name |
AR-FR24 VERSION M.10 |
Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
FR |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
01.09.2019 |
not_valid_before |
16.11.2007 |
24.12.2013 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0123_erpt.pdf |
https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2013_65.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0123_est.pdf |
https://www.commoncriteriaportal.org/files/epfiles/FQR%20110%206672%20Ed1%20-%20ST%20JUBA%20%20Lite.pdf |
manufacturer |
Sharp Corporation |
Oberthur Technologies / STMicroelectronics |
manufacturer_web |
https://sharp-world.com/ |
|
security_level |
EAL3+, ADV_SPM.1 |
EAL4+, ALC_DVS.2, AVA_VAN.5 |
dgst |
a62ce002e7469a17 |
8843ddf8e55f6df6 |
heuristics/cert_id |
JISEC-CC-CRP-C0123 |
ANSSI-CC-2013/65 |
heuristics/cert_lab |
[] |
THALES |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1, ADV_SPM.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
10 |
01.00.04 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0123
- certification_date: 01.11.2007
- claim: EAL3+ ADV_SPM.1
- enhanced:
- assurance_level: EAL3+ADV_SPM.1
- cc_version: 2.3
- cert_link: https://www.ipa.go.jp/en/security/c0123_eimg.pdf
- description: PRODUCT DESCRIPTION The TOE is firmware to enhance security functionality of a Multi-Function Device (hereafter referred to as “MFD”). It is an option that implements security functions and controls the entire MFD when installed instead of the MFD standard firmware. As countermeasures against information leakage that residual image data in the MFD induce, the TOE has such security functions as cryptographic operation and data clear. The cryptographic operation function encrypts the image data of each fax job before spooled to the Flash memory in the MFD. The data clear function overwrites random or fixed values over the storage area that the spooled image data occupy when the MFD finishes or aborts each job of copy, printer, network scanner or fax functions.
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSC)
- product: AR-FR24
- product_type: IT Product (data protection function in Multi Function Device)
- report_link: https://www.ipa.go.jp/en/security/c0123_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0123_est.pdf
- toe_version: VERSION M.10
- vendor: Sharp Corporation
- expiration_date: 01.10.2013
- supplier: Sharp Corporation
- toe_japan_name: AR-FR24 VERSION M.10
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0123_it7143.html
- toe_overseas_name: AR-FR24 VERSION M.10
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0123_erpt.pdf |
ANSSI-CC-2013_65.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2013/65
- cert_item: Carte Mobile MasterCard PayPass – M/Chip 4 sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME
- cert_item_version: MasterCard Mobile PayPass V1 – Version V01.00.04 Identification hardware 0768910, identification card Manager GOP Ref V1.8.v
- cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
- developer: Oberthur Technologies 420, rue d’Estienne d’Orves, CS 40008, 92705 Colombes Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P.2, 13106 Rousset, France Commanditaire Oberthur Technologies 420, rue d’Estienne d’Orves - CS 40008, 92705 Colombes Cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: néant
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0123-01: 1
- Certification No. C0123: 1
|
- FR:
- ANSSI-CC-2011/07: 1
- ANSSI-CC-2011/07-S01: 1
- ANSSI-CC-2012/39: 4
- ANSSI-CC-2013/65: 22
- ANSSI-CC-PP-2010/03: 1
- ANSSI-CC-PP-2010/04: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-2010/03: 1
- ANSSI-CC-PP-2010/04: 1
- BSI:
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL3: 3
- EAL3 augmented: 2
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 1
- EAL 5: 1
- EAL 7: 1
- EAL4: 4
- EAL4+: 3
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Oberthur:
- Oberthur Technologies: 11
- STMicroelectronics:
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 3
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- ISO:
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20110526173838+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /Manager: IPA
- /ModDate: D:20110526173917+09'00'
- /Producer: Acrobat Distiller 8.2.3 (Windows)
- /Title: CRP-e
- pdf_file_size_bytes: 874958
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 24
|
- /Author: Duquesnoy
- /CreationDate: D:20140129142922+01'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.010
- /ModDate: D:20140129142922+01'00'
- /Producer: Microsoft® Word 2010
- /Subject: Application Mobile MasterCard PayPass V1 - M/Chip 4, version V01.00.04, sur plateforme NFC FlyBuy Platinum V2 sur composant ST33F1ME
- /Title: ANSSI-CC-2013/65
- pdf_file_size_bytes: 774691
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
pdf_data/st_filename |
c0123_est.pdf |
FQR 110 6672 Ed1 - ST JUBA Lite.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2011/07: 1
- ANSSI-CC-2011/07-S01: 1
- ANSSI-CC-2012/39: 1
- ANSSI-CC-PP 2010/04: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL4: 3
- EAL4 augmented: 2
- EAL4+: 10
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 4
- ACM_SCP.1: 2
- ADO:
- ADO_DEL.1: 3
- ADO_IGS.1: 4
- ADV:
- ADV_FSP.1: 12
- ADV_HLD.1: 3
- ADV_HLD.2: 2
- ADV_RCR.1: 4
- ADV_SPM.1: 13
- AGD:
- AGD_ADM.1: 9
- AGD_USR.1: 5
- ALC:
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 3
- ATE_FUN: 1
- ATE_FUN.1: 4
- ATE_IND.2: 3
- AVA:
- AVA_MSU.1: 3
- AVA_SOF.1: 3
- AVA_VLA.1: 3
|
- ADV:
- ADV_ARC.1: 5
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 9
- ADV_IMP.1: 4
- ADV_TDS.1: 2
- ADV_TDS.2: 1
- ADV_TDS.3: 8
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 5
- AGD_PRE: 1
- AGD_PRE.1: 5
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 6
- ALC_LCD.1: 3
- ALC_TAT.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 6
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 14
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 8
- FCS_COP.1: 14
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 4
- FDP_IFC.1: 3
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_RIP.1: 11
- FDP_RIP.1.1: 1
- FIA:
- FIA_SOS.1: 13
- FIA_SOS.1.1: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 17
- FIA_UAU.2.1: 1
- FIA_UAU.7: 13
- FIA_UAU.7.1: 1
- FIA_UID.1: 4
- FIA_UID.2: 12
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 12
- FMT_MOF.1.1: 1
- FMT_MSA.1: 4
- FMT_MSA.2: 17
- FMT_MSA.2.1: 1
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR.1: 17
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM: 1
- FPT_RVM.1: 16
- FPT_RVM.1.1: 1
- FTP:
|
- FAU:
- FAU_ARP.1: 7
- FAU_ARP.1.1: 1
- FAU_GEN.1: 11
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAA.1: 8
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 2
- FAU_SAR: 12
- FAU_SAR.1: 4
- FCS:
- FCS_CKM: 9
- FCS_CKM.1: 8
- FCS_CKM.2: 1
- FCS_CKM.4: 20
- FCS_CKM.4.1: 1
- FCS_COP: 40
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC: 149
- FDP_ACC.1: 14
- FDP_ACC.2: 14
- FDP_ACF: 133
- FDP_ACF.1: 35
- FDP_ACF.1.2: 7
- FDP_ACF.1.3: 1
- FDP_DAU.1: 5
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_ETC.1: 15
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC: 77
- FDP_IFC.1: 11
- FDP_IFC.2: 8
- FDP_IFF: 62
- FDP_IFF.1: 24
- FDP_IFF.1.2: 4
- FDP_ITC: 28
- FDP_ITC.1: 27
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 17
- FDP_RIP.1: 7
- FDP_RIP.1.1: 1
- FDP_SDI.2: 5
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT.1: 13
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 16
- FIA_AFL.1: 4
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.2: 8
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_UAU: 35
- FIA_UAU.1: 8
- FIA_UAU.3: 7
- FIA_UAU.3.1: 1
- FIA_UAU.3.2: 1
- FIA_UAU.4: 9
- FIA_UAU.4.1: 1
- FIA_UAU.6: 1
- FIA_UID: 24
- FIA_UID.1: 10
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 7
- FMT_MOF.1: 1
- FMT_MSA: 9
- FMT_MSA.1: 3
- FMT_MSA.2: 4
- FMT_MSA.2.1: 1
- FMT_MSA.3: 29
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 4
- FMT_MTD.1: 1
- FMT_SMF: 17
- FMT_SMF.1: 5
- FMT_SMR.1: 18
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 4
- FPR_UNO.1.1: 1
- FPT:
- FPT_RPL: 1
- FPT_RPL.1: 4
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_STM.1: 3
- FPT_TDC.1: 16
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 10
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 3
|
pdf_data/st_keywords/cc_claims |
- A:
- O:
- O.REMOVE: 8
- O.RESIDUAL: 6
- OE:
- OE.ERASEALL: 3
- OE.OPERATE: 3
- T:
|
- A:
- O:
- O.APP_BLOC: 1
- O.APP_BLOCK: 13
- O.AUDIT: 14
- O.AUDIT_ACCESS: 10
- O.AUTHORISATION_CONTR: 1
- O.AUTHORISATION_CONTROL: 19
- O.CHANNELS: 9
- O.COMM_AUTH: 5
- O.COMM_INTEGRITY: 1
- O.DATA_DISCLOSURE: 44
- O.DATA_INTEGRITY: 62
- O.DATA_USERS: 10
- O.GUIS_AUTH: 13
- O.ISSUING_BANK_AUTH: 54
- O.MNO_AUTH: 8
- O.RISK_MNGT: 10
- O.SIM_UNLOCK: 10
- O.TRANSACTION_BYPASS: 53
- O.TRANSACTION_INTEG: 1
- O.TRANSACTION_INTEGRI: 1
- O.TRANSACTION_INTEGRITY: 38
- O.TRANSACTION_REPLAY: 13
- O.TRANSACTION_UNIQUE: 1
- O.TRANSACTION_UNIQUENE: 1
- O.TRANSACTION_UNIQUENES: 2
- O.TRANSACTION_UNIQUENESS: 33
- O.USER_AUTH: 55
- OE:
- OE.BANKS_PRIVILEGES: 4
- OE.CERTIFICATES_MNGT: 11
- OE.CHANNELS_SELECTION: 4
- OE.CUSTOMER_PC_CONFID: 8
- OE.GUIS_AUTH: 1
- OE.GUIS_IDENTIFICATION: 5
- OE.GUIS_TIMEOUT: 7
- OE.GUI_INST_ALERT: 7
- OE.LATENCY_CONTROL: 5
- OE.MERCHANT_AUTH: 8
- OE.MERCHANT_CONTROL: 7
- OE.NFC_PROTOCOL: 5
- OE.NO_VAD: 6
- OE.POLICY: 5
- OE.POS_APPLICATIONS: 10
- OE.POS_APPROVAL: 7
- OE.POS_DEACTIVATION: 6
- OE.TOE_USAGE: 9
- OE.TRANSACTION_DISPLAY: 5
- OSP:
- OSP.BANKS_PRIVILEGES: 4
- OSP.CERTIFICATES_MNGT: 4
- OSP.CUSTOMER_PC_CONFI: 1
- OSP.CUSTOMER_PC_CONFID: 3
- OSP.GUIS_IDENTIFICATION: 4
- OSP.MERCHANT_CONTROL: 6
- OSP.PISHING: 4
- OSP.POLICY: 4
- OSP.TOE_USAGE: 4
- T:
- T.APPLICATIONS_DOS: 7
- T.CERTIF_CORRUPTION: 5
- T.CUSTOMER_USURPATION: 7
- T.DISCLOSURE_KEYS: 6
- T.DISCLOSURE_REF_PC: 6
- T.INTEG_ACCOUNT_INFO: 6
- T.INTEG_COUNT: 7
- T.INTEG_KEYS: 8
- T.INTEG_LOG_FILE: 5
- T.INTEG_REF_PC: 6
- T.INTEG_SEL_ACT_PARAM: 6
- T.INTEG_TRANS_PARAM: 7
- T.ISSUING-: 2
- T.ISSUING-BANK_USURPATION: 3
- T.MAN-IN-THE-MIDDLE: 12
- T.MERCHANT_ACCOMPLICE: 9
- T.MNO_USURPATION: 5
- T.STEALING: 9
- T.TEMPORARY_DATA: 7
- T.TRANSACTION_COUNTERFEITING: 13
- T.TRANSACTION_REPLAY: 8
- T.TRANSACTION_REPUDIATION: 7
|
pdf_data/st_keywords/vendor |
|
- Oberthur:
- Oberthur: 8
- Oberthur Technologies: 137
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- FIPS:
- ISO:
|
- FIPS:
- FIPS PUB 140-2: 1
- FIPS PUB 180-3: 1
- FIPS PUB 186-3: 1
- FIPS PUB 197: 1
- FIPS PUB 46-3: 1
- FIPS PUB 81: 1
- ISO:
- ISO/IEC 9796-1: 1
- ISO/IEC 9797-1: 1
- PKCS:
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: K.Nakagawa
- /Company: Sharp Corporation
- /CreationDate: D:20110524153336+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /GTS_PDFXConformance: PDF/X-1a:2001
- /GTS_PDFXVersion: PDF/X-1:2001
- /ModDate: D:20110526172010+09'00'
- /Producer: Acrobat Distiller 8.2.6 (Windows)
- /Subject: AR-FR24
- /Title: Security Target
- /Trapped: /False
- pdf_file_size_bytes: 748188
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 31
|
- /Author: chrisduc
- /CreationDate: D:20130807110801+02'00
- /Creator: PDFCreator Version 0.8.1
- /ModDate: D:20130807110801+02'00
- /Producer: AFPL Ghostscript 8.50
- /Title: FQR 110 6672 Ed1 - ST JUBA Lite
- pdf_file_size_bytes: 1527189
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 131
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |