name |
Java Card Mokard Safe 2.2 V2.4.0 |
DataOverwriteSecurity Unit Type I Software Version: 1.01m |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Other Devices and Systems |
scheme |
DE |
JP |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
07.10.2013 |
not_valid_before |
11.11.2005 |
28.02.2008 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0251a.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0146_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0251b.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0146_est.pdf |
manufacturer |
ST Incard S.R.L. |
Ricoh Company, Ltd. |
manufacturer_web |
https://www.incard.it/ |
https://www.ricoh.com/ |
security_level |
AVA_VLA.3, EAL4+, ADV_IMP.2 |
EAL3 |
dgst |
643e82f312663824 |
e94414ed23397f0a |
heuristics/cert_id |
BSI-DSZ-CC-0251-2005 |
JISEC-CC-CRP-C0146 |
heuristics/cert_lab |
BSI |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_ENV.1, ADV_RCR.1, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, ADV_FSP.2, AVA_SOF.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ADV_IMP.2, ATE_DPT.1, AVA_VLA.3, ALC_DVS.1, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
heuristics/extracted_versions |
2.2, 2.4.0 |
1.01 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0146
- certification_date: 01.02.2008
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.3
- cert_link: https://www.ipa.go.jp/en/security/c0146_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This product, an optional kit of safer use for Multi Function Product, overwrites generated data into the specified area of HDD commanded by Multi Function Product(MFP). This product is available for the following MFPs; Ricoh imagio MP 2550 series Ricoh imagio MP 3350 series Ricoh imagio MP 4000 series Ricoh imagio MP 5000 series Ricoh Aficio MP 2550 series Ricoh Aficio MP 3350 series Savin 9025/9033 series Lanier LD425/433 series Lanier MP 2550/3350 series Gestetner MP 2550/3350 series Nashuatec MP 2550/3350 series Rex-Rotary MP 2550/3350 series Infotec MP 2550/3350 series Ricoh Aficio MP 4000 series Ricoh Aficio MP 5000 series Savin 9040/9050 series Lanier LD040/050 series Lanier MP 4000/5000 series Gestetner MP 4000/5000 series Nashuatec MP 4000/5000 series Rex-Rotary MP 4000/5000 series Infotec MP 4000/5000 series TOE security functions Same as above.
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: imagio Security Card Type 9 Software (Japanese name) DataOverwriteSecurity Unit Type I Software (English name)
- product_type: IT Product (software to overwrite data)
- report_link: https://www.ipa.go.jp/en/security/c0146_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0146_est.pdf
- toe_version: 1.01m
- vendor: RICOH COMPANY, LTD.
- expiration_date: 01.10.2013
- revalidations: [frozendict({'date': '2009-01', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0146_it7170_01.html'})]
- supplier: RICOH COMPANY, LTD.
- toe_japan_name: imagio Security Card Type 9 Software 1.01m
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0146_it7170.html
- toe_overseas_name: DataOverwriteSecurity Unit Type I Software 1.01m
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
0251a.pdf |
c0146_erpt.pdf |
pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0251-2005
- cert_item: Java Card Mokard Safe 2.2 V2.4.0
- cert_lab: BSI
- developer: ST-Incard S.r.l
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0146-01: 1
- Certification No. C0146: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 4: 1
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 12
- EAL4 augmented: 3
- EAL4+: 1
- EAL5: 6
- EAL6: 3
- EAL7: 4
|
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_FSP.2: 1
- ADV_HLD: 2
- ADV_HLD.2: 1
- ADV_IMP: 2
- ADV_IMP.2: 6
- ADV_INT: 2
- ADV_LLD: 2
- ADV_LLD.1: 1
- ADV_RCR: 2
- ADV_RCR.1: 1
- ADV_SPM: 2
- ADV_SPM.1: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 4
- AGD_USR: 2
- AGD_USR.1: 4
- ALC:
- ALC_DVS: 2
- ALC_DVS.1: 1
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT: 2
- ATE_DPT.1: 1
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_IND: 2
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.2: 1
- AVA_SOF: 4
- AVA_SOF.1: 1
- AVA_VLA: 4
- AVA_VLA.2: 1
- AVA_VLA.3: 7
- AVA_VLA.4: 1
|
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FCO:
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.2: 1
- FCS_CKM.3: 1
- FCS_CKM.4: 1
- FCS_COP.1: 1
- FDP:
- FDP_ACC.2: 3
- FDP_ACF.1: 3
- FDP_IFC.1: 2
- FDP_IFC.2: 1
- FDP_IFF.1: 3
- FDP_ITC.2: 1
- FDP_RIP.1: 4
- FDP_ROL.1: 1
- FDP_SDI.2: 1
- FDP_UIT.1: 1
- FIA:
- FIA_ATD.1: 1
- FIA_UID.1: 1
- FIA_UID.2: 1
- FIA_USB.1: 1
- FMT:
- FMT_MSA.1: 4
- FMT_MSA.2: 1
- FMT_MSA.3: 4
- FMT_MTD.1: 1
- FMT_MTD.3: 1
- FMT_REV.1: 1
- FMT_SMF.1: 4
- FMT_SMR.1: 5
- FPR:
- FPT:
- FPT_FLS.1: 4
- FPT_RCV.3: 1
- FPT_RVM.1: 1
- FPT_SEP.1: 1
- FPT_TDC.1: 1
- FPT_TST.1: 1
- FRU:
- FTP:
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.APPLET: 2
- A.NATIVE: 2
- A.VERIFICATION: 2
- OSP:
- T:
- T.CONFID-APPLI-DATA: 1
- T.CONFID-JCS-CODE: 1
- T.CONFID-JCS-DATA: 1
- T.DELETION: 1
- T.EXE-CODE: 2
- T.EXE-CODE-REMOTE: 1
- T.INSTALL: 1
- T.INTEG-APPLI-: 1
- T.INTEG-APPLI-CODE: 1
- T.INTEG-APPLI-DATA: 2
- T.INTEG-JCS-CODE: 1
- T.INTEG-JCS-DATA: 1
- T.NATIVE: 1
- T.OBJ-DELETION: 1
- T.PHYSICAL: 1
- T.RESOURCES: 1
- T.SID: 2
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik: 4
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
- FI:
- fault injection: 1
- malfunction: 1
- physical tampering: 1
- SCA:
|
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Mokard Safe 2.2, ASE-Security Target, BSI-DSZ-0251-2005, Version B- 0, Draft-11, Date 14.10.2005, (confidential document) [7] Mokard Safe 2.2, The User and Administrator Guidance AGD_USR.1 – AGD_ADM.1, Version A-0: 1
- Report [8] Evaluation Technical Report, BSI-DSZ-CC-0251-2005, Version 2, Date: 09.11.2005, (confidential document) [9] Protection Profile PP/0305, JavaCard System Standard 2.2 Configuration Protection Profile [10: 1
|
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Company: BSI
- /CreationDate: D:20051219141321+01'00'
- /Creator: Acrobat PDFMaker 7.0.5 für Word
- /ModDate: D:20051219142354+01'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /SourceModified: D:20051219131312
- /Subject: BSI-DSZ-CC-0251-2005
- /Title: Certification Report
- pdf_file_size_bytes: 714197
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
- /CreationDate: D:20080911170307+09'00'
- /ModDate: D:20080911170307+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 98568
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
pdf_data/st_filename |
0251b.pdf |
c0146_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP-000: 1
- BSI-PP-0002: 1
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 5
- EAL 4 augmented: 3
- EAL4: 9
- EAL4 augmented: 2
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 4
- ACM_CAP.4: 3
- ACM_SCP.2: 4
- ADO:
- ADO_DEL.2: 4
- ADO_IGS.1: 4
- ADV:
- ADV_FSP.1: 1
- ADV_FSP.2: 5
- ADV_HLD.2: 6
- ADV_IMP.1: 2
- ADV_IMP.2: 11
- ADV_LLD.1: 7
- ADV_RCR.1: 4
- ADV_SPM.1: 15
- AGD:
- AGD_ADM.1: 8
- AGD_USR.1: 6
- ALC:
- ALC_DVS.1: 4
- ALC_LCD: 1
- ALC_LCD.1: 3
- ALC_TAT.1: 5
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 3
- ATE_IND.2: 3
- AVA:
- AVA_MSU.2: 4
- AVA_SOF.1: 5
- AVA_VLA: 1
- AVA_VLA.2: 3
- AVA_VLA.3: 10
|
- ACM:
- ACM_CAP.3: 2
- ACM_SCP.1: 2
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.2: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 1
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU.1: 2
- AVA_SOF.1: 1
- AVA_VLA.1: 3
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP: 3
- FAU_ARP.1: 8
- FAU_SAA.1: 4
- FCO:
- FCS:
- FCS_CKM.1: 14
- FCS_CKM.2: 9
- FCS_CKM.3: 7
- FCS_CKM.4: 12
- FCS_CKM.4.1: 1
- FCS_COP.1: 8
- FDP:
- FDP_ACC: 21
- FDP_ACC.1: 17
- FDP_ACC.2: 12
- FDP_ACF: 12
- FDP_ACF.1: 33
- FDP_IFC: 20
- FDP_IFC.1: 25
- FDP_IFC.2: 7
- FDP_IFF: 11
- FDP_IFF.1: 30
- FDP_IFF.2: 8
- FDP_IFF.2.7: 1
- FDP_ITC.1: 4
- FDP_ITC.2: 12
- FDP_RIP: 2
- FDP_RIP.1: 28
- FDP_ROL: 1
- FDP_ROL.1: 14
- FDP_SDI.2: 9
- FDP_UIT: 1
- FDP_UIT.1: 4
- FIA:
- FIA_ATD: 2
- FIA_ATD.1: 6
- FIA_UID: 9
- FIA_UID.1: 19
- FIA_UID.2: 3
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FMT:
- FMT_MSA: 39
- FMT_MSA.1: 31
- FMT_MSA.2: 11
- FMT_MSA.3: 28
- FMT_MTD: 2
- FMT_MTD.1: 7
- FMT_MTD.3: 5
- FMT_MTD.3.1: 1
- FMT_REV: 1
- FMT_REV.1: 5
- FMT_SMF: 7
- FMT_SMF.1: 32
- FMT_SMR: 25
- FMT_SMR.1: 48
- FPR:
- FPT:
- FPT_AMT: 3
- FPT_AMT.1: 5
- FPT_FLS: 10
- FPT_FLS.1: 18
- FPT_PHP: 1
- FPT_PHP.3: 3
- FPT_RCV: 3
- FPT_RCV.3: 17
- FPT_RCV.4: 4
- FPT_RVM: 2
- FPT_RVM.1: 9
- FPT_RVM.1.1: 1
- FPT_SEP: 2
- FPT_SEP.1: 10
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TDC.1: 5
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FRU_FLT: 2
- FRU_FLT.1: 3
- FRU_RSA: 2
- FRU_RSA.1: 6
- FTP:
- FTP_ITC: 3
- FTP_ITC.1: 8
- FTP_TRP.1: 2
|
- FDP:
- FDP_RIP.1: 5
- FDP_SIP.1: 13
- FDP_SIP.1.1: 1
- FPT:
- FPT_RVM.1: 8
- FPT_RVM.1.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.APPLET: 4
- A.NATIVE: 6
- A.VERIFICATION: 3
- D:
- D.API_DATA: 3
- D.APP_CODE: 8
- D.APP_C_DATA: 3
- D.APP_I_DATA: 4
- D.CRYPTO: 4
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.PIN: 6
- D.SEC_DATA: 7
- O:
- O.ALARM: 5
- O.APPLET: 31
- O.CIPHER: 7
- O.CODE_PCKG: 8
- O.CODE_PKG: 6
- O.DELETION: 5
- O.FIREWALL: 11
- O.INSTALL: 8
- O.JAVAOBJECT: 38
- O.KEY-MNGT: 5
- O.LOAD: 6
- O.NATIVE: 7
- O.OBJ-DELETION: 5
- O.OPERATE: 9
- O.PACKAGE: 9
- O.PIN-: 1
- O.PIN-MNGT: 5
- O.REALLOCATION: 5
- O.REMOTE: 4
- O.REMOTE_MTHD: 6
- O.REMOTE_OBJ: 9
- O.REMOTE_OBJECT: 1
- O.RESOURCES: 6
- O.RMI_SERVICE: 12
- O.ROR: 5
- O.SHRD_VAR_CONFID: 5
- O.SHRD_VAR_INTEG: 6
- O.SID: 8
- O.TODO: 1
- O.TRANSACTION: 5
- OE:
- OE.APPLET: 6
- OE.CARD-MANAGEMENT: 3
- OE.NATIVE: 4
- OE.SCP: 18
- OE.VERIFICATION: 11
- OP:
- OP.ARRAY_ACCESS: 3
- OP.AUTHENTICATION: 2
- OP.BYTECODE: 1
- OP.CARD_CONTENT_MGT: 2
- OP.CREATE: 6
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.GET_ROR: 2
- OP.INSTALL: 1
- OP.INSTANCE_FIELD: 1
- OP.INVK_INTERFACE: 4
- OP.INVK_VIRTUAL: 3
- OP.INVOKE: 2
- OP.JAVA: 4
- OP.LOAD: 1
- OP.PUT: 4
- OP.RECEIVE: 2
- OP.RET_RORD: 2
- OP.SEND: 2
- OP.THROW: 3
- OP.TYPE_ACCESS: 3
- OSP:
- R:
- R.CM: 1
- R.GP: 2
- R.JAVA: 19
- T:
- T.CONFID-APPLI-DATA: 3
- T.CONFID-JCS-CODE: 3
- T.CONFID-JCS-DATA: 3
- T.DELETION: 4
- T.EXE-CODE: 7
- T.EXE-CODE-REMOTE: 3
- T.INSTALL: 4
- T.INTEG-APPLI-CODE: 6
- T.INTEG-APPLI-DATA: 7
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 2
- T.NATIVE: 3
- T.OBJ-DELETION: 3
- T.PHYSICAL: 3
- T.RESOURCES: 3
- T.SID: 7
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
- TUV:
- TUV Informationstechnik: 1
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Physical tampering: 1
- malfunction: 2
- physical tampering: 1
- SCA:
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
- FIPS:
- FIPS 197: 1
- FIPS PUB 46-3: 1
- PKCS:
- SCP:
|
|
pdf_data/st_keywords/javacard_version |
- JavaCard:
- Java Card 2.1.1: 3
- Java Card 2.1.2: 1
- Java Card 2.2: 128
- Java Card 2.2.1: 2
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
- java:
- javacard:
- javacard.framework: 4
- javacard.framework.appletclass: 1
- javacard.framework.service: 1
- javacard.security: 14
- javacardx:
- javacardx.crypto: 3
- javacardx.rmi: 1
- javacardx.security: 1
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this PP, though. ASE – Security Target Java Card 2.2 on Mokard Safe Issued: 10/11/2005: 1
- out of scope: 1
|
- OutOfScope:
- attack capability is needed for attacks such as bypassing or tampering TSF, but those are out of scope of this evaluation. That is to say, an analysis of apparent vulnerability (AVA_VLA.1) is sufficient: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: NDiiorio
- /CreationDate: D:20051110164319
- /Creator: Mokard Safe 2.2 ASE Security Target Lite.doc (Sola lettura) - Microsoft Word
- /Producer: Acrobat PDFWriter 4.05 per Windows NT
- /Title: Mokard Safe 2.2 ASE Security Target Lite.doc
- pdf_file_size_bytes: 2702319
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 133
|
- /CreationDate: D:20080820190525+09'00'
- /ModDate: D:20080820190525+09'00'
- /Producer: Acrobat Distiller 5.0 (Windows)
- pdf_file_size_bytes: 406687
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 30
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |