name |
Ricoh Aficio MP C4501A/C4501AG/C5501A/C5501AG, Savin C9145A/C9145AG/C9155A/C9155AG, Lanier LD645CA/LD645CAG/LD655CA/LD655CAG, Lanier MP C4501A/C5501A, nashuatec MP C4501A/C5501A, Rex-Rotary MP C4501A/C5501A, Gestetner MP C4501A/C5501A, infotec MP C4501A/C5501A all of above with Fax Option Type C5501 Version: - Software version: System/Copy 2.02, Network Support 10.54, Scanner 01.11.1, Printer 1.01, Fax 02.01.00, RemoteFax 01.00.00, Web Support 1.06, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, PCL 1.02, OptionPCLFont 1.02, Engine 1.03:03, OpePanel 1.06, LANG0 1.06, LANG1 1.06, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-21(WW) 03.00.00
|
NXP JCOP 8.9 with eUICC extension on SN300 Secure Element, version JCOP-eUICC 8.9 R1.06.00.1.2, NXP JCOP 8.9 with eUICC extension on SN300 Secure Element, version JCOP-eUICC 8.9 R1.06.01.1.2
|
category |
Multi-Function Devices
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2011-10-14
|
2023-12-14
|
not_valid_after |
2016-11-02
|
2028-12-14
|
scheme |
JP
|
NL
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0326_est.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300100-01-ST-Lite_v1.2.pdf
|
status |
archived
|
active
|
manufacturer |
Ricoh Company, Ltd.
|
NXP Semiconductors Germany GmbH
|
manufacturer_web |
https://www.ricoh.com/
|
https://www.nxp.com
|
security_level |
ALC_FLR.2, EAL3+ |
ALC_DVS.2, AVA_VAN.5, EAL4+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0326_erpt.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300100-01-CR.pdf
|
cert_link |
None
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300100-01.1-Cert.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': frozenset({'IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009'})}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Embedded UICC for Consumer Devices Protection Profile', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0100b_pdf.pdf', 'pp_ids': frozenset({'UICC_CD'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card System - Open Configuration Protection Profile', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0099V2b_pdf.pdf', 'pp_ids': None}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
False
|
True
|
state/cert/download_ok |
False
|
True
|
state/cert/extract_ok |
False
|
True
|
state/cert/pdf_hash |
None
|
2e51d3b780d02b4f7c6a2113878a3b00a2f0b0611fca7a8e8f4f32b76d74fbfe
|
state/cert/txt_hash |
None
|
c80e7978fbeab20819fd3bdca57e81da00606a24708dbd44bf8dd8fe6c593bdb
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
252a178ccb72e64f535c9147a6fb71c0e31a579a010b911ac64a1478eb1e6686
|
a12531a543f222af422a146957919104ecbc9b44535a9ce45c102afd73717126
|
state/report/txt_hash |
fb129c5bbc4625dfa8b090c75d8feb1892ef4b0ef884ea660c8a27d09efc0a2d
|
e9f5c26d50e032ec1349f52099261842f9007c58a8b8d1f9b98ef076cfe38db4
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
fb7c746877a5d9314ecb8c5cf13a6d3ada3288f3f147567af3143726c6083f16
|
978ce29914920008382b554f515cea7be7b20af3dd6dbd1b70849799668f2144
|
state/st/txt_hash |
d33eb79ae952566da600451a5cb2547344e44bac7030689ec6ceb573f1c1d2c0
|
dce0fe0d0a01335e8060bcb8029a8ceb6e009f8a7c64713c072a7c89e9f1ec8b
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
JISEC-CC-CRP-C0326
|
NSCIB-CC-2300100-01-CR
|
heuristics/cert_lab |
None
|
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
10.54, 01.11.1, 1.01, 1.02, 02.01.00, 2.02, 1.06, 1.03, 03.00.00, 1.00, 01.00.00 |
8.9, 1.06.00.1.2, 1.06.01.1.2 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
None
|
heuristics/report_references/directly_referencing |
None
|
NSCIB-CC-2300083-01-CR |
heuristics/report_references/indirectly_referenced_by |
None
|
None
|
heuristics/report_references/indirectly_referencing |
None
|
NSCIB-CC-2300083-01-CR |
heuristics/scheme_data |
- cert_id:
C0326
- supplier:
RICOH COMPANY, LTD.
- toe_overseas_name:
Ricoh Aficio MP C4501A/C4501AG/C5501A/C5501AG, Savin C9145A/C9145AG/C9155A/C9155AG, Lanier LD645CA/LD645CAG/LD655CA/LD655CAG, Lanier MP C4501A/C5501A, nashuatec MP C4501A/C5501A, Rex-Rotary MP C4501A/C5501A, Gestetner MP C4501A/C5501A, infotec MP C4501A/C5501A
all of above with Fax Option Type C5501
- Software version: System/Copy 2.02, Network Support 10.54, Scanner 01.11.1, Printer 1.01, Fax 02.01.00, RemoteFax 01.00.00, Web Support 1.06, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, PCL 1.02, < Cont. >
- expiration_date:
2016-11
- claim:
EAL3+
ALC_FLR.2
PP
- certification_date:
2011-10
- toe_overseas_link:
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0326_it1342.html
- toe_japan_name:
-----
- enhanced:
- product:
Ricoh Aficio MP C4501A/C4501AG/C5501A/C5501AG, Savin C9145A/C9145AG/C9155A/C9155AG, Lanier LD645CA/LD645CAG/LD655CA/LD655CAG, Lanier MP C4501A/C5501A, nashuatec MP C4501A/C5501A, Rex-Rotary MP C4501A/C5501A, Gestetner MP C4501A/C5501A, infotec MP C4501A/C5501A all of above with Fax Option Type C5501
- toe_version:
-Software version:
System/Copy 2.02
Network Support 10.54
Scanner 01.11.1
Printer 1.01
Fax 02.01.00
RemoteFax 01.00.00
Web Support 1.06
Web Uapl 1.01
NetworkDocBox 1.01
animation 1.00
PCL 1.02
OptionPCLFont 1.02
Engine 1.03:03
OpePanel 1.06
LANG0 1.06
LANG1 1.06
Data Erase Std 1.01x
-Hardware version:
Ic Key 01020700
Ic Ctlr 03
-Option version:
GWFCU3-21(WW) 03.00.00
- product_type:
Multi Function Product
- certification_date:
2011-10-14
- cc_version:
3.1
- assurance_level:
EAL3 Augmented with ALC_FLR.2
- protection_profile:
IEEE Std 2600.1-2009
- vendor:
RICOH COMPANY, LTD.
- evaluation_facility:
Electronic Commerce Security Technology Laboratory Inc.
Evaluation Center
- report_link:
https://www.ipa.go.jp/en/security/c0326_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0326_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0326_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions.
TOE security functionality
The major security functions of this TOE are as follows:
-
Audit Function: Enables the TOE to record information related to security events and allows users to review it.
-
Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout.
-
Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs.
-
Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user.
-
Network Protection Function: Enables the TOE to protect network communications using encryption.
-
Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern.
-
Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption.
-
Security Management Function: Enables the TOE administrator to control security functions.
-
Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software.
-
Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
|
None
|
heuristics/st_references/directly_referenced_by |
None
|
None
|
heuristics/st_references/directly_referencing |
None
|
NSCIB-CC-2300083-01-CR |
heuristics/st_references/indirectly_referenced_by |
None
|
None
|
heuristics/st_references/indirectly_referencing |
None
|
NSCIB-CC-2300083-01-CR |
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
NSCIB-CC-2300100-01.1-Cert.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
- cc_cert_id:
- NL:
- NSCIB-CC-2300100-01:
1
- NSCIB-2300100-01:
1
- cc_protection_profile_id:
- BSI:
- BSI-CC-PP-0099-V2-2020:
1
- cc_security_level:
- EAL:
- EAL4:
1
- EAL2:
1
- EAL7:
1
- EAL4 augmented:
1
- cc_sar:
- ALC:
- ALC_DVS.2:
1
- ALC_FLR.3:
1
- ALC_FLR:
1
- AVA:
- cc_sfr:
- cc_claims:
- vendor:
- NXP:
- NXP Semiconductors:
1
- NXP:
2
- eval_facility:
- TUV:
- TÜV Informationstechnik:
1
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- ISO:
- ISO/IEC 15408-1:
2
- ISO/IEC 18045:
4
- ISO/IEC 18045:2008:
1
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
pdf_data/cert_metadata |
None
|
- pdf_file_size_bytes:
93017
- pdf_is_encrypted:
False
- pdf_number_of_pages:
1
- /Title:
NSCIB Certificate
- /Author:
Haak
- /Creator:
Microsoft® Word 2021
- /CreationDate:
D:20231218225328+00'00'
- /ModDate:
D:20231218225328+00'00'
- /Producer:
Microsoft® Word 2021
- pdf_hyperlinks:
|
pdf_data/report_filename |
c0326_erpt.pdf
|
NSCIB-CC-2300100-01-CR.pdf
|
pdf_data/report_frontpage |
|
- NL:
- cert_id:
NSCIB-CC-2300100-01-CR
- cert_item:
NXP JCOP 8.9 with eUICC extension on SN300 Secure Element, version JCOP-eUICC 8.9 R1.06.00.1.2, NXP JCOP 8.9 with eUICC extension on SN300 Secure Element, version JCOP-eUICC 8.9 R1.06.01.1.2
- developer:
NXP Semiconductors Germany GmbH
- cert_lab:
TÜV Informationstechnik GmbH
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0326-01:
1
- Certification No. C0326:
1
|
- NL:
- NSCIB-CC-2300100-01-CR:
13
- NSCIB-2300100-01:
3
- NSCIB-2300083-01-CR:
1
- NSCIB-2300083-01:
1
|
pdf_data/report_keywords/cc_claims |
- T:
- T.DOC:
2
- T.FUNC:
1
- T.PROT:
1
- T.CONF:
2
- A:
- A.ACCESS:
1
- A.USER:
1
- A.ADMIN:
2
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0099-V2-2020:
1
- BSI-CC-PP-0100-2018:
1
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL3:
4
- EAL3 augmented:
1
|
- EAL4:
2
- EAL4+:
1
- EAL 4:
1
- EAL4 augmented:
1
- EAL 4 augmented:
1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik:
2
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224:
1
- SHA-256:
1
- SHA-384:
1
- SHA-512:
1
- SHA3:
- SHA3-224:
1
- SHA3-256:
1
- SHA3-384:
1
- SHA3-512:
1
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
- JavaCard:
- GlobalPlatform:
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001:
2
- CCMB-2009-07-002:
2
- CCMB-2009-07-003:
2
- CCMB-2009-07-004:
2
|
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES |
1
|
3
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP:
29
- NXP Semiconductors:
4
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
363333
- pdf_is_encrypted:
True
- pdf_number_of_pages:
42
- /CreationDate:
D:20111219165407+09'00'
- /Creator:
Microsoft® Word 2010
- /ModDate:
D:20111219165510+09'00'
- /Producer:
Microsoft® Word 2010
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
303044
- pdf_is_encrypted:
False
- pdf_number_of_pages:
13
- /Title: Certification Report
- /Author: sjon
- /Creator:
Microsoft® Word 2021
- /CreationDate:
D:20231215215207+00'00'
- /ModDate:
D:20231215215207+00'00'
- /Producer:
Microsoft® Word 2021
- pdf_hyperlinks:
https://www.sogis.eu/, http://www.commoncriteriaportal.org/, https://trustcb.com/common-criteria/nscib/, https://nscib.nl/, mailto:[email protected]
|
pdf_data/report_metadata//CreationDate |
D:20111219165407+09'00'
|
D:20231215215207+00'00'
|
pdf_data/report_metadata//Creator |
Microsoft® Word 2010
|
Microsoft® Word 2021
|
pdf_data/report_metadata//ModDate |
D:20111219165510+09'00'
|
D:20231215215207+00'00'
|
pdf_data/report_metadata//Producer |
Microsoft® Word 2010
|
Microsoft® Word 2021
|
pdf_data/report_metadata/pdf_file_size_bytes |
363333
|
303044
|
pdf_data/report_metadata/pdf_hyperlinks |
|
https://www.sogis.eu/, http://www.commoncriteriaportal.org/, https://trustcb.com/common-criteria/nscib/, https://nscib.nl/, mailto:[email protected] |
pdf_data/report_metadata/pdf_is_encrypted |
True
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
42
|
13
|
pdf_data/st_filename |
c0326_est.pdf
|
NSCIB-CC-2300100-01-ST-Lite_v1.2.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- NL:
- NSCIB-2300100-01:
1
- NSCIB-2300083-01:
1
|
pdf_data/st_keywords/cc_claims |
- O:
- O.STORAGE:
14
- O.RCGATE:
13
- O.DOC:
18
- O.FUNC:
9
- O.PROT:
9
- O.CONF:
18
- O.USER:
21
- O.INTERFACE:
9
- O.SOFTWARE:
9
- O.AUDIT:
9
- T:
- T.DOC:
10
- T.FUNC:
5
- T.PROT:
5
- T.CONF:
10
- A:
- A.ACCESS:
5
- A.USER:
4
- A.ADMIN:
10
- OE:
- OE.AUDIT_STORAGE:
3
- OE.AUDIT_ACCESS:
2
- OE.INTERFACE:
4
- OE.PHYSICAL:
4
- OE.USER:
21
- OE.ADMIN:
8
- OE.AUDIT:
3
- OE.AUDIT_ACCESS_AUTHORIZED:
1
|
- D:
- D.UPDATE_IMAGE:
26
- D.APP_CODE:
6
- D.APP_C_DATA:
4
- D.APP_I_DATA:
7
- D.APP_KEYS:
9
- D.PIN:
10
- D.APSD_KEYS:
5
- D.ISD_KEYS:
4
- D.VASD_KEYS:
3
- D.CARD_MNGT_:
1
- D.API_DATA:
3
- D.CRYPTO:
6
- D.JCS_CODE:
7
- D.JCS_DATA:
8
- D.SEC_DATA:
6
- D.CONFIG_ITEM:
7
- D.RESTRICTED_:
1
- D.TOE_IDENTIFIER:
3
- D.APP_C_:
1
- D.CARD_:
1
- D.CARD_MNGT_DATA:
1
- D.APP_:
1
- D.JCS_:
1
- D.RESTRICTED_MODE_STATE:
1
- D.TOE_IDENTIFICATION:
2
- D.SECRETS:
2
- D.SK:
2
- D.MNO_KEYS:
2
- D.PROFILE_NAA_PRAMS:
1
- D.PROFILE_NAA_PARAMS:
2
- O:
- O.REMOTE:
1
- O.BIO-MNGT:
1
- O.EXT-MEM:
1
- O.SENSITIVE_ARRAYS_INTEG:
1
- O.SENSITIVE_RESULTS_INTEG:
1
- O.LOAD:
3
- O.INSTALL:
2
- O.DELETION:
3
- O.APPLET:
15
- O.CODE_CAP_FILE:
11
- O.JAVAOBJECT:
67
- O.APPLET_LOADED:
2
- O.APPLET_CURRENT:
2
- O.CODE_CAP_:
2
- T:
- T.RND:
5
- T.CONFID-UPDATE-IMAGE:
3
- T.INTEG-UPDATE-IMAGE:
3
- T.UNAUTH-LOAD-UPDATE-IMAGE:
3
- T.INTERRUPT-OSU:
4
- T.CONFIG:
4
- T.COM_EXPLOIT:
4
- T.LIFE_CYCLE:
4
- T.UNAUTHORIZED_CARD_MNGT:
3
- T.INTEG-APPLI-DATA:
13
- T.RESTRICTED-MODE:
3
- T.CONFID-CONT:
4
- T.INTEG-CONT:
3
- T.EXE-CONT:
4
- T.CONT-DOS:
4
- T.CONT-SID:
4
- T.INTEG-CODE:
1
- T.INSTALL:
3
- T.DELETION:
3
- T.EXE-CODE-REMOTE:
1
- T.CONFID-APPLI-DATA:
3
- T.CONFID-JCS-CODE:
4
- T.INTEG-JCS-CODE:
4
- T.CONFID-JCS-DATA:
4
- T.INTEG-JCS-DATA:
4
- T.INTEG-APPLI-CODE:
5
- T.EXE-CODE:
8
- T.NATIVE:
4
- T.SID:
8
- T.CONFID-APPLI-DA:
1
- T.INTEG-APPLI-COD:
2
- T.RESOURCES:
3
- T.UNAUTHORIZED_:
1
- T.OBJ-DELETION:
2
- T.PHYSICAL:
2
- T.CONFID-UPDATE-I:
1
- T.UNAUTH-LOAD-UP:
1
- T.INTEG-UPDATE-IM:
1
- T.RESTRICTED-MOD:
1
- T.CONFID-:
1
- T.INTEG-APPLI-:
1
- A:
- A.USE_DIAG:
5
- A.USE_KEYS:
5
- A.PROCESS-SEC-IC:
4
- A.APPS-PROVIDER:
4
- A.VERIFICATION-AUTHORITY:
4
- A.TRUSTED-GUESTOS:
3
- A.APPS-:
1
- A.DELETION:
1
- A.CAP_FILE:
3
- A.VERIFICATION:
2
- A.TRUSTED-GUESTO:
1
- A.VERIFICATION-AU:
1
- R:
- OT:
- OT.IDENTIFICATION:
5
- OT.CONFID-UPDATE-IMAGE:
3
- OT.AUTH-LOAD-UPDATE-IMAGE:
3
- OT.SECURE_LOAD_ACODE:
3
- OT.SECURE_AC_ACTIVATION:
3
- OT.TOE_IDENTIFICATION:
3
- OT.CARD-CONFIGURATION:
3
- OT.ATTACK-COUNTER:
3
- OT.RESTRICTED-MODE:
3
- OT.DOMAIN-RIGHTS:
7
- OT.APPLI-AUTH:
8
- OT.COMM_AUTH:
6
- OT.COMM_INTEGRITY:
3
- OT.COMM_CONFIDENTIALITY:
3
- OT.CONT_SEP:
8
- OT.CONT_PRIV:
6
- OT.CONT_DOS:
4
- OT.RND:
5
- OT.SCP:
34
- OT.CARD-MANAGEMENT:
3
- OT.CARD-:
3
- OT.INSTALL:
1
- OT.LOAD:
1
- OT.DELETION:
1
- OT.SENSITIVE_RESULTS_INTEG:
3
- OT.FIREWALL:
10
- OT.SID:
8
- OT.GLOBAL_:
6
- OT.ARRAY_VIEWS_:
4
- OT.SENSITIVE_:
2
- OT.NATIVE:
6
- OT.OPERATE:
20
- OT.REALLOCATION:
4
- OT.RESOURCES:
5
- OT.ALARM:
14
- OT.CIPHER:
4
- OT.KEY-MNGT:
4
- OT.PIN-MNGT:
4
- OT.TRANSACTION:
4
- OT.OBJ-DELETION:
3
- OT.COMM_:
5
- OT.CARD-MANAGEM:
16
- OT.CONFID-UPDATE-:
2
- OT.AUTH-LOAD-UPD:
2
- OT.SECURE_LOAD_:
4
- OT.SECURE_AC_:
2
- OT.TOE_:
2
- OT.CARD-CONFIGUR:
2
- OT.ATTACK-COUNT:
1
- OT.RESTRICTED-MO:
3
- OT.ATTACK-COUNTE:
1
- OT.GLOBAL_ARRAYS_CONFID:
1
- OT.GLOBAL_ARRAYS_INTEG:
1
- OT.ARRAY_VIEWS_CONFID:
1
- OT.ARRAY_VIEWS_INTEG:
1
- OT.CONT-SEP:
1
- OT.CONT-PRIV:
1
- OT.CONT-DOS:
1
- OT.SECURE-CHANNELS:
1
- OT.INTERNALSECURE-CHANNELS:
1
- OP:
- OP.ARRAY_ACCESS:
4
- OP.ARRAY_LENGTH:
3
- OP.ARRAY_T_ALOAD:
3
- OP.ARRAY_:
1
- OP.ARRAY_AASTORE:
3
- OP.CREATE:
7
- OP.DELETE_APPLET:
4
- OP.DELETE_CAP_:
2
- OP.INSTANCE_FIELD:
3
- OP.INVK_VIRTUAL:
6
- OP.INVK_INTERFACE:
7
- OP.JAVA:
5
- OP.THROW:
5
- OP.TYPE_ACCESS:
5
- OP.PUT:
6
- OP.READ_CONFIG_:
1
- OP.MODIFY_:
1
- OP.USE_CONFIG_:
1
- OP.TRIGGER_:
1
- OP.CONT_ACCESS:
7
- OP.ARRAY_T_ASTORE:
2
- OP.PUTFIELD:
1
- OP.PUTSTATIC:
1
- OP.DELETE_CAP_FILE:
2
- OP.DELETE_CAP_FILE_APPLET:
2
- OP.TRIGGER_UPDATE:
3
- OE:
- OE.USE_DIAG:
5
- OE.USE_KEYS:
5
- OE.CAP_FILE:
5
- OE.VERIFICATION:
17
- OE.CODE-EVIDENCE:
13
- OE.SCP:
16
- OE.CARD-MANAGEMENT:
1
- OE.PROCESS_SEC_IC:
2
- OE.CONFID-UPDATE-IMAGE:
2
- OE.APPS-PROVIDER:
4
- OE.VERIFICATION-AUTHORITY:
2
- OE.KEY-CHANGE:
5
- OE.SECURITY-DOMAINS:
1
- OE.TRUSTED-GUESTOS:
2
- OE.SECURITY-:
1
- OE.IC:
3
- OE.RE:
7
- OE.CARD-:
2
- OE.TRUSTED-GUEST:
1
- OE.VERIFICATION-A:
2
- OE.SECURITY-DOMA:
2
- OE.PROCESS_SEC_:
2
- OE.CONFID-UPDATE-:
2
- OE.TRUSTED-GUES:
1
- SA:
- SA.CONFID-UPDATE:
1
- SA.CONFID-APPLI-D:
1
- SA.CONFID-JCS-CO:
1
- SA.CONFID-JCS-DAT:
1
- SA.INTEG-UPDATE-I:
1
- SA.INTEG-APPLI-CO:
1
- SA.INTEG-APPLI-DA:
1
- SA.INTEG-JCS-CODE:
3
- SA.EXE-APPLI-CODE:
3
- SA.EXE-JCS-CODE:
3
- SA.NATIVE:
4
- SA.FIREWALL:
2
- SA.VERIFICATION:
3
- SA.CARD-MANAGEM:
1
- SA.INSTALL:
2
- SA.SID:
3
- SA.OBJ-DELETION:
3
- SA.DELETION:
1
- SA.ALARM:
2
- SA.OPERATE:
2
- SA.RESOURCES:
3
- SA.CIPHER:
2
- SA.KEY-MNGT:
2
- SA.PIN-MNGT:
2
- SA.SCP:
5
- SA.TRANSACTION:
2
- SA.CONFIG-APPLET:
1
- SA.OSU:
1
- SA.RM:
1
- SA.CONTEXT-SEPAR:
1
- SA.CONFID-APPLI-DATA:
1
- SA.CONFID-JCS-CODE:
1
- SA.CONFID-JCS-DATA:
1
- SA.INTEG-APPLI-CODE:
2
- SA.INTEG-APPLI-DATA:
2
- SA.INTEG-JCS-DATA:
1
- SA.CONFID-UPDATE-IMAGE:
1
- SA.INTEG-UPDATE-IMAGE:
1
- OSP:
- OSP.PROCESS-TOE:
4
- OSP.KEY-CHANGE:
4
- OSP.SECURITY-DOMAINS:
3
- OSP.VERIFICATION:
2
- OSP.SECURITY-DOM:
1
|
pdf_data/st_keywords/cc_claims/A |
- A.ACCESS:
5
- A.USER:
4
- A.ADMIN:
10
|
- A.USE_DIAG:
5
- A.USE_KEYS:
5
- A.PROCESS-SEC-IC:
4
- A.APPS-PROVIDER:
4
- A.VERIFICATION-AUTHORITY:
4
- A.TRUSTED-GUESTOS:
3
- A.APPS-:
1
- A.DELETION:
1
- A.CAP_FILE:
3
- A.VERIFICATION:
2
- A.TRUSTED-GUESTO:
1
- A.VERIFICATION-AU:
1
|
pdf_data/st_keywords/cc_claims/O |
- O.STORAGE:
14
- O.RCGATE:
13
- O.DOC:
18
- O.FUNC:
9
- O.PROT:
9
- O.CONF:
18
- O.USER:
21
- O.INTERFACE:
9
- O.SOFTWARE:
9
- O.AUDIT:
9
|
- O.REMOTE:
1
- O.BIO-MNGT:
1
- O.EXT-MEM:
1
- O.SENSITIVE_ARRAYS_INTEG:
1
- O.SENSITIVE_RESULTS_INTEG:
1
- O.LOAD:
3
- O.INSTALL:
2
- O.DELETION:
3
- O.APPLET:
15
- O.CODE_CAP_FILE:
11
- O.JAVAOBJECT:
67
- O.APPLET_LOADED:
2
- O.APPLET_CURRENT:
2
- O.CODE_CAP_:
2
|
pdf_data/st_keywords/cc_claims/OE |
- OE.AUDIT_STORAGE:
3
- OE.AUDIT_ACCESS:
2
- OE.INTERFACE:
4
- OE.PHYSICAL:
4
- OE.USER:
21
- OE.ADMIN:
8
- OE.AUDIT:
3
- OE.AUDIT_ACCESS_AUTHORIZED:
1
|
- OE.USE_DIAG:
5
- OE.USE_KEYS:
5
- OE.CAP_FILE:
5
- OE.VERIFICATION:
17
- OE.CODE-EVIDENCE:
13
- OE.SCP:
16
- OE.CARD-MANAGEMENT:
1
- OE.PROCESS_SEC_IC:
2
- OE.CONFID-UPDATE-IMAGE:
2
- OE.APPS-PROVIDER:
4
- OE.VERIFICATION-AUTHORITY:
2
- OE.KEY-CHANGE:
5
- OE.SECURITY-DOMAINS:
1
- OE.TRUSTED-GUESTOS:
2
- OE.SECURITY-:
1
- OE.IC:
3
- OE.RE:
7
- OE.CARD-:
2
- OE.TRUSTED-GUEST:
1
- OE.VERIFICATION-A:
2
- OE.SECURITY-DOMA:
2
- OE.PROCESS_SEC_:
2
- OE.CONFID-UPDATE-:
2
- OE.TRUSTED-GUES:
1
|
pdf_data/st_keywords/cc_claims/T |
- T.DOC:
10
- T.FUNC:
5
- T.PROT:
5
- T.CONF:
10
|
- T.RND:
5
- T.CONFID-UPDATE-IMAGE:
3
- T.INTEG-UPDATE-IMAGE:
3
- T.UNAUTH-LOAD-UPDATE-IMAGE:
3
- T.INTERRUPT-OSU:
4
- T.CONFIG:
4
- T.COM_EXPLOIT:
4
- T.LIFE_CYCLE:
4
- T.UNAUTHORIZED_CARD_MNGT:
3
- T.INTEG-APPLI-DATA:
13
- T.RESTRICTED-MODE:
3
- T.CONFID-CONT:
4
- T.INTEG-CONT:
3
- T.EXE-CONT:
4
- T.CONT-DOS:
4
- T.CONT-SID:
4
- T.INTEG-CODE:
1
- T.INSTALL:
3
- T.DELETION:
3
- T.EXE-CODE-REMOTE:
1
- T.CONFID-APPLI-DATA:
3
- T.CONFID-JCS-CODE:
4
- T.INTEG-JCS-CODE:
4
- T.CONFID-JCS-DATA:
4
- T.INTEG-JCS-DATA:
4
- T.INTEG-APPLI-CODE:
5
- T.EXE-CODE:
8
- T.NATIVE:
4
- T.SID:
8
- T.CONFID-APPLI-DA:
1
- T.INTEG-APPLI-COD:
2
- T.RESOURCES:
3
- T.UNAUTHORIZED_:
1
- T.OBJ-DELETION:
2
- T.PHYSICAL:
2
- T.CONFID-UPDATE-I:
1
- T.UNAUTH-LOAD-UP:
1
- T.INTEG-UPDATE-IM:
1
- T.RESTRICTED-MOD:
1
- T.CONFID-:
1
- T.INTEG-APPLI-:
1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0084:
1
- BSI-CC-PP-0099-V2-2020:
2
- BSI-CC-PP-0100-2018:
1
- BSI-CC-PP-0084-2014:
1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.3:
1
- ADV_TDS.2:
2
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_FLR.2:
3
- ALC_CMC.3:
1
- ALC_CMS.3:
1
- ALC_DEL.1:
1
- ALC_DVS.1:
2
- ALC_LCD.1:
1
- ATE:
- ATE_COV.2:
1
- ATE_DPT.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- ASE:
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
- AGD:
- ALC:
- AVA:
- ASE:
- ASE_INT:
2
- ASE_CCL:
2
- ASE_SPD:
2
- ASE_ECD:
1
- ASE_REQ:
2
- ASE_TSS:
2
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_OPE.1:
1
- AGD_PRE.1: 1
|
|
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 |
1
|
2
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_FLR.2:
3
- ALC_CMC.3:
1
- ALC_CMS.3:
1
- ALC_DEL.1:
1
- ALC_DVS.1:
2
- ALC_LCD.1:
1
|
|
pdf_data/st_keywords/cc_sar/ASE |
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
- ASE_INT:
2
- ASE_CCL:
2
- ASE_SPD:
2
- ASE_ECD:
1
- ASE_REQ:
2
- ASE_TSS:
2
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
|
- EAL4:
5
- EAL4 augmented:
3
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_STG.1:
9
- FAU_STG.4:
8
- FAU_SAR.1:
10
- FAU_SAR.2:
8
- FAU_GEN.1:
12
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2:
6
- FAU_GEN.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3:
1
- FAU_STG.4.1:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
- FCS:
- FCS_CKM.1:
11
- FCS_COP.1:
10
- FCS_CKM.2:
2
- FCS_CKM.4:
7
- FCS_CKM.1.1:
1
- FCS_COP.1.1:
1
- FDP:
- FDP_ACF.1:
31
- FDP_ACF.1.1:
3
- FDP_ACF.1.2:
3
- FDP_ACF.1.3:
8
- FDP_ACF.1.4:
3
- FDP_ACC.1:
31
- FDP_IFF:
1
- FDP_IFC:
1
- FDP_ITC.1:
2
- FDP_ITC.2:
2
- FDP_ACC.1.1:
2
- FDP_RIP.1:
8
- FDP_RIP.1.1:
1
- FDP_IFC.1:
4
- FIA:
- FIA_AFL.1:
8
- FIA_UAU.7:
8
- FIA_SOS.1:
10
- FIA_UAU.1:
31
- FIA_UID.1:
39
- FIA_UAU.2:
12
- FIA_UID.2:
13
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1:
8
- FIA_ATD.1.1:
1
- FIA_SOS.1.1:
1
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UAU.2.1:
1
- FIA_UAU.7.1:
1
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
- FIA_UID:
1
- FIA_UID.2.1:
1
- FIA_USB.1:
7
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FMT:
- FMT_SMF.1:
22
- FMT_SMR.1:
29
- FMT_MSA.3:
23
- FMT_MSA.1:
20
- FMT_MSA.1.1:
2
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MTD.1:
12
- FMT_MTD.1.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FPT_FDI_EXP:
5
- FPT_FDI_EXP.1:
11
- FPT_FDI_EXP.1.1:
2
- FPT_STM.1:
9
- FPT_STM.1.1:
1
- FPT_TST.1:
5
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FTA:
- FTA_SSL.3:
9
- FTA_SSL.3.1:
1
- FTP:
- FTP_ITC.1:
21
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TST.1:
1
|
- FAU:
- FAU_SAS.1:
8
- FAU_SAS:
4
- FAU_GEN:
1
- FAU_SAS.1.1:
2
- FAU_ARP.1:
14
- FAU_SAA.1:
3
- FAU_ARP.1.1:
1
- FCO:
- FCO_NRO:
1
- FCO_NRO.2:
6
- FCO_NRO.1:
1
- FCO_NRO.2.1:
2
- FCO_NRO.2.2:
1
- FCO_NRO.2.3:
2
- FCS:
- FCS_CKM.1:
16
- FCS_COP.1:
13
- FCS_RNG.1:
17
- FCS_CKM.5:
1
- FCS_RNG:
1
- FCS_CKM.2:
7
- FCS_CKM.4:
12
- FCS_CKM.1.1:
5
- FCS_CKM.4.1:
4
- FCS_COP.1.1:
17
- FCS_RNG.1.1:
2
- FCS_RNG.1.2:
2
- FCS_CKM.2.1:
2
- FCS_CKM.3:
4
- FCS_CKM.3.1:
1
- FCS_RNG.2:
1
- FDP:
- FDP_ACF.1:
31
- FDP_IFC:
2
- FDP_IFF:
2
- FDP_ACC:
1
- FDP_ACF:
1
- FDP_ITC:
1
- FDP_ITC.2:
17
- FDP_IFC.2:
24
- FDP_IFF.1:
37
- FDP_UIT:
1
- FDP_UIT.1:
4
- FDP_ROL.1:
10
- FDP_ACC.1:
53
- FDP_ACC.2:
16
- FDP_ACC.2.1:
5
- FDP_ACC.2.2:
4
- FDP_ACF.1.1:
5
- FDP_ACF.1.2:
7
- FDP_ACF.1.3:
7
- FDP_ACF.1.4:
9
- FDP_IFC.1:
46
- FDP_IFC.1.1:
1
- FDP_IFF.1.1:
4
- FDP_IFF.1.2:
6
- FDP_IFF.1.3:
7
- FDP_IFF.1.4:
8
- FDP_IFF.1.5:
6
- FDP_RIP.1:
56
- FDP_RIP.1.1:
9
- FDP_ITC.1:
8
- FDP_ROL.1.2:
3
- FDP_ROL.1.1:
2
- FDP_SDI.2:
6
- FDP_SDI.1:
2
- FDP_SDI.2.1:
2
- FDP_SDI.2.2:
2
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FDP_ITC.2.1:
1
- FDP_ITC.2.2:
1
- FDP_ITC.2.3:
1
- FDP_ITC.2.4:
1
- FDP_ITC.2.5:
2
- FDP_ACC.1.1:
3
- FDP_IFC.2.1:
3
- FDP_IFC.2.2:
3
- FIA:
- FIA_UID:
1
- FIA_UID.1:
61
- FIA_UAU.1:
19
- FIA_UAU.4:
9
- FIA_AFL.1:
8
- FIA_API:
1
- FIA_ATD.1:
6
- FIA_ATD.1.1:
1
- FIA_UID.2:
3
- FIA_UID.2.1:
1
- FIA_USB.1:
4
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FIA_UID.1.1:
7
- FIA_UID.1.2:
5
- FIA_UAU.1.1:
4
- FIA_UAU.1.2:
3
- FIA_UAU.4.1:
2
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FMT:
- FMT_MSA:
7
- FMT_SMF:
3
- FMT_REV:
1
- FMT_SMR:
2
- FMT_MSA.1:
72
- FMT_MSA.3:
66
- FMT_SMF.1:
72
- FMT_SMR.1:
90
- FMT_MSA.1.1:
9
- FMT_MSA.2:
2
- FMT_MSA.2.1:
2
- FMT_MSA.3.1:
11
- FMT_MSA.3.2:
10
- FMT_SMF.1.1:
8
- FMT_SMR.1.1:
7
- FMT_SMR.1.2:
7
- FMT_MTD.1:
7
- FMT_MTD.1.1:
1
- FMT_MTD.3:
5
- FMT_MTD.3.1:
1
- FPR:
- FPR_UNO.1:
7
- FPR_UNO.1.1:
1
- FPT:
- FPT_FLS.1:
30
- FPT_PHP.3:
4
- FPT_EMS:
1
- FPT_FLS.1.1:
8
- FPT_TDC.1:
5
- FPT_TDC.1.1:
1
- FPT_TDC.1.2:
2
- FPT_RCV.3:
2
- FPT_RCV.2:
1
- FPT_RCV.3.1:
2
- FPT_RCV.3.2:
2
- FPT_RCV.3.3:
2
- FPT_RCV.3.4:
1
- FPT_PHP.3.1:
1
- FTP:
- FTP_ITC:
1
- FTP_ITC.1:
15
- FTP_TRP.1:
4
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
2
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_STG.1:
9
- FAU_STG.4:
8
- FAU_SAR.1:
10
- FAU_SAR.2:
8
- FAU_GEN.1:
12
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2:
6
- FAU_GEN.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3:
1
- FAU_STG.4.1:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
|
- FAU_SAS.1:
8
- FAU_SAS:
4
- FAU_GEN:
1
- FAU_SAS.1.1:
2
- FAU_ARP.1:
14
- FAU_SAA.1:
3
- FAU_ARP.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_CKM.1:
11
- FCS_COP.1:
10
- FCS_CKM.2:
2
- FCS_CKM.4:
7
- FCS_CKM.1.1:
1
- FCS_COP.1.1:
1
|
- FCS_CKM.1:
16
- FCS_COP.1:
13
- FCS_RNG.1: 17
- FCS_CKM.5: 1
- FCS_RNG: 1
- FCS_CKM.2:
7
- FCS_CKM.4:
12
- FCS_CKM.1.1:
5
- FCS_CKM.4.1: 4
- FCS_COP.1.1:
17
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FCS_CKM.2.1: 2
- FCS_CKM.3: 4
- FCS_CKM.3.1: 1
- FCS_RNG.2: 1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
11
|
16
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 |
1
|
5
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
2
|
7
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
7
|
12
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
10
|
13
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 |
1
|
17
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACF.1:
31
- FDP_ACF.1.1:
3
- FDP_ACF.1.2:
3
- FDP_ACF.1.3:
8
- FDP_ACF.1.4:
3
- FDP_ACC.1:
31
- FDP_IFF:
1
- FDP_IFC:
1
- FDP_ITC.1:
2
- FDP_ITC.2:
2
- FDP_ACC.1.1:
2
- FDP_RIP.1:
8
- FDP_RIP.1.1:
1
- FDP_IFC.1:
4
|
- FDP_ACF.1:
31
- FDP_IFC:
2
- FDP_IFF:
2
- FDP_ACC: 1
- FDP_ACF: 1
- FDP_ITC: 1
- FDP_ITC.2:
17
- FDP_IFC.2: 24
- FDP_IFF.1: 37
- FDP_UIT: 1
- FDP_UIT.1: 4
- FDP_ROL.1: 10
- FDP_ACC.1:
53
- FDP_ACC.2: 16
- FDP_ACC.2.1: 5
- FDP_ACC.2.2: 4
- FDP_ACF.1.1:
5
- FDP_ACF.1.2:
7
- FDP_ACF.1.3:
7
- FDP_ACF.1.4:
9
- FDP_IFC.1:
46
- FDP_IFC.1.1: 1
- FDP_IFF.1.1: 4
- FDP_IFF.1.2: 6
- FDP_IFF.1.3: 7
- FDP_IFF.1.4: 8
- FDP_IFF.1.5: 6
- FDP_RIP.1:
56
- FDP_RIP.1.1:
9
- FDP_ITC.1:
8
- FDP_ROL.1.2: 3
- FDP_ROL.1.1: 2
- FDP_SDI.2: 6
- FDP_SDI.1: 2
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 2
- FDP_ACC.1.1:
3
- FDP_IFC.2.1: 3
- FDP_IFC.2.2: 3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
31
|
53
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 |
2
|
3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
31
|
31
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
3
|
5
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
3
|
7
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
8
|
7
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
3
|
9
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
4
|
46
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
2
|
8
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
2
|
17
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 |
8
|
56
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1.1 |
1
|
9
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_AFL.1:
8
- FIA_UAU.7: 8
- FIA_SOS.1: 10
- FIA_UAU.1:
31
- FIA_UID.1:
39
- FIA_UAU.2: 12
- FIA_UID.2:
13
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1:
8
- FIA_ATD.1.1:
1
- FIA_SOS.1.1: 1
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UAU.2.1: 1
- FIA_UAU.7.1: 1
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
- FIA_UID:
1
- FIA_UID.2.1:
1
- FIA_USB.1:
7
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
|
- FIA_UID:
1
- FIA_UID.1:
61
- FIA_UAU.1:
19
- FIA_UAU.4: 9
- FIA_AFL.1:
8
- FIA_API: 1
- FIA_ATD.1:
6
- FIA_ATD.1.1:
1
- FIA_UID.2:
3
- FIA_UID.2.1:
1
- FIA_USB.1:
4
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FIA_UID.1.1:
7
- FIA_UID.1.2:
5
- FIA_UAU.1.1:
4
- FIA_UAU.1.2:
3
- FIA_UAU.4.1: 2
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 |
8
|
8
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 |
8
|
6
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
31
|
19
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 |
2
|
4
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 |
2
|
3
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
39
|
61
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.1 |
2
|
7
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.2 |
2
|
5
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 |
13
|
3
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 |
7
|
4
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_SMF.1:
22
- FMT_SMR.1:
29
- FMT_MSA.3:
23
- FMT_MSA.1:
20
- FMT_MSA.1.1:
2
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MTD.1:
12
- FMT_MTD.1.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
|
- FMT_MSA: 7
- FMT_SMF: 3
- FMT_REV: 1
- FMT_SMR: 2
- FMT_MSA.1:
72
- FMT_MSA.3:
66
- FMT_SMF.1:
72
- FMT_SMR.1:
90
- FMT_MSA.1.1:
9
- FMT_MSA.2: 2
- FMT_MSA.2.1: 2
- FMT_MSA.3.1:
11
- FMT_MSA.3.2:
10
- FMT_SMF.1.1:
8
- FMT_SMR.1.1:
7
- FMT_SMR.1.2:
7
- FMT_MTD.1:
7
- FMT_MTD.1.1:
1
- FMT_MTD.3: 5
- FMT_MTD.3.1: 1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
20
|
72
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 |
2
|
9
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
23
|
66
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 |
2
|
11
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
2
|
10
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
12
|
7
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
22
|
72
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
8
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
29
|
90
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
7
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
7
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_FDI_EXP:
5
- FPT_FDI_EXP.1:
11
- FPT_FDI_EXP.1.1:
2
- FPT_STM.1:
9
- FPT_STM.1.1:
1
- FPT_TST.1:
5
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
|
- FPT_FLS.1:
30
- FPT_PHP.3:
4
- FPT_EMS:
1
- FPT_FLS.1.1:
8
- FPT_TDC.1:
5
- FPT_TDC.1.1:
1
- FPT_TDC.1.2:
2
- FPT_RCV.3:
2
- FPT_RCV.2:
1
- FPT_RCV.3.1:
2
- FPT_RCV.3.2:
2
- FPT_RCV.3.3:
2
- FPT_RCV.3.4:
1
- FPT_PHP.3.1:
1
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_ITC.1:
21
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TST.1: 1
|
- FTP_ITC: 1
- FTP_ITC.1:
15
- FTP_TRP.1: 4
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
2
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 |
21
|
15
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 |
1
|
2
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
- ECB:
- CBC:
- CTR:
- CFB:
- GCM:
- CCM:
- XTS:
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
- Generic:
- Crypto Library ..................................................12:
1
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- Brainpool:
- Curve:
- Edwards:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224:
3
- SHA-256:
4
- SHA-384:
3
- SHA-512:
3
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
- ALG:
- DES:
- ALG_DES_CBC_ISO9797_M1:
1
- ALG_DES_CBC_ISO9797_M2:
1
- ALG_DES_CBC_NOPAD:
1
- ALG_DES_ECB_ISO9797_M1:
1
- ALG_DES_ECB_ISO9797_M2:
2
- ALG_DES_ECB_NOPAD:
1
- ALG_DES_CBC_PKCS5:
1
- ALG_DES_ECB_PKCS5:
1
- ALG_DES_CBC_PKCS7:
1
- ALG_DES_ECB_PKCS7:
1
- ALG_DES_MAC4_ISO9797_1_M1_ALG3:
1
- ALG_DES_MAC4_ISO9797_1_M2_ALG3:
1
- ALG_DES_MAC4_ISO9797_M1:
1
- ALG_DES_MAC4_ISO9797_M2:
1
- ALG_DES_MAC8_ISO9797_1_M1_ALG3:
1
- ALG_DES_MAC8_ISO9797_1_M2_ALG3:
1
- ALG_DES_MAC8_ISO9797_M1:
1
- ALG_DES_MAC8_ISO9797_M2:
1
- ALG_DES_MAC8_NOPAD:
1
- ALG_DES_MAC4_PKCS5:
1
- ALG_DES_MAC8_PKCS5:
1
- ALG_DES_CMAC8:
1
- RSA:
- ALG_RSA_NOPAD:
1
- ALG_RSA_PKCS1:
1
- ALG_RSA_PKCS1_OAEP:
1
- ALG_RSA_SHA_224_PKCS1:
1
- ALG_RSA_SHA_224_PKCS1_PSS:
1
- ALG_RSA_SHA_256_PKCS1:
1
- ALG_RSA_SHA_256_PKCS1_PSS:
1
- ALG_RSA_SHA_384_PKCS1:
1
- ALG_RSA_SHA_384_PKCS1_PSS:
1
- ALG_RSA_SHA_512_PKCS1:
1
- ALG_RSA_SHA_512_PKCS1_PSS:
1
- ALG_RSA_SHA_PKCS1:
1
- ECDSA:
- ALG_ECDSA_SHA_224:
1
- ALG_ECDSA_SHA_256:
2
- ALG_ECDSA_SHA_384:
1
- ALG_ECDSA_SHA_512:
1
- AES:
- ALG_AES_BLOCK_128_CBC_NOPAD:
1
- ALG_AES_BLOCK_128_CBC_NOPAD_STANDARD:
2
- ALG_AES_BLOCK_128_ECB_NOPAD:
1
- ALG_AES_CBC_ISO9797_M1:
1
- ALG_AES_CBC_ISO9797_M2:
1
- ALG_AES_CBC_ISO9797_M2_STANDARD:
1
- ALG_AES_ECB_ISO9797_M1:
1
- ALG_AES_ECB_ISO9797_M2:
1
- ALG_AES_CBC_PKCS5:
1
- ALG_AES_ECB_PKCS5:
1
- ALG_AES_CBC_PKCS7:
2
- ALG_AES_ECB_PKCS7:
2
- ALG_AES_CBC_ISO9797_STANDARD:
1
- ALG_AES_CFB:
1
- ALG_AES_MAC_128_NOPAD:
1
- ALG_AES_CMAC8:
1
- ALG_AES_CMAC16:
1
- ALG_AES_CMAC16_STANDARD:
1
- ALG_AES_CMAC_128:
1
- HMAC:
- ALG_HMAC_SHA_256:
1
- ALG_HMAC_SHA_384:
1
- ALG_HMAC_SHA_512:
1
- EC:
- ALG_EC_SVDP_DH:
1
- ALG_EC_SVDP_DH_KDF:
1
- ALG_EC_SVDP_DH_PLAIN:
1
- ALG_EC_SVDP_DHC:
1
- ALG_EC_SVDP_DHC_KDF:
1
- ALG_EC_SVDP_DHC_PLAIN:
1
- ALG_EC_SVDP_DH_PLAIN_XY:
2
- SHA:
- ALG_SHA_256:
3
- ALG_SHA_384:
3
- ALG_SHA_512:
3
- ALG_SHA_224:
1
- SHA3:
- ALG_SHA3_224:
1
- ALG_SHA3_256:
1
- ALG_SHA3_384:
1
- ALG_SHA3_512:
1
- misc:
- SIG_CIPHER_RSA:
1
- SIG_CIPHER_ECDSA:
1
- SIG_CIPHER_EDDSA:
1
- SIG_CIPHER_EDDSAPH:
1
- SIG_CIPHER_AES_CMAC8:
1
- SIG_CIPHER_AES_CMAC16:
1
- SIG_CIPHER_AES_CMAC128:
1
- SIG_CIPHER_DES_CMAC8:
1
- PAD_PKCS1_OAEP:
1
- TYPE_ACCESS:
5
- LENGTH_DES3_2KEY:
4
- LENGTH_DES3_3KEY:
4
- LENGTH_AES_128:
4
- LENGTH_AES_192:
4
- LENGTH_AES_256:
4
- LENGTH_EC_FP_128:
2
- LENGTH_EC_FP_160:
1
- LENGTH_EC_FP_192:
2
- LENGTH_EC_FP_224:
2
- LENGTH_EC_FP_256:
3
- LENGTH_EC_FP_528:
2
- LENGTH_EC_FP_384:
1
- LENGTH_SHA:
1
- LENGTH_SHA_224:
1
- LENGTH_SHA_256:
2
- LENGTH_SHA_384:
1
- LENGTH_SHA_512:
2
- LENGTH_SHA3_224:
1
- LENGTH_SHA3_256:
1
- LENGTH_SHA3_384:
1
- LENGTH_SHA3_512:
1
- LENGTH_RSA_1024:
1
- curves:
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.security:
3
- javacard.framework:
2
- javacardx:
- javacardx.crypto:
1
- javacardx.security:
1
- org:
- com:
- com.nxp.id.jcopx.security:
1
|
pdf_data/st_keywords/javacard_version |
|
- JavaCard:
- Java Card 3.1:
2
- JC3.1:
1
- GlobalPlatform:
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/TRNG/TRNG |
1
|
2
|
pdf_data/st_keywords/side_channel_analysis |
|
- SCA:
- physical probing:
3
- side channel:
2
- side-channel:
1
- DPA:
2
- SPA:
1
- timing attacks:
2
- timing attack:
1
- FI:
- Physical Tampering:
2
- physical tampering:
2
- malfunction:
2
- DFA:
2
- Fault Injection:
1
- other:
|
pdf_data/st_keywords/side_channel_analysis/FI |
|
- Physical Tampering: 2
- physical tampering: 2
- malfunction:
2
- DFA: 2
- Fault Injection: 1
|
pdf_data/st_keywords/side_channel_analysis/FI/malfunction |
1
|
2
|
pdf_data/st_keywords/standard_id |
- FIPS:
- BSI:
- CC:
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
|
- FIPS:
- FIPS 140-3:
2
- FIPS 197:
1
- FIPS PUB 186-3:
1
- BSI:
- AIS20:
2
- AIS31:
1
- AIS 20:
2
- RFC:
- RFC 5639:
1
- RFC 8032:
1
- RFC 7748:
1
- ISO:
- SCP:
- CC:
- CCMB-2017-04-001:
2
- CCMB-2017-04-002:
2
- CCMB-2017-04-003:
2
- CCMB-2017-04-004:
2
|
pdf_data/st_keywords/standard_id/BSI |
|
- AIS20:
2
- AIS31:
1
- AIS 20:
2
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
|
- CCMB-2017-04-001:
2
- CCMB-2017-04-002:
2
- CCMB-2017-04-003:
2
- CCMB-2017-04-004:
2
|
pdf_data/st_keywords/standard_id/FIPS |
|
- FIPS 140-3:
2
- FIPS 197:
1
- FIPS PUB 186-3:
1
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- DES:
- 3DES:
- Triple-DES:
4
- 3DES:
1
- TDES:
2
- TripleDES:
1
- TDEA:
4
- miscellaneous:
- constructions:
- MAC:
- HMAC:
10
- CBC-MAC:
2
- CMAC:
3
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
7
|
22
|
pdf_data/st_keywords/symmetric_crypto/DES |
|
- DES:
- 3DES:
- Triple-DES:
4
- 3DES:
1
- TDES:
2
- TripleDES:
1
- TDEA:
4
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
- Triple-DES: 4
- 3DES:
1
- TDES: 2
- TripleDES: 1
- TDEA: 4
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES |
6
|
1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP:
457
- NXP Semiconductors:
24
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
715191
- pdf_is_encrypted:
False
- pdf_number_of_pages:
94
- /ModDate:
D:20111021083251+09'00'
- /CreationDate:
D:20111021083251+09'00'
- /Title:
untitled
- /Producer:
Acrobat Distiller 6.0.1 (Windows)
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
1316128
- pdf_is_encrypted:
False
- pdf_number_of_pages:
183
- /Title:
Security Target Lite
- /Author: NXP B.V.
- /Subject: NXP JCOP 8.9 with eUICC extension on SN300 Secure Element
- /Keywords: NXP, ASE, JCOP 8.9 with eUICC extension on SN300 Secure Element, Single Chip Secure Element and NFC Controller, JCOP, Common Criteria, EAL4 augmented
- /Creator: DITA Open Toolkit 3.3.1
- /Producer:
Apache FOP Version 2.3
- /CreationDate:
D:20231130133951Z
- /ModDate:
D:20231130134109-00'00'
- pdf_hyperlinks:
mailto:[email protected]
|
pdf_data/st_metadata//CreationDate |
D:20111021083251+09'00'
|
D:20231130133951Z
|
pdf_data/st_metadata//ModDate |
D:20111021083251+09'00'
|
D:20231130134109-00'00'
|
pdf_data/st_metadata//Producer |
Acrobat Distiller 6.0.1 (Windows)
|
Apache FOP Version 2.3
|
pdf_data/st_metadata//Title |
untitled
|
Security Target Lite
|
pdf_data/st_metadata/pdf_file_size_bytes |
715191
|
1316128
|
pdf_data/st_metadata/pdf_hyperlinks |
|
mailto:[email protected] |
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
94
|
183
|
dgst |
a8a1386e8eb00467
|
1cebdb71a0606a03
|