Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Control Software Version:A0R50Y0-0100-G00-20 (System Controller) A0R50Y0-1D00-G00-11 (BIOS Controller)
JISEC-CC-CRP-C0223
LDS Applet EAC with PACE on ID-one V8.1 - Standard LDS Platform on NXP P6021M VB and on ID-One Cosmo v8.1-N - Large Platform on NXP P6022M VB (version 03 00 00 00)
ANSSI-CC-2018/05
name bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Control Software Version:A0R50Y0-0100-G00-20 (System Controller) A0R50Y0-1D00-G00-11 (BIOS Controller) LDS Applet EAC with PACE on ID-one V8.1 - Standard LDS Platform on NXP P6021M VB and on ID-One Cosmo v8.1-N - Large Platform on NXP P6022M VB (version 03 00 00 00)
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP FR
not_valid_after 31.07.2014 14.02.2023
not_valid_before 15.07.2009 14.02.2018
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0223_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_05_idemia.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0223_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st-2018_05.pdf
manufacturer Konica Minolta Business Technologies, Inc Oberthur Technologies / NXP Semiconductors GmbH
manufacturer_web https://www.konicaminolta.com/ https://www.oberthur.com/
security_level EAL3 EAL5+, AVA_VAN.5, ALC_DVS.2
dgst 647f141827033728 525098d0957957c2
heuristics/cert_id JISEC-CC-CRP-C0223 ANSSI-CC-2018/05
heuristics/cert_lab [] CEA
heuristics/extracted_sars ALC_CMS.3, ASE_OBJ.2, ADV_ARC.1, ATE_IND.2, ATE_DPT.1, ATE_COV.2, ALC_LCD.1, ASE_TSS.1, AVA_VLA.1, ALC_DVS.1, ADV_TDS.2, ASE_ECD.1, AGD_OPE.1, ALC_CMC.3, ASE_INT.1, ASE_SPD.1, ASE_REQ.2, ADV_FSP.3, ATE_FUN.1, AGD_PRE.1, ASE_CCL.1 ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ASE_TSS.2, ATE_DPT.1, ADV_FSP.4, AVA_VAN.5, ADV_ARC.1, ALC_DVS.2
heuristics/extracted_versions 3622, 421, 20, 5022, 0100, 4222, 11, 501, 361 8.1
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2019/49
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0973-V2-2016, ANSSI-CC-2017/47, ANSSI-CC-2010/03, BSI-DSZ-CC-0955-V2-2016, ANSSI-CC-2017/49
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2019/49, ANSSI-CC-2020/37
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2009/06, BSI-DSZ-CC-0973-V2-2016, ANSSI-CC-2017/47, ANSSI-CC-2010/03, ANSSI-CC-2009/05, ANSSI-CC-2009/26, BSI-DSZ-CC-0955-2016, BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-0955-V2-2016, ANSSI-CC-2017/49
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0223
  • certification_date: 01.07.2009
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0223_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE TOE controls the entire operation of MFP, including the operation control processing and the image data management that are accepting from the panel of the main body of digital MFP (Multi Functional Peripheral, and hereinafter referred to as "MFP") or through the network. And TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in HDD for the danger of taking HDD that is the medium that stores the image data in MFP out illegally by using the HDD lock function loaded on the HDD. Besides, TOE has the deletion method to follow various overwrite deletion standards and it deletes all the data of HDD completely. TOE security functionality TOE provides the following security functions. - Administrator Function - SNMP Administrator Function - Service Mode Function - User Function - User Box Function - Secure Print Function - ID & Print Function - Overwrite deletion Function for all area - Encryption Key Generation Function - HDD validation Function - CF validation Function - Authentication Failure Counter Reset Function - Trust Channel Function - S/MIME Encryption Processing Function - External server authentication operation support Function - WebDAV administrator Function - Encryption kit operation support Function - HDD lock operation support Function - CF lock operation support Function
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: Japanese: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Zentai Seigyo Software English: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Control Software
    • product_type: Control Software for digital MFP
    • report_link: https://www.ipa.go.jp/en/security/c0223_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0223_est.pdf
    • toe_version: A0R50Y0-0100-G00-20 (System Controller) A0R50Y0-1D00-G00-11 (BIOS Controller)
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.07.2014
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Zentai Seigyo Software A0R50Y0-0100-G00-20 (System Controller) A0R50Y0-1D00-G00-11 (BIOS Controller)
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0223_it8239.html
  • toe_overseas_name: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Control Software A0R50Y0-0100-G00-20 (System Controller) A0R50Y0-1D00-G00-11 (BIOS Controller)
heuristics/st_references/directly_referencing {} ANSSI-CC-2017/48
heuristics/st_references/indirectly_referencing {} ANSSI-CC-2017/48, BSI-DSZ-CC-0955-V2-2016
heuristics/protection_profiles {} a33327d40f253f46, 184ca3dbcac741fa
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-06fr.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf
pdf_data/report_filename c0223_erpt.pdf anssi-cc-2018_05_idemia.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL5 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 4
    • cert_id: ANSSI-CC-2018/05
    • cert_item: LDS Applet EAC with PACE on ID-one V8.1 - Standard LDS Platform on NXP P6021M VB and on ID-One Cosmo v8.1-N - Large Platform on NXP P6022M VB
    • cert_item_version: Version 03 00 00 00
    • cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
    • developer: IDEMIA (ex Oberthur Technologies) 420 rue d’Estienne d’Orves, 92700 Colombes, France NXP Semiconductors GmbH Stresemannallee 101, 22539 Hamburg, Allemagne Commanditaire IDEMIA 420 rue d’Estienne d’Orves, 92700 Colombes, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: BSI-CC-PP-0056-V2-2012, [PP EAC], version 1.3.0 Machine Readable Travel Document with ICAO Application BSI-CC-PP-0068-V2-2011, [PP-PACE], version 1.0 Machine Readable Travel Document using Standard Inspection Procedure with PACE
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0223-01: 1
    • Certification No. C0223: 1
  • DE:
    • BSI-DSZ-CC-0955-V2-: 1
    • BSI-DSZ-CC-0955-V2-2016: 1
    • BSI-DSZ-CC-0973-V2-: 1
    • BSI-DSZ-CC-0973-V2-2016: 1
  • FR:
    • ANSSI-CC-2010/03: 1
    • ANSSI-CC-2010/03-M01: 1
    • ANSSI-CC-2017/47: 2
    • ANSSI-CC-2017/49: 1
    • ANSSI-CC-2018/05: 17
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0056-V2-2012: 2
    • BSI-CC-PP-0068-V2-2011: 2
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 1
    • EAL 7: 1
    • EAL2: 2
    • EAL5: 4
    • EAL5+: 1
    • EAL6: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_PRE: 4
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 4
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVICE: 1
    • A.SETTING: 1
  • T:
    • T.ACCESS-GROUP-BOX: 2
    • T.ACCESS-PRIVATE-BOX: 2
    • T.ACCESS-PUBLIC-BOX: 2
    • T.ACCESS-SECURE-PRINT: 2
    • T.ACCESS-SETTING: 2
    • T.BACKUP-RESTORE: 2
    • T.BRING-OUT-CF: 2
    • T.BRING-OUT-STORAGE: 2
    • T.DISCARD-MFP: 2
    • T.UNEXPECTEC-TRANSMISSION: 1
    • T.UNEXPECTED-TRANSMISSION: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Idemia:
    • IDEMIA: 10
  • NXP:
    • NXP: 48
    • NXP Semiconductors: 1
  • Oberthur:
    • OBERTHUR: 6
    • Oberthur Technologies: 1
pdf_data/report_keywords/eval_facility
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 2
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 7
  • PACE:
    • PACE: 28
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
    • CCMB-2007-09-004: 2
  • X509:
    • X.509: 1
  • BSI:
    • AIS 34: 1
    • AIS34: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ICAO:
    • ICAO: 3
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • body of MFP or through the network. TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data stored in: 1
pdf_data/report_metadata
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20091111144942+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Manager: IPA
  • /ModDate: D:20091111145004+09'00'
  • /Producer: Acrobat Distiller 8.1.0 (Windows)
  • /SourceModified: D:20091022044351
  • /Title: CRP-e
  • pdf_file_size_bytes: 449631
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 37
  • /Category: Référence, Version
  • /Comments: Développeur
  • /Company: SGDSN/ANSSI
  • /CreationDate: D:20180319144408+01'00'
  • /Creator: Acrobat PDFMaker 11 pour Word
  • /Keywords: ANSSI-CC-CER-F-07.026
  • /ModDate: D:20180319164948+01'00'
  • /Producer: Adobe PDF Library 11.0
  • /SourceModified: D:20180319134405
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 200407
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
pdf_data/st_filename c0223_est.pdf st-2018_05.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0955-V2-: 2
    • BSI-DSZ-CC-0973-V2-: 4
  • FR:
    • ANSSI-CC-017/48: 1
    • ANSSI-CC-2017/49-M01: 1
    • ANSSi-CC-PP-2009/02: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0056-V2-2012: 1
    • BSI-CC-PP-0068-V2-2011: 1
    • BSI-PP-0055: 1
    • BSI-PP-0056: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL 5: 1
    • EAL5: 6
    • EAL5+: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VLA.1: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_OPE.1: 1
    • AGD_PRE: 5
    • AGD_PRE.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_DVS.2: 10
  • ASE:
    • ASE_TSS.2: 3
  • ATE:
    • ATE_DPT.1: 1
  • AVA:
    • AVA_VAN.3: 1
    • AVA_VAN.5: 10
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
  • FCS:
    • FCS_CAP.1: 2
    • FCS_CKM: 2
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 3
    • FCS_CKM.4: 4
    • FCS_COP: 1
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 71
    • FDP_ACC.1.1: 4
    • FDP_ACF.1: 54
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_ACP.1: 1
    • FDP_IFC.1: 6
    • FDP_ITC: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 2
    • FDP_RIP.1: 1
    • FDP_UAU.7: 1
  • FIA:
    • FIA_AFL.1: 68
    • FIA_AFL.1.1: 9
    • FIA_AFL.1.2: 9
    • FIA_ATD.1: 26
    • FIA_ATD.1.1: 1
    • FIA_EID: 2
    • FIA_EID.1: 16
    • FIA_EID.1.1: 3
    • FIA_EID.1.2: 1
    • FIA_MSA.3: 1
    • FIA_NEW.1.2: 2
    • FIA_SOS: 1
    • FIA_SOS.1: 59
    • FIA_SOS.1.1: 7
    • FIA_SOS.2: 9
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_SSL.3: 1
    • FIA_UAU.1: 25
    • FIA_UAU.2: 67
    • FIA_UAU.2.1: 6
    • FIA_UAU.6: 12
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 19
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 31
    • FIA_UID.2: 52
    • FIA_UID.2.1: 7
    • FIA_USB.1: 23
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MAS.1: 1
    • FMT_MOF.1: 35
    • FMT_MOF.1.1: 4
    • FMT_MSA: 4
    • FMT_MSA.1: 34
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 40
    • FMT_MSA.3.1: 6
    • FMT_MSA.3.2: 7
    • FMT_MTD.1: 111
    • FMT_MTD.1.1: 12
    • FMT_SME.1: 1
    • FMT_SMF.1: 112
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 174
    • FMT_SMR.1.1: 6
    • FMT_SMR.1.2: 6
    • FMT_SMS.1: 1
    • FMT_SOS.1: 1
  • FTA:
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_SAS: 4
    • FAU_SAS.1: 9
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM: 38
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.4: 5
    • FCS_COP: 98
    • FCS_COP.1: 23
    • FCS_RND: 3
    • FCS_RND.1: 9
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ACC: 15
    • FDP_ACC.1: 4
    • FDP_ACC.2: 2
    • FDP_ACF: 15
    • FDP_ACF.1: 16
    • FDP_DAU: 5
    • FDP_DAU.1: 2
    • FDP_ITC: 10
    • FDP_ITC.1: 6
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
    • FDP_UCT: 11
    • FDP_UCT.1: 2
    • FDP_UIT: 13
    • FDP_UIT.1: 4
  • FIA:
    • FIA_AFL: 12
    • FIA_AFL.1: 4
    • FIA_API: 4
    • FIA_API.1: 9
    • FIA_API.1.1: 1
    • FIA_UAU: 103
    • FIA_UAU.1: 8
    • FIA_UAU.4: 5
    • FIA_UAU.5: 16
    • FIA_UAU.6: 4
    • FIA_UID: 22
    • FIA_UID.1: 8
  • FMT:
    • FMT_LIM: 13
    • FMT_LIM.1: 13
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 14
    • FMT_LIM.2.1: 1
    • FMT_MOF: 11
    • FMT_MOF.1: 3
    • FMT_MTD: 112
    • FMT_MTD.1: 26
    • FMT_MTD.3: 4
    • FMT_SMF: 6
    • FMT_SMF.1: 7
    • FMT_SMR: 14
    • FMT_SMR.1: 7
  • FPT:
    • FPT_EMS: 16
    • FPT_EMS.1: 22
    • FPT_EMS.1.1: 1
    • FPT_EMS.1.2: 1
    • FPT_FLS: 1
    • FPT_FLS.1: 5
    • FPT_PHP: 1
    • FPT_PHP.3: 5
    • FPT_TST: 10
    • FPT_TST.1: 18
  • FTP:
    • FTP_ITC: 12
    • FTP_ITC.1: 6
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.NETWORK: 4
    • A.SECRET: 2
    • A.SERVICE: 2
    • A.SETTING: 3
  • O:
    • O.AUTH-CAPABILITY: 10
    • O.CHECK-CF: 4
    • O.CHECK-HDD: 7
    • O.CONFIG: 11
    • O.CRYPT-KEY: 3
    • O.CRYPTO-CAPABILITY: 4
    • O.CRYPTO-KEY: 2
    • O.CRYPTO-MAIL: 4
    • O.GROUP-BOX: 5
    • O.LOCK-CF-CAPABILITY: 4
    • O.LOCK-HDD-CAPABILITY: 7
    • O.OVERWRITE-ALL: 7
    • O.PRIVATE-BOX: 5
    • O.PUBLIC-BOX: 8
    • O.REGISTERED-USER: 14
    • O.SECURE-PRINT: 8
    • O.TRUSTED-PASS: 7
  • OE:
    • OE.ADMIN: 2
    • OE.CRYPT: 2
    • OE.CRYPTO: 2
    • OE.FEED-BACK: 10
    • OE.LOCK-CF: 3
    • OE.LOCK-HDD: 3
    • OE.NETWORK: 2
    • OE.SECRET: 2
    • OE.SERVER: 5
    • OE.SERVICE: 2
    • OE.SESSION: 2
    • OE.SETTING-SECURITY: 2
  • T:
    • T.ACCESS-GROUP-BOX: 3
    • T.ACCESS-PRIVATE-BOX: 3
    • T.ACCESS-PUBLIC-BOX: 2
    • T.ACCESS-SECURE-PRINT: 2
    • T.ACCESS-SETTING: 2
    • T.BACKUP-RESTORE: 3
    • T.BRING-OUT-CF: 2
    • T.BRING-OUT-STORAGE: 2
    • T.DISCARD-MFP: 3
    • T.UNEXPECTEC-TRANSMISSION: 1
    • T.UNEXPECTED-TRANSMISSION: 2
pdf_data/st_keywords/vendor
  • Idemia:
    • IDEMIA: 4
  • Morpho:
    • Morpho: 1
  • NXP:
    • NXP: 7
    • NXP Semiconductors: 4
  • Oberthur:
    • Oberthur: 3
    • Oberthur Technologies: 14
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • AES_competition:
    • AES:
      • AES: 30
      • AES-256: 1
  • DES:
    • 3DES:
      • 3DES: 16
      • TDES: 1
      • Triple-DES: 1
    • DES:
      • DES: 10
  • constructions:
    • MAC:
      • CMAC: 12
      • KMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 7
    • ECDH:
      • ECDH: 5
    • ECDSA:
      • ECDSA: 7
  • FF:
    • DH:
      • DH: 8
      • Diffie-Hellman: 4
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 5
      • SHA256: 1
  • SHA:
    • SHA1:
      • SHA-1: 3
      • SHA1: 8
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 1
      • SHA-512: 2
      • SHA2: 2
      • SHA224: 1
      • SHA256: 3
      • SHA384: 1
      • SHA512: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
  • MAC:
    • MAC: 12
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
  • PACE:
    • PACE: 176
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 16
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 1
    • Physical tampering: 2
    • fault injection: 1
    • malfunction: 4
  • SCA:
    • DPA: 1
    • physical probing: 3
  • other:
    • JIL: 1
    • reverse engineering: 2
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 15
    • EF.DG1: 17
    • EF.DG14: 3
    • EF.DG15: 2
    • EF.DG16: 16
    • EF.DG2: 3
    • EF.DG3: 10
    • EF.DG4: 10
    • EF.DG5: 2
    • EF.SOD: 13
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 1
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 186-2: 6
    • FIPS PUB 197: 3
  • X509:
    • X.509: 1
  • BSI:
    • AIS 31: 2
  • FIPS:
    • FIPS PUB 140-2: 1
    • FIPS PUB 180-3: 1
    • FIPS PUB 186-3: 1
    • FIPS PUB 197: 1
    • FIPS PUB 46-3: 1
    • FIPS PUB 81: 1
  • ICAO:
    • ICAO: 13
  • ISO:
    • ISO/IEC 11770-2: 2
    • ISO/IEC 14443: 6
    • ISO/IEC 15946-1: 1
    • ISO/IEC 15946-2: 1
    • ISO/IEC 18013-3: 1
    • ISO/IEC 7816-3: 2
    • ISO/IEC 7816-4: 1
    • ISO/IEC 9796-1: 1
    • ISO/IEC 9796-2: 1
    • ISO/IEC 9797-1: 3
  • PKCS:
    • PKCS#1: 3
    • PKCS#3: 4
  • RFC:
    • RFC3369: 1
  • SCP:
    • SCP02: 1
    • SCP03: 1
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate: D:20091111124508+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20091111145504+09'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /Title:
  • pdf_file_size_bytes: 774568
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 117
  • /CreationDate: D:20180207165122+01'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20180319164930+01'00'
  • /Producer: Microsoft® Word 2016
  • pdf_file_size_bytes: 2064533
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 97
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different