name |
System Software for e-STUDIO202L/232/282 V1.0 |
Philips P541G072V0P (JCOP 41 v2.2) |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
DE |
status |
archived |
archived |
not_valid_after |
10.12.2010 |
01.09.2019 |
not_valid_before |
29.03.2006 |
31.08.2006 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0043_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0294a.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0043_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0294b.pdf |
manufacturer |
Toshiba TEC Corporation |
Philips Semiconductors GmbH |
manufacturer_web |
https://www.toshibatec.co.jp/en/ |
https://www.philips.com/ |
security_level |
EAL3 |
ADV_IMP.2, EAL4+, ALC_DVS.2 |
dgst |
79cf3cf36c8217af |
512bbfc881dbe9ed |
heuristics/cert_id |
JISEC-CC-CRP-C0043 |
BSI-DSZ-CC-0294-2006 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
ASE_ENV.1, ADV_RCR.1, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ALC_DVS.2, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, ADV_FSP.2, AVA_SOF.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ADV_IMP.2, ATE_DPT.1, AVA_VLA.4, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1, AVA_MSU.3 |
heuristics/extracted_versions |
1.0 |
2.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0426-2007 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0348-2006 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0426-2007 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0348-2006 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0043
- certification_date: 01.03.2006
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cert_link: https://www.ipa.go.jp/en/security/c0043_eimg.pdf
- description: PRODUCT DESCRIPTION The TOE is the system software of the digital multi function device “ e-STUDIO202L/232/282 ” manufactured by TOSHIBA TEC CORPORATION. The system software provides general functions as a digital multifunction device as well as the function of data overwrite and complete deletion on the user document data deleted from the e-STUDIO202L/232/282 HDD. The function of data overwrite and complete deletion includes the function to collectively and completely delete all user document data from the HDD before the HDD is disposed or replaced. This function also prevents unauthorized restore of data.
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc.
- product: System Software for e-STUDIO202L/232/282
- product_type: IT Product ( data protection function in Multi Function Device )
- report_link: https://www.ipa.go.jp/en/security/c0043_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0043_est.pdf
- toe_version: V1.0
- vendor: TOSHIBA TEC CORPORATION
- expiration_date: 01.01.2011
- supplier: TOSHIBA TEC CORPORATION
- toe_japan_name: System Software for e-STUDIO202L/232/282 V1.0
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0043_it5057.html
- toe_overseas_name: System Software for e-STUDIO 202L/232/282 V1.0
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0348-2006 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0348-2006 |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0043_erpt.pdf |
0294a.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0294-2006
- cert_item: Philips P541G072V0P (JCOP 41 v2.2
- cert_lab: BSI
- developer: IBM Deutschland Entwicklung GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0043-01: 1
- Certification No. C0043: 1
|
- DE:
- BSI-DSZ-CC-0294-2006: 21
- BSI-DSZ-CC-0348: 1
- BSI-DSZ-CC-0348-: 1
- BSI-DSZ-CC-0348-2006: 3
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 4: 4
- EAL 4 augmented: 2
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 11
- EAL4 augmented: 1
- EAL5: 7
- EAL5 augmented: 1
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_FSP.2: 1
- ADV_HLD: 2
- ADV_HLD.2: 1
- ADV_IMP: 2
- ADV_IMP.2: 5
- ADV_INT: 2
- ADV_LLD: 2
- ADV_LLD.1: 1
- ADV_RCR: 2
- ADV_RCR.1: 1
- ADV_SPM: 2
- ADV_SPM.1: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 1
- AGD_USR: 2
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 6
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT: 2
- ATE_DPT.1: 1
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_IND: 2
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.2: 1
- AVA_MSU.3: 1
- AVA_SOF: 3
- AVA_SOF.1: 1
- AVA_VLA: 4
- AVA_VLA.2: 2
- AVA_VLA.3: 1
- AVA_VLA.4: 2
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.2: 1
- FCS_CKM.3: 1
- FCS_CKM.4: 1
- FCS_COP: 7
- FCS_RND.1: 1
- FDP:
- FDP_ACC: 2
- FDP_ACF: 2
- FDP_ETC.1: 1
- FDP_IFC: 2
- FDP_IFF: 2
- FDP_ITC.1: 1
- FDP_RIP: 6
- FDP_ROL: 1
- FDP_SDI.2: 1
- FIA:
- FIA_AFL: 2
- FIA_ATD: 1
- FIA_UAU: 2
- FIA_UAU.1: 1
- FIA_UID: 2
- FIA_USB.1: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MSA: 8
- FMT_MTD: 1
- FMT_MTD.3: 1
- FMT_SMF.1: 1
- FMT_SMR: 3
- FPR:
- FPT:
- FPT_AMT: 1
- FPT_FLS: 2
- FPT_PHP: 1
- FPT_RVM: 1
- FPT_RVM.1: 1
- FPT_SEP: 1
- FPT_SEP.1: 1
- FPT_TST.1: 1
- FRU:
- FTP:
|
pdf_data/report_keywords/cc_claims |
- T:
- T.STOREDATA_ACCESS: 1
- T.TEMPDATA_ACCESS: 1
|
- A:
- A.DLV_PROTECT: 1
- A.NATIVE: 1
- A.NO-DELETION: 1
- A.NO-INSTALL: 1
- A.TEST_OPERATE: 1
- A.USE_DIAG: 1
- A.USE_KEYS: 1
- A.VERIFICATION: 1
- OSP:
- T:
- T.ACCESS_DATA: 1
- T.CONFID-APPLI-DATA: 1
- T.CONFID-JCS-CODE: 1
- T.CONFID-JCS-DATA: 1
- T.DEL: 1
- T.DEL_IC_NOS: 1
- T.DEV_IC: 1
- T.DEV_NOS: 1
- T.EXE-CODE: 2
- T.FAULT: 1
- T.INTEG-APPLI-CODE: 1
- T.INTEG-APPLI-DATA: 1
- T.INTEG-JCS-CODE: 1
- T.INTEG-JCS-DATA: 1
- T.LEAKAGE: 1
- T.NATIVE: 1
- T.OS_DECEIVE: 1
- T.OS_OPERATE: 1
- T.PHYSICAL: 1
- T.RESOURCES: 1
- T.RND: 1
- T.SID: 2
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 2
- CCIMB-99-033: 2
- ISO:
|
- BSI:
- AIS 20: 4
- AIS 25: 2
- AIS 26: 2
- AIS 32: 1
- AIS 34: 3
- AIS 36: 3
- ISO:
- SCP:
|
pdf_data/report_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
- Java Card 2.2.1: 1
- JavaCard 2.2.1: 1
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Report (ETR), Version 3, 10. July 2006, CC Evaluation of Philips P541G072V0P (JCOP 41 v2.2) (confidential document) [9] Java Card System – Minimal Configuration Protection Profile (registered at DCSSI under: 1
- v2.2) Secure Smart Card Controller, Version 2.2, 25. March 2006, IBM Deutschland Entwicklung GmbH (confidential document) [7] Security Target lite Philips P541G072V0P (JCOP 41, v2.2) Secure Smart Card Controller, Version: 1
|
pdf_data/report_metadata |
- /Author:
- /CreationDate: D:20060515142139+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20060515142342+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title:
- pdf_file_size_bytes: 546561
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
- /Author: Bundesamt für Sicherheit in der informationstechnik
- /Company: BSI Bonn
- /CreationDate: D:20060928154201+02'00'
- /Creator: Acrobat PDFMaker 7.0.7 für Word
- /Keywords: Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-0294
- /ModDate: D:20060928154453+02'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /SourceModified: D:20060928134130
- /Title: Certification Report BSI-DSZ-CC-0294-2006
- pdf_file_size_bytes: 314369
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 44
|
pdf_data/st_filename |
c0043_est.pdf |
0294b.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0348: 1
- BSI-DSZ-CC-0348-2006: 3
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002: 2
- BSI-PP-0017: 4
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 27
- EAL4 augmented: 8
- EAL5: 2
- EAL5 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 3
- ACM_SCP.1: 1
- ADO:
- ADO_DEL.1: 3
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 3
- ADV_HLD.2: 1
- ADV_RCR.1: 3
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 1
- ALC:
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 1
- ATE_FUN.1: 3
- ATE_IND.2: 1
- AVA:
- AVA_MSU.1: 3
- AVA_SOF.1: 2
- AVA_VLA.1: 3
|
- ACM:
- ACM_AUT.1: 2
- ACM_CAP.4: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL.2: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.2: 2
- ADV_HLD.2: 2
- ADV_IMP.1: 2
- ADV_IMP.2: 13
- ADV_LLD.1: 3
- ADV_RCR.1: 3
- ADV_SPM.1: 10
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ALC_DVS: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 14
- ALC_LCD.1: 2
- ALC_TAT.1: 3
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 3
- AVA:
- AVA_MSU.2: 1
- AVA_MSU.3: 2
- AVA_SOF.1: 2
- AVA_VLA.2: 7
- AVA_VLA.3: 4
- AVA_VLA.4: 2
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_RIP.1: 11
- FDP_RIP.1.1: 1
- FDP_RIP.2: 8
- FPT:
- FPT_RVM.1: 12
- FPT_RVM.1.1: 1
|
- FAU:
- FAU_ARP: 6
- FAU_ARP.1: 8
- FAU_GEN.1: 5
- FAU_SAA.1: 13
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FCS:
- FCS_CKM.1: 15
- FCS_CKM.1.1: 1
- FCS_CKM.2: 9
- FCS_CKM.2.1: 1
- FCS_CKM.3: 7
- FCS_CKM.3.1: 1
- FCS_CKM.4: 17
- FCS_CKM.4.1: 1
- FCS_COP: 15
- FCS_COP.1: 9
- FCS_COP.1.1: 7
- FCS_RND: 3
- FCS_RND.1: 16
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 9
- FDP_ACC.1: 22
- FDP_ACC.2: 7
- FDP_ACF: 8
- FDP_ACF.1: 27
- FDP_ETC.1: 8
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC: 4
- FDP_IFC.1: 24
- FDP_IFC.2: 5
- FDP_IFF: 4
- FDP_IFF.1: 19
- FDP_IFF.2: 12
- FDP_IFF.2.7: 1
- FDP_ITC.1: 16
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 8
- FDP_RIP: 12
- FDP_RIP.1: 21
- FDP_ROL: 3
- FDP_ROL.1: 10
- FDP_SDI.2: 9
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_AFL: 9
- FIA_AFL.1: 9
- FIA_ATD: 2
- FIA_ATD.1: 9
- FIA_UAU: 4
- FIA_UAU.1: 11
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.3: 8
- FIA_UAU.4: 7
- FIA_UID: 7
- FIA_UID.1: 14
- FIA_UID.2: 6
- FIA_USB.1: 10
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 20
- FMT_LIM.1.1: 2
- FMT_LIM.2: 20
- FMT_LIM.2.1: 2
- FMT_MSA: 23
- FMT_MSA.1: 27
- FMT_MSA.2: 21
- FMT_MSA.3: 28
- FMT_MTD: 4
- FMT_MTD.1: 9
- FMT_MTD.3: 8
- FMT_MTD.3.1: 1
- FMT_SMF.1: 16
- FMT_SMF.1.1: 1
- FMT_SMR: 11
- FMT_SMR.1: 35
- FPR:
- FPR_UNO.1: 9
- FPR_UNO.1.1: 1
- FPT:
- FPT_AMT: 3
- FPT_AMT.1: 8
- FPT_FLS: 8
- FPT_FLS.1: 16
- FPT_PHP: 4
- FPT_PHP.3: 6
- FPT_RVM: 3
- FPT_RVM.1: 15
- FPT_RVM.1.1: 1
- FPT_SEP: 4
- FPT_SEP.1: 14
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TST.1: 9
- FPT_TST.1.1: 2
- FPT_TST.1.2: 2
- FPT_TST.1.3: 1
- FRU:
- FRU_FLT: 4
- FRU_FLT.1: 2
- FRU_FLT.2: 7
- FRU_RSA: 1
- FRU_RSA.1: 4
- FTP:
|
pdf_data/st_keywords/cc_claims |
- O:
- O.STOREDATA_OVERWRITE: 4
- O.TEMPDATA_OVERWRITE: 6
- OE:
- OE.HDD_ERASE: 3
- OE.OVERWRITE_COMPLETE: 3
- T:
- T.STOREDATA_ACCESS: 3
- T.TEMPDATA_ACCESS: 4
|
- A:
- A.DLV_DATA: 1
- A.DLV_PROTECT: 4
- A.NATIVE: 10
- A.NO: 1
- A.NO-DELETION: 5
- A.NO-INSTALL: 5
- A.TEST_OPERATE: 6
- A.USE_DIAG: 5
- A.USE_KEY: 1
- A.USE_KEYS: 4
- A.VERIFICATION: 6
- D:
- D.API_DATA: 3
- D.APP_CODE: 8
- D.APP_C_DATA: 3
- D.APP_I_DATA: 6
- D.APP_KEY: 1
- D.CRYPTO: 7
- D.JAVA_OBJECT: 2
- D.JCS_CODE: 3
- D.JCS_DATA: 4
- D.PIN: 14
- D.SEC_DATA: 5
- O:
- O.ALARM: 5
- O.CARD-MANAGEMENT: 9
- O.CIPHER: 9
- O.FAULT_PROTECT: 6
- O.FIREWALL: 12
- O.KEY-MNGT: 8
- O.NATIVE: 7
- O.OPERATE: 24
- O.OS_DECEIVE: 9
- O.PHYSICAL: 7
- O.PIN-MNGT: 5
- O.PROTECT_DATA: 18
- O.REALLOCATION: 4
- O.RESOURCES: 8
- O.RND: 8
- O.SCP: 29
- O.SHRD_VAR_CONFID: 3
- O.SHRD_VAR_INTEG: 7
- O.SID: 10
- O.SIDE_CHANNEL: 7
- O.TRANSACTION: 5
- O.XYZ: 1
- OE:
- OE.CARD-: 1
- OE.CARD-MANAGEMENT: 2
- OE.DEL_NOS: 4
- OE.DEV_NOS: 3
- OE.DLV_DATA: 5
- OE.DLV_PROTECT: 3
- OE.IC_ORG: 5
- OE.NATIVE: 5
- OE.NO-DELETION: 3
- OE.NO-INSTALL: 4
- OE.SCP: 8
- OE.TEST_OPERATE: 5
- OE.USE_DIAG: 6
- OE.USE_KEY: 1
- OE.USE_KEYS: 6
- OE.VERIFICATION: 12
- OE.XYZ: 1
- OP:
- OP.ARRAY_ACCESS: 3
- OP.BYTECODE: 1
- OP.CREATE: 8
- OP.INSTANCE_FIELD: 1
- OP.INVK_INTERFACE: 4
- OP.INVK_VIRTUAL: 3
- OP.JAVA: 6
- OP.PUT: 5
- OP.THROW: 3
- OP.TYPE_ACCESS: 3
- OSP:
- R:
- T:
- T.ACCESS_DATA: 4
- T.CONFID-APPLI-DATA: 5
- T.CONFID-JCS-CODE: 4
- T.CONFID-JCS-DATA: 5
- T.DEL: 6
- T.DEL_IC_NOS: 7
- T.DEV_IC: 5
- T.DEV_NOS: 6
- T.EXE-CODE: 8
- T.FAULT: 4
- T.INTEG-: 1
- T.INTEG-APPLI-CODE: 2
- T.INTEG-APPLI-DATA: 5
- T.INTEG-JCS-CODE: 4
- T.INTEG-JCS-DATA: 3
- T.LEAKAGE: 4
- T.NATIVE: 6
- T.OS: 3
- T.OS_DECEIVE: 4
- T.OS_OPERATE: 5
- T.PHYSICAL: 4
- T.RESOURCES: 4
- T.RND: 4
- T.SID: 9
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 2
- Triple-DES: 5
- TripleDES: 4
- DES:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Physical tampering: 2
- fault injection: 1
- malfunction: 4
- physical tampering: 2
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 4
- side channel: 1
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
- FIPS:
- FIPS 180-1: 3
- FIPS 197: 3
- FIPS 46-3: 3
- PKCS:
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- Global Platform 2.1.1: 3
- GlobalPlatform 2.1.1: 2
- JavaCard:
- Java Card 2.1.1: 3
- Java Card 2.1.2: 1
- Java Card 2.2: 3
- Java Card 2.2.1: 9
- JavaCard 2.2.1: 3
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 2
- javacard.framework.applet: 1
- javacard.security: 4
- javacardx:
- javacardx.crypto: 4
- javacardx.security: 1
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /CreationDate: D:20060512044538Z
- /ModDate: D:20060731114807+09'00'
- /Producer: Acrobat Distiller 5.0 (Windows)
- /Subject: 2006/7/31 update
- pdf_file_size_bytes: 741778
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
- /Author: Schilling
- /CreationDate: D:20060828133033+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20060828192730+02'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /Title: Microsoft Word - ST-Lite_JCOP41_v10.doc
- pdf_file_size_bytes: 565575
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 133
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |