| name |
EPSON LX-10050MF/LX-10050KF/LX-7550MF/LX-6050MF/WF-C21000/WF-C20750/WF-C20600 with FAX 2.00 |
STARCOS 3.5 ID GCC C3 |
| category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
JP |
DE |
| status |
active |
archived |
| not_valid_after |
26.01.2026 |
16.12.2021 |
| not_valid_before |
26.01.2021 |
16.12.2016 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0700_eimg.pdf |
|
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0700_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0952V2a_pdf.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0700_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0952V2b_pdf.pdf |
| manufacturer |
SEIKO EPSON CORPORATION |
G+D Mobile Security GmbH |
| manufacturer_web |
https://www.epson.com/ |
https://www.gi-de.com/de/de/mobile-security/ |
| security_level |
ALC_FLR.2, EAL2 |
EAL4+, ATE_DPT.2, AVA_VAN.5, ALC_DVS.2 |
| dgst |
727e9aeadc392384 |
aaa5c2239e7c1d9e |
| heuristics/cert_id |
JISEC-CC-CRP-C0700-01-2021 |
BSI-DSZ-CC-0952-V2-2016 |
| heuristics/cert_lab |
[] |
BSI |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ALC_FLR.2, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
ADV_TDS.3, ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMC.5, AVA_VAN.5, ASE_INT.1, APE_ECD.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.3, ASE_ECD.1, APE_OBJ.2, ALC_TAT.3, ADV_IMP.1, ADV_FSP.4, ALC_DVS.2, ATE_DPT.2, ASE_SPD.1, APE_INT.1, ATE_COV.3, ADV_INT.3, ALC_LCD.2, ASE_TSS.2, ALC_CMS.5, APE_CCL.1, AGD_OPE.1, APE_SPD.1, ALC_DEL.1, ADV_ARC.1, ADV_SPM.1, APE_REQ.2 |
| heuristics/extracted_versions |
2.00 |
3.5 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0829-V2-2015, BSI-DSZ-CC-0952-2014 |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0751-2013, BSI-DSZ-CC-0952-2014, BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0829-V2-2015, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0829-2012 |
| heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0700
- certification_date: 01.01.2021
- claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- enhanced:
- assurance_level: EAL2 Augmented by ALC_FLR.2
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0700
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck9900000015ma-att/c0700_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This TOE is a multifunction peripheral(MFP) that has the functions, such as copy, print, scan, FAX, document storage and retrieval. This TOE provides Security Functions required for "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for MFPs. TOE Security functions The security functions of this TOE are as follows: Identification and Authentication Function Function to identify and authenticate users. Access Control Function for TOE Function Function to restrict available functions for each authorized user. Document Access Control Function Function to allow only the authorized users and the administrator to access to stored documents. Residual Data Overwrite Function Function to overwrite and delete unnecessary document data in the HDD and the Flash ROM. Network Protection Function Function to protect communication data using encryption communication protocols. Security Management Function Function to allow only the administrator to manage security functions. Self-Test Function Function to verify the integrity of executable codes at startup. Audit Log Function Function to record audit logs related to security events and allow only the administrator to view that log.
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: EPSON LX-10050MF/LX-10050KF/ LX-7550MF/LX-6050MF/WF-C21000/ WF-C20750/WF-C20600 with FAX
- product_type: Multifunction Peripheral
- protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck9900000015ma-att/c0700_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck9900000015ma-att/c0700_est.pdf
- toe_version: 2.00
- vendor: SEIKO EPSON CORPORATION
- expiration_date:
- supplier: SEIKO EPSON CORPORATION
- toe_japan_name: EPSON LX-10050MF / LX-10050KF / LX-7550MF / LX-6050MF / WF-C21000 / WF-C20750 / WF-C20600 with FAX2.00
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0700_it0740.html
- toe_overseas_name: EPSON LX-10050MF / LX-10050KF / LX-7550MF / LX-6050MF / WF-C21000 / WF-C20750 / WF-C20600 with FAX2.00
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
43ce79b420f23a00 |
0e62a9ea5e7ca3a7 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0061b_pdf.pdf |
| pdf_data/cert_filename |
c0700_eimg.pdf |
|
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0700-01-2021: 1
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20210316093833+09'00'
- /Creator: Microsoft® Word for Office 365
- /ModDate: D:20210316095049+09'00'
- /Producer: Microsoft® Word for Office 365
- pdf_file_size_bytes: 131374
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
|
| pdf_data/report_filename |
c0700_erpt.pdf |
0952V2a_pdf.pdf |
| pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5 The IT Product identified in this certificate has been evaluated at an approved evaluation facility using the Common Methodology for IT Security Evaluation (CEM), Version 3.1 extended by Scheme Interpretations, by advice of the Certification Body for components beyond EAL 5 and CC Supporting Documents as listed in the Certification Report for conformance to the Common Criteria for IT Security Evaluation (CC), Version 3.1. CC and CEM are also published as ISO/IEC 15408 and ISO/IEC 18045. (*) This certificate applies only to the specific version and release of the product in its evaluated configuration and in conjunction with the complete Certification Report and Notification. For details on the validity see Certification Report part A chapter 4 (**
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0952-V2-2016
- cert_item: STARCOS 3.5 ID GCC C3
- cert_lab: BSI
- developer: Giesecke & Devrient GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Common Criteria Protection Profile Electronic Identity Card (ID_Card PP), Version 1.03, 15 December 2009, BSI-CC-PP-0061-2009 (**) and in accordance with BSI Technische Richtlinie BSI-TR-03116-2, 2016
|
| pdf_data/report_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0700-01-2021: 1
|
- DE:
- BSI-DSZ-CC-0829-V2-2015: 4
- BSI-DSZ-CC-0829-V2-2015-MA-01: 1
- BSI-DSZ-CC-0952-2014: 4
- BSI-DSZ-CC-0952-V2-2016: 21
- BSI-DSZ-CC-S-0053-2016: 2
- BSI-DSZ-CC-S-0057-2015: 2
- BSI-DSZ-CC-S-0062-2016: 2
- BSI-DSZ-CC-S-0070-2016: 2
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 3
- BSI-CC-PP-0061-2009: 4
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 4
- EAL2 augmented: 2
|
- EAL:
- EAL 1: 7
- EAL 2: 4
- EAL 3: 4
- EAL 4: 13
- EAL 4 augmented: 3
- EAL 5: 8
- EAL 5+: 1
- EAL 6: 4
- EAL 7: 4
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 3
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 6
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.ADMIN: 2
- A.USER: 1
- T:
- T.CONF: 4
- T.DOC: 4
- T.FUNC: 2
- T.PROT: 2
|
|
| pdf_data/report_keywords/vendor |
|
- GD:
- G&D: 1
- Giesecke & Devrient: 17
- Infineon:
- Infineon: 4
- Infineon Technologies: 1
|
| pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 4
|
- SRC:
- SRC Security Research & Consulting: 3
- TUV:
- TÜV Informationstechnik: 1
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- Fault Injection: 1
- fault injection: 1
- physical tampering: 1
- SCA:
- other:
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
- BSI:
- AIS 20: 1
- AIS 25: 2
- AIS 26: 2
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 4
- AIS 38: 1
- ICAO:
- ISO:
- ISO/IEC 15408: 6
- ISO/IEC 17065: 2
- ISO/IEC 18045: 6
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Evaluation Technical Report (ETR) STARCOS 3.5 ID GCC C3, SRC Security Research & Consulting GmbH (confidential document) 10 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie für: 1
- M7820 A11, Version 5, 16.07.2015, TÜV Informationstechnik GmbH, Evaluation Body for IT Security (confidential document) [11] STARCOS 3.5 ID GCC C2 Configuration 1, Application Specification, Version 1.0, 14.03.2013: 1
- Version 1.10, 06.12.2016, STARCOS 3.5 ID GCC C3 Security Target, Giesecke & Devrient GmbH (confidential document) [7] Common Criteria Protection Profile Electronic Identity Card (ID_Card PP), Version 1.03, 15: 1
- Version 1.2, 06.12.2016, Konfigurationsliste von STARCOS 3.5 ID GCC C3, Giesecke & Devrient GmbH (confidential document) [30] BSI-CC-PP-0059-2009-MA-02, Common Criteria Protection Profile: EN 419211-2:2013 - Protection: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
| pdf_data/report_metadata |
- /Author:
- /CreationDate: D:20210511131831+09'00'
- /Creator: Word 用 Acrobat PDFMaker 17
- /ModDate: D:20210511132137+09'00'
- /Producer: Adobe PDF Library 15.0
- /SourceModified: D:20210511032544
- pdf_file_size_bytes: 338575
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 34
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20161230094202+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Giesecke & Devrient GmbH, G&D, StarCOS, nPA, Personalausweis"
- /ModDate: D:20161230111155+01'00'
- /Producer: LibreOffice 4.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0952-V2-2016
- pdf_file_size_bytes: 1122731
- pdf_hyperlinks: https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/zertifizierung, https://standards.cen.eu/, http://www.beuth.de/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/, http://www.sogisportal.eu/
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
| pdf_data/st_filename |
c0700_est.pdf |
0952V2b_pdf.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0829-V2-2015-MA-01: 1
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0084-2014: 1
- BSI-CC-PP-0059-2009-MA-02: 2
- BSI-CC-PP-0061: 2
- BSI-PP-0055: 1
- BSI-PP-0056: 2
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 3
- EAL 2 augmented: 1
|
- EAL:
- EAL 4: 2
- EAL 5: 2
- EAL4: 13
- EAL4 augmented: 3
- EAL5+: 1
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 5
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 4
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_DVS.1: 1
- ALC_DVS.2: 9
- APE:
- ASE:
- ATE:
- ATE_DPT.1: 2
- ATE_DPT.2: 9
- ATE_FUN.1: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 16
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_SAR.1: 10
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 5
- FAU_SAR.2.1: 1
- FAU_STG.1: 9
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 5
- FAU_STG.4.1: 1
- FDP:
- FDP_ACC.1: 30
- FDP_ACC.1.1: 2
- FDP_ACF.1: 24
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 6
- FDP_ACF.1.4: 2
- FDP_IFC: 1
- FDP_IFC.1: 4
- FDP_IFF: 1
- FDP_RIP.1: 7
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU.1: 15
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UID.1: 24
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 23
- FMT_MSA.1.1: 2
- FMT_MSA.3: 22
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 8
- FMT_MTD.1.1: 2
- FMT_SMF.1: 25
- FMT_SMF.1.1: 1
- FMT_SMR.1: 33
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FDI_EXP: 3
- FPT_FDI_EXP.1: 12
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1: 11
- FPT_STM.1.1: 1
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 8
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 13
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 5
- FAU_SAS.1: 18
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 52
- FCS_CKM.1: 16
- FCS_CKM.2: 4
- FCS_CKM.4: 20
- FCS_COP: 55
- FCS_COP.1: 11
- FCS_RND: 7
- FCS_RND.1: 12
- FCS_RND.1.1: 2
- FCS_RNG.1: 4
- FDP:
- FDP_ACC: 16
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF: 23
- FDP_ACF.1: 21
- FDP_IFC.1: 5
- FDP_ITC.1: 7
- FDP_ITC.2: 8
- FDP_ITT.1: 1
- FDP_RIP: 4
- FDP_RIP.1: 13
- FDP_SDI: 14
- FDP_SDI.1: 3
- FDP_SDI.2: 4
- FIA:
- FIA_AFL: 33
- FIA_AFL.1: 6
- FIA_API: 20
- FIA_API.1: 4
- FIA_API.1.1: 3
- FIA_SOS.2: 1
- FIA_UAU: 45
- FIA_UAU.1: 8
- FIA_UAU.4: 6
- FIA_UAU.4.1: 1
- FIA_UAU.5: 13
- FIA_UAU.6: 7
- FIA_UIA: 1
- FIA_UID: 25
- FIA_UID.1: 9
- FMT:
- FMT_LIM: 14
- FMT_LIM.1: 16
- FMT_LIM.1.1: 2
- FMT_LIM.2: 15
- FMT_LIM.2.1: 2
- FMT_MOF: 3
- FMT_MSA: 15
- FMT_MSA.1: 4
- FMT_MSA.3: 6
- FMT_MTD: 86
- FMT_MTD.1: 4
- FMT_MTD.1.1: 1
- FMT_MTD.3: 9
- FMT_SMF: 5
- FMT_SMF.1: 37
- FMT_SMR: 5
- FMT_SMR.1: 29
- FPT:
- FPT_FLS: 3
- FPT_FLS.1: 13
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP: 6
- FPT_PHP.1: 5
- FPT_PHP.3: 14
- FPT_TST: 2
- FPT_TST.1: 15
- FPT_TST.1.3: 1
- FPT_TST.2: 3
- FRU:
- FTP:
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.ADMIN: 6
- A.USER: 3
- D:
- D.CONF: 11
- D.DOC: 42
- D.FUNC: 26
- D.PROT: 8
- O:
- O.AUDIT: 5
- O.AUDIT_ACCESS: 4
- O.AUDIT_STORAGE: 4
- O.CONF: 10
- O.DOC: 10
- O.FUNC: 5
- O.INTERFACE: 5
- O.PROT: 5
- O.SOFTWARE: 5
- O.USER: 11
- OE:
- OE.ADMIN: 6
- OE.AUDIT: 3
- OE.AUDIT_ACCESS: 2
- OE.AUDIT_STORAGE: 2
- OE.INTERFACE: 3
- OE.PHISICAL: 1
- OE.PHYSICAL: 2
- OE.USER: 12
- T:
- T.CONF: 6
- T.DOC: 6
- T.FUNC: 3
- T.PROT: 3
|
- A:
- O:
- OE:
- OE.CGA_SSCD: 3
- OE.CGA_TC_SVD: 2
- OE.HID_TC_VAD: 1
- OE.HID_VAD: 2
- OE.SCA_TC_DTBS: 1
- T:
|
| pdf_data/st_keywords/vendor |
|
- GD:
- Infineon:
- Infineon: 3
- Infineon Technologies AG: 1
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 2
- SHA-256: 5
- SHA-384: 3
- SHA-512: 3
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 14
- Physical Tampering: 4
- Physical tampering: 2
- fault injection: 1
- malfunction: 6
- physical tampering: 7
- SCA:
- DPA: 2
- Leak-Inherent: 6
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- BSI:
- AIS 20: 1
- AIS 31: 1
- AIS20: 1
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 197: 1
- FIPS PUB 180-2: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-2: 1
- ISO/IEC 7816-4: 1
- PKCS:
- RFC:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- to the plastic Identity Card is achieved by physical and organisational security measures being out of scope of the current ST. The TOE shall comprise at least a) the circuitry of the contactless chip incl: 1
|
| pdf_data/st_metadata |
- /Author: 0086205
- /CreationDate: D:20210510172238+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20210510172238+09'00'
- /Producer: Acrobat Distiller 15.0 (Windows)
- /Title: Microsoft Word - ST_en修正.docx
- pdf_file_size_bytes: 847659
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 73
|
- /Author: eij
- /CreationDate: D:20161216094745+01'00'
- /Creator: Microsoft® Word 2010
- /Keywords: Common Criteria, Certification, Zertifizierung, Giesecke & Devrient GmbH, G&D, StarCOS, nPA, Personalausweis, eID, electronic identity, eGovernment, eIDAS, QES, qualified electronic signature, travel document, passport
- /ModDate: D:20161216094745+01'00'
- /Producer: Microsoft® Word 2010
- /Subject: STARCOS 3.5 ID GCC C3
- /Title: Security Target Lite
- pdf_file_size_bytes: 2002351
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 133
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
False |
| state/cert/download_ok |
True |
False |
| state/cert/extract_ok |
True |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |