Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Dell Color MFP S3845cdn Controller ROM Ver. 1.0.31
JISEC-CC-CRP-C0593
Feitian FT-JCOS v1.0/0.106.13 running on Infineon M7892 B11
SERTIT-079
name Dell Color MFP S3845cdn Controller ROM Ver. 1.0.31 Feitian FT-JCOS v1.0/0.106.13 running on Infineon M7892 B11
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP NO
not_valid_after 29.03.2023 27.06.2021
not_valid_before 29.03.2018 27.06.2016
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0593_eimg.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0593_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20160627_SERTIT-079_CR_1.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0593_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[08250][FTJCOS][ST][V1.0.11]FTJCOS_Security_Target.pdf
manufacturer Dell, Inc. Feitian Technologies Co., Ltd.
manufacturer_web https://www.dell.com https://www.ftsafe.com
security_level EAL2 EAL4+, ALC_DVS.2, AVA_VAN.5
dgst 6b431a5164a4c478 4fdb0afc0bbabfb8
heuristics/cert_id JISEC-CC-CRP-C0593 SERTIT-079
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 AVA_COMP.1, ASE_INT.1, ASE_COMP.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ADV_COMP.1, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_COMP.1, ALC_COMP.1, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 1.0.31 1.0, 0.106.13
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0593
  • certification_date: 01.03.2018
  • claim: EAL2
  • enhanced:
    • assurance_level: EAL2
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0593_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, network scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Flash Memory Data EncryptionA function to encrypt the document data before the data is stored into the internal eMMC memory. - User AuthenticationA function to identify and authenticate users. This function also allows only owners of document data and system administrators to handle document data stored in the TOE. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Fax Flow SecurityA function to restrict the unpermitted communication between public telephone line and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: Dell Color MFP S3845cdn
    • product_type: Multi-Function Device
    • report_link: https://www.ipa.go.jp/en/security/c0593_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0593_est.pdf
    • toe_version: Controller ROM Ver. 1.0.31
    • vendor: Dell Inc.
  • expiration_date: 01.04.2023
  • supplier: Dell Inc.
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0593_it6625.html
  • toe_overseas_name: Dell Color MFP S3845cdnController ROM Ver. 1.0.31
  • category: ICs, Smart Cards and Smart Card-Related Devices and Systems
  • certification_date: 27.06.2016
  • developer: Feitian Technologies Co., Ltd.
  • enhanced:
    • category: ICs, Smart Cards and Smart Card-Related Devices and Systems
    • cert_id: SERTIT-079
    • certification_date: 27.06.2016
    • description: The TOE is a Java Card Platform compliant with Java Card Specification v.2.2.2 and GlobalPlatformSpecification v.2.1.1. The TOE allows post-issuance downloading of applications that have been previously verified by an off-card trusted IT component. It constitutes a secure generic platform that supports multi-application runtime environment and provides facilities for secure loading and interoperability between different applications. The TOE does not implement JCRMI and does not include any software on the application layer.
    • developer: Feitian Technologies Co., Ltd.
    • documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135064-1607952717/SERTIT/Sertifikater/2016/79/20160627_SERTIT-079_Certificate.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135061-1607952711/SERTIT/Sertifikater/2016/79/%5B08250%5D%5BFTJCOS%5D%5BST%5D%5BV1.0.11%5DFTJCOS_Security_Target.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135058-1607952708/SERTIT/Sertifikater/2016/79/20160627_SERTIT-079_CR_1.pdf'})]})
    • evaluation_facility: Brightsight B.V.
    • level: EAL 4, ALC_DVS.2, AVA_VAN.5
    • mutual_recognition: CCRA, SOG-IS
    • product: Feitian FT-JCOS v1.0/0.106.13 running on Infineon M7892 B11
  • product: FT-JCOS
  • url: https://sertit.no/certified-products/product-archive/ft-jcos
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0782-2012
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0758-2012, BSI-DSZ-CC-0782-2012
pdf_data/cert_filename c0593_eimg.pdf
pdf_data/cert_keywords/cc_cert_id
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /CreationDate: D:20180409142712+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20180409142752+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 413818
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 1
pdf_data/report_filename c0593_erpt.pdf 20160627_SERTIT-079_CR_1.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0593-01: 1
    • Certification No. C0593: 1
  • NO:
    • SERTIT-079: 22
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
  • EAL:
    • EAL 4+: 12
    • EAL1: 1
    • EAL2: 1
    • EAL4: 2
    • EAL7: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_COMP.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_COMP.1: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 4
    • ALC_FLR: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_COMP.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COMP.1: 1
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_COMP.1: 1
    • AVA_VAN.5: 3
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 1
  • FCO:
    • FCO_NRO: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.3: 1
    • FCS_CKM.4: 1
    • FCS_COP.1: 1
    • FCS_RNG.1: 3
  • FDP:
    • FDP_ACC: 3
    • FDP_ACF: 3
    • FDP_IFC: 2
    • FDP_IFF: 2
    • FDP_ITC: 1
    • FDP_RIP: 8
    • FDP_ROL: 1
    • FDP_SDI.2: 1
    • FDP_UIT: 1
  • FIA:
    • FIA_UID: 3
    • FIA_USB: 1
  • FMT:
    • FMT_MSA: 11
    • FMT_MTD: 2
    • FMT_SMF: 3
    • FMT_SMF.1: 1
    • FMT_SMR: 4
    • FMT_SMR.1: 1
  • FPR:
    • FPR_UNO.1: 1
  • FPT:
    • FPT_FLS: 3
    • FPT_FLS.1: 1
    • FPT_RCV: 3
    • FPT_TDC.1: 1
  • FTP:
    • FTP_ITC: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 1
    • A.SECMODE: 1
    • A.USER: 1
  • T:
    • T.COMM_TAP: 2
    • T.CONFDATA: 2
    • T.CONSUME: 2
    • T.DATA_SEC: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 13
  • Feitian:
    • Feitian: 2
    • Feitian Technologies Co: 2
  • Infineon:
    • Infineon: 2
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 4
  • BrightSight:
    • Brightsight: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 4
    • SHA2:
      • SHA-256: 1
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 6
  • TLS:
    • TLS:
      • TLS: 2
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • X509:
    • X.509: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 15408: 4
    • ISO/IEC 7816: 2
  • SCP:
    • SCP02: 1
pdf_data/report_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 2
  • JavaCard:
    • Java Card 2.2.2: 5
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As described: 1
    • out of scope: 1
pdf_data/report_metadata
  • /CreationDate: D:20180619105647+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20180619105727+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 383511
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 35
  • /Author: Arne
  • /CreationDate: D:20160821174342+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20160821174443+02'00'
  • /Producer: Acrobat Distiller 9.5.5 (Windows)
  • /Title: Microsoft Word - SERTIT-079 CR 1.0
  • pdf_file_size_bytes: 1626992
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 23
pdf_data/st_filename c0593_est.pdf [08250][FTJCOS][ST][V1.0.11]FTJCOS_Security_Target.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0782-: 1
    • BSI-DSZ-CC-0782-2012: 1
    • BSI-DSZ-CC-0782-2012-MA-01: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0084: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 3
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL4: 5
    • EAL4+: 1
    • EAL5: 1
    • EAL5 augmented: 1
    • EAL6: 1
    • EAL6 augmented: 1
    • EAL6+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 6
    • ADV_FSP.1: 4
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_FSP.5: 7
    • ADV_IMP.1: 9
    • ADV_INT.2: 1
    • ADV_TDS.1: 2
    • ADV_TDS.2: 1
    • ADV_TDS.3: 10
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 10
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.1: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 7
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 5
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 3
    • ATE_DPT.1: 2
    • ATE_FUN.1: 6
  • AVA:
    • AVA_VAN.5: 7
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 2
    • FAU_SAR.2: 8
    • FAU_SAR.2.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 10
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 2
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 12
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 10
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 11
    • FDP_IFC.1.1: 1
    • FDP_IFF: 1
    • FDP_IFF.1: 10
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
  • FIA:
    • FIA_AFL.1: 16
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 14
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 9
    • FIA_UAU.7.1: 1
    • FIA_UIA.1: 1
    • FIA_UID.1: 15
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 8
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MSA: 2
    • FMT_MSA.1: 11
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 11
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 17
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 15
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
    • FPT_TST.1: 8
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 6
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 2
  • FAU:
    • FAU_ARP.1: 24
    • FAU_ARP.1.1: 2
    • FAU_SAA.1: 3
  • FCO:
    • FCO_NRO: 6
    • FCO_NRO.2: 5
  • FCS:
    • FCS_CKM: 3
    • FCS_CKM.1: 10
    • FCS_CKM.2: 8
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 6
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 8
    • FCS_CKM.4.1: 1
    • FCS_COP: 13
    • FCS_COP.1: 25
    • FCS_RNG: 6
    • FCS_RNG.1: 12
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 29
    • FDP_ACC.1: 13
    • FDP_ACC.2: 5
    • FDP_ACF: 31
    • FDP_ACF.1: 18
    • FDP_IFC: 22
    • FDP_IFC.1: 13
    • FDP_IFC.2: 2
    • FDP_IFF: 18
    • FDP_IFF.1: 17
    • FDP_ITC: 10
    • FDP_ITC.2: 9
    • FDP_ITT.1: 1
    • FDP_RIP: 117
    • FDP_RIP.1: 10
    • FDP_ROL: 15
    • FDP_ROL.1: 4
    • FDP_SDI.1: 1
    • FDP_SDI.2: 13
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UIT: 5
    • FDP_UIT.1: 2
  • FIA:
    • FIA_ATD: 8
    • FIA_ATD.1: 2
    • FIA_UID: 19
    • FIA_UID.1: 11
    • FIA_UID.2: 1
    • FIA_USB: 6
    • FIA_USB.1: 3
  • FMT:
    • FMT_MSA: 105
    • FMT_MSA.1: 9
    • FMT_MSA.2: 2
    • FMT_MSA.3: 19
    • FMT_MTD: 20
    • FMT_MTD.1: 2
    • FMT_MTD.3: 1
    • FMT_SMF: 29
    • FMT_SMF.1: 20
    • FMT_SMF.1.1: 1
    • FMT_SMR: 43
    • FMT_SMR.1: 28
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 13
    • FPR_UNO.1.1: 2
  • FPT:
    • FPT_FLS: 31
    • FPT_FLS.1: 16
    • FPT_FLS.1.1: 2
    • FPT_ITT.1: 1
    • FPT_PHP.3: 1
    • FPT_RCV: 23
    • FPT_RCV.3: 13
    • FPT_RCV.4: 2
    • FPT_TDC.1: 8
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 2
    • FPT_TST.1: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 6
    • FTP_ITC.1: 4
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 3
    • A.ADMIN: 4
    • A.SECMODE: 4
    • A.USER: 3
  • O:
    • O.AUDITS: 7
    • O.CIPHER: 5
    • O.COMM_SEC: 6
    • O.FAX_SEC: 6
    • O.MANAGE: 8
    • O.RESTRICT: 5
    • O.USER: 8
    • O.VERIFY: 2
  • OE:
    • OE.ADMIN: 3
    • OE.PHYSICAL: 3
    • OE.SEC: 7
    • OE.USER: 3
  • T:
    • T.COMM_TAP: 3
    • T.CONFDATA: 4
    • T.CONSUME: 3
    • T.DATA_SEC: 4
  • A:
    • A.APPLET: 6
    • A.DELETION: 1
    • A.VERIFICATION: 6
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 7
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 5
    • D.CM_APDU: 1
    • D.CRYPTO: 6
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.JCS_KEYS: 3
    • D.PIN: 6
    • D.SEC_ATTRIBUTES: 2
    • D.SEC_DATA: 8
  • O:
    • O.ALARM: 22
    • O.APPLET: 19
    • O.CARD-: 7
    • O.CARD-MANAGEMENT: 32
    • O.CIPHER: 16
    • O.CODE_PKG: 16
    • O.COMMUNICATION: 11
    • O.DELETION: 15
    • O.FIREWALL: 43
    • O.GLOBAL: 2
    • O.GLOBAL_ARRAYS_CONFID: 18
    • O.GLOBAL_ARRAYS_INTEG: 9
    • O.IC_SUPPORT: 17
    • O.INSTALL: 16
    • O.JAVAOBJECT: 38
    • O.KEY-: 3
    • O.KEY-MNGT: 23
    • O.LOAD: 17
    • O.NATIVE: 14
    • O.OBJ-DELETION: 8
    • O.OPERATE: 35
    • O.OS: 1
    • O.OS_SUPPORT: 23
    • O.PACKAGE: 2
    • O.PIN-: 1
    • O.PIN-MNGT: 22
    • O.REALLOCATION: 17
    • O.RECOVERY: 23
    • O.REMOTE: 1
    • O.RESOURCES: 23
    • O.RND: 14
    • O.SID: 32
    • O.TRANSACTION: 19
  • OE:
    • OE.APPLET: 9
    • OE.CARD-MANAGEMENT: 2
    • OE.CODE-: 5
    • OE.CODE-EVIDENCE: 16
    • OE.SCP: 6
    • OE.VERIFICATION: 37
  • OP:
    • OP.ARRAY_ACCESS: 4
    • OP.CREATE: 7
    • OP.DELETE_APPLET: 4
    • OP.DELETE_PCKG: 3
    • OP.DELETE_PCKG_APPLET: 3
    • OP.GP: 3
    • OP.INSTANCE_FIELD: 4
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 6
    • OP.JAVA: 5
    • OP.LOAD_PCKG: 1
    • OP.PUT: 6
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 5
  • OSP:
    • OSP.VERIFICATION: 6
  • R:
    • R.JAVA: 9
  • T:
    • T.COMMUNICATION: 5
    • T.CONFID-: 2
    • T.CONFID-APPLI-: 2
    • T.CONFID-APPLI-DATA: 17
    • T.CONFID-JCS-CODE: 7
    • T.CONFID-JCS-DATA: 9
    • T.DELETION: 5
    • T.EXE-: 1
    • T.EXE-CODE: 8
    • T.FAULT: 5
    • T.INSTALL: 6
    • T.INTEG-: 6
    • T.INTEG-APPLI-: 4
    • T.INTEG-APPLI-CODE: 12
    • T.INTEG-APPLI-DATA: 18
    • T.INTEG-JCS-: 1
    • T.INTEG-JCS-CODE: 7
    • T.INTEG-JCS-DATA: 12
    • T.LEAKAGE: 5
    • T.NATIVE: 6
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 8
    • T.RESOURCES: 9
    • T.RND: 5
    • T.SID: 19
pdf_data/st_keywords/vendor
  • Feitian:
    • Feitian: 1
    • Feitian Technologies Co: 105
  • Infineon:
    • Infineon: 10
    • Infineon Technologies AG: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 12
  • DES:
    • 3DES:
      • Triple-DES: 1
  • constructions:
    • MAC:
      • HMAC: 1
  • AES_competition:
    • AES:
      • AES: 9
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 7
      • Triple-DES: 1
    • DES:
      • DES: 6
  • constructions:
    • MAC:
      • CMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 8
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 3
  • FF:
    • DH:
      • Diffie-Hellman: 1
  • RSA:
    • RSA2048: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
      • SHA1: 4
    • SHA2:
      • SHA-2: 3
      • SHA256: 5
      • SHA384: 2
      • SHA512: 2
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-2: 2
      • SHA-224: 1
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
  • KEX:
    • Key exchange: 1
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 21
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 20
    • RNG: 10
  • TRNG:
    • TRNG: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CCM:
    • CCM: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
pdf_data/st_keywords/crypto_library
  • Infineon:
    • v1.02.013: 3
pdf_data/st_keywords/side_channel_analysis
  • other:
    • cold boot: 1
  • FI:
    • Malfunction: 3
    • malfunction: 4
    • physical tampering: 1
  • SCA:
    • DPA: 3
    • Leak-Inherent: 2
    • SPA: 1
    • physical probing: 3
    • timing attacks: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS PUB 180-2: 2
    • FIPS PUB 197: 1
  • RFC:
    • RFC 2104: 1
  • X509:
    • X.509: 4
  • BSI:
    • AIS20: 2
    • AIS36: 2
  • FIPS:
    • FIPS 186-3: 3
    • FIPS PUB 140-2: 1
    • FIPS PUB 180-4: 1
    • FIPS PUB 197: 1
    • FIPS140: 2
    • FIPS180-4: 2
    • FIPS197: 5
  • ICAO:
    • ICAO: 3
  • RFC:
    • RFC 5639: 3
  • SCP:
    • SCP02: 5
    • SCP03: 4
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 1
  • JavaCard:
    • Java Card 2.2.2: 3
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.security: 3
  • javacardx:
    • javacardx.crypto: 2
    • javacardx.security: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are: 1
    • out of scope: 2
pdf_data/st_metadata
  • /CreationDate: D:20180612075934+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20180612080157+09'00'
  • /Producer: Acrobat Distiller 10.1.16 (Windows)
  • /Subject: Security Target
  • /Title: Dell Color MFP S3845cdn
  • pdf_file_size_bytes: 422531
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 87
  • /CreationDate: D:20160304175418+08'00'
  • /Creator: LaTeX with hyperref package
  • /Producer: MiKTeX-xdvipdfmx (0.7.8)
  • pdf_file_size_bytes: 1236795
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 100
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different