name |
Canon iR3225/iR3230/iR3235/iR3245 Series HDD Data Erase Kit-B2 Version 1.00 |
DragonFly v4.0 sur composant SLE97CNFX1M50PE Identification Hardware 412691 Card Manager GOP Ref V21.06.01 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
FR |
status |
archived |
archived |
not_valid_after |
08.04.2014 |
06.10.2021 |
not_valid_before |
24.12.2008 |
06.10.2016 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0198_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016-60.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0198_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016-60_cible%20publique.pdf |
manufacturer |
Canon Inc. |
Oberthur Technologies |
manufacturer_web |
https://www.canon.com/ |
https://www.oberthur.com/ |
security_level |
EAL3 |
EAL4+, ALC_DVS.2, AVA_VAN.5 |
dgst |
8279b5ee82292487 |
016fa888cd789095 |
heuristics/cert_id |
JISEC-CC-CRP-C0198 |
ANSSI-CC-2016/60 |
heuristics/cert_lab |
[] |
THALES |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
ASE_INT.1, ASE_APD.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
1.00 |
21.06.01, 4.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2019/38 |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2014/81, BSI-DSZ-CC-0946-V2-2015, BSI-DSZ-CC-0946-2014 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2019/38 |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2010/49, BSI-DSZ-CC-0791-2012, ANSSI-CC-2012/39, BSI-DSZ-CC-0827-2013, ANSSI-CC-2009/25, ANSSI-CC-2009/57, ANSSI-CC-2014/81, BSI-DSZ-CC-0946-2014, BSI-DSZ-CC-0827-V2-2014, ANSSI-CC-2011/07, ANSSI-CC-2012/06, ANSSI-CC-2010/50, ANSSI-CC-2013/13, ANSSI-CC-2013/60, BSI-DSZ-CC-0946-V2-2015, ANSSI-CC-2012/79, ANSSI-CC-2011/24 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0198
- certification_date: 01.12.2008
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cert_link: https://www.ipa.go.jp/en/security/c0198_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is optional software which adds security features to Canon iR3225/iR3230/iR3235/iR3245 series digital multifunction products. Installing this TOE replaces the system software (e.g., control software) on any of the aforementioned digital multi-function devices. As a basic function of the TOE, it controls functions of the MFP such as Copy, Print, Fax Reception, Mail Box and so on, and temporarily stores image data created during copying, printing, and other document handling operations on the HDD. In most standard multifunction products, such temporary image data is deleted only logically after use, i.e., upon completion of copying or printing, and residual information of deleted image data is not erased at all, being left exposed to the risk of reuse. TOE security functions This TOE comes with a security feature called the HDD Data Erase function, which completely deletes the HDD data, thereby eliminating any risk of the residual information of temporary image data from being reused. The TOE additionally includes the System Administrator Identification and Authentication function and the System Management function, for managing the HDD Data Erase function.
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: Canon iR3225/iR3230/ iR3235/iR3245 Series HDD Data Erase Kit-B2
- product_type: IT product(data erase function in digital MFP)
- report_link: https://www.ipa.go.jp/en/security/c0198_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0198_est.pdf
- toe_version: Version 1.00
- vendor: Canon Inc.
- expiration_date: 01.04.2014
- supplier: Canon Inc.
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0198_it8218.html
- toe_overseas_name: Canon iR3225/iR3230/iR3235/iR3245 Series HDD Data Erase Kit-B2 Version 1.00
|
|
heuristics/st_references/directly_referenced_by |
{} |
ANSSI-CC-2019/38 |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0946-2014 |
heuristics/st_references/indirectly_referenced_by |
{} |
ANSSI-CC-2019/38 |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0946-2014 |
heuristics/protection_profiles |
{} |
f6d23054061d72ba |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0198_erpt.pdf |
ANSSI-CC-2016-60.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2016/60
- cert_item: DragonFly v4.0 sur composant SLE97CNFX1M50PE
- cert_item_version: Version 4.0, Identification Hardware 412691 Card Manager GOP Ref V21.06.01
- cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
- developer: Oberthur Technologies 420, rue d’Estienne d’Orves CS 40008, 92 705 Colombes Cedex, France Infineon Technologies AG Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Oberthur Technologies 420 rue d’Estienne d’Orves CS 40008, 92 705 COLOMBES CEDEX, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: U)SIM Java Card Platform Protection Profile - Basic Configuration, version 2.0.2
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0198-01: 1
- Certification No. C0198: 1
|
- DE:
- BSI-DSZ-CC-0946-2014: 2
- BSI-DSZ-CC-0946-V2-2015: 1
- FR:
- ANSSI-CC-2014/81: 1
- ANSSI-CC-2016/60: 22
- ANSSI-CC-PP-2010/04: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.ADMIN_PWD: 1
- A.NETWORK: 1
- T:
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon Technologies: 3
- Infineon Technologies AG: 4
- Oberthur:
- OBERTHUR: 3
- Oberthur Technologies: 12
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 2
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20120425153253+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20120425153352+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 587707
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 21
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: ANSSI-CC-2016-60
- pdf_file_size_bytes: 353899
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
pdf_data/st_filename |
c0198_est.pdf |
ANSSI-CC-2016-60_cible publique.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 2
- EAL 4 augmented: 1
- EAL4: 7
- EAL4 augmented: 5
- EAL4+: 3
- EAL5: 2
- EAL5 augmented: 2
- EAL5+: 2
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 4
- ACM_SCP.1: 3
- ADO:
- ADO_DEL.1: 4
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 4
- ADV_HLD.2: 3
- ADV_RCR.1: 4
- AGD:
- AGD_ADM.1: 4
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.2: 4
- ATE_DPT.1: 3
- ATE_FUN.1: 4
- ATE_IND.2: 3
- AVA:
- AVA_MSU.1: 4
- AVA_SOF.1: 3
- AVA_VLA.1: 4
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 15
- ADV_FSP: 1
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 20
- ADV_IMP: 1
- ADV_IMP.1: 11
- ADV_TDS: 1
- ADV_TDS.1: 2
- ADV_TDS.2: 1
- ADV_TDS.3: 23
- AGD:
- AGD_ADM: 1
- AGD_OPE: 3
- AGD_OPE.1: 19
- AGD_PRE: 1
- AGD_PRE.1: 11
- AGD_USR: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 16
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 7
- ALC_DEL: 1
- ALC_DEL.1: 6
- ALC_DVS: 8
- ALC_DVS.1: 1
- ALC_DVS.2: 20
- ALC_FLR.3: 23
- ALC_LCD: 1
- ALC_LCD.1: 9
- ALC_TAT: 1
- ALC_TAT.1: 10
- ASE:
- ASE_APD.1: 1
- ASE_CCL: 1
- ASE_CCL.1: 15
- ASE_ECD: 1
- ASE_ECD.1: 14
- ASE_INT: 1
- ASE_INT.1: 17
- ASE_OBJ: 1
- ASE_OBJ.2: 13
- ASE_REQ: 1
- ASE_REQ.1: 2
- ASE_REQ.2: 15
- ASE_SPD: 1
- ASE_SPD.1: 8
- ASE_TSS: 1
- ASE_TSS.1: 6
- ATE:
- ATE_COV: 1
- ATE_COV.1: 2
- ATE_COV.2: 8
- ATE_DPT: 1
- ATE_DPT.1: 7
- ATE_FUN: 1
- ATE_FUN.1: 14
- ATE_IND: 1
- ATE_IND.2: 7
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_RIP.1: 9
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 10
- FIA_UAU.2.1: 1
- FIA_UID.1: 5
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 10
- FMT_MOF.1.1: 1
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM.1: 9
- FPT_RVM.1.1: 1
|
- FAU:
- FAU_ARP.1: 16
- FAU_ARP.1.1: 1
- FAU_SAA.1: 3
- FCO:
- FCS:
- FCS_CKM.1: 19
- FCS_CKM.1.1: 1
- FCS_CKM.2: 8
- FCS_CKM.2.1: 1
- FCS_CKM.3: 6
- FCS_CKM.3.1: 1
- FCS_CKM.4: 21
- FCS_CKM.4.1: 1
- FCS_COP: 52
- FCS_COP.1: 25
- FCS_COP.1.1: 1
- FCS_RNG: 9
- FCS_RNG.1: 7
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 55
- FDP_ACC.1: 26
- FDP_ACC.2: 7
- FDP_ACF: 41
- FDP_ACF.1: 29
- FDP_IFC: 44
- FDP_IFC.1: 26
- FDP_IFC.2: 4
- FDP_IFF: 38
- FDP_IFF.1: 26
- FDP_IFF.1.2: 1
- FDP_IFF.1.4: 1
- FDP_ITC: 25
- FDP_ITC.1: 8
- FDP_ITC.2: 28
- FDP_RIP: 110
- FDP_RIP.1: 10
- FDP_ROL: 23
- FDP_ROL.1: 10
- FDP_SDI.2: 7
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 10
- FDP_UIT.1: 4
- FIA:
- FIA_AFL: 6
- FIA_AFL.1: 2
- FIA_ATD: 8
- FIA_ATD.1: 2
- FIA_UAU: 36
- FIA_UAU.1: 4
- FIA_UAU.2: 1
- FIA_UAU.4: 1
- FIA_UAU.5: 3
- FIA_UAU.7: 1
- FIA_UID: 33
- FIA_UID.1: 16
- FIA_UID.2: 4
- FIA_USB: 7
- FIA_USB.1: 3
- FMT:
- FMT_MSA: 173
- FMT_MSA.1: 20
- FMT_MSA.2: 2
- FMT_MSA.3: 30
- FMT_MSA.3.1: 2
- FMT_MTD: 23
- FMT_MTD.1: 3
- FMT_MTD.1.1: 1
- FMT_MTD.3: 1
- FMT_REV: 7
- FMT_REV.1: 4
- FMT_SMF: 65
- FMT_SMF.1: 30
- FMT_SMF.1.1: 1
- FMT_SMR: 71
- FMT_SMR.1: 49
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO: 6
- FPR_UNO.1: 11
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 49
- FPT_FLS.1: 17
- FPT_FLS.1.1: 1
- FPT_PHP: 8
- FPT_PHP.3: 1
- FPT_RCV: 28
- FPT_RCV.3: 8
- FPT_RCV.4: 1
- FPT_RPL: 7
- FPT_RPL.1: 4
- FPT_TDC: 14
- FPT_TDC.1: 14
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 1
- FRU:
- FTP:
- FTP_ITC: 24
- FTP_ITC.1: 11
- FTP_TRP: 8
- FTP_TRP.1: 14
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.ADMIN_PWD: 1
- A.NETWORK: 4
- A.PWD_MANAGE: 1
- O:
- O.ADMIN_AUTH: 4
- O.AUTH_BOX: 1
- O.RESIDUAL: 5
- OE:
- OE.ADMIN: 2
- OE.ADMIN_PWD: 2
- OE.NETWORK: 2
- T:
|
- A:
- A.APPLET: 5
- A.APPS-PROVIDER: 4
- A.CONTROLLING-: 2
- A.CONTROLLING-AUTHORITY: 2
- A.DF_SECURE_VALUES: 1
- A.KEY-ESCROW: 4
- A.MOBILE-OPERATOR: 4
- A.OTA-ADMIN: 4
- A.VERIFICATION: 5
- A.VERIFICATION-: 2
- A.VERIFICATION-AUTHORITY: 2
- D:
- D.API_DATA: 3
- D.APP_CODE: 8
- D.APP_C_DATA: 5
- D.APP_I_DATA: 7
- D.APSD_KEYS: 3
- D.CARD_MNGT_DATA: 3
- D.CASD_KEYS: 3
- D.CRYPTO: 4
- D.DF_CODE: 3
- D.DF_DATA: 2
- D.GP_CODE: 2
- D.ISD_KEYS: 3
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.PIN: 5
- D.SEC_DATA: 7
- D.VASD_KEYS: 3
- O:
- O.ALARM: 22
- O.APPLET: 21
- O.APPLI-AUTH: 13
- O.CARD-: 7
- O.CARD-MANAGEMENT: 72
- O.CIPHER: 16
- O.CODE_PKG: 14
- O.COMM_AUTH: 20
- O.COMM_CONFIDENTIALITY: 14
- O.COMM_INTEGRITY: 20
- O.DELETION: 14
- O.DF_ACCESS-CONTROL: 2
- O.DF_AUTHENTICATION: 4
- O.DF_TYPE_CONSISTENCY: 1
- O.DOMAIN-RIGHTS: 27
- O.FIREWALL: 51
- O.GLOBAL_ARRAYS_CONFI: 1
- O.GLOBAL_ARRAYS_CONFID: 18
- O.GLOBAL_ARRAYS_INTEG: 10
- O.INSTALL: 16
- O.JAVAOBJECT: 41
- O.KEY-MNGT: 25
- O.LOAD: 18
- O.NATIVE: 14
- O.OBJ-DELETION: 9
- O.OPERATE: 35
- O.PIN-: 3
- O.PIN-MNGT: 19
- O.REALLOCATION: 17
- O.REMOTE: 15
- O.REMOTE_MTH: 1
- O.REMOTE_MTHD: 5
- O.REMOTE_OBJ: 10
- O.RESOURCES: 25
- O.RMI_SERVICE: 12
- O.ROR: 5
- O.SCP: 63
- O.SCP-IC: 1
- O.SCP-SUPPORT: 2
- O.SCPP: 1
- O.SID: 40
- O.TRANSACTION: 19
- OE:
- OE.AID-MANAGEMENT: 5
- OE.AP-: 1
- OE.AP-KEYS: 6
- OE.APPLET: 9
- OE.APPS-PROVIDER: 6
- OE.BASIC-APPS-VALIDATION: 5
- OE.CA-KEYS: 8
- OE.CODE-: 6
- OE.CODE-EVIDENCE: 20
- OE.CONTROLLING-: 1
- OE.CONTROLLING-AUTHORITY: 3
- OE.DF_SECURE_VALUES: 3
- OE.KEY-CHANGE: 7
- OE.KEY-ESCROW: 6
- OE.KEY-GENERATION: 4
- OE.MOBILE-OPERATOR: 6
- OE.OPERATOR-KEYS: 6
- OE.OTA-ADMIN: 4
- OE.OTA-LOADING: 5
- OE.OTA-SERVERS: 5
- OE.PERSONALIZER: 1
- OE.PRODUCTION: 1
- OE.QUOTAS: 6
- OE.SCP: 3
- OE.SECURE-APPS-: 2
- OE.SECURE-APPS-CERTIFICATION: 4
- OE.SECURITY-DOMAINS: 4
- OE.SHARE-CONTROL: 7
- OE.VA-KEYS: 5
- OE.VA_KEYS: 1
- OE.VERIFICATION: 39
- OE.VERIFICATION-: 1
- OE.VERIFICATION-AUTHORITY: 3
- OP:
- OP.ARRAY_ACCESS: 4
- OP.CREATE: 7
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.GET_ROR: 3
- OP.INSTANCE_FIELD: 4
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.INVOKE: 3
- OP.JAVA: 5
- OP.PUT: 6
- OP.RECEIVE: 1
- OP.RET_RORD: 3
- OP.SEND: 1
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- OSP.AID-MANAGEMENT: 4
- OSP.APSD-KEYS: 4
- OSP.BASIC-APPS-VALIDATION: 4
- OSP.CASD-KEYS: 4
- OSP.KEY-CHANGE: 4
- OSP.KEY-GENERATION: 4
- OSP.OPERATOR-KEYS: 4
- OSP.OTA-LOADING: 4
- OSP.OTA-SERVERS: 5
- OSP.QUOTAS: 4
- OSP.SECURE-APPS-: 2
- OSP.SECURE-APPS-CERTIFICATION: 2
- OSP.SECURITY-DOMAINS: 4
- OSP.SHARE-CONTROL: 4
- OSP.VASD-KEYS: 4
- OSP.VERIFICATION: 5
- R:
- T:
- T.COM_EXPLOIT: 6
- T.CONFID-: 1
- T.CONFID-APPLI-DATA: 17
- T.CONFID-JCS-CODE: 6
- T.CONFID-JCS-DATA: 10
- T.DELETION: 5
- T.DF_CLONING: 4
- T.DF_DATA_MODIFICATI: 1
- T.DF_DATA_MODIFICATION: 3
- T.DF_IMPERSONATE: 4
- T.EXE-: 1
- T.EXE-CODE: 8
- T.EXE-CODE-REMOTE: 4
- T.IN: 1
- T.INSTALL: 7
- T.INTEG-: 1
- T.INTEG-APPLI-: 6
- T.INTEG-APPLI-CODE: 11
- T.INTEG-APPLI-DATA: 22
- T.INTEG-JCS-: 1
- T.INTEG-JCS-CODE: 5
- T.INTEG-JCS-DATA: 12
- T.INTEG-USER-DATA: 7
- T.LIFE_CYCLE: 5
- T.NATIVE: 6
- T.OBJ-DELETION: 4
- T.PHYSICAL: 5
- T.RESOURCES: 9
- T.SID: 20
- T.UNAUTHORIZED_ACC: 1
- T.UNAUTHORIZED_ACCESS: 3
- T.UNAUTHORIZED_CAR: 1
- T.UNAUTHORIZED_CARD_MNGT: 7
|
pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft: 3
- Microsoft Corporation: 1
|
- Infineon:
- NXP:
- NXP: 7
- NXP Semiconductors: 1
- Oberthur:
- Oberthur: 19
- Oberthur Technologies: 212
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 2
- SHA-384: 1
- SHA-512: 1
- SHA256: 1
- SHA384: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- malfunction: 1
- physical tampering: 2
- SCA:
- DPA: 1
- SPA: 1
- physical probing: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- FIPS:
- FIPS 140-2: 1
- FIPS 180-3: 4
- FIPS 186-3: 1
- FIPS 197: 2
- FIPS 46-3: 2
- FIPS 81: 1
- FIPS PUB 140-2: 1
- FIPS PUB 180-3: 1
- FIPS PUB 186-3: 1
- FIPS PUB 197: 1
- FIPS PUB 46-3: 1
- FIPS PUB 81: 1
- FIPS186-3: 2
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 14443-3: 1
- ISO/IEC 9796-1: 1
- ISO/IEC 9797-1: 2
- PKCS:
- RFC:
- SCP:
- SCP 80: 1
- SCP02: 3
- SCP80: 3
- SCP81: 1
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- GlobalPlatform 2.1.1: 1
- GlobalPlatform 2.2.1: 2
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 4
- javacard.framework.service: 3
- javacard.security: 4
- javacardx:
- javacardx.crypto: 3
- javacardx.framework.util: 1
- javacardx.security: 1
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. PUBLIC DRAGONFLY V4 FQR : 401 4747 Issue: 1 Date : 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: Satoshi Hirota
- /CreationDate: D:20120307154318+09'00'
- /Creator: PScript5.dll Version 5.2
- /Keywords:
- /ModDate: D:20120307154318+09'00'
- /Producer: Adobe LiveCycle PDFG 7.2
- /Subject:
- /Title: HDD Data Erase Kit-B1 Security Target
- pdf_file_size_bytes: 290588
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 28
|
- /Author: mestiri
- /CreationDate: D:20160304105412+01'00'
- /Creator: PDFCreator Version 1.6.2
- /Keywords: Dragon 4
- /ModDate: D:20160304105412+01'00'
- /Producer: GPL Ghostscript 9.05
- /Subject: ST-LITE
- /Title: FQR 401 4747 Ed 1 dragonFly v4 0 ST Lite
- pdf_file_size_bytes: 1487766
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 205
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |