Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
TOSHIBA e-STUDIO2555C/3055C/3555C/4555C/5055C/2555CSE/3055CSE/3555CSE/4555CSE/5055CSE MULTIFUNCTIONAL DIGITAL SYSTEMS Version: SYS V1.0
JISEC-CC-CRP-C0388
STARCOS 3.2 QES Version 2.1B
BSI-DSZ-CC-0648-2010
name TOSHIBA e-STUDIO2555C/3055C/3555C/4555C/5055C/2555CSE/3055CSE/3555CSE/4555CSE/5055CSE MULTIFUNCTIONAL DIGITAL SYSTEMS Version: SYS V1.0 STARCOS 3.2 QES Version 2.1B
category Multi-Function Devices Products for Digital Signatures
scheme JP DE
not_valid_after 01.05.2018 01.09.2019
not_valid_before 26.04.2013 03.09.2010
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0388_erpt2.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0648a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0388_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0648b_pdf.pdf
manufacturer Toshiba TEC Corporation G+D Mobile Security GmbH
manufacturer_web https://www.toshibatec.co.jp/en/ https://www.gi-de.com/de/de/mobile-security/
security_level ALC_FLR.2, EAL3+ EAL4+, AVA_MSU.3, AVA_VLA.4
dgst a7263024c5c36e3f b71d0524d2e9f5af
heuristics/cert_id JISEC-CC-CRP-C0388 BSI-DSZ-CC-0648-2010
heuristics/cert_lab [] BSI
heuristics/extracted_sars ALC_FLR.2, ADV_ARC.1, ADV_FSP.3, AGD_OPE.1, ALC_CMC.3, ATE_COV.2, ALC_CMS.3, AGD_PRE.1, ALC_DEL.1, ASE_SPD.1, ALC_LCD.1, ASE_OBJ.2, ASE_REQ.2, ADV_TDS.2, AVA_VAN.2, ATE_FUN.1, ASE_TSS.1, ALC_DVS.1, ATE_IND.2, ASE_CCL.1, ATE_DPT.1, ASE_ECD.1, ASE_INT.1 ATE_FUN.1, ATE_DPT.1, ADV_IMP.1, ADV_SPM.1, ALC_TAT.1, AVA_SOF.1, ADV_LLD.1, ALC_DVS.1, ADV_HLD.2, AGD_USR.1, AGD_ADM.1, ALC_LCD.1, ATE_IND.2, ADV_RCR.1, AVA_MSU.3, AVA_VLA.4, ADV_FSP.2, ATE_COV.2
heuristics/extracted_versions 1.0 3.2, 2.1
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0495-2009
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0495-2009, BSI-DSZ-CC-0456-2009, BSI-DSZ-CC-0223-2003, BSI-DSZ-CC-0169-2002
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0388
  • certification_date: 01.04.2013
  • claim: EAL3+ ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL3 Augmented with ALC_FLR.2
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0388_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Peripheral (MFP) that has the functions, such as copy, print, scan, filing, and internet fax. In general office environment, it is assumed that MFPs are utilized from the control panel of the TOE or the user terminal connected to LAN or USB with the TOE. TOE Security functions The TOE provides the following security features: - User Authentication function Function that allows the use of the TOE to only users who succeeded in the identification and authentication. - User Access Control function Function to perform the control of permit/ deny for the operation of various functions and user data, based on the privileges granted to the users who are identified and authenticated. - Secure Erase function Function to erase and overwrite the area in the HDD, where the document data has been stored, upon completion of copy function, etc. - Secure Channel function Function to protect communication data using the SSL protocol when the TOE communicates with the various servers or client PC. - Data Encryption function Function to encrypt and decrypt the document data stored in the HDD of the TOE. - Audit Data Generation and Review function Function to generate security audit log when security events occurred to be audited, and to allow only specific administrators to view that log. - TSF Data Protection function Function that allows the change of TOE configuration information only to the TOE administrator. - TSF Self Protection function Function to verify the integrity of the executable code of the security features. If any abnormalities are detected TOE will be unusable.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: TOSHIBA e-STUDIO2555C/3055C/ 3555C/4555C/5055C/2555CSE/3055CSE/ 3555CSE/4555CSE/5055CSE MULTIFUNCTIONAL DIGITAL SYSTEMS
    • product_type: Multifunction Peripheral
    • protection_profile: IEEE Std 2600.1-2009
    • report_link: https://www.ipa.go.jp/en/security/c0388_erpt2.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0388_est.pdf
    • toe_version: SYS V1.0
    • vendor: Toshiba Tec Corporation
  • expiration_date: 01.05.2018
  • supplier: Toshiba Tec Corporation
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0388_it2432.html
  • toe_overseas_name: TOSHIBA e-STUDIO 2555C/3055C/3555C/ 4555C/5055C/2555CSE/3055CSE/3555CSE/ 4555CSE/5055CSE MULTIFUNCTIONAL DIGITAL SYSTEMS SYS V1.0
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0322-2005
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0322-2005
heuristics/protection_profiles 32475ccb695b1644 40002c3611fc465f
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0006b.pdf
pdf_data/report_filename c0388_erpt2.pdf 0648a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0648-2010
    • cert_item: STARCOS 3.2 QES V2.1B
    • cert_lab: BSI
    • developer: Giesecke & Devrient GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0388-02: 1
    • Certification No. C0388: 1
  • DE:
    • BSI-DSZ-CC-0322: 1
    • BSI-DSZ-CC-0322-2005: 1
    • BSI-DSZ-CC-0437: 1
    • BSI-DSZ-CC-0495-2009: 6
    • BSI-DSZ-CC-0648-2010: 22
  • NL:
    • CC-437-2010: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0006-: 1
    • BSI-PP-0006-2002: 3
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 4
    • EAL3 augmented: 2
  • EAL:
    • EAL 4: 9
    • EAL 4 augmented: 3
    • EAL1: 6
    • EAL2: 3
    • EAL3: 4
    • EAL4: 9
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 4
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 1
    • ACM_CAP: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 2
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_HLD: 2
    • ADV_IMP: 2
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_USR: 2
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.1: 1
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_LCD.1: 1
    • ALC_TAT: 2
    • ALC_TAT.1: 1
  • APE:
    • APE_DES: 1
    • APE_ENV: 1
    • APE_INT: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SRE: 1
  • ASE:
    • ASE_DES: 1
    • ASE_ENV: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_PPC: 1
    • ASE_REQ: 1
    • ASE_SRE: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 2
    • ATE_DPT: 2
    • ATE_FUN: 2
    • ATE_IND: 5
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.3: 5
    • AVA_SOF: 3
    • AVA_VLA: 6
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 7
pdf_data/report_keywords/cc_sfr
  • FIA:
    • FIA_AFL.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • D:
    • D.CONF: 1
    • D.DOC: 2
    • D.FUNC: 1
    • D.PROT: 2
  • T:
    • T.CONF: 4
    • T.DOC: 4
    • T.FUNC: 2
    • T.PROT: 2
  • OE:
    • OE.HI_VAD: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • GD:
    • Giesecke & Devrient: 11
  • Infineon:
    • Infineon: 2
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 3
  • TUV:
    • TÜV Informationstechnik: 6
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • AES_competition:
    • HPC:
      • HPC: 4
  • DES:
    • 3DES:
      • TDES: 1
    • DES:
      • DES: 2
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA2048: 3
pdf_data/report_keywords/hash_function
  • RIPEMD:
    • RIPEMD: 1
    • RIPEMD-160: 2
  • SHA:
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 2
      • SHA-512: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 8
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • FI:
    • malfunction: 1
    • physical tampering: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
    • BSI TR-03116: 2
pdf_data/report_keywords/os_name
  • STARCOS:
    • STARCOS: 1
    • STARCOS 3: 31
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • FIPS:
    • FIPS PUB 197: 1
  • BSI:
    • AIS 20: 2
    • AIS 25: 3
    • AIS 26: 3
    • AIS 31: 2
    • AIS 32: 1
    • AIS 34: 3
    • AIS 35: 2
    • AIS 36: 5
    • AIS 38: 1
  • ISO:
    • ISO/IEC 15408:2005: 3
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • a user to create an e-Filing Box. Specific users or TOE administrators can save, print and edit confidential documents. Internet Fax function A function that allows scanned document data to be sent as a TIFF-FX: 1
  • OutOfScope:
    • out of scope: 1
    • that the reliability of the hardware and the cooperating software shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. CRP-C0388-02 12 4.3 Clarification of Scope: 1
  • ConfidentialDocument:
    • Body for IT Security of TÜV Informationstechnik GmbH (confidential document) [8] Configuration list for the TOE, Version 1.4, 2010-04-09, Configuration List STARCOS 3.2 QES V2: 1
    • Certification Report Evaluation Body for IT Security of TÜV Informationstechnik GmbH (confidential document) [12] Administrator guidance STARCOS 3.2 HBA; STARCOS 3.2 QES V2, Version 1.3, 2009-12-04, G & D: 1
    • ETR-LITE) BSI-DSZ-CC-0437, Evaluation Body for IT Security of TÜV Informationstechnik GmbH (confidential document) [21] STARCOS 3.2 SmartCard Operating System Reference Manual, Edition 09.2009, G & D 25 / 38: 1
    • Version 1.4, 2010-04-08, Security Target STARCOS 3.2 QES V2.1B, Giesecke & Devrient GmbH (confidential document) [7] Evaluation Technical Report, Version 4, 2010-07-22, Evaluation Technical Report (ETR: 1
    • confidential document) [9] Security Target BSI-DSZ-CC-0648-2010, Version 1.4, 2010-04-08, Security Target Lite STARCOS 3: 1
pdf_data/report_metadata
  • /CreationDate: D:20130619094434+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130619094506+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 367918
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 37
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20101028094035+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, STARCOS 3.2 QES V2.1B, Giesecke & Devrient GmbH, Secure Signature Creation Device (SSCD)"
  • /ModDate: D:20101028094321+02'00'
  • /Producer: OpenOffice.org 3.1
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0648-2010
  • pdf_file_size_bytes: 816070
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
pdf_data/st_filename c0388_est.pdf 0648b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10340-2009: 1
  • DE:
    • BSI-DSZ-CC-0322-: 1
    • BSI-DSZ-CC-0322-2005: 2
    • BSI-DSZ-CC-0322-2005-MA-04: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0006-2002: 1
    • BSI-PP-0002-2001: 2
    • BSI-PP-0006-2002: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 3: 1
    • EAL 3 augmented: 1
    • EAL3: 2
    • EAL3 augmented: 1
  • EAL:
    • EAL 4: 21
    • EAL4: 7
    • EAL4 augmented: 2
    • EAL4+: 5
    • EAL5+: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 4
    • ALC_LCD.1: 1
  • APE:
    • APE_REQ: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ACM:
    • ACM_AUT.1: 3
    • ACM_CAP.3: 1
    • ACM_CAP.4: 2
    • ACM_SCP.2: 3
  • ADO:
    • ADO_DEL.2: 4
    • ADO_IGS.1: 5
  • ADV:
    • ADV_FSP.1: 10
    • ADV_FSP.2: 3
    • ADV_HLD.1: 2
    • ADV_HLD.2: 4
    • ADV_IMP.1: 6
    • ADV_LLD.1: 5
    • ADV_RCR.1: 5
    • ADV_SPM.1: 3
  • AGD:
    • AGD_ADM.1: 10
    • AGD_USR.1: 8
  • ALC:
    • ALC_DVS.1: 4
    • ALC_LCD.1: 2
    • ALC_TAT.1: 5
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.1: 1
    • ATE_FUN.1: 5
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.3: 9
    • AVA_SOF: 1
    • AVA_SOF.1: 3
    • AVA_VLA.4: 10
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 18
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 9
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 11
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 9
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.4: 2
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 37
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 29
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC: 1
    • FDP_IFC.1: 2
    • FDP_IFF: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 10
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 13
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 10
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 19
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 8
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 12
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 22
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 22
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 26
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 2
    • FPT_FDI_EXP.1: 14
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
    • FPT_TST.1: 8
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 9
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM: 8
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 2
    • FCS_CKM.3: 2
    • FCS_CKM.4: 14
    • FCS_COP: 12
    • FCS_COP.1: 9
  • FDP:
    • FDP_ACC: 25
    • FDP_ACC.1: 15
    • FDP_ACC.1.1: 1
    • FDP_ACF: 26
    • FDP_ACF.1: 17
    • FDP_ETC: 5
    • FDP_ETC.1: 3
    • FDP_ITC: 7
    • FDP_ITC.1: 7
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 2
    • FDP_SDI: 10
    • FDP_SDI.2: 6
    • FDP_UIT: 18
    • FDP_UIT.1: 11
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 2
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 1
    • FIA_UID: 1
    • FIA_UID.1: 8
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 3
    • FMT_MSA: 9
    • FMT_MSA.1: 8
    • FMT_MSA.2: 10
    • FMT_MSA.2.1: 3
    • FMT_MSA.3: 12
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 3
    • FMT_MTD.1.1: 3
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 3
    • FMT_SMR: 1
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_AMT.1: 6
    • FPT_AMT.1.1: 2
    • FPT_FLS: 1
    • FPT_FLS.1: 5
    • FPT_FLS.1.1: 2
    • FPT_PHP: 1
    • FPT_PHP.1: 5
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 4
    • FPT_PHP.3.1: 2
    • FPT_RVM: 1
    • FPT_RVM.1: 8
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 9
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_TRP: 1
    • FPT_TST: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 19
    • FTP_ITC.1: 16
    • FTP_TRP: 9
    • FTP_TRP.1: 8
pdf_data/st_keywords/cc_claims
  • A:
    • A: 2
    • A.ACCESS: 3
    • A.ADMIN: 6
    • A.USER: 3
  • D:
    • D.CONF: 7
    • D.DOC: 48
    • D.FUNC: 12
    • D.PROT: 6
  • O:
    • O.AUDIT: 7
    • O.AUDIT_ACCESS: 5
    • O.AUDIT_ACCESS_AUTHORIZED: 1
    • O.AUDIT_STORAGE: 6
    • O.AUDIT_STORAGE_PROTECTED: 1
    • O.CONF: 14
    • O.CRYPTOGRAPHY: 7
    • O.DOC: 23
    • O.FUNC: 7
    • O.INTERFACE: 7
    • O.PROT: 7
    • O.SOFTWARE: 5
    • O.USER: 11
  • OE:
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 1
    • OE.AUDIT_STRAGE: 1
    • OE.INTERFACE: 3
    • OE.PHYISCAL: 1
    • OE.PHYSICAL: 2
    • OE.USER: 12
  • T:
    • T.CONF: 6
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
  • A:
    • A.CGA: 3
    • A.SCA: 3
  • OE:
    • OE.HI_VAD: 6
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 4
    • Microsoft Corporation: 1
  • GD:
    • G&D: 8
    • Giesecke & Devrient: 7
  • Infineon:
    • Infineon: 5
    • Infineon Technologies AG: 4
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • DES:
      • DES: 3
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA 2048: 3
    • RSA2048: 2
pdf_data/st_keywords/hash_function
  • RIPEMD:
    • RIPEMD-160: 2
    • RIPEMD160: 1
  • SHA:
    • SHA2:
      • SHA-2: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 15
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
  • FI:
    • DFA: 1
    • physical tampering: 9
  • SCA:
    • DPA: 1
    • SPA: 1
    • timing attacks: 1
pdf_data/st_keywords/os_name
  • STARCOS:
    • STARCOS: 68
    • STARCOS 3: 103
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 1
  • BSI:
    • AIS 20: 1
    • AIS 31: 1
    • AIS 32: 1
    • AIS20: 1
    • AIS31: 1
  • FIPS:
    • FIPS PUB 46-3: 1
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 9796-1: 1
    • ISO/IEC 9796-2: 1
  • PKCS:
    • PKCS#1: 3
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • e-Filing that each user can create. It is suitable for specific users or U.ADMINISTRATOR to store confidential documents. In addition user can operate various functions to the document such as print/edit/manage, etc. (5: 1
pdf_data/st_metadata
  • /Author: TOSHIBA TEC CORPORATION
  • /CreationDate: D:20130417131602+09'00'
  • /Creator: Microsof Word 2010
  • /Keywords: IEEE 2600.1™-2009 EAL3+ALC_FLR.2
  • /ModDate: D:20130417135319+09'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Security Target
  • /Title: SecurityTarget
  • pdf_file_size_bytes: 1417924
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 65
  • /Author: Giesecke & Devrient GmbH
  • /Comments: SSCD STARCOS Signature smart card
  • /Company: Giesecke & Devrient
  • /CreationDate: D:20100604140802+02'00'
  • /Creator: Acrobat PDFMaker 8.1 für Word
  • /Keywords: SSCD Signature smart card
  • /ModDate: D:20100604142016+02'00'
  • /Producer: Acrobat Distiller 8.1.0 (Windows)
  • /SourceModified: D:20100604120739
  • /Subject: STARCOS 3.2 QES V2.1B
  • /Title: Security Target Lite
  • pdf_file_size_bytes: 537374
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 72
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different