Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
bizhub C754 / bizhub C654 / ineo+ 754 / ineo+ 654 Control Software Version: A2X00Y0-0100-G00-53
JISEC-CC-CRP-C0374
MICARDO V4.0 R1.0 eHC v1.2
BSI-DSZ-CC-0861-2014
name bizhub C754 / bizhub C654 / ineo+ 754 / ineo+ 654 Control Software Version: A2X00Y0-0100-G00-53 MICARDO V4.0 R1.0 eHC v1.2
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP DE
not_valid_after 13.11.2017 01.09.2019
not_valid_before 29.10.2012 15.05.2014
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0374_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0861a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0374_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0861b_pdf.pdf
manufacturer Konica Minolta Business Technologies, Inc Morpho Cards GmbH
manufacturer_web https://www.konicaminolta.com/ https://www.morpho.com/e-documents
security_level EAL3 EAL4+, AVA_VAN.5
dgst 847d7d7e9ca1605c cb48c0a7c7fc3bbe
heuristics/cert_id JISEC-CC-CRP-C0374 BSI-DSZ-CC-0861-2014
heuristics/cert_lab [] BSI
heuristics/cpe_matches cpe:2.3:h:konicaminolta:bizhub_754:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c654:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c754:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_654:-:*:*:*:*:*:*:* {}
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, AVA_VAN.2, ADV_FSP.3, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ASE_TSS.1, ADV_ARC.1 ASE_CCL.1, ASE_OBJ.2, ALC_CMC.5, AVA_VAN.5, ASE_INT.1, APE_ECD.1, ASE_REQ.2, ATE_DPT.4, ADV_FSP.6, ADV_TDS.6, ATE_FUN.2, ADV_IMP.2, AGD_PRE.1, ATE_IND.3, ASE_ECD.1, ALC_FLR.1, APE_OBJ.2, ALC_TAT.3, ALC_DVS.2, ASE_SPD.1, APE_INT.1, ATE_COV.3, ADV_INT.3, ALC_LCD.2, ASE_TSS.2, ALC_CMS.5, APE_CCL.1, AGD_OPE.1, APE_SPD.1, ALC_DEL.1, ADV_ARC.1, ADV_SPM.1, APE_REQ.2
heuristics/extracted_versions 0100, 654, 53, 754 1.0, 1.2, 4.0
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0837-2013, NSCIB-CC-12-36243-CR, BSI-DSZ-CC-0673-2010
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0391-2009, BSI-DSZ-CC-0411-2007, BSI-DSZ-CC-0837-2013, BSI-DSZ-CC-0602-2009, BSI-DSZ-CC-0417-2008, NSCIB-CC-12-36243-CR, BSI-DSZ-CC-0410-2007, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0673-2010
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0374
  • certification_date: 01.10.2012
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0374_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Identification / Authentication and Access Control Function The function that identifies/authenticates a user and controls the access to highly confidential image data stored in MFP. - Audit Log Function The function to record the audit log contributing to detect the infringement of Identification/Authentication and Access Control Function. - HDD Encryption Function The function to encrypt the data written in HDD by using the function of ASIC. - Overwrite Deletion Function The function that deletes the data no longer required of HDD by deletion method compliant with various overwrite deletion standards. Possible to overwrite all to delete depends on the operation. - Safety Transmitting and Receiving Function of Image file The function to encrypt image data by S/MIME when transmitting the image data by e-mail, and to use safety communication path by SSL/TLS when transmitting and receiving it by other way. - Fax Unit Control Function The function to prevent accessing the internal network using FAX as steppingstone.
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
    • product: Japanese:bizhub C754 / bizhub C654 / ineo+ 754 / ineo+ 654 Zentai Seigyo Software English:bizhub C754 / bizhub C654 / ineo+ 754 / ineo+ 654 Control Software
    • product_type: Control Software for digital MFP
    • report_link: https://www.ipa.go.jp/en/security/c0374_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0374_est.pdf
    • toe_version: A2X00Y0-0100-G00-53
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.11.2017
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub C754 / bizhub C654 / ineo+ 754 / ineo+ 654 Zentai Seigyo Software A2X00Y0-0100-G00-53
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0374_it1384.html
  • toe_overseas_name: bizhub C754 / bizhub C654 / ineo+ 754 / ineo+ 654 Control Software A2X00Y0-0100-G00-53
heuristics/st_references/directly_referencing {} NSCIB-CC-12-36243-CR
heuristics/st_references/indirectly_referencing {} NSCIB-CC-12-36243-CR
heuristics/protection_profiles {} 248ee1444754e863
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP0020_V3b_pdf.pdf
pdf_data/report_filename c0374_erpt.pdf 0861a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0861-2014
    • cert_item: MICARDO V4.0 R1.0 eHC v1.2
    • cert_lab: BSI
    • developer: Morpho Cards GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0374-01: 1
    • Certification No. C0374: 1
  • DE:
    • BSI-DSZ-CC-0673-2010: 1
    • BSI-DSZ-CC-0837: 1
    • BSI-DSZ-CC-0837-2013: 4
    • BSI-DSZ-CC-0837-2013-MA-01: 1
    • BSI-DSZ-CC-0861: 1
    • BSI-DSZ-CC-0861-2014: 22
  • NL:
    • NSCIB-CC-12-36243: 1
    • NSCIB-CC-12-36243-MA1: 1
    • NSCIB-CC-36243: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0020-V3-2010-MA-01: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 4
  • EAL:
    • EAL 4: 7
    • EAL 4 augmented: 3
    • EAL 5: 1
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 7
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 2
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 2
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 1
    • FCS_COP: 8
    • FCS_RND.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVICE: 1
  • T:
    • T.ACCESS-GROUP-: 1
    • T.ACCESS-GROUP-BOX: 1
    • T.ACCESS-PRIVATE-: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.ACCESS-PUBLIC-: 1
    • T.ACCESS-PUBLIC-BOX: 1
    • T.ACCESS-SECURE-: 1
    • T.ACCESS-SECURE-PRINT: 1
    • T.ACCESS-SETTING: 2
    • T.BACKUP-RESTORE: 2
    • T.BRING-OUT-STORA: 1
    • T.BRING-OUT-STORAGE: 1
    • T.DISCARD-MFP: 2
    • T.UNEXPECTED-TRA: 1
    • T.UNEXPECTED-TRANSMISSION: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • Morpho:
    • Morpho: 16
  • NXP:
    • NXP: 6
    • NXP Semiconductors: 1
pdf_data/report_keywords/eval_facility
  • SRC:
    • SRC Security Research & Consulting: 3
  • TUV:
    • TÜV Informationstechnik: 1
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA-OAEP: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
pdf_data/report_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 7
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/report_keywords/crypto_engine
  • SmartMX:
    • SmartMX2: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 2
  • SCA:
    • physical probing: 1
    • side channel: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI TR-03116-1: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • BSI:
    • AIS 20: 3
    • AIS 25: 3
    • AIS 26: 2
    • AIS 31: 4
    • AIS 32: 1
    • AIS 34: 1
    • AIS 35: 2
    • AIS 36: 4
    • AIS 38: 1
    • AIS20: 1
    • AIS36: 2
  • FIPS:
    • FIPS 180-4: 1
  • PKCS:
    • PKCS#1: 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • or through the network. The TOE supports the protection function against the exposure of the highly confidential documents stored in the MFP. This TOE includes the audit log function and contributes to the detection of: 1
  • ConfidentialDocument:
    • 2013, Morpho Cards GmbH (confidential document) [11] Preparative Procedures for the Initialiser for MICARDO V4.0 R1.0 V1.2, Version X1.004, 02: 1
    • Report BSI-DSZ-CC-0861, Version 1.8, 25 April 2014, SRC Security Research & Consulting GmbH (confidential document) [10] Preparative Procedures for the Personaliser for MICARDO V4.0 R1.0 V1.2, Version X1.002, 17: 1
    • Version X1.00.19, 10 April 2014, Security Target – MICARDO V4.0 R1.0 V1.2, Morpho Cards GmbH (confidential document) [7] Protection Profile for electronic Health Card (eHC) - elektronische Gesundheitskarte (eGK: 1
    • v4.0 Release 1 (Software Release Sheet – SRS), Version X1.0010, 10 April 2014, Morpho Cards GmbH (confidential document) 9 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie für: 1
pdf_data/report_metadata
  • /CreationDate: D:20130419152138+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130419152219+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 473698
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 41
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20140526110553+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, MICARDO, Morpho, eHC, v1.2"
  • /ModDate: D:20140526110917+02'00'
  • /Producer: LibreOffice 3.6
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0861-2014
  • pdf_file_size_bytes: 1080045
  • pdf_hyperlinks: https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
pdf_data/st_filename c0374_est.pdf 0861b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0837: 2
    • BSI-DSZ-CC-0837-2013-MA-01: 1
    • BSI-DSZ-CC-0837-MA-01: 1
    • BSI-DSZ-CC-0861: 1
  • NL:
    • NSCIB-CC-12-36243: 2
    • NSCIB-CC-12-36243-MA1: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0020-V3-2010-MA-01: 1
    • BSI-PP-0020-V3-2010-MA-01: 1
    • BSI-PP-0035: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL 4: 2
    • EAL 4 augmented: 2
    • EAL 6: 1
    • EAL 6 augmented: 1
    • EAL4: 2
    • EAL4 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ALC:
    • ALC_FLR.1: 1
  • ASE:
    • ASE_TSS.2: 1
  • AVA:
    • AVA_VAN.5: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GNE.2.1: 1
    • FAU_SAR.1: 7
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 3
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 8
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 4
    • FAU_STG.4.1: 2
  • FCS:
    • FCS_CAP.1: 2
    • FCS_CKM: 2
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 4
    • FCS_COP: 1
    • FCS_COP.1: 11
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 84
    • FDP_ACC.1.1: 4
    • FDP_ACF: 4
    • FDP_ACF.1: 53
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_ACP.1: 1
    • FDP_IFC.1: 15
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 7
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 2
    • FDP_RIP: 1
    • FDP_RIP.1: 1
    • FDP_RIP.1.1: 1
    • FDP_UAU.7: 1
  • FIA:
    • FIA_AFL.1: 90
    • FIA_AFL.1.1: 8
    • FIA_AFL.1.2: 8
    • FIA_ATD.1: 30
    • FIA_ATD.1.1: 1
    • FIA_MSA.3: 1
    • FIA_SOS.1: 52
    • FIA_SOS.1.1: 4
    • FIA_SOS.2: 10
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_SSL.3: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 47
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.2: 55
    • FIA_UAU.2.1: 4
    • FIA_UAU.6: 12
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 20
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 32
    • FIA_UID.2: 84
    • FIA_UID.2.1: 7
    • FIA_USB.1: 27
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MAS.1: 1
    • FMT_MOF.1: 63
    • FMT_MOF.1.1: 5
    • FMT_MSA: 5
    • FMT_MSA.1: 43
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 52
    • FMT_MSA.3.1: 8
    • FMT_MSA.3.2: 7
    • FMT_MTD.1: 168
    • FMT_MTD.1.1: 15
    • FMT_SMF.1: 130
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 202
    • FMT_SMR.1.1: 6
    • FMT_SMR.1.2: 6
    • FMT_SOS.1: 1
  • FPT:
    • FPT_STM.1: 7
  • FTA:
    • FTA_SSL.3: 7
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 9
    • FCS_CKM.2: 1
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 1
    • FCS_COP: 7
    • FCS_COP.1: 8
    • FCS_RND: 2
    • FCS_RND.1: 1
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ACC.1: 4
    • FDP_ACC.2: 2
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 3
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_ITC.1: 8
    • FDP_ITC.2: 8
    • FDP_RIP.1: 1
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 1
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT.1: 4
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 2
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL.1: 4
    • FIA_ATD.1: 1
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 3
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 1
    • FIA_UAU.4.1: 1
    • FIA_UID.1: 3
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM: 2
    • FMT_LIM.1: 3
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 3
    • FMT_LIM.2.1: 1
    • FMT_MSA.3: 1
    • FMT_MTD: 5
    • FMT_MTD.1: 6
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 1
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 1
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 4
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.A: 2
    • A.ADMIN: 3
    • A.NETWORK: 6
    • A.SECRET: 3
    • A.SERVICE: 4
  • O:
    • O.AUDIT: 2
    • O.AUDIT-LOGGED: 3
    • O.AUTH: 2
    • O.AUTH-CAPABILITY: 5
    • O.CONFIG: 12
    • O.CRYPT: 4
    • O.CRYPTO: 5
    • O.CRYPTO-CAPABILITY: 4
    • O.CRYPTO-KEY: 2
    • O.CRYPTO-MAIL: 2
    • O.FAX: 2
    • O.FAX-CONTROL: 6
    • O.GROUP: 3
    • O.GROUP-BOX: 3
    • O.OVERWRITE: 8
    • O.PRIVATE: 3
    • O.PRIVATE-BOX: 3
    • O.PUBLIC: 3
    • O.PUBLIC-BOX: 6
    • O.REGISTERED: 3
    • O.REGISTERED-USER: 12
    • O.SECURE: 4
    • O.SECURE-PRINT: 6
    • O.TRUSTED: 3
    • O.TRUSTED-PATH: 5
  • OE:
    • OE.ADMIN: 3
    • OE.AUDIT: 3
    • OE.AUDIT-REVIEWED: 2
    • OE.AUDIT_ACCESS-AUT: 1
    • OE.AUDIT_ACESS-AUTHORIZED: 1
    • OE.AUDIT_STORAGE-PR: 1
    • OE.AUDIT_STORAGE-PROTECTED: 1
    • OE.FAX: 2
    • OE.FAX-UNIT: 2
    • OE.FEED: 2
    • OE.FEED-BACK: 8
    • OE.NETWORK: 4
    • OE.S: 1
    • OE.SECRET: 3
    • OE.SERVER: 5
    • OE.SERVICE: 3
    • OE.SESSION: 10
    • OE.SETTING: 2
    • OE.SETTING-SECURITY: 2
  • T:
    • T.ACCESS: 19
    • T.ACCESS-GROUP-BOX: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.BACKUP: 3
    • T.BACKUP-RESTORE: 1
    • T.BRING: 3
    • T.DISCARD: 3
    • T.DISCARD-MFP: 1
    • T.UNEXPECTED: 2
    • T.UNEXPECTED-TRANSMISSION: 1
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon Technologies AG: 1
  • Morpho:
    • Morpho: 89
  • NXP:
    • NXP: 6
    • NXP Semiconductors: 20
  • STMicroelectronics:
    • STMicroelectronics: 1
pdf_data/st_keywords/eval_facility
  • SRC:
    • SRC Security Research & Consulting: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • 3DES: 2
    • DES:
      • DES: 2
  • AES_competition:
    • AES:
      • AES: 1
    • HPC:
      • HPC: 6
  • DES:
    • 3DES:
      • 3DES: 5
    • DES:
      • DES: 11
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA-OAEP: 1
pdf_data/st_keywords/hash_function
  • RIPEMD:
    • RIPEMD160: 1
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-2: 2
      • SHA-256: 4
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 8
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 5
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 11
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/st_keywords/crypto_engine
  • SmartMX:
    • SmartMX2: 11
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 6
    • malfunction: 1
    • physical tampering: 1
  • SCA:
    • DPA: 6
    • SPA: 6
    • side channel: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SSC: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS 186: 2
    • FIPS 186-2: 4
    • FIPS PUB 197: 2
  • X509:
    • X.509: 1
  • BSI:
    • AIS 20: 1
    • AIS 36: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC 7816-4: 2
    • ISO/IEC 9796-2: 1
  • PKCS:
    • PKCS #1: 1
  • X509:
    • X.509: 2
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate: D:20130415144110+09'00'
  • /Creator: CubePDF
  • /Keywords:
  • /ModDate: D:20130415144114+09'00'
  • /Producer: GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 1171475
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 114
  • /Author: Karsten Klohs
  • /CreationDate: D:20140417111536+02'00'
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20140526113904+02'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Security Target
  • /Title: MICARDO V4.0 R1.0 eHC V1.2
  • pdf_file_size_bytes: 586793
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 60
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different