Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
AR-FR24 VERSION M.10
JISEC-CC-CRP-C0123
S3CC91A 16-bit RISC Microcontroller for Smart Card, Revision 3
BSI-DSZ-CC-0483-2008
name AR-FR24 VERSION M.10 S3CC91A 16-bit RISC Microcontroller for Smart Card, Revision 3
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP DE
not_valid_after 07.10.2013 01.09.2019
not_valid_before 16.11.2007 01.07.2008
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0123_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0483a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0123_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0483b.pdf
manufacturer Sharp Corporation Samsung Electronics Co., Ltd.
manufacturer_web https://sharp-world.com/ https://www.samsung.com
security_level EAL3+, ADV_SPM.1 ADV_IMP.2, AVA_VLA.4, AVA_MSU.3, EAL4+, ALC_DVS.2
dgst a62ce002e7469a17 7db14b2410ce0ed3
heuristics/cert_id JISEC-CC-CRP-C0123 BSI-DSZ-CC-0483-2008
heuristics/cert_lab [] BSI
heuristics/extracted_sars ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1, ADV_SPM.1 ATE_COV.2, ADV_RCR.1, ALC_TAT.1, ADV_FSP.1, AVA_VLA.4, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_DVS.2, ALC_LCD.1, ADV_IMP.2, ATE_DPT.1, AVA_SOF.1, ADV_SPM.1, AVA_MSU.3
heuristics/extracted_versions 10 16, 3
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0581-2009, BSI-DSZ-CC-0548-2008
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0451-2007
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0581-2009, BSI-DSZ-CC-0548-2008
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0438-2007, BSI-DSZ-CC-0400-2007, BSI-DSZ-CC-0451-2007
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0123
  • certification_date: 01.11.2007
  • claim: EAL3+ ADV_SPM.1
  • enhanced:
    • assurance_level: EAL3+ADV_SPM.1
    • cc_version: 2.3
    • cert_link: https://www.ipa.go.jp/en/security/c0123_eimg.pdf
    • description: PRODUCT DESCRIPTION The TOE is firmware to enhance security functionality of a Multi-Function Device (hereafter referred to as “MFD”). It is an option that implements security functions and controls the entire MFD when installed instead of the MFD standard firmware. As countermeasures against information leakage that residual image data in the MFD induce, the TOE has such security functions as cryptographic operation and data clear. The cryptographic operation function encrypts the image data of each fax job before spooled to the Flash memory in the MFD. The data clear function overwrites random or fixed values over the storage area that the spooled image data occupy when the MFD finishes or aborts each job of copy, printer, network scanner or fax functions.
    • evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSC)
    • product: AR-FR24
    • product_type: IT Product (data protection function in Multi Function Device)
    • report_link: https://www.ipa.go.jp/en/security/c0123_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0123_est.pdf
    • toe_version: VERSION M.10
    • vendor: Sharp Corporation
  • expiration_date: 01.10.2013
  • supplier: Sharp Corporation
  • toe_japan_name: AR-FR24 VERSION M.10
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0123_it7143.html
  • toe_overseas_name: AR-FR24 VERSION M.10
maintenance_updates
pdf_data/report_filename c0123_erpt.pdf 0483a.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0483-2008
    • cert_item: S3CC91A 16-bit RISC Microcontroller for Smart Card, Revision 3
    • cert_lab: BSI
    • developer: Samsung Electronics Co., Ltd
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0123-01: 1
    • Certification No. C0123: 1
  • DE:
    • BSI-DSZ-CC-0451-2007: 1
    • BSI-DSZ-CC-0483: 1
    • BSI-DSZ-CC-0483-2008: 19
  • NL:
    • CC-0451-2007: 1
    • CC-0483: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002-2001: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 3
    • EAL3 augmented: 2
  • EAL:
    • EAL 1: 1
    • EAL 4: 9
    • EAL 4 augmented: 4
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 6
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_SPM.1: 2
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 1
    • ACM_CAP: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 2
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_HLD: 2
    • ADV_IMP: 2
    • ADV_IMP.2: 5
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_USR: 2
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.2: 6
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_LCD.1: 1
    • ALC_TAT: 2
    • ALC_TAT.1: 1
  • APE:
    • APE_DES: 1
    • APE_ENV: 1
    • APE_INT: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SRE: 1
  • ASE:
    • ASE_DES: 1
    • ASE_ENV: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_PPC: 1
    • ASE_REQ: 1
    • ASE_SRE: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 2
    • ATE_DPT: 2
    • ATE_FUN: 2
    • ATE_IND: 2
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.3: 5
    • AVA_SOF: 3
    • AVA_VLA: 3
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 6
pdf_data/report_keywords/cc_claims
  • A:
    • A.OPERATOR: 1
  • T:
    • T.RECOVER: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon Technologies AG: 1
  • Philips:
    • Philips: 1
  • Samsung:
    • Samsung: 16
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 3
  • TUV:
    • TÜV Informationstechnik: 2
    • TÜViT: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
    • Rijndael:
      • Rijndael: 2
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • 3DES:
      • Triple-DES: 5
    • DES:
      • DES: 7
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 1
pdf_data/report_keywords/crypto_engine
  • TORNADO:
    • TORNADO: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
  • SCA:
    • DPA: 1
    • physical probing: 1
    • side-channel: 1
  • other:
    • Bellcore attack: 1
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICVersion:
    • IC Version: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • ISO:
    • ISO/IEC 18045:2005: 1
  • BSI:
    • AIS 25: 3
    • AIS 26: 2
    • AIS 31: 3
    • AIS 32: 1
    • AIS 34: 3
    • AIS 35: 2
    • AIS 36: 1
    • AIS 38: 1
    • AIS20: 1
  • ISO:
    • ISO/IEC 15408:2005: 3
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 1.1, 2008-04-10, Samsung Electronics (confidential document) [9] Security Target Lite of S3CC91A 16-bit RISC Microcontroller for Smart Cards, Version 1.0: 1
    • 2, 2008-06-03, TÜViT (confidential document) [8] Configuration Management Documentation (Class ACM_AUT/CAP/SCP) – Project Cheyenne (S3CC91A: 1
    • EVALUATION (ETR-COMP), 8103270436_40 / BSI-DSZ- CC-0483, S3CC91A, Version 2, 2008-06-03, TÜViT (confidential document) [12] Security Application Note, S3CC91A, Version 1.4, 2008-03-31, Samsung Electronics 8: 1
    • Microcontroller for Smart Cards – Project Cheyenne, Version 1.3, 2008-04-10, Samsung Electronics (confidential document) [7] EVALUATION TECHNICAL REPORT SUMMARY (ETR SUMMARY), 8103270436_40 / BSI-DSZ-CC-0483, S3CC91A: 1
pdf_data/report_metadata
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20110526173838+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Manager: IPA
  • /ModDate: D:20110526173917+09'00'
  • /Producer: Acrobat Distiller 8.2.3 (Windows)
  • /Title: CRP-e
  • pdf_file_size_bytes: 874958
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 24
  • /Author: Federal Office for Information Security
  • /CreationDate: D:20080717124808+02'00'
  • /Creator: Writer
  • /Keywords: "S3CC91A 16-bit RISC Microcontroller for Smart Card, Revision 3, BSI-DSZ-CC-0483-2008, Samsung Electronics Co., Ltd"
  • /ModDate: D:20080717151127+02'00'
  • /Producer: StarOffice 8
  • /Subject: Common Criteria Zertifizierung
  • /Title: Zertifizierungsreport BSI-DSZ-CC-0483-2008
  • pdf_file_size_bytes: 566022
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
pdf_data/st_filename c0123_est.pdf 0483b.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002: 8
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL 4: 1
    • EAL4: 10
    • EAL4 augmented: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.3: 4
    • ACM_SCP.1: 2
  • ADO:
    • ADO_DEL.1: 3
    • ADO_IGS.1: 4
  • ADV:
    • ADV_FSP.1: 12
    • ADV_HLD.1: 3
    • ADV_HLD.2: 2
    • ADV_RCR.1: 4
    • ADV_SPM.1: 13
  • AGD:
    • AGD_ADM.1: 9
    • AGD_USR.1: 5
  • ALC:
    • ALC_DVS.1: 4
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.1: 3
    • ATE_FUN: 1
    • ATE_FUN.1: 4
    • ATE_IND.2: 3
  • AVA:
    • AVA_MSU.1: 3
    • AVA_SOF.1: 3
    • AVA_VLA.1: 3
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 1
    • ACM_CAP: 2
    • ACM_CAP.4: 2
    • ACM_SCP: 2
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 2
    • ADO_IGS: 2
    • ADO_IGS.1: 3
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 3
    • ADV_HLD: 1
    • ADV_HLD.1: 1
    • ADV_HLD.2: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 2
    • ADV_IMP.2: 5
    • ADV_LLD: 1
    • ADV_LLD.1: 3
    • ADV_RCR: 1
    • ADV_RCR.1: 2
    • ADV_SPM: 1
    • ADV_SPM.1: 5
  • AGD:
    • AGD_ADM: 2
    • AGD_ADM.1: 4
    • AGD_USR: 2
    • AGD_USR.1: 4
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.1: 1
    • ALC_DVS.2: 6
    • ALC_LCD: 2
    • ALC_LCD.1: 1
    • ALC_TAT: 2
    • ALC_TAT.1: 2
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 2
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU: 1
    • AVA_MSU.2: 1
    • AVA_MSU.3: 6
    • AVA_SOF: 1
    • AVA_SOF.1: 1
    • AVA_VLA: 1
    • AVA_VLA.4: 7
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 14
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 8
    • FCS_COP.1: 14
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 4
    • FDP_IFC.1: 3
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 11
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_SOS.1: 13
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 2
    • FIA_UAU.2: 17
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 13
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 4
    • FIA_UID.2: 12
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 12
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 4
    • FMT_MSA.2: 17
    • FMT_MSA.2.1: 1
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 17
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RVM: 1
    • FPT_RVM.1: 16
    • FPT_RVM.1.1: 1
  • FTP:
    • FTP_RVM.1: 2
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 1
    • FAU_SAS: 3
    • FAU_SAS.1: 8
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM.1: 29
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 4
    • FCS_CKM.4: 19
    • FCS_CKM.4.1: 2
    • FCS_COP: 1
    • FCS_COP.1: 21
    • FCS_COP.1.1: 2
    • FCS_RND: 2
    • FCS_RND.1: 8
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 21
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_CKM.2: 1
    • FDP_IFC: 2
    • FDP_IFC.1: 22
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 3
    • FDP_ITC.1: 15
    • FDP_ITC.1.1: 2
    • FDP_ITC.1.2: 2
    • FDP_ITC.1.3: 2
    • FDP_ITC.2: 17
    • FDP_ITC.2.1: 2
    • FDP_ITC.2.2: 2
    • FDP_ITC.2.3: 2
    • FDP_ITC.2.4: 2
    • FDP_ITC.2.5: 2
    • FDP_ITT: 1
    • FDP_ITT.1: 17
    • FDP_ITT.1.1: 1
    • FDP_SDI.1: 2
  • FMT:
    • FMT_LIM: 4
    • FMT_LIM.1: 14
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 19
    • FMT_LIM.2.1: 1
    • FMT_MSA: 2
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 21
    • FMT_MSA.2.1: 2
    • FMT_MSA.3: 13
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 8
  • FPT:
    • FPT_AMT.1: 1
    • FPT_FLS: 1
    • FPT_FLS.1: 22
    • FPT_FLS.1.1: 1
    • FPT_ITT: 1
    • FPT_ITT.1: 15
    • FPT_ITT.1.1: 1
    • FPT_PHP: 2
    • FPT_PHP.3: 18
    • FPT_PHP.3.1: 1
    • FPT_SEP: 2
    • FPT_SEP.1: 10
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_TDC.1: 2
  • FRU:
    • FRU_FLT: 1
    • FRU_FLT.1: 1
    • FRU_FLT.2: 18
  • FTP:
    • FTP_ITC.1: 2
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.OPERATOR: 5
  • O:
    • O.REMOVE: 8
    • O.RESIDUAL: 6
  • OE:
    • OE.ERASEALL: 3
    • OE.OPERATE: 3
  • T:
    • T.RECOVER: 6
  • O:
    • O.RND: 5
  • T:
    • T.RND: 4
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
    • Rijndael:
      • Rijndael: 4
  • DES:
    • 3DES:
      • 3DES: 13
      • T-DES: 1
      • Triple-DES: 1
    • DES:
      • DES: 12
  • miscellaneous:
    • SEED:
      • SEED: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 10
    • RNG: 3
pdf_data/st_keywords/crypto_engine
  • TORNADO:
    • TORNADO: 8
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • Malfunction: 24
    • malfunction: 12
    • physical tampering: 2
  • SCA:
    • DPA: 5
    • Leak-Inherent: 20
    • Physical Probing: 4
    • Physical probing: 2
    • SPA: 3
    • physical probing: 6
    • side-channel: 2
    • timing attacks: 1
  • other:
    • reverse engineering: 3
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-003: 1
  • FIPS:
    • FIPS PUB 197: 2
  • ISO:
    • ISO/IEC 15408:2005: 1
  • BSI:
    • AIS 20: 2
    • AIS20: 3
  • FIPS:
    • FIPS PUB 46-3: 2
  • ISO:
    • ISO/IEC 15408-2005: 1
    • ISO/IEC 7816: 4
    • ISO/IEC 9796-1: 3
pdf_data/st_metadata
  • /Author: K.Nakagawa
  • /Company: Sharp Corporation
  • /CreationDate: D:20110524153336+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /GTS_PDFXConformance: PDF/X-1a:2001
  • /GTS_PDFXVersion: PDF/X-1:2001
  • /ModDate: D:20110526172010+09'00'
  • /Producer: Acrobat Distiller 8.2.6 (Windows)
  • /Subject: AR-FR24
  • /Title: Security Target
  • /Trapped: /False
  • pdf_file_size_bytes: 748188
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 31
  • /Author: Kyungsuk Yi (Bryant)
  • /CreationDate: D:20080604112544+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /Keywords: Smartcard, IC, S3CC91A, 16-bit RISC Microcontroller For Smart Cards, 16-bit CMOS Microcontroller For Smart Cards, Samsung Electronics
  • /ModDate: D:20080609165146+09'00'
  • /Producer: Acrobat Distiller 6.0.1 (Windows)
  • /Subject: Securiti Target Lite
  • /Title: Security Target Lite of S3CC91A 16-bit RISC Microcontroller For Smart Cards
  • pdf_file_size_bytes: 540341
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 61
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different