Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
MULTOS SM10 R2 V1.0
KECS-ISIS-0051-2006
Data Security Kit DA-SC04 V1.00
JISEC-CC-CRP-C0168
name MULTOS SM10 R2 V1.0 Data Security Kit DA-SC04 V1.00
category ICs, Smart Cards and Smart Card-Related Devices and Systems Multi-Function Devices
scheme KR JP
not_valid_after 01.06.2019 13.12.2010
not_valid_before 29.09.2006 30.05.2008
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISIS-51-EN.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0168_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISIS-51-ST-EN.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0168_est.pdf
manufacturer Samsung SDS Panasonic Communications Co., Ltd.
manufacturer_web https://www.sds.samsung.co.kr https://www.panasonic.com/
security_level ADV_IMP.2, ATE_DPT.2, AVA_VLA.4, EAL4+, ALC_DVS.2 EAL2
dgst 88b6936acbc0755d e6375121b8384ab3
heuristics/cert_id KECS-ISIS-0051-2006 JISEC-CC-CRP-C0168
heuristics/extracted_sars ADV_RCR.1, ADV_HLD.2, AGD_USR.1, ALC_DVS.2, AVA_SOF.1, ADV_FSP.2, ATE_COV.2, ALC_TAT.1, AVA_MSU.2, ATE_DPT.2, AGD_ADM.1, ALC_LCD.1, ADV_DVS.2, ATE_FUN.1, ADV_IMP.2, AVA_VLA.4, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1
heuristics/extracted_versions 1.0 1.00
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0168
  • certification_date: 01.05.2008
  • claim: EAL2
  • enhanced:
    • assurance_level: EAL2
    • cc_version: 2.3
    • cert_link: https://www.ipa.go.jp/en/security/c0168_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a software product to protect the used document data which had been already stored on the HDD (Hard Disk Drive) after being processed by the digital imaging system from being disclosed illicitly. The TOE is offered as an optional product of Panasonic Communications Co., Ltd. Digital Color Imaging System DP-C3040VFS / C3030VFS / C2626VFS / DP-C3040V(*)/ C3030V(*) / C2626VF(*) for Japan (DP-C405 / C305 / C265 for Overseas), and provides the security functions by replacing the standard bundled software of the digital imaging system. (*) Requires installation of optional Hard Disk Unit. TOE security functions - Hard Disk Drive Overwriting Function for Residual Data - Key Operator Authentication Function - Hard Disk Drive Lock Management Function - Security Mode Operating Management Function - Service Technician Authentication Function - Security Mode Maintenance Management Function
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: Japanese Name: Data Security Kit DA-SC04 English Name: Data Security Kit DA-SC04
    • product_type: IT Product (data protection function in digital imaging system)
    • report_link: https://www.ipa.go.jp/en/security/c0168_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0168_est.pdf
    • toe_version: V1.00
    • vendor: Panasonic System Networks Co., Ltd.
  • expiration_date: 01.01.2011
  • supplier: Panasonic System Networks Co., Ltd.
  • toe_japan_name: Data Security Kit DA-SC04 V1.00
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0168_it7188.html
  • toe_overseas_name: Data Security Kit DA-SC04 V1.00
pdf_data/report_filename ISIS-51-EN.pdf c0168_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • KR:
    • KECS-ISIS-0051-2006: 1
  • JP:
    • CRP-C0168-01: 1
    • Certification No. C0168: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL 4+: 1
    • EAL4: 2
  • EAL:
    • EAL2: 3
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_IMP.2: 3
  • ALC:
    • ALC_DVS.2: 3
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_DPT.2: 3
  • AVA:
    • AVA_VLA.4: 3
pdf_data/report_keywords/cc_claims
  • A:
    • A.TOE: 1
    • A.TSF: 1
  • A:
    • A.ADMIN: 1
    • A.SE: 1
    • A.SETSEC: 1
  • T:
    • T.RECOVER: 2
pdf_data/report_keywords/eval_facility
  • KISA:
    • KISA: 3
  • ITSC:
    • Information Technology Security Center: 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
pdf_data/report_metadata
  • /Author: son
  • /CreationDate: D:20061031112738+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20061031112738+09'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /Title: KECS-ISIS-0051-2006 Cert Report(SDS MULTOS SM10 R2).hwp
  • pdf_file_size_bytes: 698710
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 27
  • /Author: s-shiro
  • /CreationDate: D:20080711162024+09'00'
  • /Creator: PScript5.dll Version 5.2
  • /ModDate: D:20080711162024+09'00'
  • /Producer: Acrobat Distiller 8.0.0 (Windows)
  • /Title: Microsoft Word - C0168_Certification Report_en.doc
  • pdf_file_size_bytes: 188639
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
pdf_data/st_filename ISIS-51-ST-EN.pdf c0168_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL3: 1
    • EAL4: 37
    • EAL4+: 8
  • EAL:
    • EAL2: 7
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 11
    • ACM_CAP.3: 3
    • ACM_CAP.4: 21
    • ACM_SCP.1: 1
    • ACM_SCP.2: 8
  • ADO:
    • ADO_DEL.2: 10
    • ADO_IGS.1: 9
  • ADV:
    • ADV_DVS.2: 1
    • ADV_FSP.1: 10
    • ADV_FSP.2: 12
    • ADV_HLD.1: 1
    • ADV_HLD.2: 20
    • ADV_IMP.1: 5
    • ADV_IMP.2: 18
    • ADV_LLD.1: 21
    • ADV_RCR.1: 11
    • ADV_SPM.1: 19
  • AGD:
    • AGD_ADM.1: 21
    • AGD_USR.1: 15
  • ALC:
    • ALC_DVS.1: 3
    • ALC_DVS.2: 17
    • ALC_LCD.1: 9
    • ALC_TAT.1: 12
  • ATE:
    • ATE_COV.2: 8
    • ATE_DPT.2: 14
    • ATE_FUN.1: 16
    • ATE_IND.2: 10
  • AVA:
    • AVA_MSU.2: 15
    • AVA_SOF.1: 9
    • AVA_VLA.4: 25
  • ACM:
    • ACM_CAP.2: 4
  • ADO:
    • ADO_DEL.1: 4
    • ADO_IGS.1: 3
  • ADV:
    • ADV_FSP.1: 11
    • ADV_HLD.1: 2
    • ADV_RCR.1: 5
  • AGD:
    • AGD_ADM.1: 7
    • AGD_USR.1: 3
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 3
    • ATE_FUN.1: 4
    • ATE_IND.2: 4
  • AVA:
    • AVA_SOF.1: 4
    • AVA_VLA.1: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 9
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 3
    • FAU_SAA.1: 11
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 8
    • FCS_CKM.4.1: 1
    • FCS_COP: 5
    • FCS_COP.1: 10
    • FCS_COP.1.1: 5
  • FDP:
    • FDP_ACC.1: 6
    • FDP_ACC.2: 7
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF.1: 8
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 4
    • FDP_ITC.1: 4
    • FDP_RIP: 1
    • FDP_RIP.1: 7
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 11
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 9
    • FIA_UAU.4.1: 1
    • FIA_UAU.6: 9
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 14
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 10
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 13
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 1
    • FMT_MTD.2: 8
    • FMT_MTD.2.1: 1
    • FMT_MTD.2.2: 1
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ACC.2: 1
    • FPT_AMT.1: 8
    • FPT_AMT.1.1: 1
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_PHP: 1
    • FPT_PHP.3: 10
    • FPT_PHP.3.1: 1
    • FPT_RCV.2: 1
    • FPT_RCV.3: 8
    • FPT_RCV.3.1: 1
    • FPT_RCV.3.2: 1
    • FPT_RCV.3.3: 1
    • FPT_RCV.3.4: 1
    • FPT_RCV.4: 8
    • FPT_RCV.4.1: 1
    • FPT_SEP.1: 8
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_TST.1: 10
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FAU:
    • FAU_GEN: 2
  • FDP:
    • FDP_RIP.1: 12
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 26
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_SOS.1: 30
    • FIA_SOS.1.1: 2
    • FIA_UAU.1: 19
    • FIA_UAU.2: 34
    • FIA_UAU.7: 26
    • FIA_UAU.7.1: 2
    • FIA_UID.1: 19
    • FIA_UID.2: 36
  • FMT:
    • FMT_MOF.1: 13
    • FMT_MOF.1.1: 1
    • FMT_MTD.1: 41
    • FMT_MTD.1.1: 3
    • FMT_SMF.1: 21
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 26
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RVM.1: 30
    • FPT_RVM.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.APP_INS: 3
    • A.ATK_LEV: 3
    • A.SEC_CNL: 3
    • A.TOE_HNDL: 3
    • A.TSF_DAT: 2
    • A.UNDER_HW: 4
  • O:
    • O.ACC_AUTH: 3
    • O.APP_SEP: 2
    • O.AUTH_ISS: 3
    • O.AUTH_RPR: 5
    • O.AUTH_USR: 5
    • O.CNR_LEAK: 10
    • O.DAT_PROT: 5
    • O.REM_RES: 3
    • O.ROLLBACK: 5
  • OE:
    • OE.APP_INS: 3
    • OE.ATK_LEV: 2
    • OE.C_TAMPER: 2
    • OE.OPN_PLAT: 7
    • OE.SEC_CNL: 2
    • OE.TRAINING: 5
    • OE.TSF_DAT: 3
    • OE.UNDER_HW: 4
  • T:
    • T.ABN_END: 3
    • T.ISS_ABU: 4
    • T.LEAK_INF: 3
    • T.LOGI_ATK: 7
    • T.REP_AUTH: 3
    • T.RES_COL: 3
    • T.RES_REU: 4
    • T.SES_TEAR: 4
    • T.TAMPER: 5
    • T.UNAU_APP: 4
    • T.UNAU_IFD: 7
  • A:
    • A.ADMIN: 4
    • A.SE: 5
    • A.SETSEC: 5
  • O:
    • O.HDLMNG: 6
    • O.RESIDUAL: 5
  • OE:
    • OE.ADMIN: 3
    • OE.AUTH: 4
    • OE.HDD: 7
    • OE.SE: 3
  • T:
    • T.RECOVER: 4
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 6
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 4
  • miscellaneous:
    • SEED:
      • SEED: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Physical tampering: 1
    • malfunction: 1
    • physical tampering: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 8
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 46-3: 1
    • FIPS PUB 81: 1
  • ISO:
    • ISO/IEC 10536: 2
    • ISO/IEC 14443: 2
    • ISO/IEC 7810: 2
    • ISO/IEC 7816: 2
  • PKCS:
    • PKCS#1: 1
    • PKCS#2: 1
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-003: 1
  • ISO:
    • ISO/IEC 15408:2005: 3
pdf_data/st_metadata
  • /Author: <C0CCC1D8C8A3>
  • /CreationDate: D:20061113110857
  • /Creator: PScript5.dll Version 5.2
  • /ModDate: D:20061113110857
  • /Producer: AFPL Ghostscript 8.0
  • /Title: Microsoft Word - [KC067-SP-0101]MULTOS - Security Target1.2_Public_R0.9.doc
  • pdf_file_size_bytes: 3793683
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 74
  • /Author: 1800072
  • /CreationDate: D:20080619114948+09'00'
  • /Creator: PScript5.dll Version 5.2
  • /ModDate: D:20080619114948+09'00'
  • /Producer: Acrobat Distiller 6.0.1 (Windows)
  • /Title: Microsoft Word - DA-SC04英文ST20080620.doc
  • pdf_file_size_bytes: 366792
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 41
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different