name |
PhenoStor® Kartenlesegerät GRE100010 |
Japan: Ricoh imagio MP 4000/5000 series, Overseas: Ricoh Aficio MP 4000/5000 series, Savin 9040/9050 series, Lanier MP 4000/5000 series, Gestetner MP 4000/5000 series, Nashuatec MP 4000/5000 series, Rex-Rotary MP 4000/5000 series, Infotec MP 4000/5000 series Version: System/Copy: 1.09, Network Support: 7.23, Scanner: 01.23, Printer: 1.09, Fax: 03.00.00, Web Support: 1.57, Web Uapl: 1.13.1, Network Doc Box: 1.09.3C, Ic Key: 1100, Ic Hdd: 01 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Multi-Function Devices |
scheme |
DE |
JP |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
14.11.2014 |
not_valid_before |
09.03.2007 |
13.11.2009 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0373a.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0239_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0373b.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0239_est.pdf |
manufacturer |
Bayer Innovation GmbH |
Ricoh Company, Ltd. |
manufacturer_web |
https://www.bayer-innovation.com/ |
https://www.ricoh.com/ |
security_level |
EAL3 |
EAL3 |
dgst |
8813a6c03f1bba58 |
011a212ee8367e21 |
heuristics/cert_id |
BSI-DSZ-CC-0373-2007 |
JISEC-CC-CRP-C0239 |
heuristics/cert_lab |
BSI |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_ENV.1, ADV_RCR.1, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ALC_DVS.2, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, AVA_SOF.1, ATE_COV.2, ASE_TSS.1, AGD_ADM.1, ATE_FUN.1, ATE_DPT.1, AVA_VLA.4, ADV_FSP.1, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_SPM.1, AVA_MSU.3 |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
heuristics/extracted_versions |
- |
1.09.3, 1.57, 01.23, 1.09, 7.23, 03.00.00, 1.13.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
ANSSI-CC-2005/41 |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2003/18, ANSSI-CC-2005/39, ANSSI-CC-2005/41 |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0239
- certification_date: 01.11.2009
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.3
- cert_link: https://www.ipa.go.jp/en/security/c0239_img.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a digital MFP, made by RICOH COMPANY, LTD., that provides the functions of copier, scanner, printer and fax (optional). Those are for digitizing the paper document files, managing the document files and printing the document files. The TOE is an image I/O device that incorporates the functionality of copier, scanner, fax and printer. In general, the TOE is connected to an office LAN and is used to input, store and output the document data. TOE security functions The major security functions of the TOE are as follows: - Identification and Authentication Function and Document Data Access Control Function to protect the stored document data from the unauthorized access - Encryption Function to protect the stored document data from the leakage - Network Communication Data Protection Function to protect the communication data from the leakage or tampering - Telephone Line Intrusion Protection Function to prevent the unauthorized intrusion from a telephone line - MFP Control Software Verification Function to check the integrity of the control software
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Japan: Ricoh imagio MP 4000/5000 series Overseas: Ricoh Aficio MP 4000/5000 series Savin 9040/9050 series Lanier MP 4000/5000 series Gestetner MP 4000/5000 series Nashuatec MP 4000/5000 series Rex-Rotary MP 4000/5000 series Infotec MP 4000/5000 series
- product_type: IT Product (Multi Function Product)
- report_link: https://www.ipa.go.jp/en/security/c0239_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0239_est.pdf
- toe_version: System/Copy: 1.09 Network Support: 7.23 Scanner: 01.23 Printer: 1.09 Fax: 03.00.00 Web Support: 1.57 Web Uapl: 1.13.1 Network Doc Box: 1.09.3C Ic Key: 1100 Ic Hdd: 01
- vendor: RICOH COMPANY, LTD.
- expiration_date: 01.11.2014
- supplier: RICOH COMPANY, LTD.
- toe_japan_name: Ricoh imagio MP 4000/5000 series System/Copy: 1.09, Network Support: 7.23, Scanner: 01.23, Printer: 1.09, Fax: 03.00.00, Web Support: 1.57, Web Uapl: 1.13.1, Network Doc Box: 1.09.3C, Ic Key: 1100, Ic Hdd: 01
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0239_it8206.html
- toe_overseas_name: Ricoh Aficio MP 4000/5000 series Savin 9040/9050 series Lanier MP 4000/5000 series Gestetner MP 4000/5000 series Nashuatec MP 4000/5000 series Rex-Rotary MP 4000/5000 series Infotec MP 4000/5000 series System/Copy: 1.09, Network Support: 7.23, Scanner: 01.23, Printer: 1.09, Fax: 03.00.00, Web Support: 1.57, Web Uapl: 1.13.1, Network Doc Box: 1.09.3C, Ic Key: 1100, Ic Hdd: 01
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
0373a.pdf |
c0239_erpt.pdf |
pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0373-2007
- cert_item: PhenoStor® Card Reader GRE100010
- cert_lab: BSI
- developer: Bayer Innovation GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
|
pdf_data/report_keywords/cc_cert_id |
- AU:
- Certification Report 2005/41: 2
- DE:
- FR:
- Certification Report 2005/41: 2
|
- JP:
- CRP-C0239-01: 1
- Certification No. C0239: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 3
- EAL 4: 1
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 6
- EAL4: 5
- EAL5: 7
- EAL5 augmented: 1
- EAL6: 3
- EAL7: 4
|
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT: 2
- ACM_CAP: 2
- ACM_CAP.3: 1
- ACM_SCP: 2
- ACM_SCP.1: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.1: 1
- ADO_IGS: 2
- ADO_IGS.1: 4
- ADV:
- ADV_FSP: 2
- ADV_FSP.1: 1
- ADV_HLD: 2
- ADV_HLD.2: 1
- ADV_IMP: 2
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_RCR.1: 1
- ADV_SPM: 2
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 4
- AGD_USR: 2
- AGD_USR.1: 4
- ALC:
- ALC_DVS: 2
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_TAT: 2
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT: 2
- ATE_DPT.1: 1
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_IND: 2
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.1: 1
- AVA_MSU.3: 1
- AVA_SOF: 3
- AVA_SOF.1: 1
- AVA_VLA: 3
- AVA_VLA.1: 1
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 2
|
|
pdf_data/report_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.4: 2
- FCS_COP.1: 2
- FCS_RND.1: 1
- FDP:
- FDP_ACC.2: 1
- FDP_ACF.1: 1
- FDP_ETC.2: 1
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 1
- FDP_SDI.2: 1
- FDP_UCT.1: 2
- FDP_UIT.1: 2
- FIA:
- FIA_UAU.1: 1
- FIA_UID.1: 1
- FMT:
- FMT_MSA.1: 1
- FMT_MSA.2: 1
- FMT_MTD.1: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FPT_FLS.1: 1
- FPT_PHP.3: 1
- FPT_SEP.1: 1
- FPT_TST.1: 1
- FTP:
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.ADMIN: 2
- A.NETWORK: 1
- A.SUPERVISOR: 1
- T:
- T.ABUSE_SEC_MNG: 3
- T.FAX_LINE: 4
- T.ILLEGAL_USE: 3
- T.SALVAGE: 3
- T.TRANSIT: 3
- T.UNAUTH_ACCESS: 3
|
pdf_data/report_keywords/vendor |
- Infineon:
- Infineon Technologies AG: 1
- Philips:
- STMicroelectronics:
|
|
pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Report, Version 1.2, 18.12.2006, Evaluation Technical Report BSI-CC-DSZ-0373, T-Systems GEI GmbH (confidential document) [9] Smartcard IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID: 1
- Version 1.8, 30.10.2006 , Security Target PhenoStor® Card Reader GRE100010, Bayer Innovation GmbH (confidential document) [7] Security Target BSI-DSZ-0373-2007, Version 1.1, 08.03.2007 , Security Target Lite PhenoStor®: 1
|
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Company: BSI, Postfach 200363, 53133 Bonn
- /CreationDate: D:20070320111017+01'00'
- /Creator: Acrobat PDFMaker 7.0.7 für Word
- /Keywords: Common Criteria, Certification, Zertifizierung, Bayer Innovation GmbH, PhenoStor® Card Reader GRE100010
- /ModDate: D:20070326135055+02'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /SourceModified: D:20070320100956
- /Title: Certification Report BSI-DSZ-CC-0373-2007
- pdf_file_size_bytes: 326817
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
- /Author: s-hara
- /CreationDate: D:20100112162204+09'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20100112162204+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: Microsoft Word - C0239_Certification Report.doc
- pdf_file_size_bytes: 282719
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 33
|
pdf_data/st_filename |
0373b.pdf |
c0239_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP- 0002-2001: 3
- BSI-PP-0002-2001: 10
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 3: 3
- EAL 5+: 1
- EAL3: 14
- EAL5: 1
- EAL5 augmented: 1
- EAL5+: 5
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 3
- ACM_SCP.1: 3
- ADO:
- ADO_DEL.1: 3
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 3
- ADV_HLD.2: 3
- ADV_RCR.1: 3
- ADV_SPM: 2
- ADV_SPM.1: 4
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 3
- ALC:
- ALC_DVS.1: 3
- ALC_DVS.2: 1
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 3
- ATE_FUN.1: 3
- ATE_IND.2: 3
- AVA:
- AVA_MSU.1: 3
- AVA_MSU.3: 1
- AVA_SOF.1: 3
- AVA_VLA.1: 3
- AVA_VLA.4: 1
|
- ACM:
- ACM_CAP.3: 2
- ACM_SCP.1: 2
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.2: 3
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 1
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU.1: 2
- AVA_SOF.1: 1
- AVA_VLA.1: 2
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM: 87
- FCS_CKM.1: 16
- FCS_CKM.2: 2
- FCS_CKM.4: 17
- FCS_COP: 83
- FCS_COP.1: 18
- FCS_RND: 8
- FCS_RND.1: 13
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 14
- FDP_ACC.2: 14
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 1
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ETC: 1
- FDP_ETC.2: 6
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 7
- FDP_ITC: 2
- FDP_ITC.1: 27
- FDP_ITC.1.1: 2
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 2
- FDP_ITC.2: 3
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_RIP: 1
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FDP_SDI: 1
- FDP_SDI.2: 7
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT: 17
- FDP_UCT.1: 3
- FDP_UIT: 26
- FDP_UIT.1: 8
- FIA:
- FIA_UAU: 1
- FIA_UAU.1: 7
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID: 1
- FIA_UID.1: 10
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MSA: 1
- FMT_MSA.1: 10
- FMT_MSA.1.1: 1
- FMT_MSA.2: 38
- FMT_MSA.2.1: 1
- FMT_MSA.3: 4
- FMT_MTD: 14
- FMT_MTD.1: 3
- FMT_SMF: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 11
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 1
- FPT_FLS: 1
- FPT_FLS.1: 16
- FPT_FLS.1.1: 1
- FPT_PHP: 1
- FPT_PHP.3: 9
- FPT_PHP.3.1: 1
- FPT_SEP: 1
- FPT_SEP.1: 10
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TST: 1
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 19
- FTP_ITC.1: 12
- FTP_TRP.1: 3
|
- FAU:
- FAU_GEN.1: 36
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 15
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 12
- FAU_SAR.2.1: 1
- FAU_STG.1: 14
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 14
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 18
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 5
- FCS_COP.1: 18
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 20
- FDP_ACC.1.1: 1
- FDP_ACF.1: 17
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 18
- FDP_IFC.1.1: 1
- FDP_IFF.1: 14
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FIA:
- FIA_AFL.1: 16
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 15
- FIA_ATD.1.1: 1
- FIA_SOS.1: 16
- FIA_SOS.1.1: 1
- FIA_UAU.1: 5
- FIA_UAU.2: 18
- FIA_UAU.2.1: 1
- FIA_UAU.7: 14
- FIA_UAU.7.1: 1
- FIA_UID.1: 9
- FIA_UID.2: 16
- FIA_UID.2.1: 1
- FIA_USB.1: 12
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 2
- FMT:
- FMT_MSA.1: 14
- FMT_MSA.1.1: 1
- FMT_MSA.2: 7
- FMT_MSA.3: 19
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 14
- FMT_MTD.1.1: 1
- FMT_SMF.1: 17
- FMT_SMF.1.1: 1
- FMT_SMR.1: 20
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 4
- FPT_RVM.1: 43
- FPT_RVM.1.1: 1
- FPT_SEP.1: 48
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM.1: 15
- FPT_STM.1.1: 1
- FPT_TST.1: 13
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 13
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 13
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
- FTP_TST.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.USE_DIAG: 3
- A.USE_SYS: 3
|
- A:
- A.ADMIN: 5
- A.NETWORK: 5
- A.SUPERVISOR: 4
- O:
- O.AUDIT: 15
- O.DOC_ACC: 8
- O.GENUINE: 9
- O.LINE_PROTECT: 10
- O.MANAGE: 12
- O.MEM: 11
- O.NET: 10
- OE:
- OE.ADMIN: 3
- OE.NETWORK: 3
- OE.SUPERVISOR: 3
- T:
- T.ABUSE_SEC_MNG: 4
- T.FAX_LINE: 3
- T.ILLEGAL_USE: 4
- T.SALVAGE: 3
- T.TRANSIT: 4
- T.UNAUTH_ACCESS: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- DES:
- 3DES:
- 3DES: 31
- Triple-DES: 18
- TripleDES: 4
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- SCA:
- physical probing: 3
- side channel: 1
- side-channel: 4
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- end devices over the interface unit (the IU – Interface Unit – and the peripheral devices are out of scope of the evaluation) using cryptographically protected external communication interfaces. All the: 1
- out of scope: 2
- the IU – Interface Unit – and the peripheral devices are out of scope of the evaluation: 1
- the TOE security functional requirements is SOF-medium. The strength of cryptographic algorithms is out of scope of the CC evaluation [5]. This chapter contains the descriptions of all derived functional: 1
|
|
pdf_data/st_metadata |
- /Author: escrypt GmbH - Embedded Security
- /CreationDate: D:20070308174144+01'00'
- /Creator: pdfFactory www.context-gmbh.de
- /ModDate: D:20070326135153+02'00'
- /Producer: pdfFactory 2.44 (Windows XP Professional German)
- /Title: Security Target Lite, PhenoStor GRE100010 Card Reader
- pdf_file_size_bytes: 494120
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 99
|
- /Author: itoh masahiro
- /CreationDate: D:20100112151008+09'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20100112151008+09'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /Title: Microsoft Word - 100111_MP_4000_ST_1.13_eng.doc
- pdf_file_size_bytes: 641281
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 100
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |