Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Dell Color MFP S3845cdn Controller ROM Ver. 1.0.31
JISEC-CC-CRP-C0593
NXP JCOP 4.5 P71
NSCIB-CC-0313985-CR
name Dell Color MFP S3845cdn Controller ROM Ver. 1.0.31 NXP JCOP 4.5 P71
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP NL
status archived active
not_valid_after 29.03.2023 02.08.2027
not_valid_before 29.03.2018 02.08.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0593_eimg.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-certificate%2022-0313985.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0593_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0313985-CR-1.0.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0593_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0313985-STLite-v1.4.pdf
manufacturer Dell, Inc. NXP Semiconductors
manufacturer_web https://www.dell.com https://www.nxp.com/
security_level EAL2 EAL6+, ASE_TSS.2, ALC_FLR.1
dgst 6b431a5164a4c478 7897b3eb12798698
heuristics/cert_id JISEC-CC-CRP-C0593 NSCIB-CC-0313985-CR
heuristics/cert_lab []
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ALC_FLR.1, AVA_VAN.5, ADV_FSP.4, ASE_TSS.2, AGD_OPE.1, ADV_SPM.1
heuristics/extracted_versions 1.0.31 4.5
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2023/69, ANSSI-CC-2023/68, NSCIB-CC-2200052-01-CR, NSCIB-CC-2200053-01-CR, ANSSI-CC-2023/11, ANSSI-CC-2023/10-R01, NSCIB-CC-2200051-01-CR, ANSSI-CC-2023/12-R01, ANSSI-CC-2023/12, ANSSI-CC-2023/11-R01, ANSSI-CC-2023/67, ANSSI-CC-2023/10
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-1149-2022
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2023/69, NSCIB-CC-2200053-02-CR, ANSSI-CC-2023/11, ANSSI-CC-2023/68, NSCIB-CC-2200053-01-CR, NSCIB-CC-2200052-01-CR, ANSSI-CC-2023/10-R01, NSCIB-CC-2200051-01-CR, ANSSI-CC-2023/12-R01, ANSSI-CC-2023/12, ANSSI-CC-2023/11-R01, ANSSI-CC-2023/67, ANSSI-CC-2023/10
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-1149-2022
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0593
  • certification_date: 01.03.2018
  • claim: EAL2
  • enhanced:
    • assurance_level: EAL2
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0593_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, network scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Flash Memory Data EncryptionA function to encrypt the document data before the data is stored into the internal eMMC memory. - User AuthenticationA function to identify and authenticate users. This function also allows only owners of document data and system administrators to handle document data stored in the TOE. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Fax Flow SecurityA function to restrict the unpermitted communication between public telephone line and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: Dell Color MFP S3845cdn
    • product_type: Multi-Function Device
    • report_link: https://www.ipa.go.jp/en/security/c0593_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0593_est.pdf
    • toe_version: Controller ROM Ver. 1.0.31
    • vendor: Dell Inc.
  • expiration_date: 01.04.2023
  • supplier: Dell Inc.
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0593_it6625.html
  • toe_overseas_name: Dell Color MFP S3845cdnController ROM Ver. 1.0.31
heuristics/st_references/directly_referenced_by {} NSCIB-CC-2200051-01-CR, ANSSI-CC-2023/10, NSCIB-CC-2200052-01-CR, NSCIB-CC-2200053-01-CR
heuristics/st_references/indirectly_referenced_by {} NSCIB-CC-2200051-01-CR, ANSSI-CC-2023/10, NSCIB-CC-2200052-01-CR, NSCIB-CC-2200053-01-CR
heuristics/protection_profiles {} 94167fd161e87d71
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099b_pdf.pdf
pdf_data/cert_filename c0593_eimg.pdf NSCIB-certificate 22-0313985.pdf
pdf_data/cert_keywords/cc_cert_id
  • NL:
    • CC-22-0313985: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0099-2017: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
  • EAL:
    • EAL6: 1
    • EAL6 augmented: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 1
  • ASE:
    • ASE_TSS.2: 1
pdf_data/cert_keywords/cc_claims
  • R:
    • R.L: 1
pdf_data/cert_keywords/vendor
  • NXP:
    • NXP Semiconductors: 1
pdf_data/cert_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 1
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
pdf_data/cert_keywords/os_name
  • JCOP:
    • JCOP 4: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-1: 1
    • ISO/IEC 15408-2: 1
    • ISO/IEC 15408-3: 1
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20180409142712+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20180409142752+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 413818
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 1
  • /CreationDate: D:20220817153550+01'00'
  • /Creator: NL-ARN-SAL-C
  • /ModDate: D:20220818080356+02'00'
  • /Producer: KONICA MINOLTA bizhub C300i
  • pdf_file_size_bytes: 130375
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename c0593_erpt.pdf NSCIB-CC-0313985-CR-1.0.pdf
pdf_data/report_frontpage
  • NL:
  • NL:
    • cert_id: NSCIB-CC-0313985-CR
    • cert_item: JCOP 4.5 P71
    • cert_lab: SGS Brightsight B.V.
    • developer: NXP Semiconductors Germany GmbH
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0593-01: 1
    • Certification No. C0593: 1
  • DE:
    • BSI-DSZ-CC-1149-2022: 1
  • NL:
    • NSCIB-CC-0313985-CR: 14
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0099-2017: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
  • EAL:
    • EAL 6: 1
    • EAL 6 augmented: 1
    • EAL4: 1
    • EAL6: 1
    • EAL6 augmented: 1
    • EAL6+: 3
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_IMP: 1
  • ALC:
    • ALC_FLR.1: 2
  • ASE:
    • ASE_TSS.2: 2
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 1
    • A.SECMODE: 1
    • A.USER: 1
  • T:
    • T.COMM_TAP: 2
    • T.CONFDATA: 2
    • T.CONSUME: 2
    • T.DATA_SEC: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 13
  • NXP:
    • NXP: 6
    • NXP Semiconductors: 4
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 4
  • BrightSight:
    • Brightsight: 2
  • SGS:
    • SGS: 2
    • SGS Brightsight: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • 3DES: 1
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CBC-MAC: 5
      • CMAC: 2
      • HMAC: 3
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 6
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • Diffie-Hellman: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 4
    • SHA2:
      • SHA-256: 1
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-224: 1
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 6
  • TLS:
    • TLS:
      • TLS: 2
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CCM:
    • CCM: 2
  • ECB:
    • ECB: 3
pdf_data/report_keywords/crypto_library
  • Generic:
    • Crypto Library 1.1.2: 1
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • side-channel: 1
  • other:
    • JIL: 2
    • JIL-AAPS: 2
    • JIL-AM: 3
pdf_data/report_keywords/os_name
  • JCOP:
    • JCOP 4: 18
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • X509:
    • X.509: 1
  • BSI:
    • AIS 20: 2
    • AIS20: 1
  • ISO:
    • ISO/IEC 14443-4: 1
  • RFC:
    • RFC-5869: 3
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As described: 1
    • out of scope: 1
  • OutOfScope:
    • and protocols was not rated in the course of this evaluation because they are considered to be out of scope as there are no security claims: KoreanSEED AES in Counter with CBC-MAC mode (AES CCM) : 1
    • out of scope: 1
pdf_data/report_metadata
  • /CreationDate: D:20180619105647+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20180619105727+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 383511
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 35
pdf_data/st_filename c0593_est.pdf NSCIB-CC-0313985-STLite-v1.4.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1149: 2
  • NL:
    • NSCIB-CC-0313985: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-CC-PP-0099-2017: 2
    • BSI-PP-0055: 1
    • BSI-PP-0084-2014: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 3
  • EAL:
    • EAL5: 1
    • EAL5 augmented: 1
    • EAL6: 8
    • EAL6 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_FSP.4: 2
    • ADV_SPM.1: 4
  • AGD:
    • AGD_OPE.1: 2
  • ALC:
    • ALC_FLR.1: 4
  • ASE:
    • ASE_CCL: 2
    • ASE_ECD: 2
    • ASE_INT: 2
    • ASE_REQ: 2
    • ASE_SPD: 5
    • ASE_TSS: 2
    • ASE_TSS.2: 4
  • AVA:
    • AVA_VAN.5: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 2
    • FAU_SAR.2: 8
    • FAU_SAR.2.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 10
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 2
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 12
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 10
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 11
    • FDP_IFC.1.1: 1
    • FDP_IFF: 1
    • FDP_IFF.1: 10
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
  • FIA:
    • FIA_AFL.1: 16
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 14
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 9
    • FIA_UAU.7.1: 1
    • FIA_UIA.1: 1
    • FIA_UID.1: 15
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 8
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MSA: 2
    • FMT_MSA.1: 11
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 11
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 17
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 15
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
    • FPT_TST.1: 8
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 6
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 2
  • FAU:
    • FAU_ARP.1: 16
    • FAU_GEN: 1
    • FAU_SAA.1: 3
    • FAU_SAS: 7
    • FAU_SAS.1: 9
    • FAU_SAS.1.1: 1
  • FCO:
    • FCO_NRO: 1
    • FCO_NRO.1: 1
    • FCO_NRO.2: 6
    • FCO_NRO.2.1: 1
    • FCO_NRO.2.2: 1
    • FCO_NRO.2.3: 1
  • FCS:
    • FCS_CKM.1: 17
    • FCS_CKM.1.1: 8
    • FCS_CKM.2: 11
    • FCS_CKM.3: 9
    • FCS_CKM.4: 15
    • FCS_CKM.4.1: 2
    • FCS_COP.1: 8
    • FCS_COP.1.1: 24
    • FCS_RNG: 1
    • FCS_RNG.1: 10
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC.1: 57
    • FDP_ACC.1.1: 1
    • FDP_ACC.2: 21
    • FDP_ACC.2.1: 4
    • FDP_ACC.2.2: 4
    • FDP_ACF: 1
    • FDP_ACF.1: 33
    • FDP_ACF.1.1: 5
    • FDP_ACF.1.2: 5
    • FDP_ACF.1.3: 5
    • FDP_ACF.1.4: 6
    • FDP_ACF.2: 2
    • FDP_IFC: 2
    • FDP_IFC.1: 53
    • FDP_IFC.1.1: 2
    • FDP_IFC.2: 22
    • FDP_IFC.2.1: 3
    • FDP_IFC.2.2: 3
    • FDP_IFF: 2
    • FDP_IFF.1: 40
    • FDP_IFF.1.1: 5
    • FDP_IFF.1.2: 6
    • FDP_IFF.1.3: 5
    • FDP_IFF.1.4: 6
    • FDP_IFF.1.5: 5
    • FDP_ITC: 1
    • FDP_ITC.1: 8
    • FDP_ITC.2: 15
    • FDP_ITC.2.1: 1
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 1
    • FDP_RIP.1: 36
    • FDP_RIP.1.1: 10
    • FDP_ROL.1: 9
    • FDP_ROL.1.1: 2
    • FDP_ROL.1.2: 2
    • FDP_SDI.1: 2
    • FDP_SDI.2: 10
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
    • FDP_UIT: 1
    • FDP_UIT.1: 5
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL.1: 19
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 14
    • FIA_ATD.1.1: 2
    • FIA_UAU.1: 18
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4: 10
    • FIA_UAU.4.1: 2
    • FIA_UID: 1
    • FIA_UID.1: 55
    • FIA_UID.1.1: 4
    • FIA_UID.1.2: 4
    • FIA_UID.2: 4
    • FIA_UID.2.1: 1
    • FIA_USB.1: 8
    • FIA_USB.1.1: 2
    • FIA_USB.1.2: 2
    • FIA_USB.1.3: 2
  • FMT:
    • FMT_MSA: 5
    • FMT_MSA.1: 75
    • FMT_MSA.1.1: 10
    • FMT_MSA.2: 3
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 76
    • FMT_MSA.3.1: 11
    • FMT_MSA.3.2: 10
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 3
    • FMT_MTD.3.1: 1
    • FMT_REV: 1
    • FMT_SMF: 3
    • FMT_SMF.1: 73
    • FMT_SMF.1.1: 9
    • FMT_SMR: 2
    • FMT_SMR.1: 90
    • FMT_SMR.1.1: 8
    • FMT_SMR.1.2: 8
  • FPR:
    • FPR_UNO.1: 8
  • FPT:
    • FPT_FLS.1: 43
    • FPT_FLS.1.1: 7
    • FPT_PHP.3: 7
    • FPT_RCV.2: 1
    • FPT_RCV.3: 4
    • FPT_RCV.3.1: 1
    • FPT_RCV.3.2: 1
    • FPT_RCV.3.3: 1
    • FPT_RCV.3.4: 1
    • FPT_TDC.1: 7
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC.1: 11
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 3
    • A.ADMIN: 4
    • A.SECMODE: 4
    • A.USER: 3
  • O:
    • O.AUDITS: 7
    • O.CIPHER: 5
    • O.COMM_SEC: 6
    • O.FAX_SEC: 6
    • O.MANAGE: 8
    • O.RESTRICT: 5
    • O.USER: 8
    • O.VERIFY: 2
  • OE:
    • OE.ADMIN: 3
    • OE.PHYSICAL: 3
    • OE.SEC: 7
    • OE.USER: 3
  • T:
    • T.COMM_TAP: 3
    • T.CONFDATA: 4
    • T.CONSUME: 3
    • T.DATA_SEC: 4
  • A:
    • A.APPLET: 3
    • A.APPS-PROVIDER: 6
    • A.DELETION: 1
    • A.PROCESS-SEC-IC: 5
    • A.USE_: 1
    • A.USE_DIAG: 5
    • A.USE_KEYS: 6
    • A.VERIFICATION: 3
    • A.VERIFICATION-AUTHORITY: 6
  • D:
    • D.API_: 1
    • D.API_DATA: 2
    • D.APP_: 2
    • D.APP_CODE: 6
    • D.APP_C_: 1
    • D.APP_C_DATA: 4
    • D.APP_I_: 2
    • D.APP_I_DATA: 4
    • D.APP_KEYS: 10
    • D.APSD_KEYS: 3
    • D.ATTACK_COUNTER: 1
    • D.BIO: 9
    • D.CARD_MNGT_DATA: 3
    • D.CONFIG_ITEM: 8
    • D.CRYPTO: 6
    • D.ISD_KEYS: 4
    • D.JCS_CODE: 7
    • D.JCS_DATA: 9
    • D.MODULE_: 1
    • D.MODULE_CODE: 5
    • D.MODULE_DATA: 2
    • D.PIN: 11
    • D.SEC_DATA: 6
    • D.TOE_: 1
    • D.TOE_IDENTIFIER: 2
    • D.UPDATE_: 1
    • D.UPDATE_IMAGE: 22
    • D.VASD_KEYS: 3
  • O:
    • O.APPLET: 17
    • O.CODE_MODULE: 16
    • O.CODE_PKG: 17
    • O.DELETION: 4
    • O.INSTALL: 3
    • O.JAVAOBJECT: 62
    • O.LOAD: 5
    • O.NON_SB_SFR: 4
    • O.REMOTE: 1
    • O.RNG: 1
    • O.SB_SFR: 4
  • OE:
    • OE.APPLET: 9
    • OE.APPS-PROVIDER: 4
    • OE.CARD-MANAGEMENT: 3
    • OE.CODE-: 1
    • OE.CODE-EVIDENCE: 18
    • OE.CONFID-UPDATE-IMAGE: 5
    • OE.KEY-CHANGE: 5
    • OE.PROCESS_SEC_IC: 4
    • OE.SCP: 12
    • OE.SECURITY-DOMAINS: 4
    • OE.USE_DIAG: 5
    • OE.USE_KEYS: 5
    • OE.VERIFICATION: 28
    • OE.VERIFICATION-AUTHORITY: 4
  • OP:
    • OP.ARRAY_AASTORE: 3
    • OP.ARRAY_ACCESS: 4
    • OP.ARRAY_LENGTH: 4
    • OP.CREATE: 6
    • OP.DELETE_APPLET: 4
    • OP.DELETE_MODULE: 2
    • OP.DELETE_PCKG: 3
    • OP.DELETE_PCKG_APPLET: 3
    • OP.INSTANCE_FIELD: 3
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 6
    • OP.INVOKE_MODULE: 4
    • OP.JAVA: 5
    • OP.MODIFY_CONFIG_ITEM: 1
    • OP.PUT: 4
    • OP.PUTFIELD: 1
    • OP.PUTSTATIC: 1
    • OP.READ_CONFIG_ITEM: 1
    • OP.SB_ACCESS: 4
    • OP.SB_ACCESS_SFR: 4
    • OP.THROW: 5
    • OP.TRIGGER_UPDATE: 3
    • OP.TYPE_ACCESS: 5
    • OP.USE_CONFIG_ITEM: 1
  • OSP:
    • OSP.KEY-CHANGE: 5
    • OSP.PROCESS-TOE: 5
    • OSP.SECURE-BOX: 5
    • OSP.SECURITY-DOMAINS: 5
    • OSP.VERIFICATION: 3
  • OT:
    • OT.ALARM: 14
    • OT.APPLI-AUTH: 10
    • OT.AUTH-LOAD-UPDATE-IMAGE: 1
    • OT.AUTH-LOADUPDATE-: 1
    • OT.AUTH-UPDATE-IMAGE: 1
    • OT.BIO-MNGT: 2
    • OT.CARD-: 2
    • OT.CARD-CONFIGURATION: 4
    • OT.CARD-MANAGEMENT: 32
    • OT.CIPHER: 5
    • OT.COMM_AUTH: 6
    • OT.COMM_CONFIDENTIALITY: 4
    • OT.COMM_INTEGRITY: 4
    • OT.CONFID-UPDATE-IMAGE: 6
    • OT.DOMAIN-RIGHTS: 6
    • OT.FIREWALL: 8
    • OT.GLOBAL_ARRAYS_CONFID: 4
    • OT.GLOBAL_ARRAYS_INTEG: 3
    • OT.IDENTIFICATION: 5
    • OT.KEY-MNGT: 3
    • OT.NATIVE: 8
    • OT.OBJ-DELETION: 2
    • OT.OPERATE: 30
    • OT.PIN-MNGT: 5
    • OT.REALLOCATION: 4
    • OT.RESOURCES: 3
    • OT.RND: 8
    • OT.SCP: 46
    • OT.SECURE_ACTIVATION_: 1
    • OT.SECURE_ACTIVATION_ADDITIONAL_: 1
    • OT.SECURE_ACTIVATION_ADDITIONAL_CODE: 2
    • OT.SECURE_AC_ACTIVATION: 3
    • OT.SECURE_LOAD_ACODE: 22
    • OT.SEC_BOX_FW: 6
    • OT.SENSITIVE_RESULTS_INTEG: 3
    • OT.SID: 12
    • OT.SID_MODULE: 11
    • OT.TOE_IDENTIFICATION: 4
    • OT.TRANSACTION: 3
  • R:
    • R.JAVA: 10
  • SA:
    • SA.ALARM: 2
    • SA.CARD-MANAGEM: 1
    • SA.CIPHER: 2
    • SA.CONFID-APPLI-D: 1
    • SA.CONFID-APPLI-DATA: 1
    • SA.CONFID-JCS-CO: 1
    • SA.CONFID-JCS-CODE: 1
    • SA.CONFID-JCS-DA: 1
    • SA.CONFID-JCS-DATA: 1
    • SA.CONFID-UPDATE: 1
    • SA.CONFID-UPDATE-IMAGE: 1
    • SA.CONFIG-APPLET: 1
    • SA.DELETION: 1
    • SA.EXE-: 1
    • SA.EXE-APPLI-CODE: 4
    • SA.EXE-JCS-: 1
    • SA.EXE-JCS-CODE: 2
    • SA.FIREWALL: 2
    • SA.INSTALL: 2
    • SA.INTEG-APPLI-CO: 1
    • SA.INTEG-APPLI-CODE: 2
    • SA.INTEG-APPLI-DA: 1
    • SA.INTEG-APPLI-DATA: 2
    • SA.INTEG-APPLI-DATA-PHYS: 1
    • SA.INTEG-JCS-CODE: 3
    • SA.INTEG-JCS-DATA: 1
    • SA.INTEG-UPDATE-: 1
    • SA.INTEG-UPDATE-I: 1
    • SA.INTEG-UPDATE-IMAGE: 1
    • SA.KEY-MNGT: 2
    • SA.MODULAR-: 1
    • SA.MODULAR-DESIG: 1
    • SA.MODULAR-DESIGN: 4
    • SA.MODULAR-INVOC: 1
    • SA.MODULE-INVOCATION: 3
    • SA.NATIVE: 3
    • SA.OBJ-DELETION: 3
    • SA.OPERATE: 2
    • SA.OSU: 1
    • SA.PIN-MNGT: 2
    • SA.RESOURCES: 3
    • SA.SCP: 5
    • SA.SID: 3
    • SA.TRANSACTION: 2
    • SA.VERIFICATION: 2
  • T:
    • T.COM_EXPLOIT: 4
    • T.CONFID-APPLI-DATA: 5
    • T.CONFID-JCS-CODE: 3
    • T.CONFID-JCS-DATA: 3
    • T.CONFID-UPDATE-IMAGE: 6
    • T.CONFIG: 4
    • T.EXE-CODE: 8
    • T.EXE-CODE-REMOTE: 1
    • T.INTEG-APPLI-: 1
    • T.INTEG-APPLI-CODE: 6
    • T.INTEG-APPLI-DATA: 10
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 3
    • T.INTEG-UPDATE-IMAGE: 6
    • T.INTERRUPT-OSU: 4
    • T.LIFE_CYCLE: 4
    • T.MODULE_EXEC: 4
    • T.MODULE_REPLACEMENT: 4
    • T.NATIVE: 2
    • T.OBJ-DELETION: 2
    • T.OS_OPERATE: 4
    • T.PHYSICAL: 2
    • T.RESOURCES: 2
    • T.RND: 2
    • T.SEC_BOX_BORDER: 4
    • T.SID: 9
    • T.UNAUTH-LOAD-UPDATE-IMAGE: 1
    • T.UNAUTH-UPDATE-IMAGE: 5
    • T.UNAUTHORIZED_CARD_MNGT: 4
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 193
    • NXP Semiconductors: 29
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 12
  • DES:
    • 3DES:
      • Triple-DES: 1
  • constructions:
    • MAC:
      • HMAC: 1
  • AES_competition:
    • AES:
      • AES: 21
  • DES:
    • 3DES:
      • 3DES: 3
      • Triple-DES: 1
      • TripleDES: 1
    • DES:
      • DES: 4
  • constructions:
    • MAC:
      • CBC-MAC: 6
      • CMAC: 3
      • HMAC: 6
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 14
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 7
  • FF:
    • DH:
      • Diffie-Hellman: 4
  • RSA:
    • RSA-CRT: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
      • SHA1: 4
    • SHA2:
      • SHA-2: 3
      • SHA256: 5
      • SHA384: 2
      • SHA512: 2
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-224: 1
      • SHA-256: 2
      • SHA-384: 1
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 8
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 21
  • PACE:
    • PACE: 4
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 11
    • RNG: 18
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 5
  • CCM:
    • CCM: 43
  • ECB:
    • ECB: 2
pdf_data/st_keywords/crypto_engine
  • SmartMX:
    • SmartMX3: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
pdf_data/st_keywords/side_channel_analysis
  • other:
    • cold boot: 1
  • FI:
    • DFA: 3
    • Fault Injection: 2
    • Physical Tampering: 3
    • malfunction: 3
    • physical tampering: 1
  • SCA:
    • DPA: 6
    • SPA: 2
    • physical probing: 3
    • side channel: 2
    • side-channel: 1
    • timing attack: 1
    • timing attacks: 1
pdf_data/st_keywords/os_name
  • JCOP:
    • JCOP 4: 469
    • JCOP4: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS PUB 180-2: 2
    • FIPS PUB 197: 1
  • RFC:
    • RFC 2104: 1
  • X509:
    • X.509: 4
  • BSI:
    • AIS 20: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 186-4: 2
    • FIPS 197: 2
  • ICAO:
    • ICAO: 4
  • ISO:
    • ISO/IEC 14443-4: 1
    • ISO/IEC 14888-3: 1
  • NIST:
    • NIST SP 800-38A: 2
  • SCP:
    • SCP01: 1
    • SCP02: 1
    • SCP03: 1
pdf_data/st_keywords/javacard_api_const
  • ALG:
    • AES:
      • ALG_AES_BLOCK_128_: 1
      • ALG_AES_BLOCK_128_CBC_NOPAD: 1
      • ALG_AES_BLOCK_128_CBC_NOPAD_STANDARD: 1
      • ALG_AES_CBC_ISO9797_M1: 1
      • ALG_AES_CBC_ISO9797_M2: 1
      • ALG_AES_CMAC16: 1
      • ALG_AES_CMAC16_STANDARD: 1
      • ALG_AES_CMAC8: 1
      • ALG_AES_CMAC_128: 1
      • ALG_AES_CTR: 1
      • ALG_AES_ECB_ISO9797_M1: 1
      • ALG_AES_ECB_ISO9797_M2: 1
      • ALG_AES_MAC_128_ISO9797_1_M2_ALG3: 1
      • ALG_AES_MAC_128_NOPAD: 1
    • DES:
      • ALG_DES_CBC_ISO9797_M1: 1
      • ALG_DES_CBC_NOPAD: 1
      • ALG_DES_ECB_ISO9797_M1: 1
      • ALG_DES_ECB_ISO9797_M2: 1
      • ALG_DES_ECB_NOPAD: 1
      • ALG_DES_MAC4_ISO9797_1_M1_ALG3: 1
      • ALG_DES_MAC4_ISO9797_1_M2_ALG3: 1
      • ALG_DES_MAC4_ISO9797_M1: 1
      • ALG_DES_MAC4_ISO9797_M2: 1
      • ALG_DES_MAC8_: 1
      • ALG_DES_MAC8_ISO9797_1_M2_ALG3: 1
      • ALG_DES_MAC8_ISO9797_M1: 1
      • ALG_DES_MAC8_ISO9797_M2: 1
      • ALG_DES_MAC8_NOPAD: 1
    • EC:
      • ALG_EC_PACE_GM: 1
      • ALG_EC_SVDP_: 1
      • ALG_EC_SVDP_DH: 1
      • ALG_EC_SVDP_DHC: 1
      • ALG_EC_SVDP_DHC_PACE: 1
      • ALG_EC_SVDP_DHC_PLAIN: 1
      • ALG_EC_SVDP_DH_PLAIN: 1
      • ALG_EC_SVDP_DH_PLAIN_XY: 1
    • ECDSA:
      • ALG_ECDSA_SHA_: 1
      • ALG_ECDSA_SHA_256: 2
      • ALG_ECDSA_SHA_384: 1
      • ALG_ECDSA_SHA_512: 1
    • RSA:
      • ALG_RSA_NOPAD: 1
      • ALG_RSA_PKCS1: 1
      • ALG_RSA_PKCS1_OAEP: 1
      • ALG_RSA_SHA_: 1
      • ALG_RSA_SHA_224_PKCS1_PSS: 1
      • ALG_RSA_SHA_256_ISO9796: 1
      • ALG_RSA_SHA_256_PKCS1: 1
      • ALG_RSA_SHA_256_PKCS1_PSS: 1
      • ALG_RSA_SHA_384_PKCS1: 1
      • ALG_RSA_SHA_512_PKCS1: 1
      • ALG_RSA_SHA_512_PKCS1_PSS: 1
      • ALG_RSA_SHA_ISO9796: 2
      • ALG_RSA_SHA_ISO9796_MR: 1
      • ALG_RSA_SHA_PKCS1: 2
      • ALG_RSA_SHA_PKCS1_PSS: 1
    • SHA:
      • ALG_SHA_224: 2
      • ALG_SHA_256: 2
      • ALG_SHA_384: 3
      • ALG_SHA_512: 2
  • misc:
    • LENGTH_AES_128: 4
    • LENGTH_AES_192: 4
    • LENGTH_AES_256: 1
    • LENGTH_DES3_2KEY: 2
    • LENGTH_DES3_3KEY: 2
    • LENGTH_EC_: 1
    • LENGTH_EC_FP_160: 4
    • LENGTH_EC_FP_192: 3
    • LENGTH_EC_FP_224: 3
    • LENGTH_EC_FP_256: 5
    • LENGTH_EC_FP_320: 4
    • LENGTH_EC_FP_384: 4
    • LENGTH_EC_FP_521: 4
    • LENGTH_RSA_1024: 1
    • LENGTH_RSA_2048: 2
    • LENGTH_RSA_4096: 2
    • LENGTH_SHA: 1
    • LENGTH_SHA_224: 1
    • LENGTH_SHA_256: 1
    • LENGTH_SHA_384: 1
    • LENGTH_SHA_512: 1
    • PAD_ISO9796: 1
    • PAD_ISO9796_MR: 1
    • PAD_PKCS1_PSS: 1
    • SIG_CIPHER_ECDSA: 1
    • SIG_CIPHER_ECDSA_PLAIN: 1
    • SIG_CIPHER_RSA: 1
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • com:
    • com.nxp.id.jcopx.security: 2
  • java:
    • java.lang: 1
  • javacard:
    • javacard.framework: 2
    • javacard.framework.applet: 1
    • javacard.security: 1
  • javacardx:
    • javacardx.biometry: 1
pdf_data/st_metadata
  • /CreationDate: D:20180612075934+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20180612080157+09'00'
  • /Producer: Acrobat Distiller 10.1.16 (Windows)
  • /Subject: Security Target
  • /Title: Dell Color MFP S3845cdn
  • pdf_file_size_bytes: 422531
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 87
  • /Author: NXP B.V.
  • /CreationDate: D:20220719162348+01'00'
  • /Creator: DITA Open Toolkit 3.3.1
  • /Keywords: ASE, JCOP, Common Criteria, EAL6 augmented
  • /ModDate: D:20220719162418+01'00'
  • /PDFVersion: 1.4
  • /Producer: Apache FOP Version 2.3
  • /Subject: JCOP 4.5 P71
  • /Title: Security Target Lite for JCOP 4.5 P71
  • pdf_file_size_bytes: 1425018
  • pdf_hyperlinks: http://www.keylength.com/, https://www.docstore.nxp.com
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 151
state/cert/convert_garbage False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different