name |
bizhub PRO 1050P zentai seigyo software Overseas: bizhub PRO 1050P control software |
KeyOne CA 4.0, KeyOne XRA 4.0, KeyOne VA 4.0 version 4.0.13S2R1 (Release Patches 4.0.13S2R1_B01, 4.0.13S2R1_B02) |
category |
Other Devices and Systems |
Key Management Systems |
scheme |
JP |
ES |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
08.12.2019 |
not_valid_before |
21.02.2005 |
08.12.2014 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0021_it4030_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2013-31-INF-1370.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KeyOne%204.0%20Security%20Target.pdf |
manufacturer |
Konica Minolta Business Technologies, Inc |
Safelayer Secure Communications, S.A. |
manufacturer_web |
https://www.konicaminolta.com/ |
https://www.safelayer.com/ |
security_level |
EAL3 |
EAL4+, ALC_FLR.2 |
dgst |
6cf4c2cf7687f4e8 |
c7a9379229710eb8 |
heuristics/cert_id |
JISEC-CC-CRP-C0021 |
2013-31-INF-1370 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
- |
4.0, 4.0.13 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0282
- certification_date: 01.02.2011
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0282_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This TOE is the software which is installed in a digital Multi Function Peripheral (hereinafter referred to as "mfp") consisting of a copier, printer, scanner, and fax function, and controls the overall operation of the mfp. TOE security functionality This TOE offers a security function against disclosure of highly-confidential information stored in an mfp. In compliance with all sorts of overwritting standards, this TOE also offers an overwritting function to completely erase data on recording media such as HDD. This function is used when discarding an mfp or returning a leased one in order to prevent information leakage of an organization using the mfp.
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Japanese : bizhub C35 Zentai Seigyo Software English : bizhub C35 Control Software
- product_type: Control Software for digital mfp
- toe_version: A12130G050105 (Controller ROM) A12199G0040000 (Boot ROM)
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.03.2016
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub C35 Zentai Seigyo Software A12130G050105 (Controller ROM) A12199G0040000 (Boot ROM)
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0282_it0301.html
- toe_overseas_name: bizhub C35 Control Software A12130G050105 (Controller ROM) A12199G0040000 (Boot ROM)
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
c582c92b511133b5 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_CIMC_SL3_V1.0.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0021_it4030_ecvr.pdf |
2013-31-INF-1370.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0021: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 2
- EAL 4+: 1
- EAL3: 3
- EAL3 augmented: 1
- EAL4: 3
- EAL4+: 6
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 1
- ALC_FLR.2: 11
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 2
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 1
- FAU_GEN.2: 1
- FAU_GEN.2.1: 2
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.3.1: 1
- FAU_SEL.1: 1
- FAU_SEL.1.1: 2
- FAU_STG.1: 2
- FAU_STG.1.1: 2
- FAU_STG.1.2: 1
- FAU_STG.4: 1
- FAU_STG.4.1: 2
- FCO:
- FCO_NRO_CIMC.3: 1
- FCO_NRO_CIMC.3.1: 1
- FCO_NRO_CIMC.3.3: 1
- FCO_NRO_CIMC.4.1: 1
- FCS:
- FCS_CKM.1.1: 1
- FCS_CKM.4.1: 1
- FCS_CKM_CIMC.5: 1
- FCS_CKM_CIMC.5.1: 1
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_ACC.1.1: 2
- FDP_ACF.1: 4
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_ACF_CIMC.2.1: 1
- FDP_ACF_CIMC.3: 1
- FDP_ACF_CIMC.3.1: 1
- FDP_CIMC_BKP.1.1: 1
- FDP_CIMC_BKP.1.3: 1
- FDP_CIMC_BKP.2: 1
- FDP_CIMC_BKP.2.1: 1
- FDP_CIMC_CER.1.1: 1
- FDP_CIMC_CER.1.3: 1
- FDP_CIMC_CRL.1.1: 1
- FDP_CIMC_CSE.1: 1
- FDP_CIMC_CSE.1.1: 1
- FDP_CIMC_OCSP.1: 1
- FDP_CIMC_OCSP.1.1: 1
- FDP_ETC_CIMC.5: 1
- FDP_ETC_CIMC.5.1: 1
- FDP_ITT.1: 4
- FDP_ITT.1.1: 4
- FDP_SDI_CIMC.3.1: 1
- FDP_UCT.1: 1
- FDP_UCT.1.1: 2
- FIA:
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1.1: 2
- FIA_UAU.1: 2
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UID.1: 2
- FIA_UID.1.1: 2
- FIA_UID.1.2: 1
- FIA_USB.1: 1
- FIA_USB.1.1: 2
- FMT:
- FMT_MOF.1: 1
- FMT_MOF.1.1: 2
- FMT_MOF_CIMC.3.1: 1
- FMT_MOF_CIMC.3.3: 1
- FMT_MOF_CIMC.5: 1
- FMT_MOF_CIMC.5.1: 1
- FMT_MOF_CIMC.5.3: 1
- FMT_MOF_CIMC.6.1: 1
- FMT_MOF_CIMC.6.3: 1
- FMT_MSA.1: 2
- FMT_MSA.1.1: 3
- FMT_MSA.2.1: 1
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 1
- FMT_MTD.1: 2
- FMT_MTD.1.1: 3
- FMT_MTD_CIMC.4: 1
- FMT_MTD_CIMC.4.1: 1
- FMT_MTD_CIMC.5.1: 1
- FMT_MTD_CIMC.7.1: 1
- FMT_SMF: 1
- FMT_SMF.1.1: 3
- FMT_SMR.1.1: 1
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_AMT.1.1: 1
- FPT_CIMC_TSP.1: 1
- FPT_CIMC_TSP.1.1: 1
- FPT_CIMC_TSP.1.3: 1
- FPT_ITC.1: 1
- FPT_ITC.1.1: 2
- FPT_ITT.1: 2
- FPT_ITT.1.1: 6
- FPT_RVM.1: 1
- FPT_RVM.1.1: 1
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM.1: 1
- FPT_STM.1.1: 2
- FPT_TST_CIMC.2.1: 1
- FPT_TST_CIMC.2.2: 1
- FPT_TST_CIMC.3.1: 1
- FPT_TST_CIMC.3.2: 1
- FTP:
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Microsoft:
- STMicroelectronics:
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20050222184150+09'00'
- /ModDate: D:20050222184150+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 16296
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
pdf_data/st_filename |
|
KeyOne 4.0 Security Target.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 12
- ADV_FSP.4: 12
- ADV_IMP.1: 9
- ADV_TDS.3: 16
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 21
- AGD_PRE: 1
- AGD_PRE.1: 8
- ALC:
- ALC_CMC.4: 17
- ALC_CMS.4: 8
- ALC_DEL.1: 6
- ALC_DVS.1: 5
- ALC_FLR.2: 17
- ALC_LCD.1: 7
- ALC_TAT.1: 8
- ASE:
- ASE_CCL.1: 14
- ASE_ECD.1: 9
- ASE_INT.1: 10
- ASE_OBJ.2: 10
- ASE_REQ.2: 13
- ASE_SPD.1: 7
- ASE_TSS.1: 4
- ATE:
- ATE_COV.2: 6
- ATE_DPT.1: 6
- ATE_FUN.1: 9
- ATE_IND.2: 6
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 13
- FAU_GEN.1.1: 7
- FAU_GEN.1.2: 4
- FAU_GEN.2: 7
- FAU_GEN.2.1: 5
- FAU_SAR: 1
- FAU_SAR.1: 2
- FAU_SAR.1.1: 2
- FAU_SAR.1.2: 2
- FAU_SAR.3: 2
- FAU_SAR.3.1: 2
- FAU_SEL: 2
- FAU_SEL.1: 8
- FAU_SEL.1.1: 4
- FAU_STG: 2
- FAU_STG.1: 8
- FAU_STG.1.1: 5
- FAU_STG.1.2: 4
- FAU_STG.4: 8
- FAU_STG.4.1: 5
- FCO:
- FCO_NRO.2: 1
- FCO_NRO_CIMC: 2
- FCO_NRO_CIMC.3: 10
- FCO_NRO_CIMC.3.1: 3
- FCO_NRO_CIMC.3.2: 2
- FCO_NRO_CIMC.3.3: 3
- FCO_NRO_CIMC.4: 7
- FCO_NRO_CIMC.4.1: 3
- FCO_NRO_CIMC.4.2: 4
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 1
- FCS_CKM.1.1: 2
- FCS_CKM.4: 2
- FCS_CKM.4.1: 2
- FCS_CKM_CIMC: 3
- FCS_CKM_CIMC.5: 8
- FCS_CKM_CIMC.5.1: 3
- FCS_COP: 1
- FCS_COP.1: 1
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC: 6
- FDP_ACC.1: 15
- FDP_ACC.1.1: 5
- FDP_ACF: 3
- FDP_ACF.1: 14
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 6
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 5
- FDP_ACF_CIMC: 2
- FDP_ACF_CIMC.2: 9
- FDP_ACF_CIMC.2.1: 3
- FDP_ACF_CIMC.2.2: 3
- FDP_ACF_CIMC.3: 8
- FDP_ACF_CIMC.3.1: 4
- FDP_CIMC_BKP: 2
- FDP_CIMC_BKP.1: 11
- FDP_CIMC_BKP.1.1: 4
- FDP_CIMC_BKP.1.2: 2
- FDP_CIMC_BKP.1.3: 3
- FDP_CIMC_BKP.1.4: 3
- FDP_CIMC_BKP.2: 9
- FDP_CIMC_BKP.2.1: 5
- FDP_CIMC_BKP.2.2: 3
- FDP_CIMC_CER: 2
- FDP_CIMC_CER.1: 9
- FDP_CIMC_CER.1.1: 3
- FDP_CIMC_CER.1.2: 4
- FDP_CIMC_CER.1.3: 5
- FDP_CIMC_CER.1.4: 4
- FDP_CIMC_CRL: 2
- FDP_CIMC_CRL.1: 7
- FDP_CIMC_CRL.1.1: 4
- FDP_CIMC_CSE: 2
- FDP_CIMC_CSE.1: 7
- FDP_CIMC_CSE.1.1: 4
- FDP_CIMC_OCSP: 2
- FDP_CIMC_OCSP.1: 7
- FDP_CIMC_OCSP.1.1: 2
- FDP_ETC: 1
- FDP_ETC_CIMC: 2
- FDP_ETC_CIMC.5: 7
- FDP_ETC_CIMC.5.1: 2
- FDP_IFC.1: 3
- FDP_ITC: 1
- FDP_ITT: 2
- FDP_ITT.1: 14
- FDP_ITT.1.1: 11
- FDP_SDI: 1
- FDP_SDI_CIMC: 2
- FDP_SDI_CIMC.3: 7
- FDP_SDI_CIMC.3.1: 8
- FDP_SDI_CIMC.3.2: 4
- FDP_UCT: 3
- FDP_UCT.1: 8
- FDP_UCT.1.1: 5
- FDP_UIT: 1
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 1
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD: 2
- FIA_ATD.1: 6
- FIA_ATD.1.1: 5
- FIA_UAU: 2
- FIA_UAU.1: 10
- FIA_UAU.1.1: 5
- FIA_UAU.1.2: 4
- FIA_UID: 2
- FIA_UID.1: 16
- FIA_UID.1.1: 5
- FIA_UID.1.2: 4
- FIA_USB: 2
- FIA_USB.1: 7
- FIA_USB.1.1: 7
- FIA_USB.1.2: 2
- FIA_USB.1.3: 2
- FMT:
- FMT_MOF: 2
- FMT_MOF.1: 18
- FMT_MOF.1.1: 6
- FMT_MOF_CIMC: 2
- FMT_MOF_CIMC.3: 11
- FMT_MOF_CIMC.3.1: 4
- FMT_MOF_CIMC.3.2: 4
- FMT_MOF_CIMC.3.3: 3
- FMT_MOF_CIMC.3.4: 4
- FMT_MOF_CIMC.5: 11
- FMT_MOF_CIMC.5.1: 4
- FMT_MOF_CIMC.5.2: 4
- FMT_MOF_CIMC.5.3: 3
- FMT_MOF_CIMC.6: 6
- FMT_MOF_CIMC.6.1: 3
- FMT_MOF_CIMC.6.2: 2
- FMT_MOF_CIMC.6.3: 3
- FMT_MSA: 2
- FMT_MSA.1: 14
- FMT_MSA.1.1: 8
- FMT_MSA.2: 2
- FMT_MSA.2.1: 2
- FMT_MSA.3: 10
- FMT_MSA.3.1: 5
- FMT_MSA.3.2: 4
- FMT_MTD: 2
- FMT_MTD.1: 10
- FMT_MTD.1.1: 7
- FMT_MTD_CIMC: 2
- FMT_MTD_CIMC.4: 8
- FMT_MTD_CIMC.4.1: 3
- FMT_MTD_CIMC.5: 8
- FMT_MTD_CIMC.5.1: 3
- FMT_MTD_CIMC.7: 7
- FMT_MTD_CIMC.7.1: 3
- FMT_SMF: 3
- FMT_SMF.1: 12
- FMT_SMF.1.1: 6
- FMT_SMR: 2
- FMT_SMR.1: 16
- FMT_SMR.1.1: 3
- FMT_SMR.1.2: 1
- FMT_SMR.2: 1
- FMT_SMR.2.1: 2
- FMT_SMR.2.2: 2
- FMT_SMR.2.3: 2
- FPT:
- FPT_ACC: 2
- FPT_ACC.1: 2
- FPT_ACC.1.1: 1
- FPT_ACC.1.2: 1
- FPT_AMT: 1
- FPT_AMT.1: 1
- FPT_AMT.1.1: 2
- FPT_CIMC_TSP: 2
- FPT_CIMC_TSP.1: 8
- FPT_CIMC_TSP.1.1: 3
- FPT_CIMC_TSP.1.2: 2
- FPT_CIMC_TSP.1.3: 5
- FPT_CIMC_TSP.1.4: 2
- FPT_ITC: 2
- FPT_ITC.1: 6
- FPT_ITC.1.1: 5
- FPT_ITT: 2
- FPT_ITT.1: 9
- FPT_ITT.1.1: 13
- FPT_RVM: 1
- FPT_RVM.1: 4
- FPT_RVM.1.1: 3
- FPT_SEP: 1
- FPT_SEP.1: 1
- FPT_SEP.1.1: 2
- FPT_SEP.1.2: 2
- FPT_STM: 2
- FPT_STM.1: 10
- FPT_STM.1.1: 6
- FPT_TST_CIMC.2: 5
- FPT_TST_CIMC.2.1: 2
- FPT_TST_CIMC.2.2: 2
- FPT_TST_CIMC.3: 2
- FPT_TST_CIMC.3.1: 2
- FPT_TST_CIMC.3.2: 2
- FTP:
- FTP_ITC.1: 3
- FTP_TRP: 1
- FTP_TRP.1: 4
- FTP_TRP.1.1: 2
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- FIPS 140-1: 22
- FIPS 140-2: 12
- FIPS 46-3: 2
- FIPS PUB 180-2: 1
- FIPS PUB 186-2: 2
- FIPS PUB 197: 2
- ICAO:
- ISO:
- PKCS:
- PKCS #1: 1
- PKCS #11: 3
- PKCS #12: 1
- PKCS #7: 4
- PKCS#1: 2
- RFC:
- RFC 2560: 8
- RFC 3039: 2
- RFC 3280: 2
- RFC 3739: 1
- RFC 4210: 1
- RFC 4211: 2
- RFC 4511: 1
- RFC 5280: 1
- RFC 5652: 1
- RFC2560: 2
- RFC3039: 2
- RFC3280: 2
- RFC3739: 2
- RFC4210: 2
- RFC4211: 1
- RFC4511: 2
- RFC5280: 2
- RFC5652: 2
- RFC6960: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Approvers: montse
- /Author: montse
- /Category: CC, Common Criteria, EAL4, Security Target, Certification, KeyOne 4.0
- /Company: Safelayer Secure Communications, S.A.
- /CreationDate: D:20140903145446+02'00'
- /Creator: Acrobat PDFMaker 9.1 for Word
- /Department: Security Target
- /DocumentID: 95A278AC
- /Editors: montse,QUALITY
- /FrontCoverHeading: KeyOne 4.0
- /FrontCoverHeading2:
- /Keywords: CC, Common Criteria, EAL4, Security Target, Certification, KeyOne 4.0
- /Language: EN
- /ModDate: D:20140903145548+02'00'
- /Producer: Adobe PDF Library 9.0
- /ProductFamily: N/A
- /Readers: montse,QUALITY,ALL
- /Reviewers: montse
- /SourceModified: D:20140903124927
- /State: Issued
- /Subject: The Security Target documents the security functional and assurance requirements for the CC EAL4+ Certification of KeyOne 4.0 product
- /Title: KeyOne 4.0 Security Target
- /TranslatedFrom: Original
- /Version: 2.1
- pdf_file_size_bytes: 1144561
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 183
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
False |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |