f23a00 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf {}
pdf_data/report_filename c0436_erpt.pdf anssi-cc-2018_22fr.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 5
    • cert_id: ANSSI-CC-2018/22
    • cert_item: IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application
    • cert_item_version: OFFICIEL_IDME_1_4_8B_IDealCitiz_SLE78CLFX4000PM_2_1_5_0_R2
    • cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
    • developer: Idemia 8 Chaussée Jules César, 95520 Osny, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Idemia 18 Chaussée Jules César, 95520 Osny, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.0.1 ; Part 3: Device with key import, v1.0.2 ; Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1 ; Part 5: Extension for device with key generation and trusted communication with signature creation application, v1.0.1 ; Part 6: Extension for device with key import and trusted communication with signature creation application, v1.0.4
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0436-01: 1
    • Certification No. C0436: 1
  • FR:
    • ANSSI-CC-2016/70: 1
    • ANSSI-CC-2017/59: 1
    • ANSSI-CC-2018/22: 19
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0059-2009-MA-01: 1
    • BSI-CC-PP- 0071-2012: 1
    • BSI-CC-PP- 0072-2012: 1
    • BSI-CC-PP- 0076-2013: 1
  • other:
    • PP-SSCD-: 6
    • PP-SSCD-Part2: 1
    • PP-SSCD-Part3: 1
    • PP-SSCD-Part5: 1
    • PP-SSCD-Part6: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 1
    • EAL2: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_PRE: 3
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 3
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 2
    • T.DOC: 2
    • T.FUNC: 1
    • T.PROT: 1
pdf_data/report_keywords/vendor
  • Idemia:
    • IDEMIA: 19
    • Idemia: 2
  • Infineon:
    • Infineon: 24
    • Infineon Technologies AG: 1
pdf_data/report_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 3
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 1
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 4
  • TLS:
    • SSL:
      • SSL: 3
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 4
pdf_data/report_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
pdf_data/report_metadata
  • /CreationDate: D:20141020154720+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20141020154808+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 318787
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 36
  • /Category: Référence, Version
  • /Comments: Idemia
  • /Company: SGDSN/ANSSI
  • /CreationDate: D:20180713115402+02'00'
  • /Creator: Acrobat PDFMaker 11 pour Word
  • /Keywords: ANSSI-CC-CER-F-07.026
  • /ModDate: D:20180713145243+02'00'
  • /Producer: Adobe PDF Library 11.0
  • /SourceModified: D:20180713095351
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 287772
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
pdf_data/st_filename c0436_est.pdf anssi-cible-cc-2018_22en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0782-V2-2015-RA-01: 2
  • FR:
    • ANSSI-CC-2017/59: 1
pdf_data/st_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-: 1
  • BSI:
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0068-V2-: 1
    • BSI-CC-PP-0071-2012: 1
    • BSI-CC-PP-0072-2012: 1
    • BSI-CC-PP-0075-2012: 1
    • BSI-CC-PP-0076-2013: 1
    • BSI-PP-0035: 2
  • other:
    • PP-SSCD: 1
    • PP-SSCD2: 23
    • PP-SSCD3: 17
    • PP-SSCD4: 16
    • PP-SSCD5: 20
    • PP-SSCD6: 16
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 1
  • EAL:
    • EAL 5: 1
    • EAL 5 augmented: 1
    • EAL 5+: 1
    • EAL 6+: 1
    • EAL4+: 1
    • EAL5: 5
    • EAL5 augmented: 5
    • EAL5+: 3
    • EAL6: 1
    • EAL6 augmented: 1
    • EAL6+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
  • ADV:
    • ADV_ARC.1: 6
    • ADV_FSP.1: 3
    • ADV_FSP.2: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 8
    • ADV_IMP.1: 8
    • ADV_INT.2: 1
    • ADV_TDS.1: 2
    • ADV_TDS.3: 3
    • ADV_TDS.4: 8
  • AGD:
    • AGD_ADM: 1
    • AGD_OPE: 4
    • AGD_OPE.1: 5
    • AGD_PRE: 6
    • AGD_PRE.1: 5
    • AGD_USR: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.1: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 8
    • ALC_LCD.1: 3
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 5
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 3
    • ATE_DPT.1: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 6
  • AVA:
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 8
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 9
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 7
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 31
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 31
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 8
    • FDP_ACF.1.4: 3
    • FDP_IFC: 1
    • FDP_IFC.1: 4
    • FDP_IFF: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 10
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 31
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.2: 12
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 39
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_UID.2: 13
    • FIA_UID.2.1: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 20
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 23
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 22
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 29
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 8
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 21
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 4
  • FAU:
    • FAU_ARP.1: 1
    • FAU_GEN: 1
  • FCO:
    • FCO_NRO: 1
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 21
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.3: 1
    • FCS_CKM.4: 15
    • FCS_CKM.4.1: 1
    • FCS_COP: 1
    • FCS_COP.1: 15
    • FCS_COP.1.1: 1
    • FCS_RND: 5
    • FCS_RND.1: 12
    • FCS_RND.1.1: 2
  • FDP:
    • FDP_ACC: 65
    • FDP_ACC.1: 15
    • FDP_ACF: 55
    • FDP_ACF.1: 20
    • FDP_DAU: 11
    • FDP_DAU.2: 2
    • FDP_IFC: 2
    • FDP_IFC.1: 7
    • FDP_IFF: 2
    • FDP_ITC: 13
    • FDP_ITC.1: 5
    • FDP_ITC.2: 2
    • FDP_RIP: 8
    • FDP_RIP.1: 12
    • FDP_RIP.1.1: 1
    • FDP_ROL: 1
    • FDP_SDI: 24
    • FDP_SDI.2: 5
    • FDP_UCT: 17
    • FDP_UCT.1: 1
    • FDP_UIT: 12
    • FDP_UIT.1: 2
  • FIA:
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_API: 5
    • FIA_API.1: 12
    • FIA_API.1.1: 2
    • FIA_ATD: 1
    • FIA_UAU.1: 23
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID: 2
    • FIA_UID.1: 21
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB: 1
  • FMT:
    • FMT_MOF.1: 12
    • FMT_MOF.1.1: 1
    • FMT_MSA: 37
    • FMT_MSA.1: 4
    • FMT_MSA.2: 14
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 24
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.4: 16
    • FMT_MSA.4.1: 1
    • FMT_MTD: 26
    • FMT_MTD.1: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 24
    • FMT_SMF.1.1: 1
    • FMT_SMR: 3
    • FMT_SMR.1: 27
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 1
  • FPT:
    • FPT_EMS: 5
    • FPT_EMS.1: 15
    • FPT_EMS.1.1: 4
    • FPT_EMS.1.2: 3
    • FPT_FLS: 3
    • FPT_FLS.1: 13
    • FPT_FLS.1.1: 1
    • FPT_PHP: 1
    • FPT_PHP.1: 9
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 13
    • FPT_PHP.3.1: 1
    • FPT_RCV: 3
    • FPT_TDC.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 15
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 65
    • FTP_ITC.1: 14
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 5
    • A.ADMIN: 10
    • A.USER: 4
  • D:
    • D.DOC: 6
    • D.FUNC: 6
  • O:
    • O.AUDIT: 9
    • O.CONF: 18
    • O.DOC: 18
    • O.FUNC: 9
    • O.INTERFACE: 9
    • O.PROT: 9
    • O.RCGATE: 13
    • O.SOFTWARE: 9
    • O.STORAGE: 14
    • O.USER: 21
  • OE:
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 2
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
    • OE.AUDIT_STORAGE: 3
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 21
  • T:
    • T.CONF: 10
    • T.DOC: 14
    • T.FUNC: 7
    • T.PROT: 5
  • A:
    • A.APPLET: 1
    • A.CGA: 6
    • A.CSP: 9
    • A.PRODUCTION: 1
    • A.SCA: 5
    • A.VERIFICATION: 1
  • D:
    • D.SCD: 1
    • D.SVD: 1
  • O:
    • O.ALARM: 1
    • O.BIO-MNGT: 1
    • O.CARD-MANAGEMENT: 1
    • O.CIPHER: 1
    • O.DELETION: 1
    • O.FIREWALL: 1
    • O.GLOBAL_ARRAYS_CONFID: 1
    • O.GLOBAL_ARRAYS_INTEG: 1
    • O.INSTALL: 1
    • O.KEY-MNGT: 1
    • O.LOAD: 1
    • O.NATIVE: 1
    • O.OBJ-DELETION: 1
    • O.OPERATE: 1
    • O.PIN-MNGT: 1
    • O.REALLOCATION: 1
    • O.RESOURCES: 1
    • O.SCP: 3
    • O.SID: 1
    • O.TRANSACTION: 1
  • OE:
    • OE.APPLET: 1
    • OE.CODE-EVIDENCE: 1
    • OE.HID_VAD: 5
    • OE.HI_VAD: 2
    • OE.KEY_GENERATION: 1
    • OE.PRODUCTION: 1
    • OE.QUOTAS: 1
    • OE.SECURITY-DOMAINS: 1
    • OE.SHARE-CONTROL: 1
    • OE.VERIFICATION: 1
  • OSP:
    • OSP.KEY_GENERATION: 1
    • OSP.QUOTAS: 1
    • OSP.SECURITY_DOMAINS: 1
    • OSP.SHARE-CONTROL: 1
    • OSP.VERIFICATION: 1
  • T:
    • T.APP_DATA_INTEGRITY: 1
    • T.CONFID-APPLI-DATA: 1
    • T.CONFID-JCS-CODE: 1
    • T.CONFID-JCS-DATA: 1
    • T.DELETION: 1
    • T.EXE-CODE: 2
    • T.INSTALL: 1
    • T.INTEG-APPLI-CODE: 2
    • T.INTEG-APPLI-DATA: 2
    • T.INTEG-JCS-CODE: 1
    • T.INTEG-JCS-DATA: 1
    • T.LIFE_CYCLE: 1
    • T.NATIVE: 1
    • T.OBJ-DELETION: 1
    • T.PHYSICAL: 1
    • T.RESOURCES: 1
    • T.SID: 2
    • T.UNAUTH_ACCESS: 1
    • T.UNAUTH_CARD_MNGT: 1
pdf_data/st_keywords/vendor
  • Idemia:
    • IDEMIA: 8
  • Infineon:
    • Infineon: 13
pdf_data/st_keywords/eval_facility
  • CEA-LETI:
    • CEA-LETI: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 8
    • RC:
      • RC4: 2
  • DES:
    • 3DES:
      • 3DES: 5
  • AES_competition:
    • AES:
      • AES: 13
  • DES:
    • 3DES:
      • 3DES: 6
      • TDES: 5
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 12
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 3
  • FF:
    • DH:
      • Diffie-Hellman: 1
  • RSA:
    • RSA-OAEP: 1
    • RSA-PSS: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 8
    • SHA2:
      • SHA-2: 1
      • SHA-224: 2
      • SHA-256: 7
      • SHA-384: 3
      • SHA-512: 6
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 1
  • MAC:
    • MAC: 6
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 10
  • TLS:
    • SSL:
      • SSL3.0: 1
    • TLS:
      • TLS1.0: 2
  • PACE:
    • PACE: 26
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 1
  • RNG:
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 5
pdf_data/st_keywords/crypto_library
  • Infineon:
    • v1.02.013: 6
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • FI:
    • DFA: 1
    • fault injection: 1
    • malfunction: 1
    • physical tampering: 7
  • SCA:
    • DPA: 3
    • SPA: 3
    • physical probing: 2
    • side channel: 1
    • timing attacks: 2
pdf_data/st_keywords/standard_id
  • BSI:
    • BSI-AIS31: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS197: 2
  • BSI:
    • AIS 20: 1
    • AIS20: 1
    • AIS31: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • FIPS:
    • FIPS PUB 180-2: 2
  • ICAO:
    • ICAO: 7
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 15408:2005: 2
    • ISO/IEC 7816-4: 1
    • ISO/IEC 9797-: 1
    • ISO/IEC 9797-1: 2
  • NIST:
    • NIST SP 800-38B: 1
  • PKCS:
    • PKCS#1: 3
    • PKCS1: 3
    • PKCS3: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • only EC is used to generate keys, the RSA key generation is out of scope of the platform evaluation: 1
    • out of scope: 2
    • pre- personalization phase. Beside the TOE, the product can include other Java Card applications (out of scope of the TOE). IDealCitiz v2.1.1 Platform enforces separation of the data between the applets and: 1
    • v2.1.1 mechanisms FCS_CKM.1 FCS_CKM.1 (only EC is used to generate keys, the RSA key generation is out of scope of the platform evaluation) The requirement in this ST is equiva- lent to parts of the platform ST: 1
pdf_data/st_metadata
  • /Author: z00se00558
  • /CreationDate: D:2014073115520209'00'
  • /Creator: PrimoPDF http://www.primopdf.com/
  • /ModDate: D:2014073115520209'00'
  • /Producer: PrimoPDF
  • /Title: Microsoft Word - MP_C2503_ST_DOM_1.00.jp_ENG
  • pdf_file_size_bytes: 5618999
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 91
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different