name |
bizhub C353P / ineo+ 353P Control Software version A02E0Y0-100_GM012 |
Plateforme JavaCard MultiApp V4.0 en configuration ouverte basée sur l’Operating System JLEP3 masquée sur le composant SLE78CLFX4000PH (M7892 G12) |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
FR |
status |
archived |
active |
not_valid_after |
07.10.2013 |
06.09.2027 |
not_valid_before |
26.03.2008 |
08.03.2017 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2017-07_s01.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0148_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2017_07.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0148_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2017_07en.pdf |
manufacturer |
Konica Minolta Business Technologies, Inc |
Gemalto |
manufacturer_web |
https://www.konicaminolta.com/ |
https://www.gemalto.com/ |
security_level |
EAL3 |
EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst |
b41c1858c9432c46 |
5b7b6a9b33f1dab4 |
heuristics/cert_id |
JISEC-CC-CRP-C0148 |
ANSSI-CC-2017/07 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
ALC_DVS.2, ALC_FLR.1, AVA_VAN.5 |
heuristics/extracted_versions |
- |
4.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2017/21, ANSSI-CC-2017/22, ANSSI-CC-2017/20, ANSSI-CC-2017/54, ANSSI-CC-2017/19 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0891-V2-2016 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2018/57, ANSSI-CC-2018/21, ANSSI-CC-2018/32, ANSSI-CC-2018/58, ANSSI-CC-2018/56v2, ANSSI-CC-2017/21, ANSSI-CC-2018/58v2, ANSSI-CC-2020/44, ANSSI-CC-2017/83, ANSSI-CC-2018/57v2, ANSSI-CC-2020/33, ANSSI-CC-2018/32v2, ANSSI-CC-2017/54, ANSSI-CC-2018/53, ANSSI-CC-2018/56, ANSSI-CC-2020/43, ANSSI-CC-2017/82, ANSSI-CC-2018/11, ANSSI-CC-2017/76, ANSSI-CC-2017/81, ANSSI-CC-2020/49, ANSSI-CC-2017/20, ANSSI-CC-2018/24, ANSSI-CC-2017/19, BSI-DSZ-CC-1003-2018, ANSSI-CC-2020/45, ANSSI-CC-2020/42, ANSSI-CC-2019/07, ANSSI-CC-2019/31, ANSSI-CC-2017/22 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0148
- certification_date: 01.03.2008
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.3
- cert_link: https://www.ipa.go.jp/en/security/c0148_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This product is the embedded software that is installed on the Konica Minolta Business Technologies, Inc. network printer (bizhub C353P / ineo+ 353P). This product offers the protection from exposure of the highly confidential document stored in the printer, and aims at protecting the data which may be exposed against a user's intention. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions. - All area overwrite deletion function - HDD encryption key generation function - HDD verification function - Public box authentication function - Secure print authentication function - Trusted channel function - Administrator identification and authentication functions - Service engineer identification and authentication functions
- evaluation_facility: Mizuho Information & Research Institute, Inc.Center for Evaluation of Information Security
- product: Japanese name:bizhub C353P / ineo+ 353P Control Software English name:bizhub C353P / ineo+ 353P Control Software
- product_type: IT Product (Data protection function in printer systems)
- report_link: https://www.ipa.go.jp/en/security/c0148_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0148_est.pdf
- toe_version: A02E0Y0-0100-GM0-12
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.10.2013
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub C353P / ineo+ 353P Control Software A02E0Y0-0100-GM0-12
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0148_it7166.html
- toe_overseas_name: bizhub C353P / ineo+ 353P Control Software A02E0Y0-0100-GM0-12
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0891-V2-2016 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0891-V2-2016 |
heuristics/protection_profiles |
{} |
85bef5b6f16c4d33 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf |
pdf_data/cert_filename |
|
certificat-anssi-cc-2017-07_s01.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2017/07-S01: 2
- ANSSI-CC-PP-2010/03-M01: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-2010/03-M01: 1
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: DUCLOS Charlene
- /Category: -S01
- /Comments: ANSSI-CC-CER-F-14_v14.7
- /Company: SGDSN
- /CreationDate: D:20220916174040+02'00'
- /Creator: Acrobat PDFMaker 21 pour Word
- /Keywords: version x.x, révision x
- /ModDate: D:20220916174040+02'00'
- /Producer: Adobe PDF Library 21.11.71
- /SourceModified: D:20220916154029
- /Title: ANSSI-CC-2017/07
- pdf_file_size_bytes: 147308
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
c0148_erpt.pdf |
ANSSI-CC-2017_07.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2017/07
- cert_item: Plateforme JavaCard MultiApp V4.0 en configuration ouverte basée sur l’Operating System JLEP3 masquée sur le composant SLE78CLFX4000PH (M7892 G12
- cert_item_version: JavaCard version 3.0.4, GP version 2.2.1
- cert_lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto 6 rue de la Verrerie CS20001 92197 Meudon Cedex, France Infineon Technologies AG Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie CS20001, 92197 Meudon Cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: PP JCS-O] SUN Java Card System Protection Profile Open Configuration, version 3.0
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0148-01: 1
- Certification No. C0148: 1
|
- DE:
- BSI-DSZ-CC-0891-V2-2016: 2
- FR:
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL6: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_FLR.1: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVICE: 1
- A.SETTING: 1
- T:
- T.ACCESS-NET-SETTING: 1
- T.ACCESS-PUBLIC-BOX: 1
- T.ACCESS-SECURE-PRINT: 1
- T.ACCESS-SETTING: 1
- T.BACKUP-RESTORE: 1
- T.BRING-OUT-STORAGE: 2
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- Gemplus:
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 2
- Microsoft:
|
pdf_data/report_keywords/eval_facility |
|
- Serma:
- Serma Safety & Security: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- FIPS:
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 2
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
- com:
- com.gemalto.javacardx.pace: 1
- javacardx:
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Hereinafter referred to as”printer”). This TOE offers the protection from exposure of the highly confidential document CRP-C0148-01 2 stored in the printer. Moreover, TOE can encrypt the image data written in HDD for: 1
|
|
pdf_data/report_metadata |
- /CreationDate: D:20080617154414+09'00'
- /ModDate: D:20080617154414+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 218797
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: ANSSI-CC-2017_07fr
- pdf_file_size_bytes: 1690566
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
pdf_data/st_filename |
c0148_est.pdf |
ANSSI_cible2017_07en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0891-V2-2016: 1
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 6+: 1
- EAL5: 2
- EAL5 augmented: 2
- EAL5+: 1
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 2
- ACM_SCP.1: 2
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.2: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU.1: 2
- AVA_SOF.1: 2
- AVA_VLA.1: 2
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_TDS: 1
- ALC:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 6
- FCS_COP.1: 8
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 41
- FDP_ACC.1.1: 3
- FDP_ACF.1: 47
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 3
- FDP_ITC.1: 2
- FDP_RIP.1: 1
- FIA:
- FIA_AFL.1: 65
- FIA_AFL.1.1: 7
- FIA_AFL.1.2: 7
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_NEW.1: 14
- FIA_NEW.1.1: 1
- FIA_NEW.1.2: 1
- FIA_SOS: 1
- FIA_SOS.1: 58
- FIA_SOS.1.1: 6
- FIA_SOS.2: 11
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_UAU.1: 22
- FIA_UAU.2: 76
- FIA_UAU.2.1: 5
- FIA_UAU.6: 10
- FIA_UAU.6.1: 1
- FIA_UAU.7: 15
- FIA_UAU.7.1: 2
- FIA_UID: 3
- FIA_UID.1: 21
- FIA_UID.2: 34
- FIA_UID.2.1: 4
- FIA_USB.1: 8
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_CKM.1: 1
- FMT_MOF.1: 136
- FMT_MOF.1.1: 4
- FMT_MSA: 5
- FMT_MSA.1: 3
- FMT_MSA.2: 4
- FMT_MSA.3: 15
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 2
- FMT_MTD.1: 86
- FMT_MTD.1.1: 6
- FMT_SMF.1: 31
- FMT_SMF.1.1: 1
- FMT_SMR.1: 73
- FMT_SMR.1.1: 3
- FMT_SMR.1.2: 3
- FPT:
- FPT_ITC.1: 2
- FPT_RVM.1: 17
- FPT_RVM.1.1: 1
- FPT_SEP.1: 13
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FTP:
- FTP_ITC.1: 6
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_ARP.1: 5
- FAU_ARP.1.1: 1
- FCO:
- FCS:
- FCS_CKM.1: 9
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.2.1: 1
- FCS_CKM.3: 2
- FCS_CKM.3.1: 1
- FCS_CKM.4: 2
- FCS_CKM.4.1: 1
- FCS_COP.1: 14
- FCS_COP.1.1: 1
- FCS_RND: 7
- FCS_RND.1: 7
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 14
- FDP_ACC.1: 1
- FDP_ACC.2: 6
- FDP_ACF: 16
- FDP_ACF.1: 13
- FDP_IFC: 4
- FDP_IFC.1: 1
- FDP_IFC.2: 2
- FDP_IFF: 4
- FDP_IFF.1: 10
- FDP_ITC: 4
- FDP_ITC.2: 5
- FDP_RIP: 17
- FDP_RIP.1: 8
- FDP_ROL: 6
- FDP_ROL.1: 2
- FDP_SDI.2: 2
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 2
- FDP_UIT.1: 2
- FIA:
- FIA_ATD: 3
- FIA_ATD.1: 1
- FIA_SOS.2: 1
- FIA_UAI.1: 1
- FIA_UAU: 2
- FIA_UAU.1: 1
- FIA_UID: 4
- FIA_UID.1: 2
- FIA_UID.2: 1
- FIA_USB: 2
- FIA_USB.1: 3
- FMT:
- FMT_MSA: 21
- FMT_MSA.1: 5
- FMT_MSA.2: 1
- FMT_MSA.3: 10
- FMT_MTD: 4
- FMT_MTD.1: 2
- FMT_MTD.3: 1
- FMT_SMF: 6
- FMT_SMF.1: 3
- FMT_SMR: 9
- FMT_SMR.1: 8
- FPR:
- FPR_UNO: 2
- FPR_UNO.1: 3
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 10
- FPT_FLS.1: 5
- FPT_ITT: 2
- FPT_ITT.1: 1
- FPT_PHP: 2
- FPT_PHP.3: 1
- FPT_RCV: 4
- FPT_RCV.3: 4
- FPT_RCV.4: 1
- FPT_TDC.1: 2
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 2
- FPT_TST.1: 3
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.NETWORK: 3
- A.SECRET: 2
- A.SERVICE: 2
- A.SETTING: 3
- O:
- O.CHECK-HDD: 4
- O.CONFIG: 13
- O.CRYPT-KEY: 6
- O.OVERWRITE-ALL: 4
- O.PUBLIC-BOX: 7
- O.SECURE-PRINT: 5
- O.TRUSTED-PASS: 5
- OE:
- OE.CRYPT: 5
- OE.CRYPTO: 1
- OE.FEED-BACK: 11
- OE.LOCK-HDD: 4
- OE.SESSION: 1
- T:
- T.ACCESS-NET-SETTING: 3
- T.ACCESS-PUBLIC-BOX: 3
- T.ACCESS-SECURE-PRINT: 2
- T.ACCESS-SETTING: 2
- T.BACKUP-RESTORE: 3
- T.BRING-OUT-STORAGE: 2
- T.DISCARD-PRINTER: 3
|
- A:
- A.APPLET: 2
- A.DELETION: 2
- A.VERIFICATION: 2
- D:
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 3
- D.APP_I_DATA: 4
- D.CRYPTO: 5
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.PIN: 4
- D.SEC_DATA: 7
- O:
- O.ALARM: 1
- O.APPLET: 28
- O.CARD-MANAGEMENT: 1
- O.CIPHER: 2
- O.CODE_PCKG: 16
- O.CODE_PKG: 7
- O.DELETION: 1
- O.FIREWALL: 1
- O.GLOBAL_ARRAYS_CONFID: 1
- O.GLOBAL_ARRAYS_INTEG: 1
- O.INSTALL: 1
- O.JAVAOBJECT: 56
- O.KEY-MNGT: 2
- O.LOAD: 1
- O.NATIVE: 1
- O.OBJ-DELETION: 1
- O.OPERATE: 1
- O.PIN-MNGT: 2
- O.REALLOCATION: 1
- O.RESOURCES: 1
- O.RND: 1
- O.SCP: 3
- O.SID: 1
- O.TRANSACTION: 2
- OE:
- OE.APPLET: 1
- OE.CODE-EVIDENCE: 1
- OE.VERIFICATION: 4
- OP:
- OP.ARRAY_ACCESS: 6
- OP.CREATE: 10
- OP.DELETE_APPLET: 6
- OP.DELETE_PCKG: 4
- OP.DELETE_PCKG_APPLET: 4
- OP.INSTANCE_FIELD: 6
- OP.INVK_INTERFACE: 10
- OP.INVK_VIRTUAL: 8
- OP.JAVA: 8
- OP.PUT: 7
- OP.THROW: 7
- OP.TYPE_ACCESS: 7
- OSP:
- OSP.RND: 2
- OSP.VERIFICATION: 2
- R:
- T:
- T.CONFID-APPLI-DATA: 2
- T.CONFID-JCS-CODE: 2
- T.CONFID-JCS-DATA: 2
- T.DELETION: 1
- T.EXE-CODE: 4
- T.INSTALL: 2
- T.INTEG-APPLI-CODE: 3
- T.INTEG-APPLI-DATA: 4
- T.INTEG-JCS-CODE: 1
- T.INTEG-JCS-DATA: 2
- T.NATIVE: 2
- T.OBJ-DELETION: 2
- T.PHYSICAL: 2
- T.RESOURCES: 1
- T.SID: 4
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 3
- SHA-256: 3
- SHA-384: 2
- SHA-512: 3
- SHA224: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 2
- fault induction: 2
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 1
- Leak-Inherent: 2
- physical probing: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- FIPS:
- FIPS 180-1: 2
- FIPS PUB 197: 2
|
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- PKCS:
- PKCS#1: 7
- PKCS#3: 1
- PKCS#5: 5
- SCP:
- SCP01: 3
- SCP02: 3
- SCP03: 3
|
pdf_data/st_keywords/javacard_version |
|
- JavaCard:
- Java Card 2.2.2: 3
- Java Card 3.0.4: 8
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- ConfidentialDocument:
- functions that are realized by the TOE. TOE offers the protection from exposure of the highly confidential document stored in the printer. Moreover, TOE can encrypt the image data written in HDD for the danger of: 1
|
|
pdf_data/st_metadata |
- /Author:
- /Company:
- /CreationDate: D:20080602193009+09'00'
- /Creator: Word 用 Acrobat PDFMaker 7.0
- /ModDate: D:20080602193041+09'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Title: Microsoft Word - 【C0148】bizhub353P_英文ST-106-080118_080530.doc
- pdf_file_size_bytes: 641424
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 97
|
- /Author: Antoine de Lavernette
- /CreationDate: D:20170224103913+01'00'
- /Creator: Microsoft® Word 2013
- /Keywords: Security Target, CC
- /ModDate: D:20170224103935+01'00'
- /Producer: Microsoft® Word 2013
- /Subject: Security Target
- /Title: eTravel v1.0 Security Target MAÏA3
- pdf_file_size_bytes: 1989234
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 79
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |