Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
KONICA MINOLTA bizhub 650i/bizhub 550i with FK-514, DEVELOP ineo 650i/ineo 550i with FK-514 G00-31
JISEC-CC-CRP-C0699-01-2021
Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0
ANSSI-CC-2015/17
name KONICA MINOLTA bizhub 650i/bizhub 550i with FK-514, DEVELOP ineo 650i/ineo 550i with FK-514 G00-31 Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP FR
status active archived
not_valid_after 12.01.2026 21.05.2020
not_valid_before 12.01.2021 21.05.2015
report_link https://www.commoncriteriaportal.org/files/epfiles/c0699_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_17.pdf
st_link https://www.commoncriteriaportal.org/files/epfiles/c0699_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_17_cible.pdf
manufacturer KONICA MINOLTA, INC. Incard Division / ST Microelectronics
security_level {} EAL4+, AVA_VAN.5
dgst aaa6f7597f3fd5e9 ce97d64b517bf270
heuristics/cert_id JISEC-CC-CRP-C0699-01-2021 ANSSI-CC-2015/17
heuristics/cert_lab [] SERMA
heuristics/cpe_matches cpe:2.3:h:konicaminolta:bizhub_550i:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_650i:-:*:*:*:*:*:*:* {}
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 ASE_INT.1, ALC_DVS.2, AVA_SOF.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, AVA_VLA.4, ADV_FSP.4, ATE_IND.2, ASE_CCL.1, AVA_MSU.3
heuristics/extracted_versions 31, 514 2.11.0, 1.8.4
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2025/17
heuristics/report_references/directly_referencing {} ANSSI-CC-2015/16, ANSSI-CC-2012/68
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2025/17
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2010/01, ANSSI-CC-2009/26, ANSSI-CC-2009/51, ANSSI-CC-2009/05, ANSSI-CC-2009/06, ANSSI-CC-2012/68, ANSSI-CC-2015/16, ANSSI-CC-2009/50, ANSSI-CC-2010/02, ANSSI-CC-2009/62, ANSSI-CC-2009/28
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0699
  • certification_date: 01.05.2022
  • claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
  • enhanced:
    • assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0699
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio100000030lw-att/c0699kz_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multi-Function Printer (MFP) that has the functions, such as Copy, Scan, Print, Fax and Document storage and retrieval functions. The TOE provides the security functions required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFP. TOE Security functions The TOE provides the following security functions: Identification and Authentication function Access Control function Encryption function Trusted Communications function Security Management function Audit function Trusted Operation function FAX Separation function
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: KONICA MINOLTA bizhub 650i/bizhub 550i with FK-514, DEVELOP ineo 650i/ineo 550i with FK-514, Sindoh N802/N801/MF6111/ MF5101 with FK-514
    • product_type: Multi-Function Printer
    • protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio100000030lw-att/c0699kz_eacr.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio100000030lw-att/c0699kz_est.pdf
    • toe_version: G00-31
    • vendor: KONICA MINOLTA, INC.
  • expiration_date:
  • supplier: KONICA MINOLTA, INC.
  • toe_japan_name: KONICA MINOLTA bizhub 650i / bizhub 550i with FK-514, DEVELOP ineo 650i / ineo 550i with FK-514G00-31
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0699_it0760_01.html
  • toe_overseas_name: KONICA MINOLTA bizhub 650i / bizhub 550i with FK-514, DEVELOP ineo 650i / ineo 550i with FK-514, Sindoh N802 / N801 / MF6111 / MF5101 with FK-514G00-31
heuristics/st_references/directly_referencing {} ANSSI-CC-2010/02
heuristics/st_references/indirectly_referencing {} ANSSI-CC-2010/02
heuristics/protection_profiles {} 40002c3611fc465f
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0006b.pdf
pdf_data/report_filename c0699_erpt.pdf ANSSI-CC-2015_17.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 4 augmenté AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 3
    • cert_id: ANSSI-CC-2015/17
    • cert_item: Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0
    • cert_item_version: Version 1.8.4
    • cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
    • developer: STMicroelectronics S.r.l. - Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie STMicroelectronics 29 Boulevard Romain Rolland, 75669 Paris Cedex 14, France Commanditaire STMicroelectronics S.r.l. – Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: PP-0006] Protection Profile - Secure Signature Creation Device Type 3, version 1.05
pdf_data/report_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0699-01-2021: 1
  • FR:
    • ANSSI-CC-2012/68: 1
    • ANSSI-CC-2015/16: 1
    • ANSSI-CC-2015/17: 17
    • ANSSI-CC-PP-2010/07-M01: 1
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-: 1
    • ANSSI-CC-PP-2010/07-M01: 1
  • BSI:
    • BSI-PP-0006-: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 4: 2
    • EAL 5: 1
    • EAL 7: 1
    • EAL4: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 5
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_RBG_EXT.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.NETWORK: 1
    • A.PHYSICAL: 1
    • A.TRAINED_USERS: 1
    • A.TRUSTED_ADMIN: 1
  • D:
    • D.TSF: 3
    • D.USER: 3
  • T:
    • T.NET_COMPROMISE: 1
    • T.TSF_COMPROMISE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • STMicroelectronics:
    • STMicroelectronics: 6
pdf_data/report_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 4
  • Serma:
    • Serma Technologies: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 2
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CTR:
    • CTR: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
pdf_data/report_keywords/javacard_version
  • JavaCard:
    • Java Card 3.0.4: 1
pdf_data/report_metadata
  • /Author:
  • /CreationDate: D:20210215174747+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 17
  • /ModDate: D:20210215174835+09'00'
  • /Producer: Adobe PDF Library 15.0
  • /SourceModified: D:20210215005459
  • pdf_file_size_bytes: 308250
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 32
  • /Author: Administrateur
  • /CreationDate: D:20150522134048+02'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ANSSI-CC-CER-F-07.016
  • /ModDate: D:20150522134048+02'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0
  • /Title: ANSSI-CC-2015/17
  • pdf_file_size_bytes: 637015
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
pdf_data/st_filename c0699_est.pdf ANSSI-CC-2015_17_cible.pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-2010/02-M01: 1
    • ANSSI-CC-2010/02: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0006-2002: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 4
    • EAL 4 augmented: 2
    • EAL 4+: 1
    • EAL4: 5
    • EAL4 augmented: 2
    • EAL4+: 3
    • EAL5: 1
    • EAL5 augmented: 1
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADO:
    • ADO_DEL.2: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP.4: 2
    • ADV_IMP.1: 4
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.4: 3
    • ALC_CMS.4: 2
    • ALC_DEL.1: 3
    • ALC_DVS.1: 3
    • ALC_DVS.2: 2
    • ALC_LCD.1: 4
    • ALC_TAT.1: 3
  • ASE:
    • ASE_CCL.1: 3
    • ASE_ECD.1: 2
    • ASE_INT.1: 3
    • ASE_OBJ.2: 2
    • ASE_REQ.2: 3
    • ASE_SPD.1: 2
    • ASE_TSS.1: 3
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.1: 2
    • ATE_FUN.1: 3
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.3: 1
    • AVA_SOF: 1
    • AVA_SOF.1: 1
    • AVA_VAN.3: 1
    • AVA_VAN.5: 15
    • AVA_VLA.4: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_CKM_EXT: 2
    • FAU_GEN: 10
    • FAU_GEN.1: 8
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 3
    • FAU_GEN.2.1: 1
    • FAU_STG_EXT: 3
    • FAU_STG_EXT.1: 5
    • FAU_STG_EXT.1.1: 2
  • FCS:
    • FCS_CKM.1: 33
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 2
    • FCS_CKM.4: 6
    • FCS_CKM.4.1: 1
    • FCS_CKM_EXT: 1
    • FCS_CKM_EXT.4: 16
    • FCS_CKM_EXT.4.1: 2
    • FCS_COP.1: 55
    • FCS_COP.1.1: 4
    • FCS_RBG_EXT: 2
    • FCS_RBG_EXT.1: 17
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_SNI_EXT.1.1: 1
    • FCS_SSH_EXT.1: 6
    • FCS_TLS_EXT.1: 6
  • FDP:
    • FDP_ACC.1: 7
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 6
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_FXS_EXT: 2
    • FDP_FXS_EXT.1: 6
    • FDP_FXS_EXT.1.1: 2
    • FDP_IFC.1: 1
    • FDP_ITC.1: 3
    • FDP_ITC.2: 3
  • FIA:
    • FIA_AFL.1: 3
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_PMG_EXT: 2
    • FIA_PMG_EXT.1: 6
    • FIA_PMG_EXT.1.1: 2
    • FIA_PSK_EXT: 2
    • FIA_PSK_EXT.1: 9
    • FIA_PSK_EXT.1.1: 2
    • FIA_PSK_EXT.1.2: 2
    • FIA_PSK_EXT.1.3: 2
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 3
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 10
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 3
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 3
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 5
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 5
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 3
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_SKP_EXT: 2
    • FPT_SKP_EXT.1: 6
    • FPT_SKP_EXT.1.1: 2
    • FPT_STM.1: 6
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 2
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 7
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 3
  • FTA:
    • FTA_SSL.3: 3
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 9
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 3
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 2
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM: 4
    • FCS_CKM.1: 7
    • FCS_CKM.1.1: 7
    • FCS_CKM.2: 3
    • FCS_CKM.3: 3
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 4
    • FCS_COP: 10
    • FCS_COP.1: 21
  • FDP:
    • FDP_ACC: 29
    • FDP_ACC.1: 9
    • FDP_ACC.1.1: 16
    • FDP_ACF: 22
    • FDP_ACF.1: 23
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 16
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 10
    • FDP_ETC: 4
    • FDP_ETC.1: 3
    • FDP_ETC.1.1: 2
    • FDP_ETC.1.2: 2
    • FDP_ITC: 6
    • FDP_ITC.1: 4
    • FDP_ITC.1.1: 2
    • FDP_ITC.1.2: 2
    • FDP_ITC.1.3: 2
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 11
    • FDP_SDI: 7
    • FDP_SDI.2: 6
    • FDP_SDI.2.1: 9
    • FDP_SDI.2.2: 7
    • FDP_UIT: 10
    • FDP_UIT.1: 11
    • FDP_UIT.1.1: 7
    • FDP_UIT.1.2: 7
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 22
    • FIA_AFL.1.2: 4
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 2
    • FIA_UAU.1: 7
    • FIA_UAU.1.1: 6
    • FIA_UAU.1.2: 2
    • FIA_UID.1: 8
    • FIA_UID.1.1: 5
    • FIA_UID.1.2: 2
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 2
    • FMT_MSA: 10
    • FMT_MSA.1: 2
    • FMT_MSA.1.1: 4
    • FMT_MSA.2: 8
    • FMT_MSA.2.1: 2
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD: 1
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 5
    • FMT_SMF: 4
    • FMT_SMF.1: 23
    • FMT_SMF.1.1: 4
    • FMT_SMR.1: 9
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_AMT.1: 6
    • FPT_AMT.1.1: 4
    • FPT_FLS: 1
    • FPT_FLS.1: 3
    • FPT_FLS.1.1: 8
    • FPT_PHP.1: 4
    • FPT_PHP.1.1: 7
    • FPT_PHP.1.2: 7
    • FPT_PHP.3: 4
    • FPT_PHP.3.1: 7
    • FPT_TRP: 1
    • FPT_TST.1: 5
    • FPT_TST.1.1: 4
    • FPT_TST.1.2: 4
    • FPT_TST.1.3: 2
  • FTP:
    • FTP_ITC: 14
    • FTP_ITC.1: 17
    • FTP_ITC.1.1: 11
    • FTP_ITC.1.2: 8
    • FTP_ITC.1.3: 8
    • FTP_TRP: 8
    • FTP_TRP.1: 12
    • FTP_TRP.1.1: 7
    • FTP_TRP.1.2: 4
    • FTP_TRP.1.3: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.NETWORK: 1
    • A.PHYSICAL: 1
    • A.TRAINED_USERS: 1
    • A.TRUSTED_ADMIN: 1
  • D:
    • D.TSF: 3
    • D.USER: 31
  • O:
    • O.ACCESS: 1
    • O.ACCESS_CONTROL: 6
    • O.ADMIN_ROLES: 4
    • O.AUDIT: 5
    • O.COMMS_PROTECTION: 11
    • O.FAX_NET_SEPARATION: 1
    • O.PURGE_DATA: 2
    • O.STORAGE_ENCRYPTION: 4
    • O.TSF_SELF_TEST: 1
    • O.UPDATE_VERIFICATION: 2
    • O.USER_AUTHORIZATION: 7
  • OE:
    • OE.ADMIN_TRAINING: 1
    • OE.ADMIN_TRUST: 1
    • OE.NETWORK_PROTECTION: 1
    • OE.PHYSICAL_PROTECTION: 1
    • OE.USER_TRAINING: 1
  • T:
    • T.NET_COMPROMISE: 1
    • T.TSF_COMPROMISE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
  • A:
    • A.CGA: 5
    • A.NO-DELETION: 2
    • A.NO-INSTALL: 3
    • A.SCA: 3
    • A.SGA: 1
    • A.VERIFICATION: 3
  • O:
    • O.ALARM: 5
    • O.CIPHER: 4
    • O.CSP: 1
    • O.FIREWALL: 2
    • O.GLOBAL_ARRAYS_INTEG: 1
    • O.KEY-MNGT: 4
    • O.NATIVE: 2
    • O.OBJ-DEL: 2
    • O.OPERATE: 1
    • O.PIN-MNGT: 1
    • O.REALLOCATION: 4
    • O.ROLES: 1
    • O.SCP: 6
    • O.SID: 1
    • O.SIDE_CHANNEL: 4
    • O.TRANSACTION: 1
  • OE:
    • OE.CARD_MANAGEMENT: 5
    • OE.HI_VAD: 8
    • OE.MANAGEMENT_OF_SECRETS: 5
    • OE.NO-DELETION: 2
    • OE.NO-INSTALL: 1
    • OE.VERIFICATION: 7
  • OSP:
    • OSP.CARD_ADMINISTRATION_DISABLED: 2
    • OSP.MANAGEMENT_OF_SECRETS: 3
    • OSP.ROLES: 2
    • OSP.VERIFICATION: 1
  • OT:
    • OT.TYPE: 1
  • T:
    • T.EXE-CODE: 6
    • T.INTEG-APPLI-CODE: 2
    • T.INTEG-APPLI-DATA: 5
    • T.NATIVE: 3
    • T.PHYSICAL: 3
    • T.TYPE: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 3
  • STMicroelectronics:
    • STM: 1
    • STMicroelectronics: 19
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
      • AES-256: 2
  • constructions:
    • MAC:
      • HMAC: 6
      • HMAC-SHA-256: 2
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 2
  • AES_competition:
    • AES:
      • AES: 5
    • HPC:
      • HPC: 2
  • DES:
    • 3DES:
      • 3-DES: 1
      • TripleDES: 16
    • DES:
      • DES: 11
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 5
      • Diffie-Hellman: 4
    • DSA:
      • DSA: 1
  • RSA:
    • RSA-2048: 1
    • RSA-3072: 1
  • ECC:
    • ECC:
      • ECC: 12
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 8
    • SHA2:
      • SHA-256: 15
      • SHA-384: 6
      • SHA-512: 9
  • SHA:
    • SHA1:
      • SHA-1: 6
    • SHA2:
      • SHA-224: 1
      • SHA-256: 6
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 5
    • IKEv1: 14
    • IKEv2: 3
  • IPsec:
    • IPsec: 76
  • SSH:
    • SSH: 3
  • TLS:
    • TLS:
      • TLS: 3
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 7
  • RNG:
    • RBG: 6
  • RNG:
    • RNG: 1
  • TRNG:
    • TRNG: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CTR:
    • CTR: 4
  • CBC:
    • CBC: 3
  • ECB:
    • ECB: 3
pdf_data/st_keywords/crypto_engine
  • NesCrypt:
    • NESCRYPT: 1
pdf_data/st_keywords/crypto_library
  • Neslib:
    • NesLib v2.0: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • FI:
    • DFA: 1
    • Physical tampering: 2
    • physical tampering: 6
  • SCA:
    • DPA: 2
    • SPA: 2
    • timing attacks: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS PUB 180-3: 2
    • FIPS PUB 186-4: 5
    • FIPS PUB 197: 2
    • FIPS PUB 198-1: 2
  • ISO:
    • ISO/IEC 18031:2011: 3
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-90A: 3
  • PKCS:
    • PKCS #1: 2
  • RFC:
    • RFC 2407: 1
    • RFC 3602: 7
    • RFC 4106: 2
    • RFC 4109: 2
    • RFC 4301: 3
    • RFC 4303: 3
    • RFC 4304: 3
    • RFC 4868: 5
    • RFC 5282: 1
    • RFC3602: 1
  • CC:
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
  • FIPS:
    • FIPS PUB 113: 1
    • FIPS PUB 180-1: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 14443-3: 1
    • ISO/IEC 14443-4: 1
    • ISO/IEC 14888-3: 1
    • ISO/IEC 7816: 12
    • ISO/IEC 7816-: 1
    • ISO/IEC 9797-1: 1
  • PKCS:
    • PKCS #1: 2
    • PKCS#1: 1
  • RFC:
    • RFC3447: 5
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 1
  • JavaCard:
    • Java Card 3.0.4: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • This component and its interface is permanently disabled before TOE delivery. The Card Manager is out of scope of current evaluation: 1
    • This component and its interface is permanently disabled before TOE delivery. The Card Manager is out of scope of current evaluation) o GP API (This interface is permanently disabled before TOE delivery and it: 1
    • This interface is permanently disabled before TOE delivery and it is out of scope of current evaluation: 1
    • out of scope: 2
    • out of scope of current evaluation) o Javacard 3.0.4 API o Proprietary API o Operating System o The Secured: 1
pdf_data/st_metadata
  • /Author: e08884
  • /CreationDate: D:20210212143601+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20210215174723+09'00'
  • /Producer: Acrobat Distiller 15.0 (Windows)
  • /Title: Microsoft Word - 【C0699】[英] ASE_EagleBK H-2.00-201221.docx
  • pdf_file_size_bytes: 889040
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 71
  • /Author: saverio donatiello
  • /CreationDate: D:20150429154456+02'00'
  • /Creator: PDFCreator Version 1.7.3
  • /Keywords:
  • /ModDate: D:20150429154456+02'00'
  • /Producer: GPL Ghostscript 9.10
  • /Subject:
  • /Title: J-SIGN_SecurtyTarget_Lite
  • pdf_file_size_bytes: 1850122
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 95
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different