Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
System Software for e-STUDIO202L/232/282 V1.0
JISEC-CC-CRP-C0043
KOMSCO JK21 V1.0 on S3CT9KA/KC/KW
KECS-ISIS-0468-2013
name System Software for e-STUDIO202L/232/282 V1.0 KOMSCO JK21 V1.0 on S3CT9KA/KC/KW
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP KR
not_valid_after 10.12.2010 01.06.2019
not_valid_before 29.03.2006 08.11.2013
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0043_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-CR-13-37%20KOMSCO%20JK21%20V1.0%20on%20S3CT9KAKCKW(eng).pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0043_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[JK21-TR-0001]%20Security%20Target-Lite-e-v1.1.pdf
manufacturer Toshiba TEC Corporation KOMSCO
manufacturer_web https://www.toshibatec.co.jp/en/ https://www.komsco.com
security_level EAL3 ALC_DVS.2, EAL5+, AVA_VAN.5
dgst 79cf3cf36c8217af fd0beec036b21950
heuristics/cert_id JISEC-CC-CRP-C0043 KECS-ISIS-0468-2013
heuristics/extracted_sars ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_IND.2, ASE_CCL.1
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0719-2011, ANSSI-CC-2012/70
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0719-2011, ANSSI-CC-2012/70, BSI-DSZ-CC-0639-2010, BSI-DSZ-CC-0547-2009
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0043
  • certification_date: 01.03.2006
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cert_link: https://www.ipa.go.jp/en/security/c0043_eimg.pdf
    • description: PRODUCT DESCRIPTION The TOE is the system software of the digital multi function device “ e-STUDIO202L/232/282 ” manufactured by TOSHIBA TEC CORPORATION. The system software provides general functions as a digital multifunction device as well as the function of data overwrite and complete deletion on the user document data deleted from the e-STUDIO202L/232/282 HDD. The function of data overwrite and complete deletion includes the function to collectively and completely delete all user document data from the HDD before the HDD is disposed or replaced. This function also prevents unauthorized restore of data.
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc.
    • product: System Software for e-STUDIO202L/232/282
    • product_type: IT Product ( data protection function in Multi Function Device )
    • report_link: https://www.ipa.go.jp/en/security/c0043_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0043_est.pdf
    • toe_version: V1.0
    • vendor: TOSHIBA TEC CORPORATION
  • expiration_date: 01.01.2011
  • supplier: TOSHIBA TEC CORPORATION
  • toe_japan_name: System Software for e-STUDIO202L/232/282 V1.0
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0043_it5057.html
  • toe_overseas_name: System Software for e-STUDIO 202L/232/282 V1.0
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0719-2011, ANSSI-CC-2012/70, ANSSI-CC-2012/72
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0719-2011, ANSSI-CC-2012/70, ANSSI-CC-2012/72
pdf_data/report_filename c0043_erpt.pdf KECS-CR-13-37 KOMSCO JK21 V1.0 on S3CT9KAKCKW(eng).pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0043-01: 1
    • Certification No. C0043: 1
  • DE:
    • BSI-DSZ-CC-0719: 3
    • BSI-DSZ-CC-0719-2011: 1
  • FR:
    • ANSSI-CC-2012/70: 4
  • KR:
    • KECS-ISIS-0468-2013: 1
  • NL:
    • CC-2011-002: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL5: 2
    • EAL5 augmented: 2
    • EAL5+: 3
    • EAL6: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.5: 3
    • ADV_IMP.1: 2
    • ADV_INT.2: 3
    • ADV_TDS.4: 3
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.5: 2
    • ALC_DEL.1: 2
    • ALC_DVS.2: 6
    • ALC_LCD.1: 2
    • ALC_TAT.2: 2
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.2: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 3
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.3: 3
    • ATE_FUN.1: 2
    • ATE_IND.2: 4
  • AVA:
    • AVA_VAN.5: 8
pdf_data/report_keywords/cc_claims
  • T:
    • T.STOREDATA_ACCESS: 1
    • T.TEMPDATA_ACCESS: 1
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 8
pdf_data/report_keywords/eval_facility
  • KISA:
    • KISA: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • DES:
      • DES: 3
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
pdf_data/report_keywords/randomness
  • TRNG:
    • TRNG: 4
pdf_data/report_keywords/side_channel_analysis
  • other:
    • reverse engineering: 1
  • FI:
    • fault injection: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 2
    • CCIMB-99-033: 2
  • ISO:
    • ISO/IEC 15408:1999: 1
  • BSI:
    • AIS 34: 1
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816: 2
  • SCP:
    • SCP02: 1
pdf_data/report_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 1
  • JavaCard:
    • Java Card 2.2.2: 3
pdf_data/report_metadata
  • /Author:
  • /CreationDate: D:20060515142139+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20060515142342+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 546561
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
  • /Author: 이은경
  • /CreationDate: D:20131107180619+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20131107180619+09'00'
  • /Producer: Microsoft® Word 2010
  • /Title: 평가단위보고서(ADV_ARC.1)
  • pdf_file_size_bytes: 571329
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
pdf_data/st_filename c0043_est.pdf [JK21-TR-0001] Security Target-Lite-e-v1.1.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0719-: 1
    • BSI-DSZ-CC-0719-2011: 3
  • FR:
    • ANSSI-CC-2012/70: 3
    • ANSSI-CC-2012/72: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035-2007: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 3: 1
    • EAL3: 4
  • EAL:
    • EAL 5+: 1
    • EAL3: 1
    • EAL4: 3
    • EAL4+: 1
    • EAL5: 11
    • EAL5 augmented: 1
    • EAL5+: 13
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.3: 3
    • ACM_SCP.1: 1
  • ADO:
    • ADO_DEL.1: 3
    • ADO_IGS.1: 3
  • ADV:
    • ADV_FSP.1: 3
    • ADV_HLD.2: 1
    • ADV_RCR.1: 3
  • AGD:
    • AGD_ADM.1: 3
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.1: 3
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.1: 1
    • ATE_FUN.1: 3
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.1: 3
    • AVA_SOF.1: 2
    • AVA_VLA.1: 3
  • ADV:
    • ADV_ARC.1: 15
    • ADV_FSP.1: 3
    • ADV_FSP.2: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 19
    • ADV_IMP.1: 13
    • ADV_INT.2: 11
    • ADV_TDS.1: 2
    • ADV_TDS.3: 5
    • ADV_TDS.4: 19
  • AGD:
    • AGD_OPE.1: 17
    • AGD_PRE.1: 10
  • ALC:
    • ALC_CMC.4: 17
    • ALC_CMS.1: 1
    • ALC_CMS.5: 10
    • ALC_DEL.1: 7
    • ALC_DVS.1: 1
    • ALC_DVS.2: 20
    • ALC_LCD.1: 9
    • ALC_TAT.1: 2
    • ALC_TAT.2: 13
  • ASE:
    • ASE_CCL.1: 16
    • ASE_ECD.1: 14
    • ASE_INT.1: 16
    • ASE_OBJ.2: 13
    • ASE_REQ.1: 2
    • ASE_REQ.2: 15
    • ASE_SPD.1: 10
    • ASE_TSS.1: 7
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 7
    • ATE_DPT.1: 2
    • ATE_DPT.3: 10
    • ATE_FUN.1: 13
    • ATE_IND.2: 9
  • AVA:
    • AVA_VAN.4: 2
    • AVA_VAN.5: 20
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_RIP.1: 11
    • FDP_RIP.1.1: 1
    • FDP_RIP.2: 8
  • FPT:
    • FPT_RVM.1: 12
    • FPT_RVM.1.1: 1
  • FAU:
    • FAU_ARP.1: 7
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 3
    • FAU_SAA.1: 10
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAS.1: 3
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 29
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 12
    • FCS_CKM.4: 21
    • FCS_CKM.4.1: 2
    • FCS_COP: 6
    • FCS_COP.1: 44
    • FCS_COP.1.1: 7
    • FCS_RNG: 2
    • FCS_RNG.1: 14
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC.1: 17
    • FDP_ACC.2: 15
    • FDP_ACC.2.1: 2
    • FDP_ACC.2.2: 2
    • FDP_ACF.1: 22
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 9
    • FDP_ITC.1: 12
    • FDP_ITC.2: 12
    • FDP_ITT.1: 1
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 6
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT.1: 9
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 8
    • FDP_UIT.1.1: 2
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 13
    • FIA_ATD.1.1: 2
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 22
    • FIA_UAU.1.1: 7
    • FIA_UAU.1.2: 3
    • FIA_UAU.4: 7
    • FIA_UAU.4.1: 1
    • FIA_UAU.6: 6
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 14
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_LIM.1: 3
    • FMT_LIM.2: 3
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 16
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 7
    • FMT_MTD.1.1: 1
    • FMT_MTD.2: 7
    • FMT_MTD.2.1: 1
    • FMT_MTD.2.2: 1
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 5
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 8
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 2
    • FPT_ITT.1: 1
    • FPT_PHP.3: 8
    • FPT_RCV.2: 1
    • FPT_RCV.3: 6
    • FPT_RCV.3.1: 1
    • FPT_RCV.3.2: 1
    • FPT_RCV.3.3: 1
    • FPT_RCV.3.4: 1
    • FPT_RCV.4: 5
    • FPT_RCV.4.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC.1: 6
    • FTP_TRP.1: 5
pdf_data/st_keywords/cc_claims
  • O:
    • O.STOREDATA_OVERWRITE: 4
    • O.TEMPDATA_OVERWRITE: 6
  • OE:
    • OE.HDD_ERASE: 3
    • OE.OVERWRITE_COMPLETE: 3
  • T:
    • T.STOREDATA_ACCESS: 3
    • T.TEMPDATA_ACCESS: 4
  • A:
    • A.TOE: 3
    • A.TSF: 3
  • D:
    • D.APP_CODE: 1
    • D.APP_DATA: 1
    • D.CRYPTO: 1
    • D.PIN: 1
    • D.SEC_DATA: 1
    • D.TS_CODE: 1
    • D.TS_DATA: 1
  • O:
    • O.IC: 23
    • O.RND: 1
  • OE:
    • OE.TSF: 6
  • OP:
    • OP.ARRAY_ACCESS: 5
    • OP.CREATE: 3
    • OP.DELETE: 10
    • OP.INSTALL: 10
    • OP.INSTANCE_FIELD: 5
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 5
    • OP.JAVA: 3
    • OP.LOAD: 10
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 7
  • T:
    • T.RND: 1
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 7
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 9
  • DES:
    • 3DES:
      • 3DES: 1
      • TDES: 14
    • DES:
      • DES: 2
  • miscellaneous:
    • ARIA:
      • ARIA: 7
    • SEED:
      • SEED: 6
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 14
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 2
  • RSA:
    • RSA 1024: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-224: 2
      • SHA-256: 1
      • SHA-384: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 3
    • Key agreement: 1
  • MAC:
    • MAC: 6
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 2
    • RNG: 1
  • TRNG:
    • TRNG: 5
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/st_keywords/side_channel_analysis
  • other:
    • reverse engineering: 2
  • FI:
    • DFA: 1
    • Malfunction: 10
    • Physical tampering: 2
    • malfunction: 9
    • physical tampering: 1
  • SCA:
    • DPA: 1
    • Leak-Inherent: 2
    • SPA: 1
    • physical probing: 3
    • timing attack: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 31: 1
    • AIS31: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
  • FIPS:
    • FIPS 180-3: 1
    • FIPS 197: 2
    • FIPS PUB 197: 1
    • FIPS PUB 46-3: 1
  • PKCS:
    • PKCS#1: 1
    • PKCS#2: 2
  • SCP:
    • SCP 02: 1
    • SCP02: 19
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 3
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 8
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • the application although it is possible to load the application on the EEPROM of IC Chip. That is out of scope in the ST. 1.4.3 Logical Scope of TOE The TOE is the JavaCard Platform that supports the analysis: 1
pdf_data/st_metadata
  • /CreationDate: D:20060512044538Z
  • /ModDate: D:20060731114807+09'00'
  • /Producer: Acrobat Distiller 5.0 (Windows)
  • /Subject: 2006/7/31 update
  • pdf_file_size_bytes: 741778
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 23
  • /Author: HoGeun Song
  • /CreationDate: D:20131111082538+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20131111082538+09'00'
  • /Producer: Microsoft® Word 2010
  • /Title: KOMSCO Document Template
  • pdf_file_size_bytes: 1422360
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 108
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different