name |
Dell Color MFP S3845cdn Controller ROM Ver. 1.0.31 |
ePass Applet on Sm@rtCafé® Expert 8.0 C2 v1.0 |
category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
NL |
status |
archived |
active |
not_valid_after |
29.03.2023 |
12.12.2028 |
not_valid_before |
29.03.2018 |
12.12.2023 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0593_eimg.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-2300051-01-Cert.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0593_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-2300051-01-CR.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0593_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-2300051-01_STLite%20v2.pdf |
manufacturer |
Dell, Inc. |
Veridos GmbH - Identity Solutions by Giesecke & Devrient and Bundesdruckerei |
manufacturer_web |
https://www.dell.com |
https://www.veridos.com |
security_level |
EAL2 |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
dgst |
6b431a5164a4c478 |
901e89b0e69f416b |
heuristics/cert_id |
JISEC-CC-CRP-C0593 |
NSCIB-CC-2300051-01-CR |
heuristics/cert_lab |
[] |
|
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ALC_DVS.2, ALC_FLR.1, AVA_VAN.5, ATE_DPT.2 |
heuristics/extracted_versions |
1.0.31 |
1.0, 8.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1107-V3-2022, NSCIB-CC-2300005-01-CR |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1107-V3-2022, NSCIB-CC-2300005-01-CR |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0593
- certification_date: 01.03.2018
- claim: EAL2
- enhanced:
- assurance_level: EAL2
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0593_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, network scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Flash Memory Data EncryptionA function to encrypt the document data before the data is stored into the internal eMMC memory. - User AuthenticationA function to identify and authenticate users. This function also allows only owners of document data and system administrators to handle document data stored in the TOE. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Fax Flow SecurityA function to restrict the unpermitted communication between public telephone line and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data.
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Dell Color MFP S3845cdn
- product_type: Multi-Function Device
- report_link: https://www.ipa.go.jp/en/security/c0593_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0593_est.pdf
- toe_version: Controller ROM Ver. 1.0.31
- vendor: Dell Inc.
- expiration_date: 01.04.2023
- supplier: Dell Inc.
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0593_it6625.html
- toe_overseas_name: Dell Color MFP S3845cdnController ROM Ver. 1.0.31
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1107-V3-2022 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1107-V3-2022 |
heuristics/protection_profiles |
{} |
60455fc9564e2545, a33327d40f253f46, b380aabf93b29692 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf |
pdf_data/cert_filename |
c0593_eimg.pdf |
NSCIB-2300051-01-Cert.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- NL:
- NSCIB-2300051-01: 1
- NSCIB-CC-2300051-01: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 1
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL2: 1
- EAL4: 1
- EAL4 augmented: 1
- EAL5: 2
- EAL5 augmented: 2
- EAL7: 1
|
pdf_data/cert_keywords/cc_sar |
|
- ALC:
- ALC_DVS.2: 3
- ALC_FLR: 1
- ALC_FLR.3: 1
- ATE:
- AVA:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
- BrightSight:
- SGS:
- SGS: 1
- SGS Brightsight: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408-1: 2
- ISO/IEC 18045: 4
- ISO/IEC 18045:2008: 1
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20180409142712+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20180409142752+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 413818
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 1
|
- /Author: Microsoft Office User
- /CreationDate: D:20240207150315+00'00'
- /Creator: Microsoft® Word 2021
- /ModDate: D:20240207150315+00'00'
- /Producer: Microsoft® Word 2021
- /Title: NSCIB Certificate
- pdf_file_size_bytes: 72381
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0593_erpt.pdf |
NSCIB-2300051-01-CR.pdf |
pdf_data/report_frontpage |
|
- NL:
- cert_id: NSCIB-CC-2300051-01-CR
- cert_item: ePass Applet on Sm@rtCafé® Expert 8.0 C2 v1.0
- cert_lab: SGS Brightsight B.V.
- developer: Giesecke+Devrient Mobile Security GmbH
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0593-01: 1
- Certification No. C0593: 1
|
- DE:
- BSI-DSZ-CC-1107-: 2
- BSI-DSZ-CC-1107-V3-2022: 2
- NL:
- NSCIB-2300051-01: 1
- NSCIB-CC-2300005-01: 1
- NSCIB-CC-2300051-01-CR: 12
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0055-2009: 1
- BSI-CC-PP-0056-V2-: 1
- BSI-CC-PP-0068-V2-MA-01: 1
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL 5: 2
- EAL4: 2
- EAL4 augmented: 1
- EAL4+: 1
- EAL5: 2
- EAL5 augmented: 2
- EAL5+: 2
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.ADMIN: 1
- A.SECMODE: 1
- A.USER: 1
- T:
- T.COMM_TAP: 2
- T.CONFDATA: 2
- T.CONSUME: 2
- T.DATA_SEC: 2
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 4
|
- BrightSight:
- SGS:
- SGS: 2
- SGS Brightsight: 2
- TUV:
- TÜV Informationstechnik: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- other:
- JIL: 2
- JIL-AAPS: 1
- JIL-AM: 2
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
- X509:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As described: 1
- out of scope: 1
|
- ConfidentialDocument:
- V3-2022, Version 5, 2022-05-11, “ETR for Composition”, TÜV Informationstechnik GmbH (confidential document) [HW-ST] Security Target Lite BSI-DSZ-CC-1107-V3-2022, Version 4.3.1, 2022-05-10, “IFX_CCI_00002Dh: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20180619105647+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20180619105727+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 383511
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 35
|
|
pdf_data/st_filename |
c0593_est.pdf |
NSCIB-2300051-01_STLite v2.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1107-V3-2022: 2
- NL:
- CC-22-0289060: 1
- NSCIB-CC-23-2300005-01-CR: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-CC-PP-0099-V2-2020: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
- EAL 5 augmented: 1
- EAL 6: 1
- EAL 6 augmented: 1
- EAL4: 3
- EAL4 augmented: 1
- EAL5: 5
- EAL5 augmented: 3
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ALC:
- ALC_DVS.2: 9
- ALC_FLR.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 2
- FAU_SAR.2: 8
- FAU_SAR.2.1: 1
- FAU_STG: 1
- FAU_STG.1: 10
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 2
- FCS_COP.1: 10
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 11
- FDP_IFC.1.1: 1
- FDP_IFF: 1
- FDP_IFF.1: 10
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FIA:
- FIA_AFL.1: 16
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU.1: 14
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 9
- FIA_UAU.7.1: 1
- FIA_UIA.1: 1
- FIA_UID.1: 15
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 8
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA: 2
- FMT_MSA.1: 11
- FMT_MSA.1.1: 1
- FMT_MSA.3: 11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 11
- FMT_MTD.1.1: 1
- FMT_SMF.1: 17
- FMT_SMF.1.1: 1
- FMT_SMR.1: 15
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 10
- FPT_STM.1.1: 1
- FPT_TST.1: 8
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 6
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 2
|
- FAU:
- FAU_ARP.1: 1
- FAU_SAS: 3
- FAU_SAS.1: 6
- FAU_SAS.1.1: 1
- FAU_UAU.4: 1
- FCO:
- FCS:
- FCS_CKM: 16
- FCS_CKM.1: 22
- FCS_CKM.1.1: 1
- FCS_CKM.2: 5
- FCS_CKM.3: 1
- FCS_CKM.4: 23
- FCS_CKM.4.1: 1
- FCS_COP: 51
- FCS_COP.1: 32
- FCS_RND.1: 6
- FCS_RND.1.1: 1
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 10
- FDP_ACC.1: 14
- FDP_ACC.1.1: 1
- FDP_ACF: 9
- FDP_ACF.1: 25
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 2
- FDP_IFC.1: 4
- FDP_IFF: 2
- FDP_ITC: 1
- FDP_ITC.1: 11
- FDP_ITC.2: 11
- FDP_RIP: 15
- FDP_RIP.1: 5
- FDP_RIP.1.1: 1
- FDP_ROL: 1
- FDP_SDI.2: 1
- FDP_UCT: 4
- FDP_UCT.1: 6
- FDP_UCT.1.1: 1
- FDP_UIT: 5
- FDP_UIT.1: 5
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 4
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 5
- FIA_API.1: 4
- FIA_API.1.1: 1
- FIA_ATD: 1
- FIA_UAU: 30
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 11
- FIA_UAU.4.1: 1
- FIA_UAU.5: 10
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 8
- FIA_UAU.6.1: 1
- FIA_UID: 10
- FIA_UID.1: 13
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 1
- FMT:
- FMT_LIM: 6
- FMT_LIM.1: 12
- FMT_LIM.1.1: 3
- FMT_LIM.2: 13
- FMT_LIM.2.1: 3
- FMT_MSA: 9
- FMT_MSA.3: 3
- FMT_MTD: 48
- FMT_MTD.1: 18
- FMT_MTD.3: 6
- FMT_MTD.3.1: 1
- FMT_SMF: 5
- FMT_SMF.1: 22
- FMT_SMF.1.1: 1
- FMT_SMR: 12
- FMT_SMR.1: 18
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPR:
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 7
- FPT_EMS.1.1: 1
- FPT_EMS.1.2: 1
- FPT_FLS: 10
- FPT_FLS.1: 11
- FPT_FLS.1.1: 1
- FPT_PHP.3: 8
- FPT_PHP.3.1: 1
- FPT_RCV: 1
- FPT_TDC.1: 1
- FPT_TST: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 9
- FTP_ITC.1: 8
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.ADMIN: 4
- A.SECMODE: 4
- A.USER: 3
- O:
- O.AUDITS: 7
- O.CIPHER: 5
- O.COMM_SEC: 6
- O.FAX_SEC: 6
- O.MANAGE: 8
- O.RESTRICT: 5
- O.USER: 8
- O.VERIFY: 2
- OE:
- OE.ADMIN: 3
- OE.PHYSICAL: 3
- OE.SEC: 7
- OE.USER: 3
- T:
- T.COMM_TAP: 3
- T.CONFDATA: 4
- T.CONSUME: 3
- T.DATA_SEC: 4
|
- A:
- A.APPLET: 1
- A.CAP_FILE: 1
- A.VERIFICATION: 1
- O:
- O.ALARM: 1
- O.ARRAY_VIEWS_CONFID: 1
- O.ARRAY_VIEWS_INTEG: 1
- O.CARD-MANAGEMENT: 1
- O.CIPHER: 1
- O.DELETION: 1
- O.FIREWALL: 1
- O.GLOBAL_ARRAYS_CON: 1
- O.GLOBAL_ARRAYS_INTE: 1
- O.INSTALL: 1
- O.KEY-MNGT: 1
- O.LOAD: 1
- O.NATIVE: 1
- O.OBJ-DELETION: 1
- O.OPERATE: 1
- O.PIN-MNGT: 1
- O.REALLOCATION: 1
- O.RESOURCES: 1
- O.RNG: 1
- O.SCP: 1
- O.SID: 1
- O.TRANSACTION: 1
- OE:
- OE.BAC_PP: 1
- OE.CAP_FILE: 1
- OE.CODE-EVIDENCE: 1
- OE.VERIFICATION: 1
- OT:
- T:
- T.CONFID-APPLI-DATA: 1
- T.CONFID-JCS-CODE: 1
- T.CONFID-JCS-DATA: 1
- T.DELETION: 1
- T.EXE-CODE: 2
- T.INSTALL: 1
- T.INTEG-APPLI-CODE: 2
- T.INTEG-APPLI-DATA: 2
- T.INTEG-JCS-CODE: 1
- T.INTEG-JCS-DATA: 1
- T.NATIVE: 1
- T.OBJ-DELETION: 1
- T.PHYSICAL: 1
- T.RESOURCES: 1
- T.SECURE_DELETION: 1
- T.SID: 2
|
pdf_data/st_keywords/vendor |
|
- GD:
- G+D: 5
- Giesecke+Devrient: 10
- Infineon:
- Infineon: 3
- Infineon Technologies AG: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-2: 3
- SHA256: 5
- SHA384: 2
- SHA512: 2
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 2
- SHA-384: 2
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 2
- P-384: 2
- P-521: 4
- secp256r1: 1
- secp384r1: 1
- secp521r1: 1
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- malfunction: 2
- physical tampering: 5
- SCA:
- physical probing: 2
- side channel: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 8
- EF.DG1: 14
- EF.DG14: 3
- EF.DG15: 1
- EF.DG16: 14
- EF.DG2: 5
- EF.DG3: 11
- EF.DG4: 11
- EF.DG5: 5
- EF.SOD: 12
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS PUB 180-2: 2
- FIPS PUB 197: 1
- RFC:
- X509:
|
- BSI:
- AIS 20: 1
- AIS 31: 1
- AIS20: 6
- AIS31: 2
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- FIPS:
- FIPS 180-2: 1
- FIPS 180-294: 1
- FIPS 197: 1
- FIPS 46-3: 2
- FIPS PUB 197: 2
- FIPS PUB 46-3: 2
- FIPS197: 1
- ICAO:
- ISO:
- ISO/IEC 14888-3: 4
- ISO/IEC 7816-2: 3
- ISO/IEC 9796-2: 1
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- No contradiction to this ST. FDP_IFF.1/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality: 1
- No contradiction to this ST. FDP_RIP.1/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality: 1
- No contradiction to this ST. FDP_RIP.1/TRANSIENT IP_SFR No correspondence. Out of scope (internal Java Card functionality: 1
- No contradiction to this ST. FDP_RIP.1/bArray IP_SFR No correspondence. Out of scope (internal Java Card functionality: 1
- No contradiction to this ST. FIA_UID.1/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality: 1
- No contradiction to this ST. FIA_USB.1/AID IP_SFR No correspondence Out of scope (internal Java Card functionality: 1
- No contradiction to this ST. FMT_MSA.3/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality: 1
- No contradiction to this ST. FMT_MSA.3/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality: 1
- No contradiction to this ST. FMT_MTD.3/JCRE IP_SFR No correspondence Out of scope (internal Java Card functionality: 1
- No contradiction to this ST. FMT_SMR.1/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality: 1
- No contradiction to this ST. FMT_SMR.1/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality: 1
- No contradiction to this ST. FMT_SMR.1/Installer IP_SFR No correspondence Out of scope (internal Java Card func tionality: 1
- 20 of 92 Platform Objective Correspondence in this ST References/Remarks O.SID No correspondence Out of scope. No contradiction tothis ST. O.FIREWALL No correspondence Out of scope. No contradiction tothis ST: 1
- 92 Platform SFR Correspondence in this ST References/Remarks FDP_IFC.2/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_IFF.1/CM IP_SFR No: 1
- ADEL) policy on security aspects outside the runtime. FDP_ACC.2/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality: 1
- ADEL) policy on security aspects outside the runtime. FDP_ACC.2/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_ACF.1/ADEL IP_SFR No: 1
- DRG.3) that can be used directly. FDP_RIP.1/ABORT IP_SFR No correspondence. Out of scope (internal Java Card functionality: 1
- FCS_CKM.1.1/RSA, FCS_CKM.1.1/ECC, FCS_CKM.1.1/3DES, FCS_CKM.1.1/AES) All IP_SFRs No crrespondence. Out of scope. The TOE uses the spe- cific Document Basic Access Key Derivation Algorithm: 1
- FCS_CKM.1.1/RSA, FCS_CKM.1.1/ECC, FCS_CKM.1.1/3DES, FCS_CKM.1.1/AES) All IP_SFRs No crrespondence. Out of scope. The TOE uses the spe- cific Document Basic Access Key Derivation Algorithm. There are no: 1
- FDP_RIP.1/ADEL FDP_RIP.1/ODEL FDP_RIP.1/ABORT) All IP_SFRs FMT_MSA.1/JCRE IP_SFR No correspondence Out of scope (internal Java Card Firewall). No contradiction to this ST. FMT_MSA.1/JCVM IP_SFR No correspondence: 1
- FDP_RIP.1/bArray FDP_RIP.1/KEYS FDP_RIP.1/TRANSIENT No correspondence. Out of scope (internal Java Card Firewall). No contradiction to this ST. 3 Conformance Claims Security Target: 1
- G OT.Data-Integrity No contradiction to this ST. O.ARRAY_VIEWS_CONFID No correspondence Out of scope. No contradiction to this ST. O.ARRAY_VIEWS_INTEG No correspondence Out of scope. No contradiction: 1
- Java Card Firewall). No contradiction to this ST. FMT_MSA.2/FIREWALL- JCVM IP_SFR No correspondence Out of scope (internal Java Card Firewall). The resulting requirements for applets are reflected in the User: 1
- No correspondence Out of scope. No contradiction to this ST. O.CARD-MANAGEMENT No correspondence Out of scope. No contradiction to this ST. OT.SCP.IC OT.Prot_Phys-Tamper The objectives are related. No con-: 1
- O.ALARM No correspondence Out of scope. No contradiction to this ST. O.CIPHER No correspondence Indirectly relevant for the correct: 1
- O.REALLOCATION No correspondence Out of scope. No contradiction to this ST. O.RESOURCES No correspondence Out of scope. No contradiction to this: 1
- O.TRANSACTION No correspondence Out of scope. No contradiction to this ST. O.OBJ-DELETION No correspondence Out of scope. No contradiction to: 1
- Out of scope: 86
- Out of scope (internal Java Card Firewall). The resulting requirements for applets are reflected in the User: 1
- Out of scope (internal Java Card fun tionality). No contradiction to this ST. FIA_USB.1/AID IP_SFR No: 1
- Out of scope (internal Java Card fun tionality). No contradiction to this ST. FMT_MTD.3/JCRE IP_SFR No: 1
- Out of scope (internal Java Card func tionality). No contradiction to this ST. FPT_FLS.1/Installer IP_SFR No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. 3 Conformance Claims Security: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. CMGR Security Functional: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/ADEL IP_SFR No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_UIT.1/CM IP_SFR No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FIA_UID.1/CM IP_SFR No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/ADEL IP_SFR No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/CM IP_SFR No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/ADEL IP_SFR No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/CM IP_SFR No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/ADEL IP_SFR No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/CM IP_SFR No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/ADEL IP_SFR No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/CM IP_SFR No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1/ADEL IP_SFR No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FTP_ITC.1/CM IP_SFR No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. ODELG Security Functional: 1
- Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_RIP.1/KEYS IP_SFR No: 1
- Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_RIP.1/TRANSIENT IP_SFR No: 1
- Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_RIP.1/bArray IP_SFR No: 1
- Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_ROL.1/FIREWALL IP_SFR No: 1
- Out of scope (internal Java Card functionality). No contradiction to this ST. FMT_MTD.1/JCRE IP_SFR No: 1
- Out of scope (internal Java Card functionality). No contradiction to this ST. INSTG Security Functional: 1
- Out of scope (internal Java Virtual Machine). No contradiction to this ST. FDP_RIP.1 (FDP_RIP.1/OBJECTS FDP_RIP: 1
- Platform Threat Correspondence in this ST References/Remarks T.CONFID-APPLI-DATA No correspondence Out of scope. No contradiction to this ST. T.CONFID-JCS-CODE No correspondence Out of scope. No contradiction to: 1
- SFR Correspondence in this ST References/Remarks FPT_RCV.3/Installer IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. ADELG Security Functional: 1
- SID.2 No correspondence Out of scope. No contradiction to this ST. T.EXE-CODE.1 No correspondence Out of scope. No contradiction to this ST. T.EXE-CODE.2 No correspondence Out of scope. No contradiction to this: 1
- ST) Firewall Policy (chapter 8.1.1.1 in platform ST) FDP_ACC.2/FIREWALL IP_SFR No correspondence Out of scope (internal Java Card Firewall. The resulting requirements for applets are reflected in the User: 1
- ST. O.DELETION No correspondence Out of scope. No contradiction to this ST. O.LOAD No correspondence Out of scope. No contradiction to this ST. O: 1
- ST. T.INSTALL No correspondence Out of scope. No contradiction to this ST. T.OBJ-DELETION No correspondence Out of scope. No contradiction to: 1
- ST. T.INTEG-JCS-DATA No correspondence Out of scope. No contradiction to this ST. T.SID.1 No correspondence Out of scope. No contradiction to this ST: 1
- T.DELETION No correspondence Out of scope. No contradiction to this ST. T.SECURE_DELETION No correspondence Out of scope. No contradiction to: 1
- T.INTEG-APPLI-DATA T.Forgery No contradiction to this ST. T.INTEG-APPLI-DATA.LOAD No correspondence Out of scope. No contradiction to this ST. T.INTEG-JCS-CODE No correspondence Out of scope. No contradiction to: 1
- T.Information_Leakage No contradiction to this ST. T.INTEG-APPLI-CODE No correspondence Out of scope. No contradiction to this ST. T.INTEG-APPLI-CODE.LOAD No correspondence Out of scope. No: 1
- T.NATIVE No correspondence Out of scope. No contradiction to this ST. T.RESOURCES No correspondence Out of scope. No contradiction to this: 1
- The objectives are related. No con- tradiction to this ST. O.SCP.SUPPORT No correspondence Out of scope. No contradiction to this 3 Conformance Claims Security Target Lite ePass Applet on Sm@rtCafé®: 1
- chapter 8.1.1.1 in platform ST) FDP_ACC.2/FIREWALL IP_SFR No correspondence Out of scope (internal Java Card Firewall: 1
- chapter 8.1.1.4 in platform ST) FIA_ATD.1/AID IP_SFR No correspondence. Out of scope (internal Java Card fun tionality: 1
- complement Java Card OS mechanisms. No contradiction tothis ST. FPT_TDC.1 IP_SFR No correspondence Out of scope (internal Java Card functionality). No contradiction to this ST. FPT_TST.1 RP_SFR-SERV FPT_TST.1: 1
- defined quality metric (DRG.3) that can be used directly. FDP_RIP.1/ABORT IP_SFR No correspondence. Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_RIP.1/APDU IP_SFR No: 1
- for the TOE and are covered by SFRs in the platform ST. FTP_ITC.1/CMGR IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. SCPG Security Functional: 1
- internal Java Card Firew a l l ). No contradiction to this ST. FMT_SMF.1 IP_SFR No correspondence Out of scope (internal Java Card Firewall: 1
- internal Java Card Firewall). No contradiction to this ST. FMT_MSA.1/JCVM IP_SFR No correspondence Out of scope (internal Java Card Firewall: 1
- internal Java Card Firewall). No contradiction to this ST. FMT_SMR.1 IP_SFR No correspondence Out of scope (internal Java Card Firewall). No contradiction to this ST. Application Programming Interface: 1
- internal Java Virtual Machine). No contradiction to this ST. FDP_IFF.1/JCVM IP_SFR No correspondence Out of scope (internal Java Virtual Machine: 1
- managed within Java Card OS). No contradiction to this ST. FCS_CKM.3 IP_SFR No correspondence Out of scope (managed within Java Card OS: 1
- no corresponding objectives for the TOE of this ST. No contradictions. O.KEY-MNGT No correspondence Out of scope. No contradiction to this ST. O.PIN-MNGT No correspondence Out of scope. No contradiction to this: 1
- of the TOE. No contradic- tion to this ST. FMT_MSA.3/FIREWALL IP_SFR No correspondence Out of scope (internal Java Card Firewall). The resulting requirements for applets are reflected in the User: 1
- of the TOE. No contradic- tion to this ST. FMT_MSA.3/JCVM IP_SFR No correspondence Out of scope (internal Java Card Firew a l l ). No contradiction to this ST. FMT_SMF.1 IP_SFR No correspondence: 1
- of the TOE. No contradiction to this ST. FDP_ACF.1/FIREWALL IP_SFR No correspondence Out of scope (internal Java Card Firewall). The resulting requirements for applets are reflected in the User: 1
- of the TOE. No contradiction to this ST. FDP_IFC.1/JCVM IP_SFR No correspondence Out of scope (internal Java Virtual Machine). No contradiction to this ST. FDP_IFF.1/JCVM IP_SFR No: 1
- or that has been modified after bytecode verification. FCO_NRO.2/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. 3 Conformance Claims Security: 1
- owns the deleted objects by invoking a specific API method. FDP_RIP.1/ODEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1/ODEL RP_SFR-SERV: 1
- start-up. AID Management (chapter 8.1.1.4 in platform ST) FIA_ATD.1/AID IP_SFR No correspondence. Out of scope (internal Java Card fun tionality). No contradiction to this ST. FIA_UID.2/AID IP_SFR No: 1
- this ST. O.NATIVE No correspondence Out of scope. No contradiction to this ST. O.OPERATE No correspondence Out of scope. No contradiction to this ST: 1
- to this ST. FCS_CKM.2 IP_SFR No correspondence Out of scope (managed within Java Card OS). No contradiction to this ST. FCS_CKM.3 IP_SFR No correspondence Out: 1
- which addresses security aspects outside the runtime. FDP_ITC.2/Installer IP_SFR No correspondence Out of scope (internal Java Card functionality). No contradiction to this ST. FMT_SMR.1/Installer IP_SFR No: 1
|
pdf_data/st_metadata |
- /CreationDate: D:20180612075934+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20180612080157+09'00'
- /Producer: Acrobat Distiller 10.1.16 (Windows)
- /Subject: Security Target
- /Title: Dell Color MFP S3845cdn
- pdf_file_size_bytes: 422531
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 87
|
- /Author: G+D / stut
- /CreationDate: D:20231009104359+02'00'
- /Creator: Microsoft® Word für Microsoft 365
- /Keywords: Version 2.0/Status 09.10.2023
- /ModDate: D:20231009104359+02'00'
- /Producer: Microsoft® Word für Microsoft 365
- /Subject: ePass Applet on Sm@rtCafé® Expert 8.0 C2
- /Title: Security Target Lite
- pdf_file_size_bytes: 1276094
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 92
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |