name |
bizhub C754 / bizhub C654 / ineo+ 754 / ineo+ 654 Control Software Version: A2X00Y0-0100-G00-53 |
NXP JCOP 6.2 on SN220 Secure Element, R1.01.1, R1.02.1, R1.02.1-1, R2.01.1 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
NL |
status |
archived |
active |
not_valid_after |
13.11.2017 |
29.11.2027 |
not_valid_before |
29.10.2012 |
29.11.2022 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-22-0428888-Cert.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0374_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0428888-CR2-1.0.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0374_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0428888-STLite_v1.8.pdf |
manufacturer |
Konica Minolta Business Technologies, Inc |
NXP Semiconductors Germany GmbH |
manufacturer_web |
https://www.konicaminolta.com/ |
https://www.nxp.com |
security_level |
EAL3 |
ALC_FLR.1, ALC_DVS.2, AVA_VAN.5, ASE_TSS.2, EAL5+ |
dgst |
847d7d7e9ca1605c |
a66d864aa9f72b9c |
heuristics/cert_id |
JISEC-CC-CRP-C0374 |
NSCIB-CC-0428888-CR2 |
heuristics/cert_lab |
[] |
|
heuristics/cpe_matches |
cpe:2.3:h:konicaminolta:bizhub_c754:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_754:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c654:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_654:-:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_CMC.3, ADV_ARC.1, ATE_COV.2, ASE_TSS.1, AGD_OPE.1, ATE_DPT.1, ALC_DVS.1, ASE_REQ.2, ADV_TDS.2, ALC_CMS.3, AVA_VAN.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_ECD.1, ADV_FSP.3, ASE_OBJ.2, ASE_INT.1, ASE_SPD.1, ATE_FUN.1, ALC_LCD.1 |
AVA_VAN.5, ASE_TSS.2, ALC_FLR.1, ALC_DVS.2 |
heuristics/extracted_versions |
654, 754, 53, 0100 |
1.01.1, 6.2, 2.01.1, 1.02.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
NSCIB-CC-22-0258298-CR |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
NSCIB-CC-22-0258298-CR |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0374
- certification_date: 01.10.2012
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0374_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Identification / Authentication and Access Control Function The function that identifies/authenticates a user and controls the access to highly confidential image data stored in MFP. - Audit Log Function The function to record the audit log contributing to detect the infringement of Identification/Authentication and Access Control Function. - HDD Encryption Function The function to encrypt the data written in HDD by using the function of ASIC. - Overwrite Deletion Function The function that deletes the data no longer required of HDD by deletion method compliant with various overwrite deletion standards. Possible to overwrite all to delete depends on the operation. - Safety Transmitting and Receiving Function of Image file The function to encrypt image data by S/MIME when transmitting the image data by e-mail, and to use safety communication path by SSL/TLS when transmitting and receiving it by other way. - Fax Unit Control Function The function to prevent accessing the internal network using FAX as steppingstone.
- evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
- product: Japanese:bizhub C754 / bizhub C654 / ineo+ 754 / ineo+ 654 Zentai Seigyo Software English:bizhub C754 / bizhub C654 / ineo+ 754 / ineo+ 654 Control Software
- product_type: Control Software for digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0374_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0374_est.pdf
- toe_version: A2X00Y0-0100-G00-53
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.11.2017
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub C754 / bizhub C654 / ineo+ 754 / ineo+ 654 Zentai Seigyo Software A2X00Y0-0100-G00-53
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0374_it1384.html
- toe_overseas_name: bizhub C754 / bizhub C654 / ineo+ 754 / ineo+ 654 Control Software A2X00Y0-0100-G00-53
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
1153ad24c84b397a, 7f886b64878b68c1, d1376142068b1da5 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0104b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0100b_pdf.pdf |
pdf_data/cert_filename |
|
NSCIB-CC-22-0428888-Cert.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0104: 1
- BSI-CC-PP-0099-v2-2020: 1
- BSI-CC-PP-0100-2018: 1
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL2: 1
- EAL5: 1
- EAL5 augmented: 1
- EAL7: 1
|
pdf_data/cert_keywords/cc_sar |
|
- ALC:
- ALC_DVS.2: 1
- ALC_FLR.1: 1
- ALC_FLR.3: 2
- ASE:
- AVA:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
- NXP:
- NXP: 1
- NXP Semiconductors: 1
|
pdf_data/cert_keywords/eval_facility |
|
- BrightSight:
- SGS:
- SGS: 1
- SGS Brightsight: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408-1: 1
- ISO/IEC 15408-2: 1
- ISO/IEC 15408-3: 1
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: kruitr
- /CreationDate: D:20230105164924+01'00'
- /Creator: Bullzip PDF Printer (11.0.0.2588)
- /ModDate: D:20230105165008+01'00'
- /Producer: PDF Printer / www.bullzip.com / FPG / TUV Rheinland Service GmbH
- /Title: Microsoft Word - NSCIB-CC-22-0428888-Cert.doc
- pdf_file_size_bytes: 247264
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0374_erpt.pdf |
NSCIB-CC-0428888-CR2-1.0.pdf |
pdf_data/report_frontpage |
|
- NL:
- cert_id: NSCIB-CC-0428888-CR2
- cert_item: NXP JCOP 6.2 on SN220 Secure Element, R1.01.1, R1.02.1, R1.02.1-1, R2.01.1
- cert_lab: SGS Brightsight B.V.
- developer: NXP Semiconductors Germany GmbH
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0374-01: 1
- Certification No. C0374: 1
|
- NL:
- CC-22-0258298: 1
- NSCIB-CC-0428888-CR2: 19
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0099-2017: 1
- BSI-CC-PP-0099-V2-2020: 1
- BSI-CC-PP-0100-2018: 1
- BSI-CC-PP-0104-2019: 1
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 5: 1
- EAL4: 1
- EAL5: 1
- EAL5 augmented: 1
- EAL5+: 3
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ALC:
- ALC_DVS.2: 2
- ALC_FLR.1: 2
- ASE:
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVICE: 1
- T:
- T.ACCESS-GROUP-: 1
- T.ACCESS-GROUP-BOX: 1
- T.ACCESS-PRIVATE-: 1
- T.ACCESS-PRIVATE-BOX: 1
- T.ACCESS-PUBLIC-: 1
- T.ACCESS-PUBLIC-BOX: 1
- T.ACCESS-SECURE-: 1
- T.ACCESS-SECURE-PRINT: 1
- T.ACCESS-SETTING: 2
- T.BACKUP-RESTORE: 2
- T.BRING-OUT-STORA: 1
- T.BRING-OUT-STORAGE: 1
- T.DISCARD-MFP: 2
- T.UNEXPECTED-TRA: 1
- T.UNEXPECTED-TRANSMISSION: 1
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 17
- NXP Semiconductors: 3
|
pdf_data/report_keywords/eval_facility |
|
- BrightSight:
- SGS:
- SGS: 3
- SGS Brightsight: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
- MAC:
- CBC-MAC: 3
- CMAC: 2
- HMAC: 1
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 2
- SHA-384: 2
- SHA-512: 2
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
- Generic:
- Crypto Library 2.2.0: 3
- Crypto Library 2.3.1: 1
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- SCA:
- side channel: 1
- side-channel: 1
- other:
- JIL: 2
- JIL-AAPS: 1
- JIL-AM: 2
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
|
|
pdf_data/report_keywords/javacard_version |
|
- JavaCard:
- Java Card 3.0.5: 1
- Java Card 3.1: 2
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in the MFP. This TOE includes the audit log function and contributes to the detection of: 1
|
- OutOfScope:
- or non-standard algorithms, protocols and implementations: OSCCA, MIFARE, and Felica, which are out of scope as there are no security claims relating to these. Not all key sizes specified in the [ST] have: 1
- out of scope: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20130419152138+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20130419152219+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 473698
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 41
|
|
pdf_data/st_filename |
c0374_est.pdf |
NSCIB-CC-0428888-STLite_v1.8.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- NL:
- CC-21-0258298: 2
- NSCIB-CC-0428888: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0084-2014: 1
- BSI-CC-PP-0099-2017: 1
- BSI-CC-PP-0099-v2-2020: 1
- BSI-CC-PP-0100-2018: 1
- BSI-CC-PP-0104: 1
- BSI-PP-0084: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL5: 8
- EAL5 augmented: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ALC:
- ALC_DVS.2: 4
- ALC_FLR.1: 5
- ASE:
- ASE_INT: 2
- ASE_REQ: 2
- ASE_SPD: 2
- ASE_TSS: 2
- ASE_TSS.2: 4
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 11
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GNE.2.1: 1
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 3
- FAU_SAR.2.1: 1
- FAU_STG.1: 8
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 4
- FAU_STG.4.1: 2
- FCS:
- FCS_CAP.1: 2
- FCS_CKM: 2
- FCS_CKM.1: 9
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 4
- FCS_COP: 1
- FCS_COP.1: 11
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 84
- FDP_ACC.1.1: 4
- FDP_ACF: 4
- FDP_ACF.1: 53
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_ACP.1: 1
- FDP_IFC.1: 15
- FDP_IFC.1.1: 1
- FDP_IFF.1: 7
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC: 1
- FDP_ITC.1: 4
- FDP_ITC.2: 2
- FDP_RIP: 1
- FDP_RIP.1: 1
- FDP_RIP.1.1: 1
- FDP_UAU.7: 1
- FIA:
- FIA_AFL.1: 90
- FIA_AFL.1.1: 8
- FIA_AFL.1.2: 8
- FIA_ATD.1: 30
- FIA_ATD.1.1: 1
- FIA_MSA.3: 1
- FIA_SOS.1: 52
- FIA_SOS.1.1: 4
- FIA_SOS.2: 10
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_SSL.3: 1
- FIA_UAU: 2
- FIA_UAU.1: 47
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.2: 55
- FIA_UAU.2.1: 4
- FIA_UAU.6: 12
- FIA_UAU.6.1: 1
- FIA_UAU.7: 20
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 32
- FIA_UID.2: 84
- FIA_UID.2.1: 7
- FIA_USB.1: 27
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MAS.1: 1
- FMT_MOF.1: 63
- FMT_MOF.1.1: 5
- FMT_MSA: 5
- FMT_MSA.1: 43
- FMT_MSA.1.1: 3
- FMT_MSA.3: 52
- FMT_MSA.3.1: 8
- FMT_MSA.3.2: 7
- FMT_MTD.1: 168
- FMT_MTD.1.1: 15
- FMT_SMF.1: 130
- FMT_SMF.1.1: 1
- FMT_SMR.1: 202
- FMT_SMR.1.1: 6
- FMT_SMR.1.2: 6
- FMT_SOS.1: 1
- FPT:
- FTA:
- FTA_SSL.3: 7
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_ARP.1: 13
- FAU_ARP.1.1: 1
- FAU_SAA.1: 2
- FAU_SAS.1: 5
- FAU_SAS.1.1: 2
- FCO:
- FCO_NRO: 2
- FCO_NRO.1: 1
- FCO_NRO.2: 6
- FCO_NRO.2.1: 2
- FCO_NRO.2.2: 1
- FCO_NRO.2.3: 2
- FCS:
- FCS_CKM: 12
- FCS_CKM.1: 15
- FCS_CKM.1.1: 7
- FCS_CKM.2: 2
- FCS_CKM.2.1: 2
- FCS_CKM.4: 9
- FCS_CKM.4.1: 3
- FCS_CKM.5: 8
- FCS_CKM.5.1: 5
- FCS_COP: 12
- FCS_COP.1: 31
- FCS_COP.1.1: 33
- FCS_RNG: 3
- FCS_RNG.1: 4
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC.1: 31
- FDP_ACC.1.1: 5
- FDP_ACC.2: 10
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF.1: 24
- FDP_ACF.1.1: 5
- FDP_ACF.1.2: 8
- FDP_ACF.1.3: 6
- FDP_ACF.1.4: 6
- FDP_DAU.2: 2
- FDP_DAU.2.1: 2
- FDP_ETC.2: 1
- FDP_IFC: 2
- FDP_IFC.1: 22
- FDP_IFC.2: 21
- FDP_IFC.2.1: 3
- FDP_IFC.2.2: 3
- FDP_IFF: 2
- FDP_IFF.1: 29
- FDP_IFF.1.1: 3
- FDP_IFF.1.2: 5
- FDP_IFF.1.3: 5
- FDP_IFF.1.4: 7
- FDP_IFF.1.5: 4
- FDP_ITC: 2
- FDP_ITC.2: 9
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 2
- FDP_RIP.1: 14
- FDP_ROL.1: 8
- FDP_ROL.1.1: 1
- FDP_ROL.1.2: 1
- FDP_SDC: 1
- FDP_SDC.1: 2
- FDP_SDC.1.1: 1
- FDP_SDI: 5
- FDP_SDI.1: 1
- FDP_SDI.2: 5
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT.1: 1
- FDP_UIT: 2
- FDP_UIT.1: 5
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 11
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_API: 4
- FIA_API.1: 3
- FIA_ATD.1: 5
- FIA_UAU.1: 25
- FIA_UAU.1.1: 5
- FIA_UAU.1.2: 3
- FIA_UAU.4: 13
- FIA_UAU.4.1: 2
- FIA_UAU.5: 2
- FIA_UAU.5.1: 2
- FIA_UAU.5.2: 1
- FIA_UAU.6: 2
- FIA_UAU.6.1: 1
- FIA_UID: 2
- FIA_UID.1: 51
- FIA_UID.1.1: 7
- FIA_UID.1.2: 4
- FIA_UID.2: 2
- FIA_USB.1: 4
- FMT:
- FMT_MOF.1: 2
- FMT_MOF.1.1: 1
- FMT_MSA: 4
- FMT_MSA.1: 53
- FMT_MSA.1.1: 6
- FMT_MSA.2: 3
- FMT_MSA.2.1: 1
- FMT_MSA.3: 46
- FMT_MSA.3.1: 5
- FMT_MSA.3.2: 6
- FMT_MTD.1: 3
- FMT_MTD.1.1: 3
- FMT_MTD.3: 3
- FMT_SAE: 1
- FMT_SAE.1: 1
- FMT_SAE.1.1: 1
- FMT_SMF: 3
- FMT_SMF.1: 52
- FMT_SMF.1.1: 6
- FMT_SMR: 2
- FMT_SMR.1: 59
- FMT_SMR.1.1: 4
- FMT_SMR.1.2: 3
- FPR:
- FPR_UNO.1: 6
- FPR_UNO.1.1: 1
- FPT:
- FPT_EMS: 1
- FPT_ESA: 1
- FPT_ESA.1: 1
- FPT_ESA.1.4: 1
- FPT_FLS.1: 30
- FPT_FLS.1.1: 3
- FPT_ISA: 1
- FPT_ISA.1: 2
- FPT_ISA.1.5: 1
- FPT_PHP.3: 6
- FPT_PHP.3.1: 1
- FPT_RCV.3: 1
- FPT_RCV.3.1: 1
- FPT_RCV.3.2: 1
- FPT_RCV.3.3: 1
- FPT_STM: 2
- FPT_TCT: 1
- FPT_TCT.1: 1
- FPT_TDC.1: 5
- FPT_TDC.1.2: 2
- FPT_TIT: 1
- FPT_TIT.1: 1
- FPT_TST.1: 1
- FPT_TST.1.1: 1
- FRU:
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 15
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 2
- FTP_TRP.1: 2
- FTP_TST.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.A: 2
- A.ADMIN: 3
- A.NETWORK: 6
- A.SECRET: 3
- A.SERVICE: 4
- O:
- O.AUDIT: 2
- O.AUDIT-LOGGED: 3
- O.AUTH: 2
- O.AUTH-CAPABILITY: 5
- O.CONFIG: 12
- O.CRYPT: 4
- O.CRYPTO: 5
- O.CRYPTO-CAPABILITY: 4
- O.CRYPTO-KEY: 2
- O.CRYPTO-MAIL: 2
- O.FAX: 2
- O.FAX-CONTROL: 6
- O.GROUP: 3
- O.GROUP-BOX: 3
- O.OVERWRITE: 8
- O.PRIVATE: 3
- O.PRIVATE-BOX: 3
- O.PUBLIC: 3
- O.PUBLIC-BOX: 6
- O.REGISTERED: 3
- O.REGISTERED-USER: 12
- O.SECURE: 4
- O.SECURE-PRINT: 6
- O.TRUSTED: 3
- O.TRUSTED-PATH: 5
- OE:
- OE.ADMIN: 3
- OE.AUDIT: 3
- OE.AUDIT-REVIEWED: 2
- OE.AUDIT_ACCESS-AUT: 1
- OE.AUDIT_ACESS-AUTHORIZED: 1
- OE.AUDIT_STORAGE-PR: 1
- OE.AUDIT_STORAGE-PROTECTED: 1
- OE.FAX: 2
- OE.FAX-UNIT: 2
- OE.FEED: 2
- OE.FEED-BACK: 8
- OE.NETWORK: 4
- OE.S: 1
- OE.SECRET: 3
- OE.SERVER: 5
- OE.SERVICE: 3
- OE.SESSION: 10
- OE.SETTING: 2
- OE.SETTING-SECURITY: 2
- T:
- T.ACCESS: 19
- T.ACCESS-GROUP-BOX: 1
- T.ACCESS-PRIVATE-BOX: 1
- T.BACKUP: 3
- T.BACKUP-RESTORE: 1
- T.BRING: 3
- T.DISCARD: 3
- T.DISCARD-MFP: 1
- T.UNEXPECTED: 2
- T.UNEXPECTED-TRANSMISSION: 1
|
- A:
- A.APPS-PROVIDER: 5
- A.PROCESS-SEC-IC: 4
- A.USE_DIAG: 5
- A.USE_KEYS: 5
- A.VERIFICATION-AU: 1
- A.VERIFICATION-AUTHORITY: 4
- D:
- D.API_DATA: 1
- D.APP_CODE: 2
- D.APP_C_: 1
- D.APP_C_DATA: 2
- D.APP_I_DATA: 4
- D.APP_KEYS: 6
- D.APSD_KEYS: 5
- D.ATTACK_COUNTER: 7
- D.CARD_: 1
- D.CARD_MNGT_DATA: 2
- D.CONFIG_ITEM: 7
- D.CRYPTO: 3
- D.ISD_KEYS: 4
- D.JCS_: 1
- D.JCS_CODE: 5
- D.JCS_DATA: 4
- D.MODULE_CODE: 1
- D.MODULE_DATA: 1
- D.PIN: 8
- D.SEC_DATA: 2
- D.TOE_IDENTIFICATION: 2
- D.TOE_IDENTIFIER: 3
- D.UPDATE_IMAGE: 25
- D.VASD_KEYS: 3
- OE:
- OE.APPLET: 1
- OE.APPS-PROVIDER: 4
- OE.CAP_FILE: 1
- OE.CARD-MANAGEMENT: 2
- OE.CODE-EVIDENCE: 2
- OE.CONFID-UPDATE-: 1
- OE.CONFID-UPDATE-IMAGE: 3
- OE.IC: 3
- OE.KEY-: 1
- OE.KEY-CHANGE: 4
- OE.PROCESS_SEC_: 1
- OE.PROCESS_SEC_IC: 3
- OE.RE: 7
- OE.SCP: 18
- OE.SECURITY-DOMA: 1
- OE.SECURITY-DOMAINS: 3
- OE.USE_DIAG: 5
- OE.USE_KEYS: 5
- OE.VERIFICATION: 3
- OE.VERIFICATION-A: 1
- OE.VERIFICATION-AUTHOR: 1
- OE.VERIFICATION-AUTHORITY: 2
- OP:
- OP.MODIFY_: 1
- OP.READ_CONFIG_: 1
- OP.TRIGGER_: 1
- OP.TRIGGER_UPDATE: 2
- OP.USE_CONFIG_: 1
- OSP:
- OSP.KEY-CHANGE: 4
- OSP.PROCESS-TOE: 4
- OSP.SECURITY-DOM: 1
- OSP.SECURITY-DOMAINS: 3
- OT:
- OT.ALARM: 4
- OT.APPLI-AUTH: 5
- OT.ARRAY_VIEWS_CONFID: 1
- OT.ATTACK-COUNT: 1
- OT.ATTACK-COUNTE: 1
- OT.ATTACK-COUNTER: 3
- OT.AUTH-LOAD-: 1
- OT.AUTH-LOAD-UPD: 2
- OT.AUTH-LOAD-UPDATE-IMAGE: 2
- OT.CARD-: 1
- OT.CARD-CONFIGUR: 2
- OT.CARD-CONFIGURATION: 3
- OT.CARD-MANAGEM: 3
- OT.CARD-MANAGEMENT: 3
- OT.CIPHER: 3
- OT.COMM_: 5
- OT.COMM_AUTH: 6
- OT.COMM_CONFIDENTIALITY: 3
- OT.COMM_INTEGRITY: 3
- OT.CONFID-UPDATE-: 2
- OT.CONFID-UPDATE-IMAGE: 3
- OT.CRT-MNGT: 1
- OT.DELETION: 2
- OT.DOMAIN-RIGHTS: 7
- OT.EXT-MEM: 1
- OT.FIREWALL: 3
- OT.GLOBAL_: 1
- OT.GLOBAL_ARRAYS_CONFID: 1
- OT.IDENTIFICATION: 6
- OT.INSTALL: 2
- OT.KEY-MNGT: 3
- OT.LOAD: 2
- OT.NATIVE: 1
- OT.OPERATE: 5
- OT.PIN-MNGT: 1
- OT.REALLOCATION: 2
- OT.REMOTE: 1
- OT.RESOURCE: 1
- OT.RESTRICTED-MO: 3
- OT.RESTRICTED-MODE: 3
- OT.RND: 4
- OT.RNG: 1
- OT.SCP: 24
- OT.SECURE_AC_: 2
- OT.SECURE_AC_ACTIVATION: 3
- OT.SECURE_LOAD_: 4
- OT.SECURE_LOAD_ACODE: 3
- OT.SENSITIVE_RESULTS_INTEG: 1
- OT.SID: 2
- OT.TOE_: 2
- OT.TOE_IDENTIFICATION: 3
- OT.TRANSACTION: 2
- SA:
- SA.CONFID-UPDATE: 1
- SA.CONFID-UPDATE-IMAGE: 1
- SA.CONFIG-APPLET: 1
- SA.INTEG-APPLI-DATA: 1
- SA.INTEG-UPDATE-I: 1
- SA.INTEG-UPDATE-IMAGE: 1
- SA.OSU: 1
- SA.RM: 1
- SA.SCP: 3
- T:
- T.ATTACK-COUNTER: 3
- T.COM_EXPLOIT: 4
- T.CONFID-APPLI-DATA: 6
- T.CONFID-JCS-CODE: 2
- T.CONFID-JCS-DATA: 2
- T.CONFID-UPDATE-I: 1
- T.CONFID-UPDATE-IMAGE: 2
- T.CONFIG: 4
- T.DELETION: 4
- T.EXE-: 1
- T.EXE-CODE: 3
- T.EXE-CODE-REMOTE: 1
- T.INSTALL: 4
- T.INTEG-APPLI-: 2
- T.INTEG-APPLI-CODE: 3
- T.INTEG-APPLI-DATA: 10
- T.INTEG-JCS-CODE: 2
- T.INTEG-JCS-DATA: 2
- T.INTEG-UPDATE-IM: 1
- T.INTEG-UPDATE-IMAGE: 3
- T.INTERRUPT-OSU: 4
- T.LIFE_CYCLE: 4
- T.NATIVE: 2
- T.OBJ-DELETION: 1
- T.PHYSICAL: 3
- T.RESOURCES: 1
- T.RND: 3
- T.SID: 4
- T.UNAUTH-LOAD-UP: 1
- T.UNAUTH-LOAD-UPDATE-IMAGE: 3
- T.UNAUTHORIZED_: 1
- T.UNAUTHORIZED_CARD_MNGT: 3
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 341
- NXP Semiconductors: 25
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 16
- AES-: 1
- AES-128: 1
- AES-256: 16
- DES:
- 3DES:
- 3DES: 3
- Triple-DES: 1
- TripleDES: 1
- DES:
- constructions:
- MAC:
- CBC-MAC: 2
- CMAC: 10
- HMAC: 9
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 3
- SHA-384: 2
- SHA-512: 2
- SHA3:
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
- CBC:
- CCM:
- CFB:
- ECB:
- GCM:
- OFB:
|
pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 9
- brainpoolP384r1: 9
- brainpoolP521r1: 9
- NIST:
- Curve P-256: 8
- Curve P-384: 8
- Curve P-521: 8
- NIST P-256: 1
- P-256: 9
- P-384: 8
- P-521: 8
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 2
- Fault Injection: 1
- fault injection: 1
- malfunction: 1
- physical tampering: 1
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 2
- side channel: 2
- side-channel: 1
- timing attack: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
- JCOP:
- JCOP 2: 1
- JCOP 4: 1
- JCOP 6: 184
- JCOP6: 20
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS 186: 2
- FIPS 186-2: 4
- FIPS PUB 197: 2
- X509:
|
- BSI:
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
- FIPS:
- FIPS 180-4: 1
- FIPS 186-4: 1
- FIPS 197: 1
- FIPS 202-2015: 1
- FIPS PUB 186-4: 30
- PKCS:
- RFC:
- SCP:
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
- ALG:
- AES:
- ALG_AES_BLOCK_128_CBC_NOPAD: 1
- ALG_AES_BLOCK_128_CBC_NOPAD_: 1
- ALG_AES_BLOCK_128_ECB_NOPAD: 1
- ALG_AES_CBC_ISO9797_M2: 1
- ALG_AES_CBC_ISO9797_M2_STANDARD: 1
- ALG_AES_CBC_PKCS5: 1
- ALG_AES_CMAC16: 1
- ALG_AES_CMAC16_STANDARD: 1
- ALG_AES_ECB_ISO9797_M2: 1
- ALG_AES_ECB_PKCS5: 1
- ALG_AES_XTS: 1
- DES:
- ALG_DES_CBC_ISO9797_M1: 1
- ALG_DES_CBC_ISO9797_M2: 1
- ALG_DES_CBC_NOPAD: 1
- ALG_DES_CBC_PKCS5: 1
- ALG_DES_CMAC8: 1
- ALG_DES_ECB_ISO9797_M1: 1
- ALG_DES_ECB_ISO9797_M2: 2
- ALG_DES_ECB_NOPAD: 1
- ALG_DES_ECB_PKCS5: 1
- ALG_DES_MAC4_ISO9797_1_M1_ALG3: 1
- ALG_DES_MAC4_ISO9797_1_M2_ALG3: 1
- ALG_DES_MAC4_ISO9797_M1: 1
- ALG_DES_MAC4_ISO9797_M2: 1
- ALG_DES_MAC4_PKCS5: 1
- ALG_DES_MAC8_ISO9797_1_M1_ALG3: 1
- ALG_DES_MAC8_ISO9797_1_M2_ALG3: 1
- ALG_DES_MAC8_ISO9797_M1: 1
- ALG_DES_MAC8_ISO9797_M2: 1
- ALG_DES_MAC8_NOPAD: 1
- ALG_DES_MAC8_PKCS5: 1
- EC:
- ALG_EC_SVDP_DH: 1
- ALG_EC_SVDP_DHC: 1
- ALG_EC_SVDP_DHC_KDF: 1
- ALG_EC_SVDP_DHC_PLAIN: 1
- ALG_EC_SVDP_DH_KDF: 1
- ALG_EC_SVDP_DH_PLAIN: 1
- ALG_EC_SVDP_DH_PLAIN_XY: 1
- ECDSA:
- ALG_ECDSA_SHA_224: 1
- ALG_ECDSA_SHA_256: 2
- ALG_ECDSA_SHA_384: 1
- ALG_ECDSA_SHA_512: 1
- HMAC:
- ALG_HMAC_SHA_256: 1
- ALG_HMAC_SHA_384: 1
- ALG_HMAC_SHA_512: 1
- MD:
- RSA:
- ALG_RSA_NOPAD: 1
- ALG_RSA_PKCS1: 1
- ALG_RSA_PKCS1_OAEP: 1
- ALG_RSA_SHA_224_PKCS1: 1
- ALG_RSA_SHA_224_PKCS1_PSS: 1
- ALG_RSA_SHA_256_PKCS1: 1
- ALG_RSA_SHA_256_PKCS1_PSS: 1
- ALG_RSA_SHA_384_PKCS1: 2
- ALG_RSA_SHA_512_PKCS1: 1
- ALG_RSA_SHA_512_PKCS1_PSS: 1
- ALG_RSA_SHA_PKCS1: 1
- SHA:
- ALG_SHA_224: 1
- ALG_SHA_256: 3
- ALG_SHA_384: 2
- ALG_SHA_512: 2
- misc:
- LENGTH_AES_128: 3
- LENGTH_AES_192: 3
- LENGTH_AES_256: 4
- LENGTH_DES3_: 2
- LENGTH_DES3_2KEY: 4
- LENGTH_DES3_3KEY: 2
- LENGTH_EC_FP_128: 1
- LENGTH_EC_FP_192: 1
- LENGTH_EC_FP_224: 2
- LENGTH_EC_FP_256: 2
- LENGTH_EC_FP_384: 2
- LENGTH_EC_FP_521: 1
- LENGTH_RSA_1024: 1
- LENGTH_SHA: 1
- LENGTH_SHA_224: 1
- LENGTH_SHA_256: 2
- LENGTH_SHA_384: 1
- LENGTH_SHA_512: 2
- PAD_PKCS1_OAEP: 1
- SIG_CIPHER_AES_CMAC16: 1
- SIG_CIPHER_DES_CMAC8: 1
- SIG_CIPHER_ECDSA: 1
- SIG_CIPHER_RSA: 1
|
pdf_data/st_keywords/javacard_packages |
|
- com:
- com.felicanetworks.javacard.crypto.twopassauth: 1
- com.nxp.id.jcop.globalplatform: 1
- com.nxp.id.jcopx.accelerator: 1
- com.nxp.id.jcopx.authority: 1
- com.nxp.id.jcopx.blob: 1
- com.nxp.id.jcopx.egovaccelerators: 1
- com.nxp.id.jcopx.iar: 1
- com.nxp.id.jcopx.m4mext: 1
- com.nxp.id.jcopx.math: 1
- com.nxp.id.jcopx.mifare.mifaredesfire: 1
- com.nxp.id.jcopx.mifare.mifareplus: 1
- com.nxp.id.jcopx.oscca: 1
- com.nxp.id.jcopx.security: 1
- com.nxp.id.jcopx.strongbox: 1
- com.nxp.id.jcopx.uicc.auth: 1
- com.nxp.id.jcopx.uicc.globalplatform: 1
- com.nxp.id.jcopx.uicc.interfacebroker: 1
- com.nxp.id.jcopx.uicc.interfacebroker.sim: 1
- com.nxp.id.jcopx.uicc.interfacebroker.uicc: 1
- com.nxp.id.jcopx.uicc.system: 1
- com.nxp.id.jcopx.uicc.toolkit: 1
- com.nxp.id.jcopx.util: 1
- com.sec.mobile.fra: 1
- com.sony.javacard.crypto: 1
- com.sony.javacard.crypto.a4: 1
- com.sony.javacard.crypto.a5: 1
- com.sony.javacard.crypto.a6: 1
- com.sony.javacard.crypto.advance: 1
- com.sony.javacard.crypto.advance.e3: 1
- com.sony.javacard.crypto.advance.e4: 1
- de:
- java:
- javacard:
- javacard.crypto: 4
- javacard.crypto.advance: 3
- javacard.crypto.twopassauth: 1
- javacard.framework: 1
- javacard.security: 1
- javacardx:
- javacardx.apdu: 1
- javacardx.crypto: 1
- javacardx.framework.time: 1
- javacardx.framework.util.intx: 1
- javacardx.security: 1
- javacardx.security.cert: 3
- javacardx.security.derivation: 1
- javacardx.security.util: 1
- org:
- org.globalplatform: 1
- org.globalplatform.contactless: 1
- org.globalplatform.upgrade: 1
- org.mifare4mobile: 1
- org.mifare4mobile.hostinterface: 1
- org.mifare4mobile.parser: 1
- org.mifare4mobile.userverifier: 1
- uicc:
- uicc.access: 1
- uicc.access.bertlvfile: 1
- uicc.access.fileadministration: 1
- uicc.auth: 1
- uicc.globalplatform: 1
- uicc.hci.framework: 1
- uicc.hci.services.cardemulation: 1
- uicc.hci.services.cltobserver: 1
- uicc.hci.services.connectivity: 1
- uicc.hci.services.readermode: 1
- uicc.interfacebroker: 1
- uicc.interfacebroker.sim: 1
- uicc.interfacebroker.uicc: 1
- uicc.isim.access: 1
- uicc.services.highupdatearray: 1
- uicc.system: 2
- uicc.toolkit: 2
- uicc.usim.access: 1
- uicc.usim.geolocation: 1
- uicc.usim.suci: 1
- uicc.usim.toolkit: 1
|
pdf_data/st_keywords/certification_process |
- ConfidentialDocument:
- main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in: 1
|
|
pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20130415144110+09'00'
- /Creator: CubePDF
- /Keywords:
- /ModDate: D:20130415144114+09'00'
- /Producer: GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA
- /Subject:
- /Title:
- pdf_file_size_bytes: 1171475
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 114
|
- /Author: NXP B.V.
- /CreationDate: D:20221128141941Z
- /Creator: DITA Open Toolkit 3.3.1
- /Keywords: Common Criteria, Security Target, NXP JCOP 6.2 on SN220 Secure Element
- /ModDate: D:20221128142132-00'00'
- /Producer: Apache FOP Version 2.3
- /Subject: NXP JCOP 6.2 on SN220 Secure Element
- /Title: Security Target Lite
- pdf_file_size_bytes: 1224622
- pdf_hyperlinks: mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 126
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |