Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
KONICA MINOLTA bizhub 650i/bizhub 550i with FK-514, DEVELOP ineo 650i/ineo 550i with FK-514 G00-31
JISEC-CC-CRP-C0699-01-2021
Feitian FT-JCOS V5.0
SERTIT-116
name KONICA MINOLTA bizhub 650i/bizhub 550i with FK-514, DEVELOP ineo 650i/ineo 550i with FK-514 G00-31 Feitian FT-JCOS V5.0
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP NO
status active archived
not_valid_after 12.01.2026 17.09.2023
not_valid_before 12.01.2021 17.09.2018
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20180917SERTIT-116%20C.pdf
report_link https://www.commoncriteriaportal.org/files/epfiles/c0699_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20180917%20Sertit-116%20CR%20Feitian%20v10.pdf
st_link https://www.commoncriteriaportal.org/files/epfiles/c0699_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[09895][SERTIT-116][ST][v1.0.8]%20FTJCOS%20v5.0%20Security%20Target.pdf
manufacturer KONICA MINOLTA, INC. Feitian Technologies Co., Ltd.
manufacturer_web https://www.ftsafe.com
security_level {} ALC_DVS.2, EAL5+, AVA_VAN.5
dgst aaa6f7597f3fd5e9 8d5f8b6024447c59
heuristics/cert_id JISEC-CC-CRP-C0699-01-2021 SERTIT-116
heuristics/cpe_matches cpe:2.3:h:konicaminolta:bizhub_550i:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_650i:-:*:*:*:*:*:*:* {}
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 AVA_COMP.1, ASE_INT.1, ASE_COMP.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ADV_COMP.1, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_COMP.1, ALC_COMP.1, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 31, 514 5.0
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0699
  • certification_date: 01.05.2022
  • claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
  • enhanced:
    • assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0699
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio100000030lw-att/c0699kz_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multi-Function Printer (MFP) that has the functions, such as Copy, Scan, Print, Fax and Document storage and retrieval functions. The TOE provides the security functions required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFP. TOE Security functions The TOE provides the following security functions: Identification and Authentication function Access Control function Encryption function Trusted Communications function Security Management function Audit function Trusted Operation function FAX Separation function
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: KONICA MINOLTA bizhub 650i/bizhub 550i with FK-514, DEVELOP ineo 650i/ineo 550i with FK-514, Sindoh N802/N801/MF6111/ MF5101 with FK-514
    • product_type: Multi-Function Printer
    • protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio100000030lw-att/c0699kz_eacr.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio100000030lw-att/c0699kz_est.pdf
    • toe_version: G00-31
    • vendor: KONICA MINOLTA, INC.
  • expiration_date:
  • supplier: KONICA MINOLTA, INC.
  • toe_japan_name: KONICA MINOLTA bizhub 650i / bizhub 550i with FK-514, DEVELOP ineo 650i / ineo 550i with FK-514G00-31
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0699_it0760_01.html
  • toe_overseas_name: KONICA MINOLTA bizhub 650i / bizhub 550i with FK-514, DEVELOP ineo 650i / ineo 550i with FK-514, Sindoh N802 / N801 / MF6111 / MF5101 with FK-514G00-31
  • category: ICs, Smart Cards and Smart Card-Related Devices and Systems
  • certification_date: 17.09.2018
  • developer: Feitian Technologies Co., Ltd.
  • enhanced:
    • category: ICs, Smart Cards and Smart Card-Related Devices and Systems
    • cert_id: SERTIT-116
    • certification_date: 17.09.2018
    • description: The TOE is an open Java Card Platforms (JCP), that is, smart cards or similar devices enabled with JavaCard technology that support post-issuance downloading of applications.The purpose of the TOE is to provide a limited Java Card environment for a single applet, specifically for e-passport and similar applications such as eID and driving license.The TOE is composed of a Smart Card Platform (SCP) and an embedded software (JCS + non-TSF parts). The JCP is compliant with Java Card Specification v3.0.4 and GlobalPlatform Specification v.2.3. The TOE allows for the loading of the customer applets, but after loading the single applet the platform must be closed to prevent further loading of applets after issuance of the card to the end user. To support this functionality, the TOE provides a closing mechanism with specific guidance. The applet should have been previously verified by an off-card trusted IT component. The JCP is managed by Card Manager that is a part of the TOE. The Card Manager(ISD) is a pre-issuance applet. The JCP is fully compliant with the Java Card Specification v3.0.4 excluding the optional part JCRMI which is not implemented by the TOE. The SCP is a certified hardware platform – the SLE77CLFX2400PM with specific IC dedicated software (firmware). The hardware platform is certified by the BSI under the certification ID: BSI-DSZ-CC-0964-V3-2017 . Not all functionality of the hardware is used by the composite TOE. Therefore some parts of the IC platform are not part of the composite TOEto ensure that the developed applet has sufficient ability to counter attacks.
    • developer: Feitian Technologies Co., Ltd.
    • documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135382-1607954033/SERTIT/Sertifikater/2018/116/20180917SERTIT-116%20C.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135385-1607954035/SERTIT/Sertifikater/2018/116/%5B09895%5D%5BSERTIT-116%5D%5BST%5D%5Bv1.0.8%5D%20FTJCOS%20v5.0%20Security%20Target.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135379-1607954030/SERTIT/Sertifikater/2018/116/20180917%20Sertit-116%20CR%20Feitian%20v10.pdf'})]})
    • evaluation_facility: Brightsight B.V.
    • expiration_date: 17.09.2023
    • level: EAL 5, ALC_DVS.2, AVA_VAN.5
    • mutual_recognition: CCRA, SOG-IS
    • product: V5.0.9
    • sponsor: Feitian Technologies Co., Ltd.
  • product: FT-JCOS V5.0
  • url: https://sertit.no/certified-products/product-archive/ft-jcos-v5-0
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0964-V3-2017
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0964-V3-2017
maintenance_updates
protection_profile_links {} {}
pdf_data/cert_filename 20180917SERTIT-116 C.pdf
pdf_data/cert_keywords/cc_cert_id
  • NO:
    • SERTIT-116: 2
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
  • Feitian:
    • Feitian Technologies: 1
pdf_data/cert_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
  • NSS:
    • NSS: 1
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • pdf_file_size_bytes: 744305
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename c0699_erpt.pdf 20180917 Sertit-116 CR Feitian v10.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0699-01-2021: 1
  • NO:
    • SERTIT-116: 20
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
    • EAL 5: 1
    • EAL1: 1
    • EAL5+: 22
    • EAL7: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_COMP.1: 1
    • ADV_FSP.5: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_COMP.1: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 5
    • ALC_FLR: 1
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_COMP.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COMP.1: 1
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_COMP.1: 1
    • AVA_VAN.5: 4
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_RBG_EXT.1: 1
  • FCS:
    • FCS_RNG.1: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.NETWORK: 1
    • A.PHYSICAL: 1
    • A.TRAINED_USERS: 1
    • A.TRUSTED_ADMIN: 1
  • D:
    • D.TSF: 3
    • D.USER: 3
  • T:
    • T.NET_COMPROMISE: 1
    • T.TSF_COMPROMISE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • Feitian:
    • Feitian: 1
    • Feitian Technologies: 2
    • Feitian Technologies Co: 1
  • Infineon:
    • Infineon: 1
pdf_data/report_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 4
  • BrightSight:
    • Brightsight: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 2
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CTR:
    • CTR: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • other:
    • JIL: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • CC:
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 15408: 8
    • ISO/IEC 7816: 2
  • SCP:
    • SCP02: 2
pdf_data/report_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 3.0.4: 1
  • JavaCard:
    • Java Card 2.3: 1
    • Java Card 3.0.4: 4
pdf_data/report_metadata
  • /Author:
  • /CreationDate: D:20210215174747+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 17
  • /ModDate: D:20210215174835+09'00'
  • /Producer: Adobe PDF Library 15.0
  • /SourceModified: D:20210215005459
  • pdf_file_size_bytes: 308250
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 32
  • /AAPL:Keywords: ['ugradert']
  • /Author: [email protected]
  • /CreationDate: D:20180917114319Z00'00'
  • /Creator: Microsoft® Word 2013
  • /Keywords: ugradert
  • /ModDate: D:20180917114319Z00'00'
  • /Producer: Mac OS X 10.13.6 Quartz PDFContext
  • /Title: tittel
  • pdf_file_size_bytes: 1156984
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
pdf_data/st_filename c0699_est.pdf [09895][SERTIT-116][ST][v1.0.8] FTJCOS v5.0 Security Target.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0964-: 1
    • BSI-DSZ-CC-0964-V3-2017: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0084: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 5: 1
    • EAL 5 augmented: 1
    • EAL5: 6
    • EAL5 augmented: 1
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 6
    • ADV_FSP.1: 4
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_FSP.5: 7
    • ADV_IMP.1: 9
    • ADV_INT.2: 1
    • ADV_TDS.1: 2
    • ADV_TDS.2: 1
    • ADV_TDS.3: 10
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 10
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.1: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 7
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 5
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 3
    • ATE_DPT.1: 2
    • ATE_FUN.1: 6
  • AVA:
    • AVA_VAN.5: 7
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_CKM_EXT: 2
    • FAU_GEN: 10
    • FAU_GEN.1: 8
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 3
    • FAU_GEN.2.1: 1
    • FAU_STG_EXT: 3
    • FAU_STG_EXT.1: 5
    • FAU_STG_EXT.1.1: 2
  • FCS:
    • FCS_CKM.1: 33
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 2
    • FCS_CKM.4: 6
    • FCS_CKM.4.1: 1
    • FCS_CKM_EXT: 1
    • FCS_CKM_EXT.4: 16
    • FCS_CKM_EXT.4.1: 2
    • FCS_COP.1: 55
    • FCS_COP.1.1: 4
    • FCS_RBG_EXT: 2
    • FCS_RBG_EXT.1: 17
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_SNI_EXT.1.1: 1
    • FCS_SSH_EXT.1: 6
    • FCS_TLS_EXT.1: 6
  • FDP:
    • FDP_ACC.1: 7
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 6
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_FXS_EXT: 2
    • FDP_FXS_EXT.1: 6
    • FDP_FXS_EXT.1.1: 2
    • FDP_IFC.1: 1
    • FDP_ITC.1: 3
    • FDP_ITC.2: 3
  • FIA:
    • FIA_AFL.1: 3
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_PMG_EXT: 2
    • FIA_PMG_EXT.1: 6
    • FIA_PMG_EXT.1.1: 2
    • FIA_PSK_EXT: 2
    • FIA_PSK_EXT.1: 9
    • FIA_PSK_EXT.1.1: 2
    • FIA_PSK_EXT.1.2: 2
    • FIA_PSK_EXT.1.3: 2
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 3
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 10
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 3
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 3
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 5
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 5
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 3
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_SKP_EXT: 2
    • FPT_SKP_EXT.1: 6
    • FPT_SKP_EXT.1.1: 2
    • FPT_STM.1: 6
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 2
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 7
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 3
  • FTA:
    • FTA_SSL.3: 3
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 9
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 3
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 2
  • FAU:
    • FAU_ARP.1: 21
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 3
  • FCO:
    • FCO_NRO: 6
    • FCO_NRO.2: 5
  • FCS:
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 9
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 8
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 13
    • FCS_CKM.4.1: 1
    • FCS_COP: 7
    • FCS_COP.1: 21
    • FCS_RNG: 5
    • FCS_RNG.1: 13
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 21
    • FDP_ACC.1: 12
    • FDP_ACC.2: 2
    • FDP_ACF: 21
    • FDP_ACF.1: 13
    • FDP_IFC: 23
    • FDP_IFC.1: 13
    • FDP_IFC.2: 2
    • FDP_IFF: 18
    • FDP_IFF.1: 17
    • FDP_ITC: 12
    • FDP_ITC.1: 4
    • FDP_ITC.2: 10
    • FDP_ITT.1: 1
    • FDP_RIP: 75
    • FDP_RIP.1: 8
    • FDP_ROL: 12
    • FDP_ROL.1: 3
    • FDP_SDI.1: 1
    • FDP_SDI.2: 9
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UIT: 5
    • FDP_UIT.1: 2
  • FIA:
    • FIA_ATD: 8
    • FIA_ATD.1: 2
    • FIA_UID: 24
    • FIA_UID.1: 10
    • FIA_UID.2: 1
    • FIA_USB: 7
    • FIA_USB.1: 3
  • FMT:
    • FMT_MSA: 87
    • FMT_MSA.1: 10
    • FMT_MSA.2: 2
    • FMT_MSA.3: 16
    • FMT_MTD: 20
    • FMT_MTD.1: 2
    • FMT_MTD.3: 1
    • FMT_SMF: 18
    • FMT_SMF.1: 18
    • FMT_SMF.1.1: 1
    • FMT_SMR: 31
    • FMT_SMR.1: 30
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 8
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS: 13
    • FPT_FLS.1: 13
    • FPT_FLS.1.1: 2
    • FPT_ITT.1: 1
    • FPT_PHP.3: 1
    • FPT_RCV: 22
    • FPT_RCV.3: 13
    • FPT_RCV.4: 2
    • FPT_TDC.1: 8
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST.1: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 6
    • FTP_ITC.1: 4
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.NETWORK: 1
    • A.PHYSICAL: 1
    • A.TRAINED_USERS: 1
    • A.TRUSTED_ADMIN: 1
  • D:
    • D.TSF: 3
    • D.USER: 31
  • O:
    • O.ACCESS: 1
    • O.ACCESS_CONTROL: 6
    • O.ADMIN_ROLES: 4
    • O.AUDIT: 5
    • O.COMMS_PROTECTION: 11
    • O.FAX_NET_SEPARATION: 1
    • O.PURGE_DATA: 2
    • O.STORAGE_ENCRYPTION: 4
    • O.TSF_SELF_TEST: 1
    • O.UPDATE_VERIFICATION: 2
    • O.USER_AUTHORIZATION: 7
  • OE:
    • OE.ADMIN_TRAINING: 1
    • OE.ADMIN_TRUST: 1
    • OE.NETWORK_PROTECTION: 1
    • OE.PHYSICAL_PROTECTION: 1
    • OE.USER_TRAINING: 1
  • T:
    • T.NET_COMPROMISE: 1
    • T.TSF_COMPROMISE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
  • A:
    • A.APPLET: 6
    • A.DELETION: 1
    • A.VERIFICATION: 6
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 6
    • D.APP_C_DATA: 2
    • D.APP_I_DATA: 4
    • D.CM_APDU: 1
    • D.CRYPTO: 7
    • D.JCS_CODE: 4
    • D.JCS_DATA: 5
    • D.JCS_KEYS: 4
    • D.SEC_ATTRIBUTES: 2
    • D.SEC_DATA: 8
  • O:
    • O.ALARM: 20
    • O.APPLET: 4
    • O.CARD-: 7
    • O.CARD-MANAGEMENT: 30
    • O.CIPHER: 14
    • O.CODE_PKG: 3
    • O.COMMUNICATION: 11
    • O.DELETION: 1
    • O.FIREWALL: 37
    • O.GLOBAL: 2
    • O.GLOBAL_ARRAYS_CONFID: 16
    • O.GLOBAL_ARRAYS_INTEG: 9
    • O.IC_SUPPORT: 17
    • O.INSTALL: 16
    • O.JAVAOBJECT: 22
    • O.KEY-: 1
    • O.KEY-MNGT: 20
    • O.LOAD: 18
    • O.NATIVE: 14
    • O.OPERATE: 33
    • O.OS: 1
    • O.OS_SUPPORT: 23
    • O.PACKAGE: 2
    • O.PIN-MNGT: 1
    • O.REALLOCATION: 15
    • O.RECOVERY: 23
    • O.REMOTE: 1
    • O.RESOURCES: 19
    • O.RND: 14
    • O.SID: 30
    • O.TRANSACTION: 14
  • OE:
    • OE.APPLET: 9
    • OE.CARD-MANAGEMENT: 2
    • OE.CODE-: 5
    • OE.CODE-EVIDENCE: 16
    • OE.SCP: 6
    • OE.VERIFICATION: 37
  • OP:
    • OP.ARRAY_ACCESS: 4
    • OP.CREATE: 7
    • OP.GP: 3
    • OP.INSTANCE_FIELD: 4
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 6
    • OP.JAVA: 5
    • OP.LOAD_PCKG: 1
    • OP.PUT: 6
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 5
  • OSP:
    • OSP.VERIFICATION: 6
  • R:
    • R.JAVA: 5
  • T:
    • T.COMMUNICATION: 5
    • T.CONFID-: 2
    • T.CONFID-APPLI-: 2
    • T.CONFID-APPLI-DATA: 16
    • T.CONFID-JCS-CODE: 7
    • T.CONFID-JCS-DATA: 9
    • T.DELETION: 1
    • T.EXE-: 1
    • T.EXE-CODE: 8
    • T.FAULT: 6
    • T.INSTALL: 6
    • T.INTEG-: 6
    • T.INTEG-APPLI-: 4
    • T.INTEG-APPLI-CODE: 12
    • T.INTEG-APPLI-DATA: 17
    • T.INTEG-JCS-: 1
    • T.INTEG-JCS-CODE: 7
    • T.INTEG-JCS-DATA: 12
    • T.LEAKAGE: 6
    • T.NATIVE: 6
    • T.PHYSICAL: 8
    • T.RESOURCES: 9
    • T.RND: 6
    • T.SID: 19
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 3
  • Feitian:
    • Feitian Technologies: 1
    • Feitian Technologies Co: 92
  • Infineon:
    • Infineon: 10
    • Infineon Technologies AG: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
      • AES-256: 2
  • constructions:
    • MAC:
      • HMAC: 6
      • HMAC-SHA-256: 2
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 2
  • AES_competition:
    • AES:
      • AES: 13
  • DES:
    • 3DES:
      • 3DES: 1
      • TDEA: 1
      • TDES: 7
      • Triple-DES: 1
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • CMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 5
      • Diffie-Hellman: 4
    • DSA:
      • DSA: 1
  • RSA:
    • RSA-2048: 1
    • RSA-3072: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 8
    • SHA2:
      • SHA-256: 15
      • SHA-384: 6
      • SHA-512: 9
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-256: 2
      • SHA256: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key exchange: 1
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 5
    • IKEv1: 14
    • IKEv2: 3
  • IPsec:
    • IPsec: 76
  • SSH:
    • SSH: 3
  • TLS:
    • TLS:
      • TLS: 3
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 7
  • RNG:
    • RBG: 6
  • RNG:
    • RND: 21
    • RNG: 10
  • TRNG:
    • TRNG: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CTR:
    • CTR: 4
  • CBC:
    • CBC: 2
  • CCM:
    • CCM: 1
  • CTR:
    • CTR: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • FI:
    • Malfunction: 3
    • malfunction: 4
    • physical tampering: 1
  • SCA:
    • DPA: 3
    • Leak-Inherent: 2
    • SPA: 1
    • physical probing: 3
    • timing attacks: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS PUB 180-3: 2
    • FIPS PUB 186-4: 5
    • FIPS PUB 197: 2
    • FIPS PUB 198-1: 2
  • ISO:
    • ISO/IEC 18031:2011: 3
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-90A: 3
  • PKCS:
    • PKCS #1: 2
  • RFC:
    • RFC 2407: 1
    • RFC 3602: 7
    • RFC 4106: 2
    • RFC 4109: 2
    • RFC 4301: 3
    • RFC 4303: 3
    • RFC 4304: 3
    • RFC 4868: 5
    • RFC 5282: 1
    • RFC3602: 1
  • BSI:
    • AIS20: 2
    • AIS36: 2
  • FIPS:
    • FIPS PUB 140-2: 1
    • FIPS PUB 180-4: 1
    • FIPS PUB 197: 1
    • FIPS140: 2
    • FIPS180-4: 2
    • FIPS197: 3
  • ICAO:
    • ICAO: 3
  • ISO:
    • ISO/IEC 18013: 2
    • ISO/IEC 9796-2: 1
  • SCP:
    • SCP02: 6
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 3.0.4: 3
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.security: 2
  • javacardx:
    • javacardx.crypto: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are: 1
    • com 11 FT-JCOS V5.0 Security Target Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip: 1
    • out of scope: 2
pdf_data/st_metadata
  • /Author: e08884
  • /CreationDate: D:20210212143601+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20210215174723+09'00'
  • /Producer: Acrobat Distiller 15.0 (Windows)
  • /Title: Microsoft Word - 【C0699】[英] ASE_EagleBK H-2.00-201221.docx
  • pdf_file_size_bytes: 889040
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 71
  • /CreationDate: D:20180811160413+08'00'
  • /Creator: LaTeX with hyperref package
  • /Producer: MiKTeX-xdvipdfmx (0.7.8)
  • pdf_file_size_bytes: 1189588
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 89
state/cert/convert_garbage False True
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different