name |
bizhub C754e / bizhub C654e PKI Card System Control Software. Version:A2X00Y0-0100-G00-80pki |
STARCOS 3.2 QES Version 1.0 |
category |
Other Devices and Systems |
Products for Digital Signatures |
scheme |
JP |
DE |
status |
archived |
archived |
not_valid_after |
05.12.2018 |
01.09.2019 |
not_valid_before |
28.11.2013 |
02.04.2008 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0415_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080527_0407a.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0415_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080527_0407b.pdf |
manufacturer |
KONICA MINOLTA, INC. |
G+D Mobile Security GmbH |
manufacturer_web |
https://www.konicaminolta.com/index.html |
https://www.gi-de.com/de/de/mobile-security/ |
security_level |
EAL3 |
AVA_MSU.3, EAL4+, AVA_VLA.4 |
dgst |
6c9106df3d774631 |
0e57b8c8bb3e9fe3 |
heuristics/cert_id |
JISEC-CC-CRP-C0415 |
BSI-DSZ-CC-0407-2008 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
cpe:2.3:h:konicaminolta:bizhub_c754:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c754e:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c654:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c654e:-:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ALC_TAT.1, AVA_VLA.4, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_SOF.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_LCD.1, ATE_DPT.1, ADV_FSP.2, ADV_SPM.1, AVA_MSU.3, ADV_IMP.1 |
heuristics/extracted_versions |
0100 |
3.2, 1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0406-2007, BSI-DSZ-CC-0322-2005 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0406-2007, BSI-DSZ-CC-0223-2003 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0415
- certification_date: 01.11.2013
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0415_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions.: - Encryption Print Function: The function that receives the encrypted print data and can print the print data only with a right IC card. - S/MIME Encryption Function: The function to encrypt an image data when transmitting it by e-mail. - Digital Signature Function: The function to add the digital signature by using the function of IC card when transmitting an image data by e-mail. - HDD Encryption Function: The function to encrypt the image data written in HDD by using the function of ASIC. - All Area Overwrite Deletion Function: The function that deletes data area including the image data of HDD completely by deletion method compliant with various overwrite deletion standards. - Fax Unit Control Function: The function to prevent accessing the internal network using FAX as steppingstone.
- evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
- product: bizhub C754e / bizhub C654e PKI Card System Control Software
- product_type: Control Software for digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0415_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0415_est.pdf
- toe_version: A2X00Y0-0100-G00-80pki
- vendor: KONICA MINOLTA,INC.
- expiration_date: 01.12.2018
- supplier: KONICA MINOLTA, INC.
- toe_japan_name: bizhub C754e / bizhub C654e PKI Card System Control SoftwareA2X00Y0-0100-G00-80pki
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0415_it3462.html
- toe_overseas_name: bizhub C754e / bizhub C654e PKI Card System Control SoftwareA2X00Y0-0100-G00-80pki
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0322-2005 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0322-2005 |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0415_erpt.pdf |
20080527_0407a.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0407-2008
- cert_item: STARCOS 3.2 QES Version 1.0
- cert_lab: BSI
- developer: Giesecke & Devrient GmbH Certification Report V1.0 ZS-01-01-F-326 V4.1 BSI -
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0415-01: 1
- Certification No. C0415: 1
|
- DE:
- BSI-DSZ-CC-0322-2005: 1
- BSI-DSZ-CC-0406: 1
- BSI-DSZ-CC-0406-2007: 1
- BSI-DSZ-CC-0407-2008: 20
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 4: 8
- EAL 4 augmented: 3
- EAL 4+: 1
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 6
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 2
- ACM_CAP: 2
- ACM_SCP: 2
- ADO:
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_TAT: 2
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 3
- ATE_IND: 4
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_VLA: 5
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.IC-CARD: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVICE: 1
- T:
- T.BRING-OUT-STORAGE: 2
- T.DISCARD-MFP: 2
|
|
pdf_data/report_keywords/vendor |
|
- GD:
- G&D: 7
- Giesecke & Devrient: 11
- Infineon:
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 5
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
- RSA:
- RSA 1024: 1
- RSA 1280: 1
- RSA 1536: 1
- RSA 2048: 2
- RSA2048: 1
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- RIPEMD:
- SHA:
- SHA1:
- SHA2:
- SHA-224: 3
- SHA-256: 3
- SHA-384: 3
- SHA-512: 2
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- malfunction: 1
- physical tampering: 1
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
|
- BSI:
- AIS 20: 1
- AIS 25: 2
- AIS 26: 2
- AIS 31: 1
- AIS 32: 1
- AIS 34: 3
- AIS 35: 2
- AIS 36: 4
- AIS 38: 1
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- or through the network. The TOE provides the protection function for the disclosure of the highly confidential documents stored in MFP. This TOE does not support the audit log function. Moreover, against the danger of: 1
|
- ConfidentialDocument:
- BSI-DSZ-0407-2008, Version 1.9, Date 19.11.2007, Security Target of STARCOS 3.2 QES V1.0, G&D (confidential document) [7] Security Target BSI-DSZ-0407-2008, Version 1.0, Date 19.11.2007, Security Target Lite STARCOS: 1
- Evaluation Technical Report (ETR), Evaluation Body for IT Security of TÜV Informationstechnik GmbH (confidential document) B-16 BSI-DSZ-CC-0407-2008 Certification Report [9] Protection Profile Secure Signature Creation: 1
- Technical Report (ETR-LITE), Evaluation Body for IT Security of TÜV Informationstechnik GmbH (confidential document) [11] Certification Report BSI-DSZ-CC-0322-2005 for Infineon Smart Card IC (Security Controller: 1
- list for the TOE, Version 1.5, Date 19.11.2007, Configuration List STARCOS 3.2 eGK, G&D (confidential document) [13] Administrator guidance STARCOS 3.2 eGK; STARCOS 3.2 QES V1.0, Version 0.9/Status 02.07.07 [14: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20140212173321+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20140212173353+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 359141
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 34
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Company: BSI, Postfach 200363, 53133 Bonn
- /CreationDate: D:20080408134512+02'00'
- /Creator: Acrobat PDFMaker 8.1 für Word
- /Keywords: "Common Criteria, Certification, Zertifizierung, Signaturkarte, qualifizierte elektronische Signatur, electronic signature, QES"
- /ModDate: D:20080408144908+02'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /SourceModified: D:20080408091300
- /Title: Certification Report BSI-DSZ-CC-0407-2008
- pdf_file_size_bytes: 278952
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
pdf_data/st_filename |
c0415_est.pdf |
20080527_0407b.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0322-2005: 2
- BSI-DSZ-CC-0322-2005-MA-04: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP- 0006-2002: 1
- BSI-PP-0002-2001: 2
- BSI-PP-0006-2002: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 21
- EAL4: 7
- EAL4 augmented: 2
- EAL4+: 4
- EAL5+: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_AUT.1: 3
- ACM_CAP.3: 1
- ACM_CAP.4: 2
- ACM_SCP.2: 3
- ADO:
- ADO_DEL.2: 4
- ADO_IGS.1: 5
- ADV:
- ADV_FSP.1: 10
- ADV_FSP.2: 3
- ADV_HLD.1: 2
- ADV_HLD.2: 4
- ADV_IMP.1: 6
- ADV_LLD.1: 5
- ADV_RCR.1: 5
- ADV_SPM.1: 3
- AGD:
- AGD_ADM.1: 10
- AGD_USR.1: 9
- ALC:
- ALC_DVS.1: 4
- ALC_LCD.1: 2
- ALC_TAT.1: 5
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 1
- ATE_FUN.1: 5
- ATE_IND.2: 1
- AVA:
- AVA_MSU.3: 9
- AVA_SOF: 1
- AVA_SOF.1: 3
- AVA_VLA.4: 10
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CAP.1: 1
- FCS_CKM: 1
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 5
- FCS_COP.1: 15
- FCS_COP.1.1: 1
- FDP:
- FDP_IFC.1: 9
- FDP_IFC.1.1: 1
- FDP_IFF.1: 7
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC: 1
- FDP_ITC.1: 3
- FDP_ITC.2: 2
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 32
- FIA_AFL.1.1: 3
- FIA_AFL.1.2: 3
- FIA_SOS: 2
- FIA_SOS.1: 21
- FIA_SOS.1.1: 3
- FIA_SSL.3: 1
- FIA_UAU.1: 9
- FIA_UAU.2: 25
- FIA_UAU.2.1: 2
- FIA_UAU.6: 8
- FIA_UAU.6.1: 1
- FIA_UAU.7: 10
- FIA_UAU.7.1: 1
- FIA_UID.1: 11
- FIA_UID.2: 27
- FIA_UID.2.1: 3
- FMT:
- FMT_MOF.1: 23
- FMT_MOF.1.1: 3
- FMT_MSA: 1
- FMT_MSA.3: 2
- FMT_MTD.1: 36
- FMT_MTD.1.1: 3
- FMT_SMF.1: 38
- FMT_SMF.1.1: 1
- FMT_SMR.1: 57
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FTA:
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
|
- FAU:
- FCS:
- FCS_CKM: 8
- FCS_CKM.1: 10
- FCS_CKM.1.1: 3
- FCS_CKM.2: 2
- FCS_CKM.3: 2
- FCS_CKM.4: 14
- FCS_COP: 12
- FCS_COP.1: 9
- FDP:
- FDP_ACC: 24
- FDP_ACC.1: 14
- FDP_ACF: 26
- FDP_ACF.1: 17
- FDP_ACF.1.4: 1
- FDP_ETC: 5
- FDP_ETC.1: 3
- FDP_ITC: 6
- FDP_ITC.1: 7
- FDP_RIP.1: 5
- FDP_RIP.1.1: 2
- FDP_SDI: 10
- FDP_SDI.2: 6
- FDP_UAU.1: 1
- FDP_UID.1: 1
- FDP_UIT: 11
- FDP_UIT.1: 6
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 5
- FIA_ATD.1.1: 2
- FIA_UAU.1: 7
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID: 1
- FIA_UID.1: 7
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 6
- FMT_MOF.1.1: 3
- FMT_MSA: 9
- FMT_MSA.1: 8
- FMT_MSA.2: 10
- FMT_MSA.2.1: 3
- FMT_MSA.3: 12
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 3
- FMT_MTD.1.1: 3
- FMT_SMF.1: 10
- FMT_SMF.1.1: 3
- FMT_SMR: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 6
- FPT_AMT.1.1: 2
- FPT_FLS: 1
- FPT_FLS.1: 5
- FPT_FLS.1.1: 2
- FPT_PHP: 1
- FPT_PHP.1: 5
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 4
- FPT_PHP.3.1: 2
- FPT_RVM: 1
- FPT_RVM.1: 8
- FPT_RVM.1.1: 1
- FPT_SEP.1: 9
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TST: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 11
- FTP_ITC.1: 8
- FTP_TRP: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 5
- A.IC: 2
- A.IC-CARD: 1
- A.NETWORK: 5
- A.SECRET: 3
- A.SERVICE: 4
- O:
- O.CRYPT: 3
- O.CRYPTO: 2
- O.CRYPTO-CAPABILITY: 2
- O.CRYPTO-KEY: 4
- O.DECRYPT: 3
- O.DECRYPT-PRINT: 4
- O.FAX: 2
- O.FAX-CONTROL: 3
- O.MAIL: 5
- O.MAIL-CRYPTO: 2
- O.MAIL-SIGN: 4
- O.OVERWRITE: 5
- O.PKI: 3
- O.PKI-CAPABILITY: 8
- OE:
- OE.ADMIN: 3
- OE.CARD-USER: 2
- OE.DRIVER: 4
- OE.FAX: 2
- OE.FAX-UNIT: 2
- OE.IC: 2
- OE.IC-CARD: 5
- OE.NETWORK: 4
- OE.SECRET: 3
- OE.SERVICE: 3
- OE.SETTING: 3
- OE.SETTING-SECURITY: 3
- OE.SIGN: 2
- T:
- T.B: 1
- T.BRING: 2
- T.DISCARD: 3
- T.DISCARD-MFP: 1
|
|
pdf_data/st_keywords/vendor |
|
- GD:
- G&D: 6
- Giesecke & Devrient: 7
- Infineon:
- Infineon: 4
- Infineon Technologies AG: 3
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- RIPEMD:
- RIPEMD-160: 2
- RIPEMD160: 1
- SHA:
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- physical tampering: 9
- SCA:
- DPA: 1
- SPA: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS 180: 4
- FIPS 180-2: 2
- FIPS 186: 2
- FIPS 186-2: 4
- FIPS PUB 197: 2
- FIPS186-2: 1
|
- BSI:
- AIS 20: 1
- AIS 31: 1
- AIS 32: 1
- AIS20: 1
- AIS31: 1
- FIPS:
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 9796-1: 1
- ISO/IEC 9796-2: 1
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- ConfidentialDocument:
- that encryption print for a printer data transmitted to MFP from client PC among the highly confidential document transmitted between MFP and client PC. Also, it provides a function of protecting the scanned image: 1
|
|
pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20140206142648+09'00'
- /Creator: CubePDF
- /Keywords:
- /ModDate: D:20140206142650+09'00'
- /Producer: GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA
- /Subject:
- /Title:
- pdf_file_size_bytes: 500291
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 54
|
- /Company: Giesecke & Devrient
- /CreationDate: D:20071119155707+01'00'
- /Creator: Acrobat PDFMaker 7.0 für Word
- /Keywords: Version 1.0/Status 19.11.2007
- /ModDate: D:20071119155754+01'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Subject: STARCOS 3.2 QES V1.0
- /Title: Security Target Lite
- pdf_file_size_bytes: 318571
- pdf_hyperlinks: http://www.commoncriteriaportal.org/public/expert/index.php?menu=5
- pdf_is_encrypted: True
- pdf_number_of_pages: 71
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |