Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
MX-6150FN / 6150FV / 5150FN / 5150FV / 4150FN / 4150FV / 3650FN / 3650FV / 3150FN / 3150FV / 2650FN / 2650FV with MX-FR51U; MX-3630FN / 2630FN with MX-FR51U and MX-PK13; and MX-6050N / 6050V / 5050N / 5050V / 4050N / 4050V / 3550N / 3550V / 3050N / 3050V / 2630N with MX-FR51U, MX-FX15 and MX-PK13 0700Kc00
JISEC-CC-CRP-C0580-01-2017
Philips P541G072V0P (JCOP 41 v2.2)
BSI-DSZ-CC-0294-2006
name MX-6150FN / 6150FV / 5150FN / 5150FV / 4150FN / 4150FV / 3650FN / 3650FV / 3150FN / 3150FV / 2650FN / 2650FV with MX-FR51U; MX-3630FN / 2630FN with MX-FR51U and MX-PK13; and MX-6050N / 6050V / 5050N / 5050V / 4050N / 4050V / 3550N / 3550V / 3050N / 3050V / 2630N with MX-FR51U, MX-FX15 and MX-PK13 0700Kc00 Philips P541G072V0P (JCOP 41 v2.2)
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP DE
not_valid_after 27.10.2022 01.09.2019
not_valid_before 27.10.2017 31.08.2006
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0580_eimg.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0580_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0294a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0580_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0294b.pdf
manufacturer Sharp Corporation Philips Semiconductors GmbH
manufacturer_web https://sharp-world.com/ https://www.philips.com/
security_level {} ADV_IMP.2, EAL4+, ALC_DVS.2
dgst a67e8b913adcb0f1 512bbfc881dbe9ed
heuristics/cert_id JISEC-CC-CRP-C0580-01-2017 BSI-DSZ-CC-0294-2006
heuristics/cert_lab [] BSI
heuristics/cpe_matches cpe:2.3:h:sharp:mx-3050n:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-5050v:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-6050n:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-4050n:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-3550n:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-3550v:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-2630n:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-5050n:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-3050v:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-4050v:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-6050v:-:*:*:*:*:*:*:* {}
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 ASE_ENV.1, ADV_RCR.1, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ALC_DVS.2, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, ADV_FSP.2, AVA_SOF.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ADV_IMP.2, ATE_DPT.1, AVA_VLA.4, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1, AVA_MSU.3
heuristics/extracted_versions - 2.2
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0426-2007
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0348-2006
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0426-2007
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0348-2006
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0580
  • certification_date: 01.10.2017
  • claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
  • enhanced:
    • assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
    • cc_version: 3.1 Release4
    • cert_id: JISEC-CC-CRP-C0580
    • cert_link: https://www.ipa.go.jp/en/security/c0580_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Device (MFD) that has the functions, such as copy, print, scan, fax and filing. The TOE is capable of implementing the functionality required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFD. TOE security functionality The TOE provides the following security features: - Identification and Authentication Function - Access Control Function - Stored Data Encryption Function - Network Protection Function - Security Management Function - Audit Function - Software Verification Function - Fax Line Separation Function - Self-testing Function - Residual Data Overwrite Function - Data Purging Function
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: MX-6150FN / 6150FV / 5150FN / 5150FV / 4150FN / 4150FV / 3650FN / 3650FV / 3150FN / 3150FV / 2650FN / 2650FV with MX-FR51U; MX-3630FN / 2630FN with MX-FR51U and MX-PK13; and MX-6050N / 6050V / 5050N / 5050V / 4050N / 4050V / 3550N / 3550V / 3050N / 3050V / 2630N with MX-FR51U, MX-FX15 and MX-PK13
    • product_type: Multifunction Product
    • protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
    • report_link: https://www.ipa.go.jp/en/security/c0580_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0580_est.pdf
    • toe_version: 0700Kc00
    • vendor: SHARP CORPORATION
  • expiration_date: 01.11.2022
  • supplier: SHARP CORPORATION
  • toe_japan_name: MX-6150FN / 6150FV / 5150FN / 5150FV / 4150FN / 4150FV / 3650FN / 3650FV / 3150FN / 3150FV / 2650FN / 2650FV with MX-FR51U; MX-3630FN / 2630FN with MX-FR51U and MX-PK13; and MX-6050N / 6050V / 5050N / 5050V / 4050N / 4050V / 3550N / 3550V / 3050N / 3050V / 2630N with MX-FR51U, MX-FX15 and MX-PK130700Kc00
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0580_it7640.html
  • toe_overseas_name: MX-6150FN / 6150FV / 5150FN / 5150FV / 4150FN / 4150FV / 3650FN / 3650FV / 3150FN / 3150FV / 2650FN / 2650FV with MX-FR51U; MX-3630FN / 2630FN with MX-FR51U and MX-PK13; and MX-6050N / 6050V / 5050N / 5050V / 4050N / 4050V / 3550N / 3550V / 3050N / 3050V / 2630N with MX-FR51U, MX-FX15 and MX-PK130700Kc00
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0348-2006
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0348-2006
heuristics/protection_profiles b2cfec7a92fa2940 {}
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf {}
pdf_data/cert_filename c0580_eimg.pdf
pdf_data/cert_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0580-01-2017: 1
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /CreationDate: D:20171122112227+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20171122112427+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 85177
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
pdf_data/report_filename c0580_erpt.pdf 0294a.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0294-2006
    • cert_item: Philips P541G072V0P (JCOP 41 v2.2
    • cert_lab: BSI
    • developer: IBM Deutschland Entwicklung GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0580-01-2017: 1
  • DE:
    • BSI-DSZ-CC-0294-2006: 21
    • BSI-DSZ-CC-0348: 1
    • BSI-DSZ-CC-0348-: 1
    • BSI-DSZ-CC-0348-2006: 3
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002-: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 4: 4
    • EAL 4 augmented: 2
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 11
    • EAL4 augmented: 1
    • EAL5: 7
    • EAL5 augmented: 1
    • EAL5+: 1
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 4
  • AGD:
    • AGD_OPE.1: 4
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.1: 4
    • ALC_CMS.1: 4
  • ASE:
    • ASE_CCL.1: 4
    • ASE_ECD.1: 4
    • ASE_INT.1: 4
    • ASE_OBJ.1: 4
    • ASE_REQ.1: 4
    • ASE_SPD.1: 4
    • ASE_TSS.1: 4
  • ATE:
    • ATE_IND.1: 4
  • AVA:
    • AVA_VAN.1: 4
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 1
    • ACM_CAP: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 2
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_FSP.2: 1
    • ADV_HLD: 2
    • ADV_HLD.2: 1
    • ADV_IMP: 2
    • ADV_IMP.2: 5
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_LLD.1: 1
    • ADV_RCR: 2
    • ADV_RCR.1: 1
    • ADV_SPM: 2
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM: 2
    • AGD_ADM.1: 1
    • AGD_USR: 2
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.2: 6
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_LCD.1: 1
    • ALC_TAT: 2
    • ALC_TAT.1: 1
  • ASE:
    • ASE_DES.1: 1
    • ASE_ENV.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_PPC.1: 1
    • ASE_REQ.1: 1
    • ASE_SRE.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 2
    • ATE_COV.2: 1
    • ATE_DPT: 2
    • ATE_DPT.1: 1
    • ATE_FUN: 2
    • ATE_FUN.1: 1
    • ATE_IND: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.2: 1
    • AVA_MSU.3: 1
    • AVA_SOF: 3
    • AVA_SOF.1: 1
    • AVA_VLA: 4
    • AVA_VLA.2: 2
    • AVA_VLA.3: 1
    • AVA_VLA.4: 2
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_ARP: 1
    • FAU_SAA.1: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.3: 1
    • FCS_CKM.4: 1
    • FCS_COP: 7
    • FCS_RND.1: 1
  • FDP:
    • FDP_ACC: 2
    • FDP_ACF: 2
    • FDP_ETC.1: 1
    • FDP_IFC: 2
    • FDP_IFF: 2
    • FDP_ITC.1: 1
    • FDP_RIP: 6
    • FDP_ROL: 1
    • FDP_SDI.2: 1
  • FIA:
    • FIA_AFL: 2
    • FIA_ATD: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 1
    • FIA_UID: 2
    • FIA_USB.1: 1
  • FMT:
    • FMT_LIM.1: 1
    • FMT_LIM.2: 1
    • FMT_MSA: 8
    • FMT_MTD: 1
    • FMT_MTD.3: 1
    • FMT_SMF.1: 1
    • FMT_SMR: 3
  • FPR:
    • FPR_UNO.1: 1
  • FPT:
    • FPT_AMT: 1
    • FPT_FLS: 2
    • FPT_PHP: 1
    • FPT_RVM: 1
    • FPT_RVM.1: 1
    • FPT_SEP: 1
    • FPT_SEP.1: 1
    • FPT_TST.1: 1
  • FRU:
    • FRU_FLT: 1
    • FRU_RSA: 1
  • FTP:
    • FTP_ITC: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.NETWORK: 1
    • A.PHYSICAL: 1
    • A.TRAINED_USERS: 1
    • A.TRUSTED_ADMIN: 1
  • D:
    • D.TSF: 3
    • D.USER: 3
  • T:
    • T.NET_COMPROMISE: 1
    • T.TSF_COMPROMISE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
  • A:
    • A.DLV_PROTECT: 1
    • A.NATIVE: 1
    • A.NO-DELETION: 1
    • A.NO-INSTALL: 1
    • A.TEST_OPERATE: 1
    • A.USE_DIAG: 1
    • A.USE_KEYS: 1
    • A.VERIFICATION: 1
  • OSP:
    • OSP.IC_ORG: 1
  • T:
    • T.ACCESS_DATA: 1
    • T.CONFID-APPLI-DATA: 1
    • T.CONFID-JCS-CODE: 1
    • T.CONFID-JCS-DATA: 1
    • T.DEL: 1
    • T.DEL_IC_NOS: 1
    • T.DEV_IC: 1
    • T.DEV_NOS: 1
    • T.EXE-CODE: 2
    • T.FAULT: 1
    • T.INTEG-APPLI-CODE: 1
    • T.INTEG-APPLI-DATA: 1
    • T.INTEG-JCS-CODE: 1
    • T.INTEG-JCS-DATA: 1
    • T.LEAKAGE: 1
    • T.NATIVE: 1
    • T.OS_DECEIVE: 1
    • T.OS_OPERATE: 1
    • T.PHYSICAL: 1
    • T.RESOURCES: 1
    • T.RND: 1
    • T.SID: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Philips:
    • Philips: 29
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 4
  • TUV:
    • TÜV Informationstechnik: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 1
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • 3DES:
      • 3DES: 2
    • DES:
      • DES: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 1
  • SHA:
    • SHA1:
      • SHA-1: 2
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 6
      • TLS v1.2: 6
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
  • RNG:
    • RND: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • ECB:
    • ECB: 1
  • CBC:
    • CBC: 2
  • ECB:
    • ECB: 2
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • BSI:
    • AIS 20: 4
    • AIS 25: 2
    • AIS 26: 2
    • AIS 32: 1
    • AIS 34: 3
    • AIS 36: 3
  • ISO:
    • ISO/IEC 15408:2005: 2
  • SCP:
    • SCP01: 1
    • SCP02: 1
pdf_data/report_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 1
  • JavaCard:
    • Java Card 2.2.1: 1
    • JavaCard 2.2.1: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Report (ETR), Version 3, 10. July 2006, CC Evaluation of Philips P541G072V0P (JCOP 41 v2.2) (confidential document) [9] Java Card System – Minimal Configuration Protection Profile (registered at DCSSI under: 1
    • v2.2) Secure Smart Card Controller, Version 2.2, 25. March 2006, IBM Deutschland Entwicklung GmbH (confidential document) [7] Security Target lite Philips P541G072V0P (JCOP 41, v2.2) Secure Smart Card Controller, Version: 1
pdf_data/report_metadata
  • /CreationDate: D:20180209141023+09'00'
  • /Creator: Microsof Word 2010
  • /ModDate: D:20180209141319+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 314490
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 33
  • /Author: Bundesamt für Sicherheit in der informationstechnik
  • /Company: BSI Bonn
  • /CreationDate: D:20060928154201+02'00'
  • /Creator: Acrobat PDFMaker 7.0.7 für Word
  • /Keywords: Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-0294
  • /ModDate: D:20060928154453+02'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /SourceModified: D:20060928134130
  • /Title: Certification Report BSI-DSZ-CC-0294-2006
  • pdf_file_size_bytes: 314369
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 44
pdf_data/st_filename c0580_est.pdf 0294b.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0348: 1
    • BSI-DSZ-CC-0348-2006: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002: 2
    • BSI-PP-0017: 4
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 27
    • EAL4 augmented: 8
    • EAL5: 2
    • EAL5 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ACM:
    • ACM_AUT.1: 2
    • ACM_CAP.4: 2
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL.2: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.2: 2
    • ADV_HLD.2: 2
    • ADV_IMP.1: 2
    • ADV_IMP.2: 13
    • ADV_LLD.1: 3
    • ADV_RCR.1: 3
    • ADV_SPM.1: 10
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 14
    • ALC_LCD.1: 2
    • ALC_TAT.1: 3
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 3
  • AVA:
    • AVA_MSU.2: 1
    • AVA_MSU.3: 2
    • AVA_SOF.1: 2
    • AVA_VLA.2: 7
    • AVA_VLA.3: 4
    • AVA_VLA.4: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 15
    • FAU_GEN.1: 13
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_STG_EXT: 3
    • FAU_STG_EXT.1: 6
    • FAU_STG_EXT.1.1: 2
  • FCS:
    • FCS_CKM.1: 40
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 2
    • FCS_CKM.4: 8
    • FCS_CKM.4.1: 1
    • FCS_CKM_EXT: 3
    • FCS_CKM_EXT.4: 28
    • FCS_CKM_EXT.4.1: 2
    • FCS_COP.1: 98
    • FCS_COP.1.1: 6
    • FCS_KDF_EXT.1: 4
    • FCS_KYC_EXT: 4
    • FCS_KYC_EXT.1: 9
    • FCS_KYC_EXT.1.1: 3
    • FCS_RBG_EXT: 3
    • FCS_RBG_EXT.1: 25
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_SMC_EXT.1: 4
    • FCS_SSH_EXT.1: 6
    • FCS_TLS_EXT: 3
    • FCS_TLS_EXT.1: 25
    • FCS_TLS_EXT.1.1: 2
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 13
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 10
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_DSK_EXT: 3
    • FDP_DSK_EXT.1: 9
    • FDP_DSK_EXT.1.1: 2
    • FDP_DSK_EXT.1.2: 2
    • FDP_FXS_EXT: 3
    • FDP_FXS_EXT.1: 6
    • FDP_FXS_EXT.1.1: 2
    • FDP_IFC.1: 1
    • FDP_ITC.1: 5
    • FDP_ITC.2: 5
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 2
  • FIA:
    • FIA_AFL.1: 4
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 6
    • FIA_ATD.1.1: 1
    • FIA_PMG: 4
    • FIA_PMG_EXT: 2
    • FIA_PMG_EXT.1: 4
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 4
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 4
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 5
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 5
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 7
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 15
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 17
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_KYP_EXT: 2
    • FPT_KYP_EXT.1: 4
    • FPT_KYP_EXT.1.1: 1
    • FPT_SKP_EXT: 3
    • FPT_SKP_EXT.1: 6
    • FPT_SKP_EXT.1.1: 2
    • FPT_STM: 1
    • FPT_STM.1: 6
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 3
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT: 3
    • FPT_TUD_EXT.1: 11
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 3
  • FTA:
    • FTA_SSL.3: 4
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 21
    • FTP_ITC.1.1: 3
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 16
    • FTP_TRP.1.1: 4
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 2
  • FAU:
    • FAU_ARP: 6
    • FAU_ARP.1: 8
    • FAU_GEN.1: 5
    • FAU_SAA.1: 13
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
  • FCS:
    • FCS_CKM.1: 15
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 9
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 7
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 17
    • FCS_CKM.4.1: 1
    • FCS_COP: 15
    • FCS_COP.1: 9
    • FCS_COP.1.1: 7
    • FCS_RND: 3
    • FCS_RND.1: 16
    • FCS_RND.1.1: 2
  • FDP:
    • FDP_ACC: 9
    • FDP_ACC.1: 22
    • FDP_ACC.2: 7
    • FDP_ACF: 8
    • FDP_ACF.1: 27
    • FDP_ETC.1: 8
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_IFC: 4
    • FDP_IFC.1: 24
    • FDP_IFC.2: 5
    • FDP_IFF: 4
    • FDP_IFF.1: 19
    • FDP_IFF.2: 12
    • FDP_IFF.2.7: 1
    • FDP_ITC.1: 16
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 8
    • FDP_RIP: 12
    • FDP_RIP.1: 21
    • FDP_ROL: 3
    • FDP_ROL.1: 10
    • FDP_SDI.2: 9
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_AFL: 9
    • FIA_AFL.1: 9
    • FIA_ATD: 2
    • FIA_ATD.1: 9
    • FIA_UAU: 4
    • FIA_UAU.1: 11
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.3: 8
    • FIA_UAU.4: 7
    • FIA_UID: 7
    • FIA_UID.1: 14
    • FIA_UID.2: 6
    • FIA_USB.1: 10
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_LIM: 7
    • FMT_LIM.1: 20
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 20
    • FMT_LIM.2.1: 2
    • FMT_MSA: 23
    • FMT_MSA.1: 27
    • FMT_MSA.2: 21
    • FMT_MSA.3: 28
    • FMT_MTD: 4
    • FMT_MTD.1: 9
    • FMT_MTD.3: 8
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 16
    • FMT_SMF.1.1: 1
    • FMT_SMR: 11
    • FMT_SMR.1: 35
  • FPR:
    • FPR_UNO.1: 9
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_AMT: 3
    • FPT_AMT.1: 8
    • FPT_FLS: 8
    • FPT_FLS.1: 16
    • FPT_PHP: 4
    • FPT_PHP.3: 6
    • FPT_RVM: 3
    • FPT_RVM.1: 15
    • FPT_RVM.1.1: 1
    • FPT_SEP: 4
    • FPT_SEP.1: 14
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_TST.1: 9
    • FPT_TST.1.1: 2
    • FPT_TST.1.2: 2
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_FLT: 4
    • FRU_FLT.1: 2
    • FRU_FLT.2: 7
    • FRU_RSA: 1
    • FRU_RSA.1: 4
  • FTP:
    • FTP_ITC: 6
    • FTP_ITC.1: 13
pdf_data/st_keywords/cc_claims
  • A:
    • A.NETWORK: 1
    • A.PHYSICAL: 1
    • A.TRAINED_USERS: 1
    • A.TRUSTED_ADMIN: 1
  • D:
    • D.TSF: 4
    • D.USER: 17
  • O:
    • O.ACCESS_CONTROL: 7
    • O.ADMIN_ROLES: 4
    • O.AUDIT: 4
    • O.COMMS_PROTECTION: 11
    • O.FAX_NET_SEPARATION: 1
    • O.IMAGE_OVERWRITE: 1
    • O.KEY_MATERIAL: 1
    • O.PURGE_DATA: 3
    • O.STORAGE_ENCRYPTION: 6
    • O.TSF_SELF_TEST: 1
    • O.UPDATE_VERIFICATION: 2
    • O.USER_AUTHORIZATION: 7
  • OE:
    • OE.ADMIN_TRAINING: 1
    • OE.ADMIN_TRUST: 1
    • OE.NETWORK_PROTECTION: 1
    • OE.PHYSICAL_PROTECTION: 1
    • OE.USER_TRAINING: 1
  • T:
    • T.NET_COMPROMISE: 1
    • T.TSF_COMPROMISE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
  • A:
    • A.DLV_DATA: 1
    • A.DLV_PROTECT: 4
    • A.NATIVE: 10
    • A.NO: 1
    • A.NO-DELETION: 5
    • A.NO-INSTALL: 5
    • A.TEST_OPERATE: 6
    • A.USE_DIAG: 5
    • A.USE_KEY: 1
    • A.USE_KEYS: 4
    • A.VERIFICATION: 6
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 8
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 6
    • D.APP_KEY: 1
    • D.CRYPTO: 7
    • D.JAVA_OBJECT: 2
    • D.JCS_CODE: 3
    • D.JCS_DATA: 4
    • D.PIN: 14
    • D.SEC_DATA: 5
  • O:
    • O.ALARM: 5
    • O.CARD-MANAGEMENT: 9
    • O.CIPHER: 9
    • O.FAULT_PROTECT: 6
    • O.FIREWALL: 12
    • O.KEY-MNGT: 8
    • O.NATIVE: 7
    • O.OPERATE: 24
    • O.OS_DECEIVE: 9
    • O.PHYSICAL: 7
    • O.PIN-MNGT: 5
    • O.PROTECT_DATA: 18
    • O.REALLOCATION: 4
    • O.RESOURCES: 8
    • O.RND: 8
    • O.SCP: 29
    • O.SHRD_VAR_CONFID: 3
    • O.SHRD_VAR_INTEG: 7
    • O.SID: 10
    • O.SIDE_CHANNEL: 7
    • O.TRANSACTION: 5
    • O.XYZ: 1
  • OE:
    • OE.CARD-: 1
    • OE.CARD-MANAGEMENT: 2
    • OE.DEL_NOS: 4
    • OE.DEV_NOS: 3
    • OE.DLV_DATA: 5
    • OE.DLV_PROTECT: 3
    • OE.IC_ORG: 5
    • OE.NATIVE: 5
    • OE.NO-DELETION: 3
    • OE.NO-INSTALL: 4
    • OE.SCP: 8
    • OE.TEST_OPERATE: 5
    • OE.USE_DIAG: 6
    • OE.USE_KEY: 1
    • OE.USE_KEYS: 6
    • OE.VERIFICATION: 12
    • OE.XYZ: 1
  • OP:
    • OP.ARRAY_ACCESS: 3
    • OP.BYTECODE: 1
    • OP.CREATE: 8
    • OP.INSTANCE_FIELD: 1
    • OP.INVK_INTERFACE: 4
    • OP.INVK_VIRTUAL: 3
    • OP.JAVA: 6
    • OP.PUT: 5
    • OP.THROW: 3
    • OP.TYPE_ACCESS: 3
  • OSP:
    • OSP.IC_ORG: 4
  • R:
    • R.JAVA: 13
  • T:
    • T.ACCESS_DATA: 4
    • T.CONFID-APPLI-DATA: 5
    • T.CONFID-JCS-CODE: 4
    • T.CONFID-JCS-DATA: 5
    • T.DEL: 6
    • T.DEL_IC_NOS: 7
    • T.DEV_IC: 5
    • T.DEV_NOS: 6
    • T.EXE-CODE: 8
    • T.FAULT: 4
    • T.INTEG-: 1
    • T.INTEG-APPLI-CODE: 2
    • T.INTEG-APPLI-DATA: 5
    • T.INTEG-JCS-CODE: 4
    • T.INTEG-JCS-DATA: 3
    • T.LEAKAGE: 4
    • T.NATIVE: 6
    • T.OS: 3
    • T.OS_DECEIVE: 4
    • T.OS_OPERATE: 5
    • T.PHYSICAL: 4
    • T.RESOURCES: 4
    • T.RND: 4
    • T.SID: 9
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Philips:
    • Philips: 150
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 18
      • AES-128: 1
      • AES-256: 2
    • Rijndael:
      • Rijndael: 2
  • constructions:
    • MAC:
      • HMAC: 3
  • AES_competition:
    • AES:
      • AES: 20
  • DES:
    • 3DES:
      • 3DES: 2
      • Triple-DES: 5
      • TripleDES: 4
    • DES:
      • DES: 11
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-256: 7
      • SHA256: 5
  • SHA:
    • SHA1:
      • SHA-1: 7
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 5
  • MAC:
    • MAC: 4
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 3
  • TLS:
    • SSL:
      • SSL: 4
    • TLS:
      • TLS: 39
      • TLS 1.0: 1
      • TLS 1.1: 1
      • TLS 1.2: 5
      • TLS v1.2: 2
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 6
  • RNG:
    • RBG: 13
  • RNG:
    • RND: 13
    • RNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 7
  • CBC:
    • CBC: 6
  • ECB:
    • ECB: 4
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • FI:
    • Physical tampering: 2
    • fault injection: 1
    • malfunction: 4
    • physical tampering: 2
  • SCA:
    • DPA: 2
    • SPA: 1
    • physical probing: 4
    • side channel: 1
    • timing attacks: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS PUB 180-3: 1
    • FIPS PUB 186-4: 2
    • FIPS PUB 197: 2
    • FIPS PUB 198-1: 1
  • ISO:
    • ISO/IEC 10116: 6
    • ISO/IEC 18031:2011: 3
    • ISO/IEC 18033-3: 3
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-90A: 5
    • NIST SP 800-90B: 1
  • RFC:
    • RFC 2246: 1
    • RFC 2818: 4
    • RFC 4346: 1
    • RFC 5246: 3
  • BSI:
    • AIS 20: 14
    • AIS 31: 1
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
  • FIPS:
    • FIPS 180-1: 3
    • FIPS 197: 3
    • FIPS 46-3: 3
  • PKCS:
    • PKCS#1: 7
  • SCP:
    • SCP01: 1
    • SCP02: 1
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • Global Platform 2.1.1: 3
    • GlobalPlatform 2.1.1: 2
  • JavaCard:
    • Java Card 2.1.1: 3
    • Java Card 2.1.2: 1
    • Java Card 2.2: 3
    • Java Card 2.2.1: 9
    • JavaCard 2.2.1: 3
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 3
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
  • javacard:
    • javacard.framework: 2
    • javacard.framework.applet: 1
    • javacard.security: 4
  • javacardx:
    • javacardx.crypto: 4
    • javacardx.security: 1
pdf_data/st_metadata
  • /Author: Schilling
  • /CreationDate: D:20060828133033+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20060828192730+02'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /Title: Microsoft Word - ST-Lite_JCOP41_v10.doc
  • pdf_file_size_bytes: 565575
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 133
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different