name |
System Software for e-STUDIO520/600/720/850, e-STUDIO523/603/723/853 V2.0 |
Feitian FT-JCOS V5.0 |
category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
NO |
status |
archived |
archived |
not_valid_after |
10.12.2010 |
17.09.2023 |
not_valid_before |
12.08.2008 |
17.09.2018 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20180917SERTIT-116%20C.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0178_erpt2.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20180917%20Sertit-116%20CR%20Feitian%20v10.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0178_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[09895][SERTIT-116][ST][v1.0.8]%20FTJCOS%20v5.0%20Security%20Target.pdf |
manufacturer |
Toshiba TEC Corporation |
Feitian Technologies Co., Ltd. |
manufacturer_web |
https://www.toshibatec.co.jp/en/ |
https://www.ftsafe.com |
security_level |
EAL3 |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
dgst |
92a911021007658d |
8d5f8b6024447c59 |
heuristics/cert_id |
JISEC-CC-CRP-C0178 |
SERTIT-116 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
AVA_COMP.1, ASE_INT.1, ASE_COMP.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ADV_COMP.1, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_COMP.1, ALC_COMP.1, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
2.0 |
5.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0178
- certification_date:
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.3
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the system software of the digital multi function device "e-STUDIO520/600/720/850, e-STUDIO523/603/723/853" manufactured by TOSHIBA TEC CORPORATION. The TOE controls general functions as a digital multi function device (Copy, Scan, Print and Fax), and provides functions of e-Filing Box and Shared folder. TOE security functions The TOE provides function of data overwrite and complete deletion on the user document data deleted from HDD in the "e-STUDIO520/600/720/850, e-STUDIO523/603/723/853" (except following data: fax reception; expired user document data stored in e-Filing Box and Shared folder after such data's effective period). The function of data overwrite and complete deletion includes the function to collectively and completely delete all user document data from the HDD before the HDD is disposed or replaced. This function also prevents unauthorized restore of data.
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: System Software for e-STUDIO520/600/720/850, e-STUDIO523/603/723/853
- product_type: IT product (data protection function in Multi Function Device)
- toe_version: V2.0
- vendor: TOSHIBA TEC CORPORATION
- expiration_date: 01.01.2011
- supplier: TOSHIBA TEC CORPORATION
- toe_japan_name: e-STUDIO520/600/720/850, e-STUDIO523/603/723/853 System Software V2.0
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0178_it8196.html
- toe_overseas_name: System Software for e-STUDIO 520/600/720/850, e-STUDIO523/603/723/853 V2.0
|
- category: ICs, Smart Cards and Smart Card-Related Devices and Systems
- certification_date: 17.09.2018
- developer: Feitian Technologies Co., Ltd.
- enhanced:
- category: ICs, Smart Cards and Smart Card-Related Devices and Systems
- cert_id: SERTIT-116
- certification_date: 17.09.2018
- description: The TOE is an open Java Card Platforms (JCP), that is, smart cards or similar devices enabled with JavaCard technology that support post-issuance downloading of applications.The purpose of the TOE is to provide a limited Java Card environment for a single applet, specifically for e-passport and similar applications such as eID and driving license.The TOE is composed of a Smart Card Platform (SCP) and an embedded software (JCS + non-TSF parts). The JCP is compliant with Java Card Specification v3.0.4 and GlobalPlatform Specification v.2.3. The TOE allows for the loading of the customer applets, but after loading the single applet the platform must be closed to prevent further loading of applets after issuance of the card to the end user. To support this functionality, the TOE provides a closing mechanism with specific guidance. The applet should have been previously verified by an off-card trusted IT component. The JCP is managed by Card Manager that is a part of the TOE. The Card Manager(ISD) is a pre-issuance applet. The JCP is fully compliant with the Java Card Specification v3.0.4 excluding the optional part JCRMI which is not implemented by the TOE. The SCP is a certified hardware platform – the SLE77CLFX2400PM with specific IC dedicated software (firmware). The hardware platform is certified by the BSI under the certification ID: BSI-DSZ-CC-0964-V3-2017 . Not all functionality of the hardware is used by the composite TOE. Therefore some parts of the IC platform are not part of the composite TOEto ensure that the developed applet has sufficient ability to counter attacks.
- developer: Feitian Technologies Co., Ltd.
- documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135382-1607954033/SERTIT/Sertifikater/2018/116/20180917SERTIT-116%20C.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135385-1607954035/SERTIT/Sertifikater/2018/116/%5B09895%5D%5BSERTIT-116%5D%5BST%5D%5Bv1.0.8%5D%20FTJCOS%20v5.0%20Security%20Target.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135379-1607954030/SERTIT/Sertifikater/2018/116/20180917%20Sertit-116%20CR%20Feitian%20v10.pdf'})]})
- evaluation_facility: Brightsight B.V.
- expiration_date: 17.09.2023
- level: EAL 5, ALC_DVS.2, AVA_VAN.5
- mutual_recognition: CCRA, SOG-IS
- product: V5.0.9
- sponsor: Feitian Technologies Co., Ltd.
- product: FT-JCOS V5.0
- url: https://sertit.no/certified-products/product-archive/ft-jcos-v5-0
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0964-V3-2017 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0964-V3-2017 |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
|
20180917SERTIT-116 C.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- pdf_file_size_bytes: 744305
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0178_erpt2.pdf |
20180917 Sertit-116 CR Feitian v10.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0178-01: 1
- Certification No. C0178: 2
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 5: 1
- EAL1: 1
- EAL5+: 22
- EAL7: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_COMP.1: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_COMP.1: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_FLR: 1
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_COMP.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COMP.1: 1
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
- AVA_COMP.1: 1
- AVA_VAN.5: 4
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- T:
- T.STOREDATA_ACCESS: 1
- T.TEMPDATA_ACCESS: 1
|
|
pdf_data/report_keywords/vendor |
|
- Feitian:
- Feitian: 1
- Feitian Technologies: 2
- Feitian Technologies Co: 1
- Infineon:
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 2
|
- CC:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 15408: 8
- ISO/IEC 7816: 2
- SCP:
|
pdf_data/report_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
- Java Card 2.3: 1
- Java Card 3.0.4: 4
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20090428144612+09'00'
- /ModDate: D:20120817151013+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 577293
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 23
|
- /AAPL:Keywords: ['ugradert']
- /Author: [email protected]
- /CreationDate: D:20180917114319Z00'00'
- /Creator: Microsoft® Word 2013
- /Keywords: ugradert
- /ModDate: D:20180917114319Z00'00'
- /Producer: Mac OS X 10.13.6 Quartz PDFContext
- /Title: tittel
- pdf_file_size_bytes: 1156984
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
pdf_data/st_filename |
c0178_est.pdf |
[09895][SERTIT-116][ST][v1.0.8] FTJCOS v5.0 Security Target.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0964-: 1
- BSI-DSZ-CC-0964-V3-2017: 3
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 1
- EAL 5 augmented: 1
- EAL5: 6
- EAL5 augmented: 1
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 3
- ACM_SCP.1: 1
- ADO:
- ADO_DEL.1: 3
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 3
- ADV_HLD.2: 1
- ADV_RCR.1: 3
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 1
- ALC:
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 1
- ATE_FUN.1: 3
- ATE_IND.2: 1
- AVA:
- AVA_MSU.1: 3
- AVA_SOF.1: 2
- AVA_VLA.1: 3
|
- ADV:
- ADV_ARC.1: 6
- ADV_FSP.1: 4
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_FSP.5: 7
- ADV_IMP.1: 9
- ADV_INT.2: 1
- ADV_TDS.1: 2
- ADV_TDS.2: 1
- ADV_TDS.3: 10
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 10
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 7
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 6
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_RIP.1: 11
- FDP_RIP.1.1: 1
- FDP_RIP.2: 8
- FPT:
- FPT_RVM.1: 12
- FPT_RVM.1.1: 1
|
- FAU:
- FAU_ARP.1: 21
- FAU_ARP.1.1: 1
- FAU_SAA.1: 3
- FCO:
- FCS:
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 9
- FCS_CKM.2.1: 1
- FCS_CKM.3: 8
- FCS_CKM.3.1: 1
- FCS_CKM.4: 13
- FCS_CKM.4.1: 1
- FCS_COP: 7
- FCS_COP.1: 21
- FCS_RNG: 5
- FCS_RNG.1: 13
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 21
- FDP_ACC.1: 12
- FDP_ACC.2: 2
- FDP_ACF: 21
- FDP_ACF.1: 13
- FDP_IFC: 23
- FDP_IFC.1: 13
- FDP_IFC.2: 2
- FDP_IFF: 18
- FDP_IFF.1: 17
- FDP_ITC: 12
- FDP_ITC.1: 4
- FDP_ITC.2: 10
- FDP_ITT.1: 1
- FDP_RIP: 75
- FDP_RIP.1: 8
- FDP_ROL: 12
- FDP_ROL.1: 3
- FDP_SDI.1: 1
- FDP_SDI.2: 9
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 5
- FDP_UIT.1: 2
- FIA:
- FIA_ATD: 8
- FIA_ATD.1: 2
- FIA_UID: 24
- FIA_UID.1: 10
- FIA_UID.2: 1
- FIA_USB: 7
- FIA_USB.1: 3
- FMT:
- FMT_MSA: 87
- FMT_MSA.1: 10
- FMT_MSA.2: 2
- FMT_MSA.3: 16
- FMT_MTD: 20
- FMT_MTD.1: 2
- FMT_MTD.3: 1
- FMT_SMF: 18
- FMT_SMF.1: 18
- FMT_SMF.1.1: 1
- FMT_SMR: 31
- FMT_SMR.1: 30
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 8
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 13
- FPT_FLS.1: 13
- FPT_FLS.1.1: 2
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FPT_RCV: 22
- FPT_RCV.3: 13
- FPT_RCV.4: 2
- FPT_TDC.1: 8
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 1
- FRU:
- FTP:
- FTP_ITC: 6
- FTP_ITC.1: 4
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- O:
- O.STOREDATA_OVERWRITE: 4
- O.TEMPDATA_OVERWRITE: 6
- OE:
- OE.HDD_ERASE: 3
- OE.OVERWRITE_COMPLETE: 3
- T:
- T.STOREDATA_ACCESS: 3
- T.TEMPDATA_ACCESS: 4
|
- A:
- A.APPLET: 6
- A.DELETION: 1
- A.VERIFICATION: 6
- D:
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 2
- D.APP_I_DATA: 4
- D.CM_APDU: 1
- D.CRYPTO: 7
- D.JCS_CODE: 4
- D.JCS_DATA: 5
- D.JCS_KEYS: 4
- D.SEC_ATTRIBUTES: 2
- D.SEC_DATA: 8
- O:
- O.ALARM: 20
- O.APPLET: 4
- O.CARD-: 7
- O.CARD-MANAGEMENT: 30
- O.CIPHER: 14
- O.CODE_PKG: 3
- O.COMMUNICATION: 11
- O.DELETION: 1
- O.FIREWALL: 37
- O.GLOBAL: 2
- O.GLOBAL_ARRAYS_CONFID: 16
- O.GLOBAL_ARRAYS_INTEG: 9
- O.IC_SUPPORT: 17
- O.INSTALL: 16
- O.JAVAOBJECT: 22
- O.KEY-: 1
- O.KEY-MNGT: 20
- O.LOAD: 18
- O.NATIVE: 14
- O.OPERATE: 33
- O.OS: 1
- O.OS_SUPPORT: 23
- O.PACKAGE: 2
- O.PIN-MNGT: 1
- O.REALLOCATION: 15
- O.RECOVERY: 23
- O.REMOTE: 1
- O.RESOURCES: 19
- O.RND: 14
- O.SID: 30
- O.TRANSACTION: 14
- OE:
- OE.APPLET: 9
- OE.CARD-MANAGEMENT: 2
- OE.CODE-: 5
- OE.CODE-EVIDENCE: 16
- OE.SCP: 6
- OE.VERIFICATION: 37
- OP:
- OP.ARRAY_ACCESS: 4
- OP.CREATE: 7
- OP.GP: 3
- OP.INSTANCE_FIELD: 4
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 5
- OP.LOAD_PCKG: 1
- OP.PUT: 6
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- R:
- T:
- T.COMMUNICATION: 5
- T.CONFID-: 2
- T.CONFID-APPLI-: 2
- T.CONFID-APPLI-DATA: 16
- T.CONFID-JCS-CODE: 7
- T.CONFID-JCS-DATA: 9
- T.DELETION: 1
- T.EXE-: 1
- T.EXE-CODE: 8
- T.FAULT: 6
- T.INSTALL: 6
- T.INTEG-: 6
- T.INTEG-APPLI-: 4
- T.INTEG-APPLI-CODE: 12
- T.INTEG-APPLI-DATA: 17
- T.INTEG-JCS-: 1
- T.INTEG-JCS-CODE: 7
- T.INTEG-JCS-DATA: 12
- T.LEAKAGE: 6
- T.NATIVE: 6
- T.PHYSICAL: 8
- T.RESOURCES: 9
- T.RND: 6
- T.SID: 19
|
pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft: 3
- Microsoft Corporation: 1
|
- Feitian:
- Feitian Technologies: 1
- Feitian Technologies Co: 92
- Infineon:
- Infineon: 10
- Infineon Technologies AG: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 1
- TDEA: 1
- TDES: 7
- Triple-DES: 1
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- malfunction: 4
- physical tampering: 1
- SCA:
- DPA: 3
- Leak-Inherent: 2
- SPA: 1
- physical probing: 3
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- FIPS:
- FIPS PUB 140-2: 1
- FIPS PUB 180-4: 1
- FIPS PUB 197: 1
- FIPS140: 2
- FIPS180-4: 2
- FIPS197: 3
- ICAO:
- ISO:
- ISO/IEC 18013: 2
- ISO/IEC 9796-2: 1
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are: 1
- com 11 FT-JCOS V5.0 Security Target Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip: 1
- out of scope: 2
|
pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20090428113531+09'00'
- /Creator: PScript5.dll Version 5.2
- /Keywords:
- /ModDate: D:20090428113531+09'00'
- /Producer: Adobe LiveCycle PDFG 7.2
- /Subject:
- /Title:
- pdf_file_size_bytes: 189527
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
- /CreationDate: D:20180811160413+08'00'
- /Creator: LaTeX with hyperref package
- /Producer: MiKTeX-xdvipdfmx (0.7.8)
- pdf_file_size_bytes: 1189588
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 89
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |