name |
Data Security Kit (E) Software Type III V1.00E |
Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
FR |
status |
archived |
active |
not_valid_after |
01.10.2015 |
28.03.2027 |
not_valid_before |
28.09.2010 |
31.03.2020 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2020_07-s01.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0271_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_07-fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0271_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_07en.pdf |
manufacturer |
KYOCERA MITA Corporation |
Idemia |
manufacturer_web |
https://www.kyoceramita.com/ |
https://www.idemia.com |
security_level |
EAL3 |
EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst |
9819cf2673cbe519 |
61985466e51db7a4 |
heuristics/cert_id |
JISEC-CC-CRP-C0271 |
ANSSI-CC-2020/07 |
heuristics/cert_lab |
[] |
CEA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ALC_TAT.2, ASE_REQ.2, ASE_CCL.1 |
heuristics/extracted_versions |
1.00 |
9.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2020/58, NSCIB-CC-22-0286910-CR, NSCIB-CC-0286907-CR, ANSSI-CC-2020/56, ANSSI-CC-2020/57, ANSSI-CC-2020/55, ANSSI-CC-2020/59, ANSSI-CC-2022/33 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1110-V2-2019 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2020/58, NSCIB-CC-22-0286910-CR, NSCIB-CC-0286907-CR, ANSSI-CC-2020/56, ANSSI-CC-2020/57, ANSSI-CC-2020/55, ANSSI-CC-2020/59, ANSSI-CC-2022/33 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0945-V3-2018, BSI-DSZ-CC-1110-2019, BSI-DSZ-CC-0945-2017, BSI-DSZ-CC-1110-V2-2019, BSI-DSZ-CC-0945-V2-2018, BSI-DSZ-CC-0891-V2-2016 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0271
- certification_date: 01.09.2010
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0271_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the firmware that controls Multi Function Printer (MFP and henceforth abbreviation) and the ASIC that operates security algorithm after the license of Data Security Kit (E) is applied to the following MFPs that mainly have copy function, scanner function and printer function. - TASKalfa 300i - TASKalfa 300iG - CS 300i - CD 1430/DC 2430 This TOE provides the copy function, the scanner function and the printer function as the basic functions of the MFP by controlling the MFP. In addition, the box function to store the image data is provided. TOE security functionality The TOE provides the following security functions that protect against leakage of the image data stored in HDD during the use of the above-mentioned basic functions. - Image Data Encryption Function - Image Data Overwrite-Erase Function
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: Data Security Kit (E) Software Type III
- product_type: Data protection function in digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0271_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0271_est.pdf
- toe_version: V1.00E
- vendor: KYOCERA MITA Corporation
- expiration_date: 01.10.2015
- supplier: KYOCERA MITA Corporation
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0271_it9268.html
- toe_overseas_name: Data Security Kit (E) Software Type III V1.00E
|
|
heuristics/st_references/directly_referenced_by |
{} |
ANSSI-CC-2020/58, ANSSI-CC-2020/56, ANSSI-CC-2020/57, ANSSI-CC-2020/55, ANSSI-CC-2020/59, ANSSI-CC-2022/33 |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1110-V2-2019 |
heuristics/st_references/indirectly_referenced_by |
{} |
ANSSI-CC-2020/58, ANSSI-CC-2020/56, ANSSI-CC-2020/57, ANSSI-CC-2020/55, ANSSI-CC-2020/59, ANSSI-CC-2022/33 |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1110-V2-2019 |
heuristics/protection_profiles |
{} |
85bef5b6f16c4d33 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf |
pdf_data/cert_filename |
|
certificat-cc-2020_07-s01.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Géraldine Avoué
- /Category: -S01
- /Comments: ANSSI-CC-CER-F-14_v14.6
- /Company: SGDSN
- /CreationDate: D:20220404173043+02'00'
- /Creator: Acrobat PDFMaker 11 pour Word
- /ModDate: D:20220404173044+02'00'
- /Producer: Adobe PDF Library 11.0
- /SourceModified: D:20220404153033
- /Title: ANSSI-CC-2020/07
- pdf_file_size_bytes: 100060
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
c0271_erpt.pdf |
anssi-cc-2020_07-fr.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 5
- cert_id: ANSSI-CC-2020/07
- cert_item: Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32
- cert_item_version: Identification du matériel : 092914
- cert_lab: CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France
- developer: IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Java Card Protection Profile Open Configuration, version 3.0.5 certifié BSI-CC-PP-0099-2017 le 21 décembre 2017
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0271-01: 1
- Certification No. C0271: 1
|
- DE:
- BSI-DSZ-CC-1110-V2-2019: 2
- FR:
- ANSSI-CC-2020/07: 19
- ANSSI-CC-PP-0099-2017: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- ANSSI:
- BSI:
- BSI-CC-PP-0099-2017: 1
- BSI-PP-0084-2014: 1
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL6: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- AGD_ALP: 3
- AGD_OPE: 4
- AGD_PRE: 5
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.CE: 1
- A.LOCATION: 1
- A.NETWORK: 2
- T:
|
|
pdf_data/report_keywords/vendor |
|
- Idemia:
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 1
|
pdf_data/report_keywords/eval_facility |
|
- CEA-LETI:
- CEA - LETI: 1
- CEA-LETI: 1
- CESTI:
- Serma:
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
- FIPS:
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20101215173729+09'00'
- /ModDate: D:20101215173729+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 183890
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 30
|
- /Author: Géraldine Avoué
- /CreationDate: D:20200402164050+02'00'
- /Creator: Writer
- /Keywords: ANSSI-CC-CER-F-07, v29.2
- /Producer: LibreOffice 4.4
- /Subject: Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32
- /Title: ANSSI-CC-2020/07
- pdf_file_size_bytes: 281614
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
pdf_data/st_filename |
c0271_est.pdf |
anssi-cible-cc-2020_07en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1110-V2-2019: 2
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 1
- EAL4 augmented: 1
- EAL5: 9
- EAL5 augmented: 5
- EAL5+: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 6
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_FSP.5: 8
- ADV_IMP.1: 9
- ADV_INT.2: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 4
- ADV_TDS.4: 8
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 8
- AGD_PRE: 7
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 13
- ALC_LCD.1: 3
- ALC_TAT.1: 2
- ALC_TAT.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_DPT.3: 1
- ATE_FUN.1: 6
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 8
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 3
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
|
- FAU:
- FAU_ARP.1: 20
- FAU_ARP.1.1: 1
- FAU_GEN: 1
- FAU_GEN.1: 2
- FAU_SAA.1: 3
- FAU_STG.2: 9
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FCO:
- FCS:
- FCS_CKM: 22
- FCS_CKM.1: 20
- FCS_CKM.1.1: 1
- FCS_CKM.4: 19
- FCS_CKM.4.1: 1
- FCS_COP: 27
- FCS_COP.1: 16
- FCS_COP.1.1: 1
- FCS_RNG: 3
- FCS_RNG.1: 10
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 72
- FDP_ACC.1: 24
- FDP_ACC.2: 13
- FDP_ACF: 59
- FDP_ACF.1: 34
- FDP_IFC: 28
- FDP_IFC.1: 21
- FDP_IFC.2: 2
- FDP_IFF: 22
- FDP_IFF.1: 16
- FDP_ITC: 26
- FDP_ITC.1: 8
- FDP_ITC.2: 14
- FDP_RIP: 131
- FDP_RIP.1: 11
- FDP_ROL: 16
- FDP_ROL.1: 6
- FDP_SDI: 11
- FDP_SDI.2: 2
- FDP_UCT: 10
- FDP_UCT.1: 1
- FDP_UIT: 17
- FDP_UIT.1: 4
- FIA:
- FIA_AFL: 35
- FIA_AFL.1: 8
- FIA_ATD: 10
- FIA_ATD.1: 2
- FIA_UAU: 56
- FIA_UAU.1: 12
- FIA_UAU.4: 2
- FIA_UAU.7: 2
- FIA_UID: 31
- FIA_UID.1: 16
- FIA_UID.2: 1
- FIA_USB: 9
- FIA_USB.1: 3
- FMT:
- FMT_MOF: 7
- FMT_MOF.1: 1
- FMT_MSA: 191
- FMT_MSA.1: 20
- FMT_MSA.2: 5
- FMT_MSA.3: 27
- FMT_MTD: 39
- FMT_MTD.1: 4
- FMT_MTD.2: 2
- FMT_MTD.3: 1
- FMT_SMF: 62
- FMT_SMF.1: 30
- FMT_SMF.1.1: 1
- FMT_SMR: 61
- FMT_SMR.1: 56
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_SMR.2: 6
- FPR:
- FPR_UNO: 16
- FPR_UNO.1: 13
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 45
- FPT_FLS.1: 18
- FPT_FLS.1.1: 2
- FPT_PHP: 7
- FPT_PHP.3: 1
- FPT_RCV: 26
- FPT_RCV.3: 7
- FPT_RCV.4: 1
- FPT_TDC: 9
- FPT_TDC.1: 11
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 1
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FTP:
- FTP_ITC: 16
- FTP_ITC.1: 7
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CE: 4
- A.LOCATION: 5
- A.NETWORK: 5
- O:
- OE:
- OE.CE: 3
- OE.LOCATION: 3
- OE.NETWORK: 3
- T:
|
- A:
- A.APPLET: 5
- A.DELETION: 3
- A.VERIFICATION: 5
- D:
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 3
- D.APP_I_DATA: 4
- D.ARRAY: 3
- D.CONFIG: 4
- D.CRYPTO: 5
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.JCS_KEYS: 7
- D.NB_REMAINTRYGLB: 1
- D.PIN: 7
- D.SEC_DATA: 7
- D.SENSITIVE_DATA: 5
- O:
- O.ALARM: 23
- O.APPLET: 16
- O.CARD_MANAGEMENT: 66
- O.CIPHER: 16
- O.CODE_PKG: 22
- O.DELETION: 14
- O.FIREWALL: 64
- O.GLOBAL_ARRAYS_CONFID: 14
- O.GLOBAL_ARRAYS_INTEG: 10
- O.INSTALL: 17
- O.JAVAOBJECT: 55
- O.KEY-MNGT: 26
- O.LOAD: 20
- O.NATIVE: 14
- O.OBJ-: 1
- O.OBJ-DELETION: 8
- O.OPERATE: 39
- O.PATCH_LOADING: 25
- O.PIN-: 2
- O.PIN-MNGT: 26
- O.REALLOCATION: 18
- O.RESIDENT_APPLICATION: 24
- O.RESOURCES: 23
- O.RNG: 11
- O.SCP: 60
- O.SECURE_COMPARE: 8
- O.SID: 34
- O.TRANSACTION: 19
- OE:
- OE.APPLET: 8
- OE.CARD-: 1
- OE.CARD_MANAGEMENT: 3
- OE.CODE-: 3
- OE.CODE-EVIDENCE: 18
- OE.SCP: 9
- OE.VERIFICATION: 38
- OP:
- OP.ARRAY_AASTORE: 3
- OP.ARRAY_ACCESS: 9
- OP.ARRAY_LENGTH: 3
- OP.CREATE: 7
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.FLOW: 3
- OP.IMPORT_KEY: 2
- OP.INSTANCE_FIELD: 5
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 5
- OP.LOCAL_STACK_ACCESS: 3
- OP.NATIVE_ACCESS: 1
- OP.NATIVE_INTERFACE_CALL: 1
- OP.OPERAND_STACK_ACCESS: 3
- OP.PUT: 6
- OP.PUTFIELD: 1
- OP.PUTSTATIC: 1
- OP.STATIC_FIELD: 3
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- R:
- T:
- T.CONFID-APPLI-DATA: 18
- T.CONFID-JCS-CODE: 6
- T.CONFID-JCS-DATA: 11
- T.CONFIGURATION: 4
- T.CONF_DATA_APPLET: 4
- T.DELETION: 6
- T.EXE-: 1
- T.EXE-CODE: 8
- T.INSTALL: 6
- T.INTEG-: 2
- T.INTEG-APPLI-: 5
- T.INTEG-APPLI-CODE: 11
- T.INTEG-APPLI-DATA: 21
- T.INTEG-JCS-CODE: 6
- T.INTEG-JCS-DATA: 12
- T.NATIVE: 6
- T.OBJ-DELETION: 4
- T.PATCH_LOADING: 4
- T.PHYSICAL: 4
- T.RESOURCES: 8
- T.SID: 18
|
pdf_data/st_keywords/vendor |
|
- Idemia:
- Infineon:
- Infineon: 8
- Infineon Technologies AG: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 4
- SHA-256: 5
- SHA-384: 4
- SHA-512: 3
- SHA256: 1
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 2
- Key agreement: 1
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- fault injection: 1
- malfunction: 2
- physical tampering: 2
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 4
- timing attack: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- FIPS:
- FIPS 140-2: 1
- FIPS 198: 1
- FIPS PUB 180-3: 2
- FIPS PUB 197: 6
- FIPS PUB 46-3: 3
- FIPS PUB 81: 8
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816: 2
- ISO/IEC 9796-1: 2
- ISO/IEC 9797: 12
- ISO/IEC 9797-1: 1
- NIST:
- PKCS:
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- com:
- com.oberthurcs.javacard: 2
- com.oberthurcs.javacard.sac.sac: 1
- javacard:
- javacard.framework: 4
- javacard.sac.sac: 1
- javacard.security: 3
- javacardx:
- javacardx.crypto: 2
- javacardx.framework.util: 1
- javacardx.security: 1
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: KYOCERA MITA Corporation
- /CreationDate: D:20101129105537+09'00'
- /Creator: CubePDF
- /ModDate: D:20101129105537+09'00'
- /Producer: CubePDF
- /Title: Data Security Kit (E) Software Type III Overseas Security Target
- pdf_file_size_bytes: 326068
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 33
|
- /Author: [email protected]
- /CreationDate: D:20200228163658+01'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20200228163658+01'00'
- /Producer: Microsoft® Word 2016
- /Title: Title
- pdf_file_size_bytes: 2862110
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 150
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |