name |
bizhub C754e / bizhub C654e PKI Card System Control Software. Version:A2X00Y0-0100-G00-80pki |
Infineon Smart Card IC (Security Controller)SLE66CLX800PE / m1581-e13/a14, SLE66CLX800PEM / m1580-e13/a14, SLE66CLX800PES / m1582-e13/a14, SLE66CX800PE / m1599-e13/a14, SLE66CLX360PE / m1587-e13/a14, SLE66CLX360PEM / m1588-e13/a14, SLE66CLX360PES / m1589-e13/a14, SLE66CLX180PE / m2080-a14, SLE66CLX180PEM / m2081-a14, SLE66CLX120PE / m2082-a14, SLE66CLX120PEM / m2083-a14, all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
DE |
status |
archived |
archived |
not_valid_after |
05.12.2018 |
01.09.2019 |
not_valid_before |
28.11.2013 |
27.05.2008 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0415_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0482a.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0415_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0482b.pdf |
manufacturer |
KONICA MINOLTA, INC. |
Infineon Technologies AG |
manufacturer_web |
https://www.konicaminolta.com/index.html |
https://www.infineon.com/ |
security_level |
EAL3 |
EAL5+, AVA_MSU.3, ALC_DVS.2, AVA_VLA.4 |
dgst |
6c9106df3d774631 |
189c8bc5499115b2 |
heuristics/cert_id |
JISEC-CC-CRP-C0415 |
BSI-DSZ-CC-0482-2008 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
cpe:2.3:h:konicaminolta:bizhub_c754:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c754e:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c654:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c654e:-:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
CVE-2021-3011 |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ALC_LCD.2, AGD_USR.1, ALC_DVS.2, AVA_SOF.1, ATE_COV.2, ATE_DPT.2, AGD_ADM.1, ADV_INT.1, ADV_RCR.2, ATE_FUN.1, ADV_IMP.2, ALC_TAT.2, ADV_HLD.3, AVA_VLA.4, ADV_SPM.3, ATE_IND.2, ADV_LLD.1, ADV_FSP.3, AVA_CCA.1, AVA_MSU.3 |
heuristics/extracted_versions |
0100 |
1.5, 1.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0626-2009, BSI-DSZ-CC-0576-2009, ANSSI-CC-2009/17, BSI-DSZ-CC-0665-2010, BSI-DSZ-CC-0523-2008, BSI-DSZ-CC-0528-2008, BSI-DSZ-CC-0568-2008, ANSSI-CC-2010/06 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0399-2007 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0626-2009, BSI-DSZ-CC-0576-2009, ANSSI-CC-2011/10, ANSSI-CC-2011/13, ANSSI-CC-2012/09, ANSSI-CC-2009/17, ANSSI-CC-2011/16, ANSSI-CC-2011/12, ANSSI-CC-2011/80, BSI-DSZ-CC-0665-2010, BSI-DSZ-CC-0523-2008, BSI-DSZ-CC-0784-2013, BSI-DSZ-CC-0528-2008, ANSSI-CC-2011/79, BSI-DSZ-CC-0630-2010, BSI-DSZ-CC-0593-2009, BSI-DSZ-CC-0568-2008, ANSSI-CC-2010/06 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0399-2007, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0223-2003 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0415
- certification_date: 01.11.2013
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0415_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions.: - Encryption Print Function: The function that receives the encrypted print data and can print the print data only with a right IC card. - S/MIME Encryption Function: The function to encrypt an image data when transmitting it by e-mail. - Digital Signature Function: The function to add the digital signature by using the function of IC card when transmitting an image data by e-mail. - HDD Encryption Function: The function to encrypt the image data written in HDD by using the function of ASIC. - All Area Overwrite Deletion Function: The function that deletes data area including the image data of HDD completely by deletion method compliant with various overwrite deletion standards. - Fax Unit Control Function: The function to prevent accessing the internal network using FAX as steppingstone.
- evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
- product: bizhub C754e / bizhub C654e PKI Card System Control Software
- product_type: Control Software for digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0415_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0415_est.pdf
- toe_version: A2X00Y0-0100-G00-80pki
- vendor: KONICA MINOLTA,INC.
- expiration_date: 01.12.2018
- supplier: KONICA MINOLTA, INC.
- toe_japan_name: bizhub C754e / bizhub C654e PKI Card System Control SoftwareA2X00Y0-0100-G00-80pki
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0415_it3462.html
- toe_overseas_name: bizhub C754e / bizhub C654e PKI Card System Control SoftwareA2X00Y0-0100-G00-80pki
|
|
heuristics/st_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0626-2009, ANSSI-CC-2009/17, BSI-DSZ-CC-0665-2010, BSI-DSZ-CC-0523-2008, ANSSI-CC-2010/06, KECS-ISIS-0118-2008 |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0322-2005 |
heuristics/st_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0626-2009, ANSSI-CC-2011/13, ANSSI-CC-2009/17, ANSSI-CC-2011/12, ANSSI-CC-2011/16, BSI-DSZ-CC-0665-2010, BSI-DSZ-CC-0523-2008, BSI-DSZ-CC-0630-2010, ANSSI-CC-2011/10, ANSSI-CC-2010/06, KECS-ISIS-0118-2008 |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0322-2005 |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
- maintenance_date: 29.01.2009
- maintenance_report_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0482_ma2.pdf
- maintenance_st_link: None
- maintenance_title: Infineon Smart Card IC (Security Controller) SLE66CLX800PE / m1581-e13/a14, SLE66CLX800PEM / m1580-e13/a14, SLE66CLX800PES / m1582-e13/a14, SLE66CX800PE / m1599-e13/a14, SLE66CLX360PE / m1587-e13/a14, SLE66CLX360PEM / m1588-e13/a14, SLE66CLX360PES / m1589-e13/a14, SLE66CLX180PE / m2080-a14, SLE66CLX180PEM / m2081-a14, SLE66CLX120PE / m2082-a14, SLE66CLX120PEM / m2083-a14, all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software
- maintenance_date: 15.04.2009
- maintenance_report_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0482_ma4a.pdf
- maintenance_st_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0482_ma4b.pdf
- maintenance_title: Infineon Smart Card IC (Security Controller) SLE66CLX800PE / m1581-a15, SLE66CLX800PEM / m1580-a15, SLE66CLX800PES / m1582-a15, SLE66CX800PE / m1599-a15, SLE66CLX360PE / m1587-a15, SLE66CLX360PEM / m1588-a15, SLE66CLX360PES / m1589-a15, SLE66CLX180PE / m2080-a15, SLE66CLX180PEM / m2081-a15, SLE66CLX120PE / m2082-a15, SLE66CLX120PEM / m2083-a15 all with optional libraries RSA V1.5 and ECC V1.1 and all with specific IC dedicated software
- maintenance_date: 05.03.2009
- maintenance_report_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0482_ma3.pdf
- maintenance_st_link: None
- maintenance_title: Infineon Smart Card IC (Security Controller) SLE66CLX800PE / m1581-a15, SLE66CLX800PEM / m1580-a15, SLE66CLX800PES / m1582-a15, SLE66CX800PE / m1599-a15, SLE66CLX360PE / m1587-a15, SLE66CLX360PEM / m1588-a15, SLE66CLX360PES / m1589-a15 all with optional libraries RSA V1.5 and ECC V1.1 and all with specific IC dedicated software
- maintenance_date: 04.11.2008
- maintenance_report_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0482_ma1.pdf
- maintenance_st_link: None
- maintenance_title: SLE66CLX800PE / m1581-e13/a14, SLE66CLX800PEM / m1580-e13/a14,SLE66CLX800PES / m1582-e13/a14, SLE66CX800PE / m1599-e13/a14, SLE66CLX360PE / m1587-e13/a14, SLE66CLX360PEM / m1588-e13/a14,SLE66CLX360PES / m1589-e13/a14, SLE66CLX180PE / m2080-a14, SLE66CLX180PEM / m2081-a14, SLE66CLX120PE / m2082-a14,SLE66CLX120PEM / m2083-a14, all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software
- maintenance_date: 15.04.2009
- maintenance_report_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0482_ma5.pdf
- maintenance_st_link: None
- maintenance_title: Infineon Smart Card IC (Security Controller) SLE66CLX800PE / m1581-e13/a14, SLE66CLX800PEM / m1580-e13/a14, SLE66CLX800PES / m1582-e13/a14, SLE66CX800PE / m1599-e13/a14, SLE66CLX360PE / m1587-e13/a14, SLE66CLX360PEM / m1588-e13/a14, SLE66CLX360PES / m1589-e13/a14, SLE66CLX180PE /m2080-a14, SLE66CLX180PEM / m2081-a14, SLE66CLX120PE / m2082-a14, SLE66CLX120PEM / m2083-a14 all with optional libraries RSA V1.5 and ECC V1.1 and all with specific IC dedicated software
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0415_erpt.pdf |
0482a.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0415-01: 1
- Certification No. C0415: 1
|
- DE:
- BSI-DSZ-CC-0322-2005: 1
- BSI-DSZ-CC-0399-2007: 4
- BSI-DSZ-CC-0482: 2
- BSI-DSZ-CC-0482-2008: 21
- NL:
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 4: 5
- EAL 5: 4
- EAL 5 augmented: 4
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 6
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 3
- ACM_SCP.3: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 6
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.2: 1
- ALC_TAT: 2
- ALC_TAT.2: 1
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_VLA: 4
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
pdf_data/report_keywords/cc_sfr |
|
- FCS:
- FCS_CKM.1: 3
- FCS_CKM.4: 1
- FDP:
- FDP_ITC.1: 3
- FDP_ITC.2: 3
- FMT:
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.IC-CARD: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVICE: 1
- T:
- T.BRING-OUT-STORAGE: 2
- T.DISCARD-MFP: 2
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 30
- Infineon AG: 1
- Infineon Technologies: 5
- Infineon Technologies AG: 10
- Philips:
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 2
- TÜViT: 2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 1
- side channel: 2
- other:
- Bellcore attack: 1
- JIL: 4
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
|
- BSI:
- AIS 25: 3
- AIS 26: 2
- AIS 31: 4
- AIS 32: 1
- AIS 34: 3
- AIS 35: 1
- AIS 36: 2
- AIS 38: 1
- FIPS:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 15408:2005: 3
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- or through the network. The TOE provides the protection function for the disclosure of the highly confidential documents stored in MFP. This TOE does not support the audit log function. Moreover, against the danger of: 1
|
- ConfidentialDocument:
- / m2082-a14, SLE66CLX120PEM / m2083-a14, all optional with RSA2048 V1.5 and ECC, TÜViT (confidential document) [8] Configuration list for the TOE, Configuration Management Scope (ACM_SCP), SLE66CLX800PE : 1
- / m2082-a14, SLE66CLX120PEM / m2083-a14, all optional with RSA2048 V1.5 and ECC, TÜViT, (confidential document) [11] Data Book – SLE66CL(X)xxxPE(M/S) Security Controller Family, Version 10.06 2006-10, Infineon: 1
- / m2083-a14 all with optional libraries RSA2048 V1.5 and ECC V1.1, 1.2 2008-01-09 Infineon (confidential document) [9] Smart card IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20140212173321+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20140212173353+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 359141
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 34
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20080606110149+02'00'
- /Creator: Writer
- /Keywords: "SLE66CLX800PE / m1581-e13/a14, SLE66CLX800PEM / m1580-e13/a14, SLE66CLX800PES / m1582-e13/a14, SLE66CX800PE / m1599-e13/a14, SLE66CLX360PE / m1587-e13/a14, SLE66CLX360PEM / m1588-e13/a14, SLE66CLX360PES / m1589-e13/a14, SLE66CLX180PE / m2080-a14, SLE66CLX180PEM / m2081-a14, SLE66CLX120PE / m2082-a14, SLE66CLX120PEM / m2083-a14, all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software, Infineon, BSI-DSZ-CC-0482-2008, Common Criteria"
- /ModDate: D:20080606120041+02'00'
- /Producer: StarOffice 8
- /Subject: BSI-DSZ-CC-0482-2008
- /Title: Certification Report BSI-DSZ-CC-0482-2008
- pdf_file_size_bytes: 541629
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
pdf_data/st_filename |
c0415_est.pdf |
0482b.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0266-2005: 1
- BSI-DSZ-CC-0322-2005: 1
- BSI-DSZ-CC-0430-2007: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 4
- EAL 5 augmented: 4
- EAL5: 5
- EAL5 augmented: 2
- EAL5+: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_AUT.1: 2
- ACM_CAP.4: 1
- ACM_SCP: 3
- ACM_SCP.2: 1
- ACM_SCP.3: 5
- ADO:
- ADO_DEL.2: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 5
- ADV_HLD.3: 3
- ADV_IMP.2: 3
- ADV_INT.1: 3
- ADV_LLD.1: 3
- ADV_RCR.2: 3
- ADV_SPM.1: 3
- ADV_SPM.3: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ALC_DVS.2: 4
- ALC_LCD.2: 1
- ALC_TAT.2: 2
- ATE:
- ATE_COV.2: 2
- ATE_DPT.2: 1
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_CCA.1: 2
- AVA_MSU.3: 3
- AVA_SOF: 4
- AVA_SOF.1: 2
- AVA_VLA.4: 4
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CAP.1: 1
- FCS_CKM: 1
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 5
- FCS_COP.1: 15
- FCS_COP.1.1: 1
- FDP:
- FDP_IFC.1: 9
- FDP_IFC.1.1: 1
- FDP_IFF.1: 7
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC: 1
- FDP_ITC.1: 3
- FDP_ITC.2: 2
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 32
- FIA_AFL.1.1: 3
- FIA_AFL.1.2: 3
- FIA_SOS: 2
- FIA_SOS.1: 21
- FIA_SOS.1.1: 3
- FIA_SSL.3: 1
- FIA_UAU.1: 9
- FIA_UAU.2: 25
- FIA_UAU.2.1: 2
- FIA_UAU.6: 8
- FIA_UAU.6.1: 1
- FIA_UAU.7: 10
- FIA_UAU.7.1: 1
- FIA_UID.1: 11
- FIA_UID.2: 27
- FIA_UID.2.1: 3
- FMT:
- FMT_MOF.1: 23
- FMT_MOF.1.1: 3
- FMT_MSA: 1
- FMT_MSA.3: 2
- FMT_MTD.1: 36
- FMT_MTD.1.1: 3
- FMT_SMF.1: 38
- FMT_SMF.1.1: 1
- FMT_SMR.1: 57
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FTA:
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
|
- FAU:
- FCS:
- FCS_CKM.1: 49
- FCS_CKM.1.1: 5
- FCS_CKM.2: 7
- FCS_CKM.4: 30
- FCS_CKM.4.1: 3
- FCS_COP.1: 45
- FCS_COP.1.1: 4
- FCS_RND: 2
- FCS_RND.1: 4
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC.1: 25
- FDP_ACC.1.1: 1
- FDP_ACF.1: 15
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_CKM.2: 1
- FDP_IFC.1: 14
- FDP_ITC.1: 24
- FDP_ITC.1.1: 3
- FDP_ITC.1.2: 3
- FDP_ITC.1.3: 3
- FDP_ITC.2: 23
- FDP_ITC.2.1: 3
- FDP_ITC.2.2: 3
- FDP_ITC.2.3: 3
- FDP_ITC.2.4: 3
- FDP_ITC.2.5: 3
- FDP_ITT.1: 3
- FDP_SDI.1: 17
- FDP_SDI.1.1: 1
- FDP_SDI.2: 15
- FDP_SDI.2.2: 1
- FMT:
- FMT_LIM.1: 4
- FMT_LIM.2: 4
- FMT_MSA.1: 15
- FMT_MSA.1.1: 1
- FMT_MSA.2: 32
- FMT_MSA.2.1: 3
- FMT_MSA.3: 16
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR.1: 9
- FPT:
- FPT_AMT.1: 4
- FPT_FLS.1: 6
- FPT_ITT.1: 3
- FPT_PHP.3: 7
- FPT_SEP.1: 6
- FPT_TDC.1: 3
- FPT_TST: 2
- FPT_TST.1: 11
- FPT_TST.2: 26
- FPT_TST.2.1: 2
- FRU:
- FTP:
- FTP_ITC.1: 3
- FTP_TRP.1: 3
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 5
- A.IC: 2
- A.IC-CARD: 1
- A.NETWORK: 5
- A.SECRET: 3
- A.SERVICE: 4
- O:
- O.CRYPT: 3
- O.CRYPTO: 2
- O.CRYPTO-CAPABILITY: 2
- O.CRYPTO-KEY: 4
- O.DECRYPT: 3
- O.DECRYPT-PRINT: 4
- O.FAX: 2
- O.FAX-CONTROL: 3
- O.MAIL: 5
- O.MAIL-CRYPTO: 2
- O.MAIL-SIGN: 4
- O.OVERWRITE: 5
- O.PKI: 3
- O.PKI-CAPABILITY: 8
- OE:
- OE.ADMIN: 3
- OE.CARD-USER: 2
- OE.DRIVER: 4
- OE.FAX: 2
- OE.FAX-UNIT: 2
- OE.IC: 2
- OE.IC-CARD: 5
- OE.NETWORK: 4
- OE.SECRET: 3
- OE.SERVICE: 3
- OE.SETTING: 3
- OE.SETTING-SECURITY: 3
- OE.SIGN: 2
- T:
- T.B: 1
- T.BRING: 2
- T.DISCARD: 3
- T.DISCARD-MFP: 1
|
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 8
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 4
- Malfunction: 15
- malfunction: 3
- SCA:
- DPA: 6
- Leak-Inherent: 11
- Physical Probing: 2
- SPA: 4
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS 180: 4
- FIPS 180-2: 2
- FIPS 186: 2
- FIPS 186-2: 4
- FIPS PUB 197: 2
- FIPS186-2: 1
|
- BSI:
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 2
- FIPS:
- ISO:
- ISO/IEC 7816: 6
- ISO/IEC 7816-3: 1
- ISO/IEC 9796-1: 3
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- ConfidentialDocument:
- that encryption print for a printer data transmitted to MFP from client PC among the highly confidential document transmitted between MFP and client PC. Also, it provides a function of protecting the scanned image: 1
|
- OutOfScope:
- key length below 1280 bit are out of scope of the evaluation: 1
- length below 1280 bit are out of scope of the evaluation) • Signature creation and verification according to ECDSA standard and key: 1
- out of scope: 2
- single DES is out of scope of the evaluation: 1
- smart card applications • Data encryption according to single-DES and 3DES standard (single DES is out of scope of the evaluation) • Data encryption according to RSA standard with 512 to 2048 bits key length: 1
|
pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20140206142648+09'00'
- /Creator: CubePDF
- /Keywords:
- /ModDate: D:20140206142650+09'00'
- /Producer: GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA
- /Subject:
- /Title:
- pdf_file_size_bytes: 500291
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 54
|
- /Author: Hans-Ulrich Buchmüller
- /CreationDate: D:20080603104126Z
- /Creator: Security Target_SLE66CLX800PEx+360PEx_Libs_1.2_05.doc - Microsoft Word
- /Keywords: Design Steps e13, a14, RSA, EC, ECC, libraries, Elliptic Curve, Security Target, contactless, Security Controller, public, document, resistance to attackers with high attack potential, Infineon
- /ModDate: D:20080606120105+02'00'
- /Producer: Acrobat PDFWriter 5.0 for Windows NT
- /Subject: CC EAL5+ Certification Security Target
- /Title: Security Target SLE66CLX800-360-180-120PEx e13-a14
- pdf_file_size_bytes: 358317
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 62
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |