Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
bizhub C368/bizhub C308/bizhub C258/bizhub C236DN/bizhub C230DN/bizhub C225DN/ineo+ 368/ineo+ 308/ineo+ 258 G00-83
JISEC-CC-CRP-C0511
NXP J3A081, J2A081 and J3A041 Secure Smart Card Controller Revision 3
BSI-DSZ-CC-0675-2011
name bizhub C368/bizhub C308/bizhub C258/bizhub C236DN/bizhub C230DN/bizhub C225DN/ineo+ 368/ineo+ 308/ineo+ 258 G00-83 NXP J3A081, J2A081 and J3A041 Secure Smart Card Controller Revision 3
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP DE
not_valid_after 30.05.2021 01.09.2019
not_valid_before 30.05.2016 06.04.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0511_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0675a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0511_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0675b_pdf.pdf
manufacturer KONICA MINOLTA, INC. NXP Semiconductors Germany GmbH Business Line Identification
manufacturer_web https://www.konicaminolta.com/index.html https://www.nxp.com
security_level EAL2+, ALC_FLR.2 ALC_DVS.2, EAL5+, AVA_VAN.5
dgst a19ce5fb24c2e668 cabd9ee16cc158db
heuristics/cert_id JISEC-CC-CRP-C0511 BSI-DSZ-CC-0675-2011
heuristics/cert_lab [] BSI
heuristics/cpe_matches cpe:2.3:h:konicaminolta:bizhub_c368:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c308:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c258:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_308:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_368:-:*:*:*:*:*:*:* cpe:2.3:h:nxp:j2a081:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3a041:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:3a081:-:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2021-3011
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, APE_REQ.2, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, APE_INT.1, APE_SPD.1, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1
heuristics/extracted_versions 368, 308, 258, 83 3
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0745-2012, BSI-DSZ-CC-0731-2011, BSI-DSZ-CC-0747-2011, BSI-DSZ-CC-0812-2012, BSI-DSZ-CC-0746-2012, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0748-2011, BSI-DSZ-CC-0799-2012
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0633-2010, BSI-DSZ-CC-0674-2011
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0743-2011, BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0745-2012, BSI-DSZ-CC-0731-2011, BSI-DSZ-CC-0747-2011, BSI-DSZ-CC-0742-2011, BSI-DSZ-CC-0812-2012, BSI-DSZ-CC-0746-2012, BSI-DSZ-CC-0741-2011, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0748-2011, BSI-DSZ-CC-0744-2011, BSI-DSZ-CC-0799-2012
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0709-2010, BSI-DSZ-CC-0633-2010, BSI-DSZ-CC-0608-2010, BSI-DSZ-CC-0417-2008, BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0674-2011, BSI-DSZ-CC-0410-2007
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0511
  • certification_date: 01.05.2016
  • claim: EAL2+ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.2
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0511_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is an MFP (Multi-Function Printer) that offers Copy, Scan, Print, Fax, and Document storage and retrieval functions. The TOE provides security functions that conform to U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std 2600.2™-2009) which is the MFP security requirement specification, to prevent unauthorized disclosure and alteration of user’s document data. TOE Security functions The TOE provides the following security functions. - Identification and authentication Function to identify and authenticate users. - User restriction control function Function to restrict available functions of users and to control the access to document data other than accumulated documents only to the authorized users. - Accumulated documents access control function Function to control the access to accumulated documents only to the authorized users. - HDD encryption function Function to encrypt the data that is stored in HDD. - Residual information deletion function Function to overwrite and delete the data stored in HDD, so that they cannot be reused. - Audit log function Function to record audit log related to security functions. - Network communication protection function Function to encrypt communication data on the LAN. - Self-test function Function to verify the integrity of executable codes of HDD encryption function and security functions. - Security management function Function to control the management of security functions only to the authorized users. - External interface separation function Function to prevent unauthorized transfer to LAN from external interface like public phone etc.
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
    • product: bizhub C368/bizhub C308/bizhub C258/bizhub C236DN/bizhub C230DN/bizhub C225DN/ineo+ 368/ineo+ 308/ineo+ 258
    • product_type: Multi-Function Printer
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/c0511_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0511_est.pdf
    • toe_version: G00-83
    • vendor: KONICA MINOLTA, INC.
  • expiration_date: 01.06.2021
  • revalidations: [frozendict({'date': '2017-01', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0511_it5553_01.html'})]
  • supplier: KONICA MINOLTA,INC.
  • toe_japan_name: bizhub C368/bizhub C308/bizhub C258/bizhub C236DN/bizhub C230DN/bizhub C225DN/ineo+ 368/ineo+ 308/ineo+ 258G00-83
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0511_it5553.html
  • toe_overseas_name: bizhub C368/bizhub C308/bizhub C258/bizhub C236DN/bizhub C230DN/bizhub C225DN/ineo+ 368/ineo+ 308/ineo+ 258/Sindoh D422/Sindoh D421/Sindoh D420/Sindoh CM3091/Sindoh CM3031/Sindoh CM2071 G00-83
heuristics/st_references/directly_referenced_by {} BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0745-2012, BSI-DSZ-CC-0747-2011, BSI-DSZ-CC-0812-2012, BSI-DSZ-CC-0746-2012, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0748-2011, BSI-DSZ-CC-0799-2012
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0555-2009
heuristics/st_references/indirectly_referenced_by {} BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0745-2012, BSI-DSZ-CC-0747-2011, BSI-DSZ-CC-0812-2012, BSI-DSZ-CC-0746-2012, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0748-2011, BSI-DSZ-CC-0799-2012
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0555-2009
heuristics/protection_profiles 43ce79b420f23a00 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf {}
pdf_data/report_filename c0511_erpt.pdf 0675a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0675-2011
    • cert_item: NXP J3A081, J2A081 and J3A041 Secure Smart Card Controller Revision 3
    • cert_lab: BSI
    • developer: NXP Semiconductors Germany GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0511-01: 1
    • Certification No. C0511: 1
  • DE:
    • BSI-DSZ-CC-0555-2009: 2
    • BSI-DSZ-CC-0633-2010: 5
    • BSI-DSZ-CC-0674-2011: 2
    • BSI-DSZ-CC-0675-2011: 24
  • NL:
    • CC-0555-2009: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 3
  • EAL:
    • EAL 4: 5
    • EAL 5: 4
    • EAL 5 augmented: 3
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 8
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 4
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 2
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 2
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 2
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 7
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 3
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 2
    • ATE_DPT.4: 1
    • ATE_FUN: 3
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 3
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 4
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 4
    • T.DOC: 4
    • T.FUNC: 2
    • T.PROT: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 3
  • NXP:
    • NXP: 22
    • NXP Semiconductors: 20
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • TUV:
    • TÜV Informationstechnik: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • DES:
      • DES: 5
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-224: 2
      • SHA-256: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 3
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/report_keywords/crypto_engine
  • SmartMX:
    • SmartMX: 1
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • DPA: 1
    • SPA: 1
  • other:
    • JIL: 5
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • BSI:
    • AIS 20: 2
    • AIS 25: 2
    • AIS 26: 2
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 3
    • AIS 36: 3
    • AIS 38: 1
    • AIS36: 1
  • FIPS:
    • FIPS 180-1: 3
    • FIPS 197: 1
    • FIPS 46-3: 2
  • PKCS:
    • PKCS#1: 3
pdf_data/report_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 3
  • JavaCard:
    • Java Card 2.2.2: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • / P5CD041V1A / P5CD021V1A / P5CD016V1A, BSI-DSZ-CC-0633-2010, Version 2.0, 11.11.2010, Brightsight (confidential document) [18] Certification Report BSI-DSZ-CC-0555-2009 for NXP Smart Card Controller P5CD081V1A and its: 1
    • Card Controller Rev. 3, BSI-DSZ-CC-0675-2011, Version 4, 06.04.2011, TÜV Informationstechnik GmbH (confidential document) 10 specifically • AIS 20, Version 1, 2. December 1999, Funktionalitätsklassen und: 1
    • J2A081 and J3A041 Secure Smart Card Controller Revision 3 – Security Target, NXP Semiconductors (confidential document) [7] Java Card System - Minimal Configuration Protection Profile, Version 1.1, May 2006, part of: 1
    • J3A095 J3A080 J3A081 J3A040 J3A041 v2.4.1 R3 Secure Smart Card Controller, NXP Semiconductors (confidential document) [12] Guidance documentation for the TOE, Revision 3.0, 09.03.2011, JCOP V2.4.1 Secure Smart Card: 1
    • NXP J3A081, J2A081 and J3A041 Secure Smart Card Controller Rev. 3, TÜV Informationstechnik GmbH (confidential document) [10] ETR for composition according to AIS 36 for the Product NXP J3A081, J2A081 and J3A041 Secure: 1
pdf_data/report_metadata
  • /CreationDate: D:20160609164313+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20160609164839+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 499121
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 37
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20110414105710+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, NXP Semiconductors Germany GmbH, NXP J3A081, J2A081 and J3A041 Secure Smart Card Controller Revision 3, Smartcard mit Java Card Plattform, CC"
  • /ModDate: D:20110414105851+02'00'
  • /Producer: OpenOffice.org 3.2
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0675-2011
  • pdf_file_size_bytes: 997076
  • pdf_hyperlinks: http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 40
pdf_data/st_filename c0511_est.pdf 0675b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0555-2009: 1
    • BSI-DSZ-CC-0633: 3
    • BSI-DSZ-CC-0675: 2
    • BSI-DSZ-CC-555: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002: 1
    • BSI-PP-0002-2001: 1
    • BSI-PP-0017: 3
    • BSI-PP-0035: 3
    • BSI-PP-0035-2007: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
    • EAL 2 augmented: 1
    • EAL2: 2
    • EAL2 augmented: 1
  • EAL:
    • EAL 5: 2
    • EAL 5 augmented: 1
    • EAL5: 17
    • EAL5 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 5
  • APE:
    • APE_ECD: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC: 3
    • ADV_ARC.1: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_OPE.1: 3
    • AGD_PRE: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 10
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 1
    • ASE_ECD: 2
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 1
    • ASE_OBJ: 2
    • ASE_OBJ.2: 1
    • ASE_REQ: 2
    • ASE_REQ.2: 1
    • ASE_SPD: 2
    • ASE_SPD.1: 1
    • ASE_TSS: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.4: 3
    • AVA_VAN.5: 9
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 10
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 2
    • FAU_STG.4: 13
    • FAU_STG.4.1: 2
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 4
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 23
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 18
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC: 1
    • FDP_IFC.1: 2
    • FDP_IFF: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 18
    • FIA_SOS.1.1: 2
    • FIA_UAU.1: 11
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 20
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 14
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 21
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 9
    • FMT_MTD.1.1: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 20
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 25
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 10
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 7
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 9
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_ARP: 18
    • FAU_ARP.1: 1
    • FAU_GEN: 1
    • FAU_GEN.1: 5
    • FAU_SAA.1: 20
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAS: 10
    • FAU_SAS.1: 10
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM.1: 18
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 8
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 4
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 11
    • FCS_CKM.4.1: 1
    • FCS_COP: 52
    • FCS_COP.1: 28
    • FCS_COP.1.1: 14
    • FCS_LIM.1: 1
    • FCS_LIM.2: 1
    • FCS_RND.1: 2
    • FCS_RND.2: 1
    • FCS_RNG: 3
    • FCS_RNG.1: 15
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 24
    • FDP_ACC.1: 10
    • FDP_ACC.2: 4
    • FDP_ACF: 20
    • FDP_ACF.1: 21
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ETC.1: 5
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_IFC: 17
    • FDP_IFC.1: 18
    • FDP_IFF: 5
    • FDP_IFF.1: 11
    • FDP_ITC.1: 9
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 4
    • FDP_ITT: 9
    • FDP_ITT.1: 8
    • FDP_RIP: 10
    • FDP_RIP.1: 15
    • FDP_ROL: 5
    • FDP_ROL.1: 5
    • FDP_SDI.2: 5
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_AFL: 6
    • FIA_AFL.1: 7
    • FIA_ATD: 4
    • FIA_ATD.1: 2
    • FIA_UAU: 10
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.3: 2
    • FIA_UAU.4: 1
    • FIA_UID: 13
    • FIA_UID.1: 2
    • FIA_UID.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_LIM: 7
    • FMT_LIM.1: 22
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 19
    • FMT_LIM.2.1: 2
    • FMT_MSA: 41
    • FMT_MSA.1: 10
    • FMT_MSA.2: 3
    • FMT_MSA.3: 12
    • FMT_MTD: 6
    • FMT_MTD.1: 1
    • FMT_MTD.3: 5
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 13
    • FMT_SMF.1.1: 1
    • FMT_SMR: 20
    • FMT_SMR.1: 6
  • FPR:
    • FPR_UNO.1: 5
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_AMT.1: 3
    • FPT_FLS: 25
    • FPT_FLS.1: 9
    • FPT_ITT: 9
    • FPT_ITT.1: 9
    • FPT_PHP: 7
    • FPT_PHP.1: 7
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 5
    • FPT_RCV: 6
    • FPT_RCV.3: 8
    • FPT_RCV.4: 2
    • FPT_RVM.1: 6
    • FPT_SEP.1: 7
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_TDC.1: 5
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST.2: 2
  • FRU:
    • FRU_FLT: 6
    • FRU_FLT.1: 1
    • FRU_FLT.2: 8
  • FTP:
    • FTP_ITC: 5
    • FTP_ITC.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 3
    • A.ADMIN: 6
    • A.USER: 3
  • D:
    • D.CONF: 7
    • D.DOC: 37
    • D.FUNC: 21
    • D.PROT: 8
  • O:
    • O.AUDIT: 6
    • O.CONF: 12
    • O.DOC: 13
    • O.FUNC: 6
    • O.HDD: 9
    • O.INTERFACE: 6
    • O.PROT: 6
    • O.SOFTWARE: 6
    • O.USER: 11
    • O.USER_AUTHORIZED: 1
  • OE:
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 3
    • OE.AUDIT_STORAGE: 3
    • OE.INTERFACE: 3
    • OE.PHYISCAL: 1
    • OE.PHYSICAL: 2
    • OE.USER: 12
  • T:
    • T.CONF: 6
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
  • A:
    • A.NATIVE: 7
    • A.NO-: 2
    • A.NO-DELETION: 6
    • A.NO-INSTALL: 5
    • A.USE_DIAG: 6
    • A.USE_KEY: 1
    • A.USE_KEYS: 6
    • A.VERIFICATION: 7
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 9
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 7
    • D.APP_KEY: 1
    • D.CRYPTO: 7
    • D.JAVA_OBJECT: 4
    • D.JCS_CODE: 3
    • D.JCS_DATA: 4
    • D.PIN: 15
    • D.SEC_DATA: 5
  • O:
    • O.AES: 2
    • O.ALARM: 5
    • O.CARD-: 1
    • O.CARD-MANAGEMENT: 10
    • O.CIPHER: 12
    • O.CONFIG: 1
    • O.COPY: 1
    • O.ECC: 2
    • O.FAULT_PROTECT: 5
    • O.FIREWALL: 9
    • O.HW_AES: 2
    • O.IDENTIFICATION: 6
    • O.KEY-MNGT: 10
    • O.MEM_ACCESS: 3
    • O.MF_FW: 6
    • O.OPERATE: 16
    • O.OS_DECEIVE: 7
    • O.PHYSICAL: 8
    • O.PIN-MNGT: 5
    • O.PROTECT_DATA: 10
    • O.REALLOCATION: 4
    • O.RESOURCES: 11
    • O.REUSE: 2
    • O.RND: 13
    • O.RSA: 1
    • O.SCP: 36
    • O.SHA: 2
    • O.SHRD_VAR_CON: 1
    • O.SHRD_VAR_CONFID: 9
    • O.SHRD_VAR_INTE: 1
    • O.SHRD_VAR_INTEG: 3
    • O.SID: 13
    • O.SIDE_CHANNEL: 6
    • O.TRANSACTION: 4
    • O.XYZ: 1
  • OE:
    • OE.CARD-MANAGEMENT: 2
    • OE.NATIVE: 5
    • OE.NO-DELETION: 4
    • OE.NO-INSTALL: 7
    • OE.SCP: 5
    • OE.USE_DIAG: 5
    • OE.USE_KEY: 2
    • OE.USE_KEYS: 4
    • OE.VERIFICATION: 9
    • OE.XYZ: 1
  • OP:
    • OP.ARRAY_ACCESS: 3
    • OP.CREATE: 7
    • OP.INSTANCE_FIELD: 1
    • OP.INVK_INTERFACE: 4
    • OP.INVK_VIRTUAL: 3
    • OP.JAVA: 5
    • OP.PUT: 5
    • OP.THROW: 3
    • OP.TYPE_ACCESS: 3
  • OSP:
    • OSP.PRO: 1
    • OSP.PROCESS-TOE: 3
  • R:
    • R.JAVA: 5
  • T:
    • T.ACCES: 1
    • T.ACCESS_DAT: 1
    • T.ACCESS_DATA: 2
    • T.CONFID: 2
    • T.CONFID-: 1
    • T.CONFID-APPLI-: 1
    • T.CONFID-APPLI-DATA: 3
    • T.CONFID-JCS-: 4
    • T.CONFID-JCS-CODE: 4
    • T.CONFID-JCS-DATA: 4
    • T.EXE-CODE: 11
    • T.FAULT: 7
    • T.INTEG-: 3
    • T.INTEG-APPLI-: 4
    • T.INTEG-APPLI-CODE: 1
    • T.INTEG-APPLI-DATA: 3
    • T.INTEG-JCS-: 4
    • T.INTEG-JCS-CODE: 4
    • T.INTEG-JCS-DATA: 3
    • T.LEAKA: 1
    • T.LEAKAGE: 6
    • T.OS: 2
    • T.OS_DE: 1
    • T.OS_DECEIVE: 6
    • T.OS_OP: 1
    • T.OS_OPERATE: 5
    • T.PHYSIC: 1
    • T.PHYSICAL: 4
    • T.RESOU: 1
    • T.RESOURCES: 5
    • T.RND: 6
    • T.SID: 12
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 3
  • NXP:
    • NXP: 120
    • NXP Semiconductors: 13
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • 3DES: 4
  • AES_competition:
    • AES:
      • AES: 24
  • DES:
    • 3DES:
      • 3DES: 5
      • Triple-DES: 6
    • DES:
      • DES: 16
  • constructions:
    • MAC:
      • CBC-MAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 22
  • FF:
    • DH:
      • Diffie-Hellman: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 14
    • SHA2:
      • SHA-224: 8
      • SHA-256: 7
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 8
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 3
  • TLS:
    • TLS:
      • TLSv1.0: 1
      • TLSv1.2: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 20
    • RNG: 13
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 10
  • ECB:
    • ECB: 6
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • FI:
    • DFA: 3
    • Malfunction: 7
    • Physical tampering: 4
    • malfunction: 5
    • physical tampering: 3
  • SCA:
    • DPA: 5
    • Leak-Inherent: 7
    • SPA: 4
    • physical probing: 4
    • side channel: 2
    • side-channel: 1
    • timing attack: 2
    • timing attacks: 2
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/os_name
  • JCOP:
    • JCOP 2: 117
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 6
  • FIPS:
    • FIPS 180-3: 3
    • FIPS 197: 1
    • FIPS 46-3: 2
    • FIPS PUB 180-3: 1
  • ICAO:
    • ICAO: 4
  • ISO:
    • ISO/IEC 11770: 2
  • PKCS:
    • PKCS#1: 2
  • SCP:
    • SCP01: 1
    • SCP02: 1
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • Global Platform 2.1.1: 1
    • GlobalPlatform 2.1.1: 2
  • JavaCard:
    • Java Card 2.2.2: 3
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 3
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
  • javacard:
    • javacard.framework: 2
    • javacard.framework.applet: 1
    • javacard.security: 4
  • javacardx:
    • javacardx.crypto: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Groups marked with ‗IT‘ are considered in the TOE IT environment, and groups marked with ‗—‗ are out of scope of this evaluation. NXP Semiconductors JCOP 2.4.1 R3 Security Target Lite PUBLIC INFORMATION: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: e08884
  • /CreationDate: D:20160609142628+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20160609142628+09'00'
  • /Producer: Acrobat Distiller 15.0 (Windows)
  • /Title: Microsoft Word - 公開用【C0511】英文_ASE_ZeusS-2.00-160524(IPAコメント)_KM.docx
  • pdf_file_size_bytes: 551817
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 80
  • /Author: NXP Semiconductors
  • /CreationDate: D:20110331110331
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: Common Criteria Evaluation, NXP J3A081, J2A081, J3A041, Revision 3, JavaCard
  • /ModDate: D:20110331110331
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Common Criteria Evaluation
  • /Title: Security Target Lite
  • pdf_file_size_bytes: 1915131
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 116
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different