Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
SHARP MX-M6071 / M5071 / M4071 / M3571 / M3071 fax option model with MX-FR64U; MX-M6051 / M5051 / M4051 / M3551 / M3051 / M2651 HDD standard model with MX-FR64U and MX-PK13; and MX-M6051 / M5051 / M4051 / M3551 / M3051 / M2651 HDD option model with MX-FR64U, MX-HD16 and MX-PK130210zd00
JISEC-CC-CRP-C0678
Sm@rtCafe Expert Version 5.0
BSI-DSZ-CC-0537-2009
name SHARP MX-M6071 / M5071 / M4071 / M3571 / M3071 fax option model with MX-FR64U; MX-M6051 / M5051 / M4051 / M3551 / M3051 / M2651 HDD standard model with MX-FR64U and MX-PK13; and MX-M6051 / M5051 / M4051 / M3551 / M3051 / M2651 HDD option model with MX-FR64U, MX-HD16 and MX-PK130210zd00 Sm@rtCafe Expert Version 5.0
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP DE
not_valid_after 03.06.2024 01.09.2019
not_valid_before 27.07.2020 17.12.2009
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0678_eimg.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0678_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0537a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0678_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0537b_pdf.pdf
manufacturer Sharp Corporation G+D Mobile Security GmbH
manufacturer_web https://sharp-world.com/ https://www.gi-de.com/de/de/mobile-security/
security_level {} EAL4+
dgst 7fb1cc56d893f3ac b7f131020fc0cf4f
heuristics/cert_id JISEC-CC-CRP-C0678 BSI-DSZ-CC-0537-2009
heuristics/cert_lab [] BSI
heuristics/cpe_matches cpe:2.3:h:sharp:mx-m5051:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-m6071:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-m3571:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-m4071:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-m5071:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-m4051:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-m6051:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-m2651:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-m3051:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-m3071:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-m3551:-:*:*:*:*:*:*:* {}
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 ATE_COV.2, ADV_RCR.1, ALC_TAT.1, AVA_VLA.4, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_SOF.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_DVS.2, ALC_LCD.1, ADV_IMP.2, ATE_DPT.1, ADV_FSP.2, ADV_SPM.1, AVA_MSU.3
heuristics/extracted_versions - 5.0
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0411-2007, BSI-DSZ-CC-0410-2007
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0411-2007, BSI-DSZ-CC-0410-2007
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0678
  • certification_date: 01.07.2020
  • claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
  • enhanced:
    • assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0678
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000wfu-att/c0678_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Device (MFD) that has the functions, such as copy, print, scan and filing. The TOE is capable of implementing the functionality required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFD. TOE security functionality The TOE provides the following security features: Identification and Authentication Function Access Control Function Stored Data Encryption Function Network Protection Function Security Management Function Audit Function Software Verification Function Self-testing Function Residual Data Overwrite Function Data Purging Function
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: SHARP MX-M6071 / M5071 / M4071 / M3571 / M3071 fax option model with MX-FR64U; MX-M6051 / M5051 / M4051 / M3551 / M3051 / M2651 HDD standard model with MX-FR64U and MX-PK13; and MX-M6051 / M5051 / M4051 / M3551 / M3051 / M2651 HDD option model with MX-FR64U, MX-HD16 and MX-PK13
    • product_type: Multifunction Product
    • protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000wfu-att/c0678_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000wfu-att/c0678_est.pdf
    • toe_version: 0210zd00
    • vendor: SHARP CORPORATION
  • expiration_date: 01.06.2024
  • supplier: SHARP CORPORATION
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0678_it9720.html
  • toe_overseas_name: SHARP MX-M6071 / M5071 / M4071 / M3571 / M3071 fax option model with MX-FR64U; MX-M6051 / M5051 / M4051 / M3551 / M3051 / M2651 HDD standard model with MX-FR64U and MX-PK13; and MX-M6051 / M5051 / M4051 / M3551 / M3051 / M2651 HDD option model with MX-FR64U, MX-HD16 and MX-PK130210zd00
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0411-2007, BSI-DSZ-CC-0410-2007
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0411-2007, BSI-DSZ-CC-0410-2007
heuristics/protection_profiles b2cfec7a92fa2940 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf {}
pdf_data/cert_filename c0678_eimg.pdf
pdf_data/cert_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0678-01-2020: 1
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
pdf_data/cert_keywords/cc_sar
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /Author:
  • /CreationDate: D:20200817104926+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 17
  • /Keywords:
  • /ModDate: D:20200817105556+09'00'
  • /Producer: Adobe PDF Library 15.0
  • /SourceModified: D:20200817012930
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 113768
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
pdf_data/report_filename c0678_est.pdf 0537a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0537-2009
    • cert_item: Sm@rtCafe Expert Version 5.0
    • cert_lab: BSI
    • developer: Giesecke & Devrient GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0404: 1
    • BSI-DSZ-CC-0404-2007: 3
    • BSI-DSZ-CC-0410: 1
    • BSI-DSZ-CC-0410-2007: 3
    • BSI-DSZ-CC-0411: 1
    • BSI-DSZ-CC-0411-2007: 3
    • BSI-DSZ-CC-0537: 3
    • BSI-DSZ-CC-0537-2009: 19
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 4: 9
    • EAL 4 augmented: 3
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 7
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 1
    • ACM_CAP: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 2
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_HLD: 2
    • ADV_IMP: 2
    • ADV_IMP.2: 5
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_USR: 2
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.1: 1
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_LCD.1: 1
    • ALC_TAT: 2
    • ALC_TAT.1: 1
  • APE:
    • APE_DES: 1
    • APE_ENV: 1
    • APE_INT: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SRE: 1
  • ASE:
    • ASE_DES: 1
    • ASE_ENV: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_PPC: 1
    • ASE_REQ: 1
    • ASE_SRE: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 2
    • ATE_DPT: 2
    • ATE_FUN: 4
    • ATE_IND: 4
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_SOF: 3
    • AVA_VLA: 5
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 6
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 14
    • FAU_GEN.1: 13
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_STG_EXT: 3
    • FAU_STG_EXT.1: 6
    • FAU_STG_EXT.1.1: 2
  • FCS:
    • FCS_CKM.1: 40
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 2
    • FCS_CKM.4: 8
    • FCS_CKM.4.1: 1
    • FCS_CKM_EXT: 3
    • FCS_CKM_EXT.4: 27
    • FCS_CKM_EXT.4.1: 2
    • FCS_COP.1: 101
    • FCS_COP.1.1: 6
    • FCS_KDF_EXT.1: 4
    • FCS_KYC_EXT: 4
    • FCS_KYC_EXT.1: 9
    • FCS_KYC_EXT.1.1: 3
    • FCS_RBG_EXT: 3
    • FCS_RBG_EXT.1: 25
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_SMC_EXT.1: 4
    • FCS_SSH_EXT.1: 6
    • FCS_TLS_EXT: 3
    • FCS_TLS_EXT.1: 26
    • FCS_TLS_EXT.1.1: 2
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 13
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 10
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_DSK_EXT: 3
    • FDP_DSK_EXT.1: 9
    • FDP_DSK_EXT.1.1: 2
    • FDP_DSK_EXT.1.2: 2
    • FDP_IFC.1: 1
    • FDP_ITC.1: 5
    • FDP_ITC.2: 5
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 2
  • FIA:
    • FIA_AFL.1: 4
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 6
    • FIA_ATD.1.1: 1
    • FIA_PMG: 4
    • FIA_PMG_EXT: 2
    • FIA_PMG_EXT.1: 4
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 4
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 4
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 5
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 5
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 7
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 16
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 17
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_KYP_EXT: 2
    • FPT_KYP_EXT.1: 4
    • FPT_KYP_EXT.1.1: 1
    • FPT_SKP_EXT: 3
    • FPT_SKP_EXT.1: 6
    • FPT_SKP_EXT.1.1: 2
    • FPT_STM: 1
    • FPT_STM.1: 6
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 3
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT: 3
    • FPT_TUD_EXT.1: 11
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 3
  • FTA:
    • FTA_SSL.3: 4
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 21
    • FTP_ITC.1.1: 3
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 20
    • FTP_TRP.1.1: 4
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.NETWORK: 1
    • A.PHYSICAL: 1
    • A.TRAINED_USERS: 1
    • A.TRUSTED_ADMIN: 1
  • D:
    • D.TSF: 4
    • D.USER: 17
  • O:
    • O.ACCESS_CONTROL: 7
    • O.ADMIN_ROLES: 4
    • O.AUDIT: 4
    • O.COMMS_PROTECTION: 11
    • O.IMAGE_OVERWRITE: 1
    • O.KEY_MATERIAL: 1
    • O.PURGE_DATA: 3
    • O.STORAGE_ENCRYPTION: 6
    • O.TSF_SELF_TEST: 1
    • O.UPDATE_VERIFICATION: 2
    • O.USER_AUTHORIZATION: 7
  • OE:
    • OE.ADMIN_TRAINING: 1
    • OE.ADMIN_TRUST: 1
    • OE.NETWORK_PROTECTION: 1
    • OE.PHYSICAL_PROTECTION: 1
    • OE.USER_TRAINING: 1
  • T:
    • T.NET_COMPROMISE: 1
    • T.TSF_COMPROMISE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
  • OE:
    • OE.APPLET: 1
    • OE.NATIVE: 1
    • OE.VERIFICATION: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • GD:
    • Giesecke & Devrient: 10
  • NXP:
    • NXP: 11
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 18
      • AES-128: 1
      • AES-256: 2
    • Rijndael:
      • Rijndael: 2
  • constructions:
    • MAC:
      • HMAC: 4
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • 3-DES: 1
      • 3DES: 1
    • DES:
      • DES: 2
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA 1024: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-256: 8
      • SHA-384: 5
      • SHA256: 2
      • SHA384: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 6
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 3
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 40
      • TLS 1.0: 1
      • TLS 1.1: 1
      • TLS 1.2: 7
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 5
  • RNG:
    • RBG: 13
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 7
  • GCM:
    • GCM: 2
pdf_data/report_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 2
  • ICType:
    • IC Type: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS PUB 180-3: 1
    • FIPS PUB 186-4: 2
    • FIPS PUB 197: 2
    • FIPS PUB 198-1: 2
  • ISO:
    • ISO/IEC 10116: 6
    • ISO/IEC 18031:2011: 3
    • ISO/IEC 18033-3: 3
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-38D: 2
    • NIST SP 800-90A: 5
  • RFC:
    • RFC 2246: 1
    • RFC 2818: 4
    • RFC 4346: 1
    • RFC 5246: 3
  • BSI:
    • AIS 20: 3
    • AIS 25: 2
    • AIS 26: 2
    • AIS 32: 1
    • AIS 34: 3
    • AIS 35: 2
    • AIS 36: 2
    • AIS 37: 1
    • AIS20: 1
    • AIS36: 3
  • ISO:
    • ISO/IEC 15408:2005: 3
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 7] Evaluation Technical Report, Version 2, Date: 2009-10-14, BSI-DSZ-CC-0537, TUVIT (confidential document) [8] Configuration list for the TOE, Version 1.4, Date: 2009-08-27, Giesecke & Devrient: 1
    • Version 3.0, Status 27.08.2009, Security Target SmartCafe Expert V5.0, Giesecke & Devrient (confidential document) 8 specifically • AIS 20, Version 1, 2 December 1999, Funktionalitätsklassen und: 1
  • OutOfScope:
    • are tested through Module Tests. As the initialisation and the personalisation process are out of scope of this evaluation, the TOE was always tested in its usage phase. 16 / 36 BSI-DSZ-CC-0537-2009: 1
    • contained in one or more Java packages. Note, that applets are not part of the TOE and therefore out of scope. The hardware platform was always the NXP P5CD144V0B. ● an emulator which is required for test: 1
    • out of scope: 3
    • the Smart Card at the initialisation site. The initialisation and the personalisation process are out of scope of this evaluation. 13 / 36 Certification Report BSI-DSZ-CC-0537-2009 The hardware product can be: 1
pdf_data/report_metadata
  • /Author:
  • /CreationDate: D:20201015095811+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 20
  • /ModDate: D:20201015095846+09'00'
  • /Producer: Adobe PDF Library 20.9.95
  • /Title:
  • pdf_file_size_bytes: 911294
  • pdf_hyperlinks: http://csrc.nist.gov/archive/aes/katmct/katmct.htm
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 64
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20100111131526+01'00'
  • /Creator: Writer
  • /Keywords: Sm@rtCafe ExpertVersion 5.0, Giesecke & Devrient GmbH, Java Card, Common Criteria, Certification, Zertifzierung
  • /ModDate: D:20100111135143+01'00'
  • /Producer: StarOffice 9
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0537-2009
  • pdf_file_size_bytes: 1096697
  • pdf_hyperlinks: http://de.wikipedia.org/wiki/Electrically_Erasable_Programmable_Read_Only_Memory, http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
pdf_data/st_filename c0678_est.pdf 0537b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0404: 1
    • BSI-DSZ-CC-0404-2007: 2
    • BSI-DSZ-CC-0410-2007: 2
    • BSI-DSZ-CC-0411-2007: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002: 1
    • BSI-PP-0026: 3
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 2
    • EAL 4 augmented: 1
    • EAL 5: 3
    • EAL 5 augmented: 1
    • EAL4: 8
    • EAL4 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 11
    • ACM_CAP: 2
    • ACM_CAP.3: 3
    • ACM_CAP.4: 22
    • ACM_SCP: 3
    • ACM_SCP.2: 8
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 10
    • ADO_IGS: 1
    • ADO_IGS.1: 10
  • ADV:
    • ADV_FSP: 2
    • ADV_FSP.1: 10
    • ADV_FSP.2: 20
    • ADV_HLD: 2
    • ADV_HLD.1: 2
    • ADV_HLD.2: 22
    • ADV_IMP: 1
    • ADV_IMP.1: 3
    • ADV_IMP.2: 22
    • ADV_LLD: 2
    • ADV_LLD.1: 21
    • ADV_RCR: 2
    • ADV_RCR.1: 15
    • ADV_SPM: 2
    • ADV_SPM.1: 31
  • AGD:
    • AGD_ADM: 2
    • AGD_ADM.1: 26
    • AGD_USR: 2
    • AGD_USR.1: 19
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.1: 11
    • ALC_DVS.2: 1
    • ALC_LCD: 2
    • ALC_LCD.1: 9
    • ALC_TAT: 2
    • ALC_TAT.1: 13
  • ATE:
    • ATE_COV: 2
    • ATE_COV.2: 8
    • ATE_DPT: 2
    • ATE_DPT.1: 6
    • ATE_FUN: 2
    • ATE_FUN.1: 17
    • ATE_IND: 1
    • ATE_IND.2: 9
  • AVA:
    • AVA_MSU: 2
    • AVA_MSU.2: 15
    • AVA_MSU.3: 1
    • AVA_SOF: 2
    • AVA_SOF.1: 9
    • AVA_VLA: 1
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 28
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 14
    • FAU_GEN.1: 13
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_STG_EXT: 3
    • FAU_STG_EXT.1: 6
    • FAU_STG_EXT.1.1: 2
  • FCS:
    • FCS_CKM.1: 40
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 2
    • FCS_CKM.4: 8
    • FCS_CKM.4.1: 1
    • FCS_CKM_EXT: 3
    • FCS_CKM_EXT.4: 27
    • FCS_CKM_EXT.4.1: 2
    • FCS_COP.1: 101
    • FCS_COP.1.1: 6
    • FCS_KDF_EXT.1: 4
    • FCS_KYC_EXT: 4
    • FCS_KYC_EXT.1: 9
    • FCS_KYC_EXT.1.1: 3
    • FCS_RBG_EXT: 3
    • FCS_RBG_EXT.1: 25
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_SMC_EXT.1: 4
    • FCS_SSH_EXT.1: 6
    • FCS_TLS_EXT: 3
    • FCS_TLS_EXT.1: 26
    • FCS_TLS_EXT.1.1: 2
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 13
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 10
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_DSK_EXT: 3
    • FDP_DSK_EXT.1: 9
    • FDP_DSK_EXT.1.1: 2
    • FDP_DSK_EXT.1.2: 2
    • FDP_IFC.1: 1
    • FDP_ITC.1: 5
    • FDP_ITC.2: 5
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 2
  • FIA:
    • FIA_AFL.1: 4
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 6
    • FIA_ATD.1.1: 1
    • FIA_PMG: 4
    • FIA_PMG_EXT: 2
    • FIA_PMG_EXT.1: 4
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 4
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 4
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 5
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 5
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 7
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 16
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 17
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_KYP_EXT: 2
    • FPT_KYP_EXT.1: 4
    • FPT_KYP_EXT.1.1: 1
    • FPT_SKP_EXT: 3
    • FPT_SKP_EXT.1: 6
    • FPT_SKP_EXT.1.1: 2
    • FPT_STM: 1
    • FPT_STM.1: 6
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 3
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT: 3
    • FPT_TUD_EXT.1: 11
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 3
  • FTA:
    • FTA_SSL.3: 4
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 21
    • FTP_ITC.1.1: 3
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 20
    • FTP_TRP.1.1: 4
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 2
  • FAU:
    • FAU_ARP: 7
    • FAU_ARP.1: 11
    • FAU_SAA.1: 3
  • FCO:
    • FCO_NRO: 1
    • FCO_NRO.2: 9
  • FCS:
    • FCS_CKM.1: 15
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 6
    • FCS_CKM.2.1: 2
    • FCS_CKM.3: 5
    • FCS_CKM.3.1: 2
    • FCS_CKM.4: 13
    • FCS_CKM.4.1: 2
    • FCS_COP.1: 16
    • FCS_COP.1.1: 4
    • FCS_RND: 7
    • FCS_RND.1: 14
    • FCS_RND.1.1: 6
  • FDP:
    • FDP_ACC: 20
    • FDP_ACC.1: 22
    • FDP_ACC.2: 19
    • FDP_ACF: 15
    • FDP_ACF.1: 51
    • FDP_IFC: 23
    • FDP_IFC.1: 28
    • FDP_IFC.2: 11
    • FDP_IFF: 13
    • FDP_IFF.1: 50
    • FDP_IFF.2: 10
    • FDP_IFF.2.7: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 25
    • FDP_ITT.1: 3
    • FDP_RIP: 43
    • FDP_RIP.1: 34
    • FDP_ROL: 4
    • FDP_ROL.1: 15
    • FDP_ROL.1.1: 2
    • FDP_SDI.2: 6
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
    • FDP_UIT: 1
    • FDP_UIT.1: 6
  • FIA:
    • FIA_ATD: 3
    • FIA_ATD.1: 7
    • FIA_SOS.2: 1
    • FIA_UID: 13
    • FIA_UID.1: 25
    • FIA_UID.2: 4
    • FIA_USB.1: 7
    • FIA_USB.1.1: 3
    • FIA_USB.1.2: 3
    • FIA_USB.1.3: 3
  • FMT:
    • FMT_LIM: 6
    • FMT_LIM.1: 20
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 13
    • FMT_LIM.2.1: 2
    • FMT_MSA: 49
    • FMT_MSA.1: 41
    • FMT_MSA.2: 16
    • FMT_MSA.3: 45
    • FMT_MTD: 3
    • FMT_MTD.1: 8
    • FMT_MTD.3: 5
    • FMT_MTD.3.1: 2
    • FMT_REV: 1
    • FMT_REV.1: 8
    • FMT_SMF.1: 28
    • FMT_SMR: 34
    • FMT_SMR.1: 63
  • FPR:
    • FPR_UNO.1: 7
    • FPR_UNO.1.1: 2
  • FPT:
    • FPT_AMT: 4
    • FPT_AMT.1: 11
    • FPT_FLS: 14
    • FPT_FLS.1: 27
    • FPT_ITT.1: 3
    • FPT_PHP: 3
    • FPT_PHP.3: 10
    • FPT_RCV: 9
    • FPT_RCV.3: 34
    • FPT_RCV.4: 7
    • FPT_RND.1: 1
    • FPT_RVM: 3
    • FPT_RVM.1: 15
    • FPT_RVM.1.1: 2
    • FPT_SEP: 3
    • FPT_SEP.1: 13
    • FPT_SEP.1.1: 2
    • FPT_SEP.1.2: 2
    • FPT_TDC.1: 6
    • FPT_TDC.1.1: 2
    • FPT_TDC.1.2: 3
    • FPT_TST: 1
    • FPT_TST.1: 11
    • FPT_TST.1.1: 2
    • FPT_TST.1.2: 3
    • FPT_TST.1.3: 2
  • FRU:
    • FRU_FLT: 3
    • FRU_FLT.1: 6
    • FRU_FLT.2: 5
    • FRU_RSA: 2
    • FRU_RSA.1: 8
  • FTP:
    • FTP_ITC: 3
    • FTP_ITC.1: 11
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.NETWORK: 1
    • A.PHYSICAL: 1
    • A.TRAINED_USERS: 1
    • A.TRUSTED_ADMIN: 1
  • D:
    • D.TSF: 4
    • D.USER: 17
  • O:
    • O.ACCESS_CONTROL: 7
    • O.ADMIN_ROLES: 4
    • O.AUDIT: 4
    • O.COMMS_PROTECTION: 11
    • O.IMAGE_OVERWRITE: 1
    • O.KEY_MATERIAL: 1
    • O.PURGE_DATA: 3
    • O.STORAGE_ENCRYPTION: 6
    • O.TSF_SELF_TEST: 1
    • O.UPDATE_VERIFICATION: 2
    • O.USER_AUTHORIZATION: 7
  • OE:
    • OE.ADMIN_TRAINING: 1
    • OE.ADMIN_TRUST: 1
    • OE.NETWORK_PROTECTION: 1
    • OE.PHYSICAL_PROTECTION: 1
    • OE.USER_TRAINING: 1
  • T:
    • T.NET_COMPROMISE: 1
    • T.TSF_COMPROMISE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
  • A:
    • A.APPLET: 5
    • A.NATIVE: 9
    • A.VERIFICA: 1
    • A.VERIFICATION: 5
  • D:
    • D.API_DATA: 3
    • D.APP_: 1
    • D.APP_CODE: 7
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 5
    • D.CRYPTO: 6
    • D.JCS_: 1
    • D.JCS_CODE: 3
    • D.JCS_DATA: 4
    • D.PIN: 6
    • D.SEC_DATA: 7
  • O:
    • O.ALARM: 11
    • O.APPLET: 29
    • O.CARD-: 7
    • O.CARD-MANAGEMENT: 7
    • O.CARD_MANAGEMENT: 7
    • O.CHECK_INIT: 6
    • O.CIPHER: 11
    • O.CODE_PCKG: 8
    • O.CODE_PKG: 7
    • O.DELETION: 7
    • O.FIREWALL: 15
    • O.INSTALL: 13
    • O.JAVAOBJECT: 24
    • O.KEY-MNGT: 8
    • O.KEY_MNGT: 1
    • O.LOA: 1
    • O.LOAD: 8
    • O.NATIVE: 10
    • O.OBJ-DELETION: 4
    • O.OPERATE: 13
    • O.PACKAGE: 6
    • O.PIN-: 2
    • O.PIN-MNGT: 8
    • O.REALLO: 1
    • O.REALLOCATIO: 1
    • O.REALLOCATION: 6
    • O.REMOTE: 7
    • O.REMOTE_MTHD: 5
    • O.REMOTE_OBJ: 8
    • O.REMOTE_OBJECT: 1
    • O.RESOURCES: 9
    • O.RMI_SERVICE: 13
    • O.RND: 11
    • O.ROR: 5
    • O.SCP: 53
    • O.SHRD_VAR: 1
    • O.SHRD_VAR_CO: 2
    • O.SHRD_VAR_CONF: 1
    • O.SHRD_VAR_CONFID: 5
    • O.SHRD_VAR_IN: 1
    • O.SHRD_VAR_INTEG: 5
    • O.SID: 14
    • O.SIDE_CHANNEL: 9
    • O.TRANSACTION: 8
    • O.XYZ: 1
  • OE:
    • OE.APPLET: 9
    • OE.NATIVE: 9
    • OE.VERIFICAT: 1
    • OE.VERIFICATION: 22
    • OE.XYZ: 1
  • OP:
    • OP.APPLET_DELETION: 5
    • OP.APPLET_INSTALLATION: 5
    • OP.BYTECODE: 1
    • OP.CREATE: 3
    • OP.DELETE_APPLET: 3
    • OP.DELETE_PCKG: 2
    • OP.DELETE_PCKG_APPLET: 2
    • OP.GET_ROR: 2
    • OP.INVK_INTERFACE: 1
    • OP.INVOKE: 2
    • OP.JAVA: 2
    • OP.PACKAGE_DELETION: 5
    • OP.PACKAGE_LOADING: 5
    • OP.PUT: 5
    • OP.RECEIVE: 1
    • OP.RET_RORD: 3
    • OP.SEND: 1
  • OSP:
    • OSP.VERIFICATION: 3
  • R:
    • R.CMRG: 4
    • R.JAVA: 15
  • T:
    • T.A: 1
    • T.CHIP: 4
    • T.CONF: 1
    • T.CONFID-: 2
    • T.CONFID-APPLI-DATA: 3
    • T.CONFID-JCS-: 1
    • T.CONFID-JCS-CODE: 3
    • T.CONFID-JCS-DATA: 3
    • T.DELETION: 5
    • T.EXE-: 5
    • T.EXE-CODE: 7
    • T.EXE-CODE-REMOTE: 3
    • T.INSTALL: 5
    • T.INTEG: 1
    • T.INTEG-: 4
    • T.INTEG-APPLI-: 2
    • T.INTEG-APPLI-CODE: 8
    • T.INTEG-APPLI-DATA: 8
    • T.INTEG-JCS-: 4
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 3
    • T.LEAKAGE: 7
    • T.NATIV: 1
    • T.NATIVE: 4
    • T.OBJ-: 1
    • T.OBJ-DELETION: 3
    • T.PHYSI: 1
    • T.PHYSICAL: 7
    • T.RESOURC: 1
    • T.RESOURCES: 3
    • T.RND: 11
    • T.SID: 14
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • GD:
    • Giesecke & Devrient: 8
  • NXP:
    • NXP: 14
    • NXP Semiconductors: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 18
      • AES-128: 1
      • AES-256: 2
    • Rijndael:
      • Rijndael: 2
  • constructions:
    • MAC:
      • HMAC: 4
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
  • AES_competition:
    • AES:
      • AES: 16
      • AES-: 1
  • DES:
    • 3DES:
      • 3-DES: 5
      • Triple-DES: 1
    • DES:
      • DES: 9
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-256: 8
      • SHA-384: 5
      • SHA256: 2
      • SHA384: 1
  • SHA:
    • SHA2:
      • SHA256: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 6
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 3
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 40
      • TLS 1.0: 1
      • TLS 1.1: 1
      • TLS 1.2: 7
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 5
  • RNG:
    • RBG: 13
  • RNG:
    • RND: 22
  • TRNG:
    • TRNG: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 7
  • GCM:
    • GCM: 2
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • FI:
    • DFA: 2
    • Malfunction: 6
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • DPA: 3
    • Leak-Inherent: 6
    • SPA: 2
    • physical probing: 1
    • side channel: 1
    • side-channel: 1
    • timing attack: 1
    • timing attacks: 1
  • other:
    • Reverse Engineering: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS PUB 180-3: 1
    • FIPS PUB 186-4: 2
    • FIPS PUB 197: 2
    • FIPS PUB 198-1: 2
  • ISO:
    • ISO/IEC 10116: 6
    • ISO/IEC 18031:2011: 3
    • ISO/IEC 18033-3: 3
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-38D: 2
    • NIST SP 800-90A: 5
  • RFC:
    • RFC 2246: 1
    • RFC 2818: 4
    • RFC 4346: 1
    • RFC 5246: 3
  • BSI:
    • AIS 20: 2
    • AIS 31: 1
    • AIS20: 3
    • AIS31: 2
  • CC:
    • CCIMB-2005-08-001: 1
    • CCIMB-2005-08-002: 1
    • CCIMB-2005-08-003: 1
    • CCMB-2005-08-004: 1
  • FIPS:
    • FIPS PUB 197: 1
    • FIPS PUB 46-3: 1
  • ICAO:
    • ICAO: 3
  • ISO:
    • ISO/IEC 7816-3: 1
    • ISO/IEC 7816-5: 1
  • PKCS:
    • PKCS1: 2
  • RFC:
    • RFC 3447: 1
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 4
  • JavaCard:
    • Java Card 2.2: 1
    • Java Card 2.2.2: 3
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
    • java.rmi: 2
  • javacard:
    • javacard.framework: 5
    • javacard.framework.applet: 1
    • javacard.framework.service: 1
    • javacard.security: 2
  • javacardx:
    • javacardx.crypto: 2
    • javacardx.rmi: 1
    • javacardx.security: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this ST, though. 8.1.1.14 T.PHYSICAL Covered by O.SCP.IC. Physical protections rely on the SCP: 1
    • out of scope: 2
    • the Smart Card at the initialisation site. The initialisation and the personalisation process are out of scope of this evaluation. The TOE’s delivery scope beside the initialisation file and the mask keys: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate: D:20201015095811+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 20
  • /ModDate: D:20201015095846+09'00'
  • /Producer: Adobe PDF Library 20.9.95
  • /Title:
  • pdf_file_size_bytes: 911294
  • pdf_hyperlinks: http://csrc.nist.gov/archive/aes/katmct/katmct.htm
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 64
  • /Author: G&D/CSRD22
  • /Comments: Open
  • /Company: GuD
  • /CreationDate: D:20091027093026+01'00'
  • /Creator: Acrobat PDFMaker 7.0 für Word
  • /Keywords: Version 1.0 / Status 27.10.2009, Java Card, Standard 2.2 configuration, SUN Java Card System PP, Global Platform 2.1.1 Card Implementation, NXP P5CD040/080/144
  • /ModDate: D:20091027105141+01'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /SourceModified: D:20091027082407
  • /Subject: Security Target Lite SmartCafe Expert V5.0
  • /Title: Security Target Lite SmartCafe Expert V5.0
  • pdf_file_size_bytes: 2381740
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 178
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different