name |
Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit MFP: Ricoh Aficio MP 2851, Ricoh Aficio MP 3351, Savin 9228, Savin 9233, Lanier LD528, Lanier LD533, Lanier MP 2851, Lanier MP 3351, Gestetner MP 2851, Gestetner MP 3351, nashuatec MP 2851, nashuatec MP 3351, Rex-Rotary MP 2851, Rex-Rotary MP 3351, infotec MP 2851, infotec MP 3351 FCU: Fax Option Type 3351 DataOverwriteSecurity Unit: DataOverwriteSecurity Unit Type I, HDD Encryption Unit: HDD Encryption Unit Type A Version: Software System/Copy 1.02 Network Support 7.34 Scanner 01.12 Printer 1.02 Fax 02.00.00 RemoteFax 02.00.00 Web Support 1.05 Web Uapl 1.03 Network DocBox 1.00 animation 1.1 Option PCL 1.03 OptionPCLFont 1.01 Engine 1.00:01 OpePanel 1.10 LANG0 1.09 LANG1 1.09 Hardware Ic Key 1100 Ic Hdd 01 Options Data Erase Opt 1.01m GWFCU3-20(WW) 02.00.00
|
IFX_CCI_00002Dh, 000039h, 00003Ah, 000044h, 000045h, 000046h, 000047h, 000048h, 000049h, 00004Ah, 00004Bh, 00004Ch, 00004Dh, 00004Eh design step T11 with firmware 80.306.16.0, 80.306.16.1 or 80.312.02.0, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 or v2.11.003, optional ACL v3.35.001, v3.34.000, v3.33.003 or v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and user guidance
|
category |
Multi-Function Devices
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2011-03-29
|
2024-09-04
|
not_valid_after |
2016-04-08
|
2028-12-05
|
scheme |
JP
|
DE
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0286_est.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1107V5b_pdf.pdf
|
status |
archived
|
active
|
manufacturer |
Ricoh Company, Ltd.
|
Infineon Technologies AG
|
manufacturer_web |
https://www.ricoh.com/
|
https://www.infineon.com/
|
security_level |
ALC_FLR.2, EAL3+ |
ALC_FLR.1, EAL6+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0286_erpt.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1107V5a_pdf.pdf
|
cert_link |
None
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1107V5c_pdf.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.1™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': None}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
False
|
True
|
state/cert/download_ok |
False
|
True
|
state/cert/extract_ok |
False
|
True
|
state/cert/pdf_hash |
None
|
9dc01d9d970d0b4707dba038e05dacc4328d12382b2c92c69ab6db5ba28001c7
|
state/cert/txt_hash |
None
|
25d22e66fbd62af82eb1f041903aba589997e109811fc6c631bf7f1c751ec75b
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
12a4883778391bcdf4eda63a578cbe5a9aa160158be18b2e24d398394c5a47ce
|
51f0711acb469ae429d90936d5af0adcb71bca4402a648a76b46e4f61781131d
|
state/report/txt_hash |
c96fc9f591da46027c15119973c4416ff440f848b3ac9502857149bd7f2c7f9c
|
ee9662a9bd5407ebc6bf41c5d72f129f09ec358ef73a7920ad07d21489d6bb2f
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
False
|
state/st/pdf_hash |
f590cacd6cb82566f6ebc69a0f8b42521e875f175bf35d15a7ca3e841b43a579
|
ef618c6cbe2bc308e69e55e99db7a539a8fd5756a45d8c9f0bfd5ed50a4363b6
|
state/st/txt_hash |
a88ef8d5a4bc65ec2d90a6d92df76468db5c3727a258261414da47b8cd3d11a7
|
f0460d25360fba5f733797f03d978ee2510a8dc590313210709136186655fc4d
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
JISEC-CC-CRP-C0286
|
BSI-DSZ-CC-1107-V5-2024
|
heuristics/cert_lab |
None
|
BSI |
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
1.1, 1.05, 1.01, 1.02, 02.00.00, 7.34, 1.03, 1.09, 01.12, 1.10, 1.00 |
3.35.001, 2.15.000, 05.03.4097, 3.34.000, 1.13.002, 3.02.000, 80.306.16.0, 80.306.16.1, 80.312.02.0, 3.33.003, 3.52.9708, 2.11.003, 01.30.0564, 1.10.007 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
None
|
heuristics/report_references/directly_referencing |
None
|
BSI-DSZ-CC-1107-V4-2023 |
heuristics/report_references/indirectly_referenced_by |
None
|
None
|
heuristics/report_references/indirectly_referencing |
None
|
BSI-DSZ-CC-1107-V4-2023, BSI-DSZ-CC-1107-V3-2022 |
heuristics/scheme_data |
- cert_id:
C0286
- supplier: RICOH COMPANY, LTD.
- toe_overseas_name: Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit
MFP:Ricoh Aficio MP 2851, Ricoh Aficio MP 3351, Savin 9228, Savin 9233, Lanier LD528, Lanier LD533, Lanier MP 2851, Lanier MP 3351, Gestetner MP 2851, Gestetner MP 3351, nashuatec MP 2851, nashuatec MP 3351, Rex-Rotary MP 2851, Rex-Rotary MP 3351, infotec MP 2851, infotec MP 3351
FCU:Fax Option Type 3351
DataOverwriteSecurity Unit:DataOverwriteSecurity Unit Type I
HDD Encryption Unit:HDD Encryption Unit Type A < Cont. >
- expiration_date: 2016-04
- claim: EAL3+
ALC_FLR.2
PP
- certification_date:
2011-03
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0286_it0300.html
- toe_japan_name: -----
- enhanced:
- product:
Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit
MFP:
Ricoh Aficio MP 2851, Ricoh Aficio MP 3351, Savin 9228, Savin 9233, Lanier LD528, Lanier LD533, Lanier MP 2851, Lanier MP 3351, Gestetner MP 2851, Gestetner MP 3351, nashuatec MP 2851, nashuatec MP 3351, Rex-Rotary MP 2851, Rex-Rotary MP 3351, infotec MP 2851, infotec MP 3351
FCU:
Fax Option Type 3351
DataOverwriteSecurity Unit:
DataOverwriteSecurity Unit Type I
HDD Encryption Unit:
HDD Encryption Unit Type A
- toe_version:
-Software
System/Copy 1.02
Network Support 7.34
Scanner 01.12
Printer 1.02
Fax 02.00.00
RemoteFax 02.00.00
Web Support 1.05
Web Uapl 1.03
Network DocBox 1.00
animation 1.1
Option PCL 1.03
OptionPCLFont 1.01
Engine 1.00:01
OpePanel 1.10
LANG0 1.09
LANG1 1.09
-Hardware
Ic Key 1100
Ic Hdd 01
-Options
Data Erase Opt 1.01m
GWFCU3-20(WW) 02.00.00
- product_type:
Multi Function Product
- certification_date:
2011-03-29
- cc_version:
3.1
- assurance_level:
EAL3 Augmented with ALC_FLR.2
- protection_profile:
IEEE Std 2600.1-2009
- vendor:
RICOH COMPANY, LTD.
- evaluation_facility:
Electronic Commerce Security Technology Laboratory Inc.
Evaluation Center
- report_link:
https://www.ipa.go.jp/en/security/c0286_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0286_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0286_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions.
TOE security functionality
The major security functions of this TOE are as follows:
-
Audit Function: Enables the TOE to record information related to security events and allows users to review it.
-
Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout.
-
Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs.
-
Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user.
-
Network Protection Function: Enables the TOE to protect network communications using encryption.
-
Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern.
-
Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption.
-
Security Management Function: Enables the TOE administrator to control security functions.
-
Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software.
-
Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
|
- cert_id:
BSI-DSZ-CC-1107-V5-2024
- product: IFX_CCI_00002Dh, 000039h, 00003Ah, 000044h, 000045h, 000046h, 000047h, 000048h, 000049h, 00004Ah, 00004Bh, 00004Ch, 00004Dh, …
- vendor: Infineon Technologies AG
- certification_date:
04.09.2024
- category: Smart Cards and similar devices
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_IC_Cryptolib/1107.html
- enhanced:
- product:
IFX_CCI_00002Dh, 000039h, 00003Ah, 000044h, 000045h, 000046h, 000047h, 000048h, 000049h, 00004Ah, 00004Bh, 00004Ch, 00004Dh, 00004Eh design step T11 with firmware 80.306.16.0, 80.306.16.1 or 80.312.02.0, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 or v2.11.003, optional ACL v3.35.001, v3.34.000, v3.33.003 or v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and user guidance
- applicant:
Infineon Technologies AG
Am Campeon 1-15
85579 Neubiberg
- evaluation_facility:
TÜV Informationstechnik GmbH
- assurance_level:
EAL6+,ALC_FLR.1
- protection_profile:
Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
- certification_date:
04.09.2024
- expiration_date:
04.12.2028
- entries:
frozendict({'id': 'BSI-DSZ-CC-1107-V5-2024', 'description': '), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers.'}), frozendict({'id': 'BSI-DSZ-CC-1107-V4-2023', 'description': '), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers. Within this recertification penetration tests were performed, security objectives have been extended a flashloader has been added to the offered functionality and the guidance has been updated.'}), frozendict({'id': 'BSI-DSZ-CC-1107-V3-2022', 'description': '), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers. Within this recertification penetration tests were performed and the guidance has been updated.'}), frozendict({'id': 'BSI', 'description': '), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers. Besides other aspects, software libraries were changed.'}), frozendict({'id': 'BSI', 'description': 'Certificate'})
- report_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1107V5a_pdf.pdf?__blob=publicationFile&v=2
- target_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1107V5b_pdf.pdf?__blob=publicationFile&v=4
- cert_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1107V5c_pdf.pdf?__blob=publicationFile&v=2
- description:
The TOE is an integrated circuit (IC), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers.
- subcategory: ICs, Cryptolib
|
heuristics/scheme_data/cert_id |
C0286
|
BSI-DSZ-CC-1107-V5-2024
|
heuristics/scheme_data/certification_date |
2011-03
|
04.09.2024
|
heuristics/scheme_data/enhanced |
- product:
Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit
MFP:
Ricoh Aficio MP 2851, Ricoh Aficio MP 3351, Savin 9228, Savin 9233, Lanier LD528, Lanier LD533, Lanier MP 2851, Lanier MP 3351, Gestetner MP 2851, Gestetner MP 3351, nashuatec MP 2851, nashuatec MP 3351, Rex-Rotary MP 2851, Rex-Rotary MP 3351, infotec MP 2851, infotec MP 3351
FCU:
Fax Option Type 3351
DataOverwriteSecurity Unit:
DataOverwriteSecurity Unit Type I
HDD Encryption Unit:
HDD Encryption Unit Type A
- toe_version: -Software
System/Copy 1.02
Network Support 7.34
Scanner 01.12
Printer 1.02
Fax 02.00.00
RemoteFax 02.00.00
Web Support 1.05
Web Uapl 1.03
Network DocBox 1.00
animation 1.1
Option PCL 1.03
OptionPCLFont 1.01
Engine 1.00:01
OpePanel 1.10
LANG0 1.09
LANG1 1.09
-Hardware
Ic Key 1100
Ic Hdd 01
-Options
Data Erase Opt 1.01m
GWFCU3-20(WW) 02.00.00
- product_type: Multi Function Product
- certification_date:
2011-03-29
- cc_version: 3.1
- assurance_level:
EAL3 Augmented with ALC_FLR.2
- protection_profile:
IEEE Std 2600.1-2009
- vendor: RICOH COMPANY, LTD.
- evaluation_facility:
Electronic Commerce Security Technology Laboratory Inc.
Evaluation Center
- report_link:
https://www.ipa.go.jp/en/security/c0286_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0286_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0286_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions.
TOE security functionality
The major security functions of this TOE are as follows:
-
Audit Function: Enables the TOE to record information related to security events and allows users to review it.
-
Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout.
-
Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs.
-
Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user.
-
Network Protection Function: Enables the TOE to protect network communications using encryption.
-
Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern.
-
Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption.
-
Security Management Function: Enables the TOE administrator to control security functions.
-
Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software.
-
Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
|
- product:
IFX_CCI_00002Dh, 000039h, 00003Ah, 000044h, 000045h, 000046h, 000047h, 000048h, 000049h, 00004Ah, 00004Bh, 00004Ch, 00004Dh, 00004Eh design step T11 with firmware 80.306.16.0, 80.306.16.1 or 80.312.02.0, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 or v2.11.003, optional ACL v3.35.001, v3.34.000, v3.33.003 or v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and user guidance
- applicant: Infineon Technologies AG
Am Campeon 1-15
85579 Neubiberg
- evaluation_facility:
TÜV Informationstechnik GmbH
- assurance_level:
EAL6+,ALC_FLR.1
- protection_profile:
Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
- certification_date:
04.09.2024
- expiration_date: 04.12.2028
- entries: frozendict({'id': 'BSI-DSZ-CC-1107-V5-2024', 'description': '), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers.'}), frozendict({'id': 'BSI-DSZ-CC-1107-V4-2023', 'description': '), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers. Within this recertification penetration tests were performed, security objectives have been extended a flashloader has been added to the offered functionality and the guidance has been updated.'}), frozendict({'id': 'BSI-DSZ-CC-1107-V3-2022', 'description': '), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers. Within this recertification penetration tests were performed and the guidance has been updated.'}), frozendict({'id': 'BSI', 'description': '), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers. Besides other aspects, software libraries were changed.'}), frozendict({'id': 'BSI', 'description': 'Certificate'})
- report_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1107V5a_pdf.pdf?__blob=publicationFile&v=2
- target_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1107V5b_pdf.pdf?__blob=publicationFile&v=4
- cert_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1107V5c_pdf.pdf?__blob=publicationFile&v=2
- description:
The TOE is an integrated circuit (IC), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers.
|
heuristics/scheme_data/enhanced/assurance_level |
EAL3 Augmented with ALC_FLR.2
|
EAL6+,ALC_FLR.1
|
heuristics/scheme_data/enhanced/cert_link |
https://www.ipa.go.jp/en/security/c0286_eimg.pdf
|
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1107V5c_pdf.pdf?__blob=publicationFile&v=2
|
heuristics/scheme_data/enhanced/certification_date |
2011-03-29
|
04.09.2024
|
heuristics/scheme_data/enhanced/description |
PRODUCT DESCRIPTION
Description of TOE
This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions.
TOE security functionality
The major security functions of this TOE are as follows:
-
Audit Function: Enables the TOE to record information related to security events and allows users to review it.
-
Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout.
-
Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs.
-
Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user.
-
Network Protection Function: Enables the TOE to protect network communications using encryption.
-
Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern.
-
Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption.
-
Security Management Function: Enables the TOE administrator to control security functions.
-
Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software.
-
Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
|
The TOE is an integrated circuit (IC), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers.
|
heuristics/scheme_data/enhanced/evaluation_facility |
Electronic Commerce Security Technology Laboratory Inc.
Evaluation Center
|
TÜV Informationstechnik GmbH
|
heuristics/scheme_data/enhanced/product |
Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit
MFP:
Ricoh Aficio MP 2851, Ricoh Aficio MP 3351, Savin 9228, Savin 9233, Lanier LD528, Lanier LD533, Lanier MP 2851, Lanier MP 3351, Gestetner MP 2851, Gestetner MP 3351, nashuatec MP 2851, nashuatec MP 3351, Rex-Rotary MP 2851, Rex-Rotary MP 3351, infotec MP 2851, infotec MP 3351
FCU:
Fax Option Type 3351
DataOverwriteSecurity Unit:
DataOverwriteSecurity Unit Type I
HDD Encryption Unit:
HDD Encryption Unit Type A
|
IFX_CCI_00002Dh, 000039h, 00003Ah, 000044h, 000045h, 000046h, 000047h, 000048h, 000049h, 00004Ah, 00004Bh, 00004Ch, 00004Dh, 00004Eh design step T11 with firmware 80.306.16.0, 80.306.16.1 or 80.312.02.0, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 or v2.11.003, optional ACL v3.35.001, v3.34.000, v3.33.003 or v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and user guidance
|
heuristics/scheme_data/enhanced/protection_profile |
IEEE Std 2600.1-2009
|
Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
|
heuristics/scheme_data/enhanced/report_link |
https://www.ipa.go.jp/en/security/c0286_erpt.pdf
|
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1107V5a_pdf.pdf?__blob=publicationFile&v=2
|
heuristics/scheme_data/enhanced/target_link |
https://www.ipa.go.jp/en/security/c0286_est.pdf
|
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1107V5b_pdf.pdf?__blob=publicationFile&v=4
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
1107V5c_pdf.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
- cc_cert_id:
- DE:
- BSI-DSZ-CC-1107-V5-2024:
1
- cc_protection_profile_id:
- cc_security_level:
- EAL:
- EAL 6:
1
- EAL 5:
1
- EAL 2:
1
- EAL 6 augmented:
1
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- Infineon:
- Infineon Technologies AG:
1
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- ISO:
- ISO/IEC 15408:
2
- ISO/IEC 18045:
2
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
pdf_data/cert_metadata |
None
|
- pdf_file_size_bytes:
235059
- pdf_is_encrypted:
False
- pdf_number_of_pages:
1
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /Keywords:
Common Criteria, Certification, Zertifizierung, PP-0084, Infineon, Smart Card, IFX
- /Subject:
Common Criteria, Certification, Zertifizierung, PP-0084, Infineon, Smart Card, IFX
- /Title:
Certificate BSI-DSZ-CC-1107-V5-2024
- pdf_hyperlinks:
|
pdf_data/report_filename |
c0286_erpt.pdf
|
1107V5a_pdf.pdf
|
pdf_data/report_frontpage |
|
- DE:
- match_rules:
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
- cert_id:
BSI-DSZ-CC-1107-V5-2024
- cert_item:
IFX_CCI_00002Dh, 000039h, 00003Ah, 000044h, 000045h, 000046h, 000047h, 000048h, 000049h, 00004Ah, 00004Bh, 00004Ch, 00004Dh, 00004Eh design step T11 with firmware 80.306.16.0, 80.306.16.1 or 80.312.02.0, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 or v2.11.003, optional ACL v3.35.001, v3.34.000, v3.33.003 or v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and user guidance
- developer:
Infineon Technologies AG
- cert_lab:
BSI
- ref_protection_profiles:
Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
- cc_version:
PP conformant plus product specific extensions Common Criteria Part 2 extended
- cc_security_level:
Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1 valid until: 4 December 2028 SOGIS Recognition Agreement
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0286-01:
1
- Certification No. C0286:
1
|
- DE:
- BSI-DSZ-CC-1107-V5-2024:
23
- BSI-DSZ-CC-1107-V4-2023:
4
|
pdf_data/report_keywords/cc_claims |
- T:
- T.DOC:
2
- T.FUNC:
1
- T.PROT:
1
- T.CONF:
2
- A:
- A.ACCESS:
1
- A.USER:
1
- A.ADMIN:
2
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0084-2014:
2
- BSI-CC-PP-0084-:
1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- AGD:
- ALC:
- ALC_FLR.1:
5
- ALC_FLR:
3
- ALC_CMC.5:
1
- ALC_CMS.5:
1
- ALC_DEL.1:
1
- ALC_DVS.2:
1
- ALC_LCD.1:
1
- ALC_TAT.3:
1
|
pdf_data/report_keywords/cc_sar/ALC |
|
- ALC_FLR.1:
5
- ALC_FLR:
3
- ALC_CMC.5:
1
- ALC_CMS.5:
1
- ALC_DEL.1:
1
- ALC_DVS.2:
1
- ALC_LCD.1:
1
- ALC_TAT.3:
1
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL3:
4
- EAL3 augmented:
1
|
- EAL 6:
4
- EAL 5:
4
- EAL 2:
3
- EAL 1:
1
- EAL 4:
1
- EAL5+:
1
- EAL6:
1
- EAL 6 augmented:
3
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- out of scope:
1
- 2: Deliverables of the TOE Please note that NRG functionality and most toolbox functionality are out of scope of this evaluation (unless stated otherwise), hence no evaluated TOE guidance documentation applies:
1
- ConfidentialDocument:
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification:
1
- IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh T11 Security Target”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report, Version 2, 2024-09-02, EVALUATION TECHNICAL REPORT SUMMARY (ETR:
1
- TÜV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January:
1
- EVALUATION TECHNICAL REPORT FOR COMPOSITE EVALUATION (ETR COMP), TÜV Informationstechnik GmbH (confidential document) and Addendum to ETR for composite, Version V2, 2024-09-02, TÜV Informationstechnik GmbH:
1
- AG Chipcard and Security Evaluation Documentation Life Cycle Support”, Infineon Technologies AG (confidential document) [12] 32-bit Security Controller – V11, Hardware Reference Manual, V6.2, 2020-12-21, Infineon:
1
- Standards Compliance Verification”, Version 2, 2024-08-23, TÜV Informationstechnik GmbH (confidential document) [26] SLx3 (40 nm) Security Controllers Production and Personalization Manual Flash Loader V9 Field:
1
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
- MAC:
- KEX:
- KA:
- Key agreement:
3
- Key Agreement:
1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik:
6
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256:
2
- SHA-224:
1
- SHA-384:
1
- SHA-512:
1
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- SCA:
- physical probing:
1
- SPA:
4
- DPA:
4
- FI:
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001:
2
- CCMB-2009-07-002:
2
- CCMB-2009-07-003:
2
- CCMB-2009-07-004:
2
|
- FIPS:
- FIPS197:
3
- FIPS186-4:
11
- FIPS180-4:
7
- FIPS PUB 186-4:
1
- PKCS:
- BSI:
- AIS 34:
2
- AIS 1:
1
- AIS 14:
1
- AIS 19:
1
- AIS 20:
2
- AIS 25:
1
- AIS 26:
1
- AIS 27:
1
- AIS 31:
2
- AIS 32:
1
- AIS 35:
3
- AIS 36:
3
- AIS 37:
1
- AIS 38:
1
- AIS 41:
1
- AIS 46:
1
- AIS 47:
1
- AIS31:
4
- AIS20:
5
- RFC:
- ISO:
- ISO/IEC 15408:
4
- ISO/IEC 18045:
4
- ISO/IEC 17065:
2
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- Triple-DES:
2
- TDES:
2
- TDEA:
1
- constructions:
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES |
1
|
6
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI TR-02102:
1
- BSI 7148:
1
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG:
23
- Infineon:
3
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
577395
- pdf_is_encrypted:
True
- pdf_number_of_pages:
38
- /Author:
IPA/JISEC
- /Company: IPA
- /CreationDate: D:20110726170118+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /Manager: IPA
- /ModDate: D:20110726170221+09'00'
- /Producer: Acrobat Distiller 8.3.0 (Windows)
- /Title:
CRP-e
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
942242
- pdf_is_encrypted:
False
- pdf_number_of_pages:
41
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, PP-0084, Smart Card, IFX, Infineon"
- /Subject: Common Criteria, Certification, Zertifizierung, PP-0084, Smart Card, IFX, Infineon
- /Title:
Certification Report BSI-DSZ-CC-1107-V5-2024
- pdf_hyperlinks:
https://www.bsi.bund.de/zertifizierung, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte
|
pdf_data/report_metadata//Author |
IPA/JISEC
|
Bundesamt für Sicherheit in der Informationstechnik
|
pdf_data/report_metadata//Title |
CRP-e
|
Certification Report BSI-DSZ-CC-1107-V5-2024
|
pdf_data/report_metadata/pdf_file_size_bytes |
577395
|
942242
|
pdf_data/report_metadata/pdf_hyperlinks |
|
https://www.bsi.bund.de/zertifizierung, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte |
pdf_data/report_metadata/pdf_is_encrypted |
True
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
38
|
41
|
pdf_data/st_filename |
c0286_est.pdf
|
1107V5b_pdf.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
- D:
- O:
- O.STORAGE:
9
- O.DOC:
14
- O.FUNC:
8
- O.PROT:
8
- O.CONF:
16
- O.USER:
20
- O.INTERFACE:
8
- O.SOFTWARE:
8
- O.AUDIT:
9
- T:
- T.DOC:
10
- T.FUNC:
5
- T.PROT:
5
- T.CONF:
10
- A:
- A.ACCESS:
5
- A.USER:
4
- A.ADMIN:
10
- OE:
- OE.AUDIT_STORAGE:
3
- OE.AUDIT_ACCESS:
2
- OE.INTERFACE:
4
- OE.PHYSICAL:
5
- OE.USER:
18
- OE.ADMIN:
8
- OE.AUDIT:
3
- OE.AUDIT_ACCESS_AUTHORIZED:
1
|
- O:
- O.RND:
1
- O.TDES:
2
- O.AES:
2
- O.RSA:
5
- O.ECC:
5
- O.AES-TDES-MAC:
5
- O.HASH:
5
- T:
|
pdf_data/st_keywords/cc_claims/O |
- O.STORAGE:
9
- O.DOC:
14
- O.FUNC:
8
- O.PROT:
8
- O.CONF:
16
- O.USER:
20
- O.INTERFACE:
8
- O.SOFTWARE:
8
- O.AUDIT:
9
|
- O.RND:
1
- O.TDES:
2
- O.AES:
2
- O.RSA:
5
- O.ECC:
5
- O.AES-TDES-MAC:
5
- O.HASH:
5
|
pdf_data/st_keywords/cc_claims/T |
- T.DOC:
10
- T.FUNC:
5
- T.PROT:
5
- T.CONF:
10
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_ARC.1:
1
- ADV_FSP.3: 1
- ADV_TDS.2: 2
|
- ADV_ARC.1:
1
- ADV_FSP.5: 4
- ADV_IMP.2: 2
- ADV_INT.3: 1
- ADV_TDS.5: 1
- ADV_SPM.1: 6
- ADV_IMP: 1
- ADV_FSP: 1
- ADV_FSP.4: 2
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_FLR.2: 3
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1:
1
- ALC_DVS.1: 2
- ALC_LCD.1:
1
|
- ALC_DVS: 1
- ALC_FLR.1: 4
- ALC_CMC.5: 3
- ALC_CMS.5: 3
- ALC_DEL.1:
1
- ALC_DVS.2: 1
- ALC_LCD.1:
1
- ALC_TAT.3: 1
- ALC_CMS: 1
- ALC_CMS.4: 1
- ALC_CMC: 1
- ALC_FLR: 1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_LCD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE |
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
- ASE_INT: 14
- ASE_CCL: 4
- ASE_SPD: 4
- ASE_OBJ: 6
- ASE_ECD: 4
- ASE_REQ: 36
- ASE_TSS: 5
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_SPD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2:
1
|
- ATE_COV.3: 2
- ATE_DPT.3: 1
- ATE_FUN.2: 1
- ATE_IND.2:
1
- ATE_COV: 1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
|
- EAL6+:
2
- EAL6:
5
- EAL 6:
2
- EAL6 augmented:
2
- EAL 6 augmented:
2
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_STG.1:
9
- FAU_STG.4:
7
- FAU_SAR.1:
9
- FAU_SAR.2:
7
- FAU_GEN.1:
12
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2:
6
- FAU_GEN.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3:
1
- FAU_STG.4.1:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
- FCS:
- FCS_CKM.1:
10
- FCS_COP.1:
9
- FCS_CKM.2:
2
- FCS_CKM.4:
7
- FCS_CKM.1.1:
1
- FCS_COP.1.1:
1
- FDP:
- FDP_ACC.1:
32
- FDP_ACF.1:
30
- FDP_ACF.1.1:
3
- FDP_ACF.1.2:
4
- FDP_ACF.1.4:
3
- FDP_ACF.1.3:
6
- FDP_IFF:
1
- FDP_IFC:
1
- FDP_ITC.1:
2
- FDP_ITC.2:
2
- FDP_ACC.1.1:
2
- FDP_RIP.1:
8
- FDP_RIP.1.1:
1
- FDP_IFC.1:
4
- FIA:
- FIA_AFL.1:
7
- FIA_UAU.7:
7
- FIA_SOS.1:
7
- FIA_UID.1:
16
- FIA_UAU.1:
13
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1:
8
- FIA_ATD.1.1:
1
- FIA_SOS.1.1:
1
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.7.1:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_USB.1:
6
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FMT:
- FMT_SMF.1:
22
- FMT_SMR.1:
28
- FMT_MSA.3:
22
- FMT_MSA.1:
20
- FMT_MSA.1.1:
2
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MTD.1:
12
- FMT_MTD.1.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FPT_FDI_EXP:
4
- FPT_FDI_EXP.1:
10
- FPT_FDI_EXP.1.1:
2
- FPT_STM.1:
9
- FPT_STM.1.1:
1
- FPT_TST.1:
5
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FTA:
- FTA_SSL.3:
9
- FTA_SSL.3.1:
1
- FTP:
- FTP_ITC.1:
12
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TST.1:
1
|
- FAU:
- FAU_SAS:
4
- FAU_SAS.1:
6
- FAU_GEN:
1
- FAU_SAS.1.1:
1
- FCS:
- FCS_RNG:
37
- FCS_COP:
40
- FCS_CKM:
30
- FCS_RNG.1:
23
- FCS_CKM.1:
21
- FCS_CKM.4:
20
- FCS_COP.1:
14
- FCS_CKM.2:
3
- FDP:
- FDP_SDC:
2
- FDP_SDC.1:
5
- FDP_SDI.2:
5
- FDP_ITT.1:
4
- FDP_IFC.1:
8
- FDP_UCT.1:
10
- FDP_UIT.1:
12
- FDP_ACC:
13
- FDP_ACF:
15
- FDP_ACC.1:
18
- FDP_ACF.1:
15
- FDP_ITC.1:
18
- FDP_ITC.2:
18
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
2
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
2
- FDP_ACF.1.4:
1
- FDP_SDI.1:
1
- FDP_SDI.2.1:
1
- FDP_SDI.2.2:
1
- FDP_SDC.1.1:
1
- FDP_UCT.1.1:
1
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FIA:
- FIA_API:
2
- FIA_API.1:
7
- FIA_UID:
7
- FIA_UID.1:
6
- FIA_UID.2:
3
- FIA_API.1.1:
1
- FMT:
- FMT_LIM:
16
- FMT_LIM.1:
7
- FMT_LIM.2:
6
- FMT_MSA.1:
8
- FMT_MSA.3:
11
- FMT_SMF.1:
11
- FMT_SMR.1:
16
- FMT_MTD:
11
- FMT_SMR:
8
- FMT_SMF:
8
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MSA.1.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MTD.1:
1
- FPT:
- FPT_TST.2:
28
- FPT_TST:
5
- FPT_TST.1:
11
- FPT_FLS.1:
7
- FPT_PHP.3:
4
- FPT_ITT.1:
4
- FPT_FLS:
11
- FPT_TST.2.1:
1
- FRU:
- FTP:
- FTP_ITC.1:
18
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1:
4
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_STG.1:
9
- FAU_STG.4:
7
- FAU_SAR.1:
9
- FAU_SAR.2:
7
- FAU_GEN.1:
12
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2:
6
- FAU_GEN.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3:
1
- FAU_STG.4.1:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
|
- FAU_SAS:
4
- FAU_SAS.1:
6
- FAU_GEN:
1
- FAU_SAS.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_CKM.1:
10
- FCS_COP.1:
9
- FCS_CKM.2:
2
- FCS_CKM.4:
7
- FCS_CKM.1.1: 1
- FCS_COP.1.1: 1
|
- FCS_RNG: 37
- FCS_COP: 40
- FCS_CKM: 30
- FCS_RNG.1: 23
- FCS_CKM.1:
21
- FCS_CKM.4:
20
- FCS_COP.1:
14
- FCS_CKM.2:
3
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
10
|
21
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
2
|
3
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
7
|
20
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
9
|
14
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACC.1:
32
- FDP_ACF.1:
30
- FDP_ACF.1.1:
3
- FDP_ACF.1.2:
4
- FDP_ACF.1.4:
3
- FDP_ACF.1.3:
6
- FDP_IFF: 1
- FDP_IFC: 1
- FDP_ITC.1:
2
- FDP_ITC.2:
2
- FDP_ACC.1.1:
2
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FDP_IFC.1:
4
|
- FDP_SDC: 2
- FDP_SDC.1: 5
- FDP_SDI.2: 5
- FDP_ITT.1: 4
- FDP_IFC.1:
8
- FDP_UCT.1: 10
- FDP_UIT.1: 12
- FDP_ACC: 13
- FDP_ACF: 15
- FDP_ACC.1:
18
- FDP_ACF.1:
15
- FDP_ITC.1:
18
- FDP_ITC.2:
18
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
2
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
2
- FDP_ACF.1.4:
1
- FDP_SDI.1: 1
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_SDC.1.1: 1
- FDP_UCT.1.1: 1
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
32
|
18
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
30
|
15
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
3
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
4
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
6
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
3
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
4
|
8
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
2
|
18
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
2
|
18
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_AFL.1: 7
- FIA_UAU.7: 7
- FIA_SOS.1: 7
- FIA_UID.1:
16
- FIA_UAU.1: 13
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_SOS.1.1: 1
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7.1: 1
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
|
- FIA_API: 2
- FIA_API.1: 7
- FIA_UID: 7
- FIA_UID.1:
6
- FIA_UID.2: 3
- FIA_API.1.1: 1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
16
|
6
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_SMF.1:
22
- FMT_SMR.1:
28
- FMT_MSA.3:
22
- FMT_MSA.1:
20
- FMT_MSA.1.1:
2
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MTD.1:
12
- FMT_MTD.1.1: 1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
|
- FMT_LIM: 16
- FMT_LIM.1: 7
- FMT_LIM.2: 6
- FMT_MSA.1:
8
- FMT_MSA.3:
11
- FMT_SMF.1:
11
- FMT_SMR.1:
16
- FMT_MTD: 11
- FMT_SMR: 8
- FMT_SMF: 8
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MSA.1.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MTD.1:
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
20
|
8
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
22
|
11
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
12
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
22
|
11
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
28
|
16
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_FDI_EXP: 4
- FPT_FDI_EXP.1: 10
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TST.1:
5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
|
- FPT_TST.2: 28
- FPT_TST: 5
- FPT_TST.1:
11
- FPT_FLS.1: 7
- FPT_PHP.3: 4
- FPT_ITT.1: 4
- FPT_FLS: 11
- FPT_TST.2.1: 1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
5
|
11
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_ITC.1:
12
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TST.1: 1
|
- FTP_ITC.1:
18
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 |
12
|
18
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 |
1
|
1
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/TRNG |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- SCA:
- Leak-Inherent:
5
- Physical Probing:
2
- side channel:
1
- SPA:
1
- DPA:
2
- FI:
|
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- BSI:
- CC:
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
|
- FIPS:
- BSI:
- RFC:
- ISO:
- ISO/IEC 7816-3:
1
- ISO/IEC 14443:
6
- ISO/IEC 18092:
4
- ISO/IEC 14443-4:
1
- ISO/IEC14443-3:
1
- ICAO:
- CC:
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
|
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- DES:
- 3DES:
- TDES:
16
- Triple-DES:
1
- TDEA:
1
- miscellaneous:
- constructions:
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
2
|
19
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon Technologies:
7
- Infineon Technologies AG:
13
- Infineon:
3
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
789628
- pdf_is_encrypted:
False
- pdf_number_of_pages:
88
- /Creator:
MP_2851_P2600_ST_1.00_ENG20110520.doc - Microsoft Word
- /CreationDate:
D:20110601142541
- /Title:
MP_2851_P2600_ST_1.00_ENG20110520.doc
- /Author:
p000266068
- /Producer:
Acrobat PDFWriter 5.0 Windows NT
- pdf_hyperlinks:
|
None
|
dgst |
8a8d0f5b96ee95fb
|
8fc68a5019758001
|