name |
bizhub PRO 1050P zentai seigyo software Overseas: bizhub PRO 1050P control software |
Philips P541G072V0P (JCOP 41 v2.2) |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
DE |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
01.09.2019 |
not_valid_before |
21.02.2005 |
31.08.2006 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0021_it4030_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0294a.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0294b.pdf |
manufacturer |
Konica Minolta Business Technologies, Inc |
Philips Semiconductors GmbH |
manufacturer_web |
https://www.konicaminolta.com/ |
https://www.philips.com/ |
security_level |
EAL3 |
ADV_IMP.2, EAL4+, ALC_DVS.2 |
dgst |
6cf4c2cf7687f4e8 |
512bbfc881dbe9ed |
heuristics/cert_id |
JISEC-CC-CRP-C0021 |
BSI-DSZ-CC-0294-2006 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ASE_ENV.1, ADV_RCR.1, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ALC_DVS.2, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, ADV_FSP.2, AVA_SOF.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ADV_IMP.2, ATE_DPT.1, AVA_VLA.4, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1, AVA_MSU.3 |
heuristics/extracted_versions |
- |
2.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0426-2007 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0348-2006 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0426-2007 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0348-2006 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0282
- certification_date: 01.02.2011
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0282_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This TOE is the software which is installed in a digital Multi Function Peripheral (hereinafter referred to as "mfp") consisting of a copier, printer, scanner, and fax function, and controls the overall operation of the mfp. TOE security functionality This TOE offers a security function against disclosure of highly-confidential information stored in an mfp. In compliance with all sorts of overwritting standards, this TOE also offers an overwritting function to completely erase data on recording media such as HDD. This function is used when discarding an mfp or returning a leased one in order to prevent information leakage of an organization using the mfp.
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Japanese : bizhub C35 Zentai Seigyo Software English : bizhub C35 Control Software
- product_type: Control Software for digital mfp
- toe_version: A12130G050105 (Controller ROM) A12199G0040000 (Boot ROM)
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.03.2016
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub C35 Zentai Seigyo Software A12130G050105 (Controller ROM) A12199G0040000 (Boot ROM)
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0282_it0301.html
- toe_overseas_name: bizhub C35 Control Software A12130G050105 (Controller ROM) A12199G0040000 (Boot ROM)
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0348-2006 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0348-2006 |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0021_it4030_ecvr.pdf |
0294a.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0294-2006
- cert_item: Philips P541G072V0P (JCOP 41 v2.2
- cert_lab: BSI
- developer: IBM Deutschland Entwicklung GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0021: 1
|
- DE:
- BSI-DSZ-CC-0294-2006: 21
- BSI-DSZ-CC-0348: 1
- BSI-DSZ-CC-0348-: 1
- BSI-DSZ-CC-0348-2006: 3
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 4: 4
- EAL 4 augmented: 2
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 11
- EAL4 augmented: 1
- EAL5: 7
- EAL5 augmented: 1
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_FSP.2: 1
- ADV_HLD: 2
- ADV_HLD.2: 1
- ADV_IMP: 2
- ADV_IMP.2: 5
- ADV_INT: 2
- ADV_LLD: 2
- ADV_LLD.1: 1
- ADV_RCR: 2
- ADV_RCR.1: 1
- ADV_SPM: 2
- ADV_SPM.1: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 1
- AGD_USR: 2
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 6
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT: 2
- ATE_DPT.1: 1
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_IND: 2
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.2: 1
- AVA_MSU.3: 1
- AVA_SOF: 3
- AVA_SOF.1: 1
- AVA_VLA: 4
- AVA_VLA.2: 2
- AVA_VLA.3: 1
- AVA_VLA.4: 2
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.2: 1
- FCS_CKM.3: 1
- FCS_CKM.4: 1
- FCS_COP: 7
- FCS_RND.1: 1
- FDP:
- FDP_ACC: 2
- FDP_ACF: 2
- FDP_ETC.1: 1
- FDP_IFC: 2
- FDP_IFF: 2
- FDP_ITC.1: 1
- FDP_RIP: 6
- FDP_ROL: 1
- FDP_SDI.2: 1
- FIA:
- FIA_AFL: 2
- FIA_ATD: 1
- FIA_UAU: 2
- FIA_UAU.1: 1
- FIA_UID: 2
- FIA_USB.1: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MSA: 8
- FMT_MTD: 1
- FMT_MTD.3: 1
- FMT_SMF.1: 1
- FMT_SMR: 3
- FPR:
- FPT:
- FPT_AMT: 1
- FPT_FLS: 2
- FPT_PHP: 1
- FPT_RVM: 1
- FPT_RVM.1: 1
- FPT_SEP: 1
- FPT_SEP.1: 1
- FPT_TST.1: 1
- FRU:
- FTP:
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.DLV_PROTECT: 1
- A.NATIVE: 1
- A.NO-DELETION: 1
- A.NO-INSTALL: 1
- A.TEST_OPERATE: 1
- A.USE_DIAG: 1
- A.USE_KEYS: 1
- A.VERIFICATION: 1
- OSP:
- T:
- T.ACCESS_DATA: 1
- T.CONFID-APPLI-DATA: 1
- T.CONFID-JCS-CODE: 1
- T.CONFID-JCS-DATA: 1
- T.DEL: 1
- T.DEL_IC_NOS: 1
- T.DEV_IC: 1
- T.DEV_NOS: 1
- T.EXE-CODE: 2
- T.FAULT: 1
- T.INTEG-APPLI-CODE: 1
- T.INTEG-APPLI-DATA: 1
- T.INTEG-JCS-CODE: 1
- T.INTEG-JCS-DATA: 1
- T.LEAKAGE: 1
- T.NATIVE: 1
- T.OS_DECEIVE: 1
- T.OS_OPERATE: 1
- T.PHYSICAL: 1
- T.RESOURCES: 1
- T.RND: 1
- T.SID: 2
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
- TUV:
- TÜV Informationstechnik: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 20: 4
- AIS 25: 2
- AIS 26: 2
- AIS 32: 1
- AIS 34: 3
- AIS 36: 3
- ISO:
- SCP:
|
pdf_data/report_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
- Java Card 2.2.1: 1
- JavaCard 2.2.1: 1
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Report (ETR), Version 3, 10. July 2006, CC Evaluation of Philips P541G072V0P (JCOP 41 v2.2) (confidential document) [9] Java Card System – Minimal Configuration Protection Profile (registered at DCSSI under: 1
- v2.2) Secure Smart Card Controller, Version 2.2, 25. March 2006, IBM Deutschland Entwicklung GmbH (confidential document) [7] Security Target lite Philips P541G072V0P (JCOP 41, v2.2) Secure Smart Card Controller, Version: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20050222184150+09'00'
- /ModDate: D:20050222184150+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 16296
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /Author: Bundesamt für Sicherheit in der informationstechnik
- /Company: BSI Bonn
- /CreationDate: D:20060928154201+02'00'
- /Creator: Acrobat PDFMaker 7.0.7 für Word
- /Keywords: Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-0294
- /ModDate: D:20060928154453+02'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /SourceModified: D:20060928134130
- /Title: Certification Report BSI-DSZ-CC-0294-2006
- pdf_file_size_bytes: 314369
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 44
|
pdf_data/st_filename |
|
0294b.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0348: 1
- BSI-DSZ-CC-0348-2006: 3
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002: 2
- BSI-PP-0017: 4
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 27
- EAL4 augmented: 8
- EAL5: 2
- EAL5 augmented: 2
|
pdf_data/st_keywords/cc_sar |
|
- ACM:
- ACM_AUT.1: 2
- ACM_CAP.4: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL.2: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.2: 2
- ADV_HLD.2: 2
- ADV_IMP.1: 2
- ADV_IMP.2: 13
- ADV_LLD.1: 3
- ADV_RCR.1: 3
- ADV_SPM.1: 10
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ALC_DVS: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 14
- ALC_LCD.1: 2
- ALC_TAT.1: 3
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 3
- AVA:
- AVA_MSU.2: 1
- AVA_MSU.3: 2
- AVA_SOF.1: 2
- AVA_VLA.2: 7
- AVA_VLA.3: 4
- AVA_VLA.4: 2
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_ARP: 6
- FAU_ARP.1: 8
- FAU_GEN.1: 5
- FAU_SAA.1: 13
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FCS:
- FCS_CKM.1: 15
- FCS_CKM.1.1: 1
- FCS_CKM.2: 9
- FCS_CKM.2.1: 1
- FCS_CKM.3: 7
- FCS_CKM.3.1: 1
- FCS_CKM.4: 17
- FCS_CKM.4.1: 1
- FCS_COP: 15
- FCS_COP.1: 9
- FCS_COP.1.1: 7
- FCS_RND: 3
- FCS_RND.1: 16
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 9
- FDP_ACC.1: 22
- FDP_ACC.2: 7
- FDP_ACF: 8
- FDP_ACF.1: 27
- FDP_ETC.1: 8
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC: 4
- FDP_IFC.1: 24
- FDP_IFC.2: 5
- FDP_IFF: 4
- FDP_IFF.1: 19
- FDP_IFF.2: 12
- FDP_IFF.2.7: 1
- FDP_ITC.1: 16
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 8
- FDP_RIP: 12
- FDP_RIP.1: 21
- FDP_ROL: 3
- FDP_ROL.1: 10
- FDP_SDI.2: 9
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_AFL: 9
- FIA_AFL.1: 9
- FIA_ATD: 2
- FIA_ATD.1: 9
- FIA_UAU: 4
- FIA_UAU.1: 11
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.3: 8
- FIA_UAU.4: 7
- FIA_UID: 7
- FIA_UID.1: 14
- FIA_UID.2: 6
- FIA_USB.1: 10
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 20
- FMT_LIM.1.1: 2
- FMT_LIM.2: 20
- FMT_LIM.2.1: 2
- FMT_MSA: 23
- FMT_MSA.1: 27
- FMT_MSA.2: 21
- FMT_MSA.3: 28
- FMT_MTD: 4
- FMT_MTD.1: 9
- FMT_MTD.3: 8
- FMT_MTD.3.1: 1
- FMT_SMF.1: 16
- FMT_SMF.1.1: 1
- FMT_SMR: 11
- FMT_SMR.1: 35
- FPR:
- FPR_UNO.1: 9
- FPR_UNO.1.1: 1
- FPT:
- FPT_AMT: 3
- FPT_AMT.1: 8
- FPT_FLS: 8
- FPT_FLS.1: 16
- FPT_PHP: 4
- FPT_PHP.3: 6
- FPT_RVM: 3
- FPT_RVM.1: 15
- FPT_RVM.1.1: 1
- FPT_SEP: 4
- FPT_SEP.1: 14
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TST.1: 9
- FPT_TST.1.1: 2
- FPT_TST.1.2: 2
- FPT_TST.1.3: 1
- FRU:
- FRU_FLT: 4
- FRU_FLT.1: 2
- FRU_FLT.2: 7
- FRU_RSA: 1
- FRU_RSA.1: 4
- FTP:
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.DLV_DATA: 1
- A.DLV_PROTECT: 4
- A.NATIVE: 10
- A.NO: 1
- A.NO-DELETION: 5
- A.NO-INSTALL: 5
- A.TEST_OPERATE: 6
- A.USE_DIAG: 5
- A.USE_KEY: 1
- A.USE_KEYS: 4
- A.VERIFICATION: 6
- D:
- D.API_DATA: 3
- D.APP_CODE: 8
- D.APP_C_DATA: 3
- D.APP_I_DATA: 6
- D.APP_KEY: 1
- D.CRYPTO: 7
- D.JAVA_OBJECT: 2
- D.JCS_CODE: 3
- D.JCS_DATA: 4
- D.PIN: 14
- D.SEC_DATA: 5
- O:
- O.ALARM: 5
- O.CARD-MANAGEMENT: 9
- O.CIPHER: 9
- O.FAULT_PROTECT: 6
- O.FIREWALL: 12
- O.KEY-MNGT: 8
- O.NATIVE: 7
- O.OPERATE: 24
- O.OS_DECEIVE: 9
- O.PHYSICAL: 7
- O.PIN-MNGT: 5
- O.PROTECT_DATA: 18
- O.REALLOCATION: 4
- O.RESOURCES: 8
- O.RND: 8
- O.SCP: 29
- O.SHRD_VAR_CONFID: 3
- O.SHRD_VAR_INTEG: 7
- O.SID: 10
- O.SIDE_CHANNEL: 7
- O.TRANSACTION: 5
- O.XYZ: 1
- OE:
- OE.CARD-: 1
- OE.CARD-MANAGEMENT: 2
- OE.DEL_NOS: 4
- OE.DEV_NOS: 3
- OE.DLV_DATA: 5
- OE.DLV_PROTECT: 3
- OE.IC_ORG: 5
- OE.NATIVE: 5
- OE.NO-DELETION: 3
- OE.NO-INSTALL: 4
- OE.SCP: 8
- OE.TEST_OPERATE: 5
- OE.USE_DIAG: 6
- OE.USE_KEY: 1
- OE.USE_KEYS: 6
- OE.VERIFICATION: 12
- OE.XYZ: 1
- OP:
- OP.ARRAY_ACCESS: 3
- OP.BYTECODE: 1
- OP.CREATE: 8
- OP.INSTANCE_FIELD: 1
- OP.INVK_INTERFACE: 4
- OP.INVK_VIRTUAL: 3
- OP.JAVA: 6
- OP.PUT: 5
- OP.THROW: 3
- OP.TYPE_ACCESS: 3
- OSP:
- R:
- T:
- T.ACCESS_DATA: 4
- T.CONFID-APPLI-DATA: 5
- T.CONFID-JCS-CODE: 4
- T.CONFID-JCS-DATA: 5
- T.DEL: 6
- T.DEL_IC_NOS: 7
- T.DEV_IC: 5
- T.DEV_NOS: 6
- T.EXE-CODE: 8
- T.FAULT: 4
- T.INTEG-: 1
- T.INTEG-APPLI-CODE: 2
- T.INTEG-APPLI-DATA: 5
- T.INTEG-JCS-CODE: 4
- T.INTEG-JCS-DATA: 3
- T.LEAKAGE: 4
- T.NATIVE: 6
- T.OS: 3
- T.OS_DECEIVE: 4
- T.OS_OPERATE: 5
- T.PHYSICAL: 4
- T.RESOURCES: 4
- T.RND: 4
- T.SID: 9
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 2
- Triple-DES: 5
- TripleDES: 4
- DES:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Physical tampering: 2
- fault injection: 1
- malfunction: 4
- physical tampering: 2
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 4
- side channel: 1
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
- FIPS:
- FIPS 180-1: 3
- FIPS 197: 3
- FIPS 46-3: 3
- PKCS:
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- Global Platform 2.1.1: 3
- GlobalPlatform 2.1.1: 2
- JavaCard:
- Java Card 2.1.1: 3
- Java Card 2.1.2: 1
- Java Card 2.2: 3
- Java Card 2.2.1: 9
- JavaCard 2.2.1: 3
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 2
- javacard.framework.applet: 1
- javacard.security: 4
- javacardx:
- javacardx.crypto: 4
- javacardx.security: 1
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: Schilling
- /CreationDate: D:20060828133033+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20060828192730+02'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /Title: Microsoft Word - ST-Lite_JCOP41_v10.doc
- pdf_file_size_bytes: 565575
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 133
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |