Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Canon imageRUNNER ADVANCE C5200 Series 2600.1 model 1.3
JISEC-CC-CRP-C0447
J3E081_M64, J3E081_M66, J2E081_M64, J3E041_M66, J3E016_M66, J3E016_M64, J3E041_M64 Secure Smart Card Controller Revision 3
NSCIB-CC-13-37761-CR2
name Canon imageRUNNER ADVANCE C5200 Series 2600.1 model 1.3 J3E081_M64, J3E081_M66, J2E081_M64, J3E041_M66, J3E016_M66, J3E016_M64, J3E041_M64 Secure Smart Card Controller Revision 3
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP NL
not_valid_after 02.12.2019 05.08.2018
not_valid_before 27.11.2014 26.08.2014
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0447_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CR]%20NSCIB-CC-13-37761-CR2.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0447_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_Lite_JxE081_v00.02.pdf
manufacturer Canon Inc. NXP Semiconductors Germany GmbH Business Line Identification
manufacturer_web https://www.canon.com/ https://www.nxp.com
security_level EAL3+, ALC_FLR.2 ALC_DVS.2, EAL5+, ASE_TSS.2, AVA_VAN.5
dgst 9f19da4daef5570e ef5701cc183f2e46
heuristics/cert_id JISEC-CC-CRP-C0447 NSCIB-CC-13-37761-CR2
heuristics/cert_lab []
heuristics/cpe_matches {} cpe:2.3:h:nxp:j3e081_m64:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e016_m66:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e016_m64:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e041_m64:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e041_m66:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e081_m66:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j2e081_m64:-:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2021-3011
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ASE_TSS.2, ADV_TDS.4, ASE_REQ.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 1.3, 2600.1 3
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0825-2017, BSI-DSZ-CC-0821-2014
heuristics/report_references/directly_referencing {} NSCIB-CC-13-37762-CR, BSI-DSZ-CC-0633-V2-2014
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0825-2017, BSI-DSZ-CC-0821-2014
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0633-V2-2014, BSI-DSZ-CC-0857-2013, BSI-DSZ-CC-0707-2012, BSI-DSZ-CC-0555-2009, NSCIB-CC-13-37762-CR
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0447
  • certification_date: 01.11.2014
  • claim: EAL3+ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL3 Augmented with ALC_FLR.2
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0447_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP. TOE security functionality The TOE embodies the following security functions. - User Authentication Function Function for identifying and authenticating the user. - Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user. - Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. - Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN. - HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data. - HDD Data Encryption Function Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP. - LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device. - Self-Test Function Function for testing the integrity of the executable code at startup. - Audit Log Function Function for generating audit logs on security events and allowing them to be viewed by the administrator. - Management Function Function for restricting device settings that influence security to be made only by the administrator.
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
    • product: Canon imageRUNNER ADVANCE C5200 Series 2600.1 model
    • product_type: Multifunction Product
    • protection_profile: IEEE Std 2600.1™-2009
    • report_link: https://www.ipa.go.jp/en/security/c0447_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0447_est.pdf
    • toe_version: 1.3
    • vendor: Canon Inc.
  • expiration_date: 01.12.2019
  • revalidations: [frozendict({'date': '2015-12', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0447_it4516_01.html'})]
  • supplier: Canon Inc.
  • toe_japan_name: Canon imageRUNNER ADVANCE C5200 Series 2600.1 model1.3
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0447_it4516.html
  • toe_overseas_name: Canon imageRUNNER ADVANCE C5900KB/C5200 Series 2600.1 model1.4
heuristics/st_references/directly_referenced_by {} BSI-DSZ-CC-0825-2017, BSI-DSZ-CC-0821-2014
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0857-2013
heuristics/st_references/indirectly_referenced_by {} BSI-DSZ-CC-0825-2017, BSI-DSZ-CC-0821-2014
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0857-2013
heuristics/protection_profiles 32475ccb695b1644 85bef5b6f16c4d33
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf
pdf_data/report_filename c0447_erpt.pdf [CR] NSCIB-CC-13-37761-CR2.pdf
pdf_data/report_frontpage
  • NL:
  • NL:
    • cert_id: NSCIB-CC-13-37761-CR2
    • cert_item: NXP J3E081_M64, J3E081_M66, J2E081_M64, J3E041_M66, J3E016_M66, J3E016_M64, and J3E041_M64 Secure Smart Card Controller Revision 3
    • cert_lab: Brightsight
    • developer: NXP Semiconductors Germany GmbH
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0447-01: 1
    • Certification No. C0447: 1
  • DE:
    • BSI-DSZ-CC-0633-V2-: 1
    • BSI-DSZ-CC-0633-V2-2014: 1
    • BSI-DSZ-CC-0857: 2
    • BSI-DSZ-CC-0857-: 1
    • BSI-DSZ-CC-783: 1
    • BSI-DSZ-CC-784: 1
    • BSI-DSZ-CC-860: 1
  • NL:
    • CC-0857: 1
    • NSCIB-CC-13-37760: 1
    • NSCIB-CC-13-37761: 4
    • NSCIB-CC-13-37761-CR2: 14
    • NSCIB-CC-13-37762: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 4
    • EAL3 augmented: 2
  • EAL:
    • EAL4: 2
    • EAL5: 2
    • EAL5 augmented: 2
    • EAL5+: 3
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.5: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 3
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.2: 3
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 3
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 2
    • T.DOC: 2
    • T.FUNC: 1
    • T.PROT: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • NXP:
    • NXP: 19
    • NXP Semiconductors: 4
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 5
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • 3DES: 2
      • Triple-DES: 1
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • CBC-MAC: 1
      • CMAC: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 5
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 8
pdf_data/report_keywords/randomness
  • PRNG:
    • PRNG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 1
pdf_data/report_keywords/crypto_engine
  • SmartMX:
    • SmartMX: 3
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • DFA: 2
  • SCA:
    • DPA: 1
    • SPA: 1
    • timing attacks: 1
  • other:
    • JIL: 5
    • JIL-AM: 1
pdf_data/report_keywords/os_name
  • JCOP:
    • JCOP 2: 9
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • FIPS:
    • FIPS PUB 186-2: 1
  • BSI:
    • AIS36: 2
  • ICAO:
    • ICAO: 1
  • SCP:
    • SCP01: 2
    • SCP02: 2
    • SCP03: 2
pdf_data/report_keywords/javacard_version
  • GlobalPlatform:
    • Global Platform 2.2.1: 3
  • JavaCard:
    • Java Card 3.0.1: 3
pdf_data/report_metadata
  • /CreationDate: D:20160112164043+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20160112164226+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 330024
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 37
pdf_data/st_filename c0447_est.pdf ST_Lite_JxE081_v00.02.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0633-: 1
    • BSI-DSZ-CC-0857: 1
    • BSI-DSZ-CC-0857-2013: 1
    • BSI-DSZ-CC-0858: 1
  • NL:
    • NSCIB-CC-13-37761: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0017: 2
    • BSI-PP-0035: 2
    • BSI-PP-0035-2007: 1
    • BSI-PP-0035-2007“: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 3: 2
    • EAL 3 augmented: 1
    • EAL3: 9
    • EAL3 augmented: 8
  • EAL:
    • EAL 5: 1
    • EAL 5 augmented: 1
    • EAL5: 19
    • EAL5 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 12
    • ALC_LCD.1: 1
  • APE:
    • APE_ECD: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 4
    • AGD_PRE: 1
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 7
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 1
    • ASE_ECD: 2
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ: 2
    • ASE_REQ.2: 1
    • ASE_SPD: 2
    • ASE_SPD.1: 1
    • ASE_TSS: 2
    • ASE_TSS.1: 3
    • ASE_TSS.2: 5
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.4: 3
    • AVA_VAN.5: 6
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 13
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 8
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 8
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 6
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 24
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 13
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 12
    • FCS_COP.1: 25
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC.1: 53
    • FDP_ACC.1.1: 4
    • FDP_ACF.1: 40
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_IFC: 1
    • FDP_IFC.1: 4
    • FDP_IFF: 1
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 13
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 7
    • FIA_UID.1: 22
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 23
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 25
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 18
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 25
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 33
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_CIP_EXP: 2
    • FPT_CIP_EXP.1: 16
    • FPT_CIP_EXP.1.1: 2
    • FPT_CIP_EXP.1.2: 3
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_PHP.1: 6
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 15
    • FTA_SSL.3.1: 2
  • FTP:
    • FTP_ITC.1: 12
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_ARP.1: 29
    • FAU_ARP.1.1: 1
    • FAU_GEN: 1
    • FAU_SAA.1: 2
    • FAU_SAS: 13
    • FAU_SAS.1: 5
    • FAU_SAS.1.1: 1
  • FCO:
    • FCO_NRO: 7
    • FCO_NRO.2: 3
  • FCS:
    • FCS_CKM.1: 47
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 10
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 8
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 42
    • FCS_CKM.4.1: 1
    • FCS_COP: 33
    • FCS_COP.1: 26
    • FCS_RNG: 13
    • FCS_RNG.1: 20
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 72
    • FDP_ACC.1: 19
    • FDP_ACC.2: 9
    • FDP_ACF: 65
    • FDP_ACF.1: 39
    • FDP_IFC: 26
    • FDP_IFC.1: 17
    • FDP_IFC.2: 2
    • FDP_IFF: 19
    • FDP_IFF.1: 13
    • FDP_ITC: 10
    • FDP_ITC.1: 17
    • FDP_ITC.2: 22
    • FDP_RIP: 91
    • FDP_RIP.1: 10
    • FDP_ROL: 11
    • FDP_ROL.1: 5
    • FDP_SDI.2: 8
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UIT: 7
    • FDP_UIT.1: 2
  • FIA:
    • FIA_AFL: 12
    • FIA_AFL.1: 2
    • FIA_ATD: 9
    • FIA_ATD.1: 2
    • FIA_UAU.1: 3
    • FIA_UID: 18
    • FIA_UID.1: 11
    • FIA_UID.2: 1
    • FIA_USB: 8
    • FIA_USB.1: 3
  • FMT:
    • FMT_MSA: 146
    • FMT_MSA.1: 16
    • FMT_MSA.2: 3
    • FMT_MSA.3: 27
    • FMT_MTD: 18
    • FMT_MTD.1: 2
    • FMT_MTD.3: 1
    • FMT_REV: 1
    • FMT_SMF: 42
    • FMT_SMF.1: 24
    • FMT_SMF.1.1: 1
    • FMT_SMR: 35
    • FMT_SMR.1: 34
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 9
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS: 40
    • FPT_FLS.1: 25
    • FPT_FLS.1.1: 1
    • FPT_ITC.1: 1
    • FPT_PHP: 6
    • FPT_PHP.3: 3
    • FPT_RCV: 10
    • FPT_RCV.3: 4
    • FPT_TDC.1: 7
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
  • FRU:
    • FRU_FLT: 11
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 18
    • FTP_ITC.1: 6
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 3
    • A.ADMIN: 6
    • A.USER: 3
  • D:
    • D.CONF: 8
    • D.DOC: 16
    • D.FUNC: 11
    • D.PROT: 6
  • O:
    • O.AUDIT: 7
    • O.CONF: 16
    • O.DOC: 16
    • O.FUNC: 8
    • O.HDD: 8
    • O.INTERFACE: 8
    • O.PROT: 8
    • O.SOFTWARE: 7
    • O.USER: 14
  • OE:
    • OE.ADMIN: 8
    • OE.AUDIT: 4
    • OE.AUDIT_ACCESS: 4
    • OE.AUDIT_STORAGE: 4
    • OE.INTERFACE: 4
    • OE.PHYISCAL: 2
    • OE.PHYSICAL: 2
    • OE.USER: 14
  • T:
    • T.CONF: 6
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
  • A:
    • A.APPLET: 4
    • A.NATIVE: 1
    • A.PPROCESS-SEC-IC: 1
    • A.PROCESS-SEC-IC: 1
    • A.PROCESS_SEC_IC: 2
    • A.USE_DIAG: 6
    • A.USE_KEY: 1
    • A.USE_KEYS: 5
    • A.VERIFICATION: 3
  • D:
    • D.ADMIN_CONF_DATA: 3
    • D.API_DATA: 3
    • D.APP_CODE: 10
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 8
    • D.APP_KEY: 1
    • D.CRYPTO: 7
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.PERSO_CONF_DATA: 4
    • D.PIN: 12
    • D.SEC_DATA: 7
  • O:
    • O.APPLET: 18
    • O.CIPHER: 1
    • O.CODE_: 1
    • O.CODE_PKG: 13
    • O.EXT-MEM: 1
    • O.EXT_MEM_IN: 2
    • O.EXT_MEM_INSTANCE: 8
    • O.JAVAOBJECT: 36
    • O.NON_SB_CONTENT: 1
    • O.NON_SB_SFR: 4
    • O.REMOTE_MTHD: 4
    • O.REMOTE_OBJ: 4
    • O.RMI_SERVICE: 5
    • O.ROR: 2
    • O.SB_CONTENT: 3
    • O.SB_SFR: 5
    • O.SCP: 1
  • OE:
    • OE.APPLET: 7
    • OE.CARD-MANAGEMENT: 1
    • OE.NATIVE: 1
    • OE.PROCESS_SEC_IC: 6
    • OE.SCP: 2
    • OE.USE_DIAG: 9
    • OE.USE_KEYS: 7
    • OE.VERIFICATION: 20
    • OE.XYZ: 1
  • OP:
    • OP.ARRAY_ACCESS: 4
    • OP.CREATE: 7
    • OP.CREATE_EXT_MEM_INSTANCE: 3
    • OP.DELETE_APPLET: 4
    • OP.DELETE_PCKG: 3
    • OP.DELETE_PCKG_APPLET: 3
    • OP.GET_ROR: 2
    • OP.INSTANCE_FIELD: 4
    • OP.INVK_INTERFACE: 6
    • OP.INVK_VIRTUAL: 5
    • OP.INVOKE: 3
    • OP.JAVA: 5
    • OP.PUT: 6
    • OP.READ_EXT_MEM: 3
    • OP.RET_RORD: 2
    • OP.SB_ACCESS: 3
    • OP.SB_ACCESS_SFR: 3
    • OP.THROW: 4
    • OP.TYPE_ACCESS: 4
    • OP.WRITE_EXT_MEM: 3
  • OSP:
    • OSP.PROCESS-TOE: 5
    • OSP.VERIFICATION: 3
  • OT:
    • OT.ALARM: 15
    • OT.CARD-: 2
    • OT.CARD-MANAGEMENT: 17
    • OT.CIPHER: 11
    • OT.DELETION: 7
    • OT.EXT-MEM: 14
    • OT.FIREWALL: 18
    • OT.GLOBAL_ARRAYS_CONFID: 9
    • OT.GLOBAL_ARRAYS_INTEG: 10
    • OT.IDENTIFICATION: 9
    • OT.INSTALL: 10
    • OT.KEY-: 1
    • OT.KEY-MNGT: 9
    • OT.LOAD: 9
    • OT.MF_FW: 8
    • OT.NATIVE: 9
    • OT.OBJ-DELETION: 8
    • OT.OPERATE: 21
    • OT.PIN-MNGT: 11
    • OT.REALLOCATION: 9
    • OT.REMOTE: 8
    • OT.RESOURCES: 10
    • OT.RND: 13
    • OT.SCP: 40
    • OT.SEC_BOX_FW: 10
    • OT.SID: 13
    • OT.TRANSACTION: 9
    • OT.VERIFICATION: 1
    • OT.XYZ: 1
  • R:
    • R.JAVA: 12
  • T:
    • T.CONFID-APPLI-DATA: 5
    • T.CONFID-JCS-CODE: 5
    • T.CONFID-JCS-DATA: 5
    • T.DELETION: 4
    • T.EXE-CODE: 8
    • T.EXE-CODE-REMOTE: 4
    • T.INSTALL: 4
    • T.INTEG-APPLI-: 2
    • T.INTEG-APPLI-CODE: 8
    • T.INTEG-APPLI-DATA: 8
    • T.INTEG-JCS-CODE: 5
    • T.INTEG-JCS-DATA: 5
    • T.NATIVE: 5
    • T.OBJ-DELETION: 4
    • T.OS_OPERATE: 7
    • T.PHYSICAL: 4
    • T.RESOURCES: 4
    • T.RND: 7
    • T.SEC_BOX_BORDER: 7
    • T.SID: 8
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
    • Microsoft Corporation: 1
  • NXP:
    • NXP: 23
    • NXP Semiconductors: 18
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • 3DES:
      • 3DES: 1
  • AES_competition:
    • AES:
      • AES: 24
  • DES:
    • 3DES:
      • 3DES: 1
      • TDEA: 1
      • TDES: 2
      • Triple-DES: 7
      • TripleDES: 1
    • DES:
      • DES: 17
  • constructions:
    • MAC:
      • CBC-MAC: 7
      • CMAC: 5
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 2
  • FF:
    • DH:
      • DH: 2
  • ECC:
    • ECC:
      • ECC: 19
    • ECDSA:
      • ECDSA: 3
  • FF:
    • DH:
      • Diffie-Hellman: 6
  • RSA:
    • RSA-CRT: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
  • SHA:
    • SHA1:
      • SHA-1: 13
    • SHA2:
      • SHA-2: 3
      • SHA-224: 8
      • SHA-256: 14
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 12
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 21
    • RNG: 17
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 24
  • ECB:
    • ECB: 5
pdf_data/st_keywords/crypto_engine
  • SmartMX:
    • SmartMX: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
    • physical tampering: 4
  • FI:
    • DFA: 7
    • Fault Injection: 1
    • Physical tampering: 3
    • fault injection: 1
    • malfunction: 5
    • physical tampering: 1
  • SCA:
    • DPA: 10
    • SPA: 2
    • physical probing: 3
    • side channel: 17
    • side-channel: 1
    • side-channels: 2
    • timing attack: 1
    • timing attacks: 6
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-02102: 2
pdf_data/st_keywords/os_name
  • JCOP:
    • JCOP 2: 142
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 186-2: 4
    • FIPS PUB 197: 3
    • FIPS PUB 46-3: 1
  • BSI:
    • AIS 20: 8
    • AIS31: 2
  • CC:
    • CCMB-2012-09-004: 2
  • FIPS:
    • FIPS 180-3: 6
    • FIPS 186-3: 5
    • FIPS 197: 2
    • FIPS PUB 180-3: 1
    • FIPS PUB 186-2: 1
    • FIPS PUB 186-3: 1
    • FIPS PUB 81: 1
  • ICAO:
    • ICAO: 4
  • ISO:
    • ISO/IEC 11770: 2
    • ISO/IEC 15946-1: 1
    • ISO/IEC 9796-: 1
  • NIST:
    • NIST SP 800-67: 1
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 2
    • PKCS#3: 2
    • PKCS1: 1
  • RFC:
    • RFC 5639: 2
  • SCP:
    • SCP01: 1
    • SCP02: 1
    • SCP03: 2
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • Global Platform 2.2.1: 1
    • GlobalPlatform 2.2.1: 2
  • JavaCard:
    • Java Card 3.0.1: 4
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
    • java.rmi: 2
  • javacard:
    • javacard.framework: 4
    • javacard.framework.applet: 1
    • javacard.security: 4
  • javacardx:
    • javacardx.crypto: 2
    • javacardx.rmi: 1
    • javacardx.security: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Groups marked with ‘IT’ are considered in the TOE IT environment, and groups marked with ‘—‘ are out of scope of this evaluation. Table 8. TOE Groups Overview Group Description Scope Core (CoreG) The CoreG: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives OT.SCP.RECOVERY and OT.SCP.SUPPORT are: 1
    • out of scope: 2
pdf_data/st_metadata
  • /Author: Canon Inc.
  • /CreationDate: D:20151224205603+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /Keywords:
  • /ModDate: D:20151224205606+09'00'
  • /Producer: Adobe LiveCycle PDFGenerator
  • /Subject:
  • /Title: Canon imageRUNNER ADVANCE C5200 Series 2600.1 model Security Target
  • pdf_file_size_bytes: 832222
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 66
  • /Author: NXP Semiconductors
  • /CreationDate: D:20140814171823+02'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: JCOP, Security Target Lite, EAL5+
  • /ModDate: D:20140814173505+02'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: NXP J3E081_M64, J3E081_M66, J2E081_M64, J3E041_M66, J3E016_M66, J3E016_M64, J3E041_M64 Secure Smart Card Controller Revision 3
  • /Title: Security Target Lite
  • pdf_file_size_bytes: 1527330
  • pdf_hyperlinks: http://www.nxp.com/, mailto:[email protected]
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 137
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different