name |
MX-M7570 / M6570 fax standard model with MX-FR60U; and MX-M7570 / M6570 fax option model with MX-FR60U and MX-FX150130td00 |
J-SIGN version 1.8.9 |
category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
FR |
status |
archived |
archived |
not_valid_after |
19.12.2023 |
11.01.2019 |
not_valid_before |
19.12.2018 |
11.01.2019 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0623_eimg.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0623_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019_05fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0623_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2019_05en.pdf |
manufacturer |
Sharp Corporation |
STMicroelectronics S.r.l et STMicroelectronics |
manufacturer_web |
https://sharp-world.com/ |
https://www.st.com/content/st_com/en.html |
security_level |
{} |
ALC_DVS.2, EAL4+, AVA_VAN.5 |
dgst |
974ba1318c7dcbf6 |
06cf8f373fa0853a |
heuristics/cert_id |
JISEC-CC-CRP-C0623-01-2018 |
ANSSI-CC-2019/05 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
cpe:2.3:h:sharp:mx-m6570:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-m7570:-:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ALC_FLR.1, ALC_TAT.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ATE_FUN.2, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_IMP.2, ALC_CMC.5, ASE_REQ.2, ADV_INT.3, ADV_FSP.4, ATE_IND.2, ASE_CCL.1, ATE_COV.3 |
heuristics/extracted_versions |
- |
1.8.9 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2012/68 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2010/01, ANSSI-CC-2009/26, ANSSI-CC-2009/05, ANSSI-CC-2009/51, ANSSI-CC-2009/06, ANSSI-CC-2012/68, ANSSI-CC-2009/50, ANSSI-CC-2010/02, ANSSI-CC-2009/62, ANSSI-CC-2009/28 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0623
- certification_date: 01.12.2018
- claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
- enhanced:
- assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0623
- cert_link: https://www.ipa.go.jp/en/security/c0623_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Device (MFD) that has the functions, such as copy, print, scan, fax and filing. The TOE is capable of implementing the functionality required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFD. TOE security functionality The TOE provides the following security features: - Identification and Authentication Function - Access Control Function - Stored Data Encryption Function - Network Protection Function - Security Management Function - Audit Function - Software Verification Function - Self-testing Function - Fax Line Separation Function - Residual Data Overwrite Function - Data Purging Function
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: MX-M7570 / M6570 fax standard model with MX-FR60U; and MX-M7570 / M6570 fax option model with MX-FR60U and MX-FX15
- product_type: Multifunction Product
- protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
- report_link: https://www.ipa.go.jp/en/security/c0623_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0623_est.pdf
- toe_version: 0130td00
- vendor: SHARP CORPORATION
- expiration_date: 01.01.2024
- supplier: SHARP CORPORATION
- toe_japan_name: MX-M7570 / M6570 fax standard model with MX-FR60U; and MX-M7570 / M6570 fax option model with MX-FR60U and MX-FX15 0130td00
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0623_it8676.html
- toe_overseas_name: MX-M7570 / M6570 fax standard model with MX-FR60U; and MX-M7570 / M6570 fax option model with MX-FR60U and MX-FX15 0130td00
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2010/02, ANSSI-CC-2012/68 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2010/02, ANSSI-CC-2012/68 |
heuristics/protection_profiles |
b2cfec7a92fa2940 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf |
{} |
pdf_data/cert_filename |
c0623_eimg.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0623-01-2018: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20190226101520+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20190226101617+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 85983
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
c0623_erpt.pdf |
anssi-cc-2019_05fr.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 5
- cert_id: ANSSI-CC-2019/05
- cert_item: J-SIGN version 1.8.9
- cert_item_version: Version EEPROM : 1.8.9 Version ROM : 1.6.0
- cert_lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: STMicroelctronics S.r.l Z.I. Marcianise SUD 81025 MARCIANISE, Italy STMicroelectronics 190 avenue Célestin Coq – ZI de Rousset BP2 – 13106 Rousset Cedex, France Commanditaire STMicroelctronics S.r.l Z.I. Marcianise SUD, 81025 MARCIANISE, Italy
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Protection profiles for secure signature creation device: Part 2: Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-01 ; Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012 ; Part 5: Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0623-01-2018: 1
|
- FR:
- ANSSI-CC-2012/68: 2
- ANSSI-CC-2012/68-M01: 1
- ANSSI-CC-2012/68-S05: 1
- ANSSI-CC-2019/05: 17
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 2
- BSI-CC-PP-0071-: 1
- BSI-CC-PP-0071-2012: 1
- BSI-CC-PP-0072-: 1
- BSI-CC-PP-0072-2012: 1
- BSI-PP-0084-2014: 1
- other:
- PP-SSCD-: 3
- PP-SSCD-Part2: 3
- PP-SSCD-Part4: 1
- PP-SSCD-Part5: 1
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL2: 2
- EAL6: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_FLR.1: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 4
|
- Serma:
- SERMA: 2
- Serma Safety & Security: 1
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
|
pdf_data/report_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20190226101714+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20190226101749+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 346821
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 33
|
- /Author: BENARDEAU Christian
- /Category: Version 1.8.9
- /Comments: STMicroelectronics S.r.l
- /Company: SGDSN/ANSSI
- /CreationDate: D:20190115161900+01'00'
- /Creator: Acrobat PDFMaker 11 pour Word
- /Keywords: ANSSI-CC-CER-F-07.28.1
- /ModDate: D:20190115161902+01'00'
- /Producer: Adobe PDF Library 11.0
- /SourceModified: D:20190115151855
- /Subject: J-SIGN version 1.8.9
- /Title: ANSSI-CC-2019/05
- pdf_file_size_bytes: 278824
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
pdf_data/st_filename |
c0623_est.pdf |
anssi-cible-cc-2019_05en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2010/02: 1
- ANSSI-CC-2012/68: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 5
- EAL 4 augmented: 2
- EAL4: 8
- EAL4 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 5
- ADV_FSP.4: 4
- ADV_IMP.1: 4
- ADV_IMP.2: 1
- ADV_INT.3: 1
- ADV_TDS.3: 4
- ADV_TDS.5: 1
- AGD:
- AGD_OPE.1: 4
- AGD_PRE.1: 5
- ALC:
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 1
- ALC_DEL.1: 3
- ALC_DVS.2: 9
- ALC_FLR.1: 1
- ALC_LCD.1: 3
- ALC_TAT.1: 2
- ASE:
- ASE_CCL.1: 3
- ASE_ECD.1: 2
- ASE_INT.1: 3
- ASE_OBJ.2: 2
- ASE_REQ.2: 3
- ASE_SPD.1: 2
- ASE_TSS.1: 3
- ATE:
- ATE_COV.2: 2
- ATE_COV.3: 1
- ATE_DPT.1: 4
- ATE_DPT.3: 1
- ATE_FUN.1: 2
- ATE_FUN.2: 1
- ATE_IND.2: 3
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 15
- FAU_GEN.1: 13
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_STG_EXT: 3
- FAU_STG_EXT.1: 6
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM.1: 40
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.4: 8
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 3
- FCS_CKM_EXT.4: 28
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 98
- FCS_COP.1.1: 6
- FCS_KDF_EXT.1: 4
- FCS_KYC_EXT: 4
- FCS_KYC_EXT.1: 9
- FCS_KYC_EXT.1.1: 3
- FCS_RBG_EXT: 3
- FCS_RBG_EXT.1: 25
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SMC_EXT.1: 4
- FCS_SSH_EXT.1: 6
- FCS_TLS_EXT: 3
- FCS_TLS_EXT.1: 25
- FCS_TLS_EXT.1.1: 2
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DSK_EXT: 3
- FDP_DSK_EXT.1: 9
- FDP_DSK_EXT.1.1: 2
- FDP_DSK_EXT.1.2: 2
- FDP_FXS_EXT: 3
- FDP_FXS_EXT.1: 6
- FDP_FXS_EXT.1.1: 2
- FDP_IFC.1: 1
- FDP_ITC.1: 5
- FDP_ITC.2: 5
- FDP_RIP.1: 8
- FDP_RIP.1.1: 2
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_PMG: 4
- FIA_PMG_EXT: 2
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 4
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA.1: 5
- FMT_MSA.1.1: 1
- FMT_MSA.3: 7
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 15
- FMT_MTD.1.1: 1
- FMT_SMF.1: 17
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_KYP_EXT: 2
- FPT_KYP_EXT.1: 4
- FPT_KYP_EXT.1.1: 1
- FPT_SKP_EXT: 3
- FPT_SKP_EXT.1: 6
- FPT_SKP_EXT.1.1: 2
- FPT_STM: 1
- FPT_STM.1: 6
- FPT_STM.1.1: 1
- FPT_TST_EXT: 3
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 3
- FPT_TUD_EXT.1: 11
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 3
- FTA:
- FTA_SSL.3: 4
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 21
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 16
- FTP_TRP.1.1: 4
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
- FAU:
- FCS:
- FCS_CKM.1: 17
- FCS_CKM.2: 2
- FCS_CKM.4: 12
- FCS_CKM.4.1: 1
- FCS_COP.1: 18
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 31
- FDP_ACC.1: 19
- FDP_ACC.2: 1
- FDP_ACF: 8
- FDP_ACF.1: 19
- FDP_AFC: 13
- FDP_DAU: 7
- FDP_DAU.1: 1
- FDP_DAU.2: 2
- FDP_IFC.1: 11
- FDP_ITC.1: 4
- FDP_ITC.2: 4
- FDP_ITT.1: 1
- FDP_RIP.1: 7
- FDP_RIP.1.1: 1
- FDP_SDI: 14
- FDP_SDI.1: 2
- FDP_SDI.2: 4
- FDP_UIT: 6
- FDP_UIT.1: 2
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 5
- FIA_API.1: 10
- FIA_API.1.1: 2
- FIA_UAU.1: 10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MOF.1: 7
- FMT_MOF.1.1: 1
- FMT_MSA: 14
- FMT_MSA.1: 6
- FMT_MSA.2: 7
- FMT_MSA.2.1: 1
- FMT_MSA.3: 17
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MSA.4: 8
- FMT_MSA.4.1: 1
- FMT_MTD: 13
- FMT_MTD.1: 2
- FMT_SMF.1: 23
- FMT_SMF.1.1: 1
- FMT_SMR.1: 23
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 6
- FPT_EMS.1: 11
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 3
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP.1: 6
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 7
- FPT_PHP.3.1: 1
- FPT_TST: 1
- FPT_TST.1: 10
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FTP:
- FTP_ITC: 21
- FTP_ITC.1: 11
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- O:
- O.ACCESS_CONTROL: 7
- O.ADMIN_ROLES: 4
- O.AUDIT: 4
- O.COMMS_PROTECTION: 11
- O.FAX_NET_SEPARATION: 1
- O.IMAGE_OVERWRITE: 1
- O.KEY_MATERIAL: 1
- O.PURGE_DATA: 3
- O.STORAGE_ENCRYPTION: 6
- O.TSF_SELF_TEST: 1
- O.UPDATE_VERIFICATION: 2
- O.USER_AUTHORIZATION: 7
- OE:
- OE.ADMIN_TRAINING: 1
- OE.ADMIN_TRUST: 1
- OE.NETWORK_PROTECTION: 1
- OE.PHYSICAL_PROTECTION: 1
- OE.USER_TRAINING: 1
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
- A:
- O:
- OE:
- OE.HID_VAD: 3
- OE.HI_VAD: 1
- OT:
- T:
|
pdf_data/st_keywords/vendor |
|
- STMicroelectronics:
- STM: 1
- STMicroelectronics: 24
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 18
- AES-128: 1
- AES-256: 2
- Rijndael:
- constructions:
|
- AES_competition:
- DES:
- 3DES:
- 3-DES: 1
- TDES: 1
- TripleDES: 1
- DES:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 3
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 39
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 5
- TLS v1.2: 2
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Malfunction: 3
- Physical tampering: 3
- fault injection: 1
- physical tampering: 6
- SCA:
- DPA: 1
- Leak-Inherent: 2
- Physical Probing: 2
- SPA: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS PUB 180-3: 1
- FIPS PUB 186-4: 2
- FIPS PUB 197: 2
- FIPS PUB 198-1: 2
- ISO:
- ISO/IEC 10116: 6
- ISO/IEC 18031:2011: 3
- ISO/IEC 18033-3: 3
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-56B: 1
- NIST SP 800-90A: 5
- RFC:
- RFC 2246: 1
- RFC 2818: 4
- RFC 4346: 1
- RFC 5246: 3
|
- BSI:
- CC:
- FIPS:
- FIPS PUB 113: 1
- FIPS PUB 180-1: 1
- ISO:
- ISO/IEC 10116: 4
- ISO/IEC 14443: 2
- ISO/IEC 14443-3: 1
- ISO/IEC 14443-4: 1
- ISO/IEC 14888-3: 1
- ISO/IEC 7816: 14
- ISO/IEC 9797-1: 1
- ISO/IEC 9797-124: 1
- ISO/IEC 9797-128: 1
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20190214145039+09'00'
- /Creator: Word 用 Acrobat PDFMaker 15
- /ModDate: D:20190214145114+09'00'
- /Producer: Adobe PDF Library 15.0
- /Title:
- pdf_file_size_bytes: 595555
- pdf_hyperlinks: http://csrc.nist.gov/archive/aes/katmct/katmct.htm
- pdf_is_encrypted: False
- pdf_number_of_pages: 68
|
- /Author: saverio donatiello
- /CreationDate: D:20180726114106+02'00'
- /Creator: PDFCreator 2.0.0.0
- /Keywords:
- /ModDate: D:20180726114106+02'00'
- /Producer: PDFCreator 2.0.0.0
- /Subject:
- /Title: J-SIGN_EIDAS_Securty_Target_Lite
- pdf_file_size_bytes: 686900
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 68
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |