name |
Ricoh imagio MP 5000SP/4000SP with security card Type 9 Version: - Firmware Configuration System Version V2.16-00 System/Copy 1.11.1, Network Support 7.26, Network DocBox 1.10C, Web Support 1.59, Web Uapl 1.15, animation 1.3, Scanner 01.24, RPDL 7.33, Printer 1.11, MSIS 7.15.02, RPCS Font 1.01, Engine 1.04:05, OpePanel 1.01, LANG0 1.01, LANG1 1.01, ADF 15.000:15, - ASIC Ic Key 1100 - Option Data Erase Opt 1.01m |
Tactical Network-layer Gateway (2E2 IA): a GD Canada MESHnet Gateway product |
category |
Multi-Function Devices |
Network and Network-Related Devices and Systems |
scheme |
JP |
CA |
status |
archived |
archived |
not_valid_after |
01.03.2015 |
29.09.2015 |
not_valid_before |
25.02.2010 |
10.02.2009 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0246_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/gdc-cert-eng.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0246_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/gdc-sec-eng.pdf |
manufacturer |
Ricoh Company, Ltd. |
General Dynamics Canada |
manufacturer_web |
https://www.ricoh.com/ |
https://www.gdcanada.com/ |
security_level |
EAL3+, ALC_FLR.2 |
EAL2+, ALC_FLR.1 |
dgst |
93cdda41b5a03cdf |
87f1232d490d5d00 |
heuristics/cert_id |
JISEC-CC-CRP-C0246 |
383-4-67 |
heuristics/cert_lab |
[] |
CANADA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ADV_RCR.1, ADV_FSP.1, ALC_FLR.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1, ADV_SPM.1 |
heuristics/extracted_versions |
7.33, 15.000, 1.04, 2.16, 1.11.1, 7.15.02, 7.26, 1.3, 1.59, 1.01, 1.11, 1.10, 01.24, 1.15 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0246
- certification_date: 01.02.2010
- claim: EAL3+ ALC_FLR.2 PP
- enhanced:
- assurance_level: EAL3 Augmented with ALC_FLR.2
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0246_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE conforms to the international security standard: "IEEE Std 2600.1TM-2009" security Protection Profile for Digital Multi-function Products. The TOE is a digital Multi-function Product which is composed of Copy Function, Scanner Function, Printer Function and Document Server Function, and it creates a safe environment for customers to use the functions. TOE security functionality The main security functions are described as follows: - Audit Function: to generate / review audit log of the event. - Identification and Authentication Function: to identify and authenticate users, to lock out, to protect passwords, and to enforce automated logout. - Access Control Function: to control available functions for each user, and to control the document operation. - Network Protection Function: to protect information on the Network with use of the encrypted communication. - Residual Data Delete Function: to overwrite the residual data on the Hard Disk with the specific pattern data. - Security Management Function: to make the administrators control the security functions. - Software Verification Function: to ensure the genuine control software by verifying the integrity of the executable codes.
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: Ricoh imagio MP 5000SP/4000SP with security card Type 9
- product_type: Multi Function Product
- protection_profile: 2600.1, Protection Profile for Hardcopy Devices, Operational Environment A 1.0, dated June 2009
- report_link: https://www.ipa.go.jp/en/security/c0246_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0246_est.pdf
- toe_version: - Firmware Configuration System VersionV2.16-00 System/Copy1.11.1 Network Support7.26 Network DocBox1.10C Web Support1.59 Web Uapl1.15 animation1.3 Scanner01.24 RPDL7.33 Printer1.11 MSIS7.15.02 RPCS Font1.01 Engine1.04:05 OpePanel1.01 LANG01.01 LANG11.01 ADF15.000:15 - ASIC Ic Key1100 - Option Data Erase Opt1.01m
- vendor: RICOH COMPANY, LTD.
- expiration_date: 01.03.2015
- supplier: RICOH COMPANY, LTD.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0246_it9257.html
- toe_japan_name: Ricoh imagio MP 5000SP/4000SP with security card Type 9 - Firmware Configuration System VersionV2.16-00 System/Copy1.11.1, Network Support7.26, Network DocBox1.10C, Web Support1.59, Web Uapl1.15, animation1.3, Scanner01.24, RPDL7.33, Printer;1.11, MSIS7.15.02, RPCS Font1.01, Engine1.04:05, OpePanel1.01, LANG01.01, LANG11.01, ADF15.000:15 - ASIC Ic Key1100 - Option Data Erase Opt1.01m
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
32475ccb695b1644 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0246_erpt.pdf |
gdc-cert-eng.pdf |
pdf_data/report_frontpage |
|
- CA:
- cert_id: 383-4-67-CR
- cert_lab: CANADA
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0246-01: 1
- Certification No. C0246: 1
|
- CA:
- 383-4-67: 1
- 383-4-67-CR: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL3: 3
- EAL3 augmented: 2
|
- EAL:
- EAL 2: 5
- EAL 2 augmented: 3
- EAL 2+: 2
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.ADMIN: 2
- A.USER: 1
- T:
- T.CONF: 2
- T.DOC: 2
- T.FUNC: 1
- T.PROT: 1
|
|
pdf_data/report_keywords/vendor |
|
- Microsoft:
- Microsoft: 3
- Microsoft Corporation: 1
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
|
- FIPS:
- FIPS 140-2: 3
- FIPS 180-2: 1
- FIPS 197: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20100629170727+09'00'
- /ModDate: D:20100629170727+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 230440
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 29
|
- /AM_ACPP_Date: [dd month yyyy]
- /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
- /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
- /AM_ACPP_Version: [AM_AMCPP_Version]
- /AM_AMCPP_Date: [AM_AMCPP_Date]
- /AM_AMCPP_Doc#: [AM_AMCPP_Doc#]
- /AM_AMCPP_Version: [AM_AMCPP_Version]
- /AM_IAR_Date: [AM_IAR_Date]
- /AM_IAR_Doc#: [AM_IAR_Doc#]
- /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
- /AM_IAR_Version: [AM_IAR_Version]
- /AM_ST Date: [AM_ST Date]
- /AM_ST Title: [AM_ST Title]
- /AM_ST Version: [AM_ST Version]
- /AM_TOE: [AM_TOE]
- /AM_TOE Short: [AM_TOE Short]
- /AM_TOE Version: [AM_TOE Version]
- /Author: mgauvreau
- /CC Version: 2.3
- /CC date: August 2005
- /CEM Version: 2.3
- /CEM date: August 2005
- /CR_Date: 22 December 2008
- /CR_Version: 0.3
- /Client City: Calgary
- /Client Country: Canada
- /Client Full Name: General Dynamics Canada
- /Client Postal Code: T2E 8P2
- /Client Short Name: GDC
- /Client State: Alberta
- /Client Street: 1020 - 68th Avenue NE
- /Comments: PCR Template
Version 1.8-EWA-C
- /CreationDate: D:20090304140623-05'00'
- /Creator: Acrobat PDFMaker 6.0 for Word
- /Developer Long Name: General Dynamics Canada (GDC)
- /Developer Short Name: GDC
- /EAL Level: 2+
- /EAL Level Base: 2
- /EAL Level Text: 2 augmented
- /EAL Long: EAL 2+
- /EAL Short: EAL 2+
- /ETPRoc_Date: day month yyyy
- /ETPlan_Doc#: 1531-000-D003
- /ETPlan_Title: Evaluation Test Plan
- /ETPlan_Version: [0.0]
- /ETPlan_date: day month yyyy
- /ETProcRes_Date: day month yyyy
- /ETProcRes_Doc#: 1531-000-D005
- /ETProcRes_Title: Evaluation Test Results
- /ETProcRes_Version: [0.0]
- /ETProc_Doc#: 1531-000-D004
- /ETProc_Title: Evaluation Test Procedures
- /ETProc_Version: [0.0]
- /ETReport_Date: 19 December 2008
- /ETReport_Doc#: 1531-000-D002
- /ETReport_Title: Evaluation Technical Report
- /ETReport_Version: 2.3
- /EWP_Date: 15 October 2007
- /EWP_Doc#: 1531-000-D001
- /EWP_Title: Evaluation Work Plan for Common Criteria EAL 2+ Evaluation of General Dynamics Canada Ltd Tactical Network-layer Gateway (TNG) Release 1, Rev A
- /EWP_Version: 0.6
- /Eval number: 383-4-67
- /Eval_End_Date: 18 December 2008
- /Eval_Start_Date: dd month yyyy
- /ModDate: D:20090304140704-05'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /ProjectNumber: 1531
- /ST_Date: 10 December 2008
- /ST_Title: Security Target for the Tactical Network-layer Gateway v1.0: a GD Canada MESHnet G2 Gateway product
- /ST_Version: 0.39
- /SVR_Date: [day month yyyy]
- /SVR_Doc#: 1531-000-D006
- /SVR_Title: Site Visit Report
- /SVR_Version: [0.0]
- /SV_City: [site vist city/cities]
- /Security Classification: EWA-Canada & GDC Proprietary
- /SourceModified: D:20090304181701
- /Sponsor: General Dynamics Canada
- /Sponsor City: Calgary
- /Sponsor Country: Canada
- /Sponsor Postal Code: T2E 8P2
- /Sponsor State: Alberta
- /Sponsor Street: 1020 - 68th Avenue NE
- /TOE: Tactical Network-layer Gateway (TNG)
- /TOE Line1: [TOE Line1 - enter later for PCR or web page]
- /TOE Line2: [TOE Line2 - enter later for PCR or web page]
- /TOE Line3: [TOE Line3 - enter later for PCR or web page]
- /TOE Line4: [TOE Line4 - enter later for PCR or web page]
- /TOE Line5: [TOE Line5 - enter later for PCR or web page]
- /TOE Short: TNG 2E2 IA
- /TOE Short with version: TNG Release 1 Revision A
- /TOE Short-NoTM: [TOE Short, no version, no trademarks]
- /TOE Version: Release 1, Rev A
- /TOE with version: Tactical Network-layer Gateway (TNG) Release 1, Rev A
- /TOE-NoTM: [TOE Name, no version, no trademarks]
- /Title: EAL X+ Evaluation of [Developer Long Name]
- /_AdHocReviewCycleID: -1098653131
- /_AuthorEmail: [email protected]
- /_AuthorEmailDisplayName: Reade, Rick A.
- /_EmailSubject: Post request ... rick
- pdf_file_size_bytes: 126808
- pdf_hyperlinks: http://www.cse-cst.gc.ca/its-sti/services/cc/cp-pc-eng.html, http://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
pdf_data/st_filename |
c0246_est.pdf |
gdc-sec-eng.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL2: 2
- EAL2+: 4
- EAL4+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 2
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_FLR.2: 3
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ADO:
- ADO_DEL.1: 3
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 10
- ADV_HLD.1: 3
- ADV_RCR.1: 5
- ADV_SPM.1: 4
- AGD:
- AGD_ADM.1: 7
- AGD_USR.1: 3
- ALC:
- ATE:
- ATE_COV.1: 4
- ATE_FUN.1: 5
- ATE_IND.2: 4
- AVA:
- AVA_SOF.1: 3
- AVA_VLA.1: 4
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 10
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 7
- FAU_SAR.2.1: 1
- FAU_STG.1: 9
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FDP:
- FDP_ACC.1: 29
- FDP_ACC.1.1: 2
- FDP_ACF.1: 27
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC: 1
- FDP_IFC.1: 4
- FDP_IFF: 1
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 14
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 7
- FIA_UAU.7.1: 1
- FIA_UID.1: 17
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 23
- FMT_MSA.1.1: 2
- FMT_MSA.3: 24
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 11
- FMT_MTD.1.1: 1
- FMT_SMF.1: 20
- FMT_SMF.1.1: 1
- FMT_SMR.1: 26
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FDI_EXP: 4
- FPT_FDI_EXP.1: 11
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 10
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 18
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TST.1: 1
|
- FAU:
- FAU_ARP.1: 8
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAA.1: 10
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1: 8
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 7
- FAU_SAR.2.1: 1
- FAU_SAR.3: 4
- FAU_SAR.3.1: 1
- FAU_SEL.1: 4
- FAU_SEL.1.1: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 7
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 3
- FCS_CKM.4: 1
- FCS_COP.1: 12
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_ACF.1: 7
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DAU.1: 8
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_IFC.1: 15
- FDP_IFC.1.1: 1
- FDP_IFF.1: 7
- FDP_IFF.1.1: 3
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FDP_ITC.1: 10
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 3
- FDP_ITT.1: 7
- FDP_ITT.1.1: 1
- FIA:
- FIA_AFL.1: 12
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1: 11
- FIA_ATD.1.1: 2
- FIA_SOS.1: 5
- FIA_SOS.1.1: 1
- FIA_UAU.1: 4
- FIA_UAU.2: 22
- FIA_UAU.2.1: 2
- FIA_UAU.6: 5
- FIA_UAU.6.1: 1
- FIA_UID.1: 8
- FIA_UID.2: 24
- FIA_UID.2.1: 2
- FMT:
- FMT_MOF.1: 20
- FMT_MOF.1.1: 3
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.2: 10
- FMT_MSA.2.1: 1
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 17
- FMT_MTD.3: 9
- FMT_MTD.3.1: 1
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 3
- FMT_SMR.1.2: 2
- FPT:
- FPT_ITT.2: 7
- FPT_ITT.2.1: 1
- FPT_RVM.1: 11
- FPT_RVM.1.1: 2
- FPT_SEP.1: 12
- FPT_SEP.1.1: 2
- FPT_SEP.1.2: 2
- FPT_STM.1: 14
- FPT_STM.1.1: 2
- FTP:
- FTP_ITT.2.2: 1
- FTP_TRP.1: 7
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 5
- A.ADMIN: 10
- A.USER: 4
- O:
- O.AUDIT: 9
- O.CONF: 18
- O.DOC: 18
- O.FUNC: 9
- O.INTERFACE: 9
- O.PROT: 9
- O.SOFTWARE: 9
- O.USER: 21
- OE:
- OE.ADMIN: 8
- OE.AUDIT: 3
- OE.AUDIT_ACCESS: 3
- OE.AUDIT_ACCESS_AUTHORIZED: 1
- OE.AUDIT_STORAGE: 4
- OE.INTERFACE: 4
- OE.PHYISCAL: 3
- OE.PHYSICAL: 1
- OE.USER: 21
- T:
- T.CONF: 10
- T.DOC: 10
- T.FUNC: 5
- T.PROT: 5
|
- A:
- A.AVAILABILITY: 2
- A.CONNECT: 2
- A.GOOD_ADMIN: 2
- A.NO_BYPASS: 2
- A.NO_GEN_PURPOSE: 2
- A.NO_MAINT_PORT: 2
- A.PHYSICAL: 2
- O:
- O.ADMIN_GUIDANCE: 6
- O.ADMIN_ROLE: 7
- O.AUDIT_DATA: 6
- O.AUDIT_PROTECT: 8
- O.AUDIT_REVIEW: 6
- O.GOOD_TESTING: 3
- O.MANAGE: 8
- O.MANAGE_CHANGE: 5
- O.MEDIATE_INFO: 4
- O.PEER_AUTH: 6
- O.SELF_PROTECT: 8
- O.SOUND_DESIGN: 4
- O.SOUND_TOE: 4
- O.TIME_STAMPS: 4
- O.TOE_ACCESS: 5
- O.TRUSTED_PATH: 8
- O.USER_GUIDANCE: 5
- O.VULN_ANAL_TEST: 6
- OE:
- OE.AVAILABILITY: 2
- OE.CONNECT: 1
- OE.GOOD_ADMIN: 2
- OE.NO_BYPASS: 1
- OE.NO_GEN_PURPOSE: 2
- OE.NO_MAINT_PORT: 1
- OE.PHYSICAL: 2
- T:
- T.ADMIN_ERROR: 4
- T.ADMIN_ROGUE: 3
- T.AUDIT_COMP: 3
- T.CRYPTO_COMP: 3
- T.FLAWED_DESIGN: 3
- T.FLAWED_TOE: 3
- T.MALICIOUS_USER: 3
- T.MASQUERADE: 3
- T.MISSED_ACTIONS: 3
- T.POOR_TEST: 3
- T.SPOOFING: 3
- T.UNATTENDED_SESSION: 3
- T.UNAUTH_ACCESS: 3
- T.UNAUTH_PEER: 3
- T.UNKNOWN_STATE: 3
- T.USER_ERROR: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
|
- CC:
- CCMB-2005-02-002: 1
- CCMB-2005-02-003: 1
- CCMB-2005-08-001: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 197: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20100618152326+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20100618152326+09'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /Title: Microsoft Word - C0246ST_eng_2010-6-18.doc
- pdf_file_size_bytes: 464939
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 65
|
- /Author: ggibbs
- /CreationDate: D:20090105074649-05'00'
- /Creator: PDFCreator Version 0.9.5
- /Keywords:
- /ModDate: D:20090304140542-05'00'
- /Producer: GPL Ghostscript 8.61
- /Subject:
- /Title: TNG-Security-Target_v0.41_5Jan09
- pdf_file_size_bytes: 413865
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 74
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |